> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> Sent: Tuesday, January 06, 2015 12:33 AM
>
> On Thu, Dec 18, 2014 at 01:06:40PM -0500, Boris Ostrovsky wrote:
> > We need to make sure that last_vcpu is not pointing to VCPU whose
> > VPMU is being destroyed. Otherwise we may try to d
>>> On 23.12.14 at 09:54, wrote:
> --- a/xen/arch/x86/sysctl.c
> +++ b/xen/arch/x86/sysctl.c
> @@ -157,6 +157,11 @@ long arch_do_sysctl(
> sysctl->u.psr_cmt_op.u.data = (ret ? 0 : info.size);
> break;
> }
> +case XEN_SYSCTL_PSR_CMT_get_l3_event_mask:
> +
On 07/01/2015 08:18, Andy Lutomirski wrote:
>>> >> Thus far, I've been told unambiguously that a guest can't observe pvti
>>> >> while it's being written, and I think you're now telling me that this
>>> >> isn't true and that a guest *can* observe pvti while it's being
>>> >> written while the lo
>>> On 06.01.15 at 12:55, wrote:
> On 06/01/15 02:18, Boris Ostrovsky wrote:
>
>> diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h
>> index 5f295f3..a5eb81c 100644
>> --- a/xen/include/xen/pci.h
>> +++ b/xen/include/xen/pci.h
>> @@ -56,6 +56,8 @@ struct pci_dev {
>>
>> u8 phantom
On Mon, 2015-01-05 at 21:18 -0500, Boris Ostrovsky wrote:
> .. and use this new interface to display it along with CPU topology
> and NUMA information when 'xl info -n' command is issued
>
Also, can we see how an `xl info -n' looks, on an IONUMA system?
> @@ -195,6 +195,24 @@ int xc_cputopoinfo(x
>>> On 06.01.15 at 03:18, wrote:
> @@ -618,7 +620,22 @@ ret_t do_physdev_op(int cmd,
> XEN_GUEST_HANDLE_PARAM(void) arg)
> }
> else
> pdev_info.is_virtfn = 0;
> -ret = pci_add_device(add.seg, add.bus, add.devfn, &pdev_info);
> +
> +if ( add.flags & X
On Tue, 2015-01-06 at 19:46 +0100, Sander Eikelenboom wrote:
> > diff --git a/README b/README
> > index 412607a..641bb23 100644
> > --- a/README
> > +++ b/README
> > @@ -1,9 +1,9 @@
> > #
> > -__ ___ ___ _
On Mon, Jan 05, Vitaly Kuznetsov wrote:
> Wei Liu writes:
>
> > Olaf mentioned his concern about handling ballooned pages in
> > <20141211153029.ga1...@aepfle.de>. Is that point moot now?
>
> Well, the limitation is real and some guest-side handling will be
> required in case we want to support
>>> On 06.01.15 at 14:41, wrote:
> On 06/01/15 02:18, Boris Ostrovsky wrote:
>> Instead of copying data for each field in xen_sysctl_topologyinfo separately
>> put cpu/socket/node into a single structure and do a single copy for each
>> processor.
>>
>> There is also no need to copy whole op to us
>>> On 06.01.15 at 03:18, wrote:
> --- a/xen/common/sysctl.c
> +++ b/xen/common/sysctl.c
> @@ -365,6 +365,66 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t)
> u_sysctl)
> }
> break;
>
#ifdef HAS_PCI
> +case XEN_SYSCTL_pcitopoinfo:
> +{
> +xen_sysctl_pcitopoinf
On Tue, Jan 06, Ian Campbell wrote:
> On Fri, 2014-12-19 at 12:25 +0100, Olaf Hering wrote:
...
> Acked-by: Ian Campbell
>
> (on commit s/Appearently/Apparently/; s/non-existant/non-existent/ in
> the commit log)
I made typos also in other commit messages. Should I resend the entire
series, o
On Wed, 2015-01-07 at 10:23 +0100, Olaf Hering wrote:
> On Tue, Jan 06, Ian Campbell wrote:
>
> > On Fri, 2014-12-19 at 12:25 +0100, Olaf Hering wrote:
>
> ...
