Hi Roman,
On 19/12/2019 00:28, Roman Shaposhnik wrote:
On Wed, Dec 18, 2019 at 2:17 PM Julien Grall wrote:
Hi Roman,
On 18/12/2019 17:03, Roman Shaposhnik wrote:
On Wed, Dec 18, 2019 at 3:50 AM Julien Grall wrote:
So -- nothing boots directly by UEFI -- everything goes through GRUB.
Howev
Hi Tamas,
On 19/12/2019 00:15, Tamas K Lengyel wrote:
On Wed, Dec 18, 2019 at 4:02 PM Julien Grall wrote:
Hi,
On 18/12/2019 22:33, Tamas K Lengyel wrote:
On Wed, Dec 18, 2019 at 3:00 PM Julien Grall wrote:
Hi Tamas,
On 18/12/2019 19:40, Tamas K Lengyel wrote:
Implement hypercall that a
Some code is not needed with CONFIG_CRASH_DEBUG, so only include it if
CONFIG_CRASH_DEBUG is defined.
While at it remove CONFIG_HAS_GDBSX as it can easily be replaced by
CONFIG_CRASH_DEBUG.
Signed-off-by: Juergen Gross
---
V3:
- move domain_pause_for_debugger() into arch/x86/domain.c (Andrew Coo
Support for debugging the hypervisor of guests via gdb/gdbsx should be
configurable.
Changes in V3:
- remove possibility to access hypervisor memory via gdbsx domctl
- default gdbsx support to on
- some code moving
Changes in V2:
- split support for gdbstub and gdbsx (Andrew Cooper)
Juergen Gros
Gdbsx support in the hypervisor is rarely used and it is opening a
way for dom0 to modify the running hypervisor by very easy means.
Remove the possibility to read/write hypervisor memory, it was never
used by gdbsx.
Add a Kconfig option to control support of gdbsx. Default is on.
While at it co
flight 144940 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144940/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 14 guest-saverestore fail REGR. vs. 144861
test-amd64-i386-f
flight 144957 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144957/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c7a0aca0ed0e9b51efe0c437ff77b30cf1457f8a
baseline version:
ovmf 01b6090b75922bc72604c
flight 144936 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144936/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 16 guest-localmigrate fail REGR. vs. 144905
test-armhf-armhf-xl-rtds
On Tue, Dec 03, 2019 at 04:17:33PM +0100, Roger Pau Monné wrote:
> On Tue, Dec 03, 2019 at 06:41:56AM +0100, Marek Marczykowski-Górecki wrote:
> > QEMU running in a stubdom needs to be able to set INTX_DISABLE, and the
> > MSI(-X) enable flags in the PCI config space. This adds an attribute
> > 'al
QEMU running in a stubdom needs to be able to set INTX_DISABLE, and the
MSI(-X) enable flags in the PCI config space. This adds an attribute
'allow_interrupt_control' which when set for a PCI device allows writes
to this flag(s). The toolstack will need to set this for stubdoms.
When enabled, guest
On 2019-12-19 02:42, Ian Jackson wrote:
Steven Haigh writes ("[PATCH] [tools/hotplug] Use ip on systems where
brctl is not available"):
Newer distros like CentOS 8 do not have brctl available. As such, we
can't use it to configure networking anymore.
This patch will fall back to 'ip' or 'bridge
Hi Julien! First of all -- thank you so much for detailed explanations
-- this is very much appreciated.
A few questions still (if you don't mind):
On Wed, Dec 18, 2019 at 2:17 PM Julien Grall wrote:
>
> Hi Roman,
>
> On 18/12/2019 17:03, Roman Shaposhnik wrote:
> > On Wed, Dec 18, 2019 at 3:50
On Wed, Dec 18, 2019 at 4:02 PM Julien Grall wrote:
>
> Hi,
>
> On 18/12/2019 22:33, Tamas K Lengyel wrote:
> > On Wed, Dec 18, 2019 at 3:00 PM Julien Grall wrote:
> >>
> >> Hi Tamas,
> >>
> >> On 18/12/2019 19:40, Tamas K Lengyel wrote:
> >>> Implement hypercall that allows a fork to shed all me
On Wed, 18 Dec 2019, Mark Brown wrote:
> In an effort to clarify and simplify the annotation of assembly functions
> in the kernel new macros have been introduced. These replace ENTRY and
> ENDPROC. Update the annotations in the xen code to the new macros.
