Olaf Hering wrote:
> Both attach and detach functions get called only if the type matches.
>
> Signed-off-by: Olaf Hering
> Cc: Jim Fehlig
> ---
> src/libxl/libxl_driver.c | 6 --
> 1 file changed, 6 deletions(-)
>
ACK. I think callers will always check the hostdev's subsys->type,
calli
Olaf Hering wrote:
> Rearrange code so that the local variable is always initialized and
> disposed.
>
> Signed-off-by: Olaf Hering
> Cc: Jim Fehlig
> ---
> src/libxl/libxl_driver.c | 11 +++
> 1 file changed, 7 insertions(+), 4 deletions(-)
>
ACK and pushed.
Regards,
Jim
> diff --
Olaf Hering wrote:
> On Fri, Apr 17, Olaf Hering wrote:
>
>
>> If the domU configu has sdl enabled libvirtd crashes:
>> libvirtd[5158]: libvirtd: libxl.c:343: libxl_defbool_val: Assertion
>> `!libxl_defbool_is_default(db)' failed.
>>
>> Initialize the relevant defbool variables in libxl_device_
The '/noexit' parameter will inhibit Xen in calling ExitBootServices.
That helps with some platforms with GetNextVariableName which
cannot deal running in 1-1 mode and having BootSevices being disabled.
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/common/efi/boot.c | 10 --
1 file chang
Hey Andrew, Olaf, and Jan,
Please see the three patches for various work-arounds. The:
[PATCH v1 1/3] EFI/early: Add /noexit to inhibit calling
[PATCH v1 2/3] EFI/early: Add /map to map EfiBootServicesData and
Are when running xen.efi from an Shell (or using efibootmgr and passing
the parameter
For example on Dell machines we see:
(XEN) 0fed18000-0fed19fff type=11 attr=8000
(XEN) Unknown cachability for MFNs 0xfed18-0xfed19
Lets allow them to be mapped as WB.
We also alter the 'efi-rs' to be 'efi=rs' or 'efi=no-rs'.
Signed-off-by: Konrad Rzeszutek Wilk
---
docs/
To help on certain platforms to run.
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/arch/x86/efi/efi-boot.h | 10 --
xen/common/efi/boot.c | 28 +++-
xen/common/efi/efi.h| 2 +-
xen/common/efi/runtime.c| 1 +
4 files changed, 33 insertions(+), 8
Olaf Hering wrote:
> On Fri, Apr 17, Jim Fehlig wrote:
>
>
>> On 04/17/2015 11:19 AM, Olaf Hering wrote:
>>
>>> +libxl_defbool_set(&x_vfb->vnc.enable, 0);
>>>
>> Not shown here, but just before the switch is
>>
>> libxl_device_vfb_init(x_vfb);
>>
>> which IIUC (looki
=
CALL FOR PAPERS
10th Workshop on Virtualization in High-Performance Cloud Computing (VHPC
'15)
held in conjunction with Euro-Par 2015, August 24-28, Vienna, Austria
(Springer LNCS)
===
Michal Privoznik wrote:
> Like in previous commit, lets use FindByUUID() instead of
> ListFindByID(). The latter is suboptimal as it needs to iterate over
> each item in the domain object list, lock it and compare the IDs. If
> an object is already locked, we must wait until it's unlocked. During
>
Provide a separate (second) version of the spin_lock_slowpath for
paravirt along with a special unlock path.
The second slowpath is generated by adding a few pv hooks to the
normal slowpath, but where those will compile away for the native
case, they expand into special wait/wake code for the pv v
From: Peter Zijlstra (Intel)
When we detect a hypervisor (!paravirt, see qspinlock paravirt support
patches), revert to a simple test-and-set lock to avoid the horrors
of queue preemption.
