Julien Grall writes:
> On 03/12/2014 17:16, Vitaly Kuznetsov wrote:
>> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
>> index a42d0b8..552e4a3 100644
>> --- a/xen/include/xen/sched.h
>> +++ b/xen/include/xen/sched.h
>> @@ -366,6 +366,8
Julien Grall writes:
> Hi Vitaly,
>
> On 03/12/2014 17:16, Vitaly Kuznetsov wrote:
>> New operation sets the 'recipient' domain which will recieve all
>
> s/recieve/receive/
>
>> memory pages from a particular domain and kills the original domai
Wei Liu writes:
> (I've skipped the internal implementation since I don't know what's
> required to fulfil soft reset.)
>
> On Wed, Dec 03, 2014 at 06:16:20PM +0100, Vitaly Kuznetsov wrote:
> [...]
>> + libxl__domain_
flush_op is unambiguously defined by feature_flush:
REQ_FUA | REQ_FLUSH -> BLKIF_OP_WRITE_BARRIER
REQ_FLUSH -> BLKIF_OP_FLUSH_DISKCACHE
0 -> 0
and thus can be removed. This is just a cleanup.
The patch was suggested by Boris Ostrovsky.
Signed-off-by: Vitaly Kuznetsov
---
flush_op is unambiguously defined by feature_flush:
REQ_FUA | REQ_FLUSH -> BLKIF_OP_WRITE_BARRIER
REQ_FLUSH -> BLKIF_OP_FLUSH_DISKCACHE
0 -> 0
and thus can be removed. This is just a cleanup.
The patch was suggested by Boris Ostrovsky.
Signed-off-by: Vitaly Kuznetsov
--
Signed-off-by: Vitaly Kuznetsov
---
xen/common/domctl.c | 6 ++
xen/include/xsm/dummy.h | 6 ++
xen/include/xsm/xsm.h | 6 ++
xen/xsm/dummy.c | 1 +
xen/xsm/flask/hooks.c | 17 +
xen/xsm
New dying state is requred to indicate that a particular domain
is dying but cleanup procedure wasn't started. This state can be
set from outside of domain_kill().
Signed-off-by: Vitaly Kuznetsov
---
xen/common/domain.c | 1 +
xen/include/xen/sched.h | 3 ++-
2 files changed, 3 inser
estore HVM context, HVM params, seed grant table.
After that the domain resumes execution from where SHUTDOWN_soft_reset was
called.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxc/Makefile | 1 +
tools/libxc/include/xenguest.h | 20 +++
tools/libxc/xc_domain_soft_res
New operation sets the 'recipient' domain which will receive all
memory pages from a particular domain and kills the original domain.
Signed-off-by: Vitaly Kuznetsov
---
xen/common/domain.c | 3 +++
xen/common/domctl.c | 33 +
Introduce new xc_domain_devour() function to support XEN_DOMCTL_devour.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxc/include/xenctrl.h | 14 ++
tools/libxc/xc_domain.c | 13 +
2 files changed, 27 insertions(+)
diff --git a/tools/libxc/include/xenctrl.h b/tools
structure
to support the change.
The original libxl_domain_destroy() function could be easily
modified to support new flag but I'm trying to avoid that as
it is part of public API.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxl/libxl.c | 33 -
Use letter 't' to indicate a domain in such state.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_cmdimpl.c | 2 +-
tools/python/xen/lowlevel/xl/xl.c | 1 +
3 files changed, 3 insertions(+), 1 deletion(-)
diff --git a/t
Signed-off-by: Vitaly Kuznetsov
---
xen/common/shutdown.c | 7 +++
xen/include/public/sched.h | 3 ++-
2 files changed, 9 insertions(+), 1 deletion(-)
diff --git a/xen/common/shutdown.c b/xen/common/shutdown.c
index 94d4c53..5c3a158 100644
--- a/xen/common/shutdown.c
+++ b/xen/common
*/
#define SHUTDOWN_watchdog 4 /* Restart because watchdog time expired. */
+#define SHUTDOWN_soft_reset 5 /* Soft-reset for kexec. */
#endif /* __XEN_PUBLIC_SCHED_H__ */
Vitaly Kuznetsov (9):
xen: introduce DOMDYING_locked state
xen: introduce SHUTDOWN_soft_reset shutd
Perform soft reset when a domain did SHUTDOWN_soft_reset. Migrate the
content with xc_domain_soft_reset(), reload dm and toolstack.
