>>> On 10.06.15 at 16:08, wrote:
> On Wed, 2015-06-10 at 14:45 +0100, Jan Beulich wrote:
>> So if we're going to approach Intel with this - will you or should I?
>
> I think it'd be best coming from you.
Just have sent it off; in putting together the technical details it
became clear that elblin
>>> On 10.06.15 at 18:39, wrote:
> On 06/10/2015 12:43 AM, Jan Beulich wrote:
> On 10.06.15 at 02:09, wrote:
>>> Design
>>> ==
>>
>> Reads all quite reasonable; just one minor remark:
>>
>>> - Core altp2m functionality
>>>
>>> A new altp2m type is added to the p2m types (in addition to
>>> On 10.06.15 at 20:55, wrote:
> On Wed, Jun 10, 2015 at 02:34:00PM +0200, Roger Pau Monné wrote:
>> The first three notes contain information about the guest kernel and
>> the Xen hypercall ABI version. The following notes are of special
>> interest:
>>
>> * XEN_ELFNOTE_PADDR_OFFSET: the of
Hi,
Recently I encounter a strange performance problem with APIC virtualization.
My host has Intel(R) Xeon(R) CPU E7-4890 v2 CPU installed which support
APIC virtualization and x2apic, and there are 4 socket * 15
cores_per_socket = 60 core available for VM. There is also a SSD disk on
host an
>>> On 11.06.15 at 03:15, wrote:
> v3:
>
> * Rearrange all patches orderly as Wei suggested
> * Rebase on the latest tree
> * Address some Wei's comments on tools side
> * Two changes for runtime cycle
>patch #2,xen/x86/p2m: introduce set_identity_p2m_entry, on hypervisor
> side
>
> a>. I
flight 58400 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58400/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
>>> On 11.06.15 at 03:15, wrote:
> We will create this sort of identity mapping as follows:
>
> If the gfn space is unoccupied, we just set the mapping. If the space
> is already occupied by 1:1 mappings, do nothing. Failed for any
> other cases.
>
> Signed-off-by: Tiejun Chen
First of all you
Liuqiming (John) wrote on 2015-06-11:
> Hi,
>
> Recently I encounter a strange performance problem with APIC virtualization.
>
> My host has Intel(R) Xeon(R) CPU E7-4890 v2 CPU installed which support
> APIC virtualization and x2apic, and there are 4 socket * 15
> cores_per_socket = 60 core avail
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, June 11, 2015 2:58 PM
>
> All,
>
> we're seeing recurring but intermittent failures in osstest on just the
> two hosts using these particular CPU types. The closest similar ones,
> using Xeon E5-2407 v2, do not exhibit this same beh
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: Wednesday, June 10, 2015 11:42 PM
> To: Pang, LongtaoX
> Cc: xen-devel@lists.xen.org; ian.campb...@citrix.com; wei.l...@citrix.com; Hu,
> Robert
> Subject: Re: [OSSTEST Nested PATCH v11 6/7] Compose the ma
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Friday, June 05, 2015 7:26 PM
>
> Also make dmar_{read,write}q() actually do what their names suggest (we
> don't need to be concerned of 32-bit restrictions anymore).
>
> Signed-off-by: Jan Beulich
Acked-by: Kevin Tian
>
> --- a/xen/dri
>>> On 10.06.15 at 22:53, wrote:
> --- a/hw/xen/xen_pt.c
> +++ b/hw/xen/xen_pt.c
> @@ -785,7 +785,9 @@ out:
> xen_host_pci_set_word(&s->real_device, PCI_COMMAND,
>pci_get_word(d->config + PCI_COMMAND) | cmd);
> }
> -
> +/* Until the guest enables t
> From: Alan Robinson [mailto:alan.robin...@ts.fujitsu.com]
> Sent: Monday, June 08, 2015 6:05 PM
>
> From: Alan Robinson
>
> commit 6d112f2b50 ("x86/vPMU: change Intel model numbers from decimal
> to hex") translated 47 to 0x27, now corrected to 0x2f.
>
> Signed-off-by: Alan Robinson
> Signed
>>> On 11.06.15 at 09:37, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Thursday, June 11, 2015 2:58 PM
>>
>> All,
>>
>> we're seeing recurring but intermittent failures in osstest on just the
>> two hosts using these particular CPU types. The closest similar ones,
>> using Xe
Sunguodong wrote on 2015-06-03:
> Hi,
>
> I am getting a vm stuck problem when booting a windows 7 guest on
> xen-4.6(latest version).