Signed-off-by: Peter Zijlstra (Intel)
Signed-off-by: Waiman Long
---
arch/x86/include/asm/qspinlock.h |
This patch enables the accumulation of PV qspinlock statistics
when either one of the following three sets of CONFIG parameters
are enabled:
1) CONFIG_LOCK_STAT && CONFIG_DEBUG_FS
2) CONFIG_KVM_DEBUG_FS
3) CONFIG_XEN_DEBUG_FS
The accumulated lock statistics will be reported in debugfs under th
Before this patch, a CPU may have been kicked twice before getting
the lock - one before it becomes queue head and once before it gets
the lock. All these CPU kicking and halting (VMEXIT) can be expensive
and slow down system performance, especially in an overcommitted guest.
This patch adds a new
From: David Vrabel
This patch adds the necessary Xen specific code to allow Xen to
support the CPU halting and kicking operations needed by the queue
spinlock PV code.
Signed-off-by: David Vrabel
Signed-off-by: Waiman Long
---
arch/x86/xen/spinlock.c | 64 +++
From: Peter Zijlstra (Intel)
When we allow for a max NR_CPUS < 2^14 we can optimize the pending
wait-acquire and the xchg_tail() operations.
By growing the pending bit to a byte, we reduce the tail to 16bit.
This means we can use xchg16 for the tail part and do away with all
the repeated compxch
This is a preparatory patch that extracts out the following 2 code
snippets to prepare for the next performance optimization patch.
1) the logic for the exchange of new and previous tail code words
into a new xchg_tail() function.
2) the logic for clearing the pending bit and setting the loc
This patch introduces a new generic queue spinlock implementation that
can serve as an alternative to the default ticket spinlock. Compared
with the ticket spinlock, this queue spinlock should be almost as fair
as the ticket spinlock. It has about the same speed in single-thread
and it can be much
v15->v16:
- Remove the lfsr patch and use linear probing as lfsr is not really
necessary in most cases.
- Move the paravirt PV_CALLEE_SAVE_REGS_THUNK code to an asm header.
- Add a patch to collect PV qspinlock statistics which also
supersedes the PV lock hash debug patch.
- Add PV qspinl
From: Peter Zijlstra (Intel)
We use the regular paravirt call patching to switch between:
native_queue_spin_lock_slowpath() __pv_queue_spin_lock_slowpath()
native_queue_spin_unlock()__pv_queue_spin_unlock()
We use a callee saved call for the unlock function which reduces the
This patch makes the necessary changes at the x86 architecture
specific layer to enable the use of queue spinlock for x86-64. As
x86-32 machines are typically not multi-socket. The benefit of queue
spinlock may not be apparent. So queue spinlock is not enabled.
Currently, there is some incompatibi
This patch adds the necessary KVM specific code to allow KVM to
support the CPU halting and kicking operations needed by the queue
spinlock PV code.
Signed-off-by: Waiman Long
---
arch/x86/kernel/kvm.c | 43 +++
kernel/Kconfig.locks |2 +-
2 files c
Currently, atomic_cmpxchg() is used to get the lock. However, this
is not really necessary if there is more than one task in the queue
and the queue head don't need to reset the tail code. For that case,
a simple write to set the lock bit is enough as the queue head will
be the only one eligible to
In the pv_scan_next() function, the slow cmpxchg atomic operation is
performed even if the other CPU is not even close to being halted. This
extra cmpxchg can harm slowpath performance.
This patch introduces the new mayhalt flag to indicate if the other
spinning CPU is close to being halted or not
From: Peter Zijlstra (Intel)
Because the qspinlock needs to touch a second cacheline (the per-cpu
mcs_nodes[]); add a pending bit and allow a single in-word spinner
before we punt to the second cacheline.
It is possible so observe the pending bit without the locked bit when
the last owner has ju
Ping..
Thanks,
Feng
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, April 13, 2015 5:13 AM
> To: Wu, Feng
> Cc: Tian, Kevin; Zhang, Yang Z; xen-devel@lists.xen.org; k...@xen.org
> Subject: RE: [RFC v1 00/15] Add VT-d Posted-Interrupts support
>
> >>> O
On 04/24/2015 10:09 AM, Boris Ostrovsky wrote:
On 04/24/2015 03:19 AM, Jan Beulich wrote:
On 24.04.15 at 00:20, wrote:
On 04/21/2015 03:01 AM, Jan Beulich wrote:
+ ((++dev_cnt > 0x3f) && hypercall_preempt_check()) )
+break;
+}
+
+if ( (!ret ||
flight 51929 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/51929/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 15 guest-localmigrate.2 fail REGR. vs. 36656
test-amd64-i386-freebsd10
On 24/04/15 17:21, Paul Durrant wrote:
> Some parameters can only (validly) be set once. Some cannot be set
> by a guest for its own domain. Consolidate these checks, along with
> the XSM check, in a new hvm_allow_set_param() function for clarity.