Signed-off-by: Vitaly Kuznetsov
---
docs/man/xl.cfg.pod.5| 12 +
tools/libxl/libxl.h | 6 +++
tools/libxl/libxl_create.c | 103
Wei Liu writes:
> Olaf mentioned his concern about handling ballooned pages in
> <20141211153029.ga1...@aepfle.de>. Is that point moot now?
Well, the limitation is real and some guest-side handling will be
required in case we want to support kexec with ballooning. But as David
validly mentioned
ixed length string inside struct
xen_clock_event_device. 16 bytes should be enough.
The issue was discovered by Laszlo Ersek.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/time.c | 13 -
1 file changed, 4 insertions(+), 9 deletions(-)
diff --git a/arch/x86/xen/time.c b/arch/x86
ixed length string inside struct
xen_clock_event_device. 16 bytes should be enough.
Suggested-by: Laszlo Ersek
Signed-off-by: Vitaly Kuznetsov
---
Changes from v1 (David Vrabel):
- add 'struct xen_clock_event_device *xevt' for covenience
- sizeof(xevt->name) in snprintf() call
- Sugges
Olaf Hering writes:
> On Mon, Jan 05, Vitaly Kuznetsov wrote:
>
>> Wei Liu writes:
>>
>> > Olaf mentioned his concern about handling ballooned pages in
>> > <20141211153029.ga1...@aepfle.de>. Is that point moot now?
>>
>> Well, the l
"Jan Beulich" writes:
>>>> On 07.01.15 at 11:41, wrote:
>> On 07/01/15 09:10, Olaf Hering wrote:
>>> On Mon, Jan 05, Vitaly Kuznetsov wrote:
>>>
>>>> Wei Liu writes:
>>>>
>>>>> Olaf mentioned his concern abo
Ian Campbell writes:
> On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote:
>> +gmfn = mfn_to_gmfn(d, mfn);
>
> (I haven't thought about it super hard, but I'm taking it as given that
> this approach to kexec is going to be needed for ARM to
"Jan Beulich" writes:
On 13.01.15 at 17:17, wrote:
>> Ian Campbell writes:
>>> An alternative approach to this might be to walk the guest p2m (with
>>> appropriate continuations) and move each domheap page (this would also
>>> help us preserve super page mappings). It would also have the a
Julien Grall writes:
> The code to load the kernel is only used when Xen builds dom0. It
> happens during the boot.
I suppose we don't have dom0 kexec for ARM now or this code is not
(won't be) required?
--
Vitaly
___
Xen-devel mailing list
Xen-de
"Jan Beulich" writes:
>>>> On 13.07.15 at 11:08, wrote:
>> On Mon, 2015-07-13 at 09:45 +0100, Jan Beulich wrote:
>>> >>> On 10.07.15 at 18:24, wrote:
>>> > On Tue, Jun 23, 2015 at 06:11:47PM +0200, Vitaly Kuznetsov wrote:
>>> &
Konrad Rzeszutek Wilk writes:
> On Tue, Jun 23, 2015 at 06:11:47PM +0200, Vitaly Kuznetsov wrote:
>> Log first 10 active grants of a domain. This function is going to be used
>> for soft reset, active grants on this path usually mean misbehaving backends
>> refusing to rele
Konrad Rzeszutek Wilk writes:
> On Tue, Jun 23, 2015 at 06:11:50PM +0200, Vitaly Kuznetsov wrote:
>> ...
>>
>> +int arch_domain_soft_reset(struct domain *d)
>> +{
>> +struct page_info *page = virt_to_page(d->shared_info), *new_page;
>> +
Konrad Rzeszutek Wilk writes:
> On Tue, Jul 14, 2015 at 05:52:44PM +0200, Vitaly Kuznetsov wrote:
>> Konrad Rzeszutek Wilk writes:
>>
>> > On Tue, Jun 23, 2015 at 06:11:50PM +0200, Vitaly Kuznetsov wrote:
>> >> ...
