On Thu, May 07, Ian Campbell wrote:
> On Thu, 2015-05-07 at 10:10 +0200, Olaf Hering wrote:
> > On Thu, May 07, Wei Liu wrote:
> >
> > > On Wed, May 06, 2015 at 07:08:44AM +, Olaf Hering wrote:
> > > > The current base directory /var/xen for domU dumps will be patched to
> > > > /var/lib/xen
Drop pointless casts and write_atomic()'s bogus and unused "return
value".
Signed-off-by: Jan Beulich
--- a/xen/include/asm-x86/atomic.h
+++ b/xen/include/asm-x86/atomic.h
@@ -17,12 +17,11 @@ static inline void name(volatile type *a
build_read_atomic(read_u8_atomic, "b", uint8_t, "=q", )
build
On Thu, May 07, 2015 at 10:29:55AM +0100, Ian Campbell wrote:
> On Thu, 2015-05-07 at 09:02 +0200, Laszlo Ersek wrote:
> > (Plus, you are cloning a git repo that may or may not be
> > identical to the (semi-)official edk2 git repo.)
>
> FWIW git://xenbits.xen.org/ovmf.git is a direct descendant of
On Thu, May 07, Andrew Cooper wrote:
> On 07/05/15 11:35, Olaf Hering wrote:
> > Result of "sed -i 's@[[:blank:]]\+$@@' tools/xentrace/xenalyze/xenalyze.c"
> >
> > Signed-off-by: Olaf Hering
> > Cc: Ian Jackson
> > Cc: Stefano Stabellini
> > Cc: Ian Campbell
> > Cc: Wei Liu
>
> Why not refre
On 05/07/2015 09:03 PM, Andrew Cooper wrote:
> In an effort to be architecture neutral, it might be an idea to have
> something like
>
> struct vm_event_write_cr {
> uint64_t index;
> uint64_t old_val, new_val;
> };
>
> And have a per-arch index of control registers, such as
>
> X86_CR0
On Fri, May 08, Wei Liu wrote:
> On Thu, May 07, 2015 at 10:35:42AM +, Olaf Hering wrote:
> > +void sched_class(struct record_info *ri)
> > +{
> > +}
> Huh, this does nothing? Is it because this is only a stub (you haven't
> got around to implement it) or it is supposed to be like this?
Whate
On Thu, May 07, George Dunlap wrote:
> On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> > To match the hypervisor default which was introduced in
> > 9da0c5b63933b9912e3903190601661813954d0d, bump the limit.
> >
> > Signed-off-by: Olaf Hering
> > Cc: Ian Jackson
> > Cc: Stefano Stabellini
Hello,
it appears the Linus master tree fails to build on ARM with XEN enabled.
Since commit 2b953a5e9 xen: Suspend ticks on all CPUs during suspend
provides the suspend function only for x86 this is not surprising.
I currently don't use XEN yet but building with XEN enabled was not a
problem i
On 7 May 2015 at 18:55, Boris Ostrovsky wrote:
> Commit 2b953a5e994c ("xen: Suspend ticks on all CPUs during suspend")
> introduced xen_arch_suspend() routine but did so only for x86, breaking
> ARM builds.
>
> We need to add it to ARM as well.
>
> Signed-off-by: Boris Ostrovsky
> Reported-by: Mi
$xenalyze --summary trace_file_discuz.bin
Using VMX hardware-assisted virtualization.
scan_for_new_pcpu: Activating pcpu 10 at offset 0
Creating vcpu 10 for dom 32768
scan_for_new_pcpu: Activating pcpu 21 at offset 42196
Creating vcpu 21 for dom 32768
scan_for_new_pcpu: Activating pcpu 22 at offse
Hello All,
When handle_incoming_queue (xen-netfront.c) calls checksum_setup()
the transport header didn't seem to be initialized yet.
skb_checksum_setup_ipv4 ends up initializing the checksum at incorrect offset.
