flight 146374 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146374/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182
build-i386-libvirt
flight 146365 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146365/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 10 debian-hvm-install
fail REGR. vs. 146058
Hi Jan,
On 2020/1/21 19:13, Jan Beulich wrote:
> On 21.01.2020 04:44, Wei Xu wrote:
>> --- a/xen/drivers/char/ns16550.c
>> +++ b/xen/drivers/char/ns16550.c
>> @@ -1620,6 +1620,66 @@ DT_DEVICE_START(ns16550, "NS16550 UART",
>> DEVICE_SERIAL)
>> DT_DEVICE_END
>>
>> #endif /* HAS_DEVICE_TREE
Hi Julien,
On 2020/1/21 19:25, Julien Grall wrote:
> Hi Jan,
>
> On 21/01/2020 11:02, Jan Beulich wrote:
>> On 21.01.2020 10:49, Wei Xu wrote:
>>> Add __acpi_unmap_table function for ARM and invoke it at
>>> acpi_os_unmap_memory
>>> to make sure the related fixmap has been cleared before using i
Hi Jan,
On 2020/1/21 19:02, Jan Beulich wrote:
> On 21.01.2020 10:49, Wei Xu wrote:
>> Add __acpi_unmap_table function for ARM and invoke it at acpi_os_unmap_memory
>> to make sure the related fixmap has been cleared before using it for a
>> different mapping.
>
> How can it possibly be that this
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/domain.c | 273
1 file changed, 273 insertions(+)
create mode 100644 xen/arch/riscv/domain.c
diff --git a/xen/arch/riscv/domain.c b/xen/arch/riscv/domain.c
new file mode 100644
i
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/vm_event.c | 42 +++
1 file changed, 42 insertions(+)
create mode 100644 xen/arch/riscv/vm_event.c
diff --git a/xen/arch/riscv/vm_event.c b/xen/arch/riscv/vm_event.c
new file mode 100
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/p2m.c | 261 +++
1 file changed, 261 insertions(+)
create mode 100644 xen/arch/riscv/p2m.c
diff --git a/xen/arch/riscv/p2m.c b/xen/arch/riscv/p2m.c
new file mode 100644
index
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/traps.c | 56 ++
1 file changed, 56 insertions(+)
create mode 100644 xen/arch/riscv/traps.c
diff --git a/xen/arch/riscv/traps.c b/xen/arch/riscv/traps.c
new file mode 100644
index
From: Alistair Francis
Signed-off-by: Alistair Francis
---
Makefile | 13 +
1 file changed, 1 insertion(+), 12 deletions(-)
diff --git a/Makefile b/Makefile
index 512d6b73c8..7936f3a368 100644
--- a/Makefile
+++ b/Makefile
@@ -7,7 +7,7 @@
all: dist
-include config/Toplevel.mk
-
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/asm-offsets.c | 38
1 file changed, 38 insertions(+)
create mode 100644 xen/arch/riscv/asm-offsets.c
diff --git a/xen/arch/riscv/asm-offsets.c b/xen/arch/riscv/asm-offsets.c
new file
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/domctl.c | 53 +
1 file changed, 53 insertions(+)
create mode 100644 xen/arch/riscv/domctl.c
diff --git a/xen/arch/riscv/domctl.c b/xen/arch/riscv/domctl.c
new file mode 100644
in
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/percpu.c | 84 +
1 file changed, 84 insertions(+)
create mode 100644 xen/arch/riscv/percpu.c
diff --git a/xen/arch/riscv/percpu.c b/xen/arch/riscv/percpu.c
new file mode 100644
in
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/irq.c | 107 +++
1 file changed, 107 insertions(+)
create mode 100644 xen/arch/riscv/irq.c
diff --git a/xen/arch/riscv/irq.c b/xen/arch/riscv/irq.c
new file mode 100644
index
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/delay.c | 114 +
1 file changed, 114 insertions(+)
create mode 100644 xen/arch/riscv/delay.c
diff --git a/xen/arch/riscv/delay.c b/xen/arch/riscv/delay.c
new file mode 100644
inde
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/time.c | 74 +++
1 file changed, 74 insertions(+)
create mode 100644 xen/arch/riscv/time.c
diff --git a/xen/arch/riscv/time.c b/xen/arch/riscv/time.c
new file mode 100644
index 00
From: Alistair Francis
Add the lib directory with find_next_bit support.
