Hi,
On 10/07/2015 17:52, Ian Campbell wrote:
On Fri, 2015-07-10 at 12:01 +0100, Jan Beulich wrote:
On 10.07.15 at 12:46, wrote:
I would like to have freeze exception for ITS feature on ARM64.
Design got freeze few weeks back and I have sent v4 version of patch series
today.
This patches
On 07/10/2015 04:35 AM, Lengyel, Tamas wrote:
>
> @@ -546,6 +652,23 @@ int main(int argc, char *argv[])
> }
>
> break;
> +case VM_EVENT_REASON_SINGLESTEP:
> +printf("Singlestep: rip=%016"PRIx64", vcpu %d\n",
> +
Add xc_sched_rtds_vcpu_get/set functions to interact with
Xen to get/set a domain's per-VCPU parameters.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
CC:
CC:
CC:
CC:
CC:
CC:
---
tools/libxc/include/xenctrl.h | 9 +++
tools/libxc/xc_rt.c | 58
Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
functions to support per-VCPU settings.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v3:
1) Add sanity check on vcpuid
2) Add comments on per-domain and per-vcpu functions for libxl
Change main_sched_rtds and related output functions to support
per-VCPU settings.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v3:
1) Support commands, e.g., "xl sched-rtds -d vm1" to output the
default scheduling parameters
CC:
CC:
CC:
CC:
C
Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
to independently get and set the scheduling parameters of each
vCPU of a domain
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v3:
1) Remove struct xen_domctl_schedparam_t.
2) Change st
[Goal]
The current xl sched-rtds tool can only set the VCPUs of a domain
to the same parameter although the scheduler supports VCPUs with
different parameters. This patchset is to enable xl sched-rtds
tool to configure the VCPUs of a domain with different parameters.
This per-VCPU settings can
flight 59366 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59366/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs.
59254
test-amd64-amd6
flight 59348 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59348/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 59254
test
flight 59350 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59350/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-xsm 11 guest-start fail REGR. vs. 58842
Regressions which are reg
flight 59370 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59370/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 9 windows-installfail REGR. vs. 59302
Regressions which are regard
flight 59345 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59345/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 30511
test-amd64-amd64-xl-qem
flight 59319 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59319/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Tests which are failin
On Fri, Jul 10, 2015 at 08:58:33PM +, Sahita, Ravi wrote:
> Hi Wei,
>
> I had already requested the freeze exception already for altp2m[0] - I'm
> reposting that request with updates for v4 of patch series, and other updates:
>
> 1. clarify the state of patch series / feature.
>
> Reviewed
Eric Shelton, le Fri 10 Jul 2015 18:14:32 -0400, a écrit :
> -dm_config->b_info.max_memkb = 32 * 1024;
> +dm_config->b_info.max_memkb = 28 * 1024 +
> +max(guest_config->b_info.video_memkb, 4096);
I'm actually wondering whether just using
> +dm_config->b_info.max_memkb = 28 * 1
Signed-off-by: Boris Ostrovsky
---
Changes in v3:
* Defined compat_mmuext_op(). (XEN_GUEST_HANDLE_PARAM(mmuext_op_compat_t)
is not defined in header files so I used 'void' type. I am not convinced
this is the best solution)
xen/arch/x86/hvm/hvm.c | 33 -
1 fil
Add is_pvh_32bit_domain() macro and use it alongside is_pv_32bit_domain() where
necessary.
Since PVH guests cannot change execution mode, has_32bit_shinfo is a good
indicator of whether the guest is PVH and 32-bit.
