Ian Campbell ian.campb...@citrix.com 2014-11-28 下午 20:01
On Fri, 2014-11-28 at 13:55 +0800, Chunyan Liu wrote:
Found by Stefano, this chunk of the patch was never applied to
xen-unstable (commit 11dffa2359e8a2629490c14c029c7c7c777b3e47),
see
On 11/28/2014 5:57 PM, Jan Beulich wrote:
On 28.11.14 at 08:59, yu.c.zh...@linux.intel.com wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -2838,7 +2838,8 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned long
gla,
* to the mmio handler.
*/
if (
On 11.08.2014 19:32, Zoltan Kiss wrote:
There is a long known problem with the netfront/netback interface: if the
guest
tries to send a packet which constitues more than MAX_SKB_FRAGS + 1 ring
slots,
it gets dropped. The reason is that netback maps these slots to a frag in the
frags array,
On Mon, 2014-12-01 at 01:21 -0700, Chun Yan Liu wrote:
Ian Campbell ian.campb...@citrix.com 2014-11-28 下午 20:01
On Fri, 2014-11-28 at 13:55 +0800, Chunyan Liu wrote:
Found by Stefano, this chunk of the patch was never applied to
xen-unstable (commit
From: Jan Beulich jbeul...@suse.com
This is a prerequisite for punching holes into HVM and PVH guests' P2M
to allow passing through devices that are associated with (on VT-d)
RMRRs.
Signed-off-by: Jan Beulich jbeul...@suse.com
Acked-by: Kevin Tian kevin.t...@intel.com
---
v8:
A brief summary:
* Rebased on the latest
* We skip creating p2m table associated to RMRR range as Jan and Tim commented
And especially, this is identified to setting these tables as INVALID since
as you know all p2m tables already are initialized as INVALID. Actually I also
tried to
We will introduce that hypercall xc_reserved_device_memory_map
approach to libxc.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
tools/libxc/include/xenctrl.h | 5 +
tools/libxc/xc_domain.c | 30 ++
2 files changed, 35 insertions(+)
diff --git
We need to act on some specific hypercall error numbers, so
require the hypervisor view on the errno.h value rather than
just the build environment's number. So here link this headfile
from xen.
Acked-by: Jan Beulich jbeul...@suse.com
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
We need to use reserved device memory maps with multiple times, so
provide just one common function should be friend.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
tools/firmware/hvmloader/util.c | 59 +
tools/firmware/hvmloader/util.h | 2 ++
2
In case of reserved device memory overlapping with ram, it also probably
overlap with modules space so we need to check these reserved device
memory as well.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
tools/libxc/xc_hvm_build_x86.c | 94 +++---
1
We always reserve these ranges since we never allow any stuff to
poke them.
But in theory some untrusted VM can maliciously access them. So we
need to intercept this approach. But we just don't want to leak
anything or introduce any side affect since other OSs may touch them
by careless behavior,
In some cases like igd_opregion_pgbase, guest will use mem_hole_alloc
to allocate some memory to use in runtime cycle, so we alsoe need to
make sure all reserved device memory don't overlap such a region.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
tools/firmware/hvmloader/util.c | 22
Before we refine RMRR mechanism, USB RMRR may conflict with guest bios
region so we always ignore USB RMRR. Now this can be gone when we enable
pci_force to check/reserve RMRR.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
xen/drivers/passthrough/vtd/dmar.h | 1 +
After we intend to expost that hypercall explicitly based on
XEN_DOMCTL_set_rdm, we need this rebase. I hope we can squash
this into that previous patch once Jan Ack this.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
xen/common/compat/memory.c | 75
We can't expost those reserved device memory in case of mem_access
since any access may corrupt device usage.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
xen/common/mem_access.c | 41 +
1 file changed, 41 insertions(+)
diff --git
We need to check to reserve all reserved device memory maps in e820
to avoid any potential guest memory conflict.
Currently, if we can't insert RDM entries directly, we may need to handle
several ranges as follows:
a. Fixed Ranges -- BUG()
lowmem_reserved_base-0xA: reserved by BIOS
We will create RMRR mapping as follows:
If gfn space unoccupied, we just set that. If
space already occupy by 1:1 RMRR mapping do thing. Others
should be failed.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
xen/arch/x86/mm/p2m.c | 28
intel_iommu_map_page() does nothing if VT-d shares EPT page table.
So rmrr_identity_mapping() never create RMRR mapping but in some
cases like some GFX drivers it still need to access RMRR.