>
> My hvm guest: Windows 7 64bit (installed pvdriver inside, pvdriver is
> downloaded from
> 'http://wiki.univention.de/index.php?title=Installing-signed-GPLP
I will setup a test environment for xen upstream version but need some time.
Meanwhile, can you give me some idea about what MAY cause this problem?
I have been using xentrace to trace the problem, from what I see, the apicv
feature
itself works
apicv=1
2583096 VMEXIT 1902
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Wednesday, June 10, 2015 11:04 PM
>
> Add runtime interface for setting PMU mode and flags. Three main modes are
> provided:
> * XENPMU_MODE_OFF: PMU is not virtualized
> * XENPMU_MODE_SELF: Guests can access PMU MSRs and receive
V3 Changes:
1) coding style changes based on Jan's comments;
2) remove the function - unregister_cpu_notifier();
3) solve a bug in the CPU offline code (Patch 0007);
4) move the perf_limits struct into the per-CPU policy struct, so that
each CPU can be managed individually;
5) "load_intel_pstate" i
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Wednesday, June 10, 2015 11:04 PM
>
> Code for initializing/tearing down PMU for PV guests
>
> Signed-off-by: Boris Ostrovsky
> Acked-by: Daniel De Graaf
> Acked-by: Jan Beulich
Acked-by: Kevin Tian
> ---
> tools/flask/pol
On 2015/6/11 15:33, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
We will create this sort of identity mapping as follows:
If the gfn space is unoccupied, we just set the mapping. If the space
is already occupied by 1:1 mappings, do nothing. Failed for any
other cases.
Signed-off-by: Tiejun
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Wednesday, June 10, 2015 11:04 PM
>
> No need to compute those masks on every MSR access.
>
> Also, when checking MSR_P6_EVNTSELx registers make sure that bit 21
> (which is a reserved bit) is not set.
>
> Signed-off-by: Boris O
El 10/06/15 a les 17.57, Andrew Cooper ha escrit:
Do we want to keep using the start_info page? Most of the fields there
are not relevant for auto-translated guests, but without it we have to
figure out how to pass the following information to the guest:
- Flags: SIF_xxx
The added calculation related functions will be used in the intel_pstate.c.
They are copied from the kernel(commit 2418f4f2, f3002134, eb18cba7).
Signed-off-by: Wei Wang
---
xen/include/asm-x86/div64.h | 72 +
xen/include/xen/kernel.h| 12
Add a common interface for matching the current cpu against an
array of x86_cpu_ids. Also change mwait-idle.c to use it.
Signed-off-by: Wei Wang
---
xen/arch/x86/cpu/common.c | 38 ++
xen/arch/x86/cpu/mwait-idle.c | 28 +++-
xen
cpufreq_add_cpu() is already called in the hypercall code path
(the bottom of set_px_pminfo() and inside cpufreq_cpu_init()).
So, we remove the redundant calling here.
Signed-off-by: Wei Wang
---
xen/drivers/cpufreq/cpufreq.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/xen/drivers/cpufr
Register the CPU hotplug notifier when the driver is
registered, and move the driver register function to
the cpufreq.c.
Signed-off-by: Wei Wang
---
xen/drivers/cpufreq/cpufreq.c | 15 ---
xen/include/acpi/cpufreq/cpufreq.h | 28 ++--
2 files changed, 14
In order to better support future Intel processors, intel_pstate
changes to use percentage values to tune P-states. The intel_pstate
driver uses its own internal governor, and it is recorded in the
"policy->policy" field. The setpolicy driver interface is used to
configure the intel_pstate internal
The intel_pstate driver is ported following its kernel code logic
(commit: 93f0822d).In order to port the Linux source file with
minimal modifications, some of the variable types are kept intact
(e.g. "int current_pstae", would otherwise be changed to
"unsigned int").
In the kernel, a user can adj
cpufreq_cpu_policy is used in intel_pstate_set_pstate(), so we change
to NULL it after the call of cpufreq_driver->exit. Otherwise, a
calltrace will show up on your screen due to the reference of a NULL
pointer when you power down the system.
