>>> On 11.02.15 at 18:04, wrote:
> On 11/02/15 07:56, Jan Beulich wrote:
> On 10.02.15 at 20:30, wrote:
>>> While coding this is up I have hit issues that I need input on:
>>>
>>> As a HVM_PARAM_ item, I would assume I should be following
>>> what HVM_PARAM_VIRIDIAN does. It has this comment
On 02/17/2015 01:20 AM, Luis R. Rodriguez wrote:
On Thu, Feb 12, 2015 at 3:07 AM, David Vrabel wrote:
On 12/02/15 06:03, Luis R. Rodriguez wrote:
From: "Luis R. Rodriguez"
Here's the first shot at the Kconfig changes for Xen as discussed
on the mailing list a little while ago [0]. Let me kno
On 02/17/2015 01:25 AM, Luis R. Rodriguez wrote:
On Mon, Feb 16, 2015 at 4:20 PM, Luis R. Rodriguez
wrote:
As it is per our agreed upon changes we can in theory enable a
XEN_PVHVM system without XEN_PV or XEN_PVH. If this is indeed
desirable this poses an issue at build time
And this also rai
Up to now the pvscsi frontend hasn't supported domain suspend and
resume. When a domain with an assigned pvscsi device was suspended
and resumed again, it was not able to use the device any more: trying
to do so resulted in hanging processes.
Support suspend and resume of pvscsi devices.
Signed-o
In the pvscsi backend copy the frontend request to ensure it is not
changed by the frontend during processing it in the backend.
Support suspend/resume of the domain to be able to access a pvscsi
device n the frontend afterwards.
Changes in V2:
- changed scsiback_do_cmd_fn() as sugested by Jan Be
When a xen domain is being restored the LUN state of a pvscsi device
is "Connected" and not "Initialising" as in case of attaching a new
pvscsi LUN.
This must be taken into account when adding a new pvscsi device for
a domain as otherwise the pvscsi LUN won't be connected to the
SCSI target associ
A request in the ring buffer mustn't be read after it has been marked
as consumed. Otherwise it might already have been reused by the
frontend without violating the ring protocol.
To avoid inconsistencies in the backend only work on a private copy
of the request. This will ensure a malicious guest
The maximum of SW-IOMMU is limited to 2^11*128 = 256K.
And the size of IO_TLB_DEFAULT_SIZE is limited to (64UL<<20) 64M.
While in different platform and different requirement this seems improper.
So modifing the IO_TLB_SEGSIZE to io_tlb_segsize and IO_TLB_DEFAULT_SIZE
to io_tlb_default_size which c
In vmap_init, map_pages_to_xen() is called for mapping
vm_bitmap. Initially one page of vm_bitmap is allocated
and mapped using PAGE_HYPERVISOR attribute.
For the rest of vm_bitmap pages, MAP_SMALL_PAGES attribute
is used to map.
In ARM for both PAGE_HYPERVISOR and MAP_SMALL_PAGES, valid bit
is se
flight 34605 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34605/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
Tests which are failin
flight 34615 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34615/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 33866
build-amd64-rumpuserx
flight 34602 linux-3.16 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34602/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 15 guest-localmigrate/x10fail REGR. vs. 34167
test-amd64-i386-pair
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: Monday, February 16, 2015 6:17 PM
> To: Hu, Robert
> Cc: Ian Jackson; xen-devel@lists.xen.org; jfeh...@suse.com;
> wei.l...@citrix.com; ian.campb...@citrix.com; Pang, LongtaoX
> Subject: Re: [PATCH OSSTEST 11/12] Cha
On Mon, Feb 16, 2015 at 4:20 PM, Luis R. Rodriguez
wrote:
> As it is per our agreed upon changes we can in theory enable a
> XEN_PVHVM system without XEN_PV or XEN_PVH. If this is indeed
> desirable this poses an issue at build time
And this also raises the question of whether or not we should ma
On Thu, Feb 12, 2015 at 3:07 AM, David Vrabel wrote:
> On 12/02/15 06:03, Luis R. Rodriguez wrote:
>> From: "Luis R. Rodriguez"
>>
>> Here's the first shot at the Kconfig changes for Xen as discussed
>> on the mailing list a little while ago [0]. Let me know if you spot
>> any issues or if you'd
Dear Wilk
> -Original Message-
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> Sent: Tuesday, February 17, 2015 6:13 AM
> To: Wang, Xiaoming
> Cc: r...@linux-mips.org; boris.ostrov...@oracle.com;
> david.vra...@citrix.com; linux-m...@linux-mips.org; linux-
> ker...@vger.ker
Also added missing TRAP_DEBUG & VLAPIC.
