On 01/16/15 05:09, Jan Beulich wrote:
On 03.10.14 at 00:40, dsl...@verizon.com wrote:
This is a new domain_create() flag, DOMCRF_vmware_port. It is
passed to domctl as XEN_DOMCTL_CDF_vmware_port.
Can you explain why a HVM param isn't suitable here?
The issue is that you need this flag
Ian Campbell writes (Re: [PATCH OSSTEST v4 10/13] ts-kernel-build: Adjust
kernel .config to work on the arndale boards.):
On Wed, 2015-01-21 at 16:20 +, Ian Jackson wrote:
I don't know what this is. Convince me it's harmless to disable ? :-)
[stuff]
OK, thanks.
Acked-by: Ian Jackson
On Wed, Jan 21, 2015 at 10:23 AM, Jaggi, Manish
manish.ja...@caviumnetworks.com wrote:
--
*From:* Clark Laughlin clark.laugh...@linaro.org
*Sent:* Tuesday, January 20, 2015 6:57 PM
*To:* Jaggi, Manish
*Cc:* Stefano Stabellini; jfeh...@suse.com; Kiarie Kahurani;
flight 33581 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33581/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 5 xen-bootfail REGR. vs. 33542
Regressions which
Ian Campbell writes (Re: [PATCH OSSTEST v4 10/13] ts-kernel-build: Adjust
kernel .config to work on the arndale boards.):
Thanks.
I think that means everything is now acked. I'll repost one final time
(likely tomorrow), since I've changed a few things (as discussed), then
we can talk about
On Wed, 2015-01-21 at 16:20 +, Ian Jackson wrote:
+# Enabling Exynos4 forces wierd CONFIG_HZ==200, and we don't
+# support that platform anyway.
+setopt CONFIG_ARCH_EXYNOS4 n
This is a particular kind of board ? In which case, fine.
It's a class of SoC (i.e. SoC models 4xxx),
On Wed, 2015-01-21 at 15:29 +, Andrew Cooper wrote:
I tested the same hypercall with a 32bit version of MiniOS and it
crashes as well with the same output. Then I tried it with a 64bit
version of MiniOS and seems to work just fine.
Somehow I cannot find any 32bit paravirtual machine
On Tue, 2015-01-20 at 18:32 +, Ian Jackson wrote:
Ian Campbell writes ([PATCH OSSTEST v2 08/18] Toolstack: Refactor guest
lifecycle.):
Implement destory/create as per toolstack methods, including implementing
the
libvirt version which previously didn't work. To do this we use the
Ian Campbell writes (Re: [PATCH OSSTEST v4 10/13] ts-kernel-build: Adjust
kernel .config to work on the arndale boards.):
On Wed, 2015-01-21 at 12:05 +, Ian Jackson wrote:
Ian Campbell writes ([PATCH OSSTEST v4 10/13] ts-kernel-build: Adjust
kernel .config to work on the arndale
The x2apic MSR space is currently defined between 0x800 and 0x83f, which
conveniently fits in a 64 bit wide bitmap. This is far more efficient than
the cascade comparisons generated by the switch statement, which can't be
optimised because of the case ranges used for the ISR, TMR and IRR blocks.
Dne 20.1.2015 v 10:03 Oleksandr Dmytryshyn napsal(a):
This is Para-virtual sound driver.
Frontend driver registers an virtual sound card
and sends an PCM streams to the backend driver.
Backend driver is an user-space application and
uses ALSA with dmix plugin to play audio.
Ian Campbell writes (Re: [PATCH OSSTEST v4 06/13] Osstest/Debian: support
adding a rootdelay property to bootargs):
Are you OK with me keeping your ack on this one once updated? It would
be essentially either of the two current hunks applied to the new
function instead.
Yes.
BTW, another
On 21/01/15 13:25, Julien Grall wrote:
The code to initialize the grant table in libxc uses
xc_domain_maximum_gpfn() + 1 to get a guest pfn for mapping the grant
frame and to initialize it.