>
> Also, introduce hvm_allow_get_param() for simil
On 24/04/15 17:21, Paul Durrant wrote:
> The level of switch nesting in those ops is getting unreadable. Giving
> them their own functions does introduce some code duplication in the
> the pre-op checks but the overall result is easier to follow.
>
> This patch is code movement. There is no functio
> On 24 Apr 2015, at 16:22, Lars Kurth wrote:
>
>
>> On 22 Apr 2015, at 14:04, Ian Jackson wrote:
>>
>> Lars Kurth writes ("Re: Archiving Xen on ARM and PVOPS subprojects"):
>>> Any other votes by committers (in the TO list) before I tally the votes?
>>
>> +1 to both.
>
> We had several +1'
Some parameters can only (validly) be set once. Some cannot be set
by a guest for its own domain. Consolidate these checks, along with
the XSM check, in a new hvm_allow_set_param() function for clarity.
Also, introduce hvm_allow_get_param() for similar reasons.
Signed-off-by: Paul Durrant
Cc: Ke
The level of switch nesting in those ops is getting unreadable. Giving
them their own functions does introduce some code duplication in the
the pre-op checks but the overall result is easier to follow.
This patch is code movement. There is no functional change.
Signed-off-by: Paul Durrant
Cc: Ke
On 25/04/2015 00:15, Konrad Rzeszutek Wilk wrote
> On Fri, Apr 24, 2015 at 03:42:40PM +, Wang, Wei W wrote:
> > On 24/04/2015 23:04, Jan Beulich wrote
> > > >>> On 24.04.15 at 16:56, wrote:
> > > > On 24/04/2015 20:57, Jan Beulich wrote
> > > >> I'm not sure how else to express what I want (n
The subject line should obviously be prefixed [PATCH 0/3], but the content is
at least correct.
Apologies for that,
Paul
> -Original Message-
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: 24 April 2015 17:21
> To: xen-de...@lists.xenproject.org
> Cc: Paul Durrant
> Sub
A guest has no need to touch these parameters and reading
HVM_PARAM_IOREQ_PFN, HVM_PARAM_BUFIOREQ_PFN, or HVM_PARAM_BUFIOREQ_EVTCHN
may cause Xen to create a default ioreq server where one did not already
exist.
Signed-off-by: Paul Durrant
Cc: Keir Fraser
Cc: Jan Beulich
Cc: Andrew Cooper
---
The following 3 patches re-structure the code implementing HVMOP_set_param
and HVMOP_get_param.
Patch #1 gives each operation its own function
Patch #2 splits out checks for getting/setting non-reflexive params and
setting params with change-once semantics, as well as the XSM check into
separate
On 24/04/2015 23:54, Jan Beulich wrote
> >>> On 24.04.15 at 17:42, wrote:
> > On 24/04/2015 23:04, Jan Beulich wrote
> >> >>> On 24.04.15 at 16:56, wrote:
> >> > On 24/04/2015 20:57, Jan Beulich wrote
> >> >> I'm not sure how else to express what I want (no matter how many
> >> >> internal govern
On Fri, Apr 24, 2015 at 03:42:40PM +, Wang, Wei W wrote:
> On 24/04/2015 23:04, Jan Beulich wrote
> > >>> On 24.04.15 at 16:56, wrote:
> > > On 24/04/2015 20:57, Jan Beulich wrote
> > >> I'm not sure how else to express what I want (no matter how many
> > >> internal governors the intel_pstate
On Fri, Apr 24, 2015 at 03:31:53PM +0100, Stefano Stabellini wrote:
> On Fri, 24 Apr 2015, Konrad Rzeszutek Wilk wrote:
> > On Fri, Apr 24, 2015 at 10:16:40AM +0100, Stefano Stabellini wrote:
> > > Make sure that xen_swiotlb_init allocates buffers that are DMA capable
> > > when at least one memblo
Both attach and detach functions get called only if the type matches.