Here we will create those RMRR mappings even in shared EPT case.
Signed-off-by: Tiejun Chen
On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote:
On 11/28/2014 5:57 PM, Jan Beulich wrote:
On 28.11.14 at 08:59, yu.c.zh...@linux.intel.com wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -2838,7 +2838,8 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned
long
On Mon, 2014-12-01 at 05:27 +, Hu, Robert wrote:
But I'm not convinced that these patches take the right approach to
achieving that. There seems to be a great deal of duplication of
code. I think we should have a conversation about what moving parts
are necessary for nested HVM
On Sun, 2014-11-30 at 21:54 +, Wei Liu wrote:
There are two invocations of libxl_basename, which returns a malloc'ed
string. Those strings should be freed after used.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson
On Mon, 2014-12-01 at 11:34 +0800, Dennis Lan (dlan) wrote:
On Mon, Nov 10, 2014 at 8:09 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Mon, 2014-11-10 at 12:44 +0100, Atom2 wrote:
I'm afraid it's looking more and more like a toolchain issue. I'm not
expert on this side on things
On Sat, 2014-11-29 at 21:23 -0800, Ed Swierk wrote:
- Use %lex-param instead of obsolete YYLEX_PARAM to override lex scanner
parameter
- Change deprecated %name-prefix= to %name-prefix
Tested against bison 2.4.1 and 3.0.2.
Signed-off-by: Ed Swierk eswi...@skyportsystems.com
Copying Ian
Hi, all!
We are once again faced with the null-domains problem.
At this moment we have xen node with 49 null-domains and if I create new
domain and shutdown it I w'll get a new one null-domain.
All blkback and netback kernel process are exists. There is no qemu
process running.
I can't
On Mon, 2014-12-01 at 12:48 +0300, Alexey wrote:
Hi, all!
We are once again faced with the null-domains problem.
At this moment we have xen node with 49 null-domains and if I create new
domain and shutdown it I w'll get a new one null-domain.
All blkback and netback kernel process are
On Mon, Dec 01, 2014 at 09:34:47AM +, Ian Campbell wrote:
On Sun, 2014-11-30 at 21:54 +, Wei Liu wrote:
There are two invocations of libxl_basename, which returns a malloc'ed
string. Those strings should be freed after used.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian
On 01.12.14 at 10:29, jgr...@suse.com wrote:
The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list
currently contains the mfn of the top level page frame of the 3 level
p2m tree, which is used by the Xen tools during saving and restoring
(and live migration) of pv domains and for
On Mon, 2014-12-01 at 10:10 +, Wei Liu wrote:
On Mon, Dec 01, 2014 at 09:34:47AM +, Ian Campbell wrote:
On Sun, 2014-11-30 at 21:54 +, Wei Liu wrote:
There are two invocations of libxl_basename, which returns a malloc'ed
string. Those strings should be freed after used.
At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote:
On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote:
On 11/28/2014 5:57 PM, Jan Beulich wrote:
On 28.11.14 at 08:59, yu.c.zh...@linux.intel.com wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -2838,7
Hi all,
We're pleased to announce a public release to Intel Graphics Virtualization
Technology (Intel GVT-g, formerly known as XenGT). Intel GVT-g is a complete
vGPU solution with mediated pass-through, supported today on 4th generation
Intel Core(TM) processors with Intel Graphics
libxl debug builds are built with optimization level -O1, inherited from
the CFLAGS definition in StdGNU.mk. Optimizations confuse the debugger,
and the comment justifying -O1 in StdGNU.mk should not apply for a
userspace library. Disable optimization by appending -O0 to CFLAGS,
which
Signed-off-by: Euan Harris euan.har...@citrix.com
---
tools/libxl/libxl.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index f84f7c2..c50c323 100644
--- a/tools/libxl/libxl.c
+++ b/tools/libxl/libxl.c
@@ -674,7 +674,7 @@ int
xl list two domains for example:
(null) 67 0 8 --pssd
135229.6
(null) 69 0 4 --ps-d
4172.2
vif67.0 still exist in my dom0 and i can't ip link delete it.