>
> Signed-off-by: Mark Brown
> ---
>
>
Hi,
On 18/12/2019 22:33, Tamas K Lengyel wrote:
On Wed, Dec 18, 2019 at 3:00 PM Julien Grall wrote:
Hi Tamas,
On 18/12/2019 19:40, Tamas K Lengyel wrote:
Implement hypercall that allows a fork to shed all memory that got allocated
for it during its execution and re-load its vCPU context fro
On Wed, Dec 18, 2019 at 10:32:47PM +, Andrew Cooper wrote:
> On 18/12/2019 22:26, Marek Marczykowski-Górecki wrote:
> >> @@ -70,7 +73,7 @@ class VM(object):
> >>
> >> # libxl
> >> self.libxl = fmt == "libxl"
> >> -self.emu_xenstore = "" # NUL terminated key&val pairs
Hi,
On 18/12/2019 17:09, Roman Shaposhnik wrote:
Hi,
On Wed, Dec 18, 2019 at 4:56 AM Julien Grall wrote:
So that is, in fact, my first question -- why is Xen not showing
available memory in xl info?
I am not entirely sure what exact information you want.
The output you dumped above contain
On Wed, Dec 18, 2019 at 3:00 PM Julien Grall wrote:
>
> Hi Tamas,
>
> On 18/12/2019 19:40, Tamas K Lengyel wrote:
> > Implement hypercall that allows a fork to shed all memory that got allocated
> > for it during its execution and re-load its vCPU context from the parent VM.
> > This allows the fo
On 18/12/2019 22:26, Marek Marczykowski-Górecki wrote:
>> @@ -70,7 +73,7 @@ class VM(object):
>>
>> # libxl
>> self.libxl = fmt == "libxl"
>> -self.emu_xenstore = "" # NUL terminated key&val pairs from
>> "toolstack" records
>> +self.emu_xenstore = b"" # NUL ter
On Wed, Dec 18, 2019 at 03:05:22PM +, Andrew Cooper wrote:
> convert-legacy-stream is only used for incomming migration from pre Xen 4.7,
> and verify-stream-v2 appears to only be used by me during migration
> development - it is little surprise that they missed the main converstion
> effort in
On Wed, 18 Dec 2019 at 20:24, Michael Kelley wrote:
>
> From: Durrant, Paul Sent: Wednesday, December 18, 2019
> 7:24 AM
>
> > > From: Wei Liu On Behalf Of Wei Liu
> > > Sent: 18 December 2019 14:43
>
> [snip]
>
> > > +
> > > +static inline uint64_t read_hyperv_timer(void)
> > > +{
> > > +u
On Wed, Dec 18, 2019 at 2:29 PM Julien Grall wrote:
>
> Hi Tamas,
>
> On 18/12/2019 19:40, Tamas K Lengyel wrote:
> > MEM_SHARING_DESTROY_GFN is used on the 'flags' bitfield during unsharing.
> > However, the bitfield is not used for anything else, so just convert it to a
> > bool instead.
> >
> >
On Wed, 18 Dec 2019, Julien Grall wrote:
> Hi Stefano,
>
> On 17/12/2019 18:28, Stefano Stabellini wrote:
> > > Then I tried to passthrough the eMMC, but I got the following
> > > error:
> > > (XEN) DOM1: [0.879151] sdhci-esdhc-imx 4005d000.usdhc: can't request
> > > region for resource [mem 0
Hi Roman,
On 18/12/2019 17:03, Roman Shaposhnik wrote:
On Wed, Dec 18, 2019 at 3:50 AM Julien Grall wrote:
So -- nothing boots directly by UEFI -- everything goes through GRUB.
However, my understanding is that GRUB will detect devicetree
information provided by UEFI (even though devicetree co
Hi Tamas,
On 18/12/2019 19:40, Tamas K Lengyel wrote:
Implement hypercall that allows a fork to shed all memory that got allocated
for it during its execution and re-load its vCPU context from the parent VM.