This solution has two major issues:
- The check of the return of xc_domain_maximum_gpfn is buggy
From: Clark Laughlin clark.laugh...@linaro.org
Sent: Tuesday, January 20, 2015 6:57 PM
To: Jaggi, Manish
Cc: Stefano Stabellini; jfeh...@suse.com; Kiarie Kahurani; Kumar, Vijaya;
anthony.per...@citrix.com; Ian Campbell; xen-de...@lists.xensource.com
Subject: Re:
Ian Campbell writes (Re: [PATCH OSSTEST v2 08/18] Toolstack: Refactor guest
lifecycle.):
Perhaps the toolstack create method should take the $gho rather than
the config file pathname, like the destroy method does ?
Yes. In fact towards the end of the series I end up arranging that
On Wed, 2015-01-21 at 16:36 +, Ian Jackson wrote:
Ian Campbell writes (Re: [PATCH OSSTEST v4 10/13] ts-kernel-build: Adjust
kernel .config to work on the arndale boards.):
On Wed, 2015-01-21 at 16:20 +, Ian Jackson wrote:
I don't know what this is. Convince me it's harmless to
On 21/01/2015 21:27, Konrad Rzeszutek Wilk wrote:
As I was looking at some of the XSA I realized that the
call-chain of:
domain_relinquish_resources
-vcpu_destroy_pagetables
- put_page_and_type_preemptible
- __put_page_type
returns -EINTR
which means we end
As I was looking at some of the XSA I realized that the
call-chain of:
domain_relinquish_resources
-vcpu_destroy_pagetables
- put_page_and_type_preemptible
- __put_page_type
returns -EINTR
which means we end up at:
618 rc =
This is a note to let you know that I have just added a patch titled
xen-netfront: Fix handling packets on compound pages with skb_linearize
to the linux-3.13.y-queue branch of the 3.13.y-ckt extended stable tree
which can be found at:
need_iommu has to be set earler for dom0 pvh specific init
functions. If not enabled, mmio regions are not mapped with iommu
during domain construction.
This was discovered when working on booting problems of pvh dom0
on two different machines (ThinkCentre M and Dell 5600T).
On ThinkCentre during
flight 33612 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33612/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 33422
build-i386-libvirt
On 19/01/15 15:12, Jan Beulich wrote:
Following the earlier similar change validating CR4 modifications.
Note that this requires a non-obvious adjustment to hvm_cpuid(): On
32-bit hosts/tool stacks, the SYSCALL feature flag will be seen clear
on Intel CPUs, yet 64-bit guests legitimately
flight 33599 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33599/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 5 xen-build fail REGR. vs. 33480
p2m_mmio_direct should result in setting IOMMUF_readable and IOMMUF_writable
flags.
When pvh domain maps mmio regions, the EPT entries are not getting mapped.
This leads to IOMMU Page faults for some devices, as for example USB Host
controllers with embedded Debug devices. See
flight 33613 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33613/
Perfect :-)
All tests in this flight passed
version targeted for testing:
rumpuserxen 0f482c4b52ea2c43bcb80da5450009dcb0c76781
baseline version:
rumpuserxen
Hi
I am not sure if this the correct forum for my question, But here i go, I
am looking for a developer to port xenproject to the Snapdragon 810 SOC. It
has ARM processor with
1 .