if (recalculate)
*csum = ~csum_tcpudp_magic(ip_hdr(skb)->sad
On Thu, May 07, 2015 at 10:35:43AM +, Olaf Hering wrote:
> Result of "sed -i 's@[[:blank:]]\+$@@' tools/xentrace/xenalyze/xenalyze.c"
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: Wei Liu
___
On Thu, May 07, 2015 at 10:35:42AM +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
> ---
> tools/xentrace/xenalyze/xenalyze.c | 73
> ++
> 1 file changed, 66 insertions(+),
On Thu, May 07, 2015 at 10:35:41AM +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: Wei Liu
> ---
> tools/xentrace/xenalyze/xenalyze.c | 2 ++
> 1 file changed, 2 insertions(+)
>
> diff --git a/too
On Thu, May 07, 2015 at 10:35:40AM +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: Wei Liu
> ---
> tools/xentrace/xenalyze/xenalyze.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> di
On Thu, May 07, 2015 at 10:35:39AM +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: Wei Liu
> ---
> tools/xentrace/xenalyze/xenalyze.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> di
On Thu, May 07, 2015 at 10:35:38AM +, Olaf Hering wrote:
> To match the hypervisor default which was introduced in
> 9da0c5b63933b9912e3903190601661813954d0d, bump the limit.
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-
On 5/7/15 7:59 PM, Chen, Tiejun wrote:
Are you running IGD passthrough with guest OS?
Only as far as the PVH Xen kernel is passing through all hardware to
Dom0. Roger can elaborate as needed.
What is your CPU? BDW? HSW? And what is your FreeBSD Linux version on
Dom0 side? I just think you c
On Thu, May 07, 2015 at 05:45:22PM +0100, George Dunlap wrote:
> On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> > This merges xenalyze.hg, changeset 150:24308507be1d into
> > tools/xentrace/xenalyze to have the tool and public/trace.h in one
> > place.
> >
> > Signed-off-by: Olaf Hering
>
Hi Andrew,
On 05/07/2015 11:24 PM, Andrew Cooper wrote:
On 07/05/15 14:59, Hongyang Yang wrote:
On 05/07/2015 06:35 PM, Andrew Cooper wrote:
On 07/05/15 07:37, Yang Hongyang wrote:
Set the hvm param HVM_PARAM_IDENT_PT second time will fail.
So defer the setting of HVM_PARAM_IDENT_PT.
Signe
On 2015/5/8 2:58, Michael Dexter wrote:
Hello all,
Are you running IGD passthrough with guest OS?
On 5/6/15 7:47 PM, Chen, Tiejun wrote:
#1. Disable interrupt message generation
#2. Please add 'cpuidle=0 msi=1'
With another try, get the same with the patched kernel:
What is your CPU? B
flight 53720 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53720/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 6 xen-boot fail REGR. vs. 50329
test-armhf-armhf-xl-a
Campbell, Jackson, Wei and Stefano,
Any consideration?
I can follow up Jan's idea but I need you guys make sure I'm going to do
this properly.
Thanks
Tiejun
On 2015/5/7 10:22, Chen, Tiejun wrote:
On 2015/5/6 23:34, Jan Beulich wrote:
On 06.05.15 at 17:00, wrote:
On 2015/4/20 19:13, Jan B
flight 53719 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53719/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair15 debian-install/dst_host fail REGR. vs. 32769-bisect
test-amd64-amd64-xl
On 2015/5/7 14:04, Jan Beulich wrote:
"Chen, Tiejun" 05/07/15 4:22 AM >>>
On 2015/5/6 23:34, Jan Beulich wrote:
On 06.05.15 at 17:00, wrote:
On 2015/4/20 19:13, Jan Beulich wrote:
On 10.04.15 at 11:21, wrote:
+PERROR("Could not allocate memory.");
Now that's exactly the
flight 53503 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53503/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 13 guest-localmigrate fail REGR. vs. 52776
test-amd64-i386-qemuu-rhel6h
On 06/05/15 18:12, Razvan Cojocaru wrote:
> This patch adds XSETBV (XCR) vm_events.
>
> Signed-off-by: Razvan Cojocaru
> ---
> tools/libxc/include/xenctrl.h |2 ++
> tools/libxc/xc_monitor.c| 15 +++
> xen/arch/x86/hvm/event.c| 16
> xen/arch
On 05/07/2015 04:30 AM, 蒋雄伟(蒋冲) wrote:
> Hi, George
>
> I deploy a Discuz application in a VM and use jmeter to stress the
> application. Meanwhile I use xentrace to trace.