This was taken from Linux
Signed-off-by: Alistair Francis
---
xen/arch/riscv/lib/Makefile| 1 +
xen/arch/riscv/lib/find_next_bit.c | 284 +
2 files changed, 285 insertions(+)
create
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/guestcopy.c | 158 +
1 file changed, 158 insertions(+)
create mode 100644 xen/arch/riscv/guestcopy.c
diff --git a/xen/arch/riscv/guestcopy.c b/xen/arch/riscv/guestcopy.c
new file mode
From: Alistair Francis
Signed-off-by: Alistair Francis
---
tools/libxc/include/xenctrl.h | 7 +
tools/libxc/xc_core.h | 2 ++
tools/libxc/xc_core_riscv.h | 57 +++
3 files changed, 66 insertions(+)
create mode 100644 tools/libxc/xc_core_riscv.h
From: Alistair Francis
Signed-off-by: Bobby Eshleman
Signed-off-by: Alistair Francis
---
config/riscv64.mk| 7 +
xen/Makefile | 2 +-
xen/Rules.mk | 2 +-
xen/arch/Kconfig | 1 +
xen
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/shutdown.c | 24
1 file changed, 24 insertions(+)
create mode 100644 xen/arch/riscv/shutdown.c
diff --git a/xen/arch/riscv/shutdown.c b/xen/arch/riscv/shutdown.c
new file mode 100644
index 0
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/smpboot.c | 114 +++
1 file changed, 114 insertions(+)
create mode 100644 xen/arch/riscv/smpboot.c
diff --git a/xen/arch/riscv/smpboot.c b/xen/arch/riscv/smpboot.c
new file mode 10064
Signed-off-by: Bobby Eshleman
---
xen/drivers/passthrough/riscv/iommu.c | 74 +++
1 file changed, 74 insertions(+)
create mode 100644 xen/drivers/passthrough/riscv/iommu.c
diff --git a/xen/drivers/passthrough/riscv/iommu.c
b/xen/drivers/passthrough/riscv/iommu.c
new fil
From: Alistair Francis
Signed-off-by: Alistair Francis
---
config/StdGNU.mk| 12 ++--
tools/configure | 32
tools/firmware/Makefile | 12 ++--
3 files changed, 28 insertions(+), 28 deletions(-)
diff --git a/config/StdGNU.mk b/con
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/smp.c | 41 +
1 file changed, 41 insertions(+)
create mode 100644 xen/arch/riscv/smp.c
diff --git a/xen/arch/riscv/smp.c b/xen/arch/riscv/smp.c
new file mode 100644
index
This patch initializes virtual memory for Xen and initializes UART.
Just the bare bones to start seeing output. Many shortcuts exist and
many TODO's remain.
Most of this patch is modeled after Xen ARM64 and Xvisor. Many values
are hardcoded for the QEMU virt board, with TODO's left for pulling
t
From: Alistair Francis
Signed-off-by: Alistair Francis
---
xen/arch/riscv/sysctl.c | 31 +++
1 file changed, 31 insertions(+)
create mode 100644 xen/arch/riscv/sysctl.c
diff --git a/xen/arch/riscv/sysctl.c b/xen/arch/riscv/sysctl.c
new file mode 100644
index 00
Hey everybody,
This is an RFC patchset for the very beginnings of adding RISC-V support
to Xen. This RFC is really just to start a dialogue about supporting
RISC-V and align with the Xen project and community before going
further. For that reason, it is very rough and very incomplete.