Signed-off-by: Wei Wang
---
xen/drivers/cpufreq/cpufr
By default, the old P-state driver (acpi-freq) is used. Adding
"intel_pstate" to the Xen booting param list to enable the
use of intel_pstate. However, if intel_pstate is enabled on a
machine which does not support the driver (e.g. Nehalem), the
old P-state driver will be loaded due to the failure
Adding the intel_pstate booting parameter to xen-command-line.markdown.
Signed-off-by: Wei Wang
---
docs/misc/xen-command-line.markdown | 7 +++
1 file changed, 7 insertions(+)
diff --git a/docs/misc/xen-command-line.markdown
b/docs/misc/xen-command-line.markdown
index 4889e27..249bf65 100
El 10/06/15 a les 23.31, Andrew Cooper ha escrit:
> On 10/06/2015 19:55, Konrad Rzeszutek Wilk wrote:
>>> All other processor registers and flag bits are undefined. The OS is in
>>> charge of setting up it's own stack, GDT and IDT.
>>>
>>> Note that the boot protocol resembles the multiboot1 speci
Add support in the pmstat.c so that the xenpm tool can request to
access the intel_pstate driver.
Signed-off-by: Wei Wang
---
tools/libxc/xc_pm.c| 4 +-
xen/drivers/acpi/pmstat.c | 130 +++--
xen/include/acpi/cpufreq/cpufreq.h | 2 +
x
> -Original Message-
> From: Wen Congyang [mailto:we...@cn.fujitsu.com]
> Sent: 11 June 2015 02:14
> To: Paul Durrant; Andrew Cooper; Yang Hongyang; xen-devel@lists.xen.org
> Cc: Wei Liu; Ian Campbell; guijianf...@cn.fujitsu.com;
> yunhong.ji...@intel.com; Eddie Dong; rshri...@cs.ubc.ca; Ia
The intel_pstate driver receives percentage values to set the
performance limits. This patch adds interfaces to support the
input of percentage values to control the intel_pstate driver.
Also, the "get-cpufreq-para" is modified to show percentage
based feedback info.
Signed-off-by: Wei Wang
---
Liuqiming (John) wrote on 2015-06-11:
> I will setup a test environment for xen upstream version but need some time.
> Meanwhile, can you give me some idea about what MAY cause this problem?
How you set the irq affinity of assigned SSD device? IIRC, the irq is migrated
with vcpu by default in cur
>>> On 05.06.15 at 13:28, wrote:
> Qemu shouldn't be fiddling with this bit directly, as the hypervisor
> may (and now does) use it for its own purposes. Provide it with a
> replacement interface, allowing the hypervisor to track host and guest
> masking intentions independently (clearing the bit
On Thu, 2015-06-11 at 11:17 +0800, Robert Hu wrote:
> > Unless I'm mistaken, the MenuEntryPath of a $submenu is never used ?
> > Not setting it would avoid (a) a need to rewrap and (b) me complaining
> > that you have open-coded the join twice.
> Actually this contribution from Ian Campbell.
> Hi
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Wednesday, June 10, 2015 11:04 PM
>
> Add support for handling PMU interrupts for PV(H) guests.
>
> VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush
> hypercall. This allows the guest to access PMU MS
On Thu, 2015-06-11 at 07:41 +, Pang, LongtaoX wrote:
>
> > -Original Message-
> > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> > Sent: Wednesday, June 10, 2015 11:42 PM
> > To: Pang, LongtaoX
> > Cc: xen-devel@lists.xen.org; ian.campb...@citrix.com; wei.l...@citrix.com;
> >
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Wednesday, June 10, 2015 11:05 PM
>
> Since PMU is now not HVM specific we can move VPMU-related files up from
> arch/x86/hvm/ directory.
>
> Specifically:
> arch/x86/hvm/vpmu.c -> arch/x86/cpu/vpmu.c
> arch/x86/hvm/svm/v
OK, I will test with 'xl destroy && xl create' next.
My current config is:
###
builder = "hvm"
name = "win7-1"
#viridian = 1 # didn't enable the viridian here
memory = 4096
maxmem = 4096
vcpus = 4
pae=1
acpi=1
apic=1
sdl=0
vif = [ 'mac=00:16:3e:07:37:88,bridge=br0' ]
disk = [ 'file:/home/sda1
On Thu, 2015-06-11 at 10:07 +0800, Yang Hongyang wrote:
>
> On 06/10/2015 11:20 PM, Ian Campbell wrote:
> > On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
> >> When we are under COLO, we will send dirty page bitmap info from
> >> secondary to primary at every checkpoint.
