Rather than assuming only PV guests need special treatment (and
dealing with that directly when an IRQ gets set up), keep all guest MSI
IRQs masked until either the (HVM) guest unmasks them via vMSI or the
(PV, PVHVM, or PVH) guest sets up an event channel for it.
To not further clutter the
On Tue, Jul 07, 2015 at 11:34:34AM -0700, Stephen Hemminger wrote:
On Tue, 7 Jul 2015 15:55:21 +0100
Julien Grall julien.gr...@citrix.com wrote:
The commit efb6de9b4ba0092b2c55f6a52d16294a8a698edd netfilter: bridge:
forward IPv6 fragmented packets introduced a new function
On 08/07/2015 09:56, Jan Beulich wrote:
Rather than assuming only PV guests need special treatment (and
dealing with that directly when an IRQ gets set up), keep all guest MSI
IRQs masked until either the (HVM) guest unmasks them via vMSI or the
(PV, PVHVM, or PVH) guest sets up an event
On 08.07.15 at 12:36, feng...@intel.com wrote:
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Tuesday, June 30, 2015 1:07 AM
On 24/06/15 06:18, Feng Wu wrote:
@@ -148,11 +161,19 @@ static int vmx_vcpu_initialise(struct vcpu *v)
if ( v-vcpu_id == 0 )
On Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Emulate GITS* registers and handle LPI configuration
table update trap.
These need to only be exposed to a guest which has been configured with
an ITS. For dom0 that means at
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
The basic idea here is:
1. When vCPU's state is RUNSTATE_running,
- set 'NV' to 'Notification Vector'.
- Clear 'SN' to accpet PI.
- set 'NDST' to the right pCPU.
2. When vCPU's state is RUNSTATE_blocked,
From: Wu, Feng
Sent: Wednesday, July 08, 2015 6:11 PM
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 5:06 PM
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
Currently, we don't support urgent interrupt, all interrupts
are recognized as non-urgent interrupt, so we
-Original Message-
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 7:46 PM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z; george.dun...@eu.citrix.com
Subject: RE: [v3 11/15] Update IRTE according to guest
On 07.07.2015 01:27, Jim Fehlig wrote:
On 07/06/2015 03:46 PM, Jim Fehlig wrote:
In Xen, dom0 is really just another domain that supports ballooning,
adding/removing devices, changing vcpu configuration, etc. This patch
adds support to the libxl driver for managing dom0. Note that the
legacy
Since we now have the ability to test these drop one of each of
pygrub, pvgrub-32 and pvgrub-64 into the standard flights. Omitting
the {Guest}_diver runvar causes ts-debian-di-install to use the d-i
images in the location configured via TftpDiVersion, so they are
Version Controlled along with the
By using the same job_create_build(_filter_callback) scheme used for
the test jobs.
Will be used in make-distros-flight.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
v8: Moved to head of queue, make-distros-flight isn't introduced yet
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v8: Use \Q...\E to safely quote $url and $path
v7: Quote $url and $path, switch to a heredoc to avoid resulting over
long line
v5: Support http_proxy via $c{HttpProxy}
v3: Make sure wget is installed
---
Osstest/Debian.pm | 2 +-
Hi,
Since v7 I've done the switch from lvm to none as discussed, fixed
(I hope!) the quoting in the fetchurl helper and added the runvar docs
to the ts-debian-di-install script. I also pushed the build job
filtering to the head (which resulted in some other patches being folded
in to the
Also quote the value of BRANCHES=.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v8: Slit out from distros: Run one suite per day on a weekly basis
---
crontab-cambridge | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/crontab-cambridge b/crontab-cambridge
On 08/07/15 11:58, Jan Beulich wrote:
On 08.07.15 at 11:39, david.vra...@citrix.com wrote:
On 08/07/15 09:56, Jan Beulich wrote:
Rather than assuming only PV guests need special treatment (and
dealing with that directly when an IRQ gets set up), keep all guest MSI
IRQs masked until either the
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
Enable VT-d Posted-Interrupts and add a command line
parameter for it.
Signed-off-by: Feng Wu feng...@intel.com
---
v3:
Remove the redundant no intremp then no intpost logic
docs/misc/xen-command-line.markdown | 9 -
From: Wu, Feng
Sent: Wednesday, July 08, 2015 6:32 PM
-Original Message-
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 6:23 PM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z;
From: Wu, Feng
Sent: Wednesday, July 08, 2015 7:52 PM
+ * - For lowest-priority interrupts, we find the destination vCPU
from the
+ * guest vector using vector-hashing mechanism and return true.