My name
flight 146370 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146370/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 145767
test-amd64-amd64-xl-qemuu
flight 146372 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146372/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 144861
build-arm64
On Fri, 2020-01-10 at 18:24 +, Julien Grall wrote:
> Hi all,
>
Hi Julien,
I was looking at this, and I have a couple of questions...
> On 08/01/2020 23:14, Julien Grall wrote:
> > On Wed, 8 Jan 2020 at 21:40, osstest service owner
> > wrote:
> >
> >
> From: Paul Durrant
> Sent: Tuesday, January 21, 2020 8:00 PM
>
> vmx_alloc_vlapic_mapping() currently contains some very odd looking code
> that allocates a MEMF_no_owner domheap page and then shares with the
> guest
> as if it were a xenheap page. This then requires vmx_free_vlapic_mapping()
>
> From: Paul Durrant
> Sent: Tuesday, January 21, 2020 8:00 PM
>
> Use mfn_t rather than unsigned long and change previous tests against 0 to
> tests against INVALID_MFN (also introducing initialization to that value).
>
> Signed-off-by: Paul Durrant
Reviewed-by: Kevin Tian
_
> From: Roger Pau Monné
> Sent: Wednesday, January 22, 2020 12:47 AM
>
> On Tue, Jan 21, 2020 at 03:34:13AM +, Tian, Kevin wrote:
> > > From: Roger Pau Monné
> > > Sent: Monday, January 20, 2020 6:19 PM
> > >
> > > On Sun, Jan 19, 2020 at 04:15:04AM +, Tian, Kevin wrote:
> > > > > From:
Hi Alexandru,
On 2020/1/21 18:01, Alexandru Stefan ISAILA wrote:
>
>
> On 21.01.2020 11:49, Wei Xu wrote:
>> Add __acpi_unmap_table function for ARM and invoke it at acpi_os_unmap_memory
>> to make sure the related fixmap has been cleared before using it for a
>> different mapping.
>>
>> Signed-
On Tue, 2020-01-21 at 09:43 +0100, Juergen Gross wrote:
> Move the parameter related definitions from init.h into a new header
> file param.h. This will avoid include hell when new dependencies are
> added to parameter definitions.
>
> Signed-off-by: Juergen Gross
>
sched-stuff:
Acked-by: Dario
On Mon, Jan 20, 2020 at 06:07:57PM +, tosher 1 wrote:
> Hi all,
>
> I was doing some experiments on the Xen network Driver Domain using Ubuntu
> 18.04. I was able to see the driver domain works fine when I run it in PV
> mode. However, I wasn't able to make the driver domain work when I run
flight 146367 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146367/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
flight 146363 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146363/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 144861
build-arm64
On Tue, Jan 21, 2020 at 03:17:39PM -0500, Jason Andryuk wrote:
> On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki
> wrote:
> >
> > Access to QMP of QEMU in Linux stubdomain is possible over vchan
> > connection. Handle the actual vchan connection in a separate process
> > (vchan-socket-p
flight 146357 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146357/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail like 146064
test-amd64-amd64-xl-qemuu-ws16-amd64 17 g
On Tue, Jan 21, 2020 at 02:43:03PM -0500, Jason Andryuk wrote:
> On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki
> wrote:
> >
> > Add a simple proxy for tunneling socket connection over vchan. This is
> > based on existing vchan-node* applications, but extended with socket
> > support.
flight 146355 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146355/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 145767
test-amd64-amd64-xl-qemuu
flight 146354 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146354/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 146121
test-amd64-amd64-xl-
flight 146362 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146362/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Jan 21, 2020, at 15:58, Marek Marczykowski-Górecki
wrote:
>
> On Wed, Jan 15, 2020 at 04:57:29PM -0500, Rich Persaud wrote:
On Jan 14, 2020, at 21:42, Marek Marczykowski-Górecki
wrote:
>>> Since we have those generated files committed to the repo (why?!),
>>> update them after c
On Mon, Jan 20, 2020 at 02:44:58PM -0500, Jason Andryuk wrote:
> On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki
> wrote:
> >
> > Let the server know when the client is connected. Otherwise server will
> > notice only when client send some data.
