When you say not tools, I take it to mean that you're not exposing
that option through the libxl interface?
Yes.
tools/libxc/xc_domain.c:xc_assign_dt_device() most certainly does pass
it in, and that's the level I'm talking about. Someone reviewing this
patch series needs to know, when xc
Hi Andrew,
Are there any updates of this series that I can checkout and rebase mine onto?
:)
On 06/15/2015 09:44 PM, Andrew Cooper wrote:
This series adds support for the libxl migration v2 stream, and untangles the
existing layering violations of the toolstack and qemu records.
At the end
El 01/07/15 a les 18.15, Boris Ostrovsky ha escrit:
On 07/01/2015 11:57 AM, Ian Campbell wrote:
The next Xen technical call will be at:
Wed 8 Jul 17:00:00 BST 2015
`date -d @1436371200`
See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
for more information on
flight 59019 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59019/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
On Thu, 2015-07-02 at 04:32 +, Wu, Feng wrote:
-Original Message-
From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
Sent: Tuesday, June 30, 2015 10:58 AM
To: Wu, Feng
Cc: xen-devel; k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com;
Tian, Kevin; Zhang,
On Thu, 2015-07-02 at 09:32 +0200, Roger Pau Monné wrote:
El 01/07/15 a les 18.15, Boris Ostrovsky ha escrit:
On 07/01/2015 11:57 AM, Ian Campbell wrote:
The next Xen technical call will be at:
Wed 8 Jul 17:00:00 BST 2015
`date -d @1436371200`
See
On Thu, 2015-07-02 at 14:10 +0530, Vijay Kilari wrote:
On Mon, Jun 29, 2015 at 5:59 PM, Ian Campbell ian.campb...@citrix.com wrote:
CIOn Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote:
+/* Device assignment. Should be called from pci_device_add */
+int its_add_device(struct
On Thu, 2015-07-02 at 08:58 +, Wu, Feng wrote:
-Original Message-
From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
This is the third time that I ask:
(1) whether it is possible to have more vcpus queued on one pcpu PI
blocked list with desc.on (I really
On Wed, 1 Jul 2015, Konrad Rzeszutek Wilk wrote:
On Wed, Jul 01, 2015 at 11:29:46AM +0100, Stefano Stabellini wrote:
On Tue, 30 Jun 2015, Konrad Rzeszutek Wilk wrote:
On Tue, Jun 30, 2015 at 03:13:53PM +0100, Ian Campbell wrote:
On Tue, 2015-06-30 at 15:02 +0100, Stefano Stabellini
On 2015/7/2 18:28, George Dunlap wrote:
On 07/02/2015 11:01 AM, Chen, Tiejun wrote:
1. After spending yet another half hour doing research, I haven't found
any discussion that concluded we should have the global policy override
the local policy
I also took some time to go back checking this
On 07/02/2015 12:25 PM, Tim Deegan wrote:
At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
On 02/07/15 11:48, George Dunlap wrote:
Now in p2m_set_mem_access(), rather than just using an unsigned long in
the loop iterating over gfns, you do this thing where you convert gfn_t
to
Hello Ian, Julien,
On 07/02/2015 11:35 AM, Ian Campbell wrote:
On Wed, 2015-07-01 at 11:17 +0100, Julien Grall wrote:
As suggested by Wei on the top of his mail [1], can you please CC only
relevant people and avoid to reply all?
It seems that many people are unable to follow these simple
On 02/07/15 11:48, George Dunlap wrote:
On 06/29/2015 04:45 PM, Vitaly Kuznetsov wrote:
'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as
input.
On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the
declaration in p2m-common.h as 'pfn' is being used
On Mon, Jun 29, 2015 at 5:59 PM, Ian Campbell ian.campb...@citrix.com wrote:
CIOn Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote:
+/* Device assignment. Should be called from pci_device_add */
+int its_add_device(struct domain *d, u32 devid)
+{
Prior to the PCI series landing,
-Original Message-
From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
Sent: Thursday, July 02, 2015 4:30 PM
To: Wu, Feng
Cc: Andrew Cooper; xen-devel@lists.xen.org; Zhang, Yang Z;
george.dun...@eu.citrix.com; Tian, Kevin; k...@xen.org; jbeul...@suse.com
Subject: Re:
Fix example code in comment.libxl_event_check() can return
ERROR_NOT_READY; LIBXL_NOT_READY does not exist.
