flight 86813 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86813/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 86454
test
Hi Roger,
I installed Xen from the source yesterday.
Thanks and regards
,
Paulina Szubarczyk
On 21 March 2016 at 17:28, Roger Pau Monné wrote:
> On Mon, 21 Mar 2016, Paulina Szubarczyk wrote:
>
> > Hi Lars,
> >
> > Thank you for your answer. I am looking forward to further information
> fro
On 03/05/2016 02:05 AM, Ian Jackson wrote:
+static void colo_proxy_async_call(libxl__egc *egc,
+ libxl__colo_save_state *css,
+ void func(libxl__colo_save_state *),
+ libxl__ev_child_callback callba
CC: lizhij...@cn.fujitsu.com
On 03/22/2016 01:44 PM, Changlong Xie wrote:
On 03/05/2016 01:59 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 22/27] COLO proxy: implement
setup/teardown of COLO proxy module"):
From: Wen Congyang
setup/teardown of COLO proxy module.
we use netlink to
On 03/05/2016 01:59 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 22/27] COLO proxy: implement setup/teardown of
COLO proxy module"):
From: Wen Congyang
setup/teardown of COLO proxy module.
we use netlink to communicate with proxy module.
About colo-proxy module:
https://lkml.org/l
On 03/05/2016 02:09 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 27/27] cmdline switches and config vars to control
colo-proxy"):
From: Wen Congyang
Add cmdline switches to 'xl migrate-receive' command to specify
a domain-specific hotplug script to setup COLO proxy.
Add a new con
On 03/14/2016 05:13 PM, Wen Congyang wrote:
On 03/12/2016 06:25 AM, Konrad Rzeszutek Wilk wrote:
+extern int colo_proxy_setup(libxl__colo_proxy_state *cps);
+extern void colo_proxy_teardown(libxl__colo_proxy_state *cps);
#endif
diff --git a/tools/libxl/libxl_colo_proxy.c b/tools/libxl/libxl_co
On 17/03/2016 09:41, Shannon Zhao wrote:
From: Shannon Zhao
Create a DT for Dom0 for ACPI-case only. DT contains minimal required
informations such as Dom0 bootargs, initrd, efi description table and
address of uefi memory table.
Also port the document of this device tree bindings from Linux
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Map the UEFI and ACPI tables which we created to non-RAM space in Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 15 +++
1 file changed, 15 insertions(
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
[...]
+static int prepare_acpi(struct domain *d, struct kernel_info *kinfo)
+{
+int rc = 0;
+int order;
+
+rc = estimate_acpi_efi_size(d, kinfo);
+if ( rc != 0 )
+return rc;
+
+order = get_order_from_bytes(d->arch.
flight 86811 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86811/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
test-amd64-amd64-xl-c
Hi Julien,
Do you have any other comments to be addressed?
On 03/16/2016 02:08 PM, Shanker Donthineni wrote:
> From: Vikram Sethi
>
> ARMv8 architecture allows performing prefetch data/instructions
> from memory locations marked as normal memory. Prefetch does not
> mean that the data/instructio
On 03/19/2016 05:55 PM, osstest service owner wrote:
> flight 86625 libvirt real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/86625/
There was a fair bit of turmoil after the libvirt NSS module got merged. AFAIK,
the various build issues and 'make check' failures have been resolved.
i get xen running on omap5 board with linux dom0 and ubuntu 14.04 lts file
system
i Get the linux kernel source from
git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
now i'm trying to install some guests but the problem i don't have internet
connexion
when typing "if
On 03/15/2016 12:57 PM, Olaf Hering wrote:
On Tue, Mar 01, Boris Ostrovsky wrote:
on domU:
[root@dhcp-burlington7-2nd-B-east-10-152-55-140 ~]# od -N 1 -j 4096 /dev/mem
od: /dev/mem: read error: Bad address
001
[root@dhcp-burlington7-2nd-B-east-10-152-55-140 ~]#
with
(XEN) mm.c:1767:d14v0
flight 86788 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86788/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 60684
test-amd64
From: George Dunlap
pygrub and qemuu need to be able to access a VM's disks locally in
order to be able to pull out the kernel and provide emulated disk
access, respectively. This can be done either by accessing the local
disk directly, or by plugging the target disk into dom0 to allow
access.