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 21/01/2015 21:39, Andrew Cooper wrote:
On 21/01/2015 21:27, Konrad Rzeszutek Wilk wrote:
As I was looking at some of the XSA I realized that the
call-chain of:
domain_relinquish_resources
-vcpu_destroy_pagetables
- put_page_and_type_preemptible
- __put_page_type
On 2015/1/21 19:56, Ian Campbell wrote:
On Wed, 2015-01-21 at 11:37 +, Ian Jackson wrote:
Tiejun Chen writes ([RFC][PATCH 1/1] libxl: add one machine property to support IGD
GFX passthrough):
When we're working to support IGD GFX passthrough with qemu
upstream, instead of -gfx_passthru
On 2015/1/21 21:48, Gerd Hoffmann wrote:
On Mi, 2015-01-21 at 11:37 +, Ian Jackson wrote:
Tiejun Chen writes ([RFC][PATCH 1/1] libxl: add one machine property to support IGD
GFX passthrough):
When we're working to support IGD GFX passthrough with qemu
upstream, instead of -gfx_passthru
Hi All
I am not sure if this the correct forum for my question, But here i go, I
am looking for a developer to port xenproject to the Snapdragon 810 SOC. It
has ARM processor.
1 Development board spec
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, January 21, 2015 6:31 PM
Yes, it's true. But I still don't understand why to do the flush_all just
when
iommu_enable is true. Could you explain why ?
The question you raise doesn't reflect what the function does: It
During domain startup, all required memory ballooning must complete
within a maximum window of 33 seconds (3 retries, 11 seconds of delay).
If not, domain creation is aborted with a 'failed to free memory' error.
In order to accommodate large domains or slower hardware (which require
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, January 21, 2015 7:22 PM
To: Li, Liang Z
Cc: Andrew Cooper; Dong, Eddie; Tian, Kevin; Zhang, Yang Z; xen-
de...@lists.xen.org; k...@xen.org; Tim Deegan
Subject: RE: [Xen-devel] about the funtion call
From: Li, Liang Z
Sent: Thursday, January 22, 2015 12:29 PM
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, January 21, 2015 7:22 PM
To: Li, Liang Z
Cc: Andrew Cooper; Dong, Eddie; Tian, Kevin; Zhang, Yang Z; xen-
de...@lists.xen.org;
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Tuesday, January 20, 2015 7:08 PM
..., yielding better code.
Signed-off-by: Jan Beulich jbeul...@suse.com
Acked-by: Kevin Tian kevin.t...@intel.com
___
Xen-devel mailing list
flight 33603 xen-4.5-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33603/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl5 xen-bootfail pass in 33576
test-amd64-amd64-xl
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Via CPUID masking and the different apic- overrides we
effectively make PV guests only but with the default APIC
driver. That is OK as an PV guest should never access any
APIC registers. However, the APIC is also used to limit the
amount of CPUs if the APIC IDs are incorrect - and since we
mask
This mimics the behavior of the Linux kernel in which the reboot
sequence by default under EFI booted kernels is first ACPI.
EFI reboot is only tried if the user supplied it or if the hardware
is an ACPI 5.0 (or higher) reduced hardware board.
This fixes the EFI firmware crashing on Lenovo
-Original Message-
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Stefano Stabellini
Sent: Wednesday, January 21, 2015 6:37 PM
To: Xu, Quan
Cc: k...@xen.org; ian.campb...@citrix.com; stefano.stabell...@eu.citrix.com;
t...@xen.org;
On Wed, Jan 21, 2015 at 6:17 PM, Luis R. Rodriguez
mcg...@do-not-panic.com wrote:
From: Luis R. Rodriguez mcg...@suse.com
Xen has support for splitting heavy work work into a series
of hypercalls, called multicalls, and preempting them through
what Xen calls continuation [0]. Despite this
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Tuesday, January 20, 2015 7:08 PM
Most of them have been unused since the dropping of 32-bit support, and
the few remaining cases are more efficiently dealt with using a generic
macro (and probably things should have been done that way from
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Tuesday, January 20, 2015 7:07 PM
A few relevant control state fields did not get dumped so far; in
particular, VM_ENTRY_INSTRUCTION_LEN got printed twice (instead of also
printing VM_EXIT_INSTRUCTION_LEN). Where suitable (to reduce the
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Tuesday, January 20, 2015 7:06 PM
A few host state fields did not get dumped so far. Where suitable (to
reduce the amount of output) make some of the dumping conditional upon
guest settings (this isn't required for correctness as vmr()
From: Luis R. Rodriguez mcg...@suse.com
After my last respin Andy provided some ideas as how to skip
IRQ context hacks for preemption, this v3 spin addresses that
and a bit more.