This allows the forked VM to reset into the same state the parent VM is in a
faster way
Hi Tamas,
On 18/12/2019 19:40, Tamas K Lengyel wrote:
MEM_SHARING_DESTROY_GFN is used on the 'flags' bitfield during unsharing.
However, the bitfield is not used for anything else, so just convert it to a
bool instead.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 7
> > /*
> > - * Whenever we re-enter userspace, the domains should always be
> > + * Whenever we re-enter kernel, the domains should always be
>
> This feels unrelated from the rest of the patch and probably want an
> explanation. So I think this want to be in a separate patch.
I wi
On Mon, Dec 16, 2019 at 3:41 PM Julien Grall wrote:
>
> Hello,
>
> On 04/12/2019 23:20, Pavel Tatashin wrote:
> > privcmd_call requires to enable access to userspace for the
> > duration of the hypercall.
> >
> > Currently, this is done via assembly macros. Change it to C
> > inlines instead.
> >
flight 144932 xen-4.13-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144932/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 12 guest-start fail REGR. vs. 144774
Tests which did not suc
From: Durrant, Paul Sent: Wednesday, December 18, 2019
7:24 AM
> > From: Wei Liu On Behalf Of Wei Liu
> > Sent: 18 December 2019 14:43
[snip]
> > +
> > +static inline uint64_t read_hyperv_timer(void)
> > +{
> > +uint64_t scale, offset, ret, tsc;
> > +uint32_t seq;
> > +const struc
On 18/12/2019 16:09, Paul Durrant wrote:
> ...for patches not (yet) upstream.
>
> This patch is simply reserving save record number space to avoid the
> risk of clashes between existent downstream changes made by Amazon and
> future upstream changes which may be incompatible.
>
> Signed-off-by: Pau
It is wasteful to require separate hypercalls to enable sharing on both the
parent and the client domain during VM forking. To speed things up we enable
sharing on the first memop in case it wasn't already enabled.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 39 +++
Trying to share these would fail anyway, better to skip them early.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index 48809a5349..b3607b1bce
Add necessary bits to implement "xl fork-vm", "xl fork-launch-dm" and
"xl fork-reset" commands. The process is split in two to allow tools needing
access to the new VM as fast as possible after it was forked. It is expected
that under certain use-cases the second command that launches QEMU will be
Implement hypercall that allows a fork to shed all memory that got allocated
for it during its execution and re-load its vCPU context from the parent VM.
This allows the forked VM to reset into the same state the parent VM is in a
faster way then creating a new fork would be. Measurements show abou
Use __get_gfn_type_access instead of p2m->get_entry to trigger page-forking
when the mem_access permission is being set on a page that has not yet been
copied over from the parent.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_access.c | 5 ++---
1 file changed, 2 insertions(+), 3 delet
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 46 +--
1 file changed, 22 insertions(+), 24 deletions(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index 90b6371e2f..e5c1424f9b 100644
--- a/xen/arch/x86/mm/mem_sh
While using _mfn(0) is of no consequence during teardown, INVALID_MFN is the
correct value that should be used.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm
The page was already tried to be unshared in get_gfn_type_access. If that
didn't work, then trying again is pointless. Don't try to send vm_event again
either, simply check if there is a ring or not.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/hvm/hvm.c | 26 +-
1 fil
MEM_SHARING_DESTROY_GFN is used on the 'flags' bitfield during unsharing.
However, the bitfield is not used for anything else, so just convert it to a
bool instead.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 7 +++
xen/arch/x86/mm/p2m.c | 1 +
xen/comm
During VM forking we'll copy the parent domain's parameters to the client,
including the HAP shadow memory setting that is used for storing the domain's
EPT. We'll copy this in the hypervisor instead doing it during toolstack launch
to allow the domain to start executing and unsharing memory before
During VM forking the client lock will already be taken.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 11 ++-
xen/include/asm-x86/p2m.h | 10 +-
2 files changed, 11 insertions(+), 10 deletions(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86
Using XENLOG_ERR level since this is only used in debug paths (ie. it's
expected the user already has loglvl=all set).
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 81 ++-
1 file changed, 41 insertions(+), 40 deletions(-)
diff --git a/xen/ar
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 13 ++---
1 file changed, 6 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index b3607b1bce..c44e7f2299 100644
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x
Create struct mem_sharing_domain under hvm_domain and move mem sharing
variables into it from p2m_domain and hvm_domain.
