Hi, Stefano!
Ok, probably I need to put more details into the use-case
so it is clear. What I am doing is a DRM driver which
utilizes PRIME buffer sharing [1] to implement zero-copy
of display buffers between DomU and Dom0. PRIME is based on
DMA Buffer Sharing API [2], so this is the reason I am
>>> On 28.03.17 at 12:25, wrote:
> On 28/03/17 11:03, Jan Beulich wrote:
>> There is a severe downside to MMIO accesses with this model
>> though: Other than for RAM, we shouldn't be reading (and even
>> less so writing) the memory location more than once.
>
> With MMIO, the hardware analogy is s
2017-03-28 13:54 GMT+02:00 Wei Liu :
> On Tue, Mar 28, 2017 at 10:21:14AM +0100, Lars Kurth wrote:
> > Hi all,
> >
> > I wanted to add a few thoughts here, as this is clearly one of the
> harder tasks.
>
> It's really hard. I don't even expect an experienced Xen developer to be
> able to finish al
On 29/03/17 01:54, Stefano Stabellini wrote:
> On Tue, 28 Mar 2017, Juergen Gross wrote:
>> On 28/03/17 00:48, Stefano Stabellini wrote:
>>> On Mon, 27 Mar 2017, Juergen Gross wrote:
On 24/03/17 18:37, Stefano Stabellini wrote:
> On Fri, 24 Mar 2017, Juergen Gross wrote:
>> On 23/03/17
On 28/03/17 18:32, Boris Ostrovsky wrote:
> On 03/28/2017 11:30 AM, Juergen Gross wrote:
>> On 28/03/17 16:27, Boris Ostrovsky wrote:
>>> On 03/28/2017 04:08 AM, Jan Beulich wrote:
>>> On 28.03.17 at 03:57, wrote:
> I think there is indeed a disconnect between target memory (provided by
>
This run is configured for baseline tests only.
flight 71115 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71115/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl 6 xen-boot
On Wed, Mar 29, 2017 at 03:28:43AM +, Xuquan (Quan Xu) wrote:
>On March 22, 2017 2:14 PM, Chao Gao wrote:
>>On Wed, Mar 22, 2017 at 06:47:33AM -0600, Jan Beulich wrote:
3. We read RTE 3 times. 1st happens when we set vIRR. 2nd happens
when
pt_update_irq() returns. 3rd happens in
Hi all,
On Wed, 29 Mar 2017 14:36:18 +1100 Stephen Rothwell
wrote:
>
> Today's linux-next merge of the xen-tip tree got a conflict in:
>
> arch/x86/xen/mmu.c
>
> between commits:
>
> 69218e47994d ("x86: Remap GDT tables in the fixmap section")
> 907cd4390290 ("x86/xen: Change __xen_pgd_
Hi all,
Today's linux-next merge of the xen-tip tree got a conflict in:
arch/x86/xen/mmu.c
between commits:
69218e47994d ("x86: Remap GDT tables in the fixmap section")
907cd4390290 ("x86/xen: Change __xen_pgd_walk() and xen_cleanmfnmap() to
support p4d")
f2a6a7050109 ("x86: Convert th
Hi all,
Today's linux-next merge of the xen-tip tree got a conflict in:
arch/x86/xen/enlighten.c
between commits:
6415813bae75 ("x86/cpu: Drop wp_works_ok member of struct cpuinfo_x86")
69218e47994d ("x86: Remap GDT tables in the fixmap section")
b23adb7d3f7d ("x86/xen/gdt: Use X86_FEAT
On March 22, 2017 2:14 PM, Chao Gao wrote:
>On Wed, Mar 22, 2017 at 06:47:33AM -0600, Jan Beulich wrote:
>>> 3. We read RTE 3 times. 1st happens when we set vIRR. 2nd happens
>>> when
>>> pt_update_irq() returns. 3rd happens in pt_intr_post(). If guest
>>> changes the vector in RTE during the windo
On 17-03-29 09:20:21, Yi Sun wrote:
> On 17-03-28 06:20:48, Jan Beulich wrote:
> > >>> On 28.03.17 at 13:59, wrote:
> > > I think we at least need a 'get_val()' hook.