> #xentrace -D -e 0x0008f000 -T 30 trace_file_discuz.bin
>
> Then I use xenalyze to analyze
> #xenalyze --summary trace_f
flight 53190 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53190/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 13 guest-localmigrate fail REGR. vs. 50391
Tests which are fai
On 07/05/15 16:43, Tim Deegan wrote:
> At 20:12 +0300 on 06 May (1430943148), Razvan Cojocaru wrote:
>> This patch adds XSETBV (XCR) vm_events.
>>
>> Signed-off-by: Razvan Cojocaru
> After making things more architecture-neutral in the API rework, it
> seems a shame to have this called 'xsetbv'.
On 05/07/2015 08:05 PM, Tamas K Lengyel wrote:
> Hi Razvan,
> I guess I don't really see into the setup you envision using this
> event-type with, but wouldn't it be possible to just use libxenvchan?
Hello Tamas,
This patch evolved from "xen: Support for VMCALL mem_events":
http://lists.xen.org/
On Thu, May 7, 2015 at 6:28 PM, Andrew Cooper wrote:
> On 07/05/15 18:13, George Dunlap wrote:
>>> +case TRC_SCHED_ADJDOM:
>>> > +printf(" %s sched_adjdom domid d%u\n",
>>> > + ri->dump_header, ri->d[0]);
>>> > +break;
>> Wow, this has got to be on
On 05/07/2015 06:26 PM, Andrew Cooper wrote:
> On 07/05/15 11:35, Olaf Hering wrote:
>> Result of "sed -i 's@[[:blank:]]\+$@@' tools/xentrace/xenalyze/xenalyze.c"
>>
>> Signed-off-by: Olaf Hering
>> Cc: Ian Jackson
>> Cc: Stefano Stabellini
>> Cc: Ian Campbell
>> Cc: Wei Liu
>
> Why not refre
On 07/05/15 18:13, George Dunlap wrote:
>> +case TRC_SCHED_ADJDOM:
>> > +printf(" %s sched_adjdom domid d%u\n",
>> > + ri->dump_header, ri->d[0]);
>> > +break;
> Wow, this has got to be one of the most useless trace points
> ever...
>
Is it a candi
On 07/05/15 11:35, Olaf Hering wrote:
> Result of "sed -i 's@[[:blank:]]\+$@@' tools/xentrace/xenalyze/xenalyze.c"
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Why not refresh patch 1 using git's --whitespace=fix mode? It would
sa
On Mon, 4 May 2015, Quan Xu wrote:
> This patch adds infrastructure for xen front drivers living in qemu,
> so drivers don't need to implement common stuff on their own. It's
> mostly xenbus management stuff: some functions to access XenStore,
> setting up XenStore watches, callbacks on device dis
On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> Since xenalyze is now upstream its Open Source and part of the given
> release.
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: George Dunlap
_
On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> Result of "sed -i 's@[[:blank:]]\+$@@' tools/xentrace/xenalyze/xenalyze.c"
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: George Dunlap
_
On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
[snip]
> +case TRC_SCHED_ADJDOM:
> +printf(" %s sched_adjdom domid d%u\n",
> + ri->dump_header,
I want to thank everyone who participated in yesterday's Document Day.
Among other things, we have a new page about "Huge Page Support" which
is taking shape nicely.
And I want to thank Robert Vanvossen and Axel Fontaine who joined in
the effort for the first time. Thank you!
Don't forget that
Commit 2b953a5e994c ("xen: Suspend ticks on all CPUs during suspend")
introduced xen_arch_suspend() routine but did so only for x86, breaking
ARM builds.
We need to add it to ARM as well.