>
> > Acked-by: Ian Campbell
> >
> > (on commit s/Appearently/Apparently/; s/non-existant/non-existent/ in
> > the commit log)
>
> I
>>> On 06.01.15 at 17:15, wrote:
> Hello,
>
> Per http://wiki.xenproject.org/wiki/Xen_Project_Maintenance_Releases:
> "Each stable branch has a maintainer who is nominated/volunteers according
> to the Maintainer Election
> process described in the project governance document
> [http://www.xe
On Tue, 2015-01-06 at 14:17 -0700, Mike Latimer wrote:
> Hi,
>
> In a previous post (1), I mentioned issues seen while ballooning a large
> amount of memory. In the current code, the ballooning process only has 33
> seconds to complete, or the xl operation (i.e. domain create) will fail. When
>
On Tue, Jan 06, Ian Campbell wrote:
> On Fri, 2014-12-19 at 12:25 +0100, Olaf Hering wrote:
> > The shell wrapper in xenstored.service does not handle XENSTORE_TRACE.
> >
> > Create a separate wrapper script which is used in the sysv runlevel
> > script and in systemd xenstored.service. It preser
>>> On 06.01.15 at 14:00, wrote:
> On Tue, Dec 02, 2014 at 10:08:35PM -0500, Stephen Oberholtzer wrote:
>> (1) Is my guess correct? Or at least close?
Depends on whether you assign the devices at boot time of the guest,
or via hotplug. In the latter case, I suppose only the MMIO hole size
settin
On Tue, Jan 06, Ian Jackson wrote:
> Olaf Hering writes ("[PATCH 7/7] tools/hotplug: add wrapper to start
> xenstored"):
> > The shell wrapper in xenstored.service does not handle XENSTORE_TRACE.
> ...
> > +XENSTORED_LIBEXEC = xenstored.sh
>
> Should be in /etc as previously discussed. Previous
>>> On 05.01.15 at 16:04, wrote:
Odd -
> (XEN) [ Xen-4.4.1 x86_64 debug=n Not tainted ]
> (XEN) CPU:0
> (XEN) RIP:e008:[] d5fd8412
the address here ...
> (XEN) [ Xen-4.5.0-rc-lK x86_64 debug=y Tainted:C ]
> (XEN) CPU:0
> (XEN) RIP
On Tue, 2015-01-06 at 12:23 -0800, Suriyan Ramasami wrote:
> On Tue, Jan 6, 2015 at 10:54 AM, Suriyan Ramasami wrote:
> > On Tue, Jan 6, 2015 at 10:51 AM, Lars Kurth
> > wrote:
> >>
> >> On 6 Jan 2015, at 18:08, Suriyan Ramasami wrote:
> >>
> >>>
> >>> I shall try my hand at updating the inform
On Mon, Jan 05, Konrad Rzeszutek Wilk wrote:
> +Release Issues
> +==
> +
> +While we did the utmost to get a release out, there are certain
> +fixes which were not complete on time. As such please reference this
> +section if you are running into trouble.
> +
> +* systemd not worki
I tried to use the qemu upstream on xen Dom0 (arm arch) to get the PVFB,
PVKBD and PVMOUSE work.
However, I got compiler error at the begin. Here are the detail steps:
1. download the source code from " git://git.qemu-project.org/qemu.git ".
2. " cd qemu "
3. configure using command "./configure
I am working on Xen live Migration.
I want to print dirty_bitmap which is given in
XEN_GUEST_HANDLE_64(uint8) dirty_bitmap in shadow.h
and Dirty bit tracking is given in:
int shadow_track_dirty_vram(struct domain *d,
unsigned long first_pfn,
unsigned long nr,
XEN_GUEST_HANDLE_64(uint8) d
On Wed, 2015-01-07 at 18:02 +0800, Mao Mingy wrote:
> I tried to use the qemu upstream on xen Dom0 (arm arch) to get the
> PVFB, PVKBD and PVMOUSE work.
With Xen 4.5 qemu is automatically built for ARM, no need to do it
separately AFAIK.