> >
> > Of course.
> >
> > > I try to implement CAT/CDP hook.
> > > Please help to check if this is what you thought.
> >
> > On
On 17-03-28 15:04:03, Wei Liu wrote:
> On Thu, Mar 16, 2017 at 07:08:14PM +0800, Yi Sun wrote:
> > This patch implements the xl/xc changes to support set CBM
> > for L2 CAT.
> >
> > The new level option is introduced to original CAT setting
> > command in order to set CBM for specified level CAT.
On 17-03-28 06:20:48, Jan Beulich wrote:
> >>> On 28.03.17 at 13:59, wrote:
> > I think we at least need a 'get_val()' hook.
>
> Of course.
>
> > I try to implement CAT/CDP hook.
> > Please help to check if this is what you thought.
>
> One remark below, but other than that - yes.
>
> > static
On Tue, 28 Mar 2017, Stefano Stabellini wrote:
> Hello Zhongze,
>
> did you manage to make any progress with the ARM model?
>
> Finally, I would like to remind you of the upcoming deadline for
> applications submissions, which is the 3rd of April for GSoC and the
> 30th of March for Outreachy, se
On Tue, 28 Mar 2017, Stefano Stabellini wrote:
> Hello Luca,
>
> did you manage to make any progress on the number of cores exposed by the
> model?
>
> Thank you for the Makefile patch! If you have time, I encourage you to
> fix one of the other small outstanding bugs, for example XEN-20 or
> XE
CC'ing a couple of maintainers that might have more insights on this
project.
On Tue, 28 Mar 2017, Stefano Stabellini wrote:
> On Tue, 28 Mar 2017, Methuku Karthik wrote:
> > Hi Stefano,
> >
> > Kindly suggest me reading material that could help me understand and
> > come up with the proposal.
>
Sure, I will try to post something soon.
Thanks,
Sameer
On 3/27/2017 11:03 PM, Vijay Kilari wrote:
> On Mon, Mar 27, 2017 at 10:00 PM, Goel, Sameer wrote:
>> Hi,
>> I am working on adding this support. The work is in initial stages and will
>> target ACPI systems to start with. Do you have a
On Tue, 28 Mar 2017, Methuku Karthik wrote:
> Hi Stefano,
>
> Kindly suggest me reading material that could help me understand and
> come up with the proposal.
Sure! For the "Xen on ARM: create multiple guests from device tree"
project, the idea is that on many embedded systems the user knows how
On Tue, 28 Mar 2017, Juergen Gross wrote:
> On 28/03/17 00:48, Stefano Stabellini wrote:
> > On Mon, 27 Mar 2017, Juergen Gross wrote:
> >> On 24/03/17 18:37, Stefano Stabellini wrote:
> >>> On Fri, 24 Mar 2017, Juergen Gross wrote:
> On 23/03/17 19:22, Stefano Stabellini wrote:
> > On Thu
On 03/28/2017 02:09 AM, osstest service owner wrote:
flight 106952 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106952/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build
Hi Stefano,
Kindly suggest me reading material that could help me understand and
come up with the proposal.
On Tue, Mar 28, 2017 at 1:38 PM, Stefano Stabellini
wrote:
> I would also like to take the opportunity to remind you of the upcoming
> deadline for applications submissions, which is the 3
On Tue, 28 Mar 2017, Paul Durrant wrote:
> Commit f0f272baf3a7 "xen: use libxendevice model to restrict operations"
> added a command-line option (-xen-domid-restrict) to limit operations
> using the libxendevicemodel API to a specified domid. The commit also
> noted that the restriction would be e
flight 106965 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106965/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 106905
test-amd64-i386-xl-qemuu-w
Define the ring according to the protocol specification, using the new
DEFINE_XEN_FLEX_RING_AND_INTF macro.
