Hi Andrew,
Are there any updates of this series that I can checkout and rebase mine onto?
:)
On 06/15/2015 09:44 PM, Andrew Cooper wrote:
This series adds support for the libxl migration v2 stream, and untangles the
existing layering violations of the toolstack and qemu records.
At the end o
El 01/07/15 a les 18.15, Boris Ostrovsky ha escrit:
> On 07/01/2015 11:57 AM, Ian Campbell wrote:
>> The next Xen technical call will be at:
>> Wed 8 Jul 17:00:00 BST 2015
>> `date -d @1436371200`
>>
>> See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
>> for more in
On Thu, 2015-07-02 at 04:32 +, Wu, Feng wrote:
>
>
> > -Original Message-
> > From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> > Sent: Tuesday, June 30, 2015 10:58 AM
> > To: Wu, Feng
> > Cc: xen-devel; k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com;
> > Tian, Kev
On Thu, 2015-07-02 at 04:27 +, Wu, Feng wrote:
> > > > +list_for_each_entry(vmx, &per_cpu(pi_blocked_vcpu, cpu),
> > > > +pi_blocked_vcpu_list)
> > > > +if ( vmx->pi_desc.on )
> > > > +tasklet_schedule(&vmx->pi_vcpu_wakeup_tasklet);
> > >
> > > T
On Wed, 2015-07-01 at 11:17 +0100, Julien Grall wrote:
> As suggested by Wei on the top of his mail [1], can you please CC only
> relevant people and avoid to reply all?
It seems that many people are unable to follow these simple
instructions.
Wei, perhaps you could stop CCing people who inapprop
On Mon, Jun 29, 2015 at 5:59 PM, Ian Campbell wrote:
> CIOn Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote:
>> +/* Device assignment. Should be called from pci_device_add */
>> +int its_add_device(struct domain *d, u32 devid)
>> +{
>
> Prior to the PCI series landing, and to enable d
On Thu, 2015-07-02 at 09:32 +0200, Roger Pau Monné wrote:
> El 01/07/15 a les 18.15, Boris Ostrovsky ha escrit:
> > On 07/01/2015 11:57 AM, Ian Campbell wrote:
> >> The next Xen technical call will be at:
> >> Wed 8 Jul 17:00:00 BST 2015
> >> `date -d @1436371200`
> >>
> >> See http://li
On Wed, 2015-07-01 at 21:29 -0700, Meng Xu wrote:
> Hi Dario,
>
Hi,
> 2015-06-30 10:14 GMT-07:00 Dario Faggioli :
> > if you'd b able to have a look at what's
> > happening, that would be awesome. If you don't have time, I will have a
> > look myself, but only in a few days.
> >
> Hmm, this is an
@@ -1898,7 +1899,13 @@ static int intel_iommu_add_device(u8 devfn, struct
pci_dev *pdev)
PCI_BUS(bdf) == pdev->bus &&
PCI_DEVFN2(bdf) == devfn )
{
-ret = rmrr_identity_mapping(pdev->domain, 1, rmrr);
+/*
+ * RMRR is alway
Hello Ian, Julien,
On 07/02/2015 11:35 AM, Ian Campbell wrote:
> On Wed, 2015-07-01 at 11:17 +0100, Julien Grall wrote:
>> As suggested by Wei on the top of his mail [1], can you please CC only
>> relevant people and avoid to reply all?
>
> It seems that many people are unable to follow these sim
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Thursday, July 02, 2015 4:30 PM
> To: Wu, Feng
> Cc: Andrew Cooper; xen-devel@lists.xen.org; Zhang, Yang Z;
> george.dun...@eu.citrix.com; Tian, Kevin; k...@xen.org; jbeul...@suse.com
> Subject: Re: [Xe
On Thu, 2015-07-02 at 14:10 +0530, Vijay Kilari wrote:
> On Mon, Jun 29, 2015 at 5:59 PM, Ian Campbell wrote:
> > CIOn Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote:
> >> +/* Device assignment. Should be called from pci_device_add */
> >> +int its_add_device(struct domain *d, u32 de
On Thu, 2015-07-02 at 02:23 +0200, Samuel Thibault wrote:
> Ian Campbell, le Fri 26 Jun 2015 12:06:09 +0100, a écrit :
> > Also contains a fix from Thomas Leonard (to use %u for "4 + 32", not
> > %lu) previously posted as part of "mini-os: enable compiler check for
> > printk format types" but with
El 01/07/15 a les 17.46, Andrew Cooper ha escrit:
> On 01/07/15 15:46, Roger Pau Monne wrote:
>> Introduce a new DOMCTL flag that can be used to disable device emulation
>> inside of Xen for HVM guests. The following emulated devices are disabled
>> when the XEN_DOMCTL_CDF_noemu is used: hpet, pmti
Using report_find_push_age_info allows us to provide counts of
attempts since the last baseline on current tip as well as the first
attempt of each of those.