Also note that you need to build qemu for i386, even on ARM
>>> On 14.10.14 at 12:45, wrote:
> The presence of the partition reference time enlightenment persuades newer
> versions of Windows to prefer the TSC as their primary time source. Hence,
> if rdtsc is not being emulated and is invariant then many vmexits (for
> alternative time sources such as the
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 07 January 2015 10:08
> To: Paul Durrant
> Cc: Christoph Egger; Ian Campbell; Ian Jackson; Stefano Stabellini; xen-
> de...@lists.xenproject.org; Keir (Xen.org)
> Subject: Re: [PATCH v4] x86/viridian: Add Partition
>>> On 23.12.14 at 07:52, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Friday, December 19, 2014 7:26 PM
>>
>> This can (and will) be legitimately the case when sharing page tables
>> with EPT (more of a problem before p2m_access_rwx became zero, but
>> still possible even now
The presence of the partition reference time enlightenment persuades newer
versions of Windows to prefer the TSC as their primary time source. Hence,
if rdtsc is not being emulated and is invariant then many vmexits (for
alternative time sources such as the HPET or reference counter MSR) can
be avo
On 07/01/15 09:10, Olaf Hering wrote:
> On Mon, Jan 05, Vitaly Kuznetsov wrote:
>
>> Wei Liu writes:
>>
>>> Olaf mentioned his concern about handling ballooned pages in
>>> <20141211153029.ga1...@aepfle.de>. Is that point moot now?
>>
>> Well, the limitation is real and some guest-side handling w
Olaf Hering writes:
> On Mon, Jan 05, Vitaly Kuznetsov wrote:
>
>> Wei Liu writes:
>>
>> > Olaf mentioned his concern about handling ballooned pages in
>> > <20141211153029.ga1...@aepfle.de>. Is that point moot now?
>>
>> Well, the limitation is real and some guest-side handling will be
>> req
>>> On 07.01.15 at 11:41, wrote:
> On 07/01/15 09:10, Olaf Hering wrote:
>> On Mon, Jan 05, Vitaly Kuznetsov wrote:
>>
>>> Wei Liu writes:
>>>
Olaf mentioned his concern about handling ballooned pages in
<20141211153029.ga1...@aepfle.de>. Is that point moot now?
>>>
>>> Well, the limit
On Wed, Jan 07, David Vrabel wrote:
> 2. Reducing the balloon prior to kexec.
We carry a patch for kexec(1) which does balloon up before doing the
actual kexec call. I propose to get such change into the upstream kexec
tools if that is indeed the way to go. The benefit is that the guest
waits unt
On Wed, Jan 07, Vitaly Kuznetsov wrote:
> The thing is .. we don't have these pages when kexec is being performed,
> they are already ballooned out and the hypervisor doesn't have the
> knowledge of which GFNs should be re-populated. I think it is possible
> to keep track of all pages the guest ba
Changes from v1:
* Move event type check from xc to xl;
* Add retry capability for MBM sampling;
* Fix Coding style/docs;
Intel Memory Bandwidth Monitoring(MBM) is a new hardware feature
which builds on the CMT infrastructure to allow monitoring of system
memory bandwidth. Event codes are provided
- space: remove space after '(' or before ')' in 'if' condition;
- indention: align function definition/call arguments;
Signed-off-by: Chao Peng
---
tools/libxc/include/xenctrl.h |8
tools/libxc/xc_psr.c | 10 +-
tools/libxl/libxl.h | 11 +++
t
Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring
are supported: total and local memory bandwidth monitoring. To use it,
CMT should be enabled in hypervisor.
Signed-off-by: Chao Peng
---
docs/man/xl.pod.1 |9 +
tools/libxc/include/xenctrl.h |2 ++
tool
Make some internal routines common so that total/local memory bandwidth
monitoring in the next patch can make use of them.
Signed-off-by: Chao Peng
---
tools/libxl/libxl_psr.c | 51 ++-
tools/libxl/xl_cmdimpl.c | 54 +++
This is the tools side wrapper for XEN_SYSCTL_PSR_CMT_get_l3_event_mask
of XEN_SYSCTL_psr_cmt_op.