Signed-off-by: Olaf Hering
Cc: Jim Fehlig
---
src/libxl/libxl_driver.c | 6 --
1 file changed, 6 deletions(-)
diff --git a/src/libxl/libxl_driver.c b/src/libxl/libxl_driver.c
index d76efda..f915f91 100644
--- a/src/libxl
>>> On 24.04.15 at 17:54, wrote:
> On 24/04/15 16:07, Jan Beulich wrote:
> On 24.04.15 at 16:57, wrote:
>>> On 24/04/15 15:31, Jan Beulich wrote:
Xen L4 entries being uniformly installed into any L4 table and 64-bit
PV kernels running in ring 3 means that user mode was able to see t
Rearrange code so that the local variable is always initialized and
disposed.
Signed-off-by: Olaf Hering
Cc: Jim Fehlig
---
src/libxl/libxl_driver.c | 11 +++
1 file changed, 7 insertions(+), 4 deletions(-)
diff --git a/src/libxl/libxl_driver.c b/src/libxl/libxl_driver.c
index 393f8bd.
On 24/04/15 16:07, Jan Beulich wrote:
On 24.04.15 at 16:57, wrote:
>> On 24/04/15 15:31, Jan Beulich wrote:
>>> Xen L4 entries being uniformly installed into any L4 table and 64-bit
>>> PV kernels running in ring 3 means that user mode was able to see the
>>> read-only M2P presented by Xen to
>>> On 24.04.15 at 17:42, wrote:
> On 24/04/2015 23:04, Jan Beulich wrote
>> >>> On 24.04.15 at 16:56, wrote:
>> > On 24/04/2015 20:57, Jan Beulich wrote
>> >> I'm not sure how else to express what I want (no matter how many
>> >> internal governors the intel_pstate driver has).
>> >>
>> >> xenpm
Signed-off-by: Stefano Stabellini
---
ap-common |5 +++
mfi-common | 19 ++
sg-run-job |5 +++
ts-raisin-build | 104 +++
4 files changed, 133 insertions(+)
create mode 100755 ts-raisin-build
diff --git a/ap-
On 24/04/2015 23:04, Jan Beulich wrote
> >>> On 24.04.15 at 16:56, wrote:
> > On 24/04/2015 20:57, Jan Beulich wrote
> >> I'm not sure how else to express what I want (no matter how many
> >> internal governors the intel_pstate driver has).
> >>
> >> xenpm set-scaling-governor powersave
> >> xenpm
On 24/04/15 12:26, Benoit L'hoest wrote:
Hello,
I'm a student in computer science, during my internship i have to go
and explore multipathing solution for several hypervisor.
I'm looking into MPTCP (multi-path TCP) this is a extension of TCP
protocols that allows to aggregate the bandwith of sev
>>> On 23.04.15 at 11:55, wrote:
> On context switch, write the the domain's Class of Service(COS) to MSR
> IA32_PQR_ASSOC, to notify hardware to use the new COS.
>
> For performance reason, the COS mask for current cpu is also cached in
> the local per-CPU variable.
>
> Signed-off-by: Chao Peng
>>> On 23.04.15 at 11:55, wrote:
> Changes in v5:
> * Add spin_lock to protect cbm_map.
> * Add spin_lock to read path aswell.
I don't think the second bullet point is true - there's only a single
spin_lock() invocation being added here afaics.
Jan
_
>>> On 23.04.15 at 11:55, wrote:
> +int psr_set_l3_cbm(struct domain *d, unsigned int socket, uint64_t cbm)
> +{
> +unsigned int old_cos, cos;
> +struct psr_cat_cbm *map, *find;
I think the variable would better be named found and ...