> >
> > ... and t
El 10/06/15 a les 20.55, Konrad Rzeszutek Wilk ha escrit:
> On Wed, Jun 10, 2015 at 02:34:00PM +0200, Roger Pau Monné wrote:
>> Hello,
>>
>> The discussion in [1] lead to an agreement of the missing pieces in PVH
>> (or HVM without a device-model) in order to progress with it's
>> implementation.
On Thu, 2015-06-11 at 10:09 +0800, Yang Hongyang wrote:
>
> On 06/10/2015 11:35 PM, Ian Campbell wrote:
> > On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
> >> Secondary vm is running in colo mode. So we will do
> >> the following things again and again:
> >> 1. suspend both primay vm and
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, June 11, 2015 3:28 PM
>
> >>> On 11.06.15 at 03:15, wrote:
> > v3:
> >
> > * Rearrange all patches orderly as Wei suggested
> > * Rebase on the latest tree
> > * Address some Wei's comments on tools side
> > * Two changes for runtim
On Thu, 2015-06-11 at 10:21 +0800, Yang Hongyang wrote:
>
> On 06/10/2015 11:37 PM, Ian Campbell wrote:
> > On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
> >> From: Wen Congyang
> >>
> >> The guest is paused after libxl_domain_create_restore().
> >> Secondary vm is running in colo mode.
On 06/11/2015 04:32 PM, Paul Durrant wrote:
>> -Original Message-
>> From: Wen Congyang [mailto:we...@cn.fujitsu.com]
>> Sent: 11 June 2015 02:14
>> To: Paul Durrant; Andrew Cooper; Yang Hongyang; xen-devel@lists.xen.org
>> Cc: Wei Liu; Ian Campbell; guijianf...@cn.fujitsu.com;
>> yunhong.j
On Thu, 2015-06-11 at 10:42 +0800, Wen Congyang wrote:
> On 06/10/2015 11:18 PM, Ian Campbell wrote:
> > On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
> >> From: Wen Congyang
> >>
> >> For PVHVM, the hypercall return code is 0, and it can be resumed
> >> in a new domain context.
> >> we
On Thu, 2015-06-11 at 08:02 +0100, Jan Beulich wrote:
> >>> On 10.06.15 at 16:08, wrote:
> > On Wed, 2015-06-10 at 14:45 +0100, Jan Beulich wrote:
> >> So if we're going to approach Intel with this - will you or should I?
> >
> > I think it'd be best coming from you.
>
> Just have sent it off; i
On 06/11/2015 04:44 PM, Ian Campbell wrote:
> On Thu, 2015-06-11 at 10:42 +0800, Wen Congyang wrote:
>> On 06/10/2015 11:18 PM, Ian Campbell wrote:
>>> On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
From: Wen Congyang
For PVHVM, the hypercall return code is 0, and it can be
The current code for allocating memory for PV guests batches the
hypercalls to allocate memory by allocating 1024*1024 extents of order 0
at a time. To make this faster, first try allocating extents of order 9
(2 MiB) before falling back to the order 0 allocating if the order 9
allocation fails.
O
On Wed, 2015-06-10 at 15:21 -0400, Julien Grall wrote:
> Hi,
>
> On 10/06/2015 08:45, Ian Campbell wrote:
> >> 4. DomU access / assignment PCI device
> >> --
> >> When a device is attached to a domU, provision has to be made such that
> >> it can
> >> access the
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> From: Jan Beulich
>
> This is a prerequisite for punching holes into HVM and PVH guests' P2M
> to allow passing through devices that are associated with (on VT-d)
> RMRRs.
>
> Signed-off-by: Jan Beulich
> Signed-off-by: Tiejun Ch
On Wed, 2015-06-10 at 17:29 +0100, David Vrabel wrote:
> On 10/06/15 12:36, Ian Campbell wrote:
> > libxenevtchn will provide a stable API and ABI for accessing the
> > evtchn device.