Since everything serialises on the repo lock I didn't bother trying to
parallelise anything.
It's a little terse to keep it in 80 chars.
S
On 07/02/2015 02:11 AM, Chen, Tiejun wrote:
If I'm correct, then #3 means it's not possible to have devices
for a
domain *default* to strict, but to be relaxed in individual
instances.
If you had five devices you wanted strict, and only one device you
>>
El 02/07/15 a les 10.45, Ian Campbell ha escrit:
> On Thu, 2015-07-02 at 09:32 +0200, Roger Pau Monné wrote:
>> El 01/07/15 a les 18.15, Boris Ostrovsky ha escrit:
>>> On 07/01/2015 11:57 AM, Ian Campbell wrote:
The next Xen technical call will be at:
Wed 8 Jul 17:00:00 BST 2015
>>>
I'm not only suggesting changing the layout of the patches; I'm
Sorry for this misunderstanding.
suggesting modifying the functionality.
In patch 12 you add a new command-line parameter to xl; so that you have
to type something like this:
# xl pci-attach ubuntu01 01:00.1,msitranslate=1 relax
On 02/07/15 08:33, Yang Hongyang wrote:
> Hi Andrew,
>
> Are there any updates of this series that I can checkout and rebase
> mine onto?
> :)
Not yet - I am very sorry it is taking this long. I am working on it
and am half way through, but rebasing over the AO Abort series is
proving far more
On 07/02/2015 05:26 PM, Andrew Cooper wrote:
On 02/07/15 08:33, Yang Hongyang wrote:
Hi Andrew,
Are there any updates of this series that I can checkout and rebase
mine onto?
:)
Not yet - I am very sorry it is taking this long. I am working on it
and am half way through, but rebasing ov
On Thu, 2015-07-02 at 09:45 +0100, Ian Campbell wrote:
> Shall I put up a poll of some sort to gather preferred timeslot options
> out of that set?
Please can everyone who is interested in this topic indicate their date
preference/availability at:
http://doodle.com/cy88dhwzybg7hh7p
I've gone wit
Hi all!
I have theoretical question.
What do you think about porting futexes or binder to XEN?
With best regards,
--
*Vitaly Chernooky | Senior Developer - Product Engineering and Development*
GlobalLogic
P *+380.44.4929695 ext.1136* M *+380.63.6011802* S cvv_2k
www.globallogic.com
http://www
flight 59012 linux-3.16 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59012/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-qemut-rhel6hvm-intel 12 guest-start/redhat.repeat fail in
58996 pass in 59012
test-armhf-armhf-xl-
in high level I have to say Yes. If you really read that v2 design and
its associated discussion, you should notice I didn't put any response
right there.
Look, I'm getting a bit angry at your continual implication that I
Sorry to this.
haven't put in enough work reading the background for t
On 06/30/2015 06:09 PM, Andrew Cooper wrote:
> The call to iommu_pte_flush() between the two hunks uses &ept_entry->epte
> which is a pointer into the mapped page.
>
> It is eventually passed to `clflush` instruction which will suffer a pagefault
> if the virtual mapping has fallen out of the TLB.
On 06/30/2015 06:36 PM, Dario Faggioli wrote:
> SEDF has been broken and unmaintained at least
> until Xen 4.2, and most likely even before! Tests
> are failing without anyonce caring, and yet we're
> keeping using test resources for them.