Signed-off-by: Boris Ostrovsky
---
Changes in v3:
* Defined is_pvh_32bit_domain()
Signed-off-by: Boris Ostrovsky
---
Changes in v3:
* Updated switch_native() not to call release_compat_l4() on PVH guests
* hvm_set_mode() handles both 8 and 4 modes and returns
-EOPNOTSUPP otherwise. Similar chages to vmx_set_mode()
xen/arch/x86/domain.c | 27
Signed-off-by: Boris Ostrovsky
Acked-by: Ian Campbell
---
tools/libxc/xc_dom_x86.c | 32 +++-
1 file changed, 15 insertions(+), 17 deletions(-)
diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
index 6a04399..d0723f1 100644
--- a/tools/libxc/xc_dom_x86
Initial 32-bit PVH support, dom0 will need more work.
Changes in v3:
* Swapped patches 1 and 2
* Added is_pvh_32bit_domain() macro
* Dropped a few unnecessary tests for 32b mode
* Added error for unsupported modes
* Added changes to switch_native() similar to those in switch_compat()
* Fully decla
Allocate additional memory to the stub domain for qemu-traditional if
more than 4 MB is assigned to the video adapter to avoid out of memory
condition for QEMU.
Signed-off-by: Eric Shelton
---
tools/libxl/libxl_dm.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/tools/libx
I ran into crashes with qemu-traditional stub domain when 16 MB was
assigned to the stdvga virtual video adapter. These were occurring due
to an out of memory condition arising from stub domains having a fixed
size of 32 MB, with half of that being demanded for video. Assuming the
the original va
>From: dunl...@gmail.com [mailto:dunl...@gmail.com] On Behalf Of George
>Dunlap
>Sent: Friday, July 10, 2015 10:32 AM
>
>On Fri, Jul 10, 2015 at 1:52 AM, Ed White
>wrote:
>> The altp2mhvm and nestedhvm parameters are mutually exclusive and
>> cannot be set together.
>>
>> Signed-off-by: Ed White
>From: George Dunlap [mailto:george.dun...@eu.citrix.com]
>Sent: Friday, July 10, 2015 9:35 AM
>
>On 07/09/2015 06:05 PM, Sahita, Ravi wrote:
>>> And Tim, Andrew and I subsequently discussed this specific approach
>>> in a phone meeting.
>>>
>>> Ed
>>
>> Here is a brief description of the approach
>From: Jan Beulich [mailto:jbeul...@suse.com]
>Sent: Friday, July 10, 2015 3:01 AM
>
On 10.07.15 at 02:52, wrote:
>> --- a/xen/arch/x86/hvm/hvm.c
>> +++ b/xen/arch/x86/hvm/hvm.c
>> @@ -6443,6 +6443,144 @@ long do_hvm_op(unsigned long op,
>XEN_GUEST_HANDLE_PARAM(void) arg)
>> break;
>
flight 59311 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59311/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 15
rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs.
>From: Jan Beulich [mailto:jbeul...@suse.com]
>Sent: Thursday, July 09, 2015 6:30 AM
>
On 01.07.15 at 20:09, wrote:
>> ---
>> xen/arch/x86/hvm/Makefile| 1 +
>> xen/arch/x86/hvm/altp2m.c| 92
>+
>
>Wouldn't this better go into xen/arch/x86/
Hi Wei,
I had already requested the freeze exception already for altp2m[0] - I'm
reposting that request with updates for v4 of patch series, and other updates:
1. clarify the state of patch series / feature.
ReviewedAcked altp2m series v4
Y N [PATCH v3 01/15] common/domain
On Mon, Jul 06, 2015 at 04:26:56PM -0400, Konrad Rzeszutek Wilk wrote:
> Since RFC v2
> [http://lists.xen.org/archives/html/xen-devel/2015-05/msg02142.html]
> - Ingested every review comment in.
>
> For those who prefer an diff of what changed between v2 and this
> I am attaching an diff to help
On Mon, Jul 06, 2015 at 05:56:48PM +0800, Bob Liu wrote:
> From: Arianna Avanzini
>
> This patch converts xen-blkfront driver to use the block multiqueue APIs.
> Only one hardware queue is used now, so there is no performance change.
