>> While I didn't tested a lot, nearly everything seems to be working. The only
>> discovered two issues are:
>> It may be just placebo, but I think that the DomU takes a bit more time
>> while booting, and also after I shut down it from inside. With xl list, I
>> see that it stays around 20 sec
flight 50312 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50312/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
Signed-off-by: Dario Faggioli
---
tools/libxc/include/xenctrl.h |2 +
tools/libxc/xc_psr.c | 19 +
tools/libxl/libxl.h |4 +++
tools/libxl/libxl_psr.c | 59 +
xen/arch/x86/sysctl.c | 14 ++
Signed-off-by: Dario Faggioli
---
tools/libxc/include/xenctrl.h |2 ++
tools/libxc/xc_psr.c | 34 ++
tools/libxl/libxl.h |2 ++
tools/libxl/libxl_psr.c | 30 ++
xen/arch/x86/sysctl.c | 28 ++
Now that the functionallity is wired, from within Xen
up to libxl, use that to implement a new mode for
`xl psr-cmt-show', by means of the '-c' switch.
With some pCPUs attached to CMT, the output looks as
follows:
[root@redbrick ~]# xl psr-cmt-show -c cache_occupancy
Socket 0: 46080 KB T
From: Chao Peng
Switching RMID from previous vcpu to next vcpu only needs to write
MSR_IA32_PSR_ASSOC once. Write it with the value of next vcpu is enough,
no need to write '0' first. Idle domain has RMID set to 0 and because MSR
is already updated lazily, so just switch it as it does.
Also move
Just print it.
Signed-off-by: Dario Faggioli
---
xen/arch/x86/psr.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c
index c902625..0f2a6ce 100644
--- a/xen/arch/x86/psr.c
+++ b/xen/arch/x86/psr.c
@@ -111,7 +111,8 @@ static void __i
Now that the functionallity is wired, from within
Xen up to libxl, use that to implement a new mode
for `xl psr-cmt-attach' and `xl psr-cmt-detach',
by means of a new '-c' switch:
[root@redbrick ~]# xl psr-cmt-detach -c 4
[root@redbrick ~]# xl psr-cmt-attach -c 121
Signed-off-by: Dario Faggioli
Hi Everyone,
This RFC series is the outcome of an investigation I've been doing about
whether we can take better advantage of features like Intel CMT (and of PSR
features in general). By "take better advantage of" them I mean, for example,
use the data obtained from monitoring within the scheduler
This allows for a new item to be passed as part of the psr=
boot option: "percpu_cmt". If that is specified, Xen tries,
at boot time, to associate an RMID to each core.
XXX This all looks rather straightforward, if it weren't
for the fact that it is, apparently, more common than
I though t
Instead of just using -c 0x we can
also use: -c -, -c ,, or a
combination of them, or 'all' for all cpus.
This new format can include just singular CPUs: -c ,
or ranges without an start or end (and xentrace will figure out
the values), such as: -c - (which will include cpu0, cpu1,
and cpu2) or -c
From: George Dunlap
xentrace is the only caller at the moment. Split the cpu and event
mask setting out into seperate functions, but leave the current limit
of 32 bits for masks passed in from the command-line.
Based on a patch from Konrad Rzeszutek Wilk
Signed-off-by: George Dunlap
Signed-o
Hey George and Ian,
Since v3 [http://lists.xen.org/archives/html/xen-devel/2015-03/msg02986.html]:
- Rebased code on George's patch.
- Added support for 'all' in CPU parsing.
In v2 [http://lists.xen.org/archives/html/xen-devel/2014-06/msg01835.html]:
- Redid the code per George's feedback.
-
We export the xc_cpumap_alloc but not the bit operations.
One could include 'xc_bitops.h' but that is naughty - so instead
we just export the proper functions to do it on the xc_cpumap_t
typedef.
Signed-off-by: Konrad Rzeszutek Wilk
v2: Use our own macro to make sure ARM is not affected nega
A job should be acquired at the beginning of a domain destroy operation,
not at the end when cleaning up the domain. Fix two occurrences of this
late job acquisition in the libxl driver. Doing so renders
libxlDomainCleanupJob unused, so it is removed.
