On Wed, Feb 24, 2016 at 02:16:38AM -0700, Jan Beulich wrote:
> > I send the bugs-fix patch as whole. I just get the Cc lists using the
> > script based on the whole patchset. May be I will send the patch
> > seperately.
>
> Thank you. Please also see
> http://wiki.xenproject.org/wiki/Submitting_Xe
On February 25, 2016 8:24pm, wrote:
> >>> On 25.02.16 at 13:14, wrote:
> > On February 25, 2016 4:59pm, wrote:
> >> However, the same effect could be achieved by making the lock a
> >> recursive one, which would then seem to more conventional approach
> >> (but requiring as much code to be touc
Hello list,
I’m working on a Python client library for XenStore [1]. The library implements
two ways to access XenStore: via Unix socket and via /dev. The /dev interface
turned out to be a bit problematic, because it ignores the req_id field for
WATCH requests.
The spec [2] requires all respo
Hi Paul,
Thanks a lot for your help on this! And below are my questions.
On 2/25/2016 11:49 PM, Paul Durrant wrote:
This patch adds a new 'designs' subdirectory under docs as a repository
for this and future design proposals.
Signed-off-by: Paul Durrant
---
For convenience this document ca
From: Shannon Zhao
Make these types generic to DT and ACPI. So they are can be used in ACPI
codes.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 10 -
xen/arch/arm/gic-v2.c | 10 -
xen/arch/arm/gic-v3.c | 8 +++
From: Shannon Zhao
Since ACPI 6.0 defines that GIC Distributor Structure contains the GIC
version filed, it could get GIC version from that. Then call acpi device
initializing function to preinit GIC device.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
V5: fix coding style a
From: Shannon Zhao
Add architecture specific definitions and calls required for acpi in new
header file.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
xen/arch/arm/setup.c | 5 +
xen/include/asm-arm/acpi.h | 51
From: Shannon Zhao
This function could get the specified index entry of MADT table. This
would be useful when it needs to get the contens of the entry.
Cc: Jan Beulich
Signed-off-by: Shannon Zhao
---
V5: address Jan's comments
V4: Fix coding style and make the function only for MADT table
---
From: Hanjun Guo
When MADT is parsed, print GIC information as debug message:
ACPI: GICC (acpi_id[0x] address[e112f000] MPIDR[0x0] enabled)
ACPI: GICC (acpi_id[0x0001] address[e112f000] MPIDR[0x1] enabled)
...
ACPI: GICC (acpi_id[0x0201] address[e112f000] MPIDR[0x201]
From: Shannon Zhao
ACPI 5.1 only has two explicit methods to boot up SMP, PSCI and Parking
protocol, but the Parking protocol is only specified for ARMv7 now, so
make PSCI as the only way for the SMP boot protocol before some updates
for the ACPI spec or the Parking protocol spec.
ACPI only supp
From: Shannon Zhao
acpi_boot_table_init() will be called in start_xen to get the RSDP and
all the table pointers. With this patch, we can get ACPI boot-time
tables from firmware on ARM64.
Signed-off-by: Naresh Bhat
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
---
xen/arch/arm/acpi/
From: Shannon Zhao
This adds a new function to initialize UART for ACPI on ARM.
Signed-off-by: Shannon Zhao
---
V5: fix coding style
---
xen/arch/arm/setup.c| 2 +-
xen/drivers/char/arm-uart.c | 37 +++--
xen/include/xen/serial.h| 2 +-
3 files cha
From: Parth Dixit
Add a helper function to set edge/level type information for an
interrupt.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
xen/arch/arm/irq.c| 27 ---
xen/include/asm-arm/irq.h | 2 ++
2 files changed,
From: Shannon Zhao
Define new command line parameter "acpi" to enable/disable acpi.
This implements the following policy to decide whether ACPI should be
used to boot the system:
- acpi=off: ACPI will not be used to boot the system, even if there is
no alternative available (e.g., device tree i
From: Shannon Zhao
Parse ACPI SPCR (Serial Port Console Redirection table) table and
initialize the serial port pl011.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
Cc: Jan Beulich
---
xen/drivers/char/pl011.c | 37 ++
From: Shannon Zhao
Like GICv2, ACPI on Xen hypervisor uses MADT table for proper GICv3
initialization. Parse GIC distributor subtable, redistributor subtable
and interrupt subtable.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
V5: fix coding style and simplify #else case
V4:
From: Parth Dixit
MADT contains the information for MPIDR which is essential for SMP
initialization, parse the GIC cpu interface structures to get the MPIDR
value and map it to cpu_logical_map(), and add enabled cpu with valid
MPIDR into cpu_possible_map.
