>>> On 03.10.16 at 12:09, wrote:
> I've added the following patch to my queue, in order to allow the user to
> select whether they want to use HAP or shadow, I've tested it locally and
> there seems to be no issues in building a PVHv2 Dom0 using shadow.
Hmm, two remarks: For one, I'm not convin
Anthony, I've split the reorganization and code style issues in a separate
patch series which I've posted today:
http://markmail.org/message/feu6u3f7py5vt77v
Thanks
On Mon, Jul 25, 2016 at 5:09 PM, Anthony PERARD
wrote:
> On Sun, Jul 10, 2016 at 02:47:31PM +0300, Emil Condrea wrote:
>> Emil Co
>>> On 03.10.16 at 18:23, wrote:
> On Fri, Sep 30, 2016 at 09:04:24AM -0600, Jan Beulich wrote:
>> >>> On 27.09.16 at 17:57, wrote:
>> > So that it can be called from the Dom0 builder.
>>
>> Why would the Dom0 builder need to call it, when it doesn't so far?
>
> IMHO, I find it useful to print
* xenstore_update -> xen_pvdev.c
* xenstore_update_fe -> xen_frontend.c
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 43 +--
hw/xen/xen_frontend.c | 18 ++
hw/xen/xen_pvdev.c| 24
Prepare xen_be_evtchn_event to be shared with frontends:
* xen_be_evtchn_event -> xen_pv_evtchn_event
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_pvdev.c | 2 +-
include/hw/xen/xen_pvdev.h | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff -
xen_be_frontend_changed -> xen_fe_frontend_changed
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_frontend.c | 4 ++--
include/hw/xen/xen_frontend.h | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_
Prepare xen_be_del_xendev to be shared with frontends:
* xen_be_del_xendev -> xen_pv_del_xendev
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_pvdev.c | 2 +-
include/hw/xen/xen_pvdev.h | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a
Prepare xen_be_unbind_evtchn to be shared with frontends:
* xen_be_unbind_evtchn -> xen_pv_unbind_evtchn
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c| 2 +-
hw/char/xen_console.c | 2 +-
hw/display/xenfb.c | 2 +-
hw/net/xen_nic.c | 2 +-
hw/usb/xen-usb.c
The name of the functions moved to xen_pvdev.c:
* xenstore_cleanup_dir
* xen_config_cleanup
* xenstore_mkdir
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 49 -
hw/xen/xen_pvdev.c | 51 +
Prepare xen_be_send_notify to be shared with frontends:
* xen_be_send_notify -> xen_pv_send_notify
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c| 4 ++--
hw/char/xen_console.c | 4 ++--
hw/display/xenfb.c | 8
hw/net/xen_nic.c | 4 ++--
hw/usb/xen-u
The purpose of the new file is to store generic functions shared by frontend
and backends such as xenstore operations, xendevs.
Signed-off-by: Quan Xu
Signed-off-by: Emil Condrea
---
hw/xen/Makefile.objs | 2 +-
hw/xen/xen_backend.c | 126 +---
Prepare xen_be_find_xendev to be shared with frontends:
* xen_be_find_xendev -> xen_pv_find_xendev
Signed-off-by: Emil Condrea
---
hw/display/xenfb.c | 4 ++--
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_pvdev.c | 2 +-
include/hw/xen/xen_pvdev.h | 2 +-
4 files changed, 5 ins
Prepare xen_be_printf to be used by both backend and frontends:
* xen_be_printf -> xen_pv_printf
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c| 58 +++---
hw/char/xen_console.c | 10
hw/display/xenfb.c | 42
Fixes:
* WARNING: line over 80 characters
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c | 3 ++-
hw/char/xen_console.c| 6 --
hw/display/xenfb.c | 30 --
hw/net/xen_nic.c | 12
hw/xen/xen_backend.c
Its purpose is to store frontend related functions.