From: Ian Jackson
DO NOT APPLY. This is provided for future reference, as a starting
point to clean up the disk path. A simple fix will make it "work",
but will introduce a subtle race condition.
* Change block-common.sh on Linux to only write physical-device-path
with the path of the device
From: George Dunlap
Testing the hotplug external script path at the moment involves
actually setting up one of the alternate datapaths (blktap, iscsi,
&c). Simplify testing by making a script which does a simple loopback,
but still has a target that can't be used directly.
To use:
script=block
Signed-off-by: George Dunlap
---
Changes since v1:
- Attempt to make a clear distinction between custom hotplug scripts
and the script called for raw physical devices and files
CC: Ian Jackson
CC: Wei Liu
CC: Roger Pau Monne
---
docs/misc/block-scripts.txt | 101 ++
Reorganize the qemuu disk argument code to make a clean separation
between finding a file to use, and constructing the parameters:
* Rename pdev_path to target_path
* Only use qemu_disk_format_string() in circumstances where qemu may
be interpreting the disk (i.e., backend==QDISK). In all other
Regardless of whether we're running a custom hotplug script or using
normal phy: or file:, the "block" script will be run, which will set
all the necessary xenstore nodes.
In fact, writing this value here prevents the block script from
accomplishing its only purpose: to detect duplicate physical b
Change block-common.sh on Linux to write physical-device-path with the
path of the device node, in addition to physical-device with its
major:minor numbers.
Signed-off-by: George Dunlap
---
NB that a later patch in this series introduces some documentation for
the block script protocol. If it's
In order for HVM domains to provide emulated access to disks provided
by hotplug scripts, qemu needs access to a "cooked" version of the
disk. In the case of hotplug scripts, this "cooked" version is
available in the form of a block device passed to blkback. Make this
"cooked" version available t
From: George Dunlap
Move pygrub checks for local access ability into a separate function.
Also reorganize libxl__device_disk_local_initiate_attach so that we
don't initialize dls->disk unless we actually end up doing a local
attach.
Signed-off-by: George Dunlap
---
Changes since v1:
- Stylisti
From: George Dunlap
qemu can also access disks which will be provided with a qdisk backend
directly; add a flag to libxl__device_disk_find_local_path to indicate
whether to check for qdisk direct access.
Call libxl__device_disk_find_local_path() for most paths. If we can't
find a local path, pr
flight 86792 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86792/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-i386-xl-qemuu-ovm
>>> On 21.03.16 at 18:04, wrote:
> On Tue, 15 Mar 2016, Jan Beulich wrote:
>> >>> On 14.03.16 at 18:55, wrote:
>> > --- a/xen/include/public/xen.h
>> > +++ b/xen/include/public/xen.h
>> > @@ -841,6 +841,37 @@ typedef struct start_info start_info_t;
>> > */
>> > #define XEN_HVM_START_MAGIC_VALU
>>> On 15.03.16 at 16:35, wrote:
> @@ -87,6 +88,129 @@ static void update_domain_cpuid_info(struct domain *d,
> d->arch.x86_model = (ctl->eax >> 4) & 0xf;
> if ( d->arch.x86 >= 0x6 )
> d->arch.x86_model |= (ctl->eax >> 12) & 0xf0;
> +
> +if ( is_pv_domain(d)
Hello,
On Tue, 15 Mar 2016, Jan Beulich wrote:
> >>> On 14.03.16 at 18:55, wrote:
> > --- a/xen/include/public/xen.h
> > +++ b/xen/include/public/xen.h
> > @@ -841,6 +841,37 @@ typedef struct start_info start_info_t;
> > */
> > #define XEN_HVM_START_MAGIC_VALUE 0x336ec578
> >
> > +#if defin
>>> On 15.03.16 at 16:35, wrote:
> And use them in preference to cpumask_defaults on context switch. HVM
> domains
> must not be masked (to avoid interfering with cpuid calls within the guest),
> so always lazily context switch to the host default.