Attached block device marked as busy
On Mon, 2014-12-01 at 13:54 +0300, Alexey wrote:
xl list two domains for example:
(null) 67 0 8 --pssd
135229.6
(null) 69 0 4 --ps-d
4172.2
vif67.0 still exist in my dom0 and i can't ip
On 27/11/14 18:36, Luis R. Rodriguez wrote:
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
Some folks had reported that some xen hypercalls take a long time
to complete when issued from
On 01.12.14 at 11:30, t...@xen.org wrote:
At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote:
On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote:
To my understanding, pages with p2m_ram_ro are not supposed to be
modified by guest. So in __hvm_copy(), when p2m type of a page is
On 01/12/14 10:15, Jan Beulich wrote:
On 01.12.14 at 10:29, jgr...@suse.com wrote:
The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list
currently contains the mfn of the top level page frame of the 3 level
p2m tree, which is used by the Xen tools during saving and restoring
(and
On Wed, Nov 26, 2014 at 7:21 AM, hanyandong hanyand...@iie.ac.cn wrote:
hi all,
I found xentrace will lost record if there are too many event to trace.
But every event is important to me, so I want to trace all of them, not lost
one.
what could I do to achieve this goal ?
If it need to
What does xenstore-ls -fp say?
# xenstore-ls -fp
/tool =(n0)
/tool/xenstored =(n0)
/local =(n0)
/local/domain =(n0)
/local/domain/0 =(n0)
/local/domain/0/name = Domain-0 (n0)
/local/domain/0/domid = 0 (n0)
/local/domain/0/libxl =(n0)
/local/domain/0/libxl/disable_udev
On 01.12.14 at 12:19, david.vra...@citrix.com wrote:
On 01/12/14 10:15, Jan Beulich wrote:
On 01.12.14 at 10:29, jgr...@suse.com wrote:
The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list
currently contains the mfn of the top level page frame of the 3 level
p2m tree, which is
Free strings returned by libxl_basename after used.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
tools/libxl/xl_cmdimpl.c |8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git
The string returned is malloc'ed but marked as const.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
tools/libxl/libxl.h | 10 ++
tools/libxl/libxl_utils.c |5 -
tools/libxl/libxl_utils.h |
On 28/11/14 10:53, Juergen Gross wrote:
Paravirtualized kernels running on Xen use a three level tree for
translation of guest specific physical addresses to machine global
addresses. This p2m tree is used for construction of page table
entries, so the p2m tree walk is performance critical.
On Mon, 2014-12-01 at 11:31 +, Wei Liu wrote:
Return value of libxl_basename was erroneously marked as const. This
series removes that const and fixes two memory leaks in xl.
I think these fixes should be included in 4.5, given that they fix real
issues and are very straight foward to
On Mon, 2014-12-01 at 10:39 +, Euan Harris wrote:
libxl debug builds are built with optimization level -O1, inherited from
the CFLAGS definition in StdGNU.mk. Optimizations confuse the debugger,
and the comment justifying -O1 in StdGNU.mk should not apply for a
userspace library.
On Mon, Dec 01, 2014 at 11:40:09AM +, Ian Campbell wrote:
On Mon, 2014-12-01 at 11:31 +, Wei Liu wrote:
Return value of libxl_basename was erroneously marked as const. This
series removes that const and fixes two memory leaks in xl.
I think these fixes should be included in 4.5,
flight 31960 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31960/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 8 guest-start fail REGR. vs. 31241
On Mon, 2014-12-01 at 11:55 +, Euan Harris wrote:
On Mon, Dec 01, 2014 at 11:43:13AM +, Ian Campbell wrote:
On Mon, 2014-12-01 at 10:39 +, Euan Harris wrote:
libxl debug builds are built with optimization level -O1, inherited from
the CFLAGS definition in StdGNU.mk.
At 11:17 + on 01 Dec (1417429027), Jan Beulich wrote:
On 01.12.14 at 11:30, t...@xen.org wrote:
At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote:
On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote:
To my understanding, pages with p2m_ram_ro are not supposed to be
On Mon, Dec 01, 2014 at 09:42:13AM +, Ian Campbell wrote:
On Sat, 2014-11-29 at 21:23 -0800, Ed Swierk wrote:
- Use %lex-param instead of obsolete YYLEX_PARAM to override lex scanner
parameter
- Change deprecated %name-prefix= to %name-prefix
Tested against bison 2.4.1 and 3.0.2.