This is based on both Andrew Cooper's and David Vrabel's work,
further modified based on ideas by Andy Lutomirski to
From: Luis R. Rodriguez mcg...@suse.com
Xen has support for splitting heavy work work into a series
of hypercalls, called multicalls, and preempting them through
what Xen calls continuation [0]. Despite this though without
CONFIG_PREEMPT preemption won't happen, without preemption
a system can
From: Luis R. Rodriguez mcg...@suse.com
On kernels with voluntary or no preemption we can run
into situations where a hypercall issued through userspace
will linger around as it addresses sub-operatiosn in kernel
context (multicalls). Such operations can trigger soft lockup
detection.
We want to
On 21/01/2015 18:51, Stefano Stabellini wrote:
On Wed, 21 Jan 2015, Mao Mingy wrote:
I am trying to run the PVHVM guest on omap5 (arm arch) so that I can get the
frame buffer shared by Domains. my setup are:
1. run xen4.5 after the u-boot.
2. start the dom0 (on linux kernel 3.12) on xen.
3.12
On Wed, Jan 21, 2015 at 6:17 PM, Luis R. Rodriguez
mcg...@do-not-panic.com wrote:
From: Luis R. Rodriguez mcg...@suse.com
On kernels with voluntary or no preemption we can run
into situations where a hypercall issued through userspace
will linger around as it addresses sub-operatiosn in
branch xen-unstable
xen branch xen-unstable
job build-armhf
test xen-build
Tree: qemuu git://git.qemu.org/qemu.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree: qemuu git://git.qemu.org/qemu.git
Bug introduced:
flight 33608 xen-4.3-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33608/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-win7-amd64 7 windows-install fail like 33407
On Mon, Nov 3, 2014 at 5:01 AM, Juergen Gross jgr...@suse.com wrote:
At the moment there are a lot of places that handle setting or getting
the page cache mode by treating the pgprot bits equal to the cache mode.
This is only true because there are a lot of assumptions about the setup
of the
From: Elena Ufimtseva [mailto:elena.ufimts...@oracle.com]
Sent: Thursday, January 22, 2015 4:53 AM
need_iommu has to be set earler for dom0 pvh specific init
functions. If not enabled, mmio regions are not mapped with iommu
during domain construction.
This was discovered when working on
Tian, Kevin wrote on 2015-01-22:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, January 21, 2015 6:31 PM
Yes, it's true. But I still don't understand why to do the
flush_all just when iommu_enable is true. Could you explain why ?
The question you raise doesn't reflect
On 21.01.15 at 03:30, kevin.t...@intel.com wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Yeah, for the actual E820 the conversion of course has to happen.
But I think there's no strong need for it to be done on the variant
obtainable via hypercall - it would only destroy information,
On 20/01/15 20:12, Waiman Long wrote:
This patch adds the necessary XEN specific code to allow XEN to
support the CPU halting and kicking operations needed by the queue
spinlock PV code.
Xen is a word, please don't capitalize it.
+void xen_lock_stats(int stat_types)
+{
+ if (stat_types
On Wed, 21 Jan 2015, Mao Mingy wrote:
I am trying to run the PVHVM guest on omap5 (arm arch) so that I can get the
frame buffer shared by Domains. my setup are:
1. run xen4.5 after the u-boot.
2. start the dom0 (on linux kernel 3.12) on xen.
3.12 is pretty old now
3. run the qemu (from xen
On Tue, 2015-01-20 at 18:19 +, Ian Jackson wrote:
Ian Campbell writes ([PATCH OSSTEST v2 01/18] apt: lock osstest's usages of
apt-get against each other):
Currently we rely on all apt-get invocations being in a single
ts-xen-build-prep job which can't run on a shared host.