>
> The legacy non-mq code was deleted completely which is the
> Xen PV IOMMU hypercall interface
>
> A two argument hypercall interface (do_iommu_op).
>
> ret_t do_iommu_op(XEN_GUEST_HANDLE_PARAM(void) arg, unsigned int count)
>
> First argument, guest handle pointer to array of `struct pv_iommu_op`
>
> Second argument,
>From: Jan Beulich [mailto:jbeul...@suse.com]
>Sent: Thursday, July 09, 2015 6:01 AM
>
On 01.07.15 at 20:09, wrote:
>> @@ -232,6 +235,15 @@ static int ept_set_middle_entry(struct p2m_domain
>*p2m, ept_entry_t *ept_entry)
>> /* Manually set A bit to avoid overhead of MMU having to write i
>From: Jan Beulich [mailto:jbeul...@suse.com]
>Sent: Friday, July 10, 2015 2:10 AM
>
On 10.07.15 at 02:52, wrote:
>> @@ -1134,6 +1151,13 @@ int ept_p2m_init(struct p2m_domain *p2m)
>> p2m->flush_hardware_cached_dirty = ept_flush_pml_buffers;
>> }
>>
>> +table =
>> + map_doma
On Thu, Jul 09, 2015 at 09:42:21PM +0100, Julien Grall wrote:
> When Linux is using 64K page granularity, every page will be slipt in
> multiple non-contiguous 4K MFN (page granularity of Xen).
But you don't care about that on the Linux layer I think?
As in, is there an SWIOTLB that does PFN to M
. snip..
> +static elf_negerrnoval check_elf_kernel(struct xc_dom_image *dom, bool
> verbose)
why don't we want the verbose to be always true?
> +{
> +if ( dom->kernel_blob == NULL )
> +{
> +if ( verbose )
> +xc_dom_panic(dom->xch,
> + XC_INTER
On Fri, Jul 03, 2015 at 01:35:09PM +0200, Roger Pau Monne wrote:
> Allow xc_dom_elfloader to report a guest type as hvm-3.0-x86_32 if it's
> running inside of a HVM container and has the PHYS32_ENTRY elfnote set.
>
> Signed-off-by: Roger Pau Monné
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc
On Fri, Jul 03, 2015 at 05:36:15PM +0200, Roger Pau Monné wrote:
> El 03/07/15 a les 13.35, Roger Pau Monne ha escrit:
> > Change the physical memory address of the special pages when there are no
> > emulated devices. On HVM guests the special pages have always been reserved
> > so that they end a
On Fri, Jul 03, 2015 at 01:35:07PM +0200, Roger Pau Monne wrote:
> This HVM parameter returns the first free pfn after all the special pages.
Could you describe how the layout of PFNs is now for the HVM guests?
Is there some document that outlines it? I know that for PV we do
have it as part of
On Fri, Jul 10, 2015 at 02:37:46PM -0400, Konrad Rzeszutek Wilk wrote:
> When Xen migrates an HVM guest, by default its shared_info can
> only hold up to 32 CPUs. As such the hypercall
> VCPUOP_register_vcpu_info was introduced which allowed us to
> setup per-page areas for VCPUs. This means we can
> Also, from a guest POV, how is the hw emulated local apic going to be
> used? Are we going to route the interrupts from virtual devices
> (netfront, blkfront) to the lapic? Or we just want it for the timer and
> ditch the PV timer?
Use the event channels for the PV. For PCIe devices (passthrough
On Fri, Jul 03, 2015 at 01:34:45PM +0200, Roger Pau Monne wrote:
> Add checks for ignored vcpu fields in HVM mode. HVM vCPUs (BSP and APs) are
> always started in 32bit protected mode with paging disabled.
This is kind of odd in the placement of the series. The next couple of
patches deal with the
On Fri, Jul 03, 2015 at 01:34:45PM +0200, Roger Pau Monne wrote:
> Add checks for ignored vcpu fields in HVM mode. HVM vCPUs (BSP and APs) are
> always started in 32bit protected mode with paging disabled.
