On Tue, Jan 13, Doug McMillan wrote:
> Also quick question if I am understanding my remaining issue [tmpfs: Bad mount
> option context] as described by a previous thread. Until
> the code that generates it changes I need to manually change
> var-lib-xenstored.mount from
...
> Or am I misunderstand
> -Original Message-
> From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov]
> Sent: Tuesday, January 13, 2015 11:54 PM
> To: Xu, Quan; xen-devel@lists.xen.org
> Cc: stefano.stabell...@eu.citrix.com; samuel.thiba...@ens-lyon.org;
> ian.campb...@citrix.com; ian.jack...@eu.citrix.com; jbeul.
>>> Julien Grall 01/13/15 7:17 PM >>>
>QEMU upstream requires the use of pixman. When pixman is not present the
>system, the configure of QEMU will fail with:
>
>ERROR: pixman not present. Your options:
>(1) Preferred: Install the pixman devel package (any recent
>distro should have packages as Xo
>>> Ed White 01/13/15 10:32 PM >>>
>On 01/13/2015 12:45 PM, Andrew Cooper wrote:
>> On 13/01/15 20:02, Ed White wrote:
>>> The set of mfn's is the same, but I do allow gfn->mfn mappings to be
>>> modified under certain circumstances. One use of this is to point the
>>> same VA to different physica
>>> Ed White 01/13/15 9:03 PM >>>
>On 01/13/2015 11:01 AM, Andrew Cooper wrote:
>> One thing I have noticed while looking at the #VE stuff that EPT also
>> supports A/D tracking, which might be quite a nice optimisation and
>> forgo the need for p2m_ram_logdirty, but I think this should be treated
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, January 14, 2015 12:06 AM
>
> >>> On 13.01.15 at 17:00, wrote:
> > Another option I was thinking about: Before assigning a device to a
> > guest, you have to unplug the device and assign it to pci-back (e.g.,
> > with xl pci-assign
> -Original Message-
> From: Dr. Greg Wettstein [mailto:g...@wind.enjellic.com]
> Sent: Wednesday, January 14, 2015 10:25 AM
> To: Xu, Quan; g...@enjellic.com; xen-devel@lists.xen.org
> Cc: Daniel De Graaf; stefano.stabell...@eu.citrix.com
> Subject: RE: [Xen-devel] Architecture for dom0
From: David Vrabel
Date: Tue, 13 Jan 2015 17:16:41 +
> As netfront as evolved to handle different sorts of skbs the code to
> fill a Tx requests has been copy and pasted several times. The series
> refactors this and a few other areas.
>
> The first patch is to a Xen header but this can be
On 01/13/2015 04:47 PM, Jim Fehlig wrote:
>>> +++ b/src/Makefile.am
>>> @@ -1005,6 +1005,10 @@ XENCONFIG_SOURCES =
>>> \
>>> xenconfig/xen_common.c xenconfig/xen_common.h \
>>> xenconfig/xen_sxpr.c xenconfig/xen_sxpr.h \
>>>
On 01/13/2015 07:53 PM, Pasi Kärkkäinen wrote:
Hi,
On Tue, Jan 13, 2015 at 05:22:58PM +0100, Juergen Gross wrote:
The locking in scsifront_dev_reset_handler() is obviously wrong. In
case of a full ring the host lock is aquired twice.
Fixing this issue enables to get rid of the endless fo loop
Eric Blake wrote:
> On 01/13/2015 08:53 AM, Jim Fehlig wrote:
>
>> From: Kiarie Kahurani
>>
>> add tests for the xen_xl config parser
>>
>> Signed-off-by: Kiarie Kahurani
>> Signed-off-by: Jim Fehlig
>> ---
>>
>> V4:
>> Only build xlconfigtest when libxl is available.