>
> Let's stop doing this!
>
> Signed-off-by: Dario Faggi
On Thu, 2015-07-02 at 08:58 +, Wu, Feng wrote:
> > -Original Message-
> > From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> >
> > This is the third time that I ask:
> > (1) whether it is possible to have more vcpus queued on one pcpu PI
> > blocked list with desc.on (I re
On 07/02/2015 11:01 AM, Chen, Tiejun wrote:
>> 1. After spending yet another half hour doing research, I haven't found
>> any discussion that concluded we should have the global policy override
>> the local policy
>
> I also took some time to go back checking this point and indeed this is
> not in
On 02/07/15 09:30, Dario Faggioli wrote:
> On Thu, 2015-07-02 at 04:27 +, Wu, Feng wrote:
>
> +list_for_each_entry(vmx, &per_cpu(pi_blocked_vcpu, cpu),
> +pi_blocked_vcpu_list)
> +if ( vmx->pi_desc.on )
> +tasklet_schedule(&vmx->pi
Fix example code in comment.libxl_event_check() can return
ERROR_NOT_READY; LIBXL_NOT_READY does not exist.
Signed-off-by: Euan Harris
---
tools/libxl/libxl_event.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_event.h b/tools/libxl/libxl_event.h
inde
On 02/07/15 10:01, Ian Campbell wrote:
> On Thu, 2015-07-02 at 14:10 +0530, Vijay Kilari wrote:
>> On Mon, Jun 29, 2015 at 5:59 PM, Ian Campbell
>> wrote:
>>> CIOn Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote:
+/* Device assignment. Should be called from pci_device_add */
>>>
On Thu, 2015-07-02 at 11:51 +0300, Razvan Cojocaru wrote:
> On 07/02/2015 11:35 AM, Ian Campbell wrote:
> > It seems that many people are unable to follow these simple
> > instructions.
>
> The quotes part is obvious (and not that many people have ommited to do
> that), but to be honest I haven't
On 01/07/15 12:00, Julien Grall wrote:
> Hi all,
Hi Ian,
> This patch series adds support for GICv2 on GICv3. This feature is available
> only when the GICv3 hardware is compatible with GICv2.
>
> When it's the case, the same interface is provided in order to use a
> virtualize GICv2 (i.e GICC a
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Thursday, July 02, 2015 6:10 PM
> To: Wu, Feng
> Cc: Andrew Cooper; xen-devel@lists.xen.org; Zhang, Yang Z;
> george.dun...@eu.citrix.com; Tian, Kevin; k...@xen.org; jbeul...@suse.com
> Subject: Re: [Xe
On 06/29/2015 04:45 PM, Vitaly Kuznetsov wrote:
> 'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as
> input.
>
> On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the
> declaration in p2m-common.h as 'pfn' is being used instead of 'start_pfn'.
>
> On ARM
On Thu, 2015-07-02 at 12:48 +0300, Vitaly Chernooky wrote:
> Hi all!
>
Hi,
>
> I have theoretical question.
>
Great, I love theoretical stuff! :-P
>
> What do you think about porting futexes or binder to XEN?
>
Ouch... That's *too* theoretical! :-)
No, really, I know a bit about futexes [0], whi
On July 2, 2015 3:32:14 AM EDT, "Roger Pau Monné" wrote:
>El 01/07/15 a les 18.15, Boris Ostrovsky ha escrit:
>> On 07/01/2015 11:57 AM, Ian Campbell wrote:
>>> The next Xen technical call will be at:
>>> Wed 8 Jul 17:00:00 BST 2015
>>> `date -d @1436371200`
>>>
>>> See
>http://lists.xe
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, July 02, 2015 6:30 PM
> To: Dario Faggioli; Wu, Feng
> Cc: xen-devel@lists.xen.org; Zhang, Yang Z; george.dun...@eu.citrix.com;
> Tian, Kevin; k...@xen.org; jbeul...@suse.com
> Subject: Re: [Xe
On Wed, 1 Jul 2015, Konrad Rzeszutek Wilk wrote:
> On Wed, Jul 01, 2015 at 02:01:07PM +0100, Stefano Stabellini wrote:
> > On Mon, 29 Jun 2015, Konrad Rzeszutek Wilk wrote:
> > > In Xen 4.6 commit cd2f100f0f61b3f333d52d1737dd73f02daee592
> > > "libxc: Fix do_memory_op to return negative value on er
On Wed, 1 Jul 2015, Konrad Rzeszutek Wilk wrote:
> On Wed, Jul 01, 2015 at 11:29:46AM +0100, Stefano Stabellini wrote:
> > On Tue, 30 Jun 2015, Konrad Rzeszutek Wilk wrote:
> > > On Tue, Jun 30, 2015 at 03:13:53PM +0100, Ian Campbell wrote:
> > > > On Tue, 2015-06-30 at 15:02 +0100, Stefano Stabell
On 02/07/15 11:48, George Dunlap wrote:
> On 06/29/2015 04:45 PM, Vitaly Kuznetsov wrote:
>> 'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as
>> input.