Expose the mem_sharing_enabled macro to be used consistently across Xen.
Remove some duplicate calls to mem_sharing_enabled in mem_sharing.c
Signed-off-by: Tamas K Lengyel
--
VM forking is the process of creating a domain with an empty memory space and a
parent domain specified from which to populate the memory when necessary. For
the new domain to be functional the VM state is copied over as part of the fork
operation (HVM params, hap allocation, etc).
Signed-off-by:
All callers pass 0 in.
Signed-off-by: Tamas K Lengyel
Reviewed-by: Wei Liu
---
xen/arch/x86/hvm/hvm.c| 2 +-
xen/arch/x86/mm/p2m.c | 5 ++---
xen/include/asm-x86/mem_sharing.h | 8 +++-
3 files changed, 6 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/hvm/h
No functional changes.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/hvm/hvm.c| 11 +-
xen/arch/x86/mm/mem_sharing.c | 342 +-
xen/arch/x86/mm/p2m.c | 17 +-
xen/include/asm-x86/mem_sharing.h | 51 +++--
4 files changed, 236 insertions
The following series implements VM forking for Intel HVM guests to allow for
the fast creation of identical VMs without the assosciated high startup costs
of booting or restoring the VM from a savefile.
JIRA issue: https://xenproject.atlassian.net/browse/XEN-89
The main design goal with this seri
No functional changes.
Signed-off-by: Tamas K Lengyel
Acked-by: Wei Liu
---
tools/libxc/include/xenctrl.h | 24
tools/libxc/xc_memshr.c | 12 ++--
2 files changed, 18 insertions(+), 18 deletions(-)
diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/
It's not being called from outside mem_sharing.c
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index 1b7b520ccf..fc1d8be1eb 100644
--- a/xen
Currently the hvm parameters are only accessible via the HVMOP hypercalls. By
exposing hvm_{get/set}_param it will be possible for VM forking to copy the
parameters directly into the clone domain.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/hvm/hvm.c| 169
On Wed, Dec 18, 2019 at 04:09:25PM +, Paul Durrant wrote:
> ...for patches not (yet) upstream.
>
> This patch is simply reserving save record number space to avoid the
> risk of clashes between existent downstream changes made by Amazon and
> future upstream changes which may be incompatible.
On 18/12/2019 18:00, Juergen Gross wrote:
> Dear community members,
>
> I'm pleased to announce that Xen 4.13.0 is released.
>
> Thanks everyone who contributed to this release. This release would
> not have happened without all the awesome contributions from around
> the globe.
>
> Regards,
>
From: SeongJae Park
The number of empty lines between functions in the xenbus.c is
inconsistent. This trivial style cleanup commit fixes the file to
consistently place only one empty line.
Acked-by: Roger Pau Monné
Signed-off-by: SeongJae Park
---
drivers/block/xen-blkback/xenbus.c | 7 ++---
From: SeongJae Park
A few of static variables in blkback have 'xen_blkif_' prefix, though it
is unnecessary for static variables. This commit removes such prefixes.
Reviewed-by: Roger Pau Monné
Signed-off-by: SeongJae Park
---
drivers/block/xen-blkback/blkback.c | 37 +---
Granting pages consumes backend system memory. In systems configured
with insufficient spare memory for those pages, it can cause a memory
pressure situation. However, finding the optimal amount of the spare
memory is challenging for large systems having dynamic resource
utilization patterns. Al
From: SeongJae Park
Granting pages consumes backend system memory. In systems configured
with insufficient spare memory for those pages, it can cause a memory
pressure situation. However, finding the optimal amount of the spare
memory is challenging for large systems having dynamic resource
uti
From: SeongJae Park
A few of static variables in blkback have 'xen_blkif_' prefix, though it
is unnecessary for static variables. This commit removes such prefixes.