>>
>>
>
>
>> @@
>>> On 1/12/2015 at 09:54 PM, in message <1421070890.26317.69.ca...@citrix.com>,
Ian Campbell wrote:
> On Mon, 2015-01-12 at 00:01 -0700, Chun Yan Liu wrote:
> >
> > >>> On 1/8/2015 at 08:26 PM, in message
> > >>> <1420719995.19787.62.ca...@citrix.com>,
> Ian
> > Campbell wrote:
> > >
On Jan 12, 3:53pm, "Xu, Quan" wrote:
} Subject: RE: [Xen-devel] Architecture for dom0 integrity measurements.
> Hi, Dr. G.W. Wettstein
Hi Quan, thanks for taking the time to reply.
> cc Graaf who is vTPM / XSM maintainer.
> Also cc Stefano.
Greetings to everyone else as well.
> > -Origina
On Tue, Jan 13, 2015 at 01:46:50PM +, Wei Liu wrote:
> On Tue, Jan 13, 2015 at 04:02:12PM +0800, Chao Peng wrote:
> > Make some internal routines common so that total/local memory bandwidth
> > monitoring in the next patch can make use of them.
> >
> > Signed-off-by: Chao Peng
>
> Acked-by:
Hi,
[Goal]
I want to investigate the impact of the shared cache on the
performance of workload in guest domain.
I also want to partition the shared cache via page coloring mechanism
so that guest domains can use different cache colors of shared cache
and will not have interference in the shared ca
flight 33401 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33401/
Perfect :-)
All tests in this flight passed
version targeted for testing:
rumpuserxen 1e71553faec32af113f1d91c8331341eed320ea5
baseline version:
rumpuserxen 34ecfdbad080f093fa0107042d5c
flight 33395 xen-4.5-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33395/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 7 debian-hvm-install fail REGR. vs.
33348
Regressions
Eric Blake wrote:
> On 01/13/2015 08:53 AM, Jim Fehlig wrote:
>
>> Introduce a parser/formatter for the xl config format. Since the
>> deprecation of xm/xend, the VM config file format has diverged as
>> new features are added to libxl. This patch adds support for parsing
>> and formating the
On 01/12/2015 10:43 AM, David Vrabel wrote:
From: Jenny Herbert
Introduce gnttab_unmap_refs_async() that can be used to safely unmap
pages that may be in use (ref count > 1). If the pages are in use the
unmap is deferred and retried later. This polling is not very clever
but it should be good
On 01/12/2015 10:43 AM, David Vrabel wrote:
diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c
index 8d6e97c..9c7dc75 100644
--- a/drivers/xen/grant-table.c
+++ b/drivers/xen/grant-table.c
@@ -679,12 +679,27 @@ EXPORT_SYMBOL_GPL(gnttab_free_auto_xlat_frames);
*/
int gnttab_al
Folks,
I am proposing that this year's Document Days schedule follow the rule
we followed in the latter half of 2014: Doc Days will be scheduled on
the final Wednesday of each month (barring conflicts with holidays).
Particularly, I suggest the following dates:
January 28, 2015
February 25, 2015
From: David Vrabel
Date: Tue, 13 Jan 2015 16:42:42 +
> In netfront the Rx and Tx path are independent and use different
> locks. The Tx lock is held with hard irqs disabled, but Rx lock is
> held with only BH disabled. Since both sides use the same stats lock,
> a deadlock may occur.
>
>
From: David Vrabel
Date: Tue, 13 Jan 2015 14:43:39 +
> On 12/01/15 15:43, David Vrabel wrote:
>> From: Jenny Herbert
>>
>> Use the foreign page flag in netback to get the domid and grant ref
>> needed for the grant copy. This signficiantly simplifies the netback
>> code and makes netback w
On 01/13/2015 12:45 PM, Andrew Cooper wrote:
> On 13/01/15 20:02, Ed White wrote:
>> On 01/13/2015 11:01 AM, Andrew Cooper wrote:
>>> On 09/01/15 21:26, Ed White wrote:
This set of patches adds support to hvm domains for EPTP switching by
creating
multiple copies of the host p2m (cu
On Thu, Dec 18, 2014 at 02:23:14PM -0500, Konrad Rzeszutek Wilk wrote:
> > index 000..b5a3e98
> > --- /dev/null
> > +++ b/drivers/xen/preempt.c
> > @@ -0,0 +1,17 @@
> > +/*
> > + * Preemptible hypercalls
> > + *
> > + * Copyright (C) 2014 Citrix Systems R&D ltd.