>>
>> On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the
>> declaration in p2m-common.h as 'pfn' is b
On Wed, Jul 01, 2015 at 04:03:55PM +0100, Stefano Stabellini wrote:
> On Tue, 30 Jun 2015, Ian Jackson wrote:
> > > > * The number and nature of parallel operations done in the stress
> > > > test is unreasonable for the provided hardware:
> > > > => the timeout is fine
> > >
> > > I d
On Thu, Jun 25, 2015 at 1:15 PM, Dario Faggioli
wrote:
> When dumping scheduling information (debug key 'r'), what
> we print as 'Idle cpupool' is pretty much the same of what
> we print immediately after as 'Cpupool0'. In fact, if there
> are no pCPUs outside of any cpupools, it is exactly the
>
Hi,
I've started using Xen on an Allwinner A33, which works great as an
headless device using the latest PSCI patches in U-Boot.
However, we would like to do something more with it, and we would need
to have two VMs accessing the display at once, each one drawing in its
own part of the framebuffe
At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
> On 02/07/15 11:48, George Dunlap wrote:
> > Now in p2m_set_mem_access(), rather than just using an unsigned long in
> > the loop iterating over gfns, you do this thing where you convert gfn_t
> > to unsigned long, add one, and then conve
On 07/02/2015 12:25 PM, Tim Deegan wrote:
> At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
>> On 02/07/15 11:48, George Dunlap wrote:
>>> Now in p2m_set_mem_access(), rather than just using an unsigned long in
>>> the loop iterating over gfns, you do this thing where you convert gfn_t
On 2015/7/2 18:28, George Dunlap wrote:
On 07/02/2015 11:01 AM, Chen, Tiejun wrote:
1. After spending yet another half hour doing research, I haven't found
any discussion that concluded we should have the global policy override
the local policy
I also took some time to go back checking this po
On 02/07/15 12:25, Tim Deegan wrote:
> At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
>> On 02/07/15 11:48, George Dunlap wrote:
>>> Now in p2m_set_mem_access(), rather than just using an unsigned long in
>>> the loop iterating over gfns, you do this thing where you convert gfn_t
>>> t
On Wed, 1 Jul 2015, Andrew Cooper wrote:
> On 01/07/15 17:13, Stefano Stabellini wrote:
> > On Wed, 1 Jul 2015, Andrew Cooper wrote:
> >> On 01/07/15 16:51, Boris Ostrovsky wrote:
> >>> On 07/01/2015 11:46 AM, Andrew Cooper wrote:
> On 01/07/15 15:46, Roger Pau Monne wrote:
> > Introduce a
From: Andrew Cooper
Signed-off-by: Andrew Cooper
[Convert grant_table.c to pass mfn_t types and fix ARM compiling]
Signed-off-by: Ben Catterall
Reviewed-by: Andrew Cooper
---
xen/arch/x86/mm.c | 7 ---
xen/common/grant_table.c | 2 +-
xen/common/kimage.c | 12
On Thu, 2015-07-02 at 11:30 +0100, Andrew Cooper wrote:
> On 02/07/15 09:30, Dario Faggioli wrote:
> > It is, therefore, not effective in making sure that, even with only one
> > notification, you only kick the interested vcpu.
