Allow guest userspace code to request that a vm_event be sent out
via VMCALL. This functionality seems to be handy for a number of
Xen developers, as stated on the mailing list (thread "[Xen-devel]
HVMOP_guest_request_vm_event only works from guest in ring0").
Signed-off-by: Razvan Cojocaru
---
Hi Julien,
On 08/03/2016 07:40 PM, Julien Grall wrote:
> Hello Sergej,
>
> Title: s/altp2m/p2m/ and please drop the full stop.
Ok.
>
> On 01/08/16 18:10, Sergej Proskurin wrote:
>> This commit pulls out generic init/teardown functionality out of
>> p2m_init and p2m_teardown into p2m_init_one, p
>>> On 05.08.16 at 09:08, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -5349,8 +5349,14 @@ int hvm_do_hypercall(struct cpu_user_regs *regs)
> switch ( mode )
> {
> case 8:
> +if ( eax == __HYPERVISOR_hvm_op &&
> + regs->rdi ==
On 05/08/16 08:26, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 08/03/2016 07:40 PM, Julien Grall wrote:
[...]
+{
+p2m_flush_table(p2m);
+
+/* Free VMID and reset VTTBR */
+p2m_free_vmid(p2m->domain);
Why do you move the call to p2m_free_vmid?
When flushing a ta
On 05/08/16 07:53, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 08/03/2016 08:12 PM, Julien Grall wrote:
On 01/08/16 18:10, Sergej Proskurin wrote:
+int altp2m_init(struct domain *d)
+{
+unsigned int i;
+
+spin_lock_init(&d->arch.altp2m_lock);
+
+for ( i = 0; i < MAX_ALTP
On 05/08/16 03:54, Chenxiao Zhao wrote:
> Hi all,
Hello Chenxiao,
Thank you for posting your work on the ML. I have noticed
that your patches did not show up as a single thread in my
mailbox.
git-send-email should do it for you if you pass all the patches
in one go. Below what the command I u
flight 99955 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99955/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 guest-saverestorefail never pass
test-armhf-armhf-libvirt 12 migrate-sup
On Thu, Aug 04, 2016 at 07:43:39PM +0100, Andrew Cooper wrote:
> On 02/08/16 10:19, Roger Pau Monne wrote:
> > On Fri, Jul 29, 2016 at 08:04:12PM +0100, Andrew Cooper wrote:
> >> On 29/07/16 17:29, Roger Pau Monne wrote:
> >>> +/* Calculate the biggest usable order given a size in bytes. */
> >>> +
Pushed.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Thu, Aug 04, 2016 at 09:07:45AM +0100, Wei Liu wrote:
> On Thu, Aug 04, 2016 at 09:07:56AM +0800, Bob Liu wrote:
> > When specifying a serial list in domain config, users of
> > libxl_console_get_tty cannot get the tty path of a second specified pty
> > serial,
> > since right now it always ret
On 4 August 2016 at 18:44, Stefano Stabellini wrote:
> The following changes since commit 09704e6ded83fa0bec14baf32f800f6512156ca0:
>
> Merge remote-tracking branch 'remotes/bonzini/tags/for-upstream' into
> staging (2016-08-04 10:24:27 +0100)
>
> are available in the git repository at:
>
>
>
This really was meant to be added in a v2 of what became commit
fa74e70500 ("x86/time: introduce and use rdtsc_ordered()").
Signed-off-by: Jan Beulich
---
Noticed while backporting.
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -1146,16 +1146,13 @@ static void local_time_calibration(voi
On 05/08/16 11:23, Jan Beulich wrote:
> This really was meant to be added in a v2 of what became commit
> fa74e70500 ("x86/time: introduce and use rdtsc_ordered()").