Signed-off-by: Boris Ostrovsky
Reported-by: Michal Suchanek
Tested-by: Stefano Stabellini
---
arch/arm/xe
Change main_sched_rtds and related output functions to support per-VCPU settings
for xl sched-rtds tool.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
tools/libxl/xl_cmdimpl.c | 131 +--
1 file changed, 103 insertions(+),
Change sched_rtds_domain_get/set functions to support per-VCPU settings for
RTDS scheduler.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
tools/libxl/libxl.c | 143 +---
tools/libxl/libxl.h | 6 ++
tools/lib
[Goal]
The current xl sched-rtds tool can only set the VCPUs of a domain to the same
parameter
although the scheduler supports VCPUs with different parameters. This patchset
is to
enable xl sched-rtds tool to configure the VCPUs of a domain with different
parameters.
This per-VCPU settings can
Add xc_sched_rtds_vcpu_get/set functions to interact with Xen to get/set a
domain's
per-VCPU parameters.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
tools/libxc/include/xenctrl.h | 9
tools/libxc/xc_rt.c | 52 ++
Add two hypercalls(XEN_DOMCTL_SCHEDOP_getvcpuinfo/putvcpuinfo) to get/set a
domain's
per-VCPU parameters. Hypercalls are handled in function rt_dom_cntl.
Add an array pointer in struct xen_domctl_sched_rtds(an union in struct
xen_domctl_scheduler_op),
which is used for transferring data between
flight 53749 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53749/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 6 xen-boot fail REGR. vs. 53021
test-armhf-armhf-libvirt
Hi Razvan,
I guess I don't really see into the setup you envision using this
event-type with, but wouldn't it be possible to just use libxenvchan?
Tamas
On Wed, May 6, 2015 at 7:12 PM, Razvan Cojocaru
wrote:
> Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST,
> sent via HVMOP_
On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: George Dunlap
> ---
> tools/xentrace/xenalyze/xenalyze.c | 2 ++
> 1 file changed, 2 insertions(+)
>
> diff --git a/tools/
On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: George Dunlap
> ---
> tools/xentrace/xenalyze/xenalyze.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff
On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: George Dunlap
> ---
> tools/xentrace/xenalyze/xenalyze.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff
On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> To match the hypervisor default which was introduced in
> 9da0c5b63933b9912e3903190601661813954d0d, bump the limit.
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Might be nice a
On Thu, May 7, 2015 at 11:35 AM, Olaf Hering wrote:
> This merges xenalyze.hg, changeset 150:24308507be1d into
> tools/xentrace/xenalyze to have the tool and public/trace.h in one
> place.
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Li
On Thu, 7 May 2015, Boris Ostrovsky wrote:
> On 05/07/2015 11:10 AM, Michal Suchanek wrote:
> > Hello,
> >
> > it appears the Linus master tree fails to build on ARM with XEN enabled.
> >
> > Since commit 2b953a5e9 xen: Suspend ticks on all CPUs during suspend
> >
> > provides the suspend functi
flight 53092 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53092/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-freebsd10-i386 14 guest-localmigrate/x10 fail in 50313 pass in
50283
test-amd64-amd
On Fri, Apr 3, 2015 at 8:34 PM, Konrad Rzeszutek Wilk wrote:
>> > +if ( !map )
>> > +{
>> > +fprintf(stderr, "Out of memory!\n");
>> > +return EXIT_FAILURE;
>> > +}
>> > +c = c_old = totaldigits = 0;
>> > +s = arg;
>> > +do {
>> > +in_range = 0;
>> >
>>> On 07.05.15 at 17:57, wrote:
> Thanks for the comments. IMHO the best way to deal with this is to not
> add anything in the 0xcf8-0xcfb to ioports_deny_access, leaving
> admin_io_okay as-is. Then in the PVH io bitmap blocking access to
> 0xcf8-0xcfb in order to trap accesses to that range. Doe
>>> On 30.04.15 at 17:33, wrote:
> @@ -55,6 +69,20 @@ void __bad_atomic_size(void);
> __x;\
> })
>
> +#define add_sized(p, x) ({ \
> +typeof(*(p)) __x = (x);
Committed, thanks.
signature.asc
Description: OpenPGP digital signature
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 30.04.15 at 17:33, wrote:
> +static always_inline unsigned long __xadd(
> +volatile void *ptr, unsigned long v, int size)
> +{
> +switch ( size )
> +{
> +case 1:
> +asm volatile ( "lock; xaddb %b0,%1"
> + : "+r" (v), "+m" (*__xg((volatile void *
Hello,
El 07/05/15 a les 17.22, Jan Beulich ha escrit:
On 07.05.15 at 16:54, wrote:
>> This port is used by PM1a and should not be accessed directly by Dom0.