> > + *
> > + * This source code
On 01/13/2015 10:53 AM, Jim Fehlig wrote:
> It's been a long, twisting road to V4 of the Xen xl parser. V3 [1] was
> based on a flex-based parser that was copied from the Xen project and
> proved to be a bit challenging to integrate properly with autotools.
> But as it turns out, Xen provides an
On 01/13/2015 08:53 AM, Jim Fehlig wrote:
> From: Kiarie Kahurani
>
> Now that xenconfig supports parsing and formatting Xen's
> XL config format, integrate it into the libxl driver's
> connectDomainXML{From,To}Native functions.
>
> Signed-off-by: Kiarie Kahurani
> Signed-off-by: Jim Fehlig
>
On 01/13/2015 08:53 AM, Jim Fehlig wrote:
> From: Kiarie Kahurani
>
> add tests for the xen_xl config parser
>
> Signed-off-by: Kiarie Kahurani
> Signed-off-by: Jim Fehlig
> ---
>
> V4:
> Only build xlconfigtest when libxl is available.
>
> @@ -227,6 +228,11 @@ if WITH_XEN
> test_programs
On 01/13/2015 08:53 AM, Jim Fehlig wrote:
> Introduce a parser/formatter for the xl config format. Since the
> deprecation of xm/xend, the VM config file format has diverged as
> new features are added to libxl. This patch adds support for parsing
> and formating the xl config format. It support
On 13/01/15 12:11, Wei Liu wrote:
> This function gets the machine E820 map and sanitize it according to PV
> guest configuration.
>
> This will be used in later patch. No functional change introduced in
> this patch.
>
> Signed-off-by: Wei Liu
> Cc: Ian Campbell
> Cc: Ian Jackson
> Cc: Dario Fa
On Tue, Jan 13, 2015 at 07:21:47PM +, Andrew Cooper wrote:
> On 13/01/15 12:11, Wei Liu wrote:
> > @@ -408,6 +413,49 @@ static void dump_numa(unsigned char key)
> >
> > for_each_online_node ( i )
> > printk("Node %u: %u\n", i, page_num_node[i]);
> > +
> > +if
On 01/13/2015 08:53 AM, Jim Fehlig wrote:
> It's been a long, twisting road to V4 of the Xen xl parser. V3 [1] was
> based on a flex-based parser that was copied from the Xen project and
> proved to be a bit challenging to integrate properly with autotools.
> But as it turns out, Xen provides an i
On 13/01/15 20:02, Ed White wrote:
> On 01/13/2015 11:01 AM, Andrew Cooper wrote:
>> On 09/01/15 21:26, Ed White wrote:
>>> This set of patches adds support to hvm domains for EPTP switching by
>>> creating
>>> multiple copies of the host p2m (currently limited to 10 copies).
>>>
>>> The primary u
On Tue, Jan 13, 2015 at 01:15:21PM -0500, Konrad Rzeszutek Wilk wrote:
> On Tue, Jan 13, 2015 at 12:11:43PM +, Wei Liu wrote:
> > The algorithm is more or less the same as the one used for PV guest.
> > Libxc gets hold of the mapping of vnode to pnode and size of each vnode
> > then allocate me
On 01/13/2015 02:27 PM, Konrad Rzeszutek Wilk wrote:
Hey
I was wondering if there would be any plans for configure.ac
(or the m4 scripts) to have an --enable-xsm which would set
XSM_ENABLE (or FLASK_ENABLE) to true?
Right now by default to build with XSM one has to manually change
the Config.mk
Hi Ian,
On 13/01/15 15:55, Ian Campbell wrote:
> On Fri, 2014-12-12 at 14:43 +, Julien Grall wrote:
>> This help for guest interrupts debugging. If the vIRQ is not allocate,
>> this means that nothing is wired to it.