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
X
>>> On 04.08.16 at 23:06, wrote:
> Signed-off-by: Boris Ostrovsky
> Acked-by: Jan Beulich
There's a dependency this ack has which I came too think of only now:
The move here results in a maintainership change, which should
either be avoided (by updating ./MAINTAINERS at the same time), or
we sh
On Fri, Aug 05, 2016 at 04:43:51AM -0600, Jan Beulich wrote:
> >>> On 04.08.16 at 23:06, wrote:
> > Signed-off-by: Boris Ostrovsky
> > Acked-by: Jan Beulich
>
> There's a dependency this ack has which I came too think of only now:
> The move here results in a maintainership change, which should
Qemu needs access to this for the domain it controls, both due to it
being used by xc_domain_memory_mapping() (which qemu calls) and the
explicit use in hw/xenpv/xen_domainbuild.c:xen_domain_poll(). Extend
permissions to that of any "ordinary" domctl: A domain controlling the
targeted domain can in
On Tue, Aug 2, 2016 at 8:23 PM, Tamas K Lengyel wrote:
>
>
> On Tue, Aug 2, 2016 at 12:19 AM, sepanta s wrote:
>
>>
>>
>> On Sat, Jul 23, 2016 at 3:49 PM, sepanta s wrote:
>>
>>>
> Hi,
> Is there any sample code which I can undestand how to capture the
> events on the gfns which hav
flight 99958 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99958/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
flight 99952 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99952/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 99917
build-armh
All,
it was only earlier today when I realized that 4.5.4 would have been
due about two weeks back; I apologize for this oversight. In any event,
please indicate backports you find missing from its staging tree, but
which you deem necessary in the release. Please note that 4.5.4 is
expected to be
On 05/08/16 03:44, Yu Zhang wrote:
>
> On 7/12/2016 5:02 PM, Yu Zhang wrote:
>> XenGT leverages ioreq server to track and forward the accesses to GPU
>> I/O resources, e.g. the PPGTT(per-process graphic translation tables).
>> Currently, ioreq server uses rangeset to track the BDF/ PIO/MMIO ranges
According to the xen dmesg
(XEN) RIP:e008:[] vmx_vmenter_helper+0x27e/0x30a
(XEN) RFLAGS: 00010003 CONTEXT: hypervisor
(XEN) rax: 8005003b rbx: 8300e72fc000 rcx:
(XEN) rdx: 6c00 rsi: 830617fd7fc0 rdi: 8300e6fc
(XEN) rbp: ff
flight 99953 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99953/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-amd 5 xen-install fail REGR. vs. 99944
Regressions which a
On 05/08/16 12:20, Jan Beulich wrote:
> Qemu needs access to this for the domain it controls, both due to it
> being used by xc_domain_memory_mapping() (which qemu calls) and the
> explicit use in hw/xenpv/xen_domainbuild.c:xen_domain_poll(). Extend
> permissions to that of any "ordinary" domctl: A
>>> On 01.08.16 at 14:32, wrote:
> On Mon, 2016-08-01 at 04:40 -0600, Jan Beulich wrote:
>> > > > On 15.07.16 at 20:02, wrote:
>> >
>> > To solve this, when inserting a vcpu, always call the per-scheduler
>> > "pick" function to revise the initial placement. This will
>> > automatically take al
> > > As above, if linux driver detects the signature "NVDIMM_PFN_INFO" and
> > > a matched checksum, it will know it's safe to write to the reserved
> > > area. Otherwise, it will treat the pmem namespace as a raw device and
> > > store page struct's in the normal RAM.
> >
> > OK, so my worry is
On Wed, Aug 03, Olaf Hering wrote:
> On Wed, Aug 03, Anthony PERARD wrote:
>
> > Haven't you try to create a guest with Xen 4.5 and qemu-xen-4.5, and
> > then migrate to Xen 4.7 with QEMU-2.6/master?
>
> In the end I tried xen-4.5/6/7/8 as source and their qemu-xen, and
> migrated to qemu#master
This run is configured for baseline tests only.
flight 66921 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66921/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
flight 66922 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66922/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-armhf-jessie-netboot-pygrub 12 saverestore-support-check fail
never pass
test-armhf-ar
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: George Dunlap
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
---
xen/common/domctl.c | 2 +-
xen/common/xmalloc_tlsf.c | 4 ++--
xen/include/xen/sched.h | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
dif
The checksum should be calculated using unsigned 32bit integers, as it is
intended to overflow and end at 0.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Kevin Tian
CC: Jun Nakajima
---
xen/arch/x86/microcode_intel.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --g
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/apic.c | 2 +-
xen/arch/x86/cpu/common.c | 2 +-
xen/arch/x86/x86_64/traps.c | 2 +-
xen/include/asm-x86/apicdef.h | 2 +-
4 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/apic.c b/xen/ar
>>> On 05.08.16 at 15:10, wrote:
> On 05/08/16 12:20, Jan Beulich wrote:
>> I wonder what good the duplication of the returned domain ID does: I'm
>> tempted to remove the one in the command-specific structure. Does
>> anyone have insight into why it was done that way?