> >
> > The functions are moved into the xenevtchn namespace to make a clean
> > break from libxc and avoid ambigu
On 06/11/2015 04:43 PM, Ian Campbell wrote:
On Thu, 2015-06-11 at 10:09 +0800, Yang Hongyang wrote:
On 06/10/2015 11:35 PM, Ian Campbell wrote:
On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
Secondary vm is running in colo mode. So we will do
the following things again and again:
1
On Wed, 2015-06-10 at 16:57 +0100, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH RFC qemu-trad 1/2] qemu-xen-traditional: Use
> xentoollog as a separate library"):
> > This has been split out of libxenctrl, so the build needs to be able
> > to find the header and the library. QEMU does not use
On Thu, 2015-06-11 at 09:37 +0100, Ian Campbell wrote:
> On Thu, 2015-06-11 at 11:17 +0800, Robert Hu wrote:
>
> > > Unless I'm mistaken, the MenuEntryPath of a $submenu is never used ?
> > > Not setting it would avoid (a) a need to rewrap and (b) me complaining
> > > that you have open-coded the
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> We will create this sort of identity mapping as follows:
>
> If the gfn space is unoccupied, we just set the mapping. If the space
> is already occupied by 1:1 mappings, do nothing. Failed for any
> other cases.
"If space is alread
On Wed, 2015-06-10 at 18:16 +0100, Andrew Cooper wrote:
> On 10/06/15 12:36, Ian Campbell wrote:
> > libxenevtchn will provide a stable API and ABI for accessing the
> > evtchn device.
> >
> > The functions are moved into the xenevtchn namespace to make a clean
> > break from libxc and avoid ambigu
El 10/06/15 a les 21.21, Julien Grall ha escrit:
>> If there is a reason for this restriction/trade off then it should be
>> spelled out as part of the design document, as should other such design
>> decisions (which would include explaining where this differs from how
>> things work for x86 why th
On 06/11/2015 04:43 PM, Ian Campbell wrote:
> On Thu, 2015-06-11 at 10:21 +0800, Yang Hongyang wrote:
>>
>> On 06/10/2015 11:37 PM, Ian Campbell wrote:
>>> On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
From: Wen Congyang
The guest is paused after libxl_domain_create_restor
On 2015/6/11 16:42, Tian, Kevin wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Thursday, June 11, 2015 3:28 PM
On 11.06.15 at 03:15, wrote:
v3:
* Rearrange all patches orderly as Wei suggested
* Rebase on the latest tree
* Address some Wei's comments on tools side
* Two changes fo
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> RMRR reserved regions must be setup in the pfn space with an identity
> mapping to reported mfn. However existing code has problem to setup
> correct mapping when VT-d shares EPT page table, so lead to problem
> when assigning device
On 2015/6/11 17:00, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
We will create this sort of identity mapping as follows:
If the gfn space is unoccupied, we just set the mapping. If the space
is already occupied by 1:1 mappings, do nothing. Failed for any
other ca
On Fri, Jun 05, 2015 at 05:22:56PM +0100, Ian Campbell wrote:
> On Mon, 2015-06-01 at 20:56 +0800, Chen Baozi wrote:
> > From: Chen Baozi
> >
> > evtchn_init will call domain_max_vcpus to allocate poll_mask. On
> > arm/arm64 platform, this number is determined by the vGIC the guest
> > is going t
>>> On 11.06.15 at 10:23, wrote:
> On 2015/6/11 15:33, Jan Beulich wrote:
> On 11.06.15 at 03:15, wrote:
>>> We will create this sort of identity mapping as follows:
>>>
>>> If the gfn space is unoccupied, we just set the mapping. If the space
>>> is already occupied by 1:1 mappings, do nothi
On 2015/6/11 17:23, Jan Beulich wrote:
On 11.06.15 at 10:23, wrote:
On 2015/6/11 15:33, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
We will create this sort of identity mapping as follows:
If the gfn space is unoccupied, we just set the mapping. If the space
is already occupied by 1:1 m
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> This patch extends the existing hypercall to support rdm reservation policy.
> We return error or just throw out a warning message depending on whether
> the policy is "strict" or "relaxed" when reserving RDM regions in pfn space.
>
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> This patch enables XENMEM_memory_map in hvm. So we can use it to
> setup the e820 mappings.
>
> Signed-off-by: Tiejun Chen
> Reviewed-by: Tim Deegan
Reviewed-by: Kevin Tian
> ---
> xen/arch/x86/hvm/hvm.c | 2 --
> xen/arch/x86
On 2015/6/11 17:14, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
RMRR reserved regions must be setup in the pfn space with an identity
mapping to reported mfn. However existing code has problem to setup
correct mapping when VT-d shares EPT page table, so lead to pr
>>> On 11.06.15 at 10:38, wrote:
>> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
>> Sent: Wednesday, June 10, 2015 11:04 PM
>>
>> Add support for handling PMU interrupts for PV(H) guests.
