CC: lizhij...@cn.fujitsu.com
On 03/22/2016 01:44 PM, Changlong Xie wrote:
On 03/05/2016 01:59 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 22/27] COLO proxy: implement
setup/teardown of COLO proxy module"):
From: Wen Congyang
setup/teardown of COLO proxy
On 03/05/2016 01:59 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 22/27] COLO proxy: implement setup/teardown of
COLO proxy module"):
From: Wen Congyang
setup/teardown of COLO proxy module.
we use netlink to communicate with proxy module.
About colo-proxy
On 03/05/2016 02:09 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 27/27] cmdline switches and config vars to control
colo-proxy"):
From: Wen Congyang
Add cmdline switches to 'xl migrate-receive' command to specify
a domain-specific hotplug script to setup
On 03/14/2016 05:13 PM, Wen Congyang wrote:
On 03/12/2016 06:25 AM, Konrad Rzeszutek Wilk wrote:
+extern int colo_proxy_setup(libxl__colo_proxy_state *cps);
+extern void colo_proxy_teardown(libxl__colo_proxy_state *cps);
#endif
diff --git a/tools/libxl/libxl_colo_proxy.c
On 17/03/2016 09:41, Shannon Zhao wrote:
From: Shannon Zhao
Create a DT for Dom0 for ACPI-case only. DT contains minimal required
informations such as Dom0 bootargs, initrd, efi description table and
address of uefi memory table.
Also port the document of this
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Map the UEFI and ACPI tables which we created to non-RAM space in Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
[...]
+static int prepare_acpi(struct domain *d, struct kernel_info *kinfo)
+{
+int rc = 0;
+int order;
+
+rc = estimate_acpi_efi_size(d, kinfo);
+if ( rc != 0 )
+return rc;
+
+order =
flight 86811 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86811/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
Hi Julien,
Do you have any other comments to be addressed?
On 03/16/2016 02:08 PM, Shanker Donthineni wrote:
> From: Vikram Sethi
>
> ARMv8 architecture allows performing prefetch data/instructions
> from memory locations marked as normal memory. Prefetch does not
> mean
On 03/19/2016 05:55 PM, osstest service owner wrote:
> flight 86625 libvirt real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/86625/
There was a fair bit of turmoil after the libvirt NSS module got merged. AFAIK,
the various build issues and 'make check' failures have been resolved.
i get xen running on omap5 board with linux dom0 and ubuntu 14.04 lts file
system
i Get the linux kernel source from
git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
now i'm trying to install some guests but the problem i don't have internet
connexion
when typing
On 03/15/2016 12:57 PM, Olaf Hering wrote:
On Tue, Mar 01, Boris Ostrovsky wrote:
on domU:
[root@dhcp-burlington7-2nd-B-east-10-152-55-140 ~]# od -N 1 -j 4096 /dev/mem
od: /dev/mem: read error: Bad address
001
[root@dhcp-burlington7-2nd-B-east-10-152-55-140 ~]#
with
(XEN)
flight 86788 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86788/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 60684
From: George Dunlap
pygrub and qemuu need to be able to access a VM's disks locally in
order to be able to pull out the kernel and provide emulated disk
access, respectively. This can be done either by accessing the local
disk directly, or by plugging the target
From: George Dunlap
Testing the hotplug external script path at the moment involves
actually setting up one of the alternate datapaths (blktap, iscsi,
). Simplify testing by making a script which does a simple loopback,
but still has a target that can't be used
Signed-off-by: George Dunlap
---
Changes since v1:
- Attempt to make a clear distinction between custom hotplug scripts
and the script called for raw physical devices and files
CC: Ian Jackson
CC: Wei Liu
CC: Roger Pau
Reorganize the qemuu disk argument code to make a clean separation
between finding a file to use, and constructing the parameters:
* Rename pdev_path to target_path
* Only use qemu_disk_format_string() in circumstances where qemu may
be interpreting the disk (i.e., backend==QDISK). In all other
Regardless of whether we're running a custom hotplug script or using
normal phy: or file:, the "block" script will be run, which will set
all the necessary xenstore nodes.