On 01.12.14 at 13:13, t...@xen.org wrote:
At 11:17 + on 01 Dec (1417429027), Jan Beulich wrote:
On 01.12.14 at 11:30, t...@xen.org wrote:
At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote:
On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote:
To my understanding, pages
Hi,
The following series adds a new flight type intended to test distro domU
support, i.e. running distro installers and kernels on top of current
Xen to ensure things work. I intend for the flight to be run on a weekly
basis, and I've scheduled it here to run at the weekend when in theory
things
I tried to attach a PCI device (IGB Virtual Function) to a HVM guest.
To actually get it assigned its required to run
pci-attach/pci-detach/pci-attach because it does not show up right away.
Did anyone noticed this bug already, is there a fix? There is no error
reported in dom0 dmesg, xl dmesg
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: Make sure wget is installed
---
Osstest/Debian.pm | 2 +-
Osstest/TestSupport.pm | 8
2 files changed, 9 insertions(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index c8db601..89cd205 100644
---
Since the distro nightlies are not version controlled we cannot use
the usual mechanisms for detecting regressions. Special case things
appropriately. We use an OLD_REVISION of flight-NNN to signify that
the old revision is another flight and not a tree revision.
A grep over $NEW_REVISION needed
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: New patch
---
Osstest/Debian.pm | 57 ---
1 file changed, 29 insertions(+), 28 deletions(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index c985913..8ec4a3b 100644
---
This requires us to install pv-grub-menu from backports, which we do
using a late_command.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3:
- Remove spurious () from (END) (and the prexisting too)
- Remove $xopts{EnableBackports} and automatically handle the need to add
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: New patch
---
make-flight | 4
mfi-common | 4
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/make-flight b/make-flight
index 9963a46..b641683 100755
--- a/make-flight
+++ b/make-flight
@@ -35,10 +35,6 @@
The netinst media are iso images containing a base Debian install and
some (image size dependent) additional tasks.
On x86 the multiarch iso flavour contains a Xen capable kernel for
both i386 and amd64 so use that.
This adds support for two classes of ISO, the CD sized ones which are
built
Once a week should be sufficient for this test. It involves quite a
large number of jobs so schedule it to start early on Saturday so it
can run over the weekend when, in theory, things should be quieter.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson
This requires the use of the pv-grub-menu package which is in Jessie
onwards. (it is in wheezy-backports which is the subject of a
subsequent flight).
The bootloader to use is specified via a runvar {Guest}_bootloader.
Adjust make-distros-flight to use pvgrub for some subset of i386 and
amd64
Call it from ts-debian-hvm-install.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: New patch
---
Osstest/Debian.pm | 16 +++-
ts-debian-hvm-install | 3 +++
2 files changed, 14 insertions(+), 5 deletions(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index
Guard against issuing unsupported REQ_FUA and REQ_FLUSH was introduced
in d11e61583 and was factored out into blkif_request_flush_valid() in
0f1ca65ee. However:
1) This check in incomplete. In case we negotiated to feature_flush = REQ_FLUSH
and flush_op = BLKIF_OP_FLUSH_DISKCACHE (so FUA is
On 24/11/14 14:59, Zhuan Chen wrote:
Hi,
I am wondering whether it's possible to build 32-bit xen.efi for the
32-bit EFI platform? One way of building xen.efi I learnt is to make
the binutils configured with the x86_64-pep emulation (according to
the document
On Mon, 2014-12-01 at 12:56 +, Ian Campbell wrote:
The exception to that good news is that sg-report-flight
--that-flight=NNN MMM doesn't seem to be considering failures in MMM
regressions vs NNN. e.g. test-amd64-i386-i386-daily-netboot-pvgrub
should appear as a regression from 31961 to
On 26/11/14 17:28, David Miller wrote:
From: Seth Forshee seth.fors...@canonical.com
Date: Tue, 25 Nov 2014 20:28:24 -0600
These BUGs can be erroneously triggered by frags which refer to
tail pages within a compound page. The data in these pages may
overrun the hardware page while still
On 11/27/14 05:48, Stefano Stabellini wrote:
On Wed, 26 Nov 2014, Don Slutz wrote:
On 11/26/14 13:17, Stefano Stabellini wrote:
On Tue, 25 Nov 2014, Andrew Cooper wrote:
On 25/11/14 17:45, Stefano Stabellini wrote:
Increase maxmem before calling xc_domain_populate_physmap_exact to avoid