Signed-off-by: Jim Fehlig
---
Unchanged fr
V3 of a small series to fix issues wrt domain destroy
V1:
https://www.redhat.com/archives/libvir-list/2015-March/msg01337.html
V2:
https://www.redhat.com/archives/libvir-list/2015-April/msg00072.html
In this version, patch 3 is changed a bit to provide a wrapper for
unlocking, destroying, and lo
Let callers of libxlDomainStart decide when it is appropriate to
acquire a job on the associated virDomainObj.
Signed-off-by: Jim Fehlig
---
Job handling in the migration code is currently broken/incomplete,
so fixing it is deferred to a follow-up series I'm working on.
src/libxl/libxl_domain.
A destroy operation can take considerable time on large memory
domains due to scrubbing the domain's memory. Unlock the
virDomainObj while libxl_domain_destroy is executing.
Implement libxlDomainDestroyInternal wrapper to handle unlocking,
calling destroy, and locking. Change all callers of
libx
Jim Fehlig wrote:
> V2 of a small series to fix issues wrt domain destroy
>
> https://www.redhat.com/archives/libvir-list/2015-March/msg01337.html
>
> Comments from Konrad and Martin are addressed in this version.
>
> Jim Fehlig (3):
> libxl: Move job acquisition in libxlDomainStart to callers
>
On 03/04/15 21:02, Konrad Rzeszutek Wilk wrote:
> If we cannot find the domain - log an error (and still
> continue returning an error).
Forgive me if I am misunderstanding the effect of this patch (I tried to
find the original rationale but failed). If the effect is that commands
such as xl domid
Instead of just printing an generic error.
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Ian Campbell
---
tools/libxl/xl_cmdimpl.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index 1c07ac6..0ccf257 100644
---
If we cannot find the domain - log an error (and still
continue returning an error).
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Ian Campbell
---
tools/libxl/libxl.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index c0e9
The check is superflous. If the 'max_vcpus' (argument
value) is greater than pCPU and --ignore-host has not
been supplied we would print an warning and return
and not call this code.
If the --ignore-host parameter had been used we would
never end up in this condition and enforce 'max_vcpus'.
The
We have a check to warn the user if they are overcommitting.
But the check only checks the hosts CPU amount and does
not take into account the case when the user is trying to fix
the overcommit. That is - they want to limit the amount of
online VCPUs.
This fix allows the user to offline vCPUs with
And use that for all of its callers in the tree.
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Ian Campbell
---
tools/libxl/libxl.c | 19 +++
tools/libxl/libxl.h | 9 -
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_cmdimpl.c| 4 ++--
4 files c
There is no sense in trying to online (or offline) CPUs when the size of
cpumap is greater than the maximum number of VCPUs the guest can go to.
As such fail the operation if the count of CPUs to online is greater
than what the guest started with. For the offline case we do not
check (as the bits
Hey Ian,
Since v4:
[http://lists.xenproject.org/archives/html/xen-devel/2015-03/msg03737.html]
- Squashed libxl__check_max in libxl_set_vcpuonline
- Added Acked-by
In v3 [http://lists.xen.org/archives/html/xen-devel/2015-03/msg02822.html]
- Constify the libxl_dominfo and handle libxl_domain_in
The function does not return any values at all. Convert the
internal libxl errors (ERROR_FAIL, ..., etc) to 1.
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Ian Campbell
---
tools/libxl/xl_cmdimpl.c | 17 +
1 file changed, 9 insertions(+), 8 deletions(-)
diff --git a/tools/lib
On Tue, Mar 31, 2015 at 12:31:34PM +0100, George Dunlap wrote:
> On 03/24/2015 03:39 PM, Konrad Rzeszutek Wilk wrote:
> > Instead of just using -c 0x we can
> > also use -c - or -c ,
> > or a combination of them. Also it can include just
> > singular CPUs: -c , or ranges without an
> > start or end
flight 50308 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50308/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 9 guest-start fail REGR. vs. 50277
Tests which did not succe
flight 50307 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50307/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 14 guest-localmigrate/x10 fail REGR. vs. 36764
test-amd64-i386-freebsd10-i3
Could you, please, point to the most recent commit in
https://git.openstack.org/cgit/openstack/nova/
for which procedure described in
http://wiki.xen.org/wiki/OpenStack_via_DevStack
provide an ability to launch nova instances via horizion or nova CLI.