Please mention that only the HVM guests which use the VCPU_xx hypercalls
are the ones that a
When Xen migrates an HVM guest, by default its shared_info can
only hold up to 32 CPUs. As such the hypercall
VCPUOP_register_vcpu_info was introduced which allowed us to
setup per-page areas for VCPUs. This means we can boot PVHVM
guest with more than 32 VCPUs. During migration the per-cpu
structu
On 10/07/15 19:00, Wei Liu wrote:
> Wei Liu (9):
> libxl: fix libxl__abs_path
> libxl: turn two malloc's to libxl__malloc
> libxl: json string object can be NULL
> libxl: dispose dominfo to avoid leaking resource
> libxl: avoid leaking string in cpupool_info
> libxl: localtime(3) can re
One is to combine malloc + libxl__alloc_failed. The other is to avoid
dereferencing NULL pointer in case of malloc failure.
Signed-off-by: Wei Liu
---
tools/libxl/libxl_aoutils.c | 3 +--
tools/libxl/libxl_dm.c | 2 +-
2 files changed, 2 insertions(+), 3 deletions(-)
diff --git a/tools/lib
Signed-off-by: Wei Liu
---
tools/libxl/libxl_x86.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/tools/libxl/libxl_x86.c b/tools/libxl/libxl_x86.c
index 8cd15ca..6be9b1b 100644
--- a/tools/libxl/libxl_x86.c
+++ b/tools/libxl/libxl_x86.c
@@ -311,6 +311,11 @@ int libxl__arch_domain_crea
Add libxl_dominfo_dispose to one return path that doesn't have it.
Signed-off-by: Wei Liu
---
tools/libxl/libxl_device.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/libxl/libxl_device.c b/tools/libxl/libxl_device.c
index 2493972..3f8b555 100644
--- a/tools/libxl/libxl_device.c
++
Wei Liu (9):
libxl: fix libxl__abs_path
libxl: turn two malloc's to libxl__malloc
libxl: json string object can be NULL
libxl: dispose dominfo to avoid leaking resource
libxl: avoid leaking string in cpupool_info
libxl: localtime(3) can return NULL
libxl: qmp_init_handler can return N
Signed-off-by: Wei Liu
---
tools/libxl/libxl.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 38aff8d..4151dcb 100644
--- a/tools/libxl/libxl.c
+++ b/tools/libxl/libxl.c
@@ -740,8 +740,10 @@ static int cpupool_info(libxl__gc
> > > I started briefly looking today but don't really have time to look into
> > > it properly. I do think we want to use as much of the native/HVM code
> > > as possible and avoid the PV path (the current Linux PVH code uses too
> > > much of the PV entry point, IMO).
> >
> > I'm afraid I'm not
Don't dereference extra_config if it's NULL. Don't leak extra_config in
the end.
Signed-off-by: Wei Liu
---
tools/libxl/xl_cmdimpl.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index 971209c..d44eb4b 100644
--- a/tools
Signed-off-by: Wei Liu
---
tools/libxl/libxl_qmp.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/libxl/libxl_qmp.c b/tools/libxl/libxl_qmp.c
index 6484f5e..965c507 100644
--- a/tools/libxl/libxl_qmp.c
+++ b/tools/libxl/libxl_qmp.c
@@ -694,6 +694,7 @@ libxl__qmp_handler *libxl__qmp_ini
Don't dereference NULL.
Signed-off-by: Wei Liu
---
tools/libxl/xl_cmdimpl.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index d44eb4b..631dbd1 100644
--- a/tools/libxl/xl_cmdimpl.c
+++ b/tools/libxl/xl_cmdimpl.c
@@ -5010
Signed-off-by: Wei Liu
---
tools/libxl/libxl_json.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_json.c b/tools/libxl/libxl_json.c
index 346929a..652b3f4 100644
--- a/tools/libxl/libxl_json.c
+++ b/tools/libxl/libxl_json.c
@@ -433,8 +433,13 @@ int
If s is NULL, just return NULL to avoid libxl__strdup dereferencing NULL
pointer.