> +struct psr_cat_socket_info *info;
> +int r
> On 22 Apr 2015, at 14:04, Ian Jackson wrote:
>
> Lars Kurth writes ("Re: Archiving Xen on ARM and PVOPS subprojects"):
>> Any other votes by committers (in the TO list) before I tally the votes?
>
> +1 to both.
We had several +1's and no -1's. So this vote carries
Lars
>>> On 23.04.15 at 11:55, wrote:
> --- a/xen/arch/x86/sysctl.c
> +++ b/xen/arch/x86/sysctl.c
> @@ -171,6 +171,24 @@ long arch_do_sysctl(
>
> break;
>
> +case XEN_SYSCTL_psr_cat_op:
> +switch ( sysctl->u.psr_cat_op.cmd )
> +{
> +case XEN_SYSCTL_PSR_CAT_get_l
>>> On 24.04.15 at 16:57, wrote:
> On 24/04/15 15:31, Jan Beulich wrote:
>> Xen L4 entries being uniformly installed into any L4 table and 64-bit
>> PV kernels running in ring 3 means that user mode was able to see the
>> read-only M2P presented by Xen to the guests. While apparently not
>> really
>>> On 24.04.15 at 16:56, wrote:
> On 24/04/2015 20:57, Jan Beulich wrote
>> I'm not sure how else to express what I want (no matter how many internal
>> governors the intel_pstate driver has).
>>
>> xenpm set-scaling-governor powersave
>> xenpm set-scaling-governor ondemand
>> xenpm set-scaling-
>>> On 23.04.15 at 11:55, wrote:
> struct psr_cmt *__read_mostly psr_cmt;
> +
> +static unsigned long __read_mostly * cat_socket_init_bitmap;
> +static unsigned long __read_mostly * cat_socket_enable_bitmap;
> +static struct psr_cat_socket_info *__read_mostly cat_socket_info;
So the last line lo
On 24/04/15 15:31, Jan Beulich wrote:
> Xen L4 entries being uniformly installed into any L4 table and 64-bit
> PV kernels running in ring 3 means that user mode was able to see the
> read-only M2P presented by Xen to the guests. While apparently not
> really representing an exploitable information
On 24/04/2015 20:57, Jan Beulich wrote
> >>> On 24.04.15 at 13:53, wrote:
> > On 24/04/2015 18:20, Jan Beulich wrote
> >> >>> On 24.04.15 at 12:07, wrote:
> >> > On 24/04/2015 17:56, Jan Beulich wrote:
> >> >> >>> On 24.04.15 at 11:46, wrote:
> >> >> > On 24/04/2015 17:11, Jan Beulich wrote:
> >
>>> On 23.04.15 at 11:55, wrote:
> @@ -301,6 +304,8 @@ static void set_cpu_sibling_map(int cpu)
> }
> }
> }
> +
> +cpumask_set_cpu(cpu, &socket_to_cpumask[cpu_to_socket(cpu)]);
> }
There is an early return path in this function, which you need to
deal with.
> @@ -
On Fri, 24 Apr 2015, Konrad Rzeszutek Wilk wrote:
> On Fri, Apr 24, 2015 at 10:16:40AM +0100, Stefano Stabellini wrote:
> > Make sure that xen_swiotlb_init allocates buffers that are DMA capable
> > when at least one memblock is available below 4G. Otherwise we assume
> > that all devices on the So
>>> On 24.04.15 at 10:19, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -64,6 +64,36 @@ integer_param("ple_gap", ple_gap);
> static unsigned int __read_mostly ple_window = 4096;
> integer_param("ple_window", ple_window);
>
> +static bool_t __read_mostly op
Xen L4 entries being uniformly installed into any L4 table and 64-bit
PV kernels running in ring 3 means that user mode was able to see the
read-only M2P presented by Xen to the guests. While apparently not
really representing an exploitable information leak, this still very
certainly was never mea
Friday, April 24, 2015, 4:12:42 PM, you wrote:
On 24.04.15 at 16:05, wrote:
>> I see you commited "AMD IOMMU: only translate remapped IO-APIC RTEs" to
>> staging,
>> any reason why your patch in
>> http://lists.xen.org/archives/html/xen-devel/2015-04/msg02253.html
>> isn't commited yet ?