>
> Should we short circuit the rest of the enable operation for this IRQ
>
flight 33394 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33394/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 5 xen-boot fail REGR. vs. 33292
test-amd64-i386-p
On 13 January 2015 at 18:24, Stefano Stabellini
wrote:
> The following changes since commit 7d5ad15d17f26dd4f9ff5f3491828bc34e74f28c:
>
> Merge remote-tracking branch 'remotes/stefanha/tags/net-pull-request' into
> staging (2015-01-12 11:13:24 +)
>
> are available in the git repository at:
On 01/13/15 13:07, Stefano Stabellini wrote:
> On Mon, 12 Jan 2015, Stefano Stabellini wrote:
>> On Wed, 3 Dec 2014, Don Slutz wrote:
>>> From: Stefano Stabellini
>>>
>>> Increase maxmem before calling xc_domain_populate_physmap_exact to
>>> avoid the risk of running out of guest memory. This way
The code to initialize the grant table in libxc uses
xc_domain_maximum_gpfn() + 1 to get a guest pfn for mapping the grant
frame and to initialize it.
This solution has two major issues:
- The check of the return of xc_domain_maximum_gpfn is buggy because
xen_pfn_t is unsigned and in case
Some platform (such as the VFP Base AEMv8 model) has a memory mapped
timer. We don't want DOM0 use this timer rather than the generic ARM
timer. So blacklist it for all platforms.
Signed-off-by: Julien Grall
---
This patch is candidate to backport for Xen 4.5 and Xen 4.4.
It may not app
On 13/01/15 12:11, Wei Liu wrote:
> From libxc's point of view, it only needs to know vnode to pnode mapping
> and size of each vnode to allocate memory accordingly. Add these fields
> to xc_dom structure.
>
> The caller might not pass in vNUMA information. In that case, a dummy
> layout is generat
On 01/13/2015 11:01 AM, Andrew Cooper wrote:
> On 09/01/15 21:26, Ed White wrote:
>> This set of patches adds support to hvm domains for EPTP switching by
>> creating
>> multiple copies of the host p2m (currently limited to 10 copies).
>>
>> The primary use of this capability is expected to be in
On 01/13/2015 03:28 AM, Andrew Cooper wrote:
> On 09/01/15 21:26, Ed White wrote:
>> Add the basic data structures needed to support alternate p2m's and
>> the functions to initialise them and tear them down.
>>
>> Although Intel hardware can handle 512 EPTP's per hardware thread
>> concurrently, o
On Wed, 2015-01-07 at 15:32 +, Ian Campbell wrote:
> The first Xen technical call will be at:
> Wed 14 Jan 17:00:00 GMT 201
> `date -d @1421254800`
>
> See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
> for more information on the call.
In the absence of any furt
On 01/12/2015 09:48 AM, Andrew Cooper wrote:
> On 09/01/15 21:26, Ed White wrote:
>> diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h
>> index 5f7fe71..8193901 100644
>> --- a/xen/include/asm-x86/p2m.h
>> +++ b/xen/include/asm-x86/p2m.h
>> @@ -193,6 +193,9 @@ struct p2m_domain {
>
Hey
I was wondering if there would be any plans for configure.ac
(or the m4 scripts) to have an --enable-xsm which would set
XSM_ENABLE (or FLASK_ENABLE) to true?
Right now by default to build with XSM one has to manually change
the Config.mk ENABLE_XSM option to 'y'.
Thanks.
__
On Mon, Dec 15, 2014 at 02:58:26PM +, Stefano Stabellini wrote:
> On Tue, 9 Dec 2014, Luis R. Rodriguez wrote:
> > From: "Luis R. Rodriguez"
> >
> > This lets you build a kernel which can support xen dom0
> > or xen guests by just using:
> >
> >make xenconfig
> >
> > on both x86 and arm
On 13/01/15 12:11, Wei Liu wrote:
> @@ -408,6 +413,49 @@ static void dump_numa(unsigned char key)
>
> for_each_online_node ( i )
> printk("Node %u: %u\n", i, page_num_node[i]);
> +
> +if ( !d->vnuma )
> +continue;
Nit - extraneous whitespace.