Signed-off-by: Don Slutz
---
v9:
Dropped unneed VMPORT_UNHANDLED, VMPORT_DECODE.
v7:
Dropped some of the new traces.
Added HVMTRACE_ND7.
v6:
Dropped the attempt to use svm_nextrip_insn_length via
__get_instruction_length (added i
This is done by adding HVM_PARAM_VMWARE_HW. It is set to the VMware
virtual hardware version.
Currently 0, 3-4, 6-11 are good values. However the
code only checks for == 0 or != 0 or >= 7.
If non-zero then
Return VMware's cpuid leaves. If >= 7 return data, else
return 0.
The support of hyp
A tool to get and set hvm param.
Signed-off-by: Don Slutz
---
v9:
Change to output number as weel as string.
Made all string only lower case.
Rebase changes.
v7:
Was a later patch. Still optional.
Fixed formatting.
Adjust for drop of VMware RPC.
.gitignore
This is needed by me to build this test
Signed-off-by: Don Slutz
---
tools/tests/x86_emulator/test_x86_emulator.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/tests/x86_emulator/test_x86_emulator.c
b/tools/tests/x86_emulator/test_x86_emulator.c
index 6f67fc7..03cd0e8 100644
--- a
Signed-off-by: Don Slutz
---
tools/tests/x86_emulator/test_x86_emulator.c | 155 +++
1 file changed, 155 insertions(+)
diff --git a/tools/tests/x86_emulator/test_x86_emulator.c
b/tools/tests/x86_emulator/test_x86_emulator.c
index 02a9f0a..985c80e 100644
--- a/tools/tests
This is used to set HVM_PARAM_VMWARE_HWVER. It is set to the
emulated VMware virtual hardware version.
Currently 0, 3-4, 6-11 are good values. However the code only
checks for == 0, != 0, or < 7.
If non-zero then
default VGA to VMware's VGA.
Also now allows vga=vmware
Signed-off-by: Don Slut
Signed-off-by: Don Slutz
---
tools/tests/x86_emulator/test_x86_emulator.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/tools/tests/x86_emulator/test_x86_emulator.c
b/tools/tests/x86_emulator/test_x86_emulator.c
index 03cd0e8..02a9f0a 100644
--- a/tools/tests/x86_emulator/test_x86
Changes v8 to v9:
Overview of changes:
s/vmware_hw/vmware_hwver/i
Switch to x86_emulator to handle #GP
New patch: Move MAX_INST_LEN into x86_emulate.h
Add QEMU usage, patch #8 "Add IOREQ_TYPE_VMWARE_PORT"
Split patch "xen: Add vmware_port support" into 2. 1st has same
name
This adds synchronization of the 6 vcpu registers (only 32bits of
them) that vmport.c needs between Xen and QEMU.
This is to avoid a 2nd and 3rd exchange between QEMU and Xen to
fetch and put these 6 vcpu registers used by the code in vmport.c
and vmmouse.c
In the tools, enable usage of QEMU's vm
This file: backdoor_def.h comes from:
http://packages.vmware.com/tools/esx/3.5latest/rhel4/SRPMS/index.html
open-vm-tools-kmod-7.4.8-396269.423167.src.rpm
open-vm-tools-kmod-7.4.8.tar.gz
vmhgfs/backdoor_def.h
and is unchanged.
Added the badly named include file includeCheck.h also. It onl
This includes adding is_vmware_port_enabled
This is a new domain_create() flag, DOMCRF_vmware_port. It is
passed to domctl as XEN_DOMCTL_CDF_vmware_port.
This enables limited support of VMware's hyper-call.
This is both a more complete support then in currently provided by
QEMU and/or KVM and l
Change some hard coded 15 into MAX_INST_LEN
Signed-off-by: Don Slutz
---
xen/arch/x86/hvm/svm/emulate.c | 2 --
xen/arch/x86/hvm/svm/svm.c | 4 ++--
xen/arch/x86/hvm/vmx/vmx.c | 2 +-
xen/arch/x86/x86_emulate/x86_emulate.c | 4 ++--
xen/arch/x86/x86_emulate/x86_em
This new libxl_domain_create_info field is used to set
XEN_DOMCTL_CDF_vmware_port for the xc_domain_create() routine.