Signed-off-by: Euan Harris euan.har...@citrix.com
---
tools/libxl/libxl_event.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_event.h
On 02/07/15 10:01, Ian Campbell wrote:
On Thu, 2015-07-02 at 14:10 +0530, Vijay Kilari wrote:
On Mon, Jun 29, 2015 at 5:59 PM, Ian Campbell ian.campb...@citrix.com
wrote:
CIOn Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote:
+/* Device assignment. Should be called from
On 06/29/2015 04:45 PM, Vitaly Kuznetsov wrote:
'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as
input.
On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the
declaration in p2m-common.h as 'pfn' is being used instead of 'start_pfn'.
On ARM both
At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
On 02/07/15 11:48, George Dunlap wrote:
Now in p2m_set_mem_access(), rather than just using an unsigned long in
the loop iterating over gfns, you do this thing where you convert gfn_t
to unsigned long, add one, and then convert it
El 01/07/15 a les 17.46, Andrew Cooper ha escrit:
On 01/07/15 15:46, Roger Pau Monne wrote:
Introduce a new DOMCTL flag that can be used to disable device emulation
inside of Xen for HVM guests. The following emulated devices are disabled
when the XEN_DOMCTL_CDF_noemu is used: hpet, pmtimer,
On Thu, 2015-07-02 at 11:51 +0300, Razvan Cojocaru wrote:
On 07/02/2015 11:35 AM, Ian Campbell wrote:
It seems that many people are unable to follow these simple
instructions.
The quotes part is obvious (and not that many people have ommited to do
that), but to be honest I haven't been
Hi,
I've started using Xen on an Allwinner A33, which works great as an
headless device using the latest PSCI patches in U-Boot.
However, we would like to do something more with it, and we would need
to have two VMs accessing the display at once, each one drawing in its
own part of the
On Thu, Jun 25, 2015 at 1:15 PM, Dario Faggioli
dario.faggi...@citrix.com wrote:
When dumping scheduling information (debug key 'r'), what
we print as 'Idle cpupool' is pretty much the same of what
we print immediately after as 'Cpupool0'. In fact, if there
are no pCPUs outside of any
@@ -1898,7 +1899,13 @@ static int intel_iommu_add_device(u8 devfn, struct
pci_dev *pdev)
PCI_BUS(bdf) == pdev-bus
PCI_DEVFN2(bdf) == devfn )
{
-ret = rmrr_identity_mapping(pdev-domain, 1, rmrr);
+/*
+ * RMRR is always
On Wed, 2015-07-01 at 21:29 -0700, Meng Xu wrote:
Hi Dario,
Hi,
2015-06-30 10:14 GMT-07:00 Dario Faggioli dario.faggi...@citrix.com:
if you'd b able to have a look at what's
happening, that would be awesome. If you don't have time, I will have a
look myself, but only in a few days.
On 07/02/2015 02:11 AM, Chen, Tiejun wrote:
If I'm correct, then #3 means it's not possible to have devices
for a
domain *default* to strict, but to be relaxed in individual
instances.
If you had five devices you wanted strict, and only one device you
wanted to be relaxed (because you knew
On 06/30/2015 06:09 PM, Andrew Cooper wrote:
The call to iommu_pte_flush() between the two hunks uses ept_entry-epte
which is a pointer into the mapped page.
It is eventually passed to `clflush` instruction which will suffer a pagefault
if the virtual mapping has fallen out of the TLB.
On Wed, 2015-07-01 at 11:17 +0100, Julien Grall wrote:
As suggested by Wei on the top of his mail [1], can you please CC only
relevant people and avoid to reply all?
It seems that many people are unable to follow these simple
instructions.
Wei, perhaps you could stop CCing people who
El 02/07/15 a les 10.45, Ian Campbell ha escrit:
On Thu, 2015-07-02 at 09:32 +0200, Roger Pau Monné wrote:
El 01/07/15 a les 18.15, Boris Ostrovsky ha escrit:
On 07/01/2015 11:57 AM, Ian Campbell wrote:
The next Xen technical call will be at:
Wed 8 Jul 17:00:00 BST 2015
`date -d
On Thu, 2015-07-02 at 09:45 +0100, Ian Campbell wrote:
Shall I put up a poll of some sort to gather preferred timeslot options
out of that set?