>>> On 24.04.15 at 16:05, wrote:
> I see you commited "AMD IOMMU: only translate remapped IO-APIC RTEs" to
> staging,
> any reason why your patch in
> http://lists.xen.org/archives/html/xen-devel/2015-04/msg02253.html
> isn't commited yet ?
>
> (still waiting for an formal ack from someone ? a
On 04/24/2015 03:19 AM, Jan Beulich wrote:
On 24.04.15 at 00:20, wrote:
On 04/21/2015 03:01 AM, Jan Beulich wrote:
+ ((++dev_cnt > 0x3f) && hypercall_preempt_check()) )
+break;
+}
+
+if ( (!ret || (ret == -ENODEV)) &&
+ __copy_field_
Friday, April 24, 2015, 12:12:32 AM, you wrote:
> On 4/23/15, 12:59, "Sander Eikelenboom" wrote:
>>
>>> On 4/23/15, 08:47, "Jan Beulich" wrote:
>>
>>> On 23.04.15 at 15:31, wrote:
>
> On 4/17/15, 10:27, "Jan Beulich" wrote:
>
>>1aeb1156fa ("x86 don't change affin
On Fri, Apr 24, 2015 at 02:02:36PM +0200, Sander Eikelenboom wrote:
> Hi,
>
> On Xen-unstable I encountered this non stopping logspam while trying to
> shutdown an HVM domain with
> pci-passthrough:
>
> (XEN) [2015-04-24 11:55:47.802] io.c:164:d25v0 Weird HVM ioemulation status 1.
> (XEN) [201
On Fri, Apr 24, 2015 at 10:16:40AM +0100, Stefano Stabellini wrote:
> Make sure that xen_swiotlb_init allocates buffers that are DMA capable
> when at least one memblock is available below 4G. Otherwise we assume
> that all devices on the SoC can cope with >4G addresses. We do this on
> ARM and ARM
>>> On 24.04.15 at 13:53, wrote:
> On 24/04/2015 18:20, Jan Beulich wrote
>> >>> On 24.04.15 at 12:07, wrote:
>> > On 24/04/2015 17:56, Jan Beulich wrote:
>> >> >>> On 24.04.15 at 11:46, wrote:
>> >> > On 24/04/2015 17:11, Jan Beulich wrote:
>> >> >> >>> On 24.04.15 at 10:32, wrote:
>> >> >> I
>>> On 24.04.15 at 12:21, wrote:
> On 24/04/15 10:50, Jan Beulich wrote:
> On 24.04.15 at 11:09, wrote:
>>> On 23/04/15 17:11, Jan Beulich wrote:
>>> On 22.04.15 at 18:00, wrote:
> --- a/xen/include/xen/grant_table.h
> +++ b/xen/include/xen/grant_table.h
> @@ -60,6 +60,8 @@ s
On Fri, Apr 24, Sander Eikelenboom wrote:
> (XEN) [2015-04-24 11:55:47.802] domain_crash called from io.c:165
> Since i haven't seen it before, it's probably hard to replicate.
I see it all time on my beloved ProBook. With an ordinary domU.cfg.
name="fv-13.1-pvscsi"
uuid="4ff34139-8381-4f3b-8c3
Hi,
On Xen-unstable I encountered this non stopping logspam while trying to
shutdown an HVM domain with
pci-passthrough:
(XEN) [2015-04-24 11:55:47.802] io.c:164:d25v0 Weird HVM ioemulation status 1.
(XEN) [2015-04-24 11:55:47.802] domain_crash called from io.c:165
(XEN) [2015-04-24 11:55:47.8
On 24/04/2015 18:20, Jan Beulich wrote
> >>> On 24.04.15 at 12:07, wrote:
> > On 24/04/2015 17:56, Jan Beulich wrote:
> >> >>> On 24.04.15 at 11:46, wrote:
> >> > On 24/04/2015 17:11, Jan Beulich wrote:
> >> >> >>> On 24.04.15 at 10:32, wrote:
> >> >> I think at the very least from a user interf
Hello,
I'm a student in computer science, during my internship i have to go
and explore multipathing solution for several hypervisor.