Reviewed-by: Roger Pau Monné
Signed-off-by: SeongJae Park
---
drivers/block/xen-blkback/blkback.c | 37 +---
From: SeongJae Park
Each `blkif` has a free pages pool for the grant mapping. The size of
the pool starts from zero and is increased on demand while processing
the I/O requests. If current I/O requests handling is finished or 100
milliseconds has passed since last I/O requests handling, it chec
From: SeongJae Park
A driver's 'reclaim_memory' callback can race with 'probe' or 'remove'
because it will be called whenever memory pressure is detected. To
avoid such race, this commit embeds a spinlock in each 'xenbus_device'
and make 'xenbus' to hold the lock while the corresponded callbacks
flight 144934 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144934/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
flight 144925 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144925/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 14 guest-saverestore fail REGR. vs. 144861
test-amd64-i386-f
On Wed, 18 Dec 2019 16:11:51 +0100 "Jürgen Groß" wrote:
> On 18.12.19 15:40, SeongJae Park wrote:
> > On Wed, 18 Dec 2019 14:30:44 +0100 "Jürgen Groß" wrote:
> >
> >> On 18.12.19 13:42, SeongJae Park wrote:
> >>> On Wed, 18 Dec 2019 13:27:37 +0100 "Jürgen Groß" wrote:
> >>>
> On 18.12.19
Hi,
On Wed, Dec 18, 2019 at 4:56 AM Julien Grall wrote:
> > So that is, in fact, my first question -- why is Xen not showing
> > available memory in xl info?
>
> I am not entirely sure what exact information you want.
>
> The output you dumped above contain the available memory for the memory
> (
On 18/12/2019, 14:29, "Julien Grall" wrote:
Hi Lars,
On 12/12/2019 21:14, Lars Kurth wrote:
> +### Workflow from an Author's Perspective
> +
> +When code authors receive feedback on their patches, they typically
first try
> +to clarify feedback they do not underst
On Wed, Dec 18, 2019 at 3:50 AM Julien Grall wrote:
>
> Hi,
>
> On 18/12/2019 07:36, Roman Shaposhnik wrote:
> > On Tue, Dec 17, 2019 at 6:56 PM Roman Shaposhnik wrote:
> >> Exactly! That's the other surprising bit -- I noticed that too -- its not
> >> like
> >> Xen doesn't see any of the memory
Dear community members,
I'm pleased to announce that Xen 4.13.0 is released.
Please find the tarball and its signature at:
https://downloads.xenproject.org/release/xen/4.13.0/
You can also check out the tag in xen.git:
https://xenbits.xen.org/git-http/xen.git RELEASE-4.13.0
Git checkout
On 12/18/19 12:36 AM, Roman Shaposhnik wrote:
On Wed, Dec 11, 2019 at 12:41 AM Jan Beulich wrote:
On 11.12.2019 09:16, Jürgen Groß wrote:
On 11.12.19 08:28, Jan Beulich wrote:
Jürgen, Boris,
I've noticed
<6>clocksource: Switched to clocksource tsc
as the final clocksource related boot me
...for patches not (yet) upstream.
This patch is simply reserving save record number space to avoid the
risk of clashes between existent downstream changes made by Amazon and
future upstream changes which may be incompatible.
Signed-off-by: Paul Durrant
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc
flight 144924 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144924/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 13 guest-saverestore fail REGR. vs. 144905
test-amd64-amd64-i
Steven Haigh writes ("[PATCH] [tools/hotplug] Use ip on systems where brctl is
not available"):
> Newer distros like CentOS 8 do not have brctl available. As such, we
> can't use it to configure networking anymore.
>
> This patch will fall back to 'ip' or 'bridge' commands if brctl is not
> avail
On 18/12/2019, 13:50, "Andrew Cooper" wrote:
This file hasn't been touched since it was introduced in 2005 (c/s
0c6f36628)
and has a wildly obsolete shebang for Python 2.3. Most importantly for us
is
that it isn't Python 3 compatible.