>
> Signed-off-by: Andrew Cooper
Reviewed-by
On 21/03/16 16:51, Jan Beulich wrote:
On 15.03.16 at 16:35, wrote:
>> +/* Fast-forward bits - Must be set. */
>> +if (ecx & cpufeat_mask(X86_FEATURE_XSAVE))
>> +ecx |= cpufeat_mask(X86_FEATURE_OSXSAVE);
> Wouldn't you think it would be better to als
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Create a few EFI memory descriptors to tell Dom0 the RAM region
s/a few//
information, ACPI table regions and EFI tables reserved resions.
s/resions/regions/
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
>>> On 15.03.16 at 16:35, wrote:
> + /* Fast-forward bits - Must be set. */
> + if (ecx & cpufeat_mask(X86_FEATURE_XSAVE))
> + ecx |= cpufeat_mask(X86_FEATURE_OSXSAVE);
Wouldn't you think it would be better to also handle PKU/OSPKE
here, just in case AM
>>> On 15.03.16 at 16:35, wrote:
> This patch is best reviewed as its end result rather than as a diff, as it
> rewrites almost all of the setup.
>
> On the BSP, cpuid information is used to evaluate the potential available
> set
> of masking MSRs, and they are unconditionally probed, filling in
>>> On 21.03.16 at 17:03, wrote:
> On Mon, Mar 21, 2016 at 10:49 AM, Jan Beulich wrote:
> On 21.03.16 at 16:18, wrote:
>>> On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
>>> On 18.03.16 at 22:26, wrote:
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.
On Mon, 21 Mar 2016, Paulina Szubarczyk wrote:
> Hi Lars,
>
> Thank you for your answer. I am looking forward to further information from
> you.
Hello Paulina,
Sorry for the delay, I was away last week and I'm just trying to catch up
with all my email.
As a first step you should look into
>>> On 15.03.16 at 16:35, wrote:
> --- a/xen/arch/x86/cpu/common.c
> +++ b/xen/arch/x86/cpu/common.c
> @@ -36,6 +36,12 @@ integer_param("cpuid_mask_ext_ecx",
> opt_cpuid_mask_ext_ecx);
> unsigned int opt_cpuid_mask_ext_edx = ~0u;
> integer_param("cpuid_mask_ext_edx", opt_cpuid_mask_ext_edx);
>
>>> On 15.03.16 at 16:35, wrote:
> Before c/s 44e24f8567 "x86: don't call generic_identify() redundantly", the
> commandline-provided masks would take effect in Xen's view of the features.
>
> As the masks got applied after the query for features, the redundant call to
> generic_identify() would
>>> On 15.03.16 at 16:35, wrote:
> case 0x8001:
> -/* We expose RDTSCP feature to guest only when
> - tsc_mode == TSC_MODE_DEFAULT and host_tsc_is_safe() returns 1 */
> -if ( d->arch.tsc_mode != TSC_MODE_DEFAULT ||
> - !host_tsc_is_safe() )
> -
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
[...]
diff --git a/xen/arch/arm/efi/efi-dom0.c b/xen/arch/arm/efi/efi-dom0.c
index 90a7699..b8a062c 100644
--- a/xen/arch/arm/efi/efi-dom0.c
+++ b/xen/arch/arm/efi/efi-dom0.c
@@ -48,3 +48,47 @@ size_t __init estimate_efi_size(int mem_nr_bank
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Copy RSDP table and replace rsdp->xsdt_physical_address with new address
^ the
of XSDT table, so it can point to the right XSDT table.
Signed-off-by: Shannon
On Mon, Mar 21, 2016 at 10:49 AM, Jan Beulich wrote:
On 21.03.16 at 16:18, wrote:
>> On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
>> On 18.03.16 at 22:26, wrote:
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -338,24 +338,64 @@ DEFINE_XEN_G
Title: Map all other tables into DOM0 memory.