I'm looking into MPTCP (multi-path TCP) this is a extension of TCP
protocols that allows to aggregate the bandwith of several connection.
I'd like tu use MPTCP to a
In old X-Gene Storm firmware and DT, secure mode addresses have been
mentioned in GICv2 node. In this case maintenance interrupt is used
instead of EOI HW method.
This patch checks the GIC Distributor Base Address to enable EOI quirk
for old firmware.
Ref:
http://lists.xen.org/archives/html/xen-d
On 24/04/15 09:19, Kai Huang wrote:
> A top level EPT parameter "ept=" and a sub boolean "opt_pml_enabled"
> are added to control PML. Other booleans can be further added for any other
> EPT
> related features.
>
> The document description for the new parameter is also added.
>
> Signed-off-by: Ka
On 24/04/15 11:25, Olaf Hering wrote:
> The result of this command:
> git grep -wnl MANDIR | xargs sed -i 's@MANDIR@mandir@g'
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
In some copious free time during a docs day, we should see
The result of this command:
git grep -wnl SBINDIR | xargs sed -i 's@SBINDIR@sbindir@g'
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Mukesh Rathor
Cc: Tim Deegan
Cc: Daniel De Graaf
Cc: David Scott
---
Config.mk
Only qemu-traditional expects PREFIX in environment, which is provided
by buildmakevars2shellvars.
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Config.mk | 6 +++---
config/Paths.mk.in | 2 --
2 files changed, 3 insertions(+), 5
The result of this command:
git grep -wnl DOCDIR | xargs sed -i 's@DOCDIR@docdir@g'
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Samuel Thibault
---
config/Paths.mk.in| 1 -
docs/Makefile | 4 ++--
stubdom/Makefile | 4
The result of this command:
git grep -wnl MANDIR | xargs sed -i 's@MANDIR@mandir@g'
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
config/Paths.mk.in | 5 ++---
docs/Makefile | 6 +++---
2 files changed, 5 insertions(+), 6 deletions(-
The result of this command:
git grep -wnl LIBDIR | xargs sed -i 's@LIBDIR@libdir@g'
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Config.mk| 4 ++--
config/Paths.mk.in | 1 -
Replace all private variables in Makefiles with automake variables.
This series is based on 92ff75384bce7a11e27fbfaf0c531e88dd1ab4c7.
Olaf
Olaf Hering (7):
tools: replace private SBINDIR with automake sbindir
tools: replace private BINDIR with automake bindir
tools: replace private PREFIX w
The result of this command:
git grep -wnl INCLUDEDIR | xargs sed -i 's@INCLUDEDIR@includedir@g'
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
config/Paths.mk.in| 1 -
tools/Makefile| 14 +++---
The result of this command:
git grep -wnl BINDIR | xargs sed -i 's@BINDIR@bindir@g'
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: George Dunlap
---
Config.mk| 2 +-
config/Paths.mk.in
On 24/04/15 10:50, Jan Beulich wrote:
On 24.04.15 at 11:09, wrote:
>> On 23/04/15 17:11, Jan Beulich wrote:
>> On 22.04.15 at 18:00, wrote:
--- a/xen/include/xen/grant_table.h
+++ b/xen/include/xen/grant_table.h
@@ -60,6 +60,8 @@ struct grant_mapping {
u32 r
>>> On 24.04.15 at 12:07, wrote:
> On 24/04/2015 17:56, Jan Beulich wrote:
>> >>> On 24.04.15 at 11:46, wrote:
>> > On 24/04/2015 17:11, Jan Beulich wrote:
>> >> >>> On 24.04.15 at 10:32, wrote:
>> >> > In the old driver, a powersave governor just sets the CPU to run
>> >> > with the lowest poss
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
standalone | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/standalone b/standalone
index d8113e4..17fa40c 100755
--- a/standalone
+++ b/standalone
@@ -41,7 +41,7 @@ Options:
-f FLIGHT, --flight=FLIGHTOperate on
On 24/04/2015 17:56, Jan Beulich wrote:
> >>> On 24.04.15 at 11:46, wrote:
> > On 24/04/2015 17:11, Jan Beulich wrote:
> >> >>> On 24.04.15 at 10:32, wrote:
> >> > In the old driver, a powersave governor just sets the CPU to run
> >> > with the lowest possible performance state. This one does not
flight 52054 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/52054/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
On 24/04/15 10:50, Jan Beulich wrote:
On 24.04.15 at 11:09, wrote:
>> On 23/04/15 17:11, Jan Beulich wrote:
>> On 22.04.15 at 18:00, wrote:
--- a/xen/include/xen/grant_table.h
+++ b/xen/include/xen/grant_table.h
@@ -60,6 +60,8 @@ struct grant_mapping {
u32 r
>>> On 24.04.15 at 11:46, wrote:
> On 24/04/2015 17:11, Jan Beulich wrote:
>> >>> On 24.04.15 at 10:32, wrote:
>> > In the old driver, a powersave governor just sets the CPU to run with
>> > the lowest possible performance state. This one does not exist in the
>> > intel_pstate driver.