> > This change does not break existing c
On Mon, Jan 20, 2020 at 02:41:07PM -0500, Jason Andryuk wrote:
> On Tue, Jan 14, 2020 at 9:40 PM Marek Marczykowski-Górecki
> wrote:
> >
> > Signed-off-by: Marek Marczykowski-Górecki
> > Reviewed-by: Jason Andryuk
> > ---
> > docs/man/xl.cfg.5.pod.in | 23 +++
> > tools/xl/x
On Mon, Jan 20, 2020 at 02:36:08PM -0500, Jason Andryuk wrote:
> On Tue, Jan 14, 2020 at 9:41 PM Marek Marczykowski-Górecki
> wrote:
> >
> > This allows using arguments with spaces, like -append, without
> > nominating any special "separator" character.
> >
> > Signed-off-by: Marek Marczykowski-Gó
On Sat, 18 Jan 2020, Julien Grall wrote:
> The Arm Compiler will complain that the assertions ASSERT(sgi < 16) is
> always true. This is because sgi is a item of the enum gic_sgi and
> should always contain less than 16 SGIs.
>
> Rather than using ASSERTs, introduce a new item in the num that coul
On Mon, Jan 20, 2020 at 02:24:18PM -0500, Jason Andryuk wrote:
> On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki
> wrote:
> >
> > From: Eric Shelton
> >
> > This patch creates an appropriate command line for the QEMU instance
> > running in a Linux-based stubdomain.
> >
> > NOTE: a num
On Mon, Jan 20, 2020 at 01:56:51PM -0500, Jason Andryuk wrote:
> On Tue, Jan 14, 2020 at 9:41 PM Marek Marczykowski-Górecki
> wrote:
> >
> > Do not prohibit anymore using stubdomain with qemu-xen.
> > To help distingushing MiniOS and Linux stubdomain, add helper inline
> > functions libxl__stubdom
On Mon, Jan 20, 2020 at 01:54:04PM -0500, Jason Andryuk wrote:
> On Tue, Jan 14, 2020 at 9:41 PM Marek Marczykowski-Górecki
> wrote:
>
>
>
> > +
> > +Limitations:
> > + - PCI passthrough require permissive mode
> > + - only one nic is supported
>
> Why is only 1 nic supported? Multiple were s
On Tue, Jan 21, 2020 at 10:27:47AM +0100, Jan Beulich wrote:
> On 21.01.2020 00:50, Eslam Elnikety wrote:
> > On 20.01.20 09:42, Jan Beulich wrote:
> >> On 17.01.2020 20:06, Eslam Elnikety wrote:
> >>> On 20.12.19 10:53, Jan Beulich wrote:
> On 19.12.2019 22:08, Eslam Elnikety wrote:
> > O
On Wed, Jan 15, 2020 at 04:57:29PM -0500, Rich Persaud wrote:
> > On Jan 14, 2020, at 21:42, Marek Marczykowski-Górecki
> > wrote:
> > Since we have those generated files committed to the repo (why?!),
> > update them after changing configure.ac.
>
> Is there any reason not to remove the genera
On Thu, 16 Jan 2020, Julien Grall wrote:
> Since commit c61c1b4943 "xen/page_alloc: statically allocate
> bootmem_region_list", the boot allocator does not use the first page of
> the first region passed for its own purpose.
>
> This reverts commit ae84f55353475f569daddb9a81ac0a6bc7772c90.
>
> Si
On 21.01.20 10:27, Jan Beulich wrote:
On 21.01.2020 00:50, Eslam Elnikety wrote:
On 20.01.20 09:42, Jan Beulich wrote:
On 17.01.2020 20:06, Eslam Elnikety wrote:
On 20.12.19 10:53, Jan Beulich wrote:
On 19.12.2019 22:08, Eslam Elnikety wrote:
On 18.12.19 12:49, Jan Beulich wrote:
On 18.12.2
On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki
wrote:
>
> Since qemu-xen can now run in stubdomain too, handle this case when
> checking it's state too.