>
> I wonder whether the fi
On Thu, Aug 4, 2016 at 11:25 AM, Ian Jackson wrote:
> George Dunlap writes ("[PATCH] CODING_STYLE: Allow single-sentence comments
> without full stops"):
>> One of the common ways in which contributors trip up over the
>> CODING_STYLE guides is by not putting a full stop at the end of a
>> commen
On Fri, Aug 05, 2016 at 03:37:32PM +0200, Olaf Hering wrote:
> On Wed, Aug 03, Olaf Hering wrote:
>
> > On Wed, Aug 03, Anthony PERARD wrote:
> >
> > > Haven't you try to create a guest with Xen 4.5 and qemu-xen-4.5, and
> > > then migrate to Xen 4.7 with QEMU-2.6/master?
> >
> > In the end I tr
>>> On 05.08.16 at 15:50, wrote:
> --- a/xen/common/domctl.c
> +++ b/xen/common/domctl.c
> @@ -188,7 +188,7 @@ void getdomaininfo(struct domain *d, struct
> xen_domctl_getdomaininfo *info)
> (d->controller_pause_count > 0 ? XEN_DOMINF_paused: 0) |
> (d->debugger_attached
>>> On 05.08.16 at 15:50, wrote:
> --- a/xen/arch/x86/cpu/common.c
> +++ b/xen/arch/x86/cpu/common.c
> @@ -476,7 +476,7 @@ void detect_extended_topology(struct cpuinfo_x86 *c)
> sub_index++;
> } while ( LEAFB_SUBTYPE(ecx) != INVALID_TYPE );
>
> - core_select_mask = (~(-1
On 05/08/16 15:04, Jan Beulich wrote:
On 05.08.16 at 15:50, wrote:
>> --- a/xen/common/domctl.c
>> +++ b/xen/common/domctl.c
>> @@ -188,7 +188,7 @@ void getdomaininfo(struct domain *d, struct
>> xen_domctl_getdomaininfo *info)
>> (d->controller_pause_count > 0 ? XEN_DOMINF_paused
>>> On 05.08.16 at 15:50, wrote:
> --- a/xen/arch/x86/microcode_intel.c
> +++ b/xen/arch/x86/microcode_intel.c
> @@ -143,7 +143,8 @@ static int microcode_sanity_check(void *mc)
> struct extended_sigtable *ext_header = NULL;
> struct extended_signature *ext_sig;
> unsigned long total
On Fri, 2016-08-05 at 07:24 -0600, Jan Beulich wrote:
> > > > On 01.08.16 at 14:32, wrote:
> > On Mon, 2016-08-01 at 04:40 -0600, Jan Beulich wrote:
> > > > > > On 15.07.16 at 20:02, wrote:
> > > > Signed-off-by: George Dunlap
> > > Should this and patch 3 be backported?
> > >
> > Yes, I think
On Fri, Aug 05, Anthony PERARD wrote:
> On Fri, Aug 05, 2016 at 03:37:32PM +0200, Olaf Hering wrote:
> If you compile older qemu out if xen tree, you would need to at least
> add:
> --extra-cflags="-DXC_WANT_COMPAT_EVTCHN_API=1 -DXC_WANT_COMPAT_GNTTAB_API=1
> -DXC_WANT_COMPAT_MAP_FOREIGN_API=1"
>>> On 05.08.16 at 16:09, wrote:
> On Fri, 2016-08-05 at 07:24 -0600, Jan Beulich wrote:
>> > > > On 01.08.16 at 14:32, wrote:
>> > On Mon, 2016-08-01 at 04:40 -0600, Jan Beulich wrote:
>> > > > > > On 15.07.16 at 20:02, wrote:
>> > > > Signed-off-by: George Dunlap
>> > > Should this and patch
>>> On 05.08.16 at 14:51, wrote:
> According to the xen dmesg
>
> (XEN) RIP:e008:[] vmx_vmenter_helper+0x27e/0x30a
> (XEN) RFLAGS: 00010003 CONTEXT: hypervisor
> (XEN) rax: 8005003b rbx: 8300e72fc000 rcx:
> (XEN) rdx: 6c00 rsi: 8306
>>> On 04.08.16 at 17:49, wrote:
> In general, the hooks provide flexibility when having to deal with
> unforeseen cases, but their application should be rarely required (<
> 10%)."