Drop the file entirely. Since the
> -Original Message-
> From: Wei Liu On Behalf Of Wei Liu
> Sent: 18 December 2019 14:43
> To: Xen Development List
> Cc: Michael Kelley ; Durrant, Paul
> ; Wei Liu ; Jan Beulich
> ; Andrew Cooper ; Wei Liu
> ; Roger Pau Monné
> Subject: [PATCH v2 6/6] x86: implement Hyper-V clock source
On 18.12.19 15:40, SeongJae Park wrote:
On Wed, 18 Dec 2019 14:30:44 +0100 "Jürgen Groß" wrote:
On 18.12.19 13:42, SeongJae Park wrote:
On Wed, 18 Dec 2019 13:27:37 +0100 "Jürgen Groß" wrote:
On 18.12.19 11:42, SeongJae Park wrote:
From: SeongJae Park
'reclaim_memory' callback can race
> -Original Message-
> From: Wei Liu On Behalf Of Wei Liu
> Sent: 18 December 2019 14:43
> To: Xen Development List
> Cc: Michael Kelley ; Durrant, Paul
> ; Wei Liu ; Paul Durrant
> ; Jan Beulich ; Andrew Cooper
> ; Wei Liu ; Roger Pau Monné
>
> Subject: [PATCH v2 4/6] x86/viridian: drop
convert-legacy-stream is only used for incomming migration from pre Xen 4.7,
and verify-stream-v2 appears to only be used by me during migration
development - it is little surprise that they missed the main converstion
effort in Xen 4.13.
Fix it all up.
Move open_file_or_fd() into a new util.py t
> -Original Message-
> From: Wei Liu On Behalf Of Wei Liu
> Sent: 18 December 2019 14:43
> To: Xen Development List
> Cc: Michael Kelley ; Durrant, Paul
> ; Wei Liu ; Paul Durrant
> ; Jan Beulich ; Andrew Cooper
> ; Wei Liu ; Roger Pau Monné
>
> Subject: [PATCH v2 3/6] x86/viridian: drop
> -Original Message-
> From: Wei Liu On Behalf Of Wei Liu
> Sent: 18 December 2019 14:42
> To: Xen Development List
> Cc: Michael Kelley ; Durrant, Paul
> ; Wei Liu ; Jan Beulich
> ; Andrew Cooper ; Wei Liu
> ; Roger Pau Monné
> Subject: [PATCH v2 1/6] x86: import hyperv-tlfs.h from Linu
> -Original Message-
> From: Wei Liu On Behalf Of Wei Liu
> Sent: 18 December 2019 14:42
> To: Xen Development List
> Cc: Michael Kelley ; Durrant, Paul
> ; Wei Liu ; Paul Durrant
> ; Jan Beulich ; Andrew Cooper
> ; Wei Liu ; Roger Pau Monné
>
> Subject: [PATCH v2 2/6] x86/viridian: drop
On Wed, Dec 18, 2019 at 01:50:06PM +, Andrew Cooper wrote:
> This file hasn't been touched since it was introduced in 2005 (c/s 0c6f36628)
> and has a wildly obsolete shebang for Python 2.3. Most importantly for us is
> that it isn't Python 3 compatible.
>
> Drop the file entirely. Since the
Use hyperv-tlfs.h instead. No functional change intended.
Signed-off-by: Wei Liu
---
xen/arch/x86/hvm/viridian/synic.c | 68 ---
1 file changed, 16 insertions(+), 52 deletions(-)
diff --git a/xen/arch/x86/hvm/viridian/synic.c
b/xen/arch/x86/hvm/viridian/synic.c
inde
Implement a clock source using Hyper-V's reference TSC page.
Signed-off-by: Wei Liu
---
v2:
1. Address Jan's comments.
Relevant spec:
https://github.com/MicrosoftDocs/Virtualization-Documentation/raw/live/tlfs/Hypervisor%20Top%20Level%20Functional%20Specification%20v5.0C.pdf
Section 12.6.
---
Use the one defined in hyperv-tlfs.h instead. No functional change
intended.
Signed-off-by: Wei Liu
---
xen/arch/x86/hvm/viridian/time.c | 30 +++---
1 file changed, 11 insertions(+), 19 deletions(-)
diff --git a/xen/arch/x86/hvm/viridian/time.c b/xen/arch/x86/hvm/viridi
Hi all
This series adds a clock source based on Hyper-V's reference TSC. The
meat is in the last patch. I also put in some clean up patches to Xen's
viridian code per Paul's request.
With this series, Xen on Hyper-V no longer runs on emulated PIT.
(XEN) Platform timer is 2294.686MHz HYPER-V REFE
No functional change intended.