Signed-off-by: Chao Peng
---
tools/libxc/include/xenctrl.h |1 +
tools/libxc/xc_psr.c | 24
tools/libxl/libxl.h |1 +
tools/libxl/libxl_psr.c
On Tue, Jan 06, Konrad Rzeszutek Wilk wrote:
> There is only one outstanding patch and that is "#7 tools/hotplug: add
> wrapper to
> start xenstored". Olaf is back tomorrow so it might make it .. or not.
See my other replies. I think once we know how to deal with SELinux and
systemd this change
L3 event mask indicates the event types supported in host, including
cache occupancy event as well as local/total memory bandwidth events
for Memory Bandwidth Monitoring(MBM). Expose it so all these events
can be monitored in user space.
Signed-off-by: Chao Peng
Reviewed-by: Andrew Cooper
Acked-
On Wed, Jan 07, 2015 at 07:12:03PM +0800, Chao Peng wrote:
> - space: remove space after '(' or before ')' in 'if' condition;
> - indention: align function definition/call arguments;
>
> Signed-off-by: Chao Peng
Acked-by: Wei Liu
___
Xen-devel mailin
On Tue, 2015-01-06 at 11:15 -0500, Konrad Rzeszutek Wilk wrote:
> Hello,
>
> Per http://wiki.xenproject.org/wiki/Xen_Project_Maintenance_Releases:
> "Each stable branch has a maintainer who is nominated/volunteers according to
> the Maintainer Election
> process described in the project governan
On 07/01/15 11:12, Chao Peng wrote:
> This is the tools side wrapper for XEN_SYSCTL_PSR_CMT_get_l3_event_mask
> of XEN_SYSCTL_psr_cmt_op.
>
> Signed-off-by: Chao Peng
> ---
> tools/libxc/include/xenctrl.h |1 +
> tools/libxc/xc_psr.c | 24
> tools/libxl/lib
On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
> From: Jenny Herbert
>
> Use the "foreign" page flag to mark pages that have a grant map. Use
> page->private to store information of the grant (the granting domain
> and the grant reference).
>
> Signed-off-by: Jenny Herbert
> Signed-off
On Tue, Jan 06, 2015 at 10:28:13AM -0700, Eric Blake wrote:
> On 01/06/2015 09:12 AM, Wei Liu wrote:
> > Currently libxl driver hardcodes some paths in its capability string,
> > which might not be the correct paths.
> >
> > This patch introduces --with-libxl-prefix, so that user can specify the
>
On Tue, Jan 06, 2015 at 05:36:57PM +, Daniel P. Berrange wrote:
> On Tue, Jan 06, 2015 at 10:28:13AM -0700, Eric Blake wrote:
> > On 01/06/2015 09:12 AM, Wei Liu wrote:
> > > Currently libxl driver hardcodes some paths in its capability string,
> > > which might not be the correct paths.
> > >
Jim, another idea: if those strings are likely to be wrong and in fact
not used, can we just not print them?
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
> From: Jenny Herbert
>
> Use the foreign page flag in netback to get the domid and grant ref
> needed for the grant copy. This signficiantly simplifies the netback
> code and makes netback work with foreign pages from other backends
> (e.g.
"Jan Beulich" writes:
On 07.01.15 at 11:41, wrote:
>> On 07/01/15 09:10, Olaf Hering wrote:
>>> On Mon, Jan 05, Vitaly Kuznetsov wrote:
>>>
Wei Liu writes:
> Olaf mentioned his concern about handling ballooned pages in
> <20141211153029.ga1...@aepfle.de>. Is that point m
On 07/01/2015 11:26, "Ian Campbell" wrote:
>On Tue, 2015-01-06 at 11:15 -0500, Konrad Rzeszutek Wilk wrote:
>> Hello,
>>
>> Per http://wiki.xenproject.org/wiki/Xen_Project_Maintenance_Releases:
>> "Each stable branch has a maintainer who is nominated/volunteers
>>according to the Maintainer El
On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
> From: Jenny Herbert
>
> Introduce gnttab_unmap_refs_async() that can be used to safely unmap
> pages that may be in use (ref count > 1). If the pages are in use the
> unmap is deferred and retried later. This polling is not very clever
>
On Wed, 2015-01-07 at 12:00 +, Ian Campbell wrote:
> On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
> > From: Jenny Herbert
> >
> > Introduce gnttab_unmap_refs_async() that can be used to safely unmap
> > pages that may be in use (ref count > 1). If the pages are in use the
> > unmap
On 07/01/15 11:59, Lars Kurth wrote:
>
> On 07/01/2015 11:26, "Ian Campbell" wrote:
>
>> On Tue, 2015-01-06 at 11:15 -0500, Konrad Rzeszutek Wilk wrote:
>>> Hello,
>>>
>>> Per http://wiki.xenproject.org/wiki/Xen_Project_Maintenance_Releases:
>>> "Each stable branch has a maintainer who is nominate
On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
> In an x86 PV guest, get_user_pages_fast() on a userspace address range
> containing foreign mappings does not work correctly because the M2P
> lookup of the MFN from a userspace PTE may return the wrong page.