But the greater flexibility of course comes with increased chances
of screwing things up. I'm therefore still not e
>>> On 04.08.16 at 17:49, wrote:
> --- a/xen/include/xen/livepatch.h
> +++ b/xen/include/xen/livepatch.h
> @@ -44,7 +44,7 @@ unsigned long livepatch_symbols_lookup_by_name(const char
> *symname);
> bool_t is_patch(const void *addr);
> int xen_build_id_check(const Elf_Note *n, unsigned int n_sz,
Wei Liu writes ("[RFC PATCH 2/8] tools/console: introduce --start-notify-fd
option for console client"):
> The console client will write 0x00 to that fd before entering console
> loop to indicate its readiness.
This could sensibly be in a comment in the code.
> + if (start_notify_fd != -1) {
Wei Liu writes ("[RFC PATCH 3/8] libxl: factor out libxl__console_tty_path"):
> No user yet.
You mean no _other_ user!
With that change to the commit message,
Acked-by: Ian Jackson
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lis
Wei Liu writes ("[RFC PATCH 1/8] tools/console: fix help string in client"):
> There is no short '-t' option.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[RFC PATCH 4/8] libxl: wait up to 5s in libxl_console_exec for
xenconsoled"):
> Wait until the tty node is available before exec'ing xenconsole.
You shouldn't poll. We have a perfectly good xenstore watch
mechanism.
You could either:
(a) do something ad-hoc with poll(), the xe
Wei Liu writes ("[RFC PATCH 5/8] libxl: libxl_{primary_,}console_exec now take
notify_fd argument"):
> The new argument will be passed down to xenconsole process, which then
> uses it to notify readiness.
...
> int libxl_console_exec(libxl_ctx *ctx, uint32_t domid, int cons_num,
> -
Ian Jackson writes ("Re: [RFC PATCH 5/8] libxl: libxl_{primary_,}console_exec
now take notify_fd argument"):
> Wei Liu writes ("[RFC PATCH 5/8] libxl: libxl_{primary_,}console_exec now
> take notify_fd argument"):
> > The new argument will be passed down to xenconsole process, which then
> > uses
Wei Liu writes ("[RFC PATCH 6/8] docs: document xenconsole startup protocol"):
> Signed-off-by: Wei Liu
Oh! Forget my comment on patch 02. about the commit message and/or
comment. Maybe you want to squash this one into there, but either
way:
> +The xenconsole program supports a very simple pro
Wei Liu writes ("[RFC PATCH 7/8] xl: use xenconsole startup protocol"):
> If user asks xl to automatically connect to console when creating a
> guest, use the new startup protocol before trying to unpause domain so
> that we don't lose any console output.
Most of the logic here LGTM.
> @@ -2997,7
>>> On 04.08.16 at 17:49, wrote:
> You could construct _most_ of the names of the functions
> by doing 'nm --defined' but unfortunatly you do not get the
> prefix that is added on in Xen . For example:
>
> $ cat xen-syms.symbols |grep do_domain_pause
> 0x82d080104920 t domain.c#do_domain_pau
Wei Liu writes ("[RFC PATCH 8/8] tools/console: remove 5s bodge in console
client"):
> The bug described in the comment has been fixed in libxl. Since console
> client is a private binary and libxl is the only supported toolstack in
> upstream, remove the bodge to simplify code.
I don't think thi
On Fri, Aug 05, 2016 at 04:57:33PM +0100, Ian Jackson wrote:
> Wei Liu writes ("[RFC PATCH 8/8] tools/console: remove 5s bodge in console
> client"):
> > The bug described in the comment has been fixed in libxl. Since console
> > client is a private binary and libxl is the only supported toolstack
Wei Liu writes ("Re: [PATCH v2] libxl: return any serial tty path in
libxl_console_get_tty"):
> On Thu, Aug 04, 2016 at 09:07:45AM +0100, Wei Liu wrote:
> > Ian, I think this is a backport candidate.
Queued, thanks.
Ian.