Move BAD_MADT_ENTRY to common place and
From: Shannon Zhao
Parse GTDT (Generic Timer Descriptor Table) to initialize timer. Using
the information presented by GTDT to initialize the arch timer (not
memory-mapped).
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
V5: Move READ_SYSREG32(CNTFR
From: Shannon Zhao
There are two flags: PSCI_COMPLIANT and PSCI_USE_HVC. When set, the
former signals to the OS that the hardware is PSCI compliant. The latter
selects the appropriate conduit for PSCI calls by toggling between
Hypervisor Calls (HVC) and Secure Monitor Calls (SMC). FADT table
cont
From: Bob Moore
These tables are defined outside of the ACPI specification.
Signed-off-by: Bob Moore
Signed-off-by: Feng Tang
Signed-off-by: Len Brown
[Linux commit 4e2f9c278ad84196991fcf6f6646a3e15967fe90]
[only port the DBG2 changes]
Signed-off-by: Shannon Zhao
---
Cc: Jan Beulich
V5: por
From: Shannon Zhao
Implement __acpi_map_table function for ARM.
Signed-off-by: Shannon Zhao
---
V4: add __acpi_map_table function
---
xen/arch/arm/Makefile| 1 +
xen/arch/arm/acpi/Makefile | 1 +
xen/arch/arm/acpi/lib.c | 52
xen/in
From: Shannon Zhao
Add macros to emulate x86 style ports for arm. This avoids modification in
common code for acpi. Here just print a warning on ARM.
Signed-off-by: Shannon Zhao
---
V5: not write to the address, just print warning
V4: print warning
---
xen/include/asm-arm/arm64/io.h | 23 +
From: Shannon Zhao
These patches are Part 3 of the previous patch set I sent which adds
ACPI support for arm64 on Xen[1]. Split them as an individual set for
convenient reviewing.
These patches mostly add ACPI support for Xen itself(not yet for Dom0)
on ARM64. It makes Xen could parse physical A
From: Parth Dixit
ACPI on Xen hypervisor uses MADT table for proper GIC initialization.
First get the GIC version from GIC Distributor. Then parse GIC related
subtables, collect CPU interface and distributor addresses and call
driver initialization function (which is hardware abstraction agnostic
From: Parth Dixit
Add generic way to use device from acpi similar to the way it is
supported in device tree.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
xen/arch/arm/device.c| 18 ++
xen/arch/arm/xen.lds.S | 7 +++
From: Shannon Zhao
To support ACPI NUMA, it needs to make the ACPI initialization done
before boot_end_allocator. Also, x86 does this by the same way.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
---
V5: fix the commit message
---
xen/arch/arm/setup.c | 6 ++
1 file changed, 2 i
From: Shannon Zhao
This function will be used by ACPI booting. Export it so that it can be
used by other files.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
V5: remove __init from the declaration
---
xen/arch/arm/bootfdt.c| 6 +++---
xen/include/xen/device_tree.h |
Hi Andrei
On 26 February 2016 at 13:24, Andrei Borzenkov wrote:
>
>
> Отправлено с iPhone
>
>> 26 февр. 2016 г., в 7:48, Fu Wei написал(а):
>>
>> Hi Andrei
>>
>>> On 26 February 2016 at 01:34, Andrei Borzenkov wrote:
>>> 25.02.2016 09:39, fu@linaro.org пишет:
From: Fu Wei
de
>>> On 2/24/2016 at 01:10 AM, in message
, George
Dunlap wrote:
> On Fri, Feb 19, 2016 at 10:39 AM, Chunyan Liu wrote:
> > Add pvusb APIs, including:
> > - attach/detach (create/destroy) virtual usb controller.