>
> Force get_user_pages_fast()
On Wed, Jan 07, 2015 at 07:12:04PM +0800, Chao Peng wrote:
[...]
> -int libxl_psr_cmt_get_cache_occupancy(libxl_ctx *ctx,
> - uint32_t domid,
> - uint32_t socketid,
> - uint32_t *l3_cache_
On Wed, 2015-01-07 at 11:59 +, Lars Kurth wrote:
>
>
> On 07/01/2015 11:26, "Ian Campbell" wrote:
>
> >On Tue, 2015-01-06 at 11:15 -0500, Konrad Rzeszutek Wilk wrote:
> >> Hello,
> >>
> >> Per http://wiki.xenproject.org/wiki/Xen_Project_Maintenance_Releases:
> >> "Each stable branch has a
Hi all,
For a few years now I've been running a monthly phone call between
various organisations which contribute to Xen, the so called "TCT
Call"[0]. However since then the Xen Project has moved to the Linux
foundation and the introduction of the Advisory Board means this call
isn't really useful
On Wed, Jan 07, 2015 at 07:12:05PM +0800, Chao Peng wrote:
[...]
> +static int libxl__psr_cmt_get_mem_bandwidth(libxl__gc *gc,
> +uint32_t domid,
> +xc_psr_cmt_type type,
> +
After upgrade to current staging, my test packages fail to build:
[ 289s] + make -j4 -k -C tools/include/xen-foreign
[ 289s] make: Entering directory
`/usr/src/packages/BUILD/xen-4.6.0.30084/non-dbg/tools/include/xen-foreign'
[ 289s] python mkheader.py arm32 arm32.h
/usr/src/packages/BUILD/x
>> Maybe we should just change the
>> document to clarify that an election is only needed if the previous
>> maintainer steps down, which is what I think the intention really was.
>
> Seems reasonable to me, presumably some existing mechanism (i.e. common
> sense...) exists if the incumbent goes o
On 07/01/15 12:37, Olaf Hering wrote:
> After upgrade to current staging, my test packages fail to build:
>
> [ 289s] + make -j4 -k -C tools/include/xen-foreign
> [ 289s] make: Entering directory
> `/usr/src/packages/BUILD/xen-4.6.0.30084/non-dbg/tools/include/xen-foreign'
> [ 289s] python mkhe
>>> On 07.01.15 at 13:45, wrote:
> On 07/01/15 12:37, Olaf Hering wrote:
>> After upgrade to current staging, my test packages fail to build:
>>
>> [ 289s] + make -j4 -k -C tools/include/xen-foreign
>> [ 289s] make: Entering directory
> `/usr/src/packages/BUILD/xen-4.6.0.30084/non-dbg/tools/inc
On 07/01/15 12:00, Ian Campbell wrote:
> On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
>> From: Jenny Herbert
>>
>> Introduce gnttab_unmap_refs_async() that can be used to safely unmap
>> pages that may be in use (ref count > 1). If the pages are in use the
>> unmap is deferred and retri
On 07/01/15 12:11, Ian Campbell wrote:
> On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
>> In an x86 PV guest, get_user_pages_fast() on a userspace address range
>> containing foreign mappings does not work correctly because the M2P
>> lookup of the MFN from a userspace PTE may return the w
On Wed, 2015-01-07 at 13:07 +, David Vrabel wrote:
> On 07/01/15 12:00, Ian Campbell wrote:
> > On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
> >> From: Jenny Herbert
> >>
> >> Introduce gnttab_unmap_refs_async() that can be used to safely unmap
> >> pages that may be in use (ref coun
On 07/01/15 13:24, Ian Campbell wrote:
> On Wed, 2015-01-07 at 13:07 +, David Vrabel wrote:
>