That is
El 21/01/15 a les 8.56, Bob Liu ha escrit:
The default max-segments of indirect requests was 32, so IO operations with
bigger block size(32*4k) would be split and make performance drop.
Nowadays backend device usually support 512k max_sectors_kb on desktop,
and usually larger on server
On 20.01.15 at 18:57, andrew.coop...@citrix.com wrote:
On 20/01/15 11:07, Jan Beulich wrote:
@@ -1761,15 +1761,15 @@ int nvmx_handle_vmwrite(struct cpu_user_
vmcs_encoding = reg_read(regs, decode.reg2);
__set_vvmcs(nvcpu-nv_vvmcx, vmcs_encoding, operand);
-switch (
I also wonder whether it might be easier to organise the series along
the lines of introducing vm_event, move the existing interfaces across,
then deleting mem_event. Lets see how easy it is to review in its
current form first though.
~Andrew
Ack, that indeed might be easier to review. I'm
On 20.01.15 at 19:35, andrew.coop...@citrix.com wrote:
On 20/01/15 17:05, Roger Pau Monne wrote:
Prevent Dom0 from accessing HPET MMIO region by adding the HPET mfn to the
list of read-only memory regions.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Jan Beulich jbeul...@suse.com
I found the restore process of the live migration is quit long, so I
try to
find out what's going on.
By debugging, I found the most time consuming process is restore the
VM's
MTRR MSR,
The process is done in the function hvm_load_mtrr_msr(), it will call
the memory_type_changed(),
On 20.01.15 at 18:11, julien.gr...@linaro.org wrote:
On 20/01/15 16:40, Jan Beulich wrote:
On 20.01.15 at 15:28, julien.gr...@linaro.org wrote:
On 19/01/15 17:02, Jan Beulich wrote:
On 13.01.15 at 15:25, julien.gr...@linaro.org wrote:
--- a/xen/drivers/passthrough/device_tree.c
+++
On 20.01.15 at 18:03, andrew.coop...@citrix.com wrote:
On 20/01/15 11:05, Jan Beulich wrote:
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -1395,6 +1395,16 @@ static inline unsigned long vmr(unsigned
return __vmread_safe(field, val) ? val : 0;
}
+#define
On 21/01/2015 10:23, Jan Beulich wrote:
On 20.01.15 at 18:11, julien.gr...@linaro.org wrote:
On 20/01/15 16:40, Jan Beulich wrote:
On 20.01.15 at 15:28, julien.gr...@linaro.org wrote:
On 19/01/15 17:02, Jan Beulich wrote:
On 13.01.15 at 15:25, julien.gr...@linaro.org wrote:
---
On 20.01.15 at 18:19, andrew.coop...@citrix.com wrote:
On 20/01/15 11:06, Jan Beulich wrote:
+printk(RIP = 0x%016lx (%ps) RSP = 0x%016lx\n,
+ vmr(HOST_RIP), (void *)vmr(HOST_RIP), vmr(HOST_RSP));
Given the asm volatile, the compiler is unlikely to elide the second
read of
On 21.01.15 at 11:37, julien.gr...@linaro.org wrote:
On 21/01/2015 10:23, Jan Beulich wrote:
On 20.01.15 at 18:11, julien.gr...@linaro.org wrote:
While this function is currently only used for DOM0, this will be used
in a later patch for guest non-PCI passthrough.
Okay, but you shouldn't
On 20.01.15 at 18:05, roger@citrix.com wrote:
--- a/xen/arch/x86/domain_build.c
+++ b/xen/arch/x86/domain_build.c
@@ -319,12 +319,25 @@ static __init void pvh_add_mem_mapping(struct domain
*d, unsigned long gfn,
unsigned long mfn, unsigned long
flush_all function will consume about 8 milliseconds, in my test
environment, the VM
has 4 VCPUs, the hvm_load_mtrr_msr() will be called four times,
and totally
consumes
about 500 milliseconds. Obviously, there are too many flush_all calls.