> > - attach/detach usb device
> > - list usb controller and usb devices
> > -
flight 83979 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83979/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen3 host-install(3) broken REGR. vs. 83855
test-amd64-amd64-lib
Отправлено с iPhone
> 26 февр. 2016 г., в 7:48, Fu Wei написал(а):
>
> Hi Andrei
>
>> On 26 February 2016 at 01:34, Andrei Borzenkov wrote:
>> 25.02.2016 09:39, fu@linaro.org пишет:
>>> From: Fu Wei
>>>
>>> delete: xen_linux, xen_initrd, xen_xsm
>>> add: xen_module
>>>
>>> This update
On 2/25/2016 6:31 PM, Dario Faggioli wrote:
Hey again,
Thanks for turning up so quickly.
We are getting closer and closer, although (of course :-)) I have some
more comments.
However, is there a particular reason why you are keeping the RFC tag?
Until you do that, it's like saying that you a
On 02/26/2016 12:55 PM, Yu-An(Victor) Chen wrote:
Hi Changlong,
Are you suggesting I should hold off on setting up COLO for now?
No, just following my steps.
Thanks
-Xie
Thanks!
Victor
On Thu, Feb 25, 2016 at 8:19 PM, Changlong Xie
wrote:
On 02/26/2016 11:38 AM, Yu-An(Victor)
Hi,
We are measuring the execution time between native machine environment
and xen virtualization environment using PARSEC Benchmark [1].
In virtualiztion environment, we run a domU with three VCPUs, each of
them pinned to a core; we pin the dom0 to another core that is not
used by the domU.
Ins
Hi Doug,
On 26 February 2016 at 06:26, Doug Goldstein wrote:
> On 2/25/16 12:39 AM, fu@linaro.org wrote:
>> From: Fu Wei
>> -@deffn Command xen_linux file [arguments]
>> -Load a dom0 kernel image for xen hypervisor at the booting process of xen.
>> +@deffn Command xen_module [--nounzip] file
Hi Andrei
On 26 February 2016 at 12:48, Fu Wei wrote:
> Hi Andrei
>
> On 26 February 2016 at 01:34, Andrei Borzenkov wrote:
>> 25.02.2016 09:39, fu@linaro.org пишет:
>>> From: Fu Wei
>>>
>>> delete: xen_linux, xen_initrd, xen_xsm
>>> add: xen_module
>>>
>>> This update bases on
>>> comm
Hi Changlong,
Are you suggesting I should hold off on setting up COLO for now?
Thanks!
Victor
On Thu, Feb 25, 2016 at 8:19 PM, Changlong Xie
wrote:
> On 02/26/2016 11:38 AM, Yu-An(Victor) Chen wrote:
>
>> Hi Changlong,
>>
>> Thanks for the reply!
>>
>> So I am trying to follow your new instru
Hi Andrei
On 26 February 2016 at 01:34, Andrei Borzenkov wrote:
> 25.02.2016 09:39, fu@linaro.org пишет:
>> From: Fu Wei
>>
>> delete: xen_linux, xen_initrd, xen_xsm
>> add: xen_module
>>
>> This update bases on
>> commit 0edd750e50698854068358ea53528100a9192902
>> Author: Vladimir S
On 02/26/16 12:37, Tian, Kevin wrote:
> > From: Zhang, Haozhong
> > Sent: Tuesday, February 23, 2016 10:05 AM
> >
> > Signed-off-by: Haozhong Zhang
>
> Reviewed-by: Kevin Tian , except:
>
> > +
> > +Hardware TSC Scaling
> > +
> > +Intel VMX TSC scaling and AMD SVM TSC ratio allow the guest TSC
> From: Zhang, Haozhong
> Sent: Tuesday, February 23, 2016 10:05 AM
>
> Signed-off-by: Haozhong Zhang
Reviewed-by: Kevin Tian , except:
> +
> +Hardware TSC Scaling
> +
> +Intel VMX TSC scaling and AMD SVM TSC ratio allow the guest TSC read
> +by guest rdtsc/p increasing in a different frequency
> From: Zhang, Haozhong
> Sent: Tuesday, February 23, 2016 10:05 AM
>
> This patch adds the initialization and setup code for VMX TSC scaling.
>
> Signed-off-by: Haozhong Zhang
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
> From: Zhang, Haozhong
> Sent: Tuesday, February 23, 2016 10:05 AM
>
> This patch implements a common function hvm_scale_tsc() to scale TSC by
> using TSC scaling information collected by architecture code.