This
follows
+ * the hardware behavior, since modern Intel CPUs
Am Freitag 19 Juni 2015, 14:44:37 schrieb Boris Ostrovsky:
Code for initializing/tearing down PMU for PV guests
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov
Acked-by: Jan Beulich jbeul...@suse.com
Acked-by: Kevin Tian
On Wed, Jul 8, 2015 at 6:22 AM, Razvan Cojocaru rcojoc...@bitdefender.com
wrote:
Deny register writes if a vm_client subscribed to mov_to_msr or
control register write events forbids them. Currently supported for
MSR, CR0, CR3 and CR4 events.
Signed-off-by: Razvan Cojocaru
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
This patch includes the following aspects:
- Add a global vector to wake up the blocked vCPU
when an interrupt is being posted to it (This
part was sugguested by Yang Zhang yang.z.zh...@intel.com).
- Adds a new per-vCPU tasklet to
On Wed, 2015-07-08 at 11:17 +0100, Ian Campbell wrote:
On Tue, 2015-07-07 at 17:22 +0100, Julien Grall wrote:
diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
index e1632fa..11f6461 100644
--- a/tools/libxl/libxl_types.idl
+++ b/tools/libxl/libxl_types.idl
@@
From: Wu, Feng
Sent: Wednesday, July 08, 2015 7:05 PM
-Original Message-
From: Wu, Feng
Sent: Wednesday, July 08, 2015 6:32 PM
To: Tian, Kevin; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z;
On Wed, Jul 8, 2015 at 6:22 AM, Razvan Cojocaru rcojoc...@bitdefender.com
wrote:
This patch adds support for memory-content hiding, by modifying the
value returned by emulated instructions that read certain memory
addresses that contain sensitive data. The patch only applies to
cases where
No functional change, standalone-generate-dump-flight-runvars confirms
no change to the runvars.
Includes a hook which is not used yet, $recipe_sfx.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
v4: new patch
---
make-flight | 24
xen-create-image makes this tricky to do since it is rather LVM
centric. Now that we have the ability to install from d-i it's
possible to arrange fairly easily that they use something other than
a phy backend over a bare LVM device.
Here we add support to the test script and infra and create a
The local proxy seems to serve stale packages for Jessie etc, I blame
the intercepting cache on the way out of our network, similar to
b5f15136900d mg-debian-installer-update: workaround caching proxies,
except it is between the apt-cache and the world not the osstest vm
and the world.
Since the
This requires us to install pv-grub-menu from backports, which we do
using a late_command.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v8:
- Use a heredoc for sources.list additions, since this was suggested
by Ian I would have retained the ack apart from the second change.
-
Once a week should be sufficient for these tests. Perhaps in the
future we will want to increase the frequency for the suites under
active development (testing, unstable)
For now run this on the Citrix Cambridge instance until the XenProject
instance has sufficient capacity.
Signed-off-by: Ian
This requires the use of the pv-grub-menu package which is in Jessie
onwards. (it is in wheezy-backports which is the subject of a
subsequent patch).
The bootloader to use is specified via a runvar {Guest}_bootloader.
Adjust make-distros-flight to use pvgrub for some subset of i386 and
amd64
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
v4: new patch
---
ts-debian-di-install | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/ts-debian-di-install b/ts-debian-di-install
index 373fad1..6fafd6d 100755
---
Since the distro nightlies are not version controlled we cannot use
the usual mechanisms for detecting regressions. Special case things
appropriately. We use an OLD_REVISION of flight-NNN to signify that
the old revision is another flight and not a tree revision.
A grep over $NEW_REVISION needed
This patch introduces ts-debian-di-install which can install Debian
from a netboot (PXE) debian installer image. By default it installs
from the d-i image used by osstest (using the special Xen PV guest
enabled flavour where necessary) but it can also fetch the kernel and
ramdisk from URLs
Debian doesn't currently know what bootloader to install in a Xen
guest on ARM. We install pv-grub-menu above which actually does what
we need, but the installer doesn't treat that as a bootloader.
Most ARM platforms end up installing a u-boot boot.scr, based on a
platform whitelist. This doesn't
On 08.07.15 at 11:39, david.vra...@citrix.com wrote:
On 08/07/15 09:56, Jan Beulich wrote:
Rather than assuming only PV guests need special treatment (and
dealing with that directly when an IRQ gets set up), keep all guest MSI
IRQs masked until either the (HVM) guest unmasks them via vMSI or
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
When a vCPU is running in Root mode and a notification event
has been injected to it. we need to set VCPU_KICK_SOFTIRQ for
the current cpu, so the pending interrupt in PIRR will be
synced to vIRR before VM-Exit in time.