In xen it is is_vmware_port_enabled.
If is_vmware_port_enabled then
enable a limited support of VMware's hyper-call.
VMware's hyper-call is also known as VMware Backdoor I/O Po
Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
to port 0x5658 specially. Note: since many operations return data
in EAX, "in (%dx),%eax" is the one to use. The other lengths like
"in (%dx),%al" will still do things, only AL part of EAX will be
changed. For "out %eax,(%dx)" o
Changes in v18:
* Return 1 (i.e. "handled") in vpmu_do_interrupt() if PMU_CACHED is
set. This is needed since we can get an interrupt while this flag is
set on AMD processors when multiple counters are in use (**) (AMD
processor don't mask LVTPC when PMC interrupt happens and so there
is a
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops
for VCPU are not initialized (which is the case, for example, for PV guests that
are not "VPMU-enlightened") access to MSRs will return failure.
Dump VPMU state for all domains (HVM and PV) when requested.
Signed-off-by:
The two routines share most of their logic.
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/hvm/vpmu.c| 77 --
xen/include/asm-x86/hvm/vpmu.h | 14 ++--
2 files changed, 42 insertions(+), 49 deletions(-)
diff --git a/xen/arch/x86/hvm/vpmu.c b/
A subsequent patch will add an inline routine to vpmu.h that will call
vpmu_load().
This inline will try to access vcpu->vpmu which is not possible since struct
vcpu may not be fully defined at that point. So we will have that inline pass
vpmu pointer to vpmu_load() instead.
This change slightly
Add support for handling PMU interrupts for PV guests.
VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush
hypercall. This allows the guest to access PMU MSR values that are stored in
VPMU context which is shared between hypervisor and domain, thus avoiding
traps to hyper
Add support for using NMIs as PMU interrupts to allow profiling hypervisor
when interrupts are disabled.
Most of processing is still performed by vpmu_do_interrupt(). However, since
certain operations are not NMI-safe we defer them to a softint that
vpmu_do_interrupt()
will schedule:
* For PV gue
Add runtime interface for setting PMU mode and flags. Three main modes are
provided:
* XENPMU_MODE_OFF: PMU is not virtualized
* XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts.
* XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0
can profile itself
vpmu structure will be used for both HVM and PV guests. Move it from
hvm_vcpu to arch_vcpu.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
Reviewed-by: Kevin Tian
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/include/asm-x86/domain.h | 2 ++
xen/include/asm-x86/hvm/vcpu.h
Move some VPMU initilization operations into __initcalls to avoid performing
same tests and calculations for each vcpu.
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/hvm/svm/vpmu.c | 112
xen/arch/x86/hvm/vmx/vpmu_core2.c | 151 +++
Since PMU is now not HVM specific we can move VPMU-related files up from
arch/x86/hvm/ directory.
Specifically:
arch/x86/hvm/vpmu.c -> arch/x86/cpu/vpmu.c
arch/x86/hvm/svm/vpmu.c -> arch/x86/cpu/vpmu_amd.c
arch/x86/hvm/vmx/vpmu_core2.c -> arch/x86/cpu/vpmu_intel.c
include/asm-x86/h
Add pmu.h header files, move various macros and structures that will be
shared between hypervisor and PV guests to it.
Move MSR banks out of architectural PMU structures to allow for larger sizes
in the future. The banks are allocated immediately after the context and
PMU structures store offsets
We don't need to try to destroy it since it can't be already allocated at the
time we try to initialize it.
Signed-off-by: Boris Ostrovsky
Suggested-by: Andrew Cooper
---
xen/arch/x86/hvm/vpmu.c | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/hvm/vpmu.c b/
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an
error was encountered during MSR processing (instead of stating that the access
was to a VPMU register).
As part of this patch we also check for validity of certain MSR accesses right
when we determine which register i
Save VPMU state during context switch for both HVM and PV(H) guests.