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Map all other tables to Dom0 using 1:1 mappings.
s/to/into/
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 26 ++
Title: to map/unmap
On 17/03/2016 09:40, Shannon Zhao wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 433952a..17be6ad 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/include/asm-arm/p2m.h
@@ -144,6 +144,16 @@ int p2m_cache_flush(struct domain *d, xen_pfn_t start
>>> On 21.03.16 at 16:26, wrote:
> On 17/03/2016 09:40, Shannon Zhao wrote:
>> +gicd = container_of(header, struct acpi_madt_generic_distributor,
>> header);
>> +ACPI_MEMCPY(base_ptr + table_size, gicd,
>> +sizeof(struct acpi_madt_generic_distributor));
>> +table_size
>>> On 21.03.16 at 16:18, wrote:
> On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
> On 18.03.16 at 22:26, wrote:
>>> --- a/xen/include/public/domctl.h
>>> +++ b/xen/include/public/domctl.h
>>> @@ -338,24 +338,64 @@ DEFINE_XEN_GUEST_HANDLE(xen_domctl_max_vcpus_t);
>>> #define XEN_SCHEDU
On 21/03/16 15:18, Chong Li wrote:
> On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
> On 18.03.16 at 22:26, wrote:
>>> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
>>> to independently get and set the scheduling parameters of each
>>> vCPU of a domain
>>>
>>> Signed-off
flight 86761 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86761/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399
build-i386-rumpuserxen
>>> On 15.03.16 at 16:35, wrote:
> When clearing a cpu cap, clear all dependent features. This avoids having a
> featureset with intermediate features disabled, but leaf features enabled.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
_
On 03/21/2016 06:49 AM, Ján Tomko wrote:
> On Mon, Feb 29, 2016 at 09:00:44PM -0700, Jim Fehlig wrote:
>> An expanded V2 of
>>
>> https://www.redhat.com/archives/libvir-list/2016-February/msg00140.html
>>
>> In V2, the feature is extended with a state='on|off' attribute to
>> allow differentiating
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Copy and modify XSDT table before passing it to Dom0. Repalce the entry
s/Repalce/Replace/
value of the copied table. Add a new entry for STAO table as well. And
keep entry value of other reused tables unchanged.
Sign
>>> On 15.03.16 at 16:35, wrote:
> @@ -18,12 +19,34 @@ uint32_t __read_mostly hvm_featureset[FSCAPINTS];
>
> static void __init sanitise_featureset(uint32_t *fs)
> {
> +uint32_t disabled_features[FSCAPINTS];
> unsigned int i;
>
> for ( i = 0; i < FSCAPINTS; ++i )
> {
>
On 03/21/2016 03:27 PM, Andrew Cooper wrote:
> On 21/03/16 15:10, Jan Beulich wrote:
> On 17.03.16 at 17:12, wrote:
>>> --- a/xen/include/public/xen.h
>>> +++ b/xen/include/public/xen.h
>>> @@ -614,10 +614,14 @@ struct vcpu_time_info {
>>> */
>>> uint32_t tsc_to_system_mul;
>>>
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Create STAO table for Dom0. This table is used to tell Dom0 whether it
should ignore UART defined in SPCR table or the ACPI namespace names.
Look at below url for details:
http://wiki.xenproject.org/mediawiki/images/0/02/
On 17/03/16 18:11, Ian Jackson wrote:
> George Dunlap writes ("[PATCH 4/8] libxl: Move check for local access to a
> funciton"):
>> +static char * libxl__device_disk_find_local_path(libxl__gc *gc,
>> + const libxl_device_disk
>> *disk) {
> ...
>> +
On 21/03/16 15:10, Jan Beulich wrote:
On 17.03.16 at 17:12, wrote:
>> --- a/xen/include/public/xen.h
>> +++ b/xen/include/public/xen.h
>> @@ -614,10 +614,14 @@ struct vcpu_time_info {
>> */
>> uint32_t tsc_to_system_mul;
>> int8_t tsc_shift;
>> -int8_t pad1[3];
>> +
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Copy main MADT table contents and distributor subtable from physical
ACPI MADT table. Make other subtables through the callback of
gic_hw_ops.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
With the 2 cha
On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
On 18.03.16 at 22:26, wrote:
>> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
>> to independently get and set the scheduling parameters of each
>> vCPU of a domain
>>
>> Signed-off-by: Chong Li
>> Signed-off-by: Meng Xu
>
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Add a new member in gic_hw_operations which is used to creat MADT table
s/create/create/
for Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/gic-v2.c | 34 +++
On 20/03/16 00:23, Paul Gortmaker wrote:
> [[PATCH v2 0/5] xen: avoid module usage in non-modular code] On 21/02/2016
> (Sun 19:06) Paul Gortmaker wrote:
>
>> This series of commits is a part of a larger project to ensure
>> people don't reference modular support functions in non-modular
>> code.