>> We don't use this safe unmap mechanism for netback because the zero copy
>> stuff means we don't need it and the polling on the unmap is high
>> latency and only good enough if the polling is neede
On Wed, 2015-01-07 at 13:30 +, David Vrabel wrote:
> On 07/01/15 13:24, Ian Campbell wrote:
> > On Wed, 2015-01-07 at 13:07 +, David Vrabel wrote:
> >
> >> We don't use this safe unmap mechanism for netback because the zero copy
> >> stuff means we don't need it and the polling on the unma
On Wed, 2015-01-07 at 13:23 +, David Vrabel wrote:
> On 07/01/15 12:11, Ian Campbell wrote:
> > On Tue, 2015-01-06 at 18:57 +, David Vrabel wrote:
> >> In an x86 PV guest, get_user_pages_fast() on a userspace address range
> >> containing foreign mappings does not work correctly because the
On Wed, 2015-01-07 at 13:05 +, Jan Beulich wrote:
> >>> On 07.01.15 at 13:45, wrote:
> > On 07/01/15 12:37, Olaf Hering wrote:
> >> After upgrade to current staging, my test packages fail to build:
> >>
> >> [ 289s] + make -j4 -k -C tools/include/xen-foreign
> >> [ 289s] make: Entering direc
On 07/01/15 13:36, Ian Campbell wrote:
> On Wed, 2015-01-07 at 13:05 +, Jan Beulich wrote:
> On 07.01.15 at 13:45, wrote:
>>> On 07/01/15 12:37, Olaf Hering wrote:
After upgrade to current staging, my test packages fail to build:
[ 289s] + make -j4 -k -C tools/include/xen-f
On Wed, 2015-01-07 at 13:39 +, Andrew Cooper wrote:
> On 07/01/15 13:36, Ian Campbell wrote:
> > On Wed, 2015-01-07 at 13:05 +, Jan Beulich wrote:
> > On 07.01.15 at 13:45, wrote:
> >>> On 07/01/15 12:37, Olaf Hering wrote:
> After upgrade to current staging, my test packages fail
flight 33190 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33190/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
build-armhf-libvirt
With recent changes in p2m we now have legitimate cases when
p2m memory needs to be freed during early boot (i.e. before
slab is initialized).
Signed-off-by: Boris Ostrovsky
---
arch/x86/xen/p2m.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/arch/x86/xen/p2m.c b/arc
On 01/07/2015 04:04 AM, Dario Faggioli wrote:
On Mon, 2015-01-05 at 21:18 -0500, Boris Ostrovsky wrote:
.. and use this new interface to display it along with CPU topology
and NUMA information when 'xl info -n' command is issued
Also, can we see how an `xl info -n' looks, on an IONUMA system?
On 01/07/2015 03:08 PM, Boris Ostrovsky wrote:
With recent changes in p2m we now have legitimate cases when
p2m memory needs to be freed during early boot (i.e. before
slab is initialized).
Signed-off-by: Boris Ostrovsky
Reviewed-by: Juergen Gross
---
arch/x86/xen/p2m.c | 7 +--
1 f
On 01/07/2015 04:06 AM, Jan Beulich wrote:
On 06.01.15 at 03:18, wrote:
@@ -618,7 +620,22 @@ ret_t do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void)
arg)
}
else
pdev_info.is_virtfn = 0;
-ret = pci_add_device(add.seg, add.bus, add.devfn, &pdev_info);
On 01/07/2015 04:12 AM, Jan Beulich wrote:
On 06.01.15 at 14:41, wrote:
On 06/01/15 02:18, Boris Ostrovsky wrote:
Instead of copying data for each field in xen_sysctl_topologyinfo separately
put cpu/socket/node into a single structure and do a single copy for each
processor.