Please can everyone who is interested in this topic indicate their date
preference/availability at:
http://doodle.com/cy88dhwzybg7hh7p
I've gone with
-Original Message-
From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
Sent: Thursday, July 02, 2015 6:10 PM
To: Wu, Feng
Cc: Andrew Cooper; xen-devel@lists.xen.org; Zhang, Yang Z;
george.dun...@eu.citrix.com; Tian, Kevin; k...@xen.org; jbeul...@suse.com
Subject: Re:
On Thu, 2015-07-02 at 04:27 +, Wu, Feng wrote:
+list_for_each_entry(vmx, per_cpu(pi_blocked_vcpu, cpu),
+pi_blocked_vcpu_list)
+if ( vmx-pi_desc.on )
+tasklet_schedule(vmx-pi_vcpu_wakeup_tasklet);
There is a logical bug
in high level I have to say Yes. If you really read that v2 design and
its associated discussion, you should notice I didn't put any response
right there.
Look, I'm getting a bit angry at your continual implication that I
Sorry to this.
haven't put in enough work reading the background for
On 01/07/15 12:00, Julien Grall wrote:
Hi all,
Hi Ian,
This patch series adds support for GICv2 on GICv3. This feature is available
only when the GICv3 hardware is compatible with GICv2.
When it's the case, the same interface is provided in order to use a
virtualize GICv2 (i.e GICC and
Using report_find_push_age_info allows us to provide counts of
attempts since the last baseline on current tip as well as the first
attempt of each of those.
Since everything serialises on the repo lock I didn't bother trying to
parallelise anything.
It's a little terse to keep it in 80 chars.
flight 59012 linux-3.16 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59012/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-qemut-rhel6hvm-intel 12 guest-start/redhat.repeat fail in
58996 pass in 59012
Hi all!
I have theoretical question.
What do you think about porting futexes or binder to XEN?
With best regards,
--
*Vitaly Chernooky | Senior Developer - Product Engineering and Development*
GlobalLogic
P *+380.44.4929695 ext.1136* M *+380.63.6011802* S cvv_2k
www.globallogic.com
On 06/30/2015 06:36 PM, Dario Faggioli wrote:
SEDF has been broken and unmaintained at least
until Xen 4.2, and most likely even before! Tests
are failing without anyonce caring, and yet we're
keeping using test resources for them.
Let's stop doing this!
Signed-off-by: Dario Faggioli
On 02/07/15 09:30, Dario Faggioli wrote:
On Thu, 2015-07-02 at 04:27 +, Wu, Feng wrote:
+list_for_each_entry(vmx, per_cpu(pi_blocked_vcpu, cpu),
+pi_blocked_vcpu_list)
+if ( vmx-pi_desc.on )
+tasklet_schedule(vmx-pi_vcpu_wakeup_tasklet);
On 07/02/2015 11:01 AM, Chen, Tiejun wrote:
1. After spending yet another half hour doing research, I haven't found
any discussion that concluded we should have the global policy override
the local policy
I also took some time to go back checking this point and indeed this is
not in that
On Wed, 1 Jul 2015, Konrad Rzeszutek Wilk wrote:
On Wed, Jul 01, 2015 at 02:01:07PM +0100, Stefano Stabellini wrote:
On Mon, 29 Jun 2015, Konrad Rzeszutek Wilk wrote:
In Xen 4.6 commit cd2f100f0f61b3f333d52d1737dd73f02daee592
libxc: Fix do_memory_op to return negative value on errors
On Wed, Jul 01, 2015 at 04:03:55PM +0100, Stefano Stabellini wrote:
On Tue, 30 Jun 2015, Ian Jackson wrote:
* The number and nature of parallel operations done in the stress
test is unreasonable for the provided hardware:
= the timeout is fine
I don't know if it is
On Thu, 2015-07-02 at 11:30 +0100, Andrew Cooper wrote:
On 02/07/15 09:30, Dario Faggioli wrote:
It is, therefore, not effective in making sure that, even with only one
notification, you only kick the interested vcpu.
This is the third time that I ask:
(1) whether it is possible to
From: Andrew Cooper andrew.coop...@citrix.com
The sh_map/unmap wrappers can be dropped, and take the opportunity to turn
some #define's into static inlines, for added type saftey.
As part of adding the type safety, GCC highlights an problematic include cycle
with arm/mm.h including domain_page.h
[snip]
Thanks, Paul.