A subsequent patch ("x86/VPMU: NMI-based VPMU support") will make it possible
for vpmu_switch_to() to call vmx_vmcs_try_enter()->vcpu_pause() which needs
is_running to be correctly set/cleared. To prepare for that, call
context_
Code for initializing/tearing down PMU for PV guests
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Acked-by: Daniel De Graaf
---
tools/flask/policy/policy/modules/xen/xen.te | 4 ++
xen/arch/x86/domain.c| 2 +
xen/arch/x86/hvm/hvm.c | 1
Export Xen's symbols as {} triplet via new XENPF_get_symbol
hypercall
Signed-off-by: Boris Ostrovsky
Acked-by: Daniel De Graaf
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/arch/x86/platform_hypercall.c | 28 +++
xen/common/sym
Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged
domain (dom0) profile both itself (and the hypervisor) and the guests. While
this mode is on profiling in guests is disabled.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
Reviewed-by: Dietmar Hahn
Tested-by: D
flight 34596 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34596/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 7 debian-hvm-install fail REGR. vs.
33480
test-amd64-i38
On Mon, Feb 16, 2015 at 10:38:18AM +0800, Wang Xiaoming wrote:
> The maximum of SW-IOMMU is limited to 2^11*128 = 256K.
> And the maximum of IO_TLB_DEFAULT_SIZE is limited to (64UL<<20) 64M.
> While in different platform and different requirement this seems improper.
> So modifing the IO_TLB_SEGSIZ
Hi Wei,
2015-02-16 7:38 GMT-05:00 :
>
> Hi all
>
> We are now one month into 4.6 development window. This is an email to keep
> track of all the patch series I gathered. It is by no means complete and / or
> acurate. Feel free to reply this email with new projects or correct my
> misunderstanding.
On 02/16/15 13:17, Andrew Cooper wrote:
> XenServer's VM density testing uncovered a regression when moving from
> sysvinit to systemd where the file descriptor limit dropped from 4096 to
> 1024. (XenServer had previously inserted a ulimit statement into its
> initscripts.)
>
> One solution is to
I have tried several of these xen versions both as host and as guest.
They all do the same thing for me. Not sure I have tried all possible.
So far I have not found a way to use nestedhvm and xen. When I try and
start a HVM guest, I get:
[root@xen-in-xen ~]# xl -vvv cre -V /home/don/C63-min-too
On Mon, Feb 16, 2015 at 07:10:46PM +, Wei Liu wrote:
[...]
> > (being a function or macro which always returns EINVAL), or some such.
> >
>
> Do feel very keen about this since the format string differs from
Don't...
> functions. And it's only one printf anyway.
>
> Wei.
>
> > Thanks,
> >
On Monday, February 16, 2015 07:32, Juergen Gross wrote:
> To: Kristian Hagsted Rasmussen; Olaf Hering; xen-de...@lists.xensource.com
> Subject: Re: [Xen-devel] pvSCSI test
>
> On 02/12/2015 05:43 PM, Kristian Hagsted Rasmussen wrote:
>> On Monday, February 9, 2015 07:02, Juergen Gross wrote:
>>
On Fri, Feb 13, 2015 at 02:12:29PM +, Ian Jackson wrote:
> Wei Liu writes ("[PATCH v5 22/24] libxlu: introduce new APIs"):
> > These APIs can be used to manipulate XLU_ConfigValue and XLU_ConfigList.
> >
> > +if (value->type != XLU_STRING) {
> > +if (!dont_warn)
> > +fp
flight 34582 ovmf real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34582/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 7 debian-hvm-install fail REGR. vs. 33686
test-amd64-i386-xl-qemuu-ovm
At 13:35 + on 16 Feb (1424090147), Andrew Cooper wrote:
> On 16/02/15 12:29, Tim Deegan wrote:
> > Hi,
> >
> > Thanks for this; I think the code looks a lot saner with all the
> > vcpu<->domain fiddling removed. :)
> >
> > At 17:15 + on 12 Feb (1423757759), Andrew Cooper wrote:
> >> The pur
XenServer's VM density testing uncovered a regression when moving from
sysvinit to systemd where the file descriptor limit dropped from 4096 to
1024. (XenServer had previously inserted a ulimit statement into its
initscripts.)
One solution is to use LimitNOFILE=4096 in xenconsoled.service to match
Hi,
At 22:01 +0800 on 16 Feb (1424120474), Kai Huang wrote:
> On Fri, Feb 13, 2015 at 10:50 AM, Kai Huang wrote:
> >
> > On 02/12/2015 08:34 PM, Tim Deegan wrote:
> >>
> >> Hi,
> >>
> >> Thanks for posting this design!