>
> I don't think this is unconditionally PM1a - that should be read out
> of the FADT if at all. I also don't think port CF9 univers
>>> On 07.05.15 at 17:32, wrote:
> At 16:22 +0100 on 07 May (1431015746), Tim Deegan wrote:
>> At 16:29 +0200 on 07 May (1431016173), Roger Pau Monne wrote:
>> > The allocator uses independent calls to alloc_heap_pages in order to get
> the
>> > desired amount of memory and then maps all the inde
>>> On 07.05.15 at 16:29, wrote:
> --- a/xen/arch/x86/mm/paging.c
> +++ b/xen/arch/x86/mm/paging.c
> @@ -408,6 +408,51 @@ int paging_mfn_is_dirty(struct domain *d, mfn_t gmfn)
> return rv;
> }
>
> +static inline void *map_dirty_bitmap(XEN_GUEST_HANDLE_64(uint8) dirty_bitmap,
> +
flight 53066 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53066/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 5 kernel-build fail in 52626 REGR. vs. 50281
Tests whic
At 20:12 +0300 on 06 May (1430943148), Razvan Cojocaru wrote:
> This patch adds XSETBV (XCR) vm_events.
>
> Signed-off-by: Razvan Cojocaru
After making things more architecture-neutral in the API rework, it
seems a shame to have this called 'xsetbv'. But since we already have
CR0 etc in this in
Hi all,
please find attached the people who volunteered to be on the Xen Project
Developer Summit PMC
* Lars Kurth
* Ian Campbell
* Royger Pau
* Dario Faggioli
I expect to have the final list of talks sometimes early next week. Looks we
will have somewhere in between 33-40 submissions for 20-27
At 16:22 +0100 on 07 May (1431015746), Tim Deegan wrote:
> At 16:29 +0200 on 07 May (1431016173), Roger Pau Monne wrote:
> > The allocator uses independent calls to alloc_heap_pages in order to get the
> > desired amount of memory and then maps all the independent physical
> > addresses into a cont
At 16:29 +0200 on 07 May (1431016175), Roger Pau Monne wrote:
> Just like it's done for shadow_track_dirty_vram allocate the temporary
> buffer using non-contiguous memory.
Reviewed-by: Tim Deegan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http
>>> On 07.05.15 at 16:29, wrote:
> The allocator uses independent calls to alloc_heap_pages in order to get the
> desired amount of memory and then maps all the independent physical
> addresses into a contiguous virtual address space.
>
> In order to keep track of this regions a red-black tree is
At 16:29 +0200 on 07 May (1431016174), Roger Pau Monne wrote:
> Modify shadow_track_dirty_vram to use a local buffer and then flush to the
> guest without the paging_lock held. This is modeled after
> hap_track_dirty_vram.
>
> Signed-off-by: Roger Pau Monné
Reviewed-by: Tim Deegan
El 07/05/15 a les 17.10, Jan Beulich ha escrit:
On 07.05.15 at 16:54, wrote:
>> Since a PVH hardware domain has access to the physical hardware create a
>> custom more permissive IO bitmap. The permissions set on the bitmap are
>> populated based on the contents of the ioports rangeset.
>>
>>
On 07/05/15 14:59, Hongyang Yang wrote:
>
>
> On 05/07/2015 06:35 PM, Andrew Cooper wrote:
>> On 07/05/15 07:37, Yang Hongyang wrote:
>>> Set the hvm param HVM_PARAM_IDENT_PT second time will fail.
>>> So defer the setting of HVM_PARAM_IDENT_PT.
>>>
>>> Signed-off-by: Yang Hongyang
>>
>> I would a
On 05/07/2015 11:10 AM, Michal Suchanek wrote:
Hello,
it appears the Linus master tree fails to build on ARM with XEN enabled.
Since commit 2b953a5e9 xen: Suspend ticks on all CPUs during suspend
provides the suspend function only for x86 this is not surprising.