Well, I agree the former approach would be simpler. But I still doubt
if this is more reasonable. :)
IIUC, one of the reasons for struct domain to have a rangeset list(and
a spinlock - rangesets_lock), is because there are iomem_caps and
irq_caps for each domain. These 2
Anthony PERARD writes (Re: [PATCH] libxl: Increase device model startup
timeout to 1min.):
I have tested an increase timeout this night. And here are the result.
The machine is a AMD Opteron(tm) Processor 4284, with 8G of RAM and 8 pCPU.
It's running Ubuntu 14.04, with Xen 4.4. On top of
On Thu, 2015-07-02 at 13:16 +0100, Andrew Cooper wrote:
On 02/07/15 13:04, Dario Faggioli wrote:
On Thu, 2015-07-02 at 11:30 +0100, Andrew Cooper wrote:
I can't currently decide whether this will be quicker or slower overall,
or (most likely) it will even out to equal in the general case.
On 02/07/15 13:43, Ben Catterall wrote:
Removed as they were wrappers around map_domain_page() to
make it appear to take an mfn_t type.
Signed-off-by: Ben Catterall ben.catter...@citrix.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
In the future, a patch like this should either
On 02/07/15 13:04, Dario Faggioli wrote:
On Thu, 2015-07-02 at 11:30 +0100, Andrew Cooper wrote:
On 02/07/15 09:30, Dario Faggioli wrote:
It is, therefore, not effective in making sure that, even with only one
notification, you only kick the interested vcpu.
This is the third time that I
On Fri, Jun 26, 2015 at 8:35 PM, Julien Grall julien.gr...@citrix.com wrote:
Hi Vijay,
On 26/06/2015 14:54, Vijay Kilari wrote:
On Tue, Jun 23, 2015 at 8:02 PM, Julien Grall julien.gr...@citrix.com
wrote:
Hi Vijay,
On 22/06/15 13:01, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
George Dunlap george.dun...@eu.citrix.com writes:
On 07/02/2015 12:25 PM, Tim Deegan wrote:
At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
On 02/07/15 11:48, George Dunlap wrote:
Now in p2m_set_mem_access(), rather than just using an unsigned long in
the loop iterating over
On Thu, 2015-07-02 at 17:51 +0530, Vijay Kilari wrote:
On Mon, Jun 29, 2015 at 5:29 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2015-06-23 at 15:32 +0100, Julien Grall wrote:
[...]
+{
+struct its_collection *col;
+struct its_device *its_dev = get_irq_device(desc);
Removed as they were wrappers around map_domain_page() to
make it appear to take an mfn_t type.
Signed-off-by: Ben Catterall ben.catter...@citrix.com
---
xen/arch/x86/mm/hap/hap.c| 4 +-
xen/arch/x86/mm/shadow/common.c | 22 +++---
xen/arch/x86/mm/shadow/multi.c | 152
On Thu, Jul 2, 2015 at 6:05 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Thu, 2015-07-02 at 17:51 +0530, Vijay Kilari wrote:
On Mon, Jun 29, 2015 at 5:29 PM, Ian Campbell ian.campb...@citrix.com
wrote:
On Tue, 2015-06-23 at 15:32 +0100, Julien Grall wrote:
[...]
+{
+struct
On 01/07/15 18:37, Jennifer Herbert wrote:
If xc_domain_get_guest_width were to fail, guest_width is not set, and
hence guest_64bit becomes undefined.
Fix is to initialise to 0, and report error if call fails.
Signed-off-by: Jennifer Herbert jennifer.herb...@citrix.com
---
-Original Message-
From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
Sent: Thursday, July 02, 2015 8:04 PM
To: Andrew Cooper
Cc: Wu, Feng; Tian, Kevin; k...@xen.org; george.dun...@eu.citrix.com;
xen-devel@lists.xen.org; jbeul...@suse.com; Zhang, Yang Z
Subject: Re:
On 07/02/2015 07:49 AM, Stefano Stabellini wrote:
On Wed, 1 Jul 2015, Andrew Cooper wrote:
On 01/07/15 17:13, Stefano Stabellini wrote:
On Wed, 1 Jul 2015, Andrew Cooper wrote:
On 01/07/15 16:51, Boris Ostrovsky wrote:
On 07/01/2015 11:46 AM, Andrew Cooper wrote:
On 01/07/15 15:46, Roger
On Mon, Jun 29, 2015 at 5:29 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2015-06-23 at 15:32 +0100, Julien Grall wrote:
[...]