>> > The i
>>> On 24.04.15 at 11:09, wrote:
> On 23/04/15 17:11, Jan Beulich wrote:
> On 22.04.15 at 18:00, wrote:
>>> --- a/xen/include/xen/grant_table.h
>>> +++ b/xen/include/xen/grant_table.h
>>> @@ -60,6 +60,8 @@ struct grant_mapping {
>>> u32 ref; /* grant ref */
>>> u16
On 24/04/2015 17:11, Jan Beulich wrote:
> >>> On 24.04.15 at 10:32, wrote:
> > On 23/04/2015 15:27, Jan Beulich wrote:
> >> >>> On 24.04.15 at 07:12, wrote:
> >> > On 23/04/2015 22:09, Jan Beulich wrote:
> >> >> >>> On 23.04.16 at 15:31, wrote:
> >> >> > The intel_pstate.c file under xen/arch/x8
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 24 April 2015 09:01
> To: Paul Durrant
> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
> Subject: Re: [PATCH 1/2] x86/hvm: actually release ioreq server pages
>
> >>> On 23.04.15 at 17:46, wrot
On Fri, Apr 24, 2015 at 11:16:00AM +0200, Olaf Hering wrote:
> On Fri, Apr 24, Olaf Hering wrote:
>
> > flexarray_append(back, "state");
> > -flexarray_append(back, GCSPRINTF("%d", 1));
> > +flexarray_append(back, GCSPRINTF("%d", XenbusStateInitialising));
>
> Should all such code be
On Fri, Apr 24, 2015 at 10:04:31AM +0100, Jan Beulich wrote:
> Prior to 1a09c5113a ("libxlu: rework internal representation of
> setting") empty lists in config files did get accepted. Restore that
> behavior.
>
> Signed-off-by: Jan Beulich
>
Thanks for the fix.
Acked-by: Wei Liu
___
Make sure that xen_swiotlb_init allocates buffers that are DMA capable
when at least one memblock is available below 4G. Otherwise we assume
that all devices on the SoC can cope with >4G addresses. We do this on
ARM and ARM64, where dom0 is mapped 1:1, so pfn == mfn in this case.
No functional cha
On Fri, Apr 24, 2015 at 09:07:14AM +, Olaf Hering wrote:
> Convert all plain ints and strings which are used for xenbus "state"
> files to xenbus_state. This makes it easier to find code which deals
> with backend/frontend state changes.
>
> Convert usage of libxl__sprintf to GCSPRINTF.
>
> N
On Fri, Apr 24, Olaf Hering wrote:
> flexarray_append(back, "state");
> -flexarray_append(back, GCSPRINTF("%d", 1));
> +flexarray_append(back, GCSPRINTF("%d", XenbusStateInitialising));
Should all such code be converted to flexarray_append_pair?
To reduce line length a short macro sh
1 - 100 of 126 matches
Mail list logo