the
On Mon, Dec 01, Olaf Hering wrote:
# xl pci-assignable-add 01:10.0
# xl pci-assignable-list
:01:10.0
# xl create -f domU.cfg
# xl console domU
## lspci gives just emulated PCI devices
ttyS0:Rescue:~ # lspci
00:00.0 Host bridge: Intel Corporation 440FX - 82441FX PMC [Natoma] (rev 02)
On 01/12/14 08:55, Stefan Bader wrote:
On 11.08.2014 19:32, Zoltan Kiss wrote:
There is a long known problem with the netfront/netback interface: if the
guest
tries to send a packet which constitues more than MAX_SKB_FRAGS + 1 ring
slots,
it gets dropped. The reason is that netback maps
On my latest test with xen 4.5 and qemu 2.2 (from git) linux hvm domU
(Fedora 21) has no more crashed without any useful information in log
but was crashed only xorg on start:
[20.653] (EE)
[20.653] (EE) Backtrace:
[20.668] (EE) 0: /usr/libexec/Xorg.bin (OsLookupColor+0x119)
On 01/12/14 13:36, David Vrabel wrote:
On 01/12/14 08:55, Stefan Bader wrote:
On 11.08.2014 19:32, Zoltan Kiss wrote:
There is a long known problem with the netfront/netback interface: if the guest
tries to send a packet which constitues more than MAX_SKB_FRAGS + 1 ring slots,
it gets
On 21/11/14 22:17, Konrad Rzeszutek Wilk wrote:
The commit xen/pciback: Don't deadlock when unbinding. was using
the version of pci_reset_function which would lock the device lock.
That is no good as we can dead-lock. As such we swapped to using
the lock-less version and requiring that the
On 28/11/14 15:19, Anthony Wright wrote:
We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2 to
3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0.
Shortly after the upgrade we started to lose network connectivity to the
DomU a few times a day that required a reboot to
With gcc 4.8.3, compiling xen-detect gives a compilation warning if
you're optimising:
$ cc -Wall -Os xen-detect.c
xen-detect.c: In function ‘check_for_xen’:
xen-detect.c:65:9: warning: dereferencing type-punned pointer will break
strict-aliasing rules [-Wstrict-aliasing]
*(uint32_t
On 20/11/14 18:28, Andrew Cooper wrote:
1) Freeze the guests p2m during live migrate
2) Deep p2m dirty tracking
3) Eagerly check for p2m structure changes.
4) Request p2m structure change updates from the guest
Proposed solution: A combination of 2, 3 and 4.
Option 5: don't change
On Mon, Dec 01, Ian Campbell wrote:
On Mon, 2014-12-01 at 15:34 +0100, Olaf Hering wrote:
On Mon, Dec 01, Sander Eikelenboom wrote:
Hmm the wiki also still mentions it:
http://wiki.xen.org/wiki/Xen_PCI_Passthrough
It was the ability with xend + qemu-trad to be able to specify the
This function gets the machine E820 map and sanitize it according to PV
guest configuration.
This will be used in later patch.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Dario Faggioli
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Dario Faggioli dario.faggi...@citrix.com
Cc: Elena Ufimtseva ufimts...@gmail.com
---
tools/libxl/libxl_arm.c |8
tools/libxl/libxl_x86.c |8
Make XENMEM_increase_reservation and XENMEM_populate_physmap
vNUMA-aware.
That is, if guest requests Xen to allocate memory for specific vnode,
Xen can translate vnode to pnode using vNUMA information of that guest.
XENMEMF_vnode is introduced for the guest to mark the node number is in
fact
One vmemrange is generated for each vnode. And for those guests who care
about machine E820 map, vmemranges are further split to accommodate
memory holes.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Dario
Currently we haven't exported vmemrange interface to libxl user.
Vmemranges are generated during domain build.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Dario Faggioli dario.faggi...@citrix.com
Cc: Elena
Hi all
This is version 2 of this series.
This patch series implements virtual NUMA support for both PV and HVM guest.
That is, admin can configure via libxl what virtual NUMA topology the guest
sees.
This is the stage 1 (basic vNUMA support) and part of stage 2 (vNUMA-ware
ballooning,
On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel david.vra...@citrix.com wrote:
On 01/12/14 15:05, Luis R. Rodriguez wrote:
On Mon, Dec 01, 2014 at 11:11:43AM +, David Vrabel wrote:
On 27/11/14 18:36, Luis R. Rodriguez wrote:
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
On
On Mon, 1 Dec 2014, Don Slutz wrote:
On 11/27/14 05:48, Stefano Stabellini wrote:
On Wed, 26 Nov 2014, Don Slutz wrote:
On 11/26/14 13:17, Stefano Stabellini wrote:
On Tue, 25 Nov 2014, Andrew Cooper wrote:
On 25/11/14 17:45, Stefano Stabellini wrote:
Increase maxmem before
On 28/11/14 15:19, Anthony Wright wrote:
We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2
to
3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0.