+{
+struct its_collection *col;
+struct its_device *its_dev = get_irq_device(desc);
+u8 *cfg;
+u32 virq = irq_to_virq(desc);
+
+
On 02/07/15 15:02, Shuai Ruan wrote:
This patchset enable xsaves/xrstors feature.
It includes tree parts:
1. add xsaves/xrstors for xen.
2. add xsaves/xrstors for pv guest.
3. add xsaves/xrstors for hvn guest.
What is xsaves/xrstors and why might I want Xen to use it? What
advantages does it
Reworked the internals and declaration, applying (un)boxing
where needed. Converted calls to map_domain_page() to
provide mfn_t types, boxing where needed.
Signed-off-by: Ben Catterall ben.catter...@citrix.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
Changed since v1:
*
On Thu, 2015-07-02 at 13:13 +0200, Maxime Ripard wrote:
Hi,
Hi,
I don't have much comments on all this, just that, reading, it, it
sounded somewhat similar to what GL is doing:
http://www.xenproject.org/component/allvideoshare/video/latest/ces15-globalogic.html
MAX_NR_IO_RANGES is used by ioreq server as the maximum
number of discrete ranges to be tracked. This patch changes
its value to 8k, so that more ranges can be tracked on next
generation of Intel platforms in XenGT. Future patches can
extend the limit to be toolstack tunable, and MAX_NR_IO_RANGES
This patch introduces a new data structure, struct rb_rangeset,
to represent a group of continuous ranges, e.g. the start and end
addresses for PIO/MMIO regions. By now, this structure is supposed
to assist ioreq server to forward the I/O request to backend device
models more efficiently.
XenGT leverages ioreq server to track and forward the accesses to
GPU I/O resources, e.g. the PPGTT(per-process graphic translation
tables). Currently, ioreq server uses rangeset to track the BDF/
PIO/MMIO ranges to be emulated. To select an ioreq server, the
rangeset is searched to see if the I/O
'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as input.
On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the
declaration in p2m-common.h as 'pfn' is being used instead of 'start_pfn'.
On ARM both p2m_set_mem_access and p2m_get_mem_access interfaces
Hi Julien,
On Tue, Jun 23, 2015 at 10:09 PM, Julien Grall julien.gr...@citrix.com wrote:
Hi Vijay,
+struct vits_device {
+uint32_t vdevid;
+uint32_t pdevid;
+struct its_device *its_dev;
+struct rb_node node;
+};
We spoke about a specific structure in the design [2] but
Hi all,
I'm trying to map a page provided by Dom0 into Xen's address space,
but I keep freezing the physical computer when I try. Maybe I'm
hitting a spinlock or something, but clearly I'm doing something
incorrectly. I'll probably be able to get farther once I have another
computer with a serial
On 01/07/15 18:37, Jennifer Herbert wrote:
Fix a number of coverity issues in libxc.
Patches 2 through 7:
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, Jul 01, 2015 at 02:06:30PM +0100, Stefano Stabellini wrote:
On Mon, 29 Jun 2015, Konrad Rzeszutek Wilk wrote:
When debugging issues that caused the emulator to kill itself
or skipping certain operations (unable to write to host
registers) an stack trace will most definitly aid in
This patch uses xsaves/xrstors instead of xsaveopt/xrstor
when perform task switch in xen if the feature is supported
in hardware.
Please note that xsaves/xrstors only use compact format.
Signed-off-by: Shuai Ruan shuai.r...@intel.com
---
xen/arch/x86/xstate.c| 83
This patch enables xsaves for hvm guest, includes:
1.handle xsaves vmcs init and vmexit.
2.add logic to write/read the XSS msr.
Signed-off-by: Shuai Ruan shuai.r...@intel.com
---
xen/arch/x86/hvm/hvm.c | 40 ++
xen/arch/x86/hvm/vmx/vmcs.c|
As xsaves/xgetbv already support, so switch on.
Signed-off-by: Shuai Ruan shuai.r...@intel.com
---
xen/arch/x86/xstate.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/xstate.c b/xen/arch/x86/xstate.c
index c20f865..ebf9920 100644
---
This patch emualtes xsaves/xrstors instruction and
XSS msr access.