In fact, writing this value here prevents the block script from
accomplishing its only purpose: to detect duplicate physical
Change block-common.sh on Linux to write physical-device-path with the
path of the device node, in addition to physical-device with its
major:minor numbers.
Signed-off-by: George Dunlap
---
NB that a later patch in this series introduces some documentation for
the block
In order for HVM domains to provide emulated access to disks provided
by hotplug scripts, qemu needs access to a "cooked" version of the
disk. In the case of hotplug scripts, this "cooked" version is
available in the form of a block device passed to blkback. Make this
"cooked" version available
From: George Dunlap
Move pygrub checks for local access ability into a separate function.
Also reorganize libxl__device_disk_local_initiate_attach so that we
don't initialize dls->disk unless we actually end up doing a local
attach.
Signed-off-by: George Dunlap
From: George Dunlap
qemu can also access disks which will be provided with a qdisk backend
directly; add a flag to libxl__device_disk_find_local_path to indicate
whether to check for qdisk direct access.
Call libxl__device_disk_find_local_path() for most paths. If
flight 86792 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86792/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
>>> On 21.03.16 at 18:04, wrote:
> On Tue, 15 Mar 2016, Jan Beulich wrote:
>> >>> On 14.03.16 at 18:55, wrote:
>> > --- a/xen/include/public/xen.h
>> > +++ b/xen/include/public/xen.h
>> > @@ -841,6 +841,37 @@ typedef struct start_info
>>> On 15.03.16 at 16:35, wrote:
> @@ -87,6 +88,129 @@ static void update_domain_cpuid_info(struct domain *d,
> d->arch.x86_model = (ctl->eax >> 4) & 0xf;
> if ( d->arch.x86 >= 0x6 )
> d->arch.x86_model |= (ctl->eax >> 12) & 0xf0;
> +
> +
Hello,
On Tue, 15 Mar 2016, Jan Beulich wrote:
> >>> On 14.03.16 at 18:55, wrote:
> > --- a/xen/include/public/xen.h
> > +++ b/xen/include/public/xen.h
> > @@ -841,6 +841,37 @@ typedef struct start_info start_info_t;
> > */
> > #define XEN_HVM_START_MAGIC_VALUE
>>> On 15.03.16 at 16:35, wrote:
> And use them in preference to cpumask_defaults on context switch. HVM
> domains
> must not be masked (to avoid interfering with cpuid calls within the guest),
> so always lazily context switch to the host default.
>
> Signed-off-by:
On 21/03/16 16:51, Jan Beulich wrote:
On 15.03.16 at 16:35, wrote:
>> +/* Fast-forward bits - Must be set. */
>> +if (ecx & cpufeat_mask(X86_FEATURE_XSAVE))
>> +ecx |= cpufeat_mask(X86_FEATURE_OSXSAVE);
> Wouldn't you
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Create a few EFI memory descriptors to tell Dom0 the RAM region
s/a few//
information, ACPI table regions and EFI tables reserved resions.
s/resions/regions/
Signed-off-by: Parth Dixit
>>> On 15.03.16 at 16:35, wrote:
> + /* Fast-forward bits - Must be set. */
> + if (ecx & cpufeat_mask(X86_FEATURE_XSAVE))
> + ecx |= cpufeat_mask(X86_FEATURE_OSXSAVE);
Wouldn't you think it would be better to also handle
>>> On 15.03.16 at 16:35, wrote:
> This patch is best reviewed as its end result rather than as a diff, as it
> rewrites almost all of the setup.