___
Xen-devel mailing list
Xen
Wei Liu writes ("Re: [RFC PATCH 8/8] tools/console: remove 5s bodge in console
client"):
> On Fri, Aug 05, 2016 at 04:57:33PM +0100, Ian Jackson wrote:
> > In particular, what about
> >xl create /etc/xen/foo.cfg
> >xl console foo
> > ?
> >
> > I think in this case xenconsole still needs t
On Fri, Aug 05, 2016 at 05:18:47PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [RFC PATCH 8/8] tools/console: remove 5s bodge in
> console client"):
> > On Fri, Aug 05, 2016 at 04:57:33PM +0100, Ian Jackson wrote:
> > > In particular, what about
> > >xl create /etc/xen/foo.cfg
> > >xl
Jan Beulich writes ("Re: Device model operation hypercall (DMOP, re qemu
depriv)"):
> On 04.08.16 at 13:21, wrote:
> > What we cannot do is audit every HVMCTL, fix the class 2 problems, and
> > then declare HVMCTL to have the relevant security property, and
> > implement corresponding code in dom
Wei Liu writes ("Re: [RFC PATCH 8/8] tools/console: remove 5s bodge in console
client"):
> On Fri, Aug 05, 2016 at 05:18:47PM +0100, Ian Jackson wrote:
> > Well, except that xenconsole is also on the path. I (now) don't
> > understand why this functionality needs to be moved from xenconsole to
>
On Fri, Aug 05, 2016 at 05:32:30PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [RFC PATCH 8/8] tools/console: remove 5s bodge in
> console client"):
> > On Fri, Aug 05, 2016 at 05:18:47PM +0100, Ian Jackson wrote:
> > > Well, except that xenconsole is also on the path. I (now) don't
> > > un
On Thu, Aug 04, 2016 at 06:23:51PM +0530, Akshay Jaggi wrote:
> Add grant table userspace device mappings for
> FreeBSD (enables support for qdisk backend
> on FreeBSD Dom0).
>
> Signed-off-by: Akshay Jaggi
> ---
> tools/include/xen-sys/FreeBSD/gntdev.h | 118
> tools/libs/gnttab/Ma
On 05/08/16 14:54, Jan Beulich wrote:
On 05.08.16 at 15:10, wrote:
>> On 05/08/16 12:20, Jan Beulich wrote:
>>> I wonder what good the duplication of the returned domain ID does: I'm
>>> tempted to remove the one in the command-specific structure. Does
>>> anyone have insight into why it was
On Fri, Aug 05, 2016 at 05:36:08PM +0100, Wei Liu wrote:
> On Fri, Aug 05, 2016 at 05:32:30PM +0100, Ian Jackson wrote:
> > Wei Liu writes ("Re: [RFC PATCH 8/8] tools/console: remove 5s bodge in
> > console client"):
> > > On Fri, Aug 05, 2016 at 05:18:47PM +0100, Ian Jackson wrote:
> > > > Well,
Add a variable holding the number of available memory pages. This will
aid auto-ballooning later.
Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
---
include/mm.h | 1 +
mm.c | 6 ++
2 files changed, 7 insertions(+)
diff --git a/include/mm.h b/include/mm.h
index a48f485..b97b43e
In order to be able to use p2m related macros for ballooning move
their definitions to arch/x86/mm.h.
There is no need to define different macros regarding index masks and
number of entries for the different levels, as all levels share the
same entry format (a plain mfn). So reduce the number of m
The first free pfn available for allocation is calculated by adding the
number of page table frames to the pfn of the first page table and
then the magic number 3 to account for start info page et al.
As the start info page, xenstore page and console page are allocated
_before_ the page tables lea
alloc_contig_pages() is never used anywhere in mini-os. Remove it.
Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
---
arch/x86/mm.c | 142 --
include/mm.h | 1 -
2 files changed, 143 deletions(-)
diff --git a/arch/x86/mm.c b/arch/x8
In order to be able to support ballooning the virtual memory layout
of Mini-OS has to be modified: instead of a (nearly) consecutive
area used for physical memory mapping, on demand mappings, and heap
we need enough spare place for adding new memory.
So instead of dynamically place the different r
Support ballooning Mini-OS automatically up in case of memory shortage.
Do some cleanups, a small correction and add some basic features to
lay groundwork for support of ballooning in Mini-OS (patches 1-14).