As xsaves/xrstors instructions and XSS msr access
required be executed only in ring0. So emulation is
needed when pv guest use these instructions.
Signed-off-by: Shuai Ruan shuai.r...@intel.com
---
xen/arch/x86/domain.c
This patch exposes xsaves/xgetbv/xsavec to hvm guest.
Signed-off-by: Shuai Ruan shuai.r...@intel.com
---
tools/libxc/xc_cpuid_x86.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/tools/libxc/xc_cpuid_x86.c b/tools/libxc/xc_cpuid_x86.c
index c97f91a..0ed8b68 100644
This patchset enable xsaves/xrstors feature.
It includes tree parts:
1. add xsaves/xrstors for xen.
2. add xsaves/xrstors for pv guest.
3. add xsaves/xrstors for hvn guest.
Shuai Ruan (6):
x86/xsaves: enable xsaves/xrstors for pv guest
x86/xsaves: enable xsaves/xrstors in xen
x86/xsaves:
-Original Message-
From: Roger Pau Monné [mailto:roger@citrix.com]
Sent: 02 July 2015 15:52
To: Paul Durrant; xen-de...@lists.xenproject.org
Cc: Andrew Cooper; Keir (Xen.org); Jan Beulich
Subject: Re: [Xen-devel] [PATCH v5 05/16] x86/hvm: unify internal portio and
mmio
El 02/07/15 a les 17.02, Paul Durrant ha escrit:
-Original Message-
From: Roger Pau Monné [mailto:roger@citrix.com]
Sent: 02 July 2015 15:52
To: Paul Durrant; xen-de...@lists.xenproject.org
Cc: Andrew Cooper; Keir (Xen.org); Jan Beulich
Subject: Re: [Xen-devel] [PATCH v5 05/16]
-Original Message-
From: Roger Pau Monné [mailto:roger@citrix.com]
Sent: 02 July 2015 16:12
To: Paul Durrant; xen-de...@lists.xenproject.org
Cc: Andrew Cooper; Keir (Xen.org); Jan Beulich
Subject: Re: [Xen-devel] [PATCH v5 05/16] x86/hvm: unify internal portio and
mmio
Check whether QEMU supports the xsrestrict option, by parsing its --help
output. Store the result on xenstore for future reference on a per QEMU
binary basis, so that device_model_override still works fine with it.
Replace / with _ in the QEMU binary path before writing it to xenstore,
so that it
Change the qdisk-backend-pid path on xenstore from
libxl/$DOMID/qdisk-backend-pid to /local/domain/$DOMID/image/pvqemu-pid to be
more similar to the device-model path.
Signed-off-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
---
Changes in v4:
- update xenstore-paths.markdown
---
Change the QEMU xenstore watch path to
/local/domain/$LIBXL_TOOLSTACK_DOMID/device-model/$DOMID/$EMULATOR_ID.
Currently two emulator_ids are statically allocated: one for device models and
one for pv qemus.
Add a parameter to libxl__device_model_xs_path to distinguish the device
model from the pv
At 12:32 +0100 on 02 Jul (1435840328), George Dunlap wrote:
On 07/02/2015 12:25 PM, Tim Deegan wrote:
At 12:09 +0100 on 02 Jul (1435838956), Andrew Cooper wrote:
On 02/07/15 11:48, George Dunlap wrote:
Now in p2m_set_mem_access(), rather than just using an unsigned long in
the loop
Hi all,
this patch series changes libxl to start QEMU as device model with the
new xsrestrict option (http://marc.info/?l=xen-develm=143341692707358).
It also starts a second QEMU to provide PV backends in userspace (qdisk)
to HVM guests.
Changes in v4:
- update xenstore-paths.markdown
- add
The device model is going to restrict its xenstore connection to $DOMID
level, using XS_RESTRICT, only implemented by oxenstored at present.
Let qemu-xen access
/local/domain/$LIBXL_TOOLSTACK_DOMID/device-model/$DOMID, as it is
required by QEMU to read/write the physmap. It doesn't contain any
On Thu, 2015-07-02 at 19:03 +0530, Vijay Kilari wrote:
Hi Julien,
On Tue, Jun 23, 2015 at 10:09 PM, Julien Grall julien.gr...@citrix.com
wrote:
Hi Vijay,
+struct vits_device {
+uint32_t vdevid;
+uint32_t pdevid;
+struct its_device *its_dev;
+struct rb_node
AMD and Intel PMU register initialization and helpers that determine
whether a register belongs to PMU.