>
> On the BSP, cpuid information is used to evaluate the potential available
> set
> of masking MSRs, and they are
>>> On 21.03.16 at 17:03, wrote:
> On Mon, Mar 21, 2016 at 10:49 AM, Jan Beulich wrote:
> On 21.03.16 at 16:18, wrote:
>>> On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
>>> On 18.03.16 at 22:26,
On Mon, 21 Mar 2016, Paulina Szubarczyk wrote:
> Hi Lars,
>
> Thank you for your answer. I am looking forward to further information from
> you.
Hello Paulina,
Sorry for the delay, I was away last week and I'm just trying to catch up
with all my email.
As a first step you should look
>>> On 15.03.16 at 16:35, wrote:
> --- a/xen/arch/x86/cpu/common.c
> +++ b/xen/arch/x86/cpu/common.c
> @@ -36,6 +36,12 @@ integer_param("cpuid_mask_ext_ecx",
> opt_cpuid_mask_ext_ecx);
> unsigned int opt_cpuid_mask_ext_edx = ~0u;
> integer_param("cpuid_mask_ext_edx",
>>> On 15.03.16 at 16:35, wrote:
> Before c/s 44e24f8567 "x86: don't call generic_identify() redundantly", the
> commandline-provided masks would take effect in Xen's view of the features.
>
> As the masks got applied after the query for features, the redundant call to
>>> On 15.03.16 at 16:35, wrote:
> case 0x8001:
> -/* We expose RDTSCP feature to guest only when
> - tsc_mode == TSC_MODE_DEFAULT and host_tsc_is_safe() returns 1 */
> -if ( d->arch.tsc_mode != TSC_MODE_DEFAULT ||
> -
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
[...]
diff --git a/xen/arch/arm/efi/efi-dom0.c b/xen/arch/arm/efi/efi-dom0.c
index 90a7699..b8a062c 100644
--- a/xen/arch/arm/efi/efi-dom0.c
+++ b/xen/arch/arm/efi/efi-dom0.c
@@ -48,3 +48,47 @@ size_t __init estimate_efi_size(int
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Copy RSDP table and replace rsdp->xsdt_physical_address with new address
^ the
of XSDT table, so it can point to the right XSDT
On Mon, Mar 21, 2016 at 10:49 AM, Jan Beulich wrote:
On 21.03.16 at 16:18, wrote:
>> On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
>> On 18.03.16 at 22:26, wrote:
---
Title: Map all other tables into DOM0 memory.
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Map all other tables to Dom0 using 1:1 mappings.
s/to/into/
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
Title: to map/unmap
On 17/03/2016 09:40, Shannon Zhao wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 433952a..17be6ad 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/include/asm-arm/p2m.h
@@ -144,6 +144,16 @@ int p2m_cache_flush(struct domain *d, xen_pfn_t
>>> On 21.03.16 at 16:26, wrote:
> On 17/03/2016 09:40, Shannon Zhao wrote:
>> +gicd = container_of(header, struct acpi_madt_generic_distributor,
>> header);
>> +ACPI_MEMCPY(base_ptr + table_size, gicd,
>> +sizeof(struct
>>> On 21.03.16 at 16:18, wrote:
> On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
> On 18.03.16 at 22:26, wrote:
>>> --- a/xen/include/public/domctl.h
>>> +++ b/xen/include/public/domctl.h
>>> @@ -338,24 +338,64 @@
On 21/03/16 15:18, Chong Li wrote:
> On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
> On 18.03.16 at 22:26, wrote:
>>> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
>>> to independently get and set the scheduling parameters of
flight 86761 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86761/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399
build-i386-rumpuserxen
>>> On 15.03.16 at 16:35, wrote:
> When clearing a cpu cap, clear all dependent features. This avoids having a