The main visible change is the virtual memory layout: to be able to
add memory to the run
Instead of panicing when no page can be allocated try to fail the
memory allocation by returning NULL instead.
Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
---
V2: fixed minor style issue
---
mm.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/mm.c b/mm.c
index 263a356..8cf3210
Add a function to map one physical frame to a specified virtual
address as read/write. This will be used later multiple times.
Signed-off-by: Juergen Gross
---
include/arm/arch_mm.h | 2 ++
include/mm.h | 1 +
mm.c | 5 +
3 files changed, 8 insertions(+)
diff --git
mem_test() isn't used anywhere and its value is rather questionable
with mini-os being in a mature state. Remove the function.
Signed-off-by: Juergen Gross
---
arch/x86/mm.c | 55 ---
1 file changed, 55 deletions(-)
diff --git a/arch/x86/mm.c
There are several core functions in Mini-OS not checking for failed
memory allocations. Add such checks.
Add do_map_frames() dummy function to arm architecture as it will be
needed in future for compilations to succeed.
Signed-off-by: Juergen Gross
---
arch/arm/mm.c | 8
arch/x86/mm.c
Add support for obtaining the maximum memory size from the hypervisor.
This will make it possible to support ballooning.
Signed-off-by: Juergen Gross
---
V2: Moved new stuff to balloon.c
---
balloon.c | 22 ++
include/balloon.h | 6 ++
mm.c | 3 ++-
When constructing the 3 level p2m tree there is no need to allocate
new pages for the level 1 containing the p2m info for all pages. The
pages from the linear p2m list constructed by the hypervisor can be
used for that purpose.
Signed-off-by: Juergen Gross
---
arch/x86/mm.c | 14 --
Add support for ballooning the domain up by a specified amount of
pages. Following steps are performed:
- extending the p2m map
- extending the page allocator's bitmap
- getting new memory pages from the hypervisor
- adding the memory at the current end of guest memory
Signed-off-by: Juergen Gros
In case of CONFIG_BALLOON the page allocator's bitmap needs some space
to be able to grow. Remap it to kernel virtual area if the preallocated
area isn't large enough.
Signed-off-by: Juergen Gross
---
balloon.c | 17 +
include/balloon.h | 2 ++
include/mm.h | 6 +++
Add CONFIG_BALLOON defaulting to 'n' as a config item to Mini-OS.
Add balloon.c, balloon.h and arch/*/balloon.c for future use.
Signed-off-by: Juergen Gross
---
V2: Added dummy sources and header
---
Makefile | 3 +++
arch/arm/balloon.c | 28
arch/x86/bal
mm.c contains unused code inside #ifdef MM_DEBUG areas. Its usability
is rather questionable and some parts are even wrong (e.g.
print_chunks() called with nr_pages > 1000 will clobber an arbitrary
stack content with a 0 byte).
Remove this code.
Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
Re: [Xen-devel] [PATCH] acpi: Re-license ACPI builder files from.eml
Subject:
Re: [Xen-devel] [PATCH] acpi: Re-license ACPI builder files from GPLv2
to LGPLv2.1
From:
"Tian, Kevin" mailto:kevin.t...@intel.com>>
Date:
Thu, 4 Aug 2016 06:52:34 +
To:
Boris Ostrovsky mailto:boris.ostrov...@ora
In case of enabled ballooning we must be prepared for a growing p2m
list. If the maximum memory size of the domain can't be covered by the
actual p2m list remap it to the kernel virtual mapping area and leave
enough space at the end.
Signed-off-by: Juergen Gross
---
arch/arm/balloon.c| 2 ++
If a memory shortage is detected balloon up.
Be careful to always leave some pages free as ballooning up might need
some memory, too:
- new p2m frames
- page tables for addressing new p2m frame
- new frame for page allocation bitmap
- page table for addressing new page allocation bitmap frame
- p
Add a brief description how the physical and virtual address usage
looks like on x86 to include/x86/arch_mm.h
Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
---
include/x86/arch_mm.h | 20
1 file changed, 20 insertions(+)
diff --git a/include/x86/arch_mm.h b/include/x86
The new argument will be passed down to xenconsole process, which then
uses it to notify readiness.