Signed-off-by: Wei Liu
---
tools/libxl/libxl_internal.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_internal.c b/tools/libxl/libxl_internal.c
index 42d548e..6402c1b 100
On Fri, Jul 03, 2015 at 06:36:37PM +0200, Roger Pau Monné wrote:
> El 03/07/15 a les 18.19, David Vrabel ha escrit:
> > On 03/07/15 12:34, Roger Pau Monne wrote:
> >>
> >> And for the FreeBSD part:
> >
> > Have you thought at all about what the Linux support for this mode would
> > look like?
> >
On Fri, Jul 10, 2015 at 1:52 AM, Ed White wrote:
> The altp2mhvm and nestedhvm parameters are mutually
> exclusive and cannot be set together.
>
> Signed-off-by: Ed White
>
> Reviewed-by: Andrew Cooper for the hypervisor
> bits.
> ---
> docs/man/xl.cfg.pod.5 | 12
> tool
On Fri, Jul 10, 2015 at 10:41 AM, Jan Beulich wrote:
On 10.07.15 at 02:52, wrote:
>> Add the remaining routines required to support enabling the alternate
>> p2m functionality.
>
> So despite George's comments on v3 these are still all disconnected
> from their users...
I did try to make it
On Fri, Jul 10, 2015 at 1:52 AM, Ed White wrote:
> From: George Dunlap
>
> The existing ept_set_entry() and ept_get_entry() routines are extended
> to optionally set/get suppress_ve. Passing -1 will set suppress_ve on
> new p2m entries, or retain suppress_ve flag on existing entries.
>
> Signed-
On Tue, Jun 23, 2015 at 06:11:53PM +0200, Vitaly Kuznetsov wrote:
> Use existing create/restore path to perform 'soft reset' for HVM domains.
> Tear everything down, e.g. destroy domain's device model, remove the domain
> from xenstore, save toolstack record and start over.
>
> Signed-off-by: Vita
On Tue, Jun 23, 2015 at 06:11:50PM +0200, Vitaly Kuznetsov wrote:
> x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq
> servers and and replaces the shared_info frame with an empty page to support
> subsequent XENMAPSPACE_shared_info call.
>
> ARM-specific hook is a noop for
On Tue, Jun 23, 2015 at 06:11:51PM +0200, Vitaly Kuznetsov wrote:
> Introduce xc_domain_soft_reset() function supporting XEN_DOMCTL_soft_reset.
>
> Signed-off-by: Vitaly Kuznetsov
Well, that is easy to review :-)
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> tools/libxc/include/xenctrl.h | 3 +++
On Fri, Jul 10, 2015 at 1:52 AM, Ed White wrote:
> Implement and hook up the code to enable VMX support of VMFUNC and #VE.
>
> VMFUNC leaf 0 (EPTP switching) emulation is added in a later patch.
>
> Signed-off-by: Ed White
>
> Reviewed-by: Andrew Cooper
> Acked-by: Jun Nakajima
> ---
> xen/arc
On 07/09/2015 06:05 PM, Sahita, Ravi wrote:
>> And Tim, Andrew and I subsequently discussed this specific approach in a
>> phone meeting.
>>
>> Ed
>
> Here is a brief description of the approach that was taken -
>
> The altp2m design implements a set of p2m's that are derived from the host
> p2
On Tue, Jun 23, 2015 at 06:11:48PM +0200, Vitaly Kuznetsov wrote:
> New domctl resets state for a domain allowing it to 'start over': register
> vcpu_info, switch to FIFO ABI for event channels. Still active grants are
> being logged to help debugging misbehaving backends.