> featureset with intermediate features disabled, but leaf features enabled.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan
On 03/21/2016 06:49 AM, Ján Tomko wrote:
> On Mon, Feb 29, 2016 at 09:00:44PM -0700, Jim Fehlig wrote:
>> An expanded V2 of
>>
>> https://www.redhat.com/archives/libvir-list/2016-February/msg00140.html
>>
>> In V2, the feature is extended with a state='on|off' attribute to
>> allow
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Copy and modify XSDT table before passing it to Dom0. Repalce the entry
s/Repalce/Replace/
value of the copied table. Add a new entry for STAO table as well. And
keep entry value of other
>>> On 15.03.16 at 16:35, wrote:
> @@ -18,12 +19,34 @@ uint32_t __read_mostly hvm_featureset[FSCAPINTS];
>
> static void __init sanitise_featureset(uint32_t *fs)
> {
> +uint32_t disabled_features[FSCAPINTS];
> unsigned int i;
>
> for ( i = 0; i <
On 03/21/2016 03:27 PM, Andrew Cooper wrote:
> On 21/03/16 15:10, Jan Beulich wrote:
> On 17.03.16 at 17:12, wrote:
>>> --- a/xen/include/public/xen.h
>>> +++ b/xen/include/public/xen.h
>>> @@ -614,10 +614,14 @@ struct vcpu_time_info {
>>> */
>>>
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Create STAO table for Dom0. This table is used to tell Dom0 whether it
should ignore UART defined in SPCR table or the ACPI namespace names.
Look at below url for details:
On 17/03/16 18:11, Ian Jackson wrote:
> George Dunlap writes ("[PATCH 4/8] libxl: Move check for local access to a
> funciton"):
>> +static char * libxl__device_disk_find_local_path(libxl__gc *gc,
>> + const libxl_device_disk
>> *disk) {
> ...
>>
On 21/03/16 15:10, Jan Beulich wrote:
On 17.03.16 at 17:12, wrote:
>> --- a/xen/include/public/xen.h
>> +++ b/xen/include/public/xen.h
>> @@ -614,10 +614,14 @@ struct vcpu_time_info {
>> */
>> uint32_t tsc_to_system_mul;
>> int8_t tsc_shift;
>> -
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Copy main MADT table contents and distributor subtable from physical
ACPI MADT table. Make other subtables through the callback of
gic_hw_ops.
Signed-off-by: Shannon Zhao
On Mon, Mar 21, 2016 at 8:35 AM, Jan Beulich wrote:
On 18.03.16 at 22:26, wrote:
>> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
>> to independently get and set the scheduling parameters of each
>> vCPU of a domain
>>
>>
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Add a new member in gic_hw_operations which is used to creat MADT table
s/create/create/
for Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
On 20/03/16 00:23, Paul Gortmaker wrote:
> [[PATCH v2 0/5] xen: avoid module usage in non-modular code] On 21/02/2016
> (Sun 19:06) Paul Gortmaker wrote:
>
>> This series of commits is a part of a larger project to ensure
>> people don't reference modular support functions in non-modular
>>
>>> On 17.03.16 at 17:12, wrote:
> --- a/xen/include/public/xen.h
> +++ b/xen/include/public/xen.h
> @@ -614,10 +614,14 @@ struct vcpu_time_info {
> */
> uint32_t tsc_to_system_mul;
> int8_t tsc_shift;
> -int8_t pad1[3];
> +int8_t flags;
>>> On 21.03.16 at 15:48, wrote:
> On 18/03/16 20:04, Dario Faggioli wrote:
>> --- a/xen/common/schedule.c
>> +++ b/xen/common/schedule.c
>> @@ -1491,9 +1491,9 @@ static int cpu_schedule_up(unsigned int cpu)
>> if ( idle_vcpu[cpu] == NULL )
>> return -ENOMEM;
>>
On Mon, Mar 21, 2016 at 06:21:20AM +0100, Juergen Gross wrote:
[...]
> > 4. Load bios via toolstack
>
> What about my pending "pin override" tools related patches? Hypervisor
> parts are already committed.