I think something should be
Which does the actual sleep and logs that it is doing so.
Otherwise on a machine which has a longish PowerCycleTime I keep
wondering why osstest has hung...
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
Osstest/TestSupport.pm | 10 ++
ts-host-install| 2 +-
2 files
Unlike x86 there is enough variation in the ARM platforms that it is
worth having a basic test on each as part of a standard run. This
relies on each host having an appropriate platform-$platform host
flag.
The existing test-ARCH-ARCH-xl test is retained as a floating test,
while a new variant is
This ensures that we always have a boot script to boot at least the
native Debian kernel and Xen available, even after multiple iterations
of installation, which is handy when debugging a system.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
Osstest/Debian.pm | 14 --
1
The currently supported platform provides an FDT preloaded at 0x1000.
Replace this with ${fdt_addr} (which the current platform exposes) and
for platforms which do not provide an fdt arrange to load the relevant
file as named in the ${fdtfile} (which is conventionally provided by
u-boot for
$filesize is an unprefixed hex number, but fdt set requires the 0x to
interpret it properly. See
http://lists.denx.de/pipermail/u-boot/2014-October/193622.html
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: Reference ML thread.
v2: New patch, previously included in Osstest/Debian:
This is done whenever dtbs.tar.gz exists. mg-debian-installer-update
produces the necessary inputs on the relevant platform (armhf).
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: More careful check/stat for existence of dtbs.tar.gz
v2: Install dtbs iff dtbs.tar.gz exists.
---
This boots the kernel we've build natively, where boot.xen boots Xen
and boot.deb boots the original Debian kernel.
Sometimes convenient when debugging issues.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v4: New patch
---
Osstest/Debian.pm | 40
On 20.01.15 at 18:05, roger@citrix.com wrote:
Prevent Dom0 from accessing HPET MMIO region by adding the HPET mfn to the
list of read-only memory regions.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
This will make it easier to make components optional in the future.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
Osstest/Debian.pm | 11 +--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 8b70442..0b047df 100644
---
Various drivers are missing from multi_v7_defconfig in v3.16, also
some drivers which don't play nice are enabled by default, so remove
them.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: This is a more extensive version of ts-kernel-build: Enable
CONFIG_PHY_EXYNOS5250_SATA. Ian
This controls the eth008 relay board:
http://www.robot-electronics.co.uk/htm/eth008tech.htm
Due to the use of the CGI interface this requires firmware version 4+.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: Use LWP::UserAgent
v2: Pass username and password via a netrc file.
---
On 21.01.15 at 12:14, liang.z...@intel.com wrote:
I have write a patch according to your suggestions. But there is still
a lot of flush_all when the guest booting, and this prolong the guest
booting time about 600ms
Without you telling us where those remaining ones come from, I don't
Tiejun Chen writes ([RFC][PATCH 1/1] libxl: add one machine property to
support IGD GFX passthrough):
When we're working to support IGD GFX passthrough with qemu
upstream, instead of -gfx_passthru we'd like to make that
a machine option, -machine xxx,gfx_passthru=on. This need
to bring
On Tue, 2015-01-20 at 18:39 +, Ian Jackson wrote:
Ian Campbell writes ([PATCH OSSTEST v2 16/18] Toolstack: Remove Command
field for all toolstacks.):
Nothing in generic code uses this now, so remove.
xl+xend retain as _Command for internal use only.
Acked-by: Ian Jackson
Ian Campbell writes ([PATCH OSSTEST v4 03/13] Osstest/Debian: Install dtbs
into target filesystem in /boot/dtbs):
This is done whenever dtbs.tar.gz exists. mg-debian-installer-update
produces the necessary inputs on the relevant platform (armhf).