>
> Signed-off-by: Marek Marczykowski-Górecki
Reviewed-by: Jason Andryuk
___
Xen-deve
On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki
wrote:
>
> Qemu supports only 4 emulated IDE disks, when given more (or with higher
> indexes), it will fail to start. Since the disks can still be accessible
> using PV interface, just ignore emulated path and log a warning, instead
> of
On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki
wrote:
>
> Access to QMP of QEMU in Linux stubdomain is possible over vchan
> connection. Handle the actual vchan connection in a separate process
> (vchan-socket-proxy). This simplified integration with QMP (already
> quite complex), but
flight 146350 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146350/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 10 debian-hvm-install
fail REGR. vs. 146058
On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki
wrote:
>
> Add a simple proxy for tunneling socket connection over vchan. This is
> based on existing vchan-node* applications, but extended with socket
> support. vchan-socket-proxy serves both as a client and as a server,
> depending on
On Fri, Dec 27, 2019 at 01:42:37PM +, Andrew Cooper wrote:
> our @msgs() is an array of $msginfo's where the first element is a
> unique number. The $msgnum_used check ensures they are unique. Instead
> if specifying them explicitly, generate msgnum locally. This reduces
> the diff necessary
flight 146356 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/146356/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 144861
build-arm64
Trying to share these would fail anyway, better to skip them early.
Signed-off-by: Tamas K Lengyel
Reviewed-by: Jan Beulich
---
xen/arch/x86/mm/mem_sharing.c | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
in
Implement hypercall that allows a fork to shed all memory that got allocated
for it during its execution and re-load its vCPU context from the parent VM.
This allows the forked VM to reset into the same state the parent VM is in a
faster way then creating a new fork would be. Measurements show abou
Add necessary bits to implement "xl fork-vm" commands. The command allows the
user to specify how to launch the device model allowing for a late-launch model
in which the user can execute the fork without the device model and decide to
only later launch it.
Signed-off-by: Tamas K Lengyel
---
doc
Using XENLOG_ERR level since this is only used in debug paths (ie. it's
expected the user already has loglvl=all set). Also use %pd to print the domain
ids.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 82 +--
1 file changed, 41 insertions(+)
Use __get_gfn_type_access instead of p2m->get_entry to trigger page-forking
when the mem_access permission is being set on a page that has not yet been
copied over from the parent.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_access.c | 5 ++---
1 file changed, 2 insertions(+), 3 delet
The page was already tried to be unshared in get_gfn_type_access. If that
didn't work, then trying again is pointless. Don't try to send vm_event again
either, simply check if there is a ring or not.
Signed-off-by: Tamas K Lengyel
Acked-by: Jan Beulich
---
xen/arch/x86/hvm/hvm.c | 25 ++
All callers pass 0 in.
Signed-off-by: Tamas K Lengyel
Reviewed-by: Wei Liu
---
xen/arch/x86/hvm/hvm.c| 2 +-
xen/arch/x86/mm/p2m.c | 5 ++---
xen/common/memory.c | 2 +-
xen/include/asm-x86/mem_sharing.h | 8 +++-
4 files changed, 7 insertions(+), 10 de
Currently the hvm parameters are only accessible via the HVMOP hypercalls. In
this patch we introduce a new function that can copy both the hvm context and
parameters directly into a target domain. No functional changes in existing
code.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/hvm/hvm.c
During VM forking the client lock will already be taken.
Signed-off-by: Tamas K Lengyel
Acked-by: Andrew Coopers
---
xen/arch/x86/mm/mem_sharing.c | 11 ++-
xen/include/asm-x86/p2m.h | 10 +-
2 files changed, 11 insertions(+), 10 deletions(-)
diff --git a/xen/arch/x86/mm/me
When plugging a hole in the target physmap don't use the access permission
returned by __get_gfn_type_access as it can be non-sensical, leading to
spurious vm_events being sent out for access violations at unexpected
locations. Make use of p2m->default_access instead.