Signed-off-by: Quan Xu
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c | 1 +
hw/display/xenfb.c| 1 +
hw/net/xen_nic.c | 1 +
hw/usb/xen-usb.c | 1 +
hw/xen/Makefile.objs | 2 +
* move xendevs qtail to xen_pvdev.c
* change xen_be_get_xendev to use a new function: xen_pv_insert_xendev
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 51 +-
hw/xen/xen_pvdev.c| 57 +++
The name of the functions moved:
* xen_be_evtchn_event
* xen_be_unbind_evtchn
* xen_be_send_notify
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 35 ---
hw/xen/xen_pvdev.c | 35 +++
include/hw/xen/xen_b
Fixes the following errors:
* ERROR: line over 90 characters
* ERROR: code indent should never use tabs
* ERROR: space prohibited after that open square bracket '['
* ERROR: do not initialise statics to 0 or NULL
* ERROR: "(foo*)" should be "(foo *)"
Signed-off-by: Emil Condrea
---
hw/char/
This patch series was splitted from QEMU:Xen stubdom vTPM for HVM virtual
machine
http://markmail.org/message/fkix7g3a5zdj7lvr
It contains a reorganization of xen backend and frontend functions together
with code style fixes.
Common functions shared by backends and frontends are moved to xen_pvde
From: Paul Durrant
Date: Mon, 3 Oct 2016 08:31:05 +0100
> This series refactors the guest rx side of xen-netback:
>
> - The code is moved into its own source module.
>
> - The prefix variant of GSO handling is retired (since it is no longer
> in common use, and alternatives exist).
>
> - The
This run is configured for baseline tests only.
flight 67791 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67791/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 15 guest-localmigr
flight 101249 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101249/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c0b7e2b2bfc2748112607bfe83fc99cf48c97b48
baseline version:
ovmf 8550b5f0810f306850f9a
flight 101247 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101247/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-arndale 3 host-install(3) broken in 101246 pass in 101247
test-armhf-armhf-xl-credit2 16
This run is configured for baseline tests only.
flight 67790 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67790/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 9 debian-di-ins
flight 101248 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101248/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8550b5f0810f306850f9a07ee551099155d89ae0
baseline version:
ovmf ed72804638c9b240477c5
rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
execution debugger, would like to trap and emulate the CPUID instruction.
This would allow us to a) mask away certain hardware features that rr does
not support (e.g. RDRAND) and b) enable trace portability across machines
by
flight 101246 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101246/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 3 host-install(3)broken REGR. vs. 10124
This run is configured for baseline tests only.
flight 67784 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67784/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boo
Lars Kurth writes ("[PATCH v3 4/4] Addressed comments on quorum and security
team members"):
> Main changes
> Leadership team decisions: express quorum in terms of +1 votes
> Security Team Members: election
> Project Wide Decision Making: minor text changes
The resulting series is a little odd be
On Fri, Sep 30, 2016 at 09:04:24AM -0600, Jan Beulich wrote:
> >>> On 27.09.16 at 17:57, wrote:
> > So that it can be called from the Dom0 builder.
>
> Why would the Dom0 builder need to call it, when it doesn't so far?
IMHO, I find it useful to print the domain 0 memory map during creation. It
On 03/10/16 15:16, Konrad Rzeszutek Wilk wrote:
> Hey!
>
> [CC-ing xen-devel]
>
> Xen 4.8-rc1 is out and means taking a break from some of the Livepatch
> hypervisor
> parts for me.
>
> My plan for 4.8 is to concentrate on any livepatch fallout and doing OSSTest
> along
> with Marcos (CC-ed) and
Konrad Rzeszutek Wilk writes:
> On Mon, Oct 03, 2016 at 04:02:48PM +0200, Vitaly Kuznetsov wrote:
>> XEN_TMEM config option has no prompt and it is enabled as module by
>> default if CLEANCACHE or FRONTSWAP options are set with no way to disable
>> it. The only in-tree user of the tmem interface
A few issues were introduced in 38cd0664 ("libxl/arm: Add the size of
ACPI tables to maxmem"):
1. d_config was not properly initialised and disposed of.