>
> Signed-off-by: Vital
On Tue, Jun 23, 2015 at 06:11:47PM +0200, Vitaly Kuznetsov wrote:
> Log first 10 active grants of a domain. This function is going to be used
> for soft reset, active grants on this path usually mean misbehaving backends
> refusing to release their mappings on shutdown.
Is there an particular reas
On Tue, Jun 23, 2015 at 06:11:46PM +0200, Vitaly Kuznetsov wrote:
> We need to close all event channel so the domain performing soft reset
> will be able to open them back.
>
> Signed-off-by: Vitaly Kuznetsov
> ---
> xen/common/event_channel.c | 38 +++---
> xen/i
On Fri, 2015-07-10 at 16:16 +0530, Vijay Kilari wrote:
> I would like to have freeze exception for ITS feature on ARM64.
> Design got freeze few weeks back and I have sent v4 version of patch series
> today.
Thanks, I've been through v4 and it is certainly much improved over v3.
There are som
...and make RTC timeoffset ioreqs use it.
Without this patch RTC timeoffset updates go nowhere and Xen complains
with a (non-rate-limited) printk.
Signed-off-by: Paul Durrant
Cc: Keir Fraser
Cc: Jan Beulich
Cc: Andrew Cooper
---
v2:
- Add (g)printk back in as requested by Jan. It will be emi
On Thu, 2015-07-09 at 15:54 +0100, Ben Catterall wrote:
> xen/arch/arm/domain_build.c | 2 +-
> xen/arch/arm/kernel.c | 2 +-
> xen/arch/arm/mm.c | 12 +-
> xen/arch/arm/p2m.c| 4 ++--
> xen/arch/arm/traps
On Fri, 2015-07-10 at 16:25 +0100, Jan Beulich wrote:
> >>> On 10.07.15 at 17:13, wrote:
> > cpu_down()
> > stop_machine_run(take_cpu_down, ...)
> > notifier_call_chain(&cpu_chain, CPU_DYING, ...)
> > __cpu_disable()
> > remove_siblinginfo()
> > __cpu_die()
> > notifier_call_cha
Eric Shelton, le Fri 10 Jul 2015 11:36:02 -0400, a écrit :
> Allocate additional memory to the stub domain for qemu-traditional if
> more than 4 MB is assigned to the video adapter to avoid out of memory
> condition for QEMU.
>
> Signed-off-by: Eric Shelton
Acked-by: Samuel Thibault
> ---
> t
Eric Shelton, le Fri 10 Jul 2015 11:36:01 -0400, a écrit :
> Assuming the the original value of 32 MB was based on having a 4 MB
> video adapter,
In my memory that was the case, yes.
Samuel
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://list
On 07/10/2015 10:42 AM, Juergen Gross wrote:
When dom0 is being ballooned balloon_process() will hold the balloon
mutex until it is finished. This will block e.g. creation of new
domains as the device backends for the new domain need some
autoballooned pages for the ring buffers.
Avoid this by r
>>> On 10.07.15 at 17:42, wrote:
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 10 July 2015 16:39
>> To: Paul Durrant
>> Cc: Andrew Cooper; xen-devel@lists.xen.org; Keir (Xen.org)
>> Subject: Re: [PATCH] x86/hvm: add support for broadcast of buffered
>> io
On Fri, 2015-07-10 at 12:01 +0100, Jan Beulich wrote:
> >>> On 10.07.15 at 12:46, wrote:
> > I would like to have freeze exception for ITS feature on ARM64.
> > Design got freeze few weeks back and I have sent v4 version of patch series
> > today.
> >
> > This patches will not impact any gene
Eric Shelton writes ("[PATCH 1/1] libxl: set stub domain size based on VRAM
size"):
> Allocate additional memory to the stub domain for qemu-traditional if
> more than 4 MB is assigned to the video adapter to avoid out of memory
> condition for QEMU.