Add the header to the C99 check.
Signed-off-by: Stefano Stabellini
CC: jbeul...@suse.com
CC: konrad.w...@oracle.com
---
xen/include/Makefile | 2 +-
xen/include/public/io/9pfs.h
Introduce a C99 headers check, for non-ANSI compliant headers: 9pfs.h
and pvcalls.h.
In addition to the usual -include stdint.h, also add -include string.h
to the C99 check to get the declaration of memcpy and size_t.
For the same reason, also add -include cstring to the C++ check when
necessary.
Define the ring and request and response structs according to the
specification. Use the new DEFINE_XEN_FLEX_RING macro.
Add the header to the C99 check.
Signed-off-by: Stefano Stabellini
CC: jbeul...@suse.com
CC: konrad.w...@oracle.com
---
xen/include/Makefile| 2 +-
xen/include/
Hi all,
this patch series introduces a set of new ring macros to support rings
in the formats specified by the Xen 9pfs transport and PV Calls
protocol. It also introduces the Xen 9pfs and PV Calls protocols
headers.
Changes in v5:
- parenthesize uses of macro parameters in XEN_FLEX_RING_SIZE
- a
This patch introduces macros, structs and functions to handle rings in
the format described by docs/misc/pvcalls.markdown and
docs/misc/9pfs.markdown. The index page (struct __name##_data_intf)
contains the indexes and the grant refs to setup two rings.
Indexes page
+
On Tue, 28 Mar 2017, Jan Beulich wrote:
> >>> Stefano Stabellini 03/27/17 10:50 PM >>>
> >On Mon, 27 Mar 2017, Jan Beulich wrote:
> >> >>> On 24.03.17 at 19:31, wrote:
> >> > Introduce a C99 headers check, for non-ANSI compliant headers. No
> >> > headers are added to the check yet.
> >> >
> >>
flight 106963 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106963/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
On Tue, 28 Mar 2017, Jan Beulich wrote:
> >>> Stefano Stabellini 03/27/17 10:53 PM >>>
> >On Mon, 27 Mar 2017, Jan Beulich wrote:
> >> >>> On 24.03.17 at 19:31, wrote:
> >> > --- a/xen/include/public/io/ring.h
> >> > +++ b/xen/include/public/io/ring.h
> >> > @@ -27,7 +27,18 @@
> >> > #ifndef __X
On 27/03/2017 10:10, Wei Liu wrote:
> It will be needed later when we split mm.c.
>
> No functional change.
>
> Signed-off-by: Wei Liu
I have a pending patch to take MEM_LOG() out entirely, along with
correcting some of the information printed.
I'd prefer not to perpetuate its existence.
~Andre
On 27/03/2017 10:10, Wei Liu wrote:
> Prefix them with "mm_" and add declarations to asm-x86/mm.h.
>
> They will be needed when we split PV specific code out of x86/mm.c.
>
> No functional change.
>
> Signed-off-by: Wei Liu
I have to admit that I don't understand why they are called
{get,put}_pg_
On Tue, 28 Mar 2017, Jan Beulich wrote:
> >>> Stefano Stabellini 03/27/17 10:54 PM >>>
> >On Mon, 27 Mar 2017, Jan Beulich wrote:
> >> >>> On 24.03.17 at 19:31, wrote:
> >> > +/*
> >> > + * See docs/misc/9pfs.markdown in xen.git for the full specification:
> >> > + * https://xenbits.xen.org/docs/
On 28/03/2017 14:12, Roger Pau Monne wrote:
> Hello,
>
> The following series contain two cosmetic fixes for the g2m IO port handlers.