>
On Tue, Jan 13, 2015 at 11:13 AM, Julien Grall wrote:
> Stefano had some comments on this patch. See:
>
> http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg01531.html
I see now sorry about that, will address and respin.
Luis
___
Xen-deve
Hello Luis,
On 13/01/15 19:03, Luis R. Rodriguez wrote:
>>> diff --git a/kernel/configs/xen.config b/kernel/configs/xen.config
>>> new file mode 100644
>>> index 000..d2ec010
>>> --- /dev/null
>>> +++ b/kernel/configs/xen.config
>>> @@ -0,0 +1,30 @@
>>> +# generic config
>>> +CONFIG_XEN=y
>>>
On 09/01/15 21:26, Ed White wrote:
> This set of patches adds support to hvm domains for EPTP switching by creating
> multiple copies of the host p2m (currently limited to 10 copies).
>
> The primary use of this capability is expected to be in scenarios where access
> to memory needs to be monitore
On Mon, Dec 15, 2014 at 11:58:34AM +, Julien Grall wrote:
> Hello Luis,
>
> On 09/12/14 23:35, Luis R. Rodriguez wrote:
> > From: "Luis R. Rodriguez"
> >
> > This lets you build a kernel which can support xen dom0
> > or xen guests by just using:
> >
> >make xenconfig
> >
> > on both x
Hi,
On Tue, Jan 13, 2015 at 05:22:58PM +0100, Juergen Gross wrote:
> The locking in scsifront_dev_reset_handler() is obviously wrong. In
> case of a full ring the host lock is aquired twice.
>
> Fixing this issue enables to get rid of the endless fo loop with an
> explicit break statement.
>
Is
On 01/12/2015 05:06 AM, Andrew Cooper wrote:
> On 09/01/15 21:26, Ed White wrote:
>> Currently, neither is enabled globally but may be enabled on a per-VCPU
>> basis by the altp2m code.
>>
>> Everything can be force-disabled globally by specifying vmfunc=0 on the
>> Xen command line.
>>
>> Remove t
On 01/12/2015 09:45 AM, Ed White wrote:
> On 01/12/2015 08:43 AM, Andrew Cooper wrote:
>> On 09/01/15 21:26, Ed White wrote:
>>> In preparation for selectively enabling hardware #VE in a later patch,
>>> set suppress #VE on all EPTE's on #VE-capable hardware.
>>>
>>> Suppress #VE should always be t
Increase maxmem before calling xc_domain_populate_physmap_exact to
avoid the risk of running out of guest memory. This way we can also
avoid complex memory calculations in libxl at domain construction
time.
This patch fixes an abort() when assigning more than 4 NICs to a VM.
Signed-off-by: Stefan
From: Liang Li
Use the 'xl pci-attach $DomU $BDF' command to attach more than
one PCI devices to the guest, then detach the devices with
'xl pci-detach $DomU $BDF', after that, re-attach these PCI
devices again, an error message will be reported like following:
libxl: error: libxl_qmp.c:287:
Wei Liu writes ("Re: [PATCH v3 18/19] libxlutil: nested list support"):
> On Tue, Jan 13, 2015 at 03:52:48PM +, Ian Jackson wrote:
> > This commit message is very brief. For example, under the heading of
> > `Rework internal representation of setting' I would expect a clear
> > description of
On 01/13/2015 02:21 AM, Tamas K Lengyel wrote:
> On Mon, Jan 12, 2015 at 7:31 PM, Ed White wrote:
>> On 01/12/2015 10:00 AM, Ian Jackson wrote:
>>> Ed White writes ("Re: [PATCH 00/11] Alternate p2m: support multiple copies
>>> of host p2m"):
The hypercalls are all there. My testing is all do
The following changes since commit 7d5ad15d17f26dd4f9ff5f3491828bc34e74f28c:
Merge remote-tracking branch 'remotes/stefanha/tags/net-pull-request' into
staging (2015-01-12 11:13:24 +)
are available in the git repository at:
git://xenbits.xen.org/people/sstabellini/qemu-dm.git xen-2015-
Hi all,
This series contains a couple of change for the grant-table header.