>
> Signed-off-by: Haozhong Zhang
Reviewed-by: Kevin Tian
___
> From: Zhang, Haozhong
> Sent: Tuesday, February 23, 2016 10:05 AM
>
> Both VMX TSC scaling and SVM TSC ratio use the 64-bit TSC scaling ratio,
> but the number of fractional bits of the ratio is different between VMX
> and SVM. This patch adds the architecture code to collect the number of
> fra
> From: Paul Durrant
> Sent: Thursday, February 25, 2016 11:49 PM
>
> This patch adds a new 'designs' subdirectory under docs as a repository
> for this and future design proposals.
>
> Signed-off-by: Paul Durrant
> ---
>
> For convenience this document can also be viewed in PDF at:
>
> http:/
On 02/26/2016 11:38 AM, Yu-An(Victor) Chen wrote:
Hi Changlong,
Thanks for the reply!
So I am trying to follow your new instructions, but when I am trying to do
this:
cd ~/colo-proxy/; git checkout 405527cbfa9f
I got the following error:
"error: pathspec '405527cbfa9f' did not match any fi
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, February 25, 2016 7:58 PM
>
> Instead of calling domain_page_map_to_mfn() over and over, latch the
> guest VMCS machine address unconditionally (i.e. independent of whether
> VMCS shadowing is supported by the hardware).
>
> Since t
Convert HAS_NUMA to Kconfig as CONFIG_NUMA and let CONFIG_NUMA be
defined by Kconfig.
Signed-off-by: Doug Goldstein
---
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
---
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk| 1 -
xen/drivers/acpi/Kconfig | 3 +++
xen/drive
Convert HAS_CORE_PARKING to Kconfig as CONFIG_CORE_PARKING. While
removing HAS_CORE_PARKING, removed a trailing whitespace on a near by
line.
Signed-off-by: Doug Goldstein
---
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
---
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk | 4 +---
xe
No real advantage to keeping these separate. The use case of this from
Linux is when the platform or target board has support for something but
the user wants to be given the option to disable it.
Signed-off-by: Doug Goldstein
---
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan
No real advantage to keeping these separate. The use case of this from
Linux is when the platform or target board has support for something but
the user wants to be given the option to disable it.
Signed-off-by: Doug Goldstein
---
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
---
xen/arch
Mostly just simplification, consolidation, and more conversion. The
last two were entries added while the original series was in the last
steps of review so they just needed to be finished up.
Doug Goldstein (4):
build: consolidate CONFIG_HAS_VIDEO and CONFIG_VIDEO
build: consolidate CONFIG_HA
Hi Changlong,
Thanks for the reply!
So I am trying to follow your new instructions, but when I am trying to do
this:
cd ~/colo-proxy/; git checkout 405527cbfa9f
I got the following error:
"error: pathspec '405527cbfa9f' did not match any file(s) known to git."
I assume it is just a typo? Tha
On 2/25/16 9:43 AM, Stefano Stabellini wrote:
> +++ b/docs/misc/qemu-xen-security
> @@ -0,0 +1,20 @@
> +qemu-xen (git://xenbits.xen.org/qemu-xen.git) is only supported for
> +security fixes when used together with the Xen hypervisor and only with
> +a subset of all the possible QEMU emulators. Spe
On 02/25/2016 06:31 PM, Ian Campbell wrote:
Sorry for this. Since we have no privilege to update the Wiki for a long
>time so most contents of this page are dated : (
Anyone can be granted access, it is only a manual process because of
spammers. Please create an account and then fill in the form
On 02/25/2016 11:58 PM, Wei Liu wrote:
> On Mon, Feb 22, 2016 at 10:52:25AM +0800, Wen Congyang wrote:
> [...]
>> /*
>> * Suspend the domain and send dirty memory.
>> * This is the last iteration of the live migration and the
>> @@ -558,6 +610,16 @@ static int suspend_and_send_dirty(struct xc_
On 02/25/2016 11:57 PM, Wei Liu wrote:
> On Mon, Feb 22, 2016 at 10:52:22AM +0800, Wen Congyang wrote:
> [...]