> >>
> >> At 16:28 +0800 on 11 Feb (1423668493), Kai Huang wrote:
> >>>
> >>>
On Mon, Feb 16, 2015 at 04:58:11PM +, Dario Faggioli wrote:
> On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote:
>
> > @@ -760,7 +760,8 @@ static int x86_shadow(xc_interface *xch, domid_t domid)
> > int arch_setup_meminit(struct xc_dom_image *dom)
> > {
> > int rc;
> > -xen_pfn_t pfn
On Mon, Feb 16, 2015 at 04:51:43PM +, Dario Faggioli wrote:
> On Mon, 2015-02-16 at 16:11 +, Wei Liu wrote:
> > On Mon, Feb 16, 2015 at 03:56:21PM +, Dario Faggioli wrote:
> > > On Mon, 2015-02-16 at 15:17 +, Wei Liu wrote:
>
> > > > And there is no way to
> > > > specify priority
On Fri, 2015-02-13 at 15:42 +, Andrew Cooper wrote:
> On 12/02/15 19:44, Wei Liu wrote:
> > This function gets the machine E820 map and sanitize it according to PV
> > guest configuration.
> >
> > This will be used in later patch. No functional change introduced in
> > this patch.
> >
> > Signe
On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote:
> @@ -760,7 +760,8 @@ static int x86_shadow(xc_interface *xch, domid_t domid)
> int arch_setup_meminit(struct xc_dom_image *dom)
> {
> int rc;
> -xen_pfn_t pfn, allocsz, i, j, mfn;
> +xen_pfn_t pfn, allocsz, mfn, total, pfn_base;
> +
On Mon, 2015-02-16 at 16:11 +, Wei Liu wrote:
> On Mon, Feb 16, 2015 at 03:56:21PM +, Dario Faggioli wrote:
> > On Mon, 2015-02-16 at 15:17 +, Wei Liu wrote:
> > > And there is no way to
> > > specify priority among the group of nodes you specify with a single
> > > bitmap.
> > >
> >
On Mon, Feb 16, 2015 at 10:54:11AM -0500, Boris Ostrovsky wrote:
[...]
> >>+if (valid_devs == 0)
> >>+printf("No device topology data available\n");
> >>+
> >>+libxl_pcitopology_list_free(pciinfo, nr);
> >>+#endif
> >>
> >And for implementation too, I think.
>
>
> I am not sure wh
On 15/02/15 17:30, Raghavendra K T wrote:
> --- a/arch/x86/xen/spinlock.c
> +++ b/arch/x86/xen/spinlock.c
> @@ -41,7 +41,7 @@ static u8 zero_stats;
> static inline void check_zero(void)
> {
> u8 ret;
> - u8 old = ACCESS_ONCE(zero_stats);
> + u8 old = READ_ONCE(zero_stats);
> i
On Mon, Feb 16, 2015 at 04:00:19PM +, Dario Faggioli wrote:
> On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote:
> > A vnode consists of one or more vmemranges (virtual memory range). One
> > example of multiple vmemranges is that there is a hole in one vnode.
> >
> > Currently we haven't expo
On Mon, Feb 16, 2015 at 03:56:21PM +, Dario Faggioli wrote:
> On Mon, 2015-02-16 at 15:17 +, Wei Liu wrote:
> > On Mon, Feb 16, 2015 at 02:58:32PM +, Dario Faggioli wrote:
>
> > > > +libxl_vnode_info = Struct("vnode_info", [
> > > > +("memkb", MemKB),
> > > > +("distances", Arr
On Mon, 2015-02-16 at 10:54 -0500, Boris Ostrovsky wrote:
> I am not sure what the standard practice is for LIBXL_HAVE_ macros. I
> see a couple of examples where '#ifdef LIBXL_HAVE_*" is used in libxl
> code, which is why I have it here as well.
>
Yes, that is the case for two of them, AFAICS:
On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote:
> A vnode consists of one or more vmemranges (virtual memory range). One
> example of multiple vmemranges is that there is a hole in one vnode.
>
> Currently we haven't exported vmemrange interface to libxl user.