>> >>
&g
Ian Jackson writes:
> Konrad Rzeszutek Wilk writes ("Re: [PATCH v8 01/11] xen: introduce
> SHUTDOWN_soft_reset shutdown reason"):
>> On Tue, Jun 23, 2015 at 06:11:43PM +0200, Vitaly Kuznetsov wrote:
>> > This special type of shutdown is supposed to be used by PVHV
Ian Jackson writes:
> Konrad Rzeszutek Wilk writes ("Re: [PATCH v8 02/11] libxl: support
> SHUTDOWN_soft_reset shutdown reason"):
>> On Tue, Jun 23, 2015 at 06:11:44PM +0200, Vitaly Kuznetsov wrote:
>> > Use letter 'S' to indicate a domain in suc
Ian Jackson writes:
> Vitaly Kuznetsov writes ("[PATCH v8 11/11] (lib)xl: soft reset support"):
>> Use existing create/restore path to perform 'soft reset' for HVM domains.
>> Tear everything down, e.g. destroy domain's device model, remove the domain
>
Julien Grall writes:
> Hi Vitaly,
>
> On 23/06/2015 18:11, Vitaly Kuznetsov wrote:
>> diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
>> index 24b8938..c112afa 100644
>> --- a/xen/arch/arm/domain.c
>> +++ b/xen/arch/arm/domain.c
>> @@ -653,6 +65
Use letter 'S' to indicate a domain in such state. Introduce new
'on_soft_reset' action and default it to 'restart' for now.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v8:
- Introduce on_soft_reset here (moved from PATCH 11) [Ian Jackson]
---
docs/man
Add new soft_reset vector to domain2 class, add it to create_domain
in the default policy.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Daniel De Graaf
---
Changes since v8:
- Add Daniel's A-b.
---
tools/flask/policy/policy/modules/xen/xen.if | 2 +-
xen/xsm/flask/ho
ckends can cause a
domain to crash right after the soft reset operation and 'g' option won't be
available in this case.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v8:
- Use WARN_GRANT_MAX define instead of hardcoded 10 [Konrad Rzeszutek Wilk]
- Update commit message explaining
d to find possible misbehaving
backends in future.
v8 of the 'toolstack-assisted approach to pvhvm guest kexec' is available here:
http://lists.xen.org/archives/html/xen-devel/2015-06/msg03632.html
Vitaly Kuznetsov (11):
xen: introduce SHUTDOWN_soft_reset shutdown reason
libxl:
We need to close all event channel so the domain performing soft reset
will be able to open them back.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v8:
- Check !d->controller_pause_count instead of pausing/unpausing the domain
in evtchn_reset(). [Konrad Rzeszutek Wilk]
---
xen/com
Introduce xc_domain_soft_reset() function supporting XEN_DOMCTL_soft_reset.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Wei Liu
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Ian Jackson
---
Changes since v8:
- Add Wei's A-b.
- Add Konrad's R-b.
- Add Ian J A-b.
---
tools/libxc/include
As a preparation before adding new restart type (soft reset) put all
restart types into an enum.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Ian Campbell
Reviewed-by: Konrad Rzeszutek Wilk
---
Changes since v8:
- add Konrad's R-b
Changes since v7:
- s,restarter,restarted, [Ian Cam
This special type of shutdown is supposed to be used by PVHVM guests when
they want to perform some sort of kexec/kdump.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v8:
- describe the expected behavior for 'soft reset' [Ian Jackson]
---
xen/common/shutdown.c | 6 ++
x
New domctl resets state for a domain allowing it to 'start over': register
vcpu_info, switch to FIFO ABI for event channels. Still active grants are
being logged to help debugging misbehaving backends.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v8:
- Introduce vcpu_info_rese
Use this in libxl_dm instead of hard-coding.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Ian Campbell
---
Changes since v8:
- None
---
tools/libxc/include/xenguest.h | 2 ++
tools/libxl/libxl_dm.c | 2 +-
2 files changed, 3 insertions(+), 1 deletion(-)
diff --git a/tools/libxc/include
x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq
servers and and replaces the shared_info frame with an empty page to support
subsequent XENMAPSPACE_shared_info call.