>> - * With Remus, we buffer the records sent by the primary at checkpoint,
>> + * With Remus/COLO, we buffer the records sent by the primary at checkpoint,
>> * in case the primary will
On 02/25/2016 11:57 PM, Wei Liu wrote:
> On Mon, Feb 22, 2016 at 10:52:21AM +0800, Wen Congyang wrote:
> [...]
>> +#include "libxl_osdeps.h" /* must come before any other headers */
>> +
>> +#include "libxl_internal.h"
>> +#include "libxl_colo.h"
>> +
>> +static const libxl__checkpoint_device_insta
On 02/25/2016 11:56 PM, Wei Liu wrote:
> On Mon, Feb 22, 2016 at 10:52:20AM +0800, Wen Congyang wrote:
>> Secondary vm is running in colo mode. So we will do
>> the following things again and again:
>> 1. Resume secondary vm
>>a. Send CHECKPOINT_SVM_READY to master.
>>b. If it is not the fi
On 02/25/2016 11:54 PM, Wei Liu wrote:
> On Mon, Feb 22, 2016 at 10:52:16AM +0800, Wen Congyang wrote:
>> This is used by primay to read records sent by secondary.
>>
>> Signed-off-by: Yang Hongyang
>> Signed-off-by: Wen Congyang
>> ---
>> tools/libxl/libxl_create.c | 1 +
>> tools/libxl/l
On 02/25/2016 11:54 PM, Wei Liu wrote:
> On Mon, Feb 22, 2016 at 10:52:14AM +0800, Wen Congyang wrote:
>> Add back channel support to write stream. If the write stream is
>> a back channel stream, this means the write stream is used by
>> Secondary to send some records back.
>>
>> Signed-off-by: Ya
On 02/25/2016 11:54 PM, Wei Liu wrote:
> On Mon, Feb 22, 2016 at 10:52:11AM +0800, Wen Congyang wrote:
>> It is the negotiation record for COLO.
>> Primary->Secondary:
>> control_id 0x: Secondary VM is out of sync, start a new
>> checkpoint
>> Secondary->Primary:
>> 0x
> On February 25, 2016 8:24pm, wrote:
> >>> On 25.02.16 at 13:14, wrote:
> > On February 25, 2016 4:59pm, wrote:
> >> I'd
> >> really suggest investigating alternatives. One that comes to mind
> >> would be to move acquiring/releasing pcidevs_lock into a helper
> >> function, and setting a per-C
On 02/25/2016 11:53 PM, Wei Liu wrote:
> On Mon, Feb 22, 2016 at 10:52:05AM +0800, Wen Congyang wrote:
>> In normal migration, the qemu state is passed to qemu as a parameter.
>> With COLO, secondary vm is running. So we will do the following steps
>> at every checkpoint:
>> 1. suspend both primary
flight 83965 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83965/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 3 host-install(3) broken REGR. vs. 83845
test-amd64-amd64-li
From: "Edgar E. Iglesias"
We need to re-add the Xilinx ZynqMP platform with a blacklisted
zynqmp-pm power management firmware API device. Long term we'll
be looking at finding a way for this to work but this is likely
to take a while. In the meantime, in order to keep recent kernels
from panicing
From: "Edgar E. Iglesias"
Re-add the Xilinx ZynqMP platform. This time include a
blacklisted zynqmp-pm (Power Management) device that does
not yet play nicely with Xen.
Signed-off-by: Edgar E. Iglesias
---
xen/arch/arm/platforms/Makefile| 1 +
xen/arch/arm/platforms/xilinx-zynqmp.c |
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, February 24, 2016 8:50 PM
> To: George Dunlap ; Wu, Feng
>
> Cc: Doug Goldstein ; Andrew Cooper
> ; Dario Faggioli ;
> GeorgeDunlap ; Tian, Kevin
> ; xen-devel@lists.xen.org; Keir Fraser
> Subject: Re
flight 83951 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83951/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 3 host-install(3) broken REGR. vs. 66399
build-i386-rumpuserxen
Hey again,
Thanks for turning up so quickly.
We are getting closer and closer, although (of course :-)) I have some
more comments.
However, is there a particular reason why you are keeping the RFC tag?
Until you do that, it's like saying that you are chasing feedback, but
you do not think yourse
On 2/25/16 12:39 AM, fu@linaro.org wrote:
> From: Fu Wei
> -@deffn Command xen_linux file [arguments]
> -Load a dom0 kernel image for xen hypervisor at the booting process of xen.