-Original Message-
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 7:00 PM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z; george.dun...@eu.citrix.com
Subject: RE: [v3 12/15] vmx: posted-interrupt handling when
On 08/07/2015 11:55, Jan Beulich wrote:
On 08.07.15 at 11:07, julien.gr...@citrix.com wrote:
On 08/07/2015 09:56, Jan Beulich wrote:
--- a/xen/include/asm-arm/irq.h
+++ b/xen/include/asm-arm/irq.h
@@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d,
void arch_move_irqs(struct vcpu
On 08/07/15 11:45, Jan Beulich wrote:
David,
I'm afraid we'll need another fixup here, even if things build fine
despite the removal.
Ah, we get a generic implementation instead. Thanks for pointing this
out. I'll fix it.
David
___
Xen-devel
On 08.07.15 at 11:07, julien.gr...@citrix.com wrote:
On 08/07/2015 09:56, Jan Beulich wrote:
--- a/xen/include/asm-arm/irq.h
+++ b/xen/include/asm-arm/irq.h
@@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d,
void arch_move_irqs(struct vcpu *v);
+#define arch_evtchn_bind_pirq(d,
-Original Message-
From: Wu, Feng
Sent: Wednesday, July 08, 2015 6:32 PM
To: Tian, Kevin; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z; george.dun...@eu.citrix.com; Wu, Feng
Subject: RE: [v3 11/15] Update IRTE according to
On 08/07/15 06:54, Rajat Jain wrote:
Eliminate the module_init function by using module_pci_driver()
This is not equivalent since this adds a useless module_exit() function.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 08.07.15 at 13:14, david.vra...@citrix.com wrote:
On 08/07/15 11:58, Jan Beulich wrote:
On 08.07.15 at 11:39, david.vra...@citrix.com wrote:
On 08/07/15 09:56, Jan Beulich wrote:
+
/* Set IRQ type for an SPI */
int irq_set_spi_type(unsigned int spi, unsigned int type);
---
Are the license headers required? I just tried to make the change as
small as possible, and looking at the other headers (for example in
xen/include/asm-arm), at least half of them have no license header. I'm
guessing this is something we'd now like to start correcting in new
patches?
Am Freitag 19 Juni 2015, 14:44:36 schrieb Boris Ostrovsky:
Move some VPMU initilization operations into __initcalls to avoid performing
same tests and calculations for each vcpu.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Jan Beulich jbeul...@suse.com
For the
Tiejun Chen writes ([v6][PATCH 10/16] tools: introduce some new parameters to
set rdm policy):
This patch introduces user configurable parameters to specify RDM
resource and according policies,
Thanks.
I appreciate that I have come to this review late. While I have found
the review
-Original Message-
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 7:31 PM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z; george.dun...@eu.citrix.com
Subject: RE: [v3 08/15] Suppress posting interrupts when
On 08.07.15 at 11:36, chao.p.p...@linux.intel.com wrote:
@@ -84,11 +85,21 @@ void *stack_base[NR_CPUS];
static void smp_store_cpu_info(int id)
{
struct cpuinfo_x86 *c = cpu_data + id;
+unsigned int socket;
*c = boot_cpu_data;
if ( id != 0 )
+{
On 08.07.15 at 04:43, chao.p.p...@linux.intel.com wrote:
On Tue, Jul 07, 2015 at 06:32:55PM -0400, Boris Ostrovsky wrote:
@@ -245,6 +248,8 @@ static void set_cpu_sibling_map(int cpu)
cpumask_set_cpu(cpu, cpu_sibling_setup_map);
+cpumask_set_cpu(cpu,
On 08.07.15 at 10:45, li...@eikelenboom.it wrote:
Here we go:
(XEN) [2015-07-08 08:31:00.384] traps.c:3227: GPF (): 82d080195583 -
82d080239d85
(XEN) [2015-07-08 08:31:00.384] traps.c:3227: GPF (): 82d080195583 -
82d080239d85
which leads to:
# addr2line -e
For AP, phys_proc_id is still not valid in CPU_PREPARE notifier
(cpu_smpboot_alloc), so cpu_to_socket(cpu) is not valid as well.