ARM-specific hook is -ENOSYS for now.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v8:
- Comments
Use existing create/restore path to perform 'soft reset' for HVM
domains. Tear everything down, e.g. destroy domain's device model,
remove the domain from xenstore, save toolstack record and start
over.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v8:
- Pause/unpase the do
Konrad Rzeszutek Wilk writes:
...
>> +return AO_CREATE_FAIL(ERROR_FAIL);
>> +}
>> +
>> +/*
>> + * On the domain creation path it will be introduced to xenstore
>
> What is 'it'?
>
The domain :-)
>> + * with (probably) different store/console channels so we need to
>> +
Konrad Rzeszutek Wilk writes:
>>
>> @@ -1010,6 +1017,29 @@ int domain_unpause_by_systemcontroller(struct domain
>> *d)
>> return 0;
>> }
>>
>> +int domain_soft_reset(struct domain *d)
>> +{
>> +struct vcpu *v;
>> +int rc;
>> +
>> +spin_lock(&d->shutdown_lock);
>> +for_e
"Jan Beulich" writes:
On 16.07.15 at 18:27, wrote:
>> --- a/xen/arch/x86/domain.c
>> +++ b/xen/arch/x86/domain.c
>> @@ -704,6 +704,90 @@ void arch_domain_unpause(struct domain *d)
>> viridian_time_ref_count_thaw(d);
>> }
>>
>> +int arch_domain_soft_reset(struct domain *d)
>> +{
This special type of shutdown is supposed to be used by PVHVM guests when
they want to perform some sort of kexec/kdump.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
---
Changes since v9:
- add Reviewed-by: [Konrad Rzeszutek Wilk]
- minor comment
Add new soft_reset vector to domain2 class, add it to create_domain
in the default policy.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Daniel De Graaf
---
Changes since v9:
- None.
---
tools/flask/policy/policy/modules/xen/xen.if | 2 +-
xen/xsm/flask/hooks.c| 3 +++
xen
est kexec' is available here:
http://lists.xen.org/archives/html/xen-devel/2015-07/msg03377.html
Vitaly Kuznetsov (11):
xen: introduce SHUTDOWN_soft_reset shutdown reason
libxl: support SHUTDOWN_soft_reset shutdown reason
xl: introduce enum domain_restart_type
xen: evtchn: make evtchn_r
New domctl resets state for a domain allowing it to 'start over': register
vcpu_info, switch to FIFO ABI for event channels. Still active grants are
being logged to help debugging misbehaving backends.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Jan Beulich
---
Changes since v9
We need to close all event channel so the domain performing soft reset
will be able to open them back.
Signed-off-by: Vitaly Kuznetsov
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
---
Changes since v9:
- Add Reviewed-by: [Konrad Rzeszutek Wilk]
- Add Acked-by: [Jan Beulich
Introduce xc_domain_soft_reset() function supporting XEN_DOMCTL_soft_reset.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Wei Liu
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Ian Jackson
---
Changes since v9:
- None.
---
tools/libxc/include/xenctrl.h | 3 +++
tools/libxc/xc_domain.c | 9
Use existing create/restore path to perform 'soft reset' for HVM
domains. Tear everything down, e.g. destroy domain's device model,
remove the domain from xenstore, save toolstack record and start
over.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v9:
- s,reset,Reset,
As a preparation before adding new restart type (soft reset) put all
restart types into an enum.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Ian Campbell
Reviewed-by: Konrad Rzeszutek Wilk
---
Changes since v9:
- None.
---
tools/libxl/xl.h | 6 ++
tools/libxl/xl_cmdimpl.c | 23
x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq
servers and and replaces the shared_info frame with an empty page to support
subsequent XENMAPSPACE_shared_info call.
ARM-specific hook is -ENOSYS for now.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v9
ckends can cause a
domain to crash right after the soft reset operation and 'g' option won't be
available in this case.