> Vmemranges are generated during
Il 16/02/2015 16:21, Wei Liu ha scritto:
On Mon, Feb 16, 2015 at 02:39:40PM +, David Vrabel wrote:
On 16/02/15 12:38, wei.l...@citrix.com wrote:
= Prognosis =
Does anyone find this section useful?
I do find it useful.
I also find it useful, thanks.
If can be useful there is also small
On 02/16/2015 09:08 AM, Dario Faggioli wrote:
On Mon, 2015-02-09 at 15:04 -0500, Boris Ostrovsky wrote:
Currently both of these sysctls make a copy to userspace for each index of
various query arrays. We should try to copy whole arrays instead.
This requires some changes in sysctl's public data
On Mon, 2015-02-16 at 15:17 +, Wei Liu wrote:
> On Mon, Feb 16, 2015 at 02:58:32PM +, Dario Faggioli wrote:
> > > +libxl_vnode_info = Struct("vnode_info", [
> > > +("memkb", MemKB),
> > > +("distances", Array(uint32, "num_distances")), # distances from this
> > > node to other nod
On 02/16/2015 08:45 AM, Dario Faggioli wrote:
@@ -1070,6 +1078,12 @@ void libxl_vminfo_list_free(libxl_vminfo *list, int
nb_vm);
libxl_cputopology *libxl_get_cpu_topology(libxl_ctx *ctx, int *nb_cpu_out);
void libxl_cputopology_list_free(libxl_cputopology *, int nb_cpu);
+#ifdef LIBXL_H
Thanks. I will update my list.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Mon, Feb 16, 2015 at 03:20:44PM +0100, Vitaly Kuznetsov wrote:
> writes:
>
> > Hi all
> >
> > We are now one month into 4.6 development window. This is an email to keep
> > track of all the patch series I gathered. It is by no means complete and /
> > or
> > acurate. Feel free to reply this e
On Mon, Feb 16, 2015 at 02:39:40PM +, David Vrabel wrote:
> On 16/02/15 12:38, wei.l...@citrix.com wrote:
> >
> > = Prognosis =
>
> Does anyone find this section useful?
>
I do find it useful.
> I imagine its a non-trivial amount of work to keep up-to-date.
>
Yes. But it's better than lo
On Mon, Feb 16, 2015 at 02:58:32PM +, Dario Faggioli wrote:
> On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote:
> > A domain can contain several virtual NUMA nodes, hence we introduce an
> > array in libxl_domain_build_info.
> >
> > libxl_vnode_info contains the size of memory in that node, th
On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote:
> A domain can contain several virtual NUMA nodes, hence we introduce an
> array in libxl_domain_build_info.
>
> libxl_vnode_info contains the size of memory in that node, the distance
> from that node to every nodes, the underlying pnode and a bit
Ian Jackson writes ("Re: [PATCH qemu-trad] cirrus: fix an uninitialized
variable"):
> Jan Beulich writes ("[PATCH qemu-trad] cirrus: fix an uninitialized
> variable"):
> > Noticed by paying attention to a compiler warning (reported for the
> > only caller of the function modified, vga_ioport_read
On 16/02/15 14:49, Ian Jackson wrote:
> Ian Jackson writes ("Re: [PATCH v2] libxc: introduce a per architecture
> scratch pfn for temporary grant mapping"):
>> Ian Campbell writes ("Re: [PATCH v2] libxc: introduce a per architecture
>> scratch pfn for temporary grant mapping"):
>>> Ian, Julien ha
All the GICv2 registers are word-accessible. Some them are also
byte-accessible (see GICD_IPRIORITYR*).
Those registers are incorrectly implemented when they should be RAZ. Only
word-access size are currently allowed for them.
To avoid further issues, introduce different label following the acces
The number of implemented CPU interfaces is one more than the value of
this field.
Also avoid hardcoding the shift and remove useless mask.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
This patch should be backported to Xen 4.4 and Xen 4.5.
Although this patch won't apply di
Also update the different comment to make clear that we register one MMIO
region per contiguous regions and not per re-distributor.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
Changes in v3:
- Add Ian's ack
Changes in v2:
- Patch added
---
xen/arch/arm/gic-v
Some of the registers are accessible via multiple size (see GICD_IPRIORITYR*).
Those registers are incorrectly implemented when they should be RAZ. Only
word-access size are currently allowed for them.