Signed-off-by: Wei Liu
---
tools/libxl/libxl.c | 15 +++
tools/libxl/libxl.h | 43 ---
2 files changed, 51 insertions(+), 7 deletions(-)
diff -
Signed-off-by: Wei Liu
Acked-by: Ian Jackson
---
docs/misc/console.txt | 6 ++
1 file changed, 6 insertions(+)
diff --git a/docs/misc/console.txt b/docs/misc/console.txt
index ed7b795..16da805 100644
--- a/docs/misc/console.txt
+++ b/docs/misc/console.txt
@@ -124,3 +124,9 @@ can only have o
Version 2 of this series. Now it properly handles read and write errors. I also
dropped two patches to not move the wait bodge from xenconsole to libxl.
Wei Liu (6):
tools/console: fix help string in client
tools/console: introduce --start-notify-fd option for console client
libxl: factor ou
If user asks xl to automatically connect to console when creating a
guest, use the new startup protocol before trying to unpause domain so
that we don't lose any console output.
Signed-off-by: Wei Liu
---
v2: properly handle read(2) errors
---
tools/libxl/xl_cmdimpl.c | 43 ++
The console client will write 0x00 to that fd before entering console
loop to indicate its readiness.
Signed-off-by: Wei Liu
---
v2: properly handle write(2) errors
---
tools/console/client/main.c | 22 ++
1 file changed, 22 insertions(+)
diff --git a/tools/console/client/ma
There is no short '-t' option.
Signed-off-by: Wei Liu
Acked-by: Ian Jackson
---
tools/console/client/main.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/console/client/main.c b/tools/console/client/main.c
index f660e10..be39700 100644
--- a/tools/console/client/main
No other user yet.
Signed-off-by: Wei Liu
Acked-by: Ian Jackson
---
tools/libxl/libxl.c | 57 ++---
1 file changed, 37 insertions(+), 20 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 7bd3e8c..9a7104c 100644
--- a/tools
On Fri, Aug 5, 2016 at 5:35 AM, sepanta s wrote:
>
>
> On Tue, Aug 2, 2016 at 8:23 PM, Tamas K Lengyel
> wrote:
>
>>
>>
>> On Tue, Aug 2, 2016 at 12:19 AM, sepanta s wrote:
>>
>>>
>>>
>>> On Sat, Jul 23, 2016 at 3:49 PM, sepanta s wrote:
>>>
>> Hi,
>> Is there any sample code whic
On Fri, Aug 5, 2016 at 10:45 PM, Tamas K Lengyel
wrote:
>
>
> On Fri, Aug 5, 2016 at 5:35 AM, sepanta s wrote:
>
>>
>>
>> On Tue, Aug 2, 2016 at 8:23 PM, Tamas K Lengyel
>> wrote:
>>
>>>
>>>
>>> On Tue, Aug 2, 2016 at 12:19 AM, sepanta s wrote:
>>>
On Sat, Jul 23, 2016 at 3:49 P
flight 99970 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99970/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Fri, Aug 05, 2016 at 09:40:43AM -0600, Jan Beulich wrote:
> >>> On 04.08.16 at 17:49, wrote:
> > --- a/xen/include/xen/livepatch.h
> > +++ b/xen/include/xen/livepatch.h
> > @@ -44,7 +44,7 @@ unsigned long livepatch_symbols_lookup_by_name(const char
> > *symname);
> > bool_t is_patch(const voi
On Fri, Aug 05, 2016 at 09:35:49AM -0600, Jan Beulich wrote:
> >>> On 04.08.16 at 17:49, wrote:
> > In general, the hooks provide flexibility when having to deal with
> > unforeseen cases, but their application should be rarely required (<
> > 10%)."
>
> But the greater flexibility of course come
flight 99961 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99961/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 7 host-ping-check-xen fail REGR. vs. 99754
Regressions which
Hi,
I am sending fourth version of multiboot2 protocol support for
legacy BIOS and EFI platforms. This patch series release contains
fixes for all known issues.
The final goal is xen.efi binary file which could be loaded by EFI
loader, multiboot (v1) protocol (only on legacy BIOS platforms) and
m
Its visibility is not needed and just pollute symbol table.
Suggested-by: Jan Beulich
Signed-off-by: Daniel Kiper
---
xen/arch/x86/boot/head.S |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/boot/head.S b/xen/arch/x86/boot/head.S
index 85770e8..e34351c 100644
1 - 100 of 122 matches
Mail list logo