>>> On 17.03.16 at 17:12, wrote:
> --- a/xen/include/public/xen.h
> +++ b/xen/include/public/xen.h
> @@ -614,10 +614,14 @@ struct vcpu_time_info {
> */
> uint32_t tsc_to_system_mul;
> int8_t tsc_shift;
> -int8_t pad1[3];
> +int8_t flags;
For use as flags I'm sure thi
>>> On 21.03.16 at 15:48, wrote:
> On 18/03/16 20:04, Dario Faggioli wrote:
>> --- a/xen/common/schedule.c
>> +++ b/xen/common/schedule.c
>> @@ -1491,9 +1491,9 @@ static int cpu_schedule_up(unsigned int cpu)
>> if ( idle_vcpu[cpu] == NULL )
>> return -ENOMEM;
>>
>> -if ( (ops.a
>>> On 21.03.16 at 15:22, wrote:
> Or to take a different tack: I understand that you don't think there's
> no particular benefit to adding a comment in cases like this; could
> you explain to me why you think it would have a significant cost?
There's no significant cost here. Yet I do think that
On Mon, Mar 21, 2016 at 06:21:20AM +0100, Juergen Gross wrote:
[...]
> > 4. Load bios via toolstack
>
> What about my pending "pin override" tools related patches? Hypervisor
> parts are already committed.
>
That was omitted, because as far as I can tell all toolstack patches
were already acked
On 18/03/16 20:05, Dario Faggioli wrote:
> From: Uma Sharma
>
> and, while we are adjusting signedness of opt_load_window_shift,
> make also prv->load_window_shift unsigned, as approapriate.
>
> Signed-off-by: Uma Sharma
> Signed-off-by: Dario Faggioli
> ---
> Cc: George Dunlap
> Cc: Juergen
On 18/03/16 20:04, Dario Faggioli wrote:
> The .alloc_pdata scheduler hook must, before this change,
> be implemented by all schedulers --even those ones that
> don't need to allocate anything.
>
> Make it possible to just use the SCHED_OP(), like for
> the other hooks, by using ERR_PTR() and IS_E
On 21/03/16 15:28, George Dunlap wrote:
> On 18/03/16 08:11, Juergen Gross wrote:
>> On 17/03/16 17:06, George Dunlap wrote:
>>> On Thu, Mar 10, 2016 at 3:00 PM, Juergen Gross wrote:
Today the device model (qemu) is started for a pv domain only in case
a device requiring qemu is specifie
On 18/03/16 08:11, Juergen Gross wrote:
> On 17/03/16 17:06, George Dunlap wrote:
>> On Thu, Mar 10, 2016 at 3:00 PM, Juergen Gross wrote:
>>> Today the device model (qemu) is started for a pv domain only in case
>>> a device requiring qemu is specified in the domain configuration
>>> (qdisk, vfb,
It is not a good diagram. Looking at my OS diagram.
For example, Xen have Dom0, DomU and
On Monday, March 21, 2016 6:34 AM, Andrew Cooper
wrote:
On 21/03/16 13:28, Jason Long wrote:
Don't top post.
> Thank you but I need a diagram like below. It is an diagram about OS
> components :
>
>
>>> On 18.03.16 at 20:04, wrote:
> RTDS is basically identical to Credit2, as far as scheduler
> lock (re)mapping is concerned. Therefore, the same analisys
> and considerations expressed for the previous patch ("xen:
> sched: prepare a .switch_sched hook for Credit2"), applies
> to it to.
Yet th
Hello,
My initial contribution can be found at:
http://lists.xen.org/archives/html/xen-devel/2015-10/msg02921.html
On Mon, Mar 21, 2016 at 4:56 PM, Lars Kurth
wrote:
> Hi Lasya, (adding xen-devel@)
>
> On 21 Mar 2016, at 11:17, Lasya Venneti wrote:
>
> Hi Lars, Jesus!