The first one only removed an unused/misplaced define. The second one,
increase the number of grant frame iniatialize when the domain is created.
Regards,
Julien Grall (2):
xen/arm: Remove the define INVALID_GFN from
The define INVALID_GFN is misplaced in arch-arm/grant_table.h and is
never used in neither in ARM nor in the common code.
Therefore we can safely remove it.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/grant_table.h | 1 -
1 file changed, 1 deletion(-)
diff --git a/xen/include/asm-arm/g
When a domain is created on ARM, the grant table code initialized one
grant frame. With a basic load (i.e disk usage), Xen is quickly trying
to expand the number of frames:
(XEN) grant_table.c:1305:d2v0 Expanding dom (2) grant table from (1) to (2)
frames.
(XEN) grant_table.c:1305:d2v0 Expanding
On Tue, Jan 13, 2015 at 12:11:43PM +, Wei Liu wrote:
> The algorithm is more or less the same as the one used for PV guest.
> Libxc gets hold of the mapping of vnode to pnode and size of each vnode
> then allocate memory accordingly.
Could you split this patch in two? One part for the adding o
QEMU upstream requires the use of pixman. When pixman is not present the
system, the configure of QEMU will fail with:
ERROR: pixman not present. Your options:
(1) Preferred: Install the pixman devel package (any recent
distro should have packages as Xorg needs pixman too).
Wei Liu writes ("[PATCH v3 08/19] libxl: functions to build vmemranges for PV
guest"):
> Introduce a arch-independent routine to generate one vmemrange per
> vnode. Also introduce arch-dependent routines for different
> architectures because part of the process is arch-specific -- ARM has
> yet ha
On Mon, 12 Jan 2015, Stefano Stabellini wrote:
> On Wed, 3 Dec 2014, Don Slutz wrote:
> > From: Stefano Stabellini
> >
> > Increase maxmem before calling xc_domain_populate_physmap_exact to
> > avoid the risk of running out of guest memory. This way we can also
> > avoid complex memory calculatio
On 13/01/15 14:25, Julien Grall wrote:
> This series has been tested on Midway by assigning the secondary network card
> to a guest (see instruction below). I plan to do futher testing on other
> boards.
I forgot to precise that only changes has only been build tested on x86.
Regards,
--
Julien
On 01/13/2015 12:56 AM, Jan Beulich wrote:
On 12.01.15 at 18:36, wrote:
>> On 01/12/2015 02:00 AM, Jan Beulich wrote:
>> On 10.01.15 at 00:04, wrote:
On 01/09/2015 02:41 PM, Andrew Cooper wrote:
> Having some non-OS part of the guest swap the EPT tables and
> accidentally tu
On Tue, Jan 13, 2015 at 05:05:26PM +, Ian Jackson wrote:
> Wei Liu writes ("[PATCH v3 03/19] libxc: allocate memory with vNUMA
> information for PV guest"):
> ...
> > diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/xc_dom.h
> > index 07d7224..c459e77 100644
> > --- a/tools/libx
On Tue, Jan 13, 2015 at 05:02:10PM +, Ian Jackson wrote:
> Wei Liu writes ("[PATCH v3 05/19] libxl: add vmemrange to
> libxl__domain_build_state"):
> > A vnode consists of one or more vmemranges (virtual memory range). One
> > example of multiple vmemranges is that there is a hole in one vnod
On 13/01/15 17:18, Ian Campbell wrote:
> On Tue, 2015-01-13 at 16:57 +, Julien Grall wrote:
>> (CC Jan)
>
> I think you forget, I added him.
>
>> @@ -49,6 +49,21 @@ int domain_vtimer_init(struct domain *d)
>> {
>> d->arch.phys_timer_base.offset = NOW();
>> d->arch.v
On 13/01/15 16:46, Ian Campbell wrote:
>> We need to track everything for interrupt assignment to a guest/dom0. So
>> if the guest ask for a free vIRQ we can give it directly.
>
> Makes sense.