Introduce a pre-allocated secondary_cpu_mask so that later in
smp_store_cpu_info() socket_cpumask[socket] can consume it.
Signed-off-by: Chao Peng
Version 4 of the series addresses V3 reviews, and consists of:
[PATCH 1/3] xen/mem_access: Support for memory-content hiding
[PATCH 2/3] xen/vm_event: Support for guest-requested events
[PATCH 3/3] xen/vm_event: Deny register writes if refused by
vm_event reply
All the patches in this version
Deny register writes if a vm_client subscribed to mov_to_msr or
control register write events forbids them. Currently supported for
MSR, CR0, CR3 and CR4 events.
Signed-off-by: Razvan Cojocaru rcojoc...@bitdefender.com
Acked-by: George Dunlap george.dun...@eu.citrix.com
Acked-by: Jan Beulich
This patch adds support for memory-content hiding, by modifying the
value returned by emulated instructions that read certain memory
addresses that contain sensitive data. The patch only applies to
cases where MEM_ACCESS_EMULATE or MEM_ACCESS_EMULATE_NOWRITE have
been set to a vm_event response.
Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST,
sent via HVMOP_request_vm_event. The guest can request that a
generic vm_event (containing only the vm_event-filled guest registers
as information) be sent to userspace by setting up the correct
registers and doing a VMCALL. For
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
When guest changes its interrupt configuration (such as, vector, etc.)
for direct-assigned devices, we need to update the associated IRTE
with the new guest vector, so external interrupts from the assigned
devices can be injected to
-Original Message-
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 6:23 PM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z; george.dun...@eu.citrix.com
Subject: RE: [v3 11/15] Update IRTE according to guest
4.0-stable review patch. If anyone has any objections, please let me know.
--
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream.
A huge amount of NIC drivers use the DMA API, however if
compiled under 32-bit an very
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt.
With VT-d Posted-Interrupts enabled, external interrupts from
direct-assigned devices can be delivered to guests without VMM
intervention when guest is running in
Monday, July 6, 2015, 11:33:09 AM, you wrote:
On 26.06.15 at 17:57, li...@eikelenboom.it wrote:
On 2015-06-26 17:51, Jan Beulich wrote:
On 26.06.15 at 17:41, li...@eikelenboom.it wrote:
from 3.16 to 3.19 we gained a lot of these, if i remember correctly
related to
perf being enabled in the
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, July 08, 2015 4:44 PM
To: Wu, Feng
Cc: Andrew Cooper; george.dun...@eu.citrix.com; Tian, Kevin; Zhang, Yang Z;
xen-devel@lists.xen.org; k...@xen.org
Subject: RE: [Xen-devel] [v3 03/15] Add cmpxchg16b
On 08/07/2015 09:12, Jan Beulich wrote:
+{
+uint128_t prev;
+
+ASSERT(cpu_has_cx16);
Given that if this assertion were to fail, cmpxchg16b would fail with
#UD, I would hand-code a asm_fixup section which in turn panics. This
avoids a situation where non-debug builds could die
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
This patch adds an API which is used to update the IRTE
for posted-interrupt when guest changes MSI/MSI-X information.
Signed-off-by: Feng Wu feng...@intel.com
Acked-by: Kevin Tian kevin.t...@intel.com, with one small comment:
+int
-Original Message-
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 5:06 PM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z; george.dun...@eu.citrix.com
Subject: RE: [v3 08/15] Suppress posting interrupts when
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
Extend struct pi_desc according to VT-d Posted-Interrupts Spec.
Signed-off-by: Feng Wu feng...@intel.com
Acked-by: Kevin Tian kevin.t...@intel.com
___
Xen-devel mailing list
On Tue, Jul 07, 2015 at 03:46:21PM +0100, Ian Campbell wrote:
On Fri, 2015-06-26 at 16:43 +0800, Chao Peng wrote:
Chao Peng (13):
x86: add socket_cpumask
x86: detect and initialize Intel CAT feature
x86: maintain COS to CBM mapping for each socket
x86: add COS information for
[Trimming the Cc-list a bit, to avoid bothering Wei and Jan]
On Tue, 2015-07-07 at 22:56 -0700, Meng Xu wrote:
Hi Dario,
Hi,
2015-07-07 7:03 GMT-07:00 Dario Faggioli dario.faggi...@citrix.com:
On Mon, 2015-07-06 at 22:51 -0700, Meng Xu wrote:
So, it looks to me that, as far as (1) and
-Original Message-
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 3:32 PM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z; george.dun...@eu.citrix.com
Subject: RE: [v3 05/15] vt-d: VT-d Posted-Interrupts feature
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
This patch initializes the VT-d Posted-interrupt Descriptor.