> +@deffn Command xen_module [--nounzip] file [arguments]
> +Load a module for xen hypervisor at the booting proce
struct gntdev_copy_batch is arguably too large to fit on the kernel stack,
and we get a warning about the stack usage in gntdev_ioctl_grant_copy:
drivers/xen/gntdev.c:949:1: error: the frame size of 1240 bytes is larger than
1024 bytes
This changes the code to us a dynamic allocation instead.
S
flight 83936 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83936/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm3 host-install(3) broken REGR. vs. 59254
test-amd64-amd64-xl-c
changes since v5:
removed unnecessary vcpu_on_replq() checks
deadline_queue_insert() returns a flag to indicate if it's
needed to re-program the timer
removed unnecessary timer checks
added helper functions to remove vcpus from queues
coding style
Changes since v4:
remo
On 2/25/16 1:17 PM, Sherry Hurwitz wrote:
> Last fall there were patches under discussion to add PVH support for AMD
> systems.
> The work was started by Mukesh Rathor of Oracle and then continued by
> Elena Ufimtseva.
> I don't see that those patches ever made it into xen unstable. Was the
> work
On 02/25/2016 02:17 PM, Sherry Hurwitz wrote:
Last fall there were patches under discussion to add PVH support for
AMD systems.
The work was started by Mukesh Rathor of Oracle and then continued by
Elena Ufimtseva.
I don't see that those patches ever made it into xen unstable. Was the
work disc
This code is extracted from the FreeBSD blkfront implementation.
Signed-off-by: Roger Pau Monné
---
tools/libxl/libxl_freebsd.c | 54 +++--
1 file changed, 52 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_freebsd.c b/tools/libxl/libxl_freeb
This is the default hotplug script for block devices. Its only job is to
copy the "params" blkback xenstore node to "physical-device".
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Wei Liu
---
tools/hotplug/FreeBSD/Makefile | 2 +-
tools/hotplug/FreeBSD/block| 2
FreeBSD blkback uses the physical-device xenstore node in order to fetch the
path to the underlying backing storage (either a block device or raw image).
This node is set by the hotplug scripts.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Tim Deegan
This series enables using hotplug scripts with the FreeBSD blkback
implementation. Since FreeBSD blkback can use both block devices and regular
RAW files as disks, the physical-device xenstore backend node is now
OS-specific, Linux and NetBSD will encode the device major and minor numbers
there
Allow FreeBSD to execute hotplug scripts when attaching disk devices.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl/libxl_freebsd.c | 114
1 file changed, 83 insertions(+), 31 deletions(-)
diff --g
Linux and NetBSD will return the device major and minor numbers encoded in
hex and separated by a ":". FreeBSD on the other hand returns the path to
the block device or image file.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl/libxl.c
The fields that are printed might not be set in the case of a failure, which
generates a segmentation fault.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl/libxl.c | 5 +
1 file changed, 1 insertion(+), 4 deletions(-)
diff --git a/tools/li
The current code in libxl assumed that vdev is equal to local device, but
this is only true for Linux systems. In other OSes the local device can use
a nomenclature completely different from the virtual device one.
Move the current libxl__devid_to_localdev Linux implementation out of the
OS-specif
Last fall there were patches under discussion to add PVH support for AMD
systems.
The work was started by Mukesh Rathor of Oracle and then continued by
Elena Ufimtseva.
I don't see that those patches ever made it into xen unstable. Was the
work discontinued
because of a change of focus to HVMlit
On 2/25/16 9:59 AM, Andrew Cooper wrote:
> Xen now builds on x86 with Clang 3.5 and 3.8. Update README to reflect this.
>
> Mark Clang as no longer a permitted failure in Travis, to prevent future
> regressions slipping back in.
>
> Signed-off-by: Andrew Cooper
> ---
> CC: Ian Campbell
> CC: I
flight 83944 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83944/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 3 host-install(3) broken REGR. vs. 83847
Test
22.02.2016 16:14, Juergen Gross пишет:
> On 22/02/16 13:48, Daniel Kiper wrote:
>> On Mon, Feb 22, 2016 at 01:30:30PM +0100, Juergen Gross wrote:
>>> On 22/02/16 13:18, Daniel Kiper wrote:
On Mon, Feb 22, 2016 at 10:29:04AM +0100, Juergen Gross wrote:
> On 22/02/16 10:17, Daniel Kiper wrot
The printk formats %*ph{C,D,N} are chosen to be compatible with their Linux
counterparts.