> dm_config->b_info.max_vcpus = 1;
>
On Fri, 2015-07-10 at 13:12 +0530, vijay.kil...@gmail.com wrote:
> From: Vijaya Kumar K
>
> ITS initialization required for all PCI devices in
> ThunderX platform are done by calling from specific
> mapping function.
>
> This patch can be reverted once XEN PCI passthrough
> framework for arm64 i
On Fri, 2015-07-10 at 13:12 +0530, vijay.kil...@gmail.com wrote:
> From: Vijaya Kumar K
>
> ITS translation space contains GITS_TRANSLATOR
> register which is written by device to raise
> LPI. This space needs to mapped to every domain
> address space for all physical ITS available,
> so that dev
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 10 July 2015 16:39
> To: Paul Durrant
> Cc: Andrew Cooper; xen-devel@lists.xen.org; Keir (Xen.org)
> Subject: Re: [PATCH] x86/hvm: add support for broadcast of buffered
> ioreqs...
>
> >>> On 10.07.15 at 15:45, wr
flight 59307 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59307/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 11 guest-saverestore fail REGR. vs.
59059
test-amd64-am
On Fri, 2015-07-10 at 13:12 +0530, vijay.kil...@gmail.com wrote:
> +void vgic_its_init(void)
> +{
> +if ( gic_lpi_supported() )
> +its_lpi_init(gic_nr_id_bits());
Ah, here is some code which tries to only enable this stuff when it is
needed.
I think for the time being this also needs
>>> On 10.07.15 at 17:29, wrote:
> Add tools/tests/xen-acess to the supported list under VM EVENT/MEM ACCESS.
> Also, changing my e-mail to the preferred one, as it is in many of the
> headers
> already.
>
> Signed-off-by: Tamas K Lengyel
It looks slightly odd to me that you sign off with you
>>> On 10.07.15 at 15:45, wrote:
> --- a/xen/arch/x86/hvm/io.c
> +++ b/xen/arch/x86/hvm/io.c
> @@ -60,8 +60,7 @@ void send_timeoffset_req(unsigned long timeoff)
> if ( timeoff == 0 )
> return;
>
> -if ( !hvm_buffered_io_send(&p) )
> -printk("Unsuccessful timeoffset upda
I ran into crashes with qemu-traditional stub domain when 16 MB was
assigned to the stdvga virtual video adapter. These were occurring due
to an out of memory condition arising from stub domains having a fixed
size of 32 MB, with half of that being demanded for video. Assuming the
the original va
Allocate additional memory to the stub domain for qemu-traditional if
more than 4 MB is assigned to the video adapter to avoid out of memory
condition for QEMU.
Signed-off-by: Eric Shelton
---
tools/libxl/libxl_dm.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/libxl/libxl_dm.c b/t
On Fri, 2015-07-10 at 16:13 +0100, Jan Beulich wrote:
> >>> On 10.07.15 at 16:57, wrote:
> > ...
> > (XEN) Preparing system for ACPI S5 state.
> > (XEN) Disabling non-boot CPUs ...
> > (XEN) Broke affinity for irq 9
> > (XEN) cpu=1 cpu_to_socket=4294967295
> > (XEN) [ Xen-4.6-unstable x86_
On Fri, 2015-07-10 at 13:12 +0530, vijay.kil...@gmail.com wrote:
> diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c
> index 3ebadcf..92d2be9 100644
> --- a/xen/arch/arm/gic.c
> +++ b/xen/arch/arm/gic.c
> @@ -68,11 +68,18 @@ enum gic_version gic_hw_version(void)
> return gic_hw_ops->info->hw
Add tools/tests/xen-acess to the supported list under VM EVENT/MEM ACCESS.
Also, changing my e-mail to the preferred one, as it is in many of the headers
already.