Signed-off-by: Tamas K Lengye
During VM forking we'll copy the parent domain's parameters to the client,
including the HAP shadow memory setting that is used for storing the domain's
EPT. We'll copy this in the hypervisor instead doing it during toolstack launch
to allow the domain to start executing and unsharing memory before
It is wasteful to require separate hypercalls to enable sharing on both the
parent and the client domain during VM forking. To speed things up we enable
sharing on the first memop in case it wasn't already enabled.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/mem_sharing.c | 52 +++
VM forking is the process of creating a domain with an empty memory space and a
parent domain specified from which to populate the memory when necessary. For
the new domain to be functional the VM state is copied over as part of the fork
operation (HVM params, hap allocation, etc).
Signed-off-by:
Create struct mem_sharing_domain under hvm_domain and move mem sharing
variables into it from p2m_domain and hvm_domain.
Expose the mem_sharing_enabled macro to be used consistently across Xen.
Remove some duplicate calls to mem_sharing_enabled in mem_sharing.c
Signed-off-by: Tamas K Lengyel
Ac
MEM_SHARING_DESTROY_GFN is used on the 'flags' bitfield during unsharing.
However, the bitfield is not used for anything else, so just convert it to a
bool instead.
Signed-off-by: Tamas K Lengyel
Reviewed-by: Jan Beulich
---
xen/arch/x86/mm/mem_sharing.c | 9 -
xen/include/asm-x86/m
The owner domain of shared pages is dom_cow, use that for get_page
otherwise the function fails to return the correct page.
Signed-off-by: Tamas K Lengyel
---
xen/arch/x86/mm/p2m.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m
It's not being called from outside mem_sharing.c
Signed-off-by: Tamas K Lengyel
Reviewed-by: Jan Beulich
---
xen/arch/x86/mm/mem_sharing.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index cc3fc97618..5
The following series implements VM forking for Intel HVM guests to allow for
the fast creation of identical VMs without the assosciated high startup costs
of booting or restoring the VM from a savefile.
JIRA issue: https://xenproject.atlassian.net/browse/XEN-89
The fork operation is implemented a
While using _mfn(0) is of no consequence during teardown, INVALID_MFN is the
correct value that should be used.
Signed-off-by: Tamas K Lengyel
Reviewed-by: Jan Beulich
---
xen/arch/x86/mm/mem_sharing.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/mm/mem_s
On 1/20/20 11:39 PM, Nick Rosbrook wrote:
> Sorry I didn't catch this the first time around, but:
>
>> diff --git a/tools/golang/xenlight/helpers.gen.go
>> b/tools/golang/xenlight/helpers.gen.go
>> index b9a7e828a0..889807d928 100644
>> --- a/tools/golang/xenlight/helpers.gen.go
>> +++ b/tools/g
On 1/21/20 3:09 PM, Alexandru Stefan ISAILA wrote:
> Hi George,
>
> This is a kind reminder, when you have the time, can you take a look at
> this series?
It's on the top of my list of things to review. :-) I should be able to
get to it Thursday.
-George
_
On 21.01.20 17:56, Kevin Stange wrote:
Hi,
I looked around a bit and wasn't able to find a good answer to this, so
George suggested I ask here.
Cc-ing Jim.
Since Xen 4.12, credit2 is the default scheduler, but at least as of
libvirt 5.1.0 virsh doesn't appear to understand credit2 and produ
On Tue, 21 Jan 2020 at 16:18, Thomas Huth wrote:
>
> The define is only used in one other place. Move the code there
> instead of keeping this xen-specific define in sysemu.h.
>
> Signed-off-by: Thomas Huth
Acked-by: Paul Durrant
___
Xen-devel mailin
On Tue, Jan 21, 2020 at 05:15:20PM +0100, Jan Beulich wrote:
> On 21.01.2020 16:57, Roger Pau Monné wrote:
> > On Tue, Jan 21, 2020 at 11:43:58AM +0100, Jan Beulich wrote:
> >> On 21.01.2020 11:29, Roger Pau Monné wrote:
> >>> So I'm not sure how to progress with this patch, are we fine with
> >>>
Hi,
I looked around a bit and wasn't able to find a good answer to this, so
George suggested I ask here.