Sample:
(XEN) buf: 00 01 03 07 78 65 6e 00
(XEN) buf: 00:01:03:07:78:65:6e:00
(XEN) buf: 00-01-03-07-78-65-6e-00
(XEN) buf: 0001030778656e00
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Ti
On Thu, 2016-02-25 at 12:29 -0500, Tianyang Chen wrote:
> On 2/25/2016 5:34 AM, Dario Faggioli wrote:
> > >
> > Which one ASSERT() fails?
> >
> The replq_insert() fails because it's already on the replenishment
> queue
> when rt_vcpu_wake() is trying to insert a vcpu again.
>
> (XEN) Xen call t
22.02.2016 11:24, Daniel Kiper пишет:
>
> Are you sure that grub_errno is always set to GRUB_ERR_NONE
> if any GRUB2 function finished successfully?
grub_errno is reset by command parser before command execution (or after
previous command finished actually). During command execution there is
no g
25.02.2016 09:39, fu@linaro.org пишет:
> From: Fu Wei
>
> delete: xen_linux, xen_initrd, xen_xsm
> add: xen_module
>
> This update bases on
> commit 0edd750e50698854068358ea53528100a9192902
> Author: Vladimir Serbinenko
> Date: Fri Jan 22 10:18:47 2016 +0100
>
> xen_b
On 2/25/2016 5:34 AM, Dario Faggioli wrote:
+ * it should be re-inserted back to the replenishment queue.
+ */
+if ( now >= svc->cur_deadline)
+{
+rt_update_deadline(now, svc);
+__replq_remove(ops, svc);
+}
+
+if( !__vcpu_on_replq(svc) )
+__replq_
On 22/02/16 21:02, Joao Martins wrote:
> Hey!
>
> This series are a follow-up on the thread about the performance
> of hard-pinned HVM guests. Here we propose allowing libxl to
> change how the CPU topology looks like for the HVM guest, which can
> favor certain workloads as depicted by Elena on t
>>> On 22.02.16 at 22:02, wrote:
> Currently the initial_apicid is set vcpu_id * 2 which makes it difficult
> for the toolstack to manage how is the topology seen by the guest.
> Instead of forcing procpkg and proccount to be VCPUID * 2, instead we
> set it to max vcpuid on proccount to max_vcpu_i
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
> Beulich
> Sent: 25 February 2016 16:48
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org
> Subject: Re: [Xen-devel] [PATCH] docs/design: introduce
> HVMMEM_ioreq_serverX types
>
> >>> O
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 25 February 2016 16:28
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Subject: Re: [Xen-devel] [PATCH] docs/design: introduce
> HVMMEM_ioreq_serverX types
>
> On 25/02/16 15:49, Paul Durrant wrote:
flight 83932 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83932/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 65543
test-amd64-i386-
Some hardware (e.g. Dell studio 1555 laptops) require SMIs to be
called on physical cpu 0 only. Linux drivers like dcdbas or i8k try
to achieve this by pinning the running thread to cpu 0, but in Dom0
this is not enough: the vcpu must be pinned to physical cpu 0 via
Xen, too.
Add a stable hypercal
>>> On 25.02.16 at 16:49, wrote:
> +To allow an IOREQ server to claim or release a claim to a type a new pair
> +of hypercalls will be introduced:
> +
> +- HVMOP\_map\_mem\_type\_to\_ioreq\_server
> +- HVMOP\_unmap\_mem\_type\_from\_ioreq\_server
> +
> +and an associated argument structure:
> +
>
On Thu, Feb 25, 2016 at 11:16:18AM -0500, Boris Ostrovsky wrote:
> On 02/25/2016 09:55 AM, Anthony PERARD wrote:
> >Hi all,
> >
> >Many changes in V3:
> > no more cmdline, but use each modules' cmdline to provide a name for it.
> > in libxc:
> > - use xc_dom_alloc_segment() to load modules.
1 - 100 of 251 matches
Mail list logo