>
That was omitted, because as far as I can tell all toolstack patches
were already acked
On 18/03/16 20:05, Dario Faggioli wrote:
> From: Uma Sharma
>
> and, while we are adjusting signedness of opt_load_window_shift,
> make also prv->load_window_shift unsigned, as approapriate.
>
> Signed-off-by: Uma Sharma
> Signed-off-by: Dario
On 18/03/16 20:04, Dario Faggioli wrote:
> The .alloc_pdata scheduler hook must, before this change,
> be implemented by all schedulers --even those ones that
> don't need to allocate anything.
>
> Make it possible to just use the SCHED_OP(), like for
> the other hooks, by using ERR_PTR() and
On 21/03/16 15:28, George Dunlap wrote:
> On 18/03/16 08:11, Juergen Gross wrote:
>> On 17/03/16 17:06, George Dunlap wrote:
>>> On Thu, Mar 10, 2016 at 3:00 PM, Juergen Gross wrote:
Today the device model (qemu) is started for a pv domain only in case
a device
On 18/03/16 08:11, Juergen Gross wrote:
> On 17/03/16 17:06, George Dunlap wrote:
>> On Thu, Mar 10, 2016 at 3:00 PM, Juergen Gross wrote:
>>> Today the device model (qemu) is started for a pv domain only in case
>>> a device requiring qemu is specified in the domain
It is not a good diagram. Looking at my OS diagram.
For example, Xen have Dom0, DomU and
On Monday, March 21, 2016 6:34 AM, Andrew Cooper
wrote:
On 21/03/16 13:28, Jason Long wrote:
Don't top post.
> Thank you but I need a diagram like below. It is an diagram
>>> On 18.03.16 at 20:04, wrote:
> RTDS is basically identical to Credit2, as far as scheduler
> lock (re)mapping is concerned. Therefore, the same analisys
> and considerations expressed for the previous patch ("xen:
> sched: prepare a .switch_sched hook for Credit2"),
Hello,
My initial contribution can be found at:
http://lists.xen.org/archives/html/xen-devel/2015-10/msg02921.html
On Mon, Mar 21, 2016 at 4:56 PM, Lars Kurth
wrote:
> Hi Lasya, (adding xen-devel@)
>
> On 21 Mar 2016, at 11:17, Lasya Venneti
On Mon, Mar 21, 2016 at 1:26 PM, Jan Beulich wrote:
On 21.03.16 at 13:04, wrote:
>> On Thu, Mar 17, 2016 at 4:08 PM, Ian Jackson
>> wrote:
>>> Konrad Rzeszutek Wilk writes ("[PATCH v4 08/34] vmap: Make the while
>>> On 18.03.16 at 20:04, wrote:
> --- a/xen/include/xen/sched-if.h
> +++ b/xen/include/xen/sched-if.h
> @@ -9,6 +9,7 @@
> #define __XEN_SCHED_IF_H__
>
> #include
> +#include
>
> /* A global pointer to the initial cpupool (POOL0). */
> extern struct cpupool
On 21/03/16 14:42, Jan Beulich wrote:
On 21.03.16 at 13:24, wrote:
>> @@ -758,9 +759,14 @@ struct smp_sync_call_struct {
>> static void smp_call_sync_callback(struct work_struct *work)
>> {
>> struct smp_sync_call_struct *sscs;
>> +unsigned int cpu =
On 21/03/16 13:42, Jan Beulich wrote:
>
> Also don't you need to call smp_processor_id() after preempt_disable()?
I suggest using get_cpu()/put_cpu() here.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
flight 86783 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86783/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 86536
Tests which did not
>>> On 21.03.16 at 13:24, wrote:
> @@ -758,9 +759,14 @@ struct smp_sync_call_struct {
> static void smp_call_sync_callback(struct work_struct *work)
> {
> struct smp_sync_call_struct *sscs;
> + unsigned int cpu = smp_processor_id();
So this obtains the vCPU number,
On 21/03/16 11:53, Jan Beulich wrote:
+XEN_CPUFEATURE(X2APIC,1*32+21) /*A Extended xAPIC */
>>> Does this make sense for PV?