Since Xen 4.12, credit2 is the default scheduler, but at least as of
libvirt 5.1.0 virsh doesn't appear to understand credit2 and produces
this sort of output:
# xl sched-credit2 -d yw6hk7mo6
On Tue, Jan 21, 2020 at 03:34:13AM +, Tian, Kevin wrote:
> > From: Roger Pau Monné
> > Sent: Monday, January 20, 2020 6:19 PM
> >
> > On Sun, Jan 19, 2020 at 04:15:04AM +, Tian, Kevin wrote:
> > > > From: Roger Pau Monne
> > > > Sent: Wednesday, January 8, 2020 6:39 PM
> > > >
> > > > Wh
On 1/21/20 5:17 PM, Thomas Huth wrote:
The define is only used in one other place. Move the code there
instead of keeping this xen-specific define in sysemu.h.
Signed-off-by: Thomas Huth
Reviewed-by: Philippe Mathieu-Daudé
---
hw/xenpv/xen_machine_pv.c | 2 +-
include/sysemu/sysemu.h
Hi Sergey,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on xen-tip/linux-next]
[also build test ERROR on tip/x86/mm tip/auto-latest linux/master linus/master
v5.5-rc7 next-20200121]
[if your patch is applied to the wrong git tree, please drop us a note to help
The define is only used in one other place. Move the code there
instead of keeping this xen-specific define in sysemu.h.
Signed-off-by: Thomas Huth
---
hw/xenpv/xen_machine_pv.c | 2 +-
include/sysemu/sysemu.h | 1 -
2 files changed, 1 insertion(+), 2 deletions(-)
diff --git a/hw/xenpv/xen_ma
On 21.01.2020 16:57, Roger Pau Monné wrote:
> On Tue, Jan 21, 2020 at 11:43:58AM +0100, Jan Beulich wrote:
>> On 21.01.2020 11:29, Roger Pau Monné wrote:
>>> So I'm not sure how to progress with this patch, are we fine with
>>> those limitations?
>>
>> I'm afraid this depends on ...
>>
>>> As I sai
On Tue, Jan 21, 2020 at 11:43:58AM +0100, Jan Beulich wrote:
> On 21.01.2020 11:29, Roger Pau Monné wrote:
> > So I'm not sure how to progress with this patch, are we fine with
> > those limitations?
>
> I'm afraid this depends on ...
>
> > As I said, Xen hasn't got enough knowledge to correctly
Hi George,
This is a kind reminder, when you have the time, can you take a look at
this series?
Regards,
Alex
On 17.01.2020 15:31, Alexandru Stefan ISAILA wrote:
> By default the sve bits are not set.
> This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(),
> to set a range of sve b
The physical timer traps apply an offset so that time starts at 0 for
the guest. However, this offset is not currently applied to the physical
counter. Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section
D11.2.4 Timers, the "Offset" between the counter and timer should be
zero for a physical
Xen will only store the CompareValue as it can be derived from the
TimerValue (ARM DDI 0487E.a section D11.2.4):
CompareValue = (Counter[63:0] + SignExtend(TimerValue))[63:0]
While the TimerValue is a 32-bit signed value, our implementation
assumed it is a 32-bit unsigned value.
Signed-off-by:
This patch set improves the emulation of the physical timer by removing the
physical timer offset and sign extend the TimerValue to better match the
behavior described in the ARMv8 Reference Manual (ARM DDI 0487E.a), section
D11.2.4.
Changes in v2:
- Update commit message to specify reference manu
Hi Sergey,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on xen-tip/linux-next]
[also build test ERROR on tip/x86/mm tip/auto-latest linux/master linus/master
v5.5-rc7 next-20200117]
[if your patch is applied to the wrong git tree, please drop us a note to help
improv
1 - 100 of 159 matches
Mail list logo