I currently don't use XEN yet
>>> On 07.05.15 at 16:54, wrote:
> This port is used by PM1a and should not be accessed directly by Dom0.
I don't think this is unconditionally PM1a - that should be read out
of the FADT if at all. I also don't think port CF9 universally serves
as the port to do reboots. I.e. I don't think this s
At 16:29 +0200 on 07 May (1431016173), Roger Pau Monne wrote:
> The allocator uses independent calls to alloc_heap_pages in order to get the
> desired amount of memory and then maps all the independent physical
> addresses into a contiguous virtual address space.
>
> In order to keep track of this
>>> On 07.05.15 at 16:54, wrote:
> --- a/xen/arch/x86/domain_build.c
> +++ b/xen/arch/x86/domain_build.c
> @@ -37,6 +37,7 @@
> #include
> #include
> #include
> +#include
>
> #include
>
> @@ -1548,6 +1549,8 @@ int __init construct_dom0(
> rc |= ioports_deny_access(d, pmtmr_iop
>>> On 07.05.15 at 16:54, wrote:
> Since a PVH hardware domain has access to the physical hardware create a
> custom more permissive IO bitmap. The permissions set on the bitmap are
> populated based on the contents of the ioports rangeset.
>
> Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Be
On 05/07/2015 05:31 PM, Andrew Cooper wrote:
On 07/05/15 08:04, Hongyang Yang wrote:
Cc Andrew cooper
Sorry I missed your address...
No worries. You have managed a far faster turnaround on this than I
have with libxl migration v2!
Thank you for the more faster review!
~Andrew
.
--
On 05/07/2015 06:35 PM, Andrew Cooper wrote:
On 07/05/15 07:37, Yang Hongyang wrote:
Set the hvm param HVM_PARAM_IDENT_PT second time will fail.
So defer the setting of HVM_PARAM_IDENT_PT.
Signed-off-by: Yang Hongyang
I would argue that this is a Xen bug, not a migration bug. There is
not
On 05/07/2015 06:58 PM, Andrew Cooper wrote:
On 07/05/15 07:37, Yang Hongyang wrote:
X86_PV_INFO can be sent multiple times under Remus
Signed-off-by: Yang Hongyang
X86_PV_INFO cannot be sent multiple times. If any information in it
were to change, the receiving side would have no choice
Previously this was done ad-hoc in admin_io_okay.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain_build.c | 3 +++
xen/arch/x86/traps.c| 4
2 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/domain_build.c b/xen/arc
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports rangeset.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Boris Ostrovsky
Cc: Sur
This port is used by PM1a and should not be accessed directly by Dom0. This
also premits trapping 2 and 4 byte accesses to 0xcf8, which need to be
handled by the hypervisor.
Also, since admin_io_okay is now a wrapper around ioports_access_permitted
remove it.
Signed-off-by: Roger Pau Monné
Cc: J
This version include splitting changes into separate patches, specially
those that also affect PV guests.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 07.05.15 at 16:31, wrote:
> On 07/05/15 15:14, Jan Beulich wrote:
>> Now the question of course is - is that really what we want to do?
>> I.e. is it known that he no longer wants to be a maintainer of this
>> code (or cannot be)? The mail address having become stale
>> doesn't necessarily
On Thu, May 7, 2015 at 10:15 AM, Jan Beulich wrote:
On 06.05.15 at 19:21, wrote:
>> Removed Nathan Studer and added Josh Whitehead.
>
> Nathan,
>
> could you confirm the removal please?
Confirmed, and if you need a more formal ack...
>
> Jan
>
>> Signed-off-by: Robert VanVossen
Acked-by
Hi Jan,
On 07/05/15 15:14, Jan Beulich wrote:
On 07.05.15 at 12:11, wrote:
>> On 07/05/15 10:52, Julien Grall wrote:
>>> On 07/05/2015 09:21, Zoltan Kiss wrote:
On 06/05/15 19:56, Julien Grall wrote:
> His email address is bouncing from more than a month.
>
> Signed-off-by:
When the caller of paging_log_dirty_op is a hvm guest Xen would choke when
trying to copy the dirty bitmap to the guest because the paging lock is
already held.