There is also no
On Tue, Jan 06, 2015 at 11:18:21PM -0800, Andy Lutomirski wrote:
> On Tue, Jan 6, 2015 at 9:38 PM, Paolo Bonzini wrote:
> >
> >
> > On 06/01/2015 17:56, Andy Lutomirski wrote:
> >> Still no good. We can migrate a bunch of times so we see the same CPU
> >> all three times
> >
> > There are no thre
On Wed, 2015-01-07 at 09:15 -0500, Boris Ostrovsky wrote:
> On 01/07/2015 04:04 AM, Dario Faggioli wrote:
> > This is basically what Andrew was doing here (although that was on
> > xc_{topology,numa}info:
> >
> > http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/hwl
The linear p2m changes in 3.19-rc1 is broken with some dom0
configurations. While trying to fix it I also noticed that
get_phys_to_machine() could be optimized for the common case.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.
The page table walk is only needed to distinguish between identity and
missing, both of which have INVALID_P2M_ENTRY.
Signed-off-by: David Vrabel
---
arch/x86/xen/p2m.c | 30 ++
1 file changed, 18 insertions(+), 12 deletions(-)
diff --git a/arch/x86/xen/p2m.c b/arc
On 07/01/15 14:42, Boris Ostrovsky wrote:
> On 01/07/2015 04:06 AM, Jan Beulich wrote:
> On 06.01.15 at 03:18, wrote:
>>> @@ -618,7 +620,22 @@ ret_t do_physdev_op(int cmd,
>>> XEN_GUEST_HANDLE_PARAM(void) arg)
>>> }
>>> else
>>> pdev_info.is_virtfn = 0;
>>> -
If the non-RAM regions in the e820 memory map are larger than the size
of the initial balloon, a BUG was triggered as the frames are remaped
beyond the limit of the linear p2m. The frames are remapped into the
initial balloon area (xen_extra_mem) but not enough of this is
available.
Ensure enough
This accounting is just used to print a diagnostic message that isn't
very useful.
Signed-off-by: David Vrabel
---
arch/x86/xen/setup.c | 27 +--
1 file changed, 9 insertions(+), 18 deletions(-)
diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
index dfd77de..66
On Wed, Jan 07, 2015 at 02:13:49PM +0800, Jiang Liu wrote:
> Commit b81975eade8c ("x86, irq: Clean up irqdomain transition code")
> breaks xen IRQ allocation because xen_smp_prepare_cpus() doesn't invoke
> setup_IO_APIC(), so no irqdomains created for IOAPICs and
> mp_map_pin_to_irq() fails at the
On Wed, Jan 07, 2015 at 09:31:50AM +, Ian Campbell wrote:
> On Wed, 2015-01-07 at 10:23 +0100, Olaf Hering wrote:
> > On Tue, Jan 06, Ian Campbell wrote:
> >
> > > On Fri, 2014-12-19 at 12:25 +0100, Olaf Hering wrote:
> >
> > ...
> >
> > > Acked-by: Ian Campbell
> > >
> > > (on commit s/Ap
On 01/07/2015 04:21 AM, Jan Beulich wrote:
On 06.01.15 at 03:18, wrote:
--- a/xen/common/sysctl.c
+++ b/xen/common/sysctl.c
@@ -365,6 +365,66 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t)
u_sysctl)
}
break;
#ifdef HAS_PCI
+case XEN_SYSCTL_pcitopoinfo:
+{
+
On Wed, Jan 07, 2015 at 10:49:38AM +0100, Olaf Hering wrote:
> On Tue, Jan 06, Ian Jackson wrote:
>
> > Olaf Hering writes ("[PATCH 7/7] tools/hotplug: add wrapper to start
> > xenstored"):
> > > The shell wrapper in xenstored.service does not handle XENSTORE_TRACE.
> > ...