I am aware of bug https://bugs.launc
From: Iurii Konovalenko
On some platforms IRQ number can be greater then 255, so
greater size for IRQ is needed to avoid overflow for some
structure fileds and paramters. It concerns
XEN_DOMCTL_irq_permission and IRQ pssthrough API functions.
---
tools/libxc/include/xenctrl.h | 10 +-
to
On Tue, Mar 31, 2015 at 04:57:51PM +0100, Ian Campbell wrote:
> On Mon, 2015-03-30 at 11:26 -0400, Konrad Rzeszutek Wilk wrote:
> > There is no sense in trying to online (or offline) CPUs when the size of
> > cpumap is greater than the maximum number of VCPUs the guest can go to.
> >
> > As such f
flight 50306 qemu-upstream-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50306/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-localmigrate/x10 fail REGR. vs.
50274
Reg
On Thu, 2015-04-02 at 15:34 -0400, Konrad Rzeszutek Wilk wrote:
> On Thu, Apr 02, 2015 at 11:38:16AM -0600, Linda Jacobson wrote:
> > --- a/tools/libxl/libxl_utils.c
> > +++ b/tools/libxl/libxl_utils.c
> > +goto out;
> > +}
> > +
> > +for (int bit = 0; bit < (size * 8); bit++)
>
>
On Fri, 2015-04-03 at 07:48 -0600, Linda wrote:
> Dario,
>
Hi,
One thing: here in the ML, please, don't top post.
> I like your comments on naming. We'll see what others say.
> As far as difference, at least as I've implemented it, it's the
> exclusive or.
>
Well, then I'd call it lib
Hey David and Boris,
Please see the two patches - the first one fixes an situation that
the original XSA-120 patch hadn't considered.
The second patch is more of just a cleanup. Can be 4.1 material.
drivers/xen/xen-pciback/pciback_ops.c | 4
1 file changed, 4 deletions(-)
Konrad Rzeszutek
There is no need for this.
Signed-off-by: Konrad Rzeszutek Wilk
---
drivers/xen/xen-pciback/pciback_ops.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/drivers/xen/xen-pciback/pciback_ops.c
b/drivers/xen/xen-pciback/pciback_ops.c
index 26e6513..a131733 100644
--- a/drivers/xen/xen-pcibac
There is no need for this at all. Worst it means that if
the guest tries to write to BARs it could lead (on certain
platforms) to PCI SERR errors.
Please note that with af6fc858a35b90e89ea7a7ee58e66628c55c776b
"xen-pciback: limit guest control of command register"
a guest is still allowed to enabl
Hi,
At 20:46 +0100 on 02 Apr (1428007593), Andrew Cooper wrote:
> On 02/04/15 11:26, Roger Pau Monne wrote:
> > When the caller of paging_log_dirty_op is a hvm guest Xen would choke when
> > trying to copy the dirty bitmap to the guest because the paging lock is
> > already held.
>
> Are you sure
Dario,
I like your comments on naming. We'll see what others say.
As far as difference, at least as I've implemented it, it's the
exclusive or.
To all,
I've been thinking about Konrad's comment that we should disallow
bitmaps of unequal size, in the XOR/difference function. I've
i
On Fri, Apr 03, 2015 at 02:00:24AM +, Wu, Feng wrote:
>
>
> > -Original Message-
> > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> > Sent: Friday, April 03, 2015 3:15 AM
> > To: Tian, Kevin
> > Cc: Wu, Feng; Zhang, Yang Z; xen-devel@lists.xen.org; k...@xen.org;
> > jbe
On Thu, Apr 02, 2015 at 09:48:34PM +0200, Peter Zijlstra wrote:
> @@ -158,20 +257,20 @@ static void pv_wait_head(struct qspinloc
> void __pv_queue_spin_unlock(struct qspinlock *lock)
> {
> struct __qspinlock *l = (void *)lock;
> + struct pv_hash_bucket *hb;
>
> if (xchg(&l->lock
On 03/04/2015 14:40, Iurii Konovalenko wrote:
Hi, Ian! Hi, Julien!