> The first one renames them to use the g2m_ prefix instead of the dpci_ one,
> since those handlers are not trapping the PCI config space in any way. The
> second
On 03/28/2017 04:01 PM, Wei Liu wrote:
> On Fri, Mar 24, 2017 at 01:04:59PM -0400, Boris Ostrovsky wrote:
>> @@ -1067,7 +1086,11 @@ static void scrub_free_pages(unsigned int node)
>> break;
>>
>> for ( i = 0; i < (1UL << order); i++)
>> +{
>>
On Fri, Mar 24, 2017 at 01:05:03PM -0400, Boris Ostrovsky wrote:
> Signed-off-by: Boris Ostrovsky
Reviewed-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Fri, Mar 24, 2017 at 01:04:59PM -0400, Boris Ostrovsky wrote:
> @@ -1067,7 +1086,11 @@ static void scrub_free_pages(unsigned int node)
> break;
>
> for ( i = 0; i < (1UL << order); i++)
> +{
> scrub_one_page(&pg[i]);
>
On 27/03/17 10:06, Joshua Otto wrote:
> colo_merge_secondary_dirty_bitmap() unconditionally free()s the .data
> member of its local xc_sr_record structure rec on its exit path.
> However, if the initial call to read_record() fails then this member is
> uninitialised. Initialise it.
>
> Signed-off-
On 03/28/2017 03:44 PM, Wei Liu wrote:
> On Tue, Mar 28, 2017 at 03:41:10PM -0400, Boris Ostrovsky wrote:
>> On 03/28/2017 03:20 PM, Wei Liu wrote:
>>> On Fri, Mar 24, 2017 at 01:04:56PM -0400, Boris Ostrovsky wrote:
This is needed for subsequent changes to memory scrubbing. No
logic chan
On 27/03/17 10:06, Joshua Otto wrote:
> diff --git a/tools/libxc/xc_sr_stream_format.h
> b/tools/libxc/xc_sr_stream_format.h
> index 3291b25..32400b2 100644
> --- a/tools/libxc/xc_sr_stream_format.h
> +++ b/tools/libxc/xc_sr_stream_format.h
> @@ -80,15 +80,15 @@ struct xc_sr_rhdr
> #define REC_TY
On 03/28/2017 03:27 PM, Wei Liu wrote:
> On Fri, Mar 24, 2017 at 01:04:57PM -0400, Boris Ostrovsky wrote:
>> . so that it's easy to find pages that need to be scrubbed (those pages are
>> now marked with _PGC_need_scrub bit).
> s/bool_t/bool/ throughout and use true and false where appropriate.
>
>
On Tue, Mar 28, 2017 at 03:41:10PM -0400, Boris Ostrovsky wrote:
> On 03/28/2017 03:20 PM, Wei Liu wrote:
> > On Fri, Mar 24, 2017 at 01:04:56PM -0400, Boris Ostrovsky wrote:
> >> This is needed for subsequent changes to memory scrubbing. No
> >> logic change, only code re-factoring.
> > Actually t
On Fri, Mar 24, 2017 at 01:04:58PM -0400, Boris Ostrovsky wrote:
> When allocating pages in alloc_heap_pages() first look for clean pages. If
> none
> is found then retry, take pages marked as unscrubbed and scrub them.
>
> Note that we shouldn't find unscrubbed pages in alloc_heap_pages() yet.
On 03/28/2017 03:20 PM, Wei Liu wrote:
> On Fri, Mar 24, 2017 at 01:04:56PM -0400, Boris Ostrovsky wrote:
>> This is needed for subsequent changes to memory scrubbing. No
>> logic change, only code re-factoring.
> Actually there is a slight change in logic: pg and order could be
> updated in the or
This run is configured for baseline tests only.
flight 71114 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71114/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 89ad870fbff03a511102c73773000f2bea2017d2
baseline v
On Fri, Mar 24, 2017 at 01:04:57PM -0400, Boris Ostrovsky wrote:
> . so that it's easy to find pages that need to be scrubbed (those pages are
> now marked with _PGC_need_scrub bit).
s/bool_t/bool/ throughout and use true and false where appropriate.