>
> This is Lasya from I
On Mon, Mar 21, 2016 at 1:26 PM, Jan Beulich wrote:
On 21.03.16 at 13:04, wrote:
>> On Thu, Mar 17, 2016 at 4:08 PM, Ian Jackson
>> wrote:
>>> Konrad Rzeszutek Wilk writes ("[PATCH v4 08/34] vmap: Make the while loop
>>> less fishy."):
error:
-while ( i-- )
-f
>>> On 18.03.16 at 20:04, wrote:
> --- a/xen/include/xen/sched-if.h
> +++ b/xen/include/xen/sched-if.h
> @@ -9,6 +9,7 @@
> #define __XEN_SCHED_IF_H__
>
> #include
> +#include
>
> /* A global pointer to the initial cpupool (POOL0). */
> extern struct cpupool *cpupool0;
There is no visibl
On 21/03/16 14:42, Jan Beulich wrote:
On 21.03.16 at 13:24, wrote:
>> @@ -758,9 +759,14 @@ struct smp_sync_call_struct {
>> static void smp_call_sync_callback(struct work_struct *work)
>> {
>> struct smp_sync_call_struct *sscs;
>> +unsigned int cpu = smp_processor_id();
>
> So thi
On 21/03/16 13:42, Jan Beulich wrote:
>
> Also don't you need to call smp_processor_id() after preempt_disable()?
I suggest using get_cpu()/put_cpu() here.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
flight 86783 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86783/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 86536
Tests which did not succe
>>> On 21.03.16 at 13:24, wrote:
> @@ -758,9 +759,14 @@ struct smp_sync_call_struct {
> static void smp_call_sync_callback(struct work_struct *work)
> {
> struct smp_sync_call_struct *sscs;
> + unsigned int cpu = smp_processor_id();
So this obtains the vCPU number, yet ...
> ss
On 21/03/16 11:53, Jan Beulich wrote:
+XEN_CPUFEATURE(X2APIC,1*32+21) /*A Extended xAPIC */
>>> Does this make sense for PV?
>> It is currently visible, and we already have to leak APIC through to PV
>> guests.
> Having to leak on piece of state doesn't mean when need to leak
> more,
>>> On 18.03.16 at 22:26, wrote:
> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
> to independently get and set the scheduling parameters of each
> vCPU of a domain
>
> Signed-off-by: Chong Li
> Signed-off-by: Meng Xu
> Signed-off-by: Sisu Xi
>
> ---
> Changes on PATCH v7:
>
On 21/03/16 13:28, Jason Long wrote:
Don't top post.
> Thank you but I need a diagram like below. It is an diagram about OS
> components :
>
> http://www.c-jump.com/CIS24/Slides/Booting/images/os_components.png
>
> Can you show me similar diagram for Xen?
http://lmgtfy.com/?q=diagram+of+xen+com
Thank you but I need a diagram like below. It is an diagram about OS components
:
http://www.c-jump.com/CIS24/Slides/Booting/images/os_components.png
Can you show me similar diagram for Xen?
On Monday, March 21, 2016 3:42 AM, Lars Kurth wrote:
> On 20 Mar 2016, at 21:04, Daniele Palumbo w
>>> On 21.03.16 at 13:04, wrote:
> On Thu, Mar 17, 2016 at 4:08 PM, Ian Jackson
> wrote:
>> Konrad Rzeszutek Wilk writes ("[PATCH v4 08/34] vmap: Make the while loop
>> less fishy."):
>>> error:
>>> -while ( i-- )
>>> -free_domheap_page(mfn_to_page(mfn_x(mfn[i])));
>>> +while
On 21/03/16 11:45, Joao Martins wrote:
>
> All fixed, though I found one change missing in this series, specifically on
> time_calibration_std_rendezvous. Otherwise this commit would break
> compilation.
> See chunk below for the change I am adding:
>
> @@ -1377,7 +1380,7 @@ static void time_calib
>>> On 18.03.16 at 19:44, wrote:
> On 17/03/16 09:40, Shannon Zhao wrote:
>> --- /dev/null
>> +++ b/xen/arch/arm/efi/efi-dom0.c
>> @@ -0,0 +1,50 @@
>> +/*
>> + * efi-dom0.c - Domain0 EFI Boot Support
>> + *
>> + * Copyright (C) 2016 Shannon Zhao
>> + *
>> + *
>> ~~~
flight 86747 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86747/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
86491
test-amd64-i38
>>> On 18.03.16 at 20:22, wrote:
>> > + * return the number of bytes requested for the operation. Or an
>> > + * negative value if an error is encountered.