> >
> > This is the third time that I ask:
> > (1) whether it is poss
From: Andrew Cooper
The sh_map/unmap wrappers can be dropped, and take the opportunity to turn
some #define's into static inlines, for added type saftey.
As part of adding the type safety, GCC highlights an problematic include cycle
with arm/mm.h including domain_page.h which includes xen/mm.h a
Reworked the internals and declaration, applying (un)boxing
where needed. Converted calls to map_domain_page() to
provide mfn_t types, boxing where needed.
Signed-off-by: Ben Catterall
Reviewed-by: Andrew Cooper
---
Changed since v1:
* Created paddr_to_mfn() and mfn_to_paddr() for both x86 a
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Thursday, July 02, 2015 8:04 PM
> To: Andrew Cooper
> Cc: Wu, Feng; Tian, Kevin; k...@xen.org; george.dun...@eu.citrix.com;
> xen-devel@lists.xen.org; jbeul...@suse.com; Zhang, Yang Z
> Subject: Re: [Xe
Hi all,
I'm trying to map a page provided by Dom0 into Xen's address space,
but I keep freezing the physical computer when I try. Maybe I'm
hitting a spinlock or something, but clearly I'm doing something
incorrectly. I'll probably be able to get farther once I have another
computer with a serial
On 02/07/15 13:04, Dario Faggioli wrote:
> On Thu, 2015-07-02 at 11:30 +0100, Andrew Cooper wrote:
>> On 02/07/15 09:30, Dario Faggioli wrote:
>>> It is, therefore, not effective in making sure that, even with only one
>>> notification, you only kick the interested vcpu.
>>>
>>> This is the third t
On Fri, Jun 26, 2015 at 8:35 PM, Julien Grall wrote:
> Hi Vijay,
>
> On 26/06/2015 14:54, Vijay Kilari wrote:
>>
>> On Tue, Jun 23, 2015 at 8:02 PM, Julien Grall
>> wrote:
>>>
>>> Hi Vijay,
>>>
>>> On 22/06/15 13:01, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Implemen
On Thu, 2015-07-02 at 13:13 +0200, Maxime Ripard wrote:
> Hi,
>
Hi,
I don't have much comments on all this, just that, reading, it, it
sounded somewhat similar to what GL is doing:
http://www.xenproject.org/component/allvideoshare/video/latest/ces15-globalogic.html
http://www.xenproject.org/comp
On Mon, Jun 29, 2015 at 5:29 PM, Ian Campbell wrote:
> On Tue, 2015-06-23 at 15:32 +0100, Julien Grall wrote:
> [...]
>> > +{
>> > +struct its_collection *col;
>> > +struct its_device *its_dev = get_irq_device(desc);
>> > +u8 *cfg;
>> > +u32 virq = irq_to_virq(desc);
>> > +
>> > +
[snip]
Thanks, Paul.
Well, I agree the former approach would be simpler. But I still doubt
if this is more reasonable. :)
IIUC, one of the reasons for struct domain to have a rangeset list(and
a spinlock - rangesets_lock), is because there are iomem_caps and
irq_caps for each domain. These 2 ra
George Dunlap writes:
> On 07/02/2015 12:25 PM, Tim Deegan wrote:
>> At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
>>> On 02/07/15 11:48, George Dunlap wrote:
Now in p2m_set_mem_access(), rather than just using an unsigned long in
the loop iterating over gfns, you do this
On Thu, 2015-07-02 at 17:51 +0530, Vijay Kilari wrote:
> On Mon, Jun 29, 2015 at 5:29 PM, Ian Campbell wrote:
> > On Tue, 2015-06-23 at 15:32 +0100, Julien Grall wrote:
> > [...]
> >> > +{
> >> > +struct its_collection *col;
> >> > +struct its_device *its_dev = get_irq_device(desc);
> >> >
On Thu, 2015-07-02 at 13:16 +0100, Andrew Cooper wrote:
> On 02/07/15 13:04, Dario Faggioli wrote:
> > On Thu, 2015-07-02 at 11:30 +0100, Andrew Cooper wrote:
> >> I can't currently decide whether this will be quicker or slower overall,
> >> or (most likely) it will even out to equal in the genera
Anthony PERARD writes ("Re: [PATCH] libxl: Increase device model startup
timeout to 1min."):
> I have tested an increase timeout this night. And here are the result.