Signed-off-by: Vitaly Kuznetsov
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
---
Changes since v9:
- Add Reviewed-by: [Konrad Rzeszutek Wilk]
- Do not
Use this in libxl_dm instead of hard-coding.
Signed-off-by: Vitaly Kuznetsov
Acked-by: Ian Campbell
---
Changes since v9:
- None
---
tools/libxc/include/xenguest.h | 2 ++
tools/libxl/libxl_dm.c | 2 +-
2 files changed, 3 insertions(+), 1 deletion(-)
diff --git a/tools/libxc/include
Use letter 'S' to indicate a domain in such state. Introduce new
'on_soft_reset' action and default it to 'restart' for now.
Signed-off-by: Vitaly Kuznetsov
---
Changes since v9:
- None
---
docs/man/xl.cfg.pod.5 | 5 +
tools/libxl/libxl_types.
Ian Campbell writes:
> (CC-ing 2x QEMU maintainers and stable release manager)
>
> The separate trees are a holdover from mercurial, which didn't (at the
> time) have a good in-repo branching model.
>
> I propose that Xen 4.6 should be the last release which uses these split
> trees and that inst
Hi Konrad,
I just hit an issue with PVHVM guests after save/restore (or migration),
if a PVHVM guest has > 32 VCPUs it hangs. Turns out, you saw it almost a
year ago and even wrote patches to call VCPUOP_register_vcpu_info after
resume. Unfortunately these patches never made it to xen/kernel. Do y
Andrew Cooper writes:
> On 02/02/15 10:47, Vitaly Kuznetsov wrote:
>> Hi Konrad,
>>
>> I just hit an issue with PVHVM guests after save/restore (or migration),
>> if a PVHVM guest has > 32 VCPUs it hangs. Turns out, you saw it almost a
>> yea
Konrad Rzeszutek Wilk writes:
> On Mon, Feb 02, 2015 at 12:03:28PM +0100, Vitaly Kuznetsov wrote:
>> Andrew Cooper writes:
>>
>> > On 02/02/15 10:47, Vitaly Kuznetsov wrote:
>> >> Hi Konrad,
>> >>
>> >> I just hit an issue with PVHV
Andrew Cooper writes:
> Save the x86 HVM specific parts of the domain. This is considerably simpler
> than an x86 PV domain. Only the HVM_CONTEXT and HVM_PARAMS records are
> needed.
>
> There is no need for any page normalisation.
>
> Signed-off-by: Andrew Cooper
> CC: Ian Campbell
> CC: Ian
hwdom_shutdown() operates with hardware domains, use the proper wording.
Eliminate pointless braces from switch cases.
Signed-off-by: Vitaly Kuznetsov
---
xen/common/shutdown.c | 20 +---
1 file changed, 5 insertions(+), 15 deletions(-)
diff --git a/xen/common/shutdown.c b/xen
"Jan Beulich" writes:
On 23.04.15 at 12:39, wrote:
>> --- a/xen/common/shutdown.c
>> +++ b/xen/common/shutdown.c
>> @@ -37,46 +37,36 @@ void hwdom_shutdown(u8 reason)
>> switch ( reason )
>> {
>> case SHUTDOWN_poweroff:
>> -{
>> -printk("Domain 0 halted: halting m
ted, kexec for the HW domain is being performed,...).
Signed-off-by: Vitaly Kuznetsov
---
xen/common/shutdown.c | 24 +---
1 file changed, 9 insertions(+), 15 deletions(-)
diff --git a/xen/common/shutdown.c b/xen/common/shutdown.c
index 94d4c53..923dffe 100644
--- a/xen/com
"Jan Beulich" writes:
Thanks for the review!
On 07.10.14 at 15:10, wrote:
>> New operation sets the 'recipient' domain which will recieve all
>> memory pages from a particular domain when these pages are freed.
>
>> --- a/xen/common/domctl.c
>> +++ b/xen/common/domctl.c
>> @@ -1152,6 +1152
"Jan Beulich" writes:
On 25.11.14 at 16:41, wrote:
>> "Jan Beulich" writes:
>> On 07.10.14 at 15:10, wrote:
@@ -1764,11 +1765,28 @@ void free_domheap_pages(struct page_info *pg,
unsigned int order)
scrub = 1;
}
-if ( unlik
issues.