Signed-off-by: Feng Wu feng...@intel.com
Acked-by: Kevin Tian kevin.t...@intel.com
___
Xen-devel mailing list
On Tue, 2015-07-07 at 23:06 -0700, Meng Xu wrote:
2015-07-07 7:39 GMT-07:00 Dario Faggioli dario.faggi...@citrix.com:
On Tue, 2015-07-07 at 09:59 +0100, Jan Beulich wrote:
On 29.06.15 at 04:44, lichong...@gmail.com wrote:
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -31,7
Currently we're intending to cover this kind of devices
with shared RMRR simply since the case of shared RMRR is
a rare case according to our previous experiences. But
late we can group these devices which shared rmrr, and
then allow all devices within a group to be assigned to
same domain.
CC:
When allocating mmio address for PCI bars, we need to make
sure they don't overlap with reserved regions.
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
CC: Andrew Cooper andrew.coop...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Stefano Stabellini
USB RMRR may conflict with guest BIOS region. In such case, identity
mapping setup is simply skipped in previous implementation. Now we
can handle this scenario cleanly with new policy mechanism so previous
hack code can be removed now.
CC: Yang Zhang yang.z.zh...@intel.com
CC: Kevin Tian
This patch introduces user configurable parameters to specify RDM
resource and according policies,
Global RDM parameter:
rdm = strategy=host,reserve=strict/relaxed
Per-device RDM parameter:
pci = [ 'sbdf, rdm_reserve=strict/relaxed' ]
Global RDM parameter, strategy, allows user to
Here we'll construct a basic guest e820 table via
XENMEM_set_memory_map. This table includes lowmem, highmem
and RDMs if they exist, and hvmloader would need this info
later.
Note this guest e820 table would be same as before if the
platform has no any RDM or we disable RDM (by default).
CC: Ian
RMRR reserved regions must be setup in the pfn space with an identity
mapping to reported mfn. However existing code has problem to setup
correct mapping when VT-d shares EPT page table, so lead to problem
when assigning devices (e.g GPU) with RMRR reported. So instead, this
patch aims to setup
This patch enables XENMEM_memory_map in hvm. So hvmloader can
use it to setup the e820 mappings.
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
CC: Andrew Cooper andrew.coop...@citrix.com
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
Reviewed-by: Tim Deegan t...@xen.org
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning devices to a VM.
Note this also bring some fallout to python usage of xc_assign_device().
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Stefano Stabellini stefano.stabell...@eu.citrix.com
CC:
Now we get this map layout by call XENMEM_memory_map then
save them into one global variable memory_map[]. It should
include lowmem range, rdm range and highmem range. Note
rdm range and highmem range may not exist in some cases.
And here we need to check if any reserved memory conflicts with
Now we can use that memory map to build our final
e820 table but it may need to reorder all e820
entries.
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
CC: Andrew Cooper andrew.coop...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Stefano Stabellini
Tuesday, July 7, 2015, 6:08:25 PM, you wrote:
On 26.06.15 at 17:48, li...@eikelenboom.it wrote:
On 2015-06-26 17:22, Jan Beulich wrote:
I have an idea: In
static unsigned int startup_msi_irq(struct irq_desc *desc)
{
bool_t guest_masked = (desc-status IRQ_GUEST)
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, July 08, 2015 4:13 PM
To: Wu, Feng
Cc: Andrew Cooper; george.dun...@eu.citrix.com; Tian, Kevin; Zhang, Yang Z;
xen-devel@lists.xen.org; k...@xen.org
Subject: RE: [Xen-devel] [v3 03/15] Add cmpxchg16b
On Wed, Jul 08, 2015 at 05:40:47PM +0800, Chao Peng wrote:
On Tue, Jul 07, 2015 at 03:46:21PM +0100, Ian Campbell wrote:
On Fri, 2015-06-26 at 16:43 +0800, Chao Peng wrote:
Chao Peng (13):
x86: add socket_cpumask
x86: detect and initialize Intel CAT feature
x86: maintain COS
-Original Message-
From: Tian, Kevin
Sent: Wednesday, July 08, 2015 6:00 PM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
Yang Z; george.dun...@eu.citrix.com
Subject: RE: [v3 10/15] vt-d: Add API to update IRTE when
Hi,
At 17:38 + on 07 Jul (1436290689), Sahita, Ravi wrote:
In order to make forward progress, do the other maintainers (Jan,
Andrew, Tim) agree with the patch direction that George has
suggested for this particular patch?