>
> The machine is a AMD Opteron(tm) Processor 4284, with 8G of RAM and 8 pCPU.
> It's running Ubuntu 14.04, with Xen 4.4. On top o
Removed as they were wrappers around map_domain_page() to
make it appear to take an mfn_t type.
Signed-off-by: Ben Catterall
---
xen/arch/x86/mm/hap/hap.c| 4 +-
xen/arch/x86/mm/shadow/common.c | 22 +++---
xen/arch/x86/mm/shadow/multi.c | 152 +++---
On Thu, Jul 2, 2015 at 6:05 PM, Ian Campbell wrote:
> On Thu, 2015-07-02 at 17:51 +0530, Vijay Kilari wrote:
>> On Mon, Jun 29, 2015 at 5:29 PM, Ian Campbell
>> wrote:
>> > On Tue, 2015-06-23 at 15:32 +0100, Julien Grall wrote:
>> > [...]
>> >> > +{
>> >> > +struct its_collection *col;
>> >>
On 02/07/15 13:38, Dario Faggioli wrote:
> On Thu, 2015-07-02 at 13:16 +0100, Andrew Cooper wrote:
>> On 02/07/15 13:04, Dario Faggioli wrote:
>>> On Thu, 2015-07-02 at 11:30 +0100, Andrew Cooper wrote:
I can't currently decide whether this will be quicker or slower overall,
or (most like
On Thu, 2015-07-02 at 18:14 +0530, Vijay Kilari wrote:
> On Thu, Jul 2, 2015 at 6:05 PM, Ian Campbell wrote:
> > On Thu, 2015-07-02 at 17:51 +0530, Vijay Kilari wrote:
> >> On Mon, Jun 29, 2015 at 5:29 PM, Ian Campbell
> >> wrote:
> >> > On Tue, 2015-06-23 at 15:32 +0100, Julien Grall wrote:
> >
On 07/02/2015 01:26 PM, Vitaly Kuznetsov wrote:
> George Dunlap writes:
>
>> On 07/02/2015 12:25 PM, Tim Deegan wrote:
>>> At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
On 02/07/15 11:48, George Dunlap wrote:
> Now in p2m_set_mem_access(), rather than just using an unsigned
MAX_NR_IO_RANGES is used by ioreq server as the maximum
number of discrete ranges to be tracked. This patch changes
its value to 8k, so that more ranges can be tracked on next
generation of Intel platforms in XenGT. Future patches can
extend the limit to be toolstack tunable, and MAX_NR_IO_RANGES
c
This patch introduces a new data structure, struct rb_rangeset,
to represent a group of continuous ranges, e.g. the start and end
addresses for PIO/MMIO regions. By now, this structure is supposed
to assist ioreq server to forward the I/O request to backend device
models more efficiently.
Behavior
XenGT leverages ioreq server to track and forward the accesses to
GPU I/O resources, e.g. the PPGTT(per-process graphic translation
tables). Currently, ioreq server uses rangeset to track the BDF/
PIO/MMIO ranges to be emulated. To select an ioreq server, the
rangeset is searched to see if the I/O
On 02/07/15 13:43, Ben Catterall wrote:
> Removed as they were wrappers around map_domain_page() to
> make it appear to take an mfn_t type.
>
> Signed-off-by: Ben Catterall
Reviewed-by: Andrew Cooper
In the future, a patch like this should either state it is dependent on
another series, or in t
'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as input.
On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the
declaration in p2m-common.h as 'pfn' is being used instead of 'start_pfn'.
On ARM both p2m_set_mem_access and p2m_get_mem_access interfaces don't
On 01/07/15 18:37, Jennifer Herbert wrote:
> If xc_domain_get_guest_width were to fail, guest_width is not set, and
> hence guest_64bit becomes undefined.
> Fix is to initialise to 0, and report error if call fails.
>
> Signed-off-by: Jennifer Herbert
> ---
> tools/libxc/xc_cpuid_x86.c |8 +++
On 01/07/15 18:37, Jennifer Herbert wrote:
> Fix a number of coverity issues in libxc.