Signed-off-by: Wei Liu
---
xen/arch/x86/hvm/viridian/private.h | 66
xen/arch/x86/hvm/viridian/viridian.c | 23 +++---
2 files changed, 6 insertions(+), 83 deletions(-)
diff --git a/xen/arch/x86/hvm/viridian/private.h
b/xen/arch/
Take a pristine copy from Linux commit b2d8b167e15bb5ec2691d1119c025630a247f649.
Do the following to fix it up for Xen:
1. include xen/types.h and xen/bitops.h
2. fix up invocations of BIT macro
Signed-off-by: Wei Liu
Acked-by: Jan Beulich
---
xen/include/asm-x86/guest/hyperv-tlfs.h | 907 +++
Provide a structure to store that information. The structure will be
accessed from other places later so make it public.
Signed-off-by: Wei Liu
Acked-by: Jan Beulich
---
xen/arch/x86/guest/hyperv/hyperv.c | 17 +
xen/include/asm-x86/guest/hyperv.h | 12
2 files chan
The emulated RTC is synchronized with the PV wallclock; any write to the
RTC will update struct domain's 'time_offset_seconds' field and call
update_domain_wallclock().
However, the value of 'time_offset_seconds' is not preserved in any save
record and indeed, when the RTC save record is loaded, t
flight 144927 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144927/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 01b6090b75922bc72604c334bd3dc331490af3bb
baseline version:
ovmf c5d6a57da02774019127e
On Wed, 18 Dec 2019 14:30:44 +0100 "Jürgen Groß" wrote:
> On 18.12.19 13:42, SeongJae Park wrote:
> > On Wed, 18 Dec 2019 13:27:37 +0100 "Jürgen Groß" wrote:
> >
> >> On 18.12.19 11:42, SeongJae Park wrote:
> >>> From: SeongJae Park
> >>>
> >>> 'reclaim_memory' callback can race with a driver
Hi Lars,
On 12/12/2019 21:14, Lars Kurth wrote:
+### Workflow from an Author's Perspective
+
+When code authors receive feedback on their patches, they typically first try
+to clarify feedback they do not understand. For smaller patches or patch series
+it makes sense to wait until receiving fee
Hi Jeff,
On 11/12/2019 21:13, Jeff Kubascik wrote:
Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section D11.2.4
specifies that the values in the TimerValue view of the timers are
signed in standard two's complement form. When writing to the TimerValue
Do you mean CompareValue register ins
Hi Jeff,
On 11/12/2019 21:13, Jeff Kubascik wrote:
The physical timer traps apply an offset so that time starts at 0 for
the guest. However, this offset is not currently applied to the physical
counter. Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section
D11.2.4 Timers, the "Offset" betwee
flight 144931 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144931/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> index aa54c86325..cb577a7ba9 100644
> --- a/xen/include/public/vm_event.h
> +++ b/xen/include/public/vm_event.h
> @@ -110,6 +110,11 @@
> * interrupt pending after resuming the VCPU.
> */
> #define VM_EVENT_FLAG_GET_
On Wed, 2019-12-18 at 08:48 +0100, Juergen Gross wrote:
> Make use of the const qualifier more often in scheduling code.
>
> Signed-off-by: Juergen Gross
>
Cool!
Reviewed-by: Dario Faggioli
Another thing that it may be worth checking is whether all the places
where 'int' is used for CPUs and v
Hi all,
now that 4.13 is out of the way I wanted to get the CoC discussion closed - see
https://lists.xenproject.org/archives/html/xen-devel/2019-12/threads.html#00926,
which means I need ACKs or final suggestions. The next step would be to
publish it on the website.
However, I have also been
Hi Varad,
Please send new version of a patch in a new thread rather than in-reply
to the first version.
On 18/12/2019 10:53, Varad Gautam wrote:
XEN_DOMCTL_destroydomain creates a continuation if domain_kill -ERESTARTS.
In that scenario, it is possible to receive multiple _pirq_guest_unbind
c
This file hasn't been touched since it was introduced in 2005 (c/s 0c6f36628)
and has a wildly obsolete shebang for Python 2.3. Most importantly for us is
that it isn't Python 3 compatible.
Drop the file entirely. Since the 2.3 days, automatic discovery of tests has
been included in standard fun
1 - 100 of 176 matches
Mail list logo