>
> In that case you 0/4 mail doesn't fully describe the use case for the
> series, since it talks about
On Tue, Jan 13, 2015 at 04:50:11PM +, Jan Beulich wrote:
> >>> On 13.01.15 at 13:11, wrote:
> > +void init_vnuma_info(void)
> > +{
> > +int rc, retry = 0;
> > +struct xen_vnuma_topology_info vnuma_topo;
> > +
> > +vcpu_to_vnode = scratch_alloc(sizeof(uint32_t) * hvm_info->nr_vcpus,
On 13/01/15 16:57, Julien Grall wrote:
> (CC Jan)
Forgot to really CC Jan for the bool stuff.
> Hi Ian,
>
> On 13/01/15 16:46, Ian Campbell wrote:
>>> vgic_reserve_irq returns a boolean:
>>
>> Please use true/false then.
>>
>> In Xen we have xen/stdbool.h which differs from normal stdboot.h. I'm
pfn_to_mfn(page_to_pfn(p)) is a common use case so add a generic
helper for it.
Signed-off-by: David Vrabel
---
include/xen/page.h |5 +
1 file changed, 5 insertions(+)
diff --git a/include/xen/page.h b/include/xen/page.h
index 12765b6..c5ed20b 100644
--- a/include/xen/page.h
+++ b/incl
On Tue, 2015-01-13 at 16:57 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH RFC] make error codes a formal part of the
> ABI"):
> > On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote:
> > > There's on small block commented with TBD left in the public header.
> > > This is the main r
On Tue, 2015-01-13 at 16:57 +, Julien Grall wrote:
> (CC Jan)
I think you forget, I added him.
> @@ -49,6 +49,21 @@ int domain_vtimer_init(struct domain *d)
> {
> d->arch.phys_timer_base.offset = NOW();
> d->arch.virt_timer_base.offset = READ_SYSREG64(CNTPCT_EL0
Eliminate all the duplicate code for making Tx requests by
consolidating them into a single xennet_make_one_txreq() function.
xennet_make_one_txreq() and xennet_make_txreqs() work with pages and
offsets so it will be easier to make netfront handle highmem frags in
the future.
Signed-off-by: David
As netfront as evolved to handle different sorts of skbs the code to
fill a Tx requests has been copy and pasted several times. The series
refactors this and a few other areas.
The first patch is to a Xen header but this can be merged via
net-next.
David
___
A function to count the number of slots an skb needs is more useful
than one that counts the slots needed for only the frags.
Signed-off-by: David Vrabel
---
drivers/net/xen-netfront.c | 13 +++--
1 file changed, 7 insertions(+), 6 deletions(-)
diff --git a/drivers/net/xen-netfront.c
Wei Liu writes ("[PATCH v3 03/19] libxc: allocate memory with vNUMA information
for PV guest"):
...
> diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/xc_dom.h
> index 07d7224..c459e77 100644
> --- a/tools/libxc/include/xc_dom.h
> +++ b/tools/libxc/include/xc_dom.h
> @@ -167,6 +167,
>>> On 13.01.15 at 17:57, wrote:
> Ian Campbell writes ("Re: [PATCH RFC] make error codes a formal part of the
> ABI"):
>> On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote:
>> > There's on small block commented with TBD left in the public header.
>> > This is the main reason for the submissio
Wei Liu writes ("[PATCH v3 07/19] libxl: x86: factor out e820_host_sanitize"):
> This function gets the machine E820 map and sanitize it according to PV
> guest configuration.
>
> This will be used in later patch. No functional change introduced in
> this patch.
Thanks. It is easy to see that th
Wei Liu writes ("[PATCH v3 05/19] libxl: add vmemrange to
libxl__domain_build_state"):
> A vnode consists of one or more vmemranges (virtual memory range). One
> example of multiple vmemranges is that there is a hole in one vnode.
I'm finding this series a bit oddly structured. This patch, for
Ian Campbell writes ("Re: [PATCH RFC] make error codes a formal part of the
ABI"):
> On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote:
> > There's on small block commented with TBD left in the public header.