>> It is currently visible, and we already have to leak APIC through to PV
>> guests.
> Having to leak on piece of state doesn't mean when need to leak
>
>>> On 18.03.16 at 22:26, wrote:
> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
> to independently get and set the scheduling parameters of each
> vCPU of a domain
>
> Signed-off-by: Chong Li
> Signed-off-by: Meng Xu
On 21/03/16 13:28, Jason Long wrote:
Don't top post.
> Thank you but I need a diagram like below. It is an diagram about OS
> components :
>
> http://www.c-jump.com/CIS24/Slides/Booting/images/os_components.png
>
> Can you show me similar diagram for Xen?
Thank you but I need a diagram like below. It is an diagram about OS components
:
http://www.c-jump.com/CIS24/Slides/Booting/images/os_components.png
Can you show me similar diagram for Xen?
On Monday, March 21, 2016 3:42 AM, Lars Kurth wrote:
> On 20 Mar 2016,
>>> On 21.03.16 at 13:04, wrote:
> On Thu, Mar 17, 2016 at 4:08 PM, Ian Jackson
> wrote:
>> Konrad Rzeszutek Wilk writes ("[PATCH v4 08/34] vmap: Make the while loop
>> less fishy."):
>>> error:
>>> -while ( i-- )
>>> -
On 21/03/16 11:45, Joao Martins wrote:
>
> All fixed, though I found one change missing in this series, specifically on
> time_calibration_std_rendezvous. Otherwise this commit would break
> compilation.
> See chunk below for the change I am adding:
>
> @@ -1377,7 +1380,7 @@ static void
>>> On 18.03.16 at 19:44, wrote:
> On 17/03/16 09:40, Shannon Zhao wrote:
>> --- /dev/null
>> +++ b/xen/arch/arm/efi/efi-dom0.c
>> @@ -0,0 +1,50 @@
>> +/*
>> + * efi-dom0.c - Domain0 EFI Boot Support
>> + *
>> + * Copyright (C) 2016 Shannon Zhao
flight 86747 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86747/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
86491
>>> On 18.03.16 at 20:22, wrote:
>> > + * return the number of bytes requested for the operation. Or an
>> > + * negative value if an error is encountered.
>> > + */
>> > +
>> > +typedef uint64_t xen_version_op_val_t;
>> > +DEFINE_XEN_GUEST_HANDLE(xen_version_op_val_t);
>>
On Mon, Feb 29, 2016 at 09:00:44PM -0700, Jim Fehlig wrote:
> An expanded V2 of
>
> https://www.redhat.com/archives/libvir-list/2016-February/msg00140.html
>
> In V2, the feature is extended with a state='on|off' attribute to
> allow differentiating the 'on' and 'off' states with not set (or
>>> On 18.03.16 at 20:59, wrote:
> I know I copied and pasted it and I must have done something uncanny.
>
> Anyhow this is what the change looks like now (I've retained the Reviewed
> and Ack as I think this change is mostly cosmetical in nature?)
I think that's okay.
Use smp_call_sync_on_phys_cpu() to raise SMI on cpu 0.
Signed-off-by: Juergen Gross
---
drivers/firmware/dcdbas.c | 46 --
1 file changed, 20 insertions(+), 26 deletions(-)
diff --git a/drivers/firmware/dcdbas.c
Add generic virtualization support for pinning the current vcpu to a
specified physical cpu. As this operation isn't performance critical
(a very limited set of operations like BIOS calls and SMIs is expected
to need this) just add a hypervisor specific indirection.