Fix this by independently mapping each page of the guest bitmap as needed
without the paging lock held.
Signed-off-by: Roger Pau Monné
Modify shadow_track_dirty_vram to use a local buffer and then flush to the
guest without the paging_lock held. This is modeled after
hap_track_dirty_vram.
Signed-off-by: Roger Pau Monné
Cc: Tim Deegan
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v3:
- Use the newly introduced alloc_xen
Just like it's done for shadow_track_dirty_vram allocate the temporary
buffer using non-contiguous memory.
Signed-off-by: Roger Pau Monné
Cc: Tim Deegan
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/mm/hap/hap.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/
The allocator uses independent calls to alloc_heap_pages in order to get the
desired amount of memory and then maps all the independent physical
addresses into a contiguous virtual address space.
In order to keep track of this regions a red-black tree is used.
Signed-off-by: Roger Pau Monné
Cc:
Changes in this iteration include the addition of a non-contiguous allocator
that's used in shadow_track_dirty_vram and hap_track_dirty_vram in order to
allocate the temporary dirty bitmap.
Thanks, Roger.
___
Xen-devel mailing list
Xen-devel@lists.xen
On 07/05/15 15:14, Jan Beulich wrote:
On 07.05.15 at 12:11, wrote:
On 07/05/15 10:52, Julien Grall wrote:
On 07/05/2015 09:21, Zoltan Kiss wrote:
On 06/05/15 19:56, Julien Grall wrote:
His email address is bouncing from more than a month.
Signed-off-by: Julien Grall
Cc: Ian Jackson
Cc:
On 05/05/2015 12:44 AM, 蒋雄伟(蒋冲) wrote:
> In /xen/arch/x86/oprofile/op_counter.h there is a definition
>
> #define OP_MAX_COUNTER 8
>
> As far as I know , the number of counter equals the number of events. As
> all we know that the number of events is more than 8.
> So my question is : Is it th
Ian Campbell writes ("Re: [GIT PULL OSSTEST] Merge up changes from Cambridge
instance."):
> Driving error on git request-pull, the correct branch name is:
> git://xenbits.xen.org/people/ianc/osstest.git from-cambridge/2015-05-05
I have just pushed this to colo pretest.
In an hour or so I will
>>> On 06.05.15 at 19:21, wrote:
> Removed Nathan Studer and added Josh Whitehead.
Nathan,
could you confirm the removal please?
Jan
> Signed-off-by: Robert VanVossen
> ---
> MAINTAINERS |2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/MAINTAINERS b/MAINTAINERS
>
>>> On 07.05.15 at 12:11, wrote:
> On 07/05/15 10:52, Julien Grall wrote:
>> On 07/05/2015 09:21, Zoltan Kiss wrote:
>>> On 06/05/15 19:56, Julien Grall wrote:
His email address is bouncing from more than a month.
Signed-off-by: Julien Grall
Cc: Ian Jackson
Cc: Keir Fras
On 07/05/15 14:42, Hongyang Yang wrote:
>
>
> On 05/07/2015 05:48 PM, Andrew Cooper wrote:
>> On 07/05/15 07:37, Yang Hongyang wrote:
>>> Move the memory allocation before the concrete live/nolive save
>>> in order to avoid the free/alloc memory loop when using Remus.
>>>
>>> Signed-off-by: Yang Ho
On Thu, 2015-05-07 at 21:42 +0800, Hongyang Yang wrote:
>
> On 05/07/2015 05:48 PM, Andrew Cooper wrote:
> > On 07/05/15 07:37, Yang Hongyang wrote:
> >> Move the memory allocation before the concrete live/nolive save
> >> in order to avoid the free/alloc memory loop when using Remus.
> >>
> >> Si
On 05/07/2015 06:48 PM, Andrew Cooper wrote:
On 07/05/15 07:37, Yang Hongyang wrote:
Split read/handle qemu info. The receiving of qemu info
should be done while we receive the migration stream,
handle_qemu will be called when the stream complete.
Otherwise, it will break Remus because read_re
1 - 100 of 172 matches
Mail list logo