Hi Iurii,
Thank you for your replies.
On Thu, Apr 2, 2015 at 6:19 PM, Ian Campbell mailto:ian.campb...@citrix.com>> wrote:
> Please can you give some example of this?
On Thu, Apr 2, 2015 at 6:34 PM, Julien Grall mailto:jul
Hi Ian,
On 31/03/2015 12:07, Ian Campbell wrote:
Reference the bit which enables the trap and the section/page which
describes what that bit enables.
These ones are pretty trivial, included for completeness.
Signed-off-by: Ian Campbell
---
xen/arch/arm/traps.c | 17 +
1 f
Hi Ian,
On 31/03/2015 12:07, Ian Campbell wrote:
Removes a load of boiler plate.
Signed-off-by: Ian Campbell
---
xen/arch/arm/traps.c | 65 +-
1 file changed, 32 insertions(+), 33 deletions(-)
diff --git a/xen/arch/arm/traps.c b/xen/arch/ar
Hi Ian,
On 31/03/2015 12:07, Ian Campbell wrote:
Signed-off-by: Ian Campbell
---
xen/arch/arm/traps.c | 52 --
1 file changed, 33 insertions(+), 19 deletions(-)
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 8b1846a..ebc09f9
Hi, Ian! Hi, Julien!
Thank you for your replies.
On Thu, Apr 2, 2015 at 6:19 PM, Ian Campbell
wrote:
> Please can you give some example of this?
On Thu, Apr 2, 2015 at 6:34 PM, Julien Grall
wrote:
> Can you give an example of files/structures using uint8_t for IRQ?
As Julien wrote, it is relate
flight 50291 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50291/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 11 guest-localmigrate fail REGR. vs. 36514
test-amd64-i386-free
Thank you a lot Tim.Your Method which consist of using shadow page
table help me.
However when I use the method shadow_blow_tables() I don't think it
makes all page unavailable.
because the the number of page fault (I get it from sh_page_fault) does
not seem to increase.
when shadow_blow_table
From: Arnd Bergmann
Use pci_scan_root_bus() instead of deprecated function
pci_scan_bus_parented().
Signed-off-by: Arnd Bergmann
Signed-off-by: Yijing Wang
CC: Konrad Rzeszutek Wilk
CC: xen-de...@lists.xenproject.org
---
drivers/pci/xen-pcifront.c | 16 +---
1 files changed, 13
On Thu, 2015-04-02 at 11:38 -0600, Linda Jacobson wrote:
> From: Linda
>
> Added bitmap functions for union intersection and difference betweenn two
> bitmaps
>
Just wondering, about union and intersection, are them the best names
for these operations, or do we want libxl_bitmap_or() and
libxl_
flight 50290 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50290/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 13 guest-localmigrate.2fail REGR. vs. 36709
Regressions which a
> From: Wu, Feng
> Sent: Thursday, April 02, 2015 4:03 PM
>
>
>
> > -Original Message-
> > From: Tian, Kevin
> > Sent: Thursday, April 02, 2015 2:50 PM
> > To: Wu, Feng; xen-devel@lists.xen.org
> > Cc: jbeul...@suse.com; k...@xen.org; Zhang, Yang Z
> > Subject: RE: [RFC v1 08/15] Update
> From: Tim Deegan [mailto:t...@xen.org]
> Sent: Thursday, March 26, 2015 7:10 PM
>
> Hi, VMX maintainers,
>
> I was looking at the nested EPT code while following up on Ed's email
> about altp2m design, and I can't see where nested-EPT entries get
> removed when a host EPT entry is removed/chang
56 matches
Mail list logo