>
> /* Free 2^@order set of pages. */
> st
On 27/03/17 10:06, Joshua Otto wrote:
> diff --git a/tools/libxc/xc_sr_restore.c b/tools/libxc/xc_sr_restore.c
> index 481a904..8574ee8 100644
> --- a/tools/libxc/xc_sr_restore.c
> +++ b/tools/libxc/xc_sr_restore.c
> @@ -194,6 +194,68 @@ int populate_pfns(struct xc_sr_context *ctx, unsigned
> coun
On Fri, Mar 24, 2017 at 01:04:56PM -0400, Boris Ostrovsky wrote:
> This is needed for subsequent changes to memory scrubbing. No
> logic change, only code re-factoring.
Actually there is a slight change in logic: pg and order could be
updated in the original merge code. With this patch you still p
On Tue, 28 Mar 2017, Oleksandr Andrushchenko wrote:
> Hi, Stefano!
>
> On 03/27/2017 11:23 PM, Stefano Stabellini wrote:
> > Hello Oleksandr,
> >
> > Just to clarify, you are talking about dma_to_phys/phys_to_dma in Linux
> > (not in Xen), right?
> I am talking about Linux, sorry I was not clear
I'm using LibreOffice 4.3.3.2 on Debian amd64 and this version not have
MediaWiki export function!!
On Tue, 3/28/17, M A Young wrote:
Subject: Re: [Xen-users] [Xen-devel] "Hello Xen Project" Book.
To: "Juergen Gross"
Cc: "Lars Kurth" , "xen-de...
Hello Lars.
How about
"https://en.wikitolearn.org/WikiToLearn_Manual/Converting_LibreOffice_to_MediaWiki_Format";
or "https://apps.ubuntu.com/cat/applications/libreoffice-wiki-publisher/";?
On Tue, 3/28/17, Lars Kurth wrote:
Subject: Re: [Xen-devel
On 27/03/17 10:06, Joshua Otto wrote:
> Writing the libxc save stream requires writing a few 'trivial' records,
> consisting only of a header with a particular type. As a readability
> aid, it's nice to have obviously-named functions that write these sorts
> of records into the stream - for exampl
On 03/22/2017 02:07 PM, Tamas K Lengyel wrote:
Currently setting altp2mhvm=1 in the domain configuration allows access to the
altp2m interface for both in-guest and external privileged tools. This poses
a problem for use-cases where only external access should be allowed, requiring
the user to co
On 27/03/17 10:06, Joshua Otto wrote:
> Teach send_checkpoint_dirty_pfn_list() to use write_record()'s new fd
> parameter, avoiding the need for a manual writev().
>
> No functional change.
>
> Signed-off-by: Joshua Otto
Hmm - I could have sworn I objected to the patch which added this code
in th
On 27/03/17 10:06, Joshua Otto wrote:
> Right now, write_split_record() - which is delegated to by
> write_record() - implicitly writes to ctx->fd. This means it can't be
> used with the restore context's send_back_fd, which is unhandy.
Unhelpful?
>
> Add an 'fd' parameter to both write_record()
Hi Dario,
On 02/02/17 13:32, Dario Faggioli wrote:
On Thu, 2017-02-02 at 13:26 +, Julien Grall wrote:
On 02/02/17 12:51, Dario Faggioli wrote:
So, I expect to be able to do something useful only, let's stay,
from
Mon 13th. If that's ok, do sign me up. If you're more in a hurry,
feel
free t
Hi all,
On 14/03/17 14:21, Wei Liu wrote:
On Tue, Mar 14, 2017 at 01:50:44PM +, Andrew Cooper wrote:
On 14/03/17 13:20, Julien Grall wrote:
Hi Andrew,
On 21/07/16 18:17, Andrew Cooper wrote:
This series is RFC because it has only had compile testing thusfar.
On AMD hardware supporting D
flight 106959 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106959/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 106928
test-armhf-armhf-libvirt-xs
I would also like to take the opportunity to remind you of the upcoming
deadline for applications submissions, which is the 3rd of April for
GSoC, see:
http://marc.info/?l=xen-devel&m=149071502330534
The GSoC application system is
https://summerofcode.withgoogle.com/get-started/.