I'm no longer a maintainer for this code, but FWIW I think that
On 08/07/2015 11:04, Sander Eikelenboom wrote:
Wednesday, July 8, 2015, 10:58:02 AM, you wrote:
On 08/07/2015 09:45, Sander Eikelenboom wrote:
Monday, July 6, 2015, 11:33:09 AM, you wrote:
On 26.06.15 at 17:57, li...@eikelenboom.it wrote:
On 2015-06-26 17:51, Jan Beulich wrote:
On 26.06.15
On Tue, 2015-07-07 at 17:22 +0100, Julien Grall wrote:
diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
index e1632fa..11f6461 100644
--- a/tools/libxl/libxl_types.idl
+++ b/tools/libxl/libxl_types.idl
@@ -369,6 +369,12 @@ libxl_vnode_info = Struct(vnode_info, [
flight 59139 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59139/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are
On Wed, 2015-07-08 at 08:54 +0800, Chen, Tiejun wrote:
+none is the default value and it means we don't check any reserved
regions
+and then all rdm policies would be ignored. Guest just works as before and
+the conflict of RDM and guest address space wouldn't be handled, and then
+this
On 08/07/2015 09:45, Sander Eikelenboom wrote:
Monday, July 6, 2015, 11:33:09 AM, you wrote:
On 26.06.15 at 17:57, li...@eikelenboom.it wrote:
On 2015-06-26 17:51, Jan Beulich wrote:
On 26.06.15 at 17:41, li...@eikelenboom.it wrote:
from 3.16 to 3.19 we gained a lot of these, if i remember
flight 59143 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59143/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 15 guest-localmigrate/x10
fail REGR. vs. 59031
From: Wu, Feng
Sent: Wednesday, June 24, 2015 1:18 PM
Currently, we don't support urgent interrupt, all interrupts
are recognized as non-urgent interrupt, so we cannot send
posted-interrupt when 'SN' is set.
Signed-off-by: Feng Wu feng...@intel.com
---
v3:
use cmpxchg to test SN/ON
Hi,
On 08/07/2015 09:56, Jan Beulich wrote:
--- a/xen/include/asm-arm/irq.h
+++ b/xen/include/asm-arm/irq.h
@@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d,
void arch_move_irqs(struct vcpu *v);
+#define arch_evtchn_bind_pirq(d, pirq) ((void)((d) + (pirq)))
+
This addition is here
On Wed, 2015-07-08 at 17:06 +0800, Chen, Tiejun wrote:
#2. Don't expose ignore to user and just keep host as the default
He told me he would discuss this with you, but sounds he didn't do this,
or I'm missing something here?
My question was regarding how xl rdm=type=none differed from not
On Tue, 2015-07-07 at 18:43 +0200, Dario Faggioli wrote:
only the interface is left in place, for backward
compile-time compatibility, but every attempt to
use it would throw an error.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
---
Cc: George Dunlap george.dun...@eu.citrix.com
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Tuesday, June 30, 2015 1:07 AM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: k...@xen.org; jbeul...@suse.com; Tian, Kevin; Zhang, Yang Z;
george.dun...@eu.citrix.com
Subject: Re: [v3 12/15] vmx:
David,
I'm afraid we'll need another fixup here, even if things build fine
despite the removal.
Thanks, Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 2015年07月08日 14:26, xinyue wrote:
Very sorry for sending wrong before.
On 2015年07月08日 14:13, xinyue wrote:
On 2015年07月07日 19:49, Ian Campbell wrote:
On Tue, 2015-07-07 at 11:24 +0800, xinyue wrote:
Please don't use HTML mail and do proper quoting
And after analyzing the performance of
On 19.06.15 at 20:44, boris.ostrov...@oracle.com wrote:
While making another scan through this series now that some more
reviews from Dietmar are trickling in, I notice:
Boris Ostrovsky (15):
common/symbols: Export hypervisor symbols to privileged guest
x86/VPMU: Add public xenpmu.h
On 08.07.15 at 10:33, feng...@intel.com wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, July 08, 2015 4:13 PM
On 08.07.15 at 09:06, feng...@intel.com wrote:
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper
1 - 100 of 263 matches
Mail list logo