2. using libxl_retrieve_domain_configuration caused thread to
deadlock itself.
Fix those issues by:
1. properly initialise and dispose of d_
>>> Konrad Rzeszutek Wilk 10/03/16 4:18 PM >>>
>2) We could also do some form of restartable patching. That is seed the code
>(where we are going to
>put a trampoline) with 'CC'. Then do memcpy over the the 'CC' the new
>instructions (jump). If the
>NMI/MCE handler hits that code it would call t
On Mon, Oct 03, 2016 at 04:02:48PM +0200, Vitaly Kuznetsov wrote:
> XEN_TMEM config option has no prompt and it is enabled as module by
> default if CLEANCACHE or FRONTSWAP options are set with no way to disable
> it. The only in-tree user of the tmem interface is xen-selfballoon which
And if CONF
Hey!
[CC-ing xen-devel]
Xen 4.8-rc1 is out and means taking a break from some of the Livepatch
hypervisor
parts for me.
My plan for 4.8 is to concentrate on any livepatch fallout and doing OSSTest
along
with Marcos (CC-ed) and see if we can wrestle it to expand on what
we want to have done.
H
XEN_TMEM config option has no prompt and it is enabled as module by
default if CLEANCACHE or FRONTSWAP options are set with no way to disable
it. The only in-tree user of the tmem interface is xen-selfballoon which
can itself be disabled so it makes sense to make it possible to disable
XEN_TMEM too
flight 101245 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101245/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Hi all
Xen 4.8 RC1 is tagged. You can check that out from xen.git:
git://xenbits.xen.org/xen.git 4.8.0-rc1
For you convenience there is also tarball at:
http://bits.xensource.com/oss-xen/release/4.8.0-rc1/xen-4.8.0-rc1.tar.gz
And the signature is at:
http://bits.xensource.com/oss-xen/release/
On Mon, Oct 03, 2016 at 11:59:49AM +0100, Ian Jackson wrote:
> * Change QEMU_UPSTREAM_REVISION MINIOS_UPSTREAM_REVISION and
> QEMU_TRADITIONAL_REVISION to refer to the Xen 4.8.0-rc1 tags.
>
> * Change README and xen/Makefile to refer to Xen 4.8.0-rc (note, the
> RC number is not included, so w
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Roger Pau Monne
> Sent: 27 September 2016 16:57
> To: xen-de...@lists.xenproject.org
> Cc: Andrew Cooper ;
> boris.ostrov...@oracle.com; Roger Pau Monne ; Jan
> Beulich
> Subject: [Xen-devel] [PA
* Change QEMU_UPSTREAM_REVISION MINIOS_UPSTREAM_REVISION and
QEMU_TRADITIONAL_REVISION to refer to the Xen 4.8.0-rc1 tags.
* Change README and xen/Makefile to refer to Xen 4.8.0-rc (note, the
RC number is not included, so we do not have to update these again).
I reran autogen.sh as per the re
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Roger Pau Monne
> Sent: 27 September 2016 16:57
> To: xen-de...@lists.xenproject.org
> Cc: boris.ostrov...@oracle.com; Roger Pau Monne
> Subject: [Xen-devel] [PATCH v2 28/30] xen/x86: add MSI-X e
> -Original Message-
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: 27 September 2016 16:57
> To: xen-de...@lists.xenproject.org
> Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
> ; Paul Durrant ; Jan
> Beulich ; Andrew Cooper
>
> Subject: [PATCH v2
> -Original Message-
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: 27 September 2016 16:57
> To: xen-de...@lists.xenproject.org
> Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
> ; Paul Durrant ; Jan
> Beulich ; Andrew Cooper
>
> Subject: [PATCH v2
On Fri, Sep 30, 2016 at 09:03:34AM -0600, Jan Beulich wrote:
> >>> On 27.09.16 at 17:57, wrote:
> > --- a/docs/misc/xen-command-line.markdown
> > +++ b/docs/misc/xen-command-line.markdown
> > @@ -663,6 +663,13 @@ Pin dom0 vcpus to their respective pcpus
> >
> > Flag that makes a 64bit dom0 boot
flight 67789 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67789/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 5 kernel-build fail REGR. vs. 67762
Regression
> -Original Message-
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: 27 September 2016 16:57
> To: xen-de...@lists.xenproject.org
> Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
> ; Jan Beulich ; Andrew Cooper
> ; Paul Durrant
> Subject: [PATCH v2 20
> -Original Message-
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: 27 September 2016 16:57
> To: xen-de...@lists.xenproject.org
> Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
> ; Paul Durrant ; Jan
> Beulich ; Andrew Cooper
>
> Subject: [PATCH v2
flight 101244 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101244/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemut-debianhvm-amd64 9 debian-hvm-install fail in 101242
pass in 101244
test-armhf-armhf-
On 2016-10-03 00:45, Boris Ostrovsky wrote:
xen_cpuhp_setup() calls mutex_lock() which, when CONFIG_DEBUG_MUTEXES
is defined, ends up calling xen_save_fl(). That routine expects
per_cpu(xen_vcpu, 0) to be already initialized.