>> > + */
>> > +
>> > +typedef uint64_t xen_version_op_val_t;
>> > +DEFINE_XEN_GUEST_HANDLE(xen_version_op_val_t);
>> > +
>> > +typedef void x
On Mon, Feb 29, 2016 at 09:00:44PM -0700, Jim Fehlig wrote:
> An expanded V2 of
>
> https://www.redhat.com/archives/libvir-list/2016-February/msg00140.html
>
> In V2, the feature is extended with a state='on|off' attribute to
> allow differentiating the 'on' and 'off' states with not set (or hyp
>>> On 18.03.16 at 20:59, wrote:
> I know I copied and pasted it and I must have done something uncanny.
>
> Anyhow this is what the change looks like now (I've retained the Reviewed
> and Ack as I think this change is mostly cosmetical in nature?)
I think that's okay.
> v5: Add Acks, make BUIL
Use smp_call_sync_on_phys_cpu() to raise SMI on cpu 0.
Signed-off-by: Juergen Gross
---
drivers/firmware/dcdbas.c | 46 --
1 file changed, 20 insertions(+), 26 deletions(-)
diff --git a/drivers/firmware/dcdbas.c b/drivers/firmware/dcdbas.c
index 829ee
Add generic virtualization support for pinning the current vcpu to a
specified physical cpu. As this operation isn't performance critical
(a very limited set of operations like BIOS calls and SMIs is expected
to need this) just add a hypervisor specific indirection.
Such a pinning should last as s
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Copy and modify FADT table before passing it to Dom0. Set PSCI_COMPLIANT
and PSCI_USE_HVC.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
Acked-by: Julien Grall
Regards,
--
Julien Grall
__
Some hardware (e.g. Dell Studio laptops) require special functions to
be called on physical cpu 0 in order to avoid occasional hangs. When
running as dom0 under Xen this could be achieved only via special boot
parameters (vcpu pinning) limiting the hypervisor in it's scheduling
decisions.
This pat
Import the actual version of include/xen/interface/sched.h from Xen.
Signed-off-by: Juergen Gross
---
include/xen/interface/sched.h | 100 ++
1 file changed, 82 insertions(+), 18 deletions(-)
diff --git a/include/xen/interface/sched.h b/include/xen/interf
Some hardware models (e.g. Dell Studio 1555 laptops) require calls to
the firmware to be issued on cpu 0 only. As Dom0 might have to use
these calls, add xen_pin_vcpu() to achieve this functionality.
In case either the domain doesn't have the privilege to make the
related hypercall or the hypervis
Use the smp_call_sync_on_phys_cpu() function to call system management
mode on cpu 0.
Signed-off-by: Juergen Gross
---
drivers/hwmon/dell-smm-hwmon.c | 27 ---
1 file changed, 12 insertions(+), 15 deletions(-)
diff --git a/drivers/hwmon/dell-smm-hwmon.c b/drivers/hwmon/d
On some hardware models (e.g. Dell Studio 1555 laptop) some hardware
related functions (e.g. SMIs) are to be executed on physical cpu 0
only. Instead of open coding such a functionality multiple times in
the kernel add a service function for this purpose. This will enable
the possibility to take sp
>>> On 21.03.16 at 07:18, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Friday, March 18, 2016 5:49 PM
>>
>> >>> On 18.03.16 at 10:38, wrote:
>> > On Fri, 2016-03-18 at 03:29 -0600, Jan Beulich wrote:
>> >> >
>> >> Not sure what exactly you're asking for: As said, we first nee
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
These tables are aligned with 64bit.
Signed-off-by: Shannon Zhao
---
xen/arch/arm/acpi/lib.c| 15 +++
xen/include/asm-arm/acpi.h | 2 ++
2 files changed, 17 insertions(+)
diff --git a/xen/arch/arm/a
Hi Doug,
Can you please help on questions/problems where I am stuck?
Deadline for applying for outreachy is coming closer.
Regards,
Sabiya
Hi Doug,
I am done with building of xen source.Now, I have started looking
at source files and identifying changes required for given task.
As you
1 - 100 of 126 matches
Mail list logo