>>
>> VPMU for the interrupted VCPU is unloaded until the guest issues
> XENPMU_flush
>> hype
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, June 11, 2015 5:33 PM
>
> >>> On 11.06.15 at 10:38, wrote:
> >> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> >> Sent: Wednesday, June 10, 2015 11:04 PM
> >>
> >> Add support for handling PMU interrupts for PV(H) gues
On Thu, 2015-06-11 at 17:20 +0800, Chen Baozi wrote:
> On Fri, Jun 05, 2015 at 05:22:56PM +0100, Ian Campbell wrote:
> > On Mon, 2015-06-01 at 20:56 +0800, Chen Baozi wrote:
> > > From: Chen Baozi
> > >
> > > evtchn_init will call domain_max_vcpus to allocate poll_mask. On
> > > arm/arm64 platfor
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> Now we get this map layout by call XENMEM_memory_map then
> save them into one global variable memory_map[]. It should
> include lowmem range, rdm range and highmem range. Note
> rdm range and highmem range may not exist in some case
Draft F follows. Also at:
http://xenbits.xen.org/people/ianc/vits/draftF.{pdf,html}
Here's a quick update based on feedback prior to meeting on #xenarm at
12:00AM BST / 7:00AM EDT / 4:30PM IST (which is ~1:20 from now)
Ian.
% Xen on ARM vITS Handling
% Ian Campbell
% Draft F
# Changelog
## Si
On Thu, 2015-06-11 at 16:56 +0800, Wen Congyang wrote:
> On 06/11/2015 04:44 PM, Ian Campbell wrote:
> > On Thu, 2015-06-11 at 10:42 +0800, Wen Congyang wrote:
> >> On 06/10/2015 11:18 PM, Ian Campbell wrote:
> >>> On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
> From: Wen Congyang
>
On Thu, 2015-06-11 at 16:55 +0800, Yang Hongyang wrote:
>
> On 06/11/2015 04:43 PM, Ian Campbell wrote:
> > On Thu, 2015-06-11 at 10:09 +0800, Yang Hongyang wrote:
> >>
> >> On 06/10/2015 11:35 PM, Ian Campbell wrote:
> >>> On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
> Secondary v
On Thu, 2015-06-11 at 17:09 +0800, Wen Congyang wrote:
> On 06/11/2015 04:43 PM, Ian Campbell wrote:
> > On Thu, 2015-06-11 at 10:21 +0800, Yang Hongyang wrote:
> >>
> >> On 06/10/2015 11:37 PM, Ian Campbell wrote:
> >>> On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote:
> From: Wen Congy
On 06/11/2015 05:42 PM, Ian Campbell wrote:
> On Thu, 2015-06-11 at 17:09 +0800, Wen Congyang wrote:
>> On 06/11/2015 04:43 PM, Ian Campbell wrote:
>>> On Thu, 2015-06-11 at 10:21 +0800, Yang Hongyang wrote:
On 06/10/2015 11:37 PM, Ian Campbell wrote:
> On Mon, 2015-06-08 at 11:43 +08
flight 58367 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58367/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 14 guest-localmigrate.2 fail REGR. vs.
58060
Regressions wh
On Thu, 2015-06-11 at 07:34 +0100, Jan Beulich wrote:
> >>> On 10.06.15 at 19:22, wrote:
> > On Wed, Jun 10, 2015 at 2:37 AM, Jan Beulich wrote:
> > On 10.06.15 at 11:26, wrote:
> >>> On Wed, 2015-06-10 at 10:15 +0100, Jan Beulich wrote:
> >>> On 10.06.15 at 10:56, wrote:
> > On T
On 11/06/15 09:35, Jan Beulich wrote:
On 05.06.15 at 13:28, wrote:
>> Qemu shouldn't be fiddling with this bit directly, as the hypervisor
>> may (and now does) use it for its own purposes. Provide it with a
>> replacement interface, allowing the hypervisor to track host and guest
>> masking
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> When allocating mmio address for PCI bars, we need to make
> sure they don't overlap with reserved regions.