Signed-off-by: Boris Ostrovsky
Reported-by: Sander Eikelenboom
---
S
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Roger Pau Monne
> Sent: 27 September 2016 16:57
> To: xen-de...@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; George Dunlap ;
> Andrew Cooper ; Ian Jackson
> ; Tim (Xen.org) ; Jan Be
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Roger Pau Monne
> Sent: 27 September 2016 16:57
> To: xen-de...@lists.xenproject.org
> Cc: George Dunlap ; Andrew Cooper
> ; Tim (Xen.org) ; Jan Beulich
> ; boris.ostrov...@oracle.com; Roger Pau M
From: David Vrabel
Instead of flushing the copy ops when an packet is complete, complete
packets when their copy ops are done. This improves performance by
reducing the number of grant copy hypercalls.
Latency is still limited by the relatively small size of the copy
batch.
Signed-off-by: Davi
From: David Vrabel
Instead of only placing one skb on the guest rx ring at a time, process
a batch of up-to 64. This improves performance by ~10% in some tests.
Signed-off-by: David Vrabel
[re-based]
Signed-off-by: Paul Durrant
---
Cc: Wei Liu
---
drivers/net/xen-netback/rx.c | 15 +
From: David Vrabel
When an skb is removed from the guest rx queue, immediately wake the
tx queue, instead of after processing them.
Signed-off-by: David Vrabel
[re-based]
Signed-off-by: Paul Durrant
---
Cc: Wei Liu
---
drivers/net/xen-netback/rx.c | 24
1 file change
From: Ross Lagerwall
This allows full 64K skbuffs (with 1500 mtu ethernet, composed of 45
fragments) to be handled by netback for to-guest rx.
Signed-off-by: Ross Lagerwall
[re-based]
Signed-off-by: Paul Durrant
---
Cc: Wei Liu
---
drivers/net/xen-netback/interface.c | 2 +-
drivers/net/xen
As far as I am aware only very old Windows network frontends make use of
this style of passing GSO packets from backend to frontend. These
frontends can easily be replaced by the freely available Xen Project
Windows PV network frontend, which uses the 'default' mechanism for
passing GSO packets, wh
This series refactors the guest rx side of xen-netback:
- The code is moved into its own source module.
- The prefix variant of GSO handling is retired (since it is no longer
in common use, and alternatives exist).
- The code is then simplified and modifications made to improve
performance.
The netback source module has become very large and somewhat confusing.
This patch simply moves all code related to the backend to frontend (i.e
guest side rx) data-path into a separate rx source module.
This patch contains no functional change, it is code movement and
minimal changes to avoid pat
From: David Vrabel
Refactor the to-guest (rx) path to:
1. Push responses for completed skbs earlier, reducing latency.
2. Reduce the per-queue memory overhead by greatly reducing the
maximum number of grant copy ops in each hypercall (from 4352 to
64). Each struct xenvif_queue is now onl
61 matches
Mail list logo