This patch is based on the original patch by Laszlo Ersek and a comment by
Jeff Moyer.
Signed-off-by: Vitaly Kuznetsov
Reviewed-by: Laszlo Ersek
---
drivers/block/xen-blkfront.c | 14 --
1 file changed, 8 insertions(+), 6 deletions(-)
diff --git a/drivers/block/xen-blkfront.c
case the requested
domain was destroyed it will report first domain with domid > requested domid
which is apparently misleading as there is no way xc_get_tot_pages() callers
can figure out that they got tot_pages for some other domain.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxc/xc_private.c |
Boris Ostrovsky writes:
> On 12/01/2014 08:01 AM, Vitaly Kuznetsov wrote:
>> Guard against issuing unsupported REQ_FUA and REQ_FLUSH was introduced
>> in d11e61583 and was factored out into blkif_request_flush_valid() in
>> 0f1ca65ee. However:
>> 1) This chec
Perform soft reset when a domain did SHUTDOWN_soft_reset. Migrate the
content with xc_domain_soft_reset(), reload dm and toolstack.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxl/libxl.h | 6 +++
tools/libxl/libxl_create.c | 103 +++
tools
estore HVM context, HVM params, seed grant table.
After that the domain resumes execution from where SHUTDOWN_soft_reset was
called.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxc/Makefile | 1 +
tools/libxc/include/xenguest.h | 20 +++
tools/libxc/xc_domain_soft_res
Use letter 't' to indicate a domain in such state.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_cmdimpl.c | 2 +-
tools/python/xen/lowlevel/xl/xl.c | 1 +
3 files changed, 3 insertions(+), 1 deletion(-)
diff --git a/t
New dying state is requred to indicate that a particular domain
is dying but cleanup procedure wasn't started. This state can be
set from outside of domain_kill().
Signed-off-by: Vitaly Kuznetsov
---
xen/common/domain.c | 1 +
xen/include/xen/sched.h | 3 ++-
2 files changed, 3 inser
New operation sets the 'recipient' domain which will recieve all
memory pages from a particular domain and kills the original domain.
Signed-off-by: Vitaly Kuznetsov
---
xen/common/domain.c | 3 +++
xen/common/domctl.c | 33 +
Signed-off-by: Vitaly Kuznetsov
---
xen/common/domctl.c | 6 ++
xen/include/xsm/dummy.h | 6 ++
xen/include/xsm/xsm.h | 6 ++
xen/xsm/dummy.c | 1 +
xen/xsm/flask/hooks.c | 17 +
xen/xsm
time expired. */
+#define SHUTDOWN_soft_reset 5 /* Soft-reset for kexec. */
#endif /* __XEN_PUBLIC_SCHED_H__ */
Vitaly Kuznetsov (9):
xen: introduce DOMDYING_locked state
xen: introduce SHUTDOWN_soft_reset shutdown reason
libxl: support SHUTDOWN_soft_reset sh
Introduce new xc_domain_devour() function to support XEN_DOMCTL_devour.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxc/include/xenctrl.h | 14 ++
tools/libxc/xc_domain.c | 13 +
2 files changed, 27 insertions(+)
diff --git a/tools/libxc/include/xenctrl.h b/tools
Signed-off-by: Vitaly Kuznetsov
---
xen/common/shutdown.c | 7 +++
xen/include/public/sched.h | 3 ++-
2 files changed, 9 insertions(+), 1 deletion(-)
diff --git a/xen/common/shutdown.c b/xen/common/shutdown.c
index 94d4c53..5c3a158 100644
--- a/xen/common/shutdown.c
+++ b/xen/common
libxl__domain_destroy_state structure
to support the change.
The original libxl_domain_destroy() function could be easily
modified to support new flag but I'm trying to avoid that as
it is part of public API.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxl/libxl.c | 32 +++-
301 - 381 of 381 matches
Mail list logo