Shortly after the upgrade we started to lose network connectivity to
the
DomU a few times a day that required a
This patch includes configuration options parser and documentation.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Dario Faggioli dario.faggi...@citrix.com
Cc: Elena Ufimtseva ufimts...@gmail.com
---
Changes in v2:
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Jan Beulich jbeul...@suse.com
---
Changes in v2:
1. Remove explicit zero initializers.
2. Adapt to new vNUMA retrieval routine.
3. Move SRAT very late in secondary table build.
---
tools/firmware/hvmloader/acpi/acpi2_0.h | 53
Libxc has more involvement in building vmemranges in HVM case. The
building of vmemranges is placed after xc_hvm_build returns, because it
relies on memory hole information provided by xc_hvm_build.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian
Disallow memory relocation when vNUMA is enabled, because relocated
memory ends up off node. Further more, even if we dynamically expand
node coverage in hvmloader, low memory and high memory may reside
in different physical nodes, blindly relocating low memory to high
memory gives us a
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Jan Beulich jbeul...@suse.com
---
xen/common/compat/memory.c | 38 ++
xen/include/xlat.lst |2 ++
2 files changed, 40 insertions(+)
diff --git a/xen/common/compat/memory.c b/xen/common/compat/memory.c
And then returns low memory end, high memory end and mmio start to
caller.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Dario Faggioli dario.faggi...@citrix.com
Cc: Elena Ufimtseva ufimts...@gmail.com
---
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Jan Beulich jbeul...@suse.com
---
Changes in v2:
1. Adapt to new vNUMA retrieval routine.
2. Move SLIT very late in secondary table build.
---
tools/firmware/hvmloader/acpi/acpi2_0.h |8 +++
tools/firmware/hvmloader/acpi/build.c | 40
Hvmloader issues XENMEM_get_vnumainfo hypercall and stores the
information retrieved in scratch space for later use.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Jan Beulich jbeul...@suse.com
---
tools/firmware/hvmloader/Makefile|2 +-
tools/firmware/hvmloader/hvmloader.c |3 ++
This is done with three major changes:
1. Rework internal representation of setting.
2. Extend grammar of parser.
3. Introduce new APIs.
New APIs introduced:
1. xlu_cfg_value_type
2. xlu_cfg_value_get_string
3. xlu_cfg_value_get_list
4. xlu_cfg_get_listitem2
Previous APIs work as before.
On 12/01/2014 05:28 PM, Jan Beulich wrote:
On 01.12.14 at 15:33, jgr...@suse.com wrote:
On 12/01/2014 02:37 PM, Jan Beulich wrote:
On 01.12.14 at 14:11, jgr...@suse.com wrote:
On 12/01/2014 12:29 PM, Jan Beulich wrote:
On 01.12.14 at 12:19, david.vra...@citrix.com wrote:
On 01/12/14 10:15,
On 12/01/2014 05:19 PM, Luis R. Rodriguez wrote:
On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote:
On 01/12/14 15:44, Luis R. Rodriguez wrote:
On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel david.vra...@citrix.com wrote:
On 01/12/14 15:05, Luis R. Rodriguez wrote:
On Mon, Dec 01,
On 01/12/14 14:37, John Haxby wrote:
With gcc 4.8.3, compiling xen-detect gives a compilation warning if
you're optimising:
$ cc -Wall -Os xen-detect.c
xen-detect.c: In function ‘check_for_xen’:
xen-detect.c:65:9: warning: dereferencing type-punned pointer will break
strict-aliasing rules
On Mon, Dec 01, 2014 at 06:07:48PM +0100, Juergen Gross wrote:
On 12/01/2014 05:19 PM, Luis R. Rodriguez wrote:
On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote:
On 01/12/14 15:44, Luis R. Rodriguez wrote:
On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel david.vra...@citrix.com
On 01/12/14 14:22, David Vrabel wrote:
On 28/11/14 15:19, Anthony Wright wrote:
We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2 to
3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0.
Shortly after the upgrade we started to lose network connectivity to the
DomU a few
flight 31963 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31963/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 31932
Tests which did not succeed,
1 - 100 of 119 matches
Mail list logo