Such a pinning should last as
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Copy and modify FADT table before passing it to Dom0. Set PSCI_COMPLIANT
and PSCI_USE_HVC.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
Some hardware (e.g. Dell Studio laptops) require special functions to
be called on physical cpu 0 in order to avoid occasional hangs. When
running as dom0 under Xen this could be achieved only via special boot
parameters (vcpu pinning) limiting the hypervisor in it's scheduling
decisions.
This
Import the actual version of include/xen/interface/sched.h from Xen.
Signed-off-by: Juergen Gross
---
include/xen/interface/sched.h | 100 ++
1 file changed, 82 insertions(+), 18 deletions(-)
diff --git a/include/xen/interface/sched.h
Some hardware models (e.g. Dell Studio 1555 laptops) require calls to
the firmware to be issued on cpu 0 only. As Dom0 might have to use
these calls, add xen_pin_vcpu() to achieve this functionality.
In case either the domain doesn't have the privilege to make the
related hypercall or the
Use the smp_call_sync_on_phys_cpu() function to call system management
mode on cpu 0.
Signed-off-by: Juergen Gross
---
drivers/hwmon/dell-smm-hwmon.c | 27 ---
1 file changed, 12 insertions(+), 15 deletions(-)
diff --git a/drivers/hwmon/dell-smm-hwmon.c
On some hardware models (e.g. Dell Studio 1555 laptop) some hardware
related functions (e.g. SMIs) are to be executed on physical cpu 0
only. Instead of open coding such a functionality multiple times in
the kernel add a service function for this purpose. This will enable
the possibility to take
>>> On 21.03.16 at 07:18, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Friday, March 18, 2016 5:49 PM
>>
>> >>> On 18.03.16 at 10:38, wrote:
>> > On Fri, 2016-03-18 at 03:29 -0600, Jan Beulich wrote:
>> >> >
>> >> Not sure
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
These tables are aligned with 64bit.
Signed-off-by: Shannon Zhao
---
xen/arch/arm/acpi/lib.c| 15 +++
xen/include/asm-arm/acpi.h | 2 ++
2 files
Hi Doug,
Can you please help on questions/problems where I am stuck?
Deadline for applying for outreachy is coming closer.
Regards,
Sabiya
Hi Doug,
I am done with building of xen source.Now, I have started looking
at source files and identifying changes required for given task.
As
>>> On 18.03.16 at 19:56, wrote:
> On 18/03/16 16:57, Jan Beulich wrote:
> On 15.03.16 at 16:35, wrote:
>>> +XEN_CPUFEATURE(MTRR, 0*32+12) /*S Memory Type Range Registers */
>> I thin I've said so before - this alters current
(Strip the CC list)
On 19/03/2016 05:45, Shannon Zhao wrote:
On 2016年03月18日 20:07, Wei Liu wrote:
Hi all
Today is that last posting day for new features. And we are two weeks
away from the anticipated freeze date.
I've gone through the outstanding patch series on the list and ask for
input
On 03/21/2016 11:43 AM, Andrew Cooper wrote:
> On 21/03/16 11:42, Joao Martins wrote:
>>
>> On 03/18/2016 08:12 PM, Andrew Cooper wrote:
>>> On 17/03/16 16:12, Joao Martins wrote:
This field has two possible flags (as of latest pvclock ABI
shared with KVM).
flags: bits in
On 03/18/2016 08:58 PM, Andrew Cooper wrote:
> On 17/03/16 16:12, Joao Martins wrote:
>> When using TSC as clocksource we will solely rely on TSC for updating
>> vcpu time infos (pvti). Right now, each vCPU takes the tsc_timestamp at
>> different instants meaning every EPOCH + delta. This delta
On 03/18/2016 08:34 PM, Andrew Cooper wrote:
> On 17/03/16 16:12, Joao Martins wrote:
>> To fetch the last read from the clocksource which was used to
>> calculate system_time. In the case of clocksource=tsc we will
>> use it to set tsc_timestamp.
>>
>> Signed-off-by: Joao Martins
1 - 100 of 121 matches
Mail list logo