Please give a l
Hello Zhongze,
did you manage to make any progress with the ARM model?
Finally, I would like to remind you of the upcoming deadline for
applications submissions, which is the 3rd of April for GSoC and the
30th of March for Outreachy, see:
http://marc.info/?l=xen-devel&m=149071502330534
Please g
Hello Luca,
did you manage to make any progress on the number of cores exposed by the model?
Thank you for the Makefile patch! If you have time, I encourage you to
fix one of the other small outstanding bugs, for example XEN-20 or
XEN-11 (just the ability to load a Dom0 kernel bigger than 128MB o
This run is configured for baseline tests only.
flight 71113 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71113/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 3efa3f3d05ea3fef964e59aea9b5792cfec348ed
baseline v
flight 106971 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106971/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 89ad870fbff03a511102c73773000f2bea2017d2
baseline version:
ovmf 3efa3f3d05ea3fef964e5
flight 106974 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106974/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12 mig
(CCing xen-devel as this issue is no longer embargoed.)
Sarah Newman writes ("Re: [Xen-security-issues-discuss] New XSA206 patches"):
> On 03/28/2017 06:59 AM, Ian Jackson wrote:
> > There is no functional difference compared to the v6 patches for
> > unstable. The backports are updated.
>
> Are
The subject should be updated -- it does more than dropping trailing
spaces.
On Tue, Mar 28, 2017 at 09:23:09PM +0530, vijay.kil...@gmail.com wrote:
> From: Vijaya Kumar K
>
> Fix coding style, trailing spaces, tabs in NUMA code.
> Also drop unused macros and functions.
>
No functional change.
On Tue, Mar 28, 2017 at 09:23:10PM +0530, vijay.kil...@gmail.com wrote:
> From: Vijaya Kumar K
>
> Change u{8,32,64} to uint{8,32,64}_t and bool_t to bool.
> Fix attributes coding styles.
> Also change memnodeshift to unsigned int.
I think you also need to say you changed u64 to paddr_t where
ap
On Tue, 28 Mar 2017, Julien Grall wrote:
> Hi all,
>
> Apologies for the late sending, you will find at the end of the e-mail a
> summary of the discussion from the previous call. Feel free to reply if I
> missed some parts.
>
> I suggest to have the next call on the 5th April at 5PM UTC. Any opi
Cc Chen
On Mon, Mar 27, 2017 at 05:06:13AM -0400, Joshua Otto wrote:
> The COLO xc domain save and restore procedures both make use of a 'postcopy'
> callback to defer part of each checkpoint operation to xl. In this context,
> the
> name 'postcopy' is meant as "the callback invoked immediately
Rework the transaction handling of xenstored to no longer raise
conflicts so often.
This series has been sent for pre-review to some reviewers before as the
series is related to XSA 206 which has been disclosed only today. So V1
and V2 have been non-public in order to speed up review process witho
On 03/28/2017 11:30 AM, Juergen Gross wrote:
> On 28/03/17 16:27, Boris Ostrovsky wrote:
>> On 03/28/2017 04:08 AM, Jan Beulich wrote:
>> On 28.03.17 at 03:57, wrote:
I think there is indeed a disconnect between target memory (provided by
the toolstack) and current memory (i.e actua
Instead of setting errno and returning true or false return the error
value directly.
In order to ensure all call sites have been changed according to the
modification rename the functions to xs_*.
Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
---
tools/xenstore/xenstored_core.c | 34 +
Remove all unused functions from tdb.c. This will reduce code size of
xenstored and - more important - of xenstore stubdom.
tdb.c hasn't been updated to a newer version since its introduction in
2005. Any backport of bug fixes or update to a new version will need
major work, so there is no real do
Undo the function rename done in previous patch.
Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
---
tools/xenstore/xenstored_core.c | 24
1 file changed, 12 insertions(+), 12 deletions(-)
diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c
The handling of transactions in xenstored is rather clumsy today:
- Each transaction in progress is keeping a local copy of the complete
xenstore data base
- A transaction will fail as soon as any node is being modified outside
the transaction
This is leading to a very bad behavior in case of
On Fri, Mar 17, 2017 at 07:27:09PM +0800, Lan Tianyu wrote:
> From: Chao Gao
>
> A new device, xen_viommu, is added to qemu. In xen side, we can inform device
> model to create a guest with a vIOMMU device through "-device xen_viommu" when
> a viommu has been configurated in guest configuration f
On Fri, Mar 17, 2017 at 07:27:05PM +0800, Lan Tianyu wrote:
> From: Chao Gao
>
> In previous patch, we introduce a common vIOMMU layer. In our design,
> we create/destroy vIOMMU through DMOP interface instead of creating it
> according to a config flag of domain. It makes it is possible
> to crea
> -Original Message-
> From: Roger Pau Monne
> Sent: 28 March 2017 14:12
> To: xen-de...@lists.xenproject.org
> Cc: Roger Pau Monne ; Jan Beulich
> ; Andrew Cooper ; Paul
> Durrant
> Subject: [PATCH v2 2/2] x86/io: move the list of guest to machine IO ports
> out of domain_iommu
>
> There
> -Original Message-
> From: Roger Pau Monne
> Sent: 28 March 2017 14:12
> To: xen-de...@lists.xenproject.org
> Cc: Roger Pau Monne ; Jan Beulich
> ; Andrew Cooper ; Paul
> Durrant
> Subject: [PATCH v2 1/2] x86/io: rename misleading dpci_ prefixed functions
> to g2m_
>
> The dpci_ prefix
From: Vijaya Kumar K
Call ACPI NUMA initialization under CONFIG_ACPI_NUMA.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/numa/acpi_numa.c | 28 +++-
xen/arch/arm/numa/numa.c | 6 ++
xen/common/numa.c | 14 ++
xen/include/asm-arm/numa.h
From: Vijaya Kumar K
Parse distance-matrix and fetch node distance information.
Store distance information in node_distance[].
Register dt_node_distance() function pointer with
the ARM numa code. This approach can be later used for
ACPI.
Signed-off-by: Vijaya Kumar K
---
xen/arch/arm/bootfdt.
From: Vijaya Kumar K
Register SRAT entry handler for type
ACPI_SRAT_TYPE_GICC_AFFINITY to parse SRAT table
and extract proximity for all CPU IDs.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/acpi/boot.c | 2 +
xen/arch/arm/numa/acpi_numa.c | 126 +
From: Vijaya Kumar K
Parse MADT table and extract MPIDR for all
CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries
and store in cpuid_to_hwid_map[]
This mapping is used by SRAT table parsing to
extract MPIDR of the CPU ID.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/numa/Makefile|
Commit f0f272baf3a7 "xen: use libxendevice model to restrict operations"
added a command-line option (-xen-domid-restrict) to limit operations
using the libxendevicemodel API to a specified domid. The commit also
noted that the restriction would be extended to cover operations issued
via other xen
From: Vijaya Kumar K
SRAT's X2APIC_CPU_AFFINITY and CPU_AFFINITY types are not used
by ARM. Hence move handling of this SRAT types to arch specific
file and handle them under arch_table_parse_srat().
Signed-off-by: Vijaya Kumar K
---
xen/arch/arm/numa/acpi_numa.c | 5 +
xen/arch/x86/srat.
From: Vijaya Kumar K
On NUMA initialization failure, reset all the
NUMA structures to emulate as single node.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/numa/numa.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/arch/arm/numa/numa.c b/xen/arch/arm/numa/numa.c
index 7583a40..89
From: Vijaya Kumar K
Add CONFIG_ACPI_NUMA to xen/drivers/acpi/Kconfig and
drop CONFIG_ACPI_NUMA set in asm-x86/config.h.