>
> Signed-off-by: Tiejun Chen
> ---
> tools/firmware/hvmloader/pci.c | 36
> ++--
> 1 fil
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: Thursday, June 11, 2015 4:40 PM
> To: Pang, LongtaoX
> Cc: Ian Jackson; xen-devel@lists.xen.org; wei.l...@citrix.com; Hu, Robert
> Subject: Re: [OSSTEST Nested PATCH v11 6/7] Compose the main recipe of nest
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> We will introduce the hypercall xc_reserved_device_memory_map
> approach to libxc. This helps us get rdm entry info according to
> different parameters. If flag == PCI_DEV_RDM_ALL, all entries
> should be exposed. Or we just expose t
On 10/06/15 16:15, Wei Liu wrote:
On Wed, Jun 10, 2015 at 05:01:27PM +0100, Ian Jackson wrote:
Ian Campbell writes ("[PATCH RFC 0/6+2+2] Begin to disentangle libxenctrl and
provide some stable libraries"):
[stuff]
Most of this looks good to me.
As part of this change I've begun to get rid
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> This patch passes rdm reservation policy to xc_assign_device() so the policy
> is checked when assigning devices to a VM.
>
> Signed-off-by: Tiejun Chen
> ---
> tools/libxc/include/xenctrl.h | 3 ++-
> tools/libxc/xc_domain
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> Now we can use that memory map to build our final
> e820 table but it may need to reorder all e820
> entries.
>
> Signed-off-by: Tiejun Chen
> ---
> tools/firmware/hvmloader/e820.c | 62
> +++--
Since I'm not a developer I may be peeking my nose a bit too far, but based on
what I know, I think that enabling AHCI by default would be a compatibility
suicide. I'm not sure about Linux and Windows Vista/7/8+, but at least for
Windows XP based VMs, it would be a terrible idea.
Back during W
... when the domain pointer is already available or such operations occur
frequently in a function. There's no particular ordering requirement
between the individual patches, they only all do the same thing to
different areas of code.
1: domctl: prefer is_..._domain() over is_..._vcpu()
2: x86: pr
> -Original Message-
> From: Wen Congyang [mailto:we...@cn.fujitsu.com]
> Sent: 11 June 2015 09:48
> To: Paul Durrant; Andrew Cooper; Yang Hongyang; xen-devel@lists.xen.org
> Cc: Wei Liu; Ian Campbell; guijianf...@cn.fujitsu.com;
> yunhong.ji...@intel.com; Eddie Dong; rshri...@cs.ubc.ca; Ia
... when the domain pointer is already available.
Signed-off-by: Jan Beulich
--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -495,7 +495,7 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe
break;
#ifdef CONFIG_COMPAT
-if ( !is_pv_32on64_vcpu(v) )
+if ( !is_pv_32o
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> While building a VM, HVM domain builder provides struct hvm_info_table{}
> to help hvmloader. Currently it includes two fields to construct guest
> e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should
> check them
... when the domain pointer is already available or such operations
occur frequently in a function.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -481,7 +481,7 @@ int vcpu_initialise(struct vcpu *v)
v->arch.pv_vcpu.ctrlreg[4] = real_cr4_to_pv_guest_
... when the domain pointer is already available.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/mm/guest_walk.c
+++ b/xen/arch/x86/mm/guest_walk.c
@@ -159,7 +159,7 @@ guest_walk_tables(struct vcpu *v, struct
mflags = mandatory_flags(v, pfec);
iflags = (_PAGE_NX_BIT | _PAGE_INVALID_BITS
... when the domain pointer is already available or such operations
occur frequently in a function.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -445,7 +445,7 @@ void hvm_do_resume(struct vcpu *v)
check_wakeup_from_wait();
-if ( is_hvm_vcpu
Latch both domains alongside both vCPU-s into local variables, making
use of them where possible also beyond what the title says.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1429,9 +1429,9 @@ static void _update_runstate_area(struct
v->arch.pv_
In hvm_hap_nested_page_fault() latch the current domain alongside the
current vCPU into a local variable, making use of it where possible
also beyond what the title says.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -2776,7 +2776,8 @@ int hvm_hap_nested
> From: Chen, Tiejun
> Sent: Thursday, June 11, 2015 9:15 AM
>
> Before we refine RMRR mechanism, USB RMRR may conflict with guest bios
> region so we always ignore USB RMRR.
If USB RMRR conflicts with guest bios, the conflict is always there
before and after your refinement. :-)
> Now this can
1 - 100 of 281 matches
Mail list logo