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
Ian Campbell writes ([PATCH OSSTEST v4 02/13] Osstest/PDU: Add eth008.pm
method to control the ARM rack PDU):
This controls the eth008 relay board:
http://www.robot-electronics.co.uk/htm/eth008tech.htm
Due to the use of the CGI interface this requires firmware version 4+.
Acked-by: Ian
Ian Campbell writes ([PATCH OSSTEST v4 06/13] Osstest/Debian: support adding a
rootdelay property to bootargs):
arndale appears to be quite slow (and asynchronous) at finding it's
scsi controller. rootdelay=3 seems to do the trick.
For the dom0 case this involved refactoring the existing
El 20/01/15 a les 19.19, Andrew Cooper ha escrit:
On 20/01/15 17:05, Roger Pau Monne wrote:
Check that MMIO regions added to PVH Dom0 are allowed. Previously a PVH Dom0
would have access to the full MMIO range.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Jan Beulich
This is the tools side wrapper for XEN_SYSCTL_PSR_CMT_get_l3_event_mask
of XEN_SYSCTL_psr_cmt_op.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
tools/libxc/include/xenctrl.h | 1 +
tools/libxc/xc_psr.c | 17 +
tools/libxl/libxl.h | 1 +
- space: remove space after '(' or before ')' in 'if' condition;
- indention: align function definition/call arguments;
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Wei Liu wei.l...@citrix.com
---
tools/libxc/include/xenctrl.h | 10 +-
tools/libxc/xc_psr.c | 10
Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring
are supported: total and local memory bandwidth monitoring. To use it,
CMT should be enabled in hypervisor.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
Changes in v5:
1. Add MBM description in xen command line.
2.
Changes from v4:
* Make the counter read and timestamp read atomic by disable IRQ;
* Treat MSR_IA32_TSC as a special case and return NOW() for read path;
* Add MBM description in xl command line.
Changes from v3:
* Get timestamp information from host along with the monitoring counter;
This is
Add the ability to disable IRQ when operating on certain continuous
resource entries. If one entry is marked as
XEN_RESOURCE_ENTRY_FLAGS_DISABLE_IRQ, then the resource operation on
both the entry and the following entry will be done with IRQ disabled.
Signed-off-by: Chao Peng
Memory bandwidth monitoring requires system time information returned
along with the monitoring counter to verify the correctness of the
counter value and to calculate the time elapsed between two samplings.
Add MSR_IA32_TSC to the read path and increase
RESOURCE_ACCESS_MAX_ENTRIES to 3.
On 21.01.15 at 12:19, chao.p.p...@linux.intel.com wrote:
Changes from v4:
* Make the counter read and timestamp read atomic by disable IRQ;
* Treat MSR_IA32_TSC as a special case and return NOW() for read path;
* Add MBM description in xl command line.
You should really have answered
Jim Fehlig writes (Re: [PATCH OSSTEST v2 18/18] WIP: libvirt: migration +
save/restore support.):
You can get around this by disabling TLS in /etc/libvirt/libvirtd.conf.
Then simply use ssh to connect to the dst host, e.g. 'virsh migrate
--live dom xen+ssh://dst-host'.
Is this the way people
Ian Campbell writes ([PATCH OSSTEST v4 05/13] Osstest/Debian: Refactor setting
of dom0 kernel command line.):
This will make it easier to make components optional in the future.
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
Ian.
___
Xen-devel
On Wed, 2015-01-21 at 11:37 +, Ian Jackson wrote:
Tiejun Chen writes ([RFC][PATCH 1/1] libxl: add one machine property to
support IGD GFX passthrough):
When we're working to support IGD GFX passthrough with qemu
upstream, instead of -gfx_passthru we'd like to make that
a machine
Ian Campbell writes ([PATCH OSSTEST v4 07/13] Osstest/Debian: Remove hardcoded
addresses from boot.scr):
Those are specific to the midway platform.
This depends on a change to the hostdb to add 0x0100 as the
value of a new UBootSetXenAddrR property of the midway machines.
Most
1 - 100 of 157 matches
Mail list logo