Signed-off-by: Vijaya Kumar K
---
xen/drivers/acpi/Kconfig | 4
xen/include/asm-x86/config.h | 1 -
2 files changed, 4 insertions(+), 1 deletion(-)
diff --git a/xe
From: Vijaya Kumar K
CONFIG_NUMA is defined in xen/drivers/acpi/Kconfig.
Move to common/Kconfig and enabled by default.
Also, NUMA feature uses PDX for physical address to
memory node mapping. Hence make HAS_PDX dependent
for NUMA.
Signed-off-by: Vijaya Kumar K
---
xen/common/Kconfig | 4
From: Vijaya Kumar K
Move SRAT handling code which is common across
architecture is moved to new file xen/drivers/acpi/srat.c
from xen/arch/x86/srat.c file. New header file srat.h is
introduced.
Signed-off-by: Vijaya Kumar K
---
xen/arch/x86/dom0_build.c | 1 +
xen/arch/x86/mm.c
From: Vijaya Kumar K
Delete numa-node-id and distance map from DOM0 DT
so that NUMA information is not exposed to DOM0.
This helps particularly to boot Node 1 devices
as if booting on Node0.
However this approach has limitation where memory allocation
for the devices should be local.
Also, do n
From: Vijaya Kumar K
Parse CPU node and fetch numa-node-id information.
For each node-id found, update nodemask_t mask.
Refer to /Documentation/devicetree/bindings/numa.txt.
Signed-off-by: Vijaya Kumar K
---
xen/arch/arm/Makefile | 1 +
xen/arch/arm/bootfdt.c | 16 --
xen/a
From: Vijaya Kumar K
For each cpu, update cpu_to_node[] with node id from
the numa-node-id DT property. Also, initialize cpu_to_node[]
with node 0.
Add macros to access cpu_to_node[] information.
Signed-off-by: Vijaya Kumar K
---
xen/arch/arm/numa/numa.c | 21 +
xen/arch
From: Vijaya Kumar K
Implement arch_sanitize_nodes_memory() which looks at all banks
in bootinfo.mem, update nodes[] with corresponding nodeid.
Call numa_scan_nodes() generic function with ram start and
end address, which takes care of further computing memnodeshift
and populating memnodemap[] us
From: Vijaya Kumar K
Parse memory node and fetch numa-node-id information.
For each memory range, store in node_memblk_range[]
along with node id.
When booting in UEFI mode, UEFI passes memory information
to Dom0 using EFI memory descriptor table and deletes the
memory nodes from the host DT. Ho
From: Vijaya Kumar K
Move code from xen/arch/x86/numa.c to xen/common/numa.c
so that it can be used by other archs.
Few generic static functions in x86/numa.c is made
non-static common/numa.c
The generic contents of header file asm-x86/numa.h
are moved to xen/numa.h.
Signed-off-by: Vijaya Kumar
From: Vijaya Kumar K
Move code from xen/arch/x86/srat.c to xen/common/numa.c
so that it can be used by other archs.
Few generic static functions in x86/srat.c are made
non-static common/numa.c
Signed-off-by: Vijaya Kumar K
---
xen/arch/x86/srat.c| 152 ++
From: Vijaya Kumar K
Introduce acpi_node_distance() and call from __node_distance().
This helps to implement arch specific __node_distance().
Also introduce LOCAL_DISTANCE & REMOTE DISTANCE macros.
Signed-off-by: Vijaya Kumar K
---
xen/arch/x86/srat.c| 13 +
xen/include/xen/num
From: Vijaya Kumar K
Right now CONFIG_NUMA is not enabled for ARM and
existing code in asm-arm/numa.h is for !CONFIG_NUMA.
Hence put this code under #ifndef CONFIG_NUMA.
This help to make this changes work when CONFIG_NUMA
is not enabled.
Also define NODES_SHIFT macro for ARM to value 2.
This l
1 - 100 of 209 matches
Mail list logo