> > This is the main reason for the submission being RFC. While we don't
> > currently
(CC Jan)
Hi Ian,
On 13/01/15 16:46, Ian Campbell wrote:
>> vgic_reserve_irq returns a boolean:
>
> Please use true/false then.
>
> In Xen we have xen/stdbool.h which differs from normal stdboot.h. I'm
> not sure what the rules are for use.
Jan please correct me if I'm wrong, xen/stdbool.h has
>>> On 13.01.15 at 17:45, wrote:
> "Jan Beulich" writes:
>
> On 13.01.15 at 17:17, wrote:
>>> Ian Campbell writes:
An alternative approach to this might be to walk the guest p2m (with
appropriate continuations) and move each domheap page (this would also
help us preserve sup
>>> On 13.01.15 at 13:11, wrote:
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, 2015-01-13 at 16:27 +, Julien Grall wrote:
> Hi Ian,
>
> On 13/01/15 15:51, Ian Campbell wrote:
> > On Fri, 2014-12-12 at 14:43 +, Julien Grall wrote:
> >> While it's easy to know which hardware IRQ is assigned to a domain, there
> >> is no way to know which IRQ is emulated by Xen
>>> On 13.01.15 at 13:11, wrote:
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 13.01.15 at 13:11, wrote:
> +void init_vnuma_info(void)
> +{
> +int rc, retry = 0;
> +struct xen_vnuma_topology_info vnuma_topo;
> +
> +vcpu_to_vnode = scratch_alloc(sizeof(uint32_t) * hvm_info->nr_vcpus, 0);
sizeof(*vcpu_to_vnode) please.
> +rc = -EAGAIN;
> +while ( r
On Tue, Jan 13, 2015 at 11:03:22AM +, Tian, Kevin wrote:
> > From: George Dunlap
> > Sent: Monday, January 12, 2015 10:20 PM
> >
> > On Mon, Jan 12, 2015 at 12:28 PM, Tian, Kevin wrote:
> > >> From: George Dunlap
> > >> Sent: Monday, January 12, 2015 8:14 PM
> > >>
> > >> On Mon, Jan 12, 2015
On Tue, Jan 13, 2015 at 04:38:33PM +, Jan Beulich wrote:
> >>> On 13.01.15 at 13:11, wrote:
> > @@ -408,6 +413,49 @@ static void dump_numa(unsigned char key)
> >
> > for_each_online_node ( i )
> > printk("Node %u: %u\n", i, page_num_node[i]);
> > +
> > +if (
"Jan Beulich" writes:
On 13.01.15 at 17:17, wrote:
>> Ian Campbell writes:
>>> An alternative approach to this might be to walk the guest p2m (with
>>> appropriate continuations) and move each domheap page (this would also
>>> help us preserve super page mappings). It would also have the a
In netfront the Rx and Tx path are independent and use different
locks. The Tx lock is held with hard irqs disabled, but Rx lock is
held with only BH disabled. Since both sides use the same stats lock,
a deadlock may occur.
[ INFO: possible irq lock inversion dependency detected ]
3.16.2 #16
On Tue, 2015-01-13 at 17:17 +0100, Vitaly Kuznetsov wrote:
> Ian Campbell writes:
>
> > On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote:
> >> +gmfn = mfn_to_gmfn(d, mfn);
> >
> > (I haven't thought about it super hard, but I'm taking it as given that
> > this approach to kex
>>> On 13.01.15 at 13:11, wrote:
> rc = do_memory_op(cmd, nat.hnd);
> +if ( rc == -ENOBUFS && op == XENMEM_get_vnumainfo )
> +{
> +cmp.vnuma.nr_vnodes = nat.vnuma->nr_vnodes;
> +cmp.vnuma.nr_vcpus = nat.vnuma->nr_vcpus;
> +cmp.vnuma.nr_v
On 13/01/15 16:21, Jan Beulich wrote:
> Now that we have two cases where patches against hvmloader got
> submitted needing to include the hypervisor's errno.h (for the host's
> system header not necessarily reflecting the correct numbers), take
> this as a strong sign that we need to make the error
1 - 100 of 266 matches
Mail list logo