Signed-off-by: Tamas K Lengyel
Acked-by: Razvan Cojocaru
---
MAINTAINERS | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
di
>>> On 10.07.15 at 17:13, wrote:
On 10.07.15 at 16:57, wrote:
>> I added this printk:
>>
>> printk(" cpu=%u cpu_to_socket=%u\n", cpu, socket);
>>
>> Right before this chunk of code, in cpu_smpboot_free():
>>
>> if ( cpumask_empty(socket_cpumask[socket]) )
>> {
>> xfree(so
>>> On 10.07.15 at 16:57, wrote:
> I added this printk:
>
> printk(" cpu=%u cpu_to_socket=%u\n", cpu, socket);
>
> Right before this chunk of code, in cpu_smpboot_free():
>
> if ( cpumask_empty(socket_cpumask[socket]) )
> {
> xfree(socket_cpumask[socket]);
> socket_cpum
On Fri, 2015-07-10 at 13:12 +0530, vijay.kil...@gmail.com wrote:
> [...]
> +int vits_unmap_lpi_prop(struct vcpu *v)
Why is this function called "unmap"?
> +/* Register mmio handlers for this region */
> +register_mmio_handler(v->domain, &vgic_gits_lpi_mmio_handler,
> +
On 07/10/2015 04:01 PM, Jan Beulich wrote:
On 10.07.15 at 15:26, wrote:
>> I also said that if we went with anything other than STRICT that we'd
>> need to check to make sure that the domain really was the hardware
>> domain before proceeding, in case the assumption that pdev->domain ==
>> ha
>>> On 10.07.15 at 15:26, wrote:
> I also said that if we went with anything other than STRICT that we'd
> need to check to make sure that the domain really was the hardware
> domain before proceeding, in case the assumption that pdev->domain ==
> hardware_domain ever changed. (Perhaps with an AS
On Fri, 2015-07-10 at 15:47 +0100, Andrew Cooper wrote:
> On 10/07/15 15:29, Dario Faggioli wrote:
> > (XEN) Xen call trace:
> > (XEN)[] cpu_smpboot_free+0x2b/0x255
> > (XEN)[] cpu_smpboot_callback+0x317/0x327
> > (XEN)[] notifier_call_chain+0x67/0x87
> > (XEN)[] cpu_down+0xd9/0x12
>>> On 10.07.15 at 16:50, wrote:
> On Thu, Jul 9, 2015 at 6:33 AM, Tiejun Chen wrote:
>> v7:
>
> It looks like most of the libxl/libxc patches have been acked. It
> seems to me that most of the hypervisor patches (1-3, 14-15) are
> either ready to go in or pretty close.
>
> The main thing I th
On Fri, 2015-07-10 at 13:12 +0530, vijay.kil...@gmail.com wrote:
> +case GITS_CWRITER:
> +if ( dabt.size == DABT_BYTE ) goto bad_width;
> +/* XXX: Validate val */
> +vits_spin_lock(vits);
> +vits->cmd_write = *r & 0xfffe0;
> +if ( !(vits->ctrl & GITS_CTLR
On Wed, Mar 11, 2015 at 04:36:38PM +, Ian Campbell wrote:
> On Mon, 2015-02-09 at 11:10 +, Wei Liu wrote:
>
> I know you've made ts-debian-hvm-install DTRT but this is going to
> result in a load of jobs which go through all the effort of regrooving
> the box and installing Xen etc, only t
On Wed, Mar 11, 2015 at 04:34:43PM +, Ian Campbell wrote:
> On Mon, 2015-02-09 at 11:10 +, Wei Liu wrote:
> > Libvirt's configuration converter doesn't know how to deal with BIOS
> > selection. The end result is it always use the default one (seabios).
>
> Even with qemu-trad? Does it not
On Fri, 2015-07-10 at 13:12 +0530, vijay.kil...@gmail.com wrote:
> From: Vijaya Kumar K
>
> Add APIs to add devices to RB-tree, assign and remove
> devices to domain.
>
> Signed-off-by: Vijaya Kumar K
> ---
> v4: - Introduced helper to populate its_device struct
> - Fixed freeing of its_dev
1 - 100 of 275 matches
Mail list logo