Patches 2 through 7:
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi Julien,
On Tue, Jun 23, 2015 at 10:09 PM, Julien Grall wrote:
> Hi Vijay,
>
>>
>> +struct vits_device {
>> +uint32_t vdevid;
>> +uint32_t pdevid;
>> +struct its_device *its_dev;
>> +struct rb_node node;
>> +};
>
> We spoke about a specific structure in the design [2] but you in
On 07/02/2015 07:49 AM, Stefano Stabellini wrote:
On Wed, 1 Jul 2015, Andrew Cooper wrote:
On 01/07/15 17:13, Stefano Stabellini wrote:
On Wed, 1 Jul 2015, Andrew Cooper wrote:
On 01/07/15 16:51, Boris Ostrovsky wrote:
On 07/01/2015 11:46 AM, Andrew Cooper wrote:
On 01/07/15 15:46, Roger Pau
On Wed, Jul 01, 2015 at 02:06:30PM +0100, Stefano Stabellini wrote:
> On Mon, 29 Jun 2015, Konrad Rzeszutek Wilk wrote:
> > When debugging issues that caused the emulator to kill itself
> > or skipping certain operations (unable to write to host
> > registers) an stack trace will most definitly aid
On 02/07/15 15:02, Shuai Ruan wrote:
> This patchset enable xsaves/xrstors feature.
> It includes tree parts:
> 1. add xsaves/xrstors for xen.
> 2. add xsaves/xrstors for pv guest.
> 3. add xsaves/xrstors for hvn guest.
What is xsaves/xrstors and why might I want Xen to use it? What
advantages doe
On 02/07/15 14:13, Andrew Cooper wrote:
On 02/07/15 13:43, Ben Catterall wrote:
Removed as they were wrappers around map_domain_page() to
make it appear to take an mfn_t type.
Signed-off-by: Ben Catterall
Reviewed-by: Andrew Cooper
In the future, a patch like this should either state it i
On Thu, Jul 02, 2015 at 12:00:29PM +0100, Stefano Stabellini wrote:
> On Wed, 1 Jul 2015, Konrad Rzeszutek Wilk wrote:
> > On Wed, Jul 01, 2015 at 02:01:07PM +0100, Stefano Stabellini wrote:
> > > On Mon, 29 Jun 2015, Konrad Rzeszutek Wilk wrote:
> > > > In Xen 4.6 commit cd2f100f0f61b3f333d52d1737
xsaves/xrstors only use compat format, so format convertion
is needed when perform save/restore.
Signed-off-by: Shuai Ruan
---
xen/arch/x86/hvm/hvm.c | 16 +++--
xen/arch/x86/xstate.c| 137 +++
xen/include/asm-x86/xstate.h | 6 ++
3 files
This patchset enable xsaves/xrstors feature.
It includes tree parts:
1. add xsaves/xrstors for xen.
2. add xsaves/xrstors for pv guest.
3. add xsaves/xrstors for hvn guest.
Shuai Ruan (6):
x86/xsaves: enable xsaves/xrstors for pv guest
x86/xsaves: enable xsaves/xrstors in xen
x86/xsaves: ena
As xsaves/xgetbv already support, so switch on.
Signed-off-by: Shuai Ruan
---
xen/arch/x86/xstate.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/xstate.c b/xen/arch/x86/xstate.c
index c20f865..ebf9920 100644
--- a/xen/arch/x86/xstate.c
+++ b/xen/arch/x
This patch emualtes xsaves/xrstors instruction and
XSS msr access.
As xsaves/xrstors instructions and XSS msr access
required be executed only in ring0. So emulation is
needed when pv guest use these instructions.
Signed-off-by: Shuai Ruan
---
xen/arch/x86/domain.c | 3 ++
xen/arch/x
This patch exposes xsaves/xgetbv/xsavec to hvm guest.
Signed-off-by: Shuai Ruan
---
tools/libxc/xc_cpuid_x86.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/tools/libxc/xc_cpuid_x86.c b/tools/libxc/xc_cpuid_x86.c
index c97f91a..0ed8b68 100644
--- a/tools/libxc/xc_cp
This patch uses xsaves/xrstors instead of xsaveopt/xrstor
when perform task switch in xen if the feature is supported
in hardware.