The paragraph 5.3.1 in the GICv3 spec (PRD03-GENC-010745 24.0) indicates
the different access-s
- Drop wrong comment about the default stride. It's not always 2 * SZ_64K.
When the re-distributor support VLPIs (from GICv4), the default
stride is 4 * SZ_64K
- Explain why SZ_64K * 2
Signed-off-by: Julien Grall
---
Changes in v3:
- Update commit message
Change
The messages in the common emulation doesn't specify which distributor
(redistributor or distributor) is used. This make difficult to find the
correct registers.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
Changes in v3:
- Add Ian's ack
Changes in v2:
- Patch
This register is shared between every vCPUs and the lock was already
taken for read.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
This patch should be backported to Xen 4.4 and Xen 4.5.
Although, it won't apply directly for Xen 4.4.
Changes in v2:
- Add Ian's ack
There is a one-to-one mapping between each re-distributors and processors.
Each re-distributors can be accessed by any processor at any time. For
instance during the initialization of the GIC, the drivers will browse
the re-distributor to find the one associated to the current processor
(via GICR_T
The 32-bit register GICR_NSACR is RAZ/WI on non-secure state. Therefore
we should not inject a data abort to the guest.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
This patch should be backport to Xen 4.5. The current implementation will
inject a data abort into the guest.
The current VGIC code doesn't support to change the pending and active status
of an IRQ via the (re-)distributor.
Futhermore, all the access size wasn't support correctly and some
registers was implemented as write-ignore. The latter make very
difficult for a kernel developer to find that we don't
The stride may not be set if the hardware GIC is using the default
layout. It happens on the Foundation model.
On GICv3, the default stride is 2 * 64K. Therefore it's possible to avoid
checking at every redistributor MMIO access if the stride is not set.
Because domU uses a static stride configur
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
This patch is candidate for backporting to Xen 4.4 and Xen 4.5.
Although, this patch won't apply directly to Xen 4.4.
Changes in v3:
- Add Ian's ack
Changes in v2:
- Patch added
---
xen/arch/arm/vgic-v2.c
Hello,
The first goal of this series is to fix Linux 3.19 DOM0 boot on GICv3 systems
(see patch #1).
It turns out to a bigger series because there were some outstanding bugs in the
vGIC emulation. The most important one is the way we emulate the re-distributor.
Each re-distributor should be assoc
As backward GICv2 compatibility is not supported in the vGICv3 driver,
the bit ARE_NS is RAO/WI.
Furthermore, when ARE_NS is set, the guest can only modify EnableGrp1A.
At same time take the vgic_lock to write into domain.arch.vgic.ctrl. It
was already taken during read.
Signed-off-by: Julien Gr
On GICv3, the value (CPUNumber + 1) indicates the number of processor that may
be used as interrupts targets when ARE bit is zero. The maximum is 8
processors.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
The current code of the vGIC doesn't support ARE = 0.
Nonetheless, the pa
>From Linux 3.19, the GICv3 drivers is using GICD_TYPER.IDbits to check
the validity of the hardware interrupt number.
The field IDBits in the register GICD_TYPER is used to know the number of
interrupt identifiers (SPI, PPIs, SGIs, LPIs) supported by GIC Stream Protocol
Interface.
This field con
On 16/02/15 13:24, Julien Grall wrote:
> (Strimming the cc list)
Sorry I forgot to add back xen-devel.
> On 16/02/15 12:38, wei.l...@citrix.com wrote:
>> Hi all
>
> Hi Wei,
>
>> We are now one month into 4.6 development window. This is an email to keep
>> track of all the patch series I gather
On Mon, Feb 16, 2015 at 02:46:54PM +, Dario Faggioli wrote:
> On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote:
> > Add a new field p2m_size to keep track of the number of pages covert by
> >
> Here and in the code (comment): is it 'covert' or 'covered' (or maybe
> even something else)?
Should
Ian Jackson writes ("Re: [PATCH v2] rump kernels: use new platform macro"):
> Wei Liu writes ("[PATCH v2] rump kernels: use new platform macro"):
> > Starting from rump kernel changeset 91d5623 ("Renaming platform macros,
> > app-tools and autoconf target string"), __RUMPUSER_XEN__ and __RUMPAPP__
1 - 100 of 137 matches
Mail list logo