This and some of subsequent PMU emulation code is somewhat similar to
Xen's PMU implementation.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Reviewed-by: David Vrabel
Starts a second QEMU to provide PV backends in userspace to HVM guests.
Use both dcs-dmss.pvqemu and dcs-dmss.dm to keep track of the starting
QEMUs. Introduce two new fields to struct libxl__dm_spawn_state: dcs to
store the pointer to libxl__domain_create_state, and rc to store the
return code.
Oh, I forgot the version number and change history.
This patchset should be version 2.
The change history should be:
1 Split the original patch into 2;
2 Take Paul Durrant’s comments:
a Add a name member in the struct rb_rangeset, and use the ‘q’
debug key to dump the ranges in ioreq server;
Roger Pau Monne writes ([PATCH] osstest: install libnl3 packages):
Install the libnl3 packages needed by the remus code. Those are available on
both Wheezy and Jessie, although the Wheezy ones are too old.
This patch implicitly drops support for lenny and squeeze. I think
you should mention
Add PMU emulation code that runs when we are processing a PMU interrupt.
This code will allow us not to trap to hypervisor on each MSR/LVTPC access
(of which there may be quite a few in the handler).
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
arch/x86/xen/pmu.c | 214
Set Xen's PMU mode via /sys/hypervisor/pmu/pmu_mode. Add XENPMU hypercall.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
Documentation/ABI/testing/sysfs-hypervisor-pmu | 23 +
arch/x86/include/asm/xen/hypercall.h | 6 ++
drivers/xen/sys-hypervisor.c
I haven't posted Linux part of PV(H) VPMU support in a while but now
that (hopefully) the hypervisor part is getting close to be done I
think it's time to post it again.
There are very few differences compared to the last version, mostly due
to updates in shared structures layouts. Patches 1 and
Export Xen symbols to dom0 via /proc/xen/xensyms (similar to
/proc/kallsyms).
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Reviewed-by: David Vrabel david.vra...@citrix.com
---
drivers/xen/Kconfig | 8 +++
drivers/xen/xenfs/Makefile | 1 +
Map shared data structure that will hold CPU registers, VPMU context,
V/PCPU IDs of the CPU interrupted by PMU interrupt. Hypervisor fills
this information in its handler and passes it to the guest for further
processing.
Set up PMU VIRQ.
Now that perf infrastructure will assume that PMU is
On 30/06/15 14:05, Paul Durrant wrote:
...in hvmemul_read/write()
Add hvmemul_phys_mmio_access() and hvmemul_linear_mmio_access() functions
to reduce code duplication.
NOTE: This patch also introduces a change in 'chunking' around a page
boundary. Previously (for example) an 8 byte
At 13:43 +0100 on 02 Jul (1435844582), Ben Catterall wrote:
Removed as they were wrappers around map_domain_page() to
make it appear to take an mfn_t type.
Signed-off-by: Ben Catterall ben.catter...@citrix.com
Reviewed-by: Tim Deegan t...@xen.org
Ian Campbell writes (Re: [Xen-devel] [CALL-FOR-AGENDA] Monthly Xen.org
Technical Call (2015-07-08)):
On Thu, 2015-07-02 at 09:45 +0100, Ian Campbell wrote:
Shall I put up a poll of some sort to gather preferred timeslot options
out of that set?
Please can everyone who is interested in
Hi,
Ping?
Regards,
On 17/06/15 14:58, Julien Grall wrote:
Currently, the grant table region is hardcoded per-platform. When a new
board is coming up, we have to check the spec in order to find a space
in the memory layout free. Depending on the platform it may be tedious.
A good candidate
On Thu, Jun 25, 2015 at 1:15 PM, Dario Faggioli
dario.faggi...@citrix.com wrote:
and of (almost every) direct use of cpupool_online_cpumask().
In fact, what we really want for the most of the times,
is the set of valid pCPUs of the cpupool a certain domain
is part of. Furthermore, in case
On 30/06/15 14:05, Paul Durrant wrote:
...from unsigned long to unsigned int
A 64-bit length is not necessary, 32 bits is enough.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
___
1 - 100 of 174 matches
Mail list logo