Please note that xsaves/xrstors only use compact format.
Signed-off-by: Shuai Ruan
---
xen/arch/x86/xstate.c| 83 ---
This patch enables xsaves for hvm guest, includes:
1.handle xsaves vmcs init and vmexit.
2.add logic to write/read the XSS msr.
Signed-off-by: Shuai Ruan
---
xen/arch/x86/hvm/hvm.c | 40 ++
xen/arch/x86/hvm/vmx/vmcs.c| 7 ++-
xen/arch/
On Thu, 2015-07-02 at 19:03 +0530, Vijay Kilari wrote:
> Hi Julien,
>
> On Tue, Jun 23, 2015 at 10:09 PM, Julien Grall
> wrote:
> > Hi Vijay,
> >
> >>
> >> +struct vits_device {
> >> +uint32_t vdevid;
> >> +uint32_t pdevid;
> >> +struct its_device *its_dev;
> >> +struct rb_node n
> > But I am looking at the xen-fbfront.c driver and it might be that
> > I had already fixed this issue! (inadvertly it seems)
> >
> > 51c71a3bbaca868043cc45b3ad3786dd48a90235
> > Author: Konrad Rzeszutek Wilk
> > Date: Tue Nov 26 15:05:40 2013 -0500
> >
> > xen/pvhvm: If xen_platform_pci
flight 59013 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59013/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are failing
El 30/06/15 a les 15.05, Paul Durrant ha escrit:
[...]
+void msixtbl_init(struct domain *d)
> +{
> +register_mmio_handler(d, &msixtbl_mmio_ops);
Since you are adding an initialization function to vmsi I think
msixtbl_list and msixtbl_list_lock should also be initialized here
instead of hvm_dom
Provide interfaces for recognizing accesses to PMU-related MSRs and
LVTPC APIC and process these accesses in Xen PMU code.
(The interrupt handler performs XENPMU_flush right away in the beginning
since no PMU emulation is available. It will be added with a later patch).
Signed-off-by: Boris Ostro
I haven't posted Linux part of PV(H) VPMU support in a while but now
that (hopefully) the hypervisor part is getting close to be done I
think it's time to post it again.
There are very few differences compared to the last version, mostly due
to updates in shared structures layouts. Patches 1 and 4
Export Xen symbols to dom0 via /proc/xen/xensyms (similar to
/proc/kallsyms).
Signed-off-by: Boris Ostrovsky
Reviewed-by: David Vrabel
---
drivers/xen/Kconfig | 8 +++
drivers/xen/xenfs/Makefile | 1 +
drivers/xen/xenfs/super.c| 3 +
drivers/xen/xenfs/xenfs.h
Add PMU emulation code that runs when we are processing a PMU interrupt.
This code will allow us not to trap to hypervisor on each MSR/LVTPC access
(of which there may be quite a few in the handler).
Signed-off-by: Boris Ostrovsky
---
arch/x86/xen/pmu.c | 214
Set Xen's PMU mode via /sys/hypervisor/pmu/pmu_mode. Add XENPMU hypercall.
Signed-off-by: Boris Ostrovsky
---
Documentation/ABI/testing/sysfs-hypervisor-pmu | 23 +
arch/x86/include/asm/xen/hypercall.h | 6 ++
drivers/xen/sys-hypervisor.c | 127
Map shared data structure that will hold CPU registers, VPMU context,
V/PCPU IDs of the CPU interrupted by PMU interrupt. Hypervisor fills
this information in its handler and passes it to the guest for further
processing.
Set up PMU VIRQ.
Now that perf infrastructure will assume that PMU is avail
AMD and Intel PMU register initialization and helpers that determine
whether a register belongs to PMU.
This and some of subsequent PMU emulation code is somewhat similar to
Xen's PMU implementation.
Signed-off-by: Boris Ostrovsky
Reviewed-by: David Vrabel
---
arch/x86/xen/pmu.c | 153
1 - 100 of 197 matches
Mail list logo