> > > +XENSTORED_LIBEX
On Wed, Jan 07, 2015 at 10:53:06AM +0100, Olaf Hering wrote:
> On Mon, Jan 05, Konrad Rzeszutek Wilk wrote:
>
> > +Release Issues
> > +==
> > +
> > +While we did the utmost to get a release out, there are certain
> > +fixes which were not complete on time. As such please reference this
On Wed, Jan 07, 2015 at 10:15:39AM +, Jan Beulich wrote:
> >>> On 23.12.14 at 07:52, wrote:
> >> From: Jan Beulich [mailto:jbeul...@suse.com]
> >> Sent: Friday, December 19, 2014 7:26 PM
> >>
> >> This can (and will) be legitimately the case when sharing page tables
> >> with EPT (more of a
On Wed, Jan 07, Konrad Rzeszutek Wilk wrote:
> On Wed, Jan 07, 2015 at 10:53:06AM +0100, Olaf Hering wrote:
> > Its my understanding that the reported SELinux failure is not only
> > related to the context= mount option, but also to the socket passing
> > from systemd.
>
> I couldn't spot any err
>>> On 07.01.15 at 15:42, wrote:
> On 01/07/2015 04:06 AM, Jan Beulich wrote:
> On 06.01.15 at 03:18, wrote:
>>> --- a/xen/include/xen/pci.h
>>> +++ b/xen/include/xen/pci.h
>>> @@ -56,6 +56,8 @@ struct pci_dev {
>>>
>>> u8 phantom_stride;
>>>
>>> +int node; /* NUMA node */
>>
>>> On 07.01.15 at 15:47, wrote:
> On 07/01/15 14:42, Boris Ostrovsky wrote:
>> I kept this field as an int to be able to store NUMA_NO_NODE which I
>> thought to be (int)-1.
>>
>> But now I see that NUMA_NO_NODE is, in fact, 0xff but is promoted to
>> (int)-1 by pxm_to_node(). Given that there is
>>> On 07.01.15 at 15:45, wrote:
> On 01/07/2015 04:12 AM, Jan Beulich wrote:
> On 06.01.15 at 14:41, wrote:
>>> On 06/01/15 02:18, Boris Ostrovsky wrote:
Instead of copying data for each field in xen_sysctl_topologyinfo
separately
put cpu/socket/node into a single structure a
On 01/07/2015 03:47 PM, David Vrabel wrote:
This accounting is just used to print a diagnostic message that isn't
very useful.
Signed-off-by: David Vrabel
Reviewed-by: Juergen Gross
---
arch/x86/xen/setup.c | 27 +--
1 file changed, 9 insertions(+), 18 deletion
On 01/07/2015 03:47 PM, David Vrabel wrote:
If the non-RAM regions in the e820 memory map are larger than the size
of the initial balloon, a BUG was triggered as the frames are remaped
beyond the limit of the linear p2m. The frames are remapped into the
initial balloon area (xen_extra_mem) but n
On 07/01/15 14:08, Boris Ostrovsky wrote:
> With recent changes in p2m we now have legitimate cases when
> p2m memory needs to be freed during early boot (i.e. before
> slab is initialized).
>
> Signed-off-by: Boris Ostrovsky
Applied to to stable/for-linus-3.19, thanks.
If I understand correctl
On 01/07/2015 03:47 PM, David Vrabel wrote:
The page table walk is only needed to distinguish between identity and
missing, both of which have INVALID_P2M_ENTRY.
As get_phys_to_machine is called by __pfn_to_mfn() only which already
checks for mfn == INVALID_P2M_ENTRY this optimization will have
>>> On 07.01.15 at 15:55, wrote:
> On 01/07/2015 04:21 AM, Jan Beulich wrote:
> On 06.01.15 at 03:18, wrote:
>>> +for ( ; ti->first_dev < ti->num_devs; ti->first_dev++ )
>>> +{
>>> +xen_sysctl_pcitopo_t pcitopo;
>>> +struct pci_dev *pdev;
>>> +
>>> +
On 01/07/2015 10:10 AM, David Vrabel wrote:
On 07/01/15 14:08, Boris Ostrovsky wrote:
With recent changes in p2m we now have legitimate cases when
p2m memory needs to be freed during early boot (i.e. before
slab is initialized).
Signed-off-by: Boris Ostrovsky
Applied to to stable/for-linus-3.
These changes were requested by Ian Campbell when relevant patches were posted
but they didn't warrant a resend at that time.
Wei Liu (2):
libxl_internal: lock_carefd -> carefd
libxl_internal: comment on domain userdata unlock function
tools/libxl/libxl_internal.c | 20 +---
1 - 100 of 178 matches
Mail list logo