.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
---
V3:
- correct error message (Paul Durrant)
---
xen/common/grant_table.c | 82 ++--
1 file changed, 45 insertions(+), 37 deletions(-)
diff --git a/xen/common/grant_table.c b/xen/common
4: correct error message (Paul Durrant)
- patch 6: rename *gnttbl* to *gnttab* (Paul Durrant)
Changes in V2:
- add per-domain grant limits instead of different v1 and v2 limits
- double default limit for huge hosts
Juergen Gross (8):
xen: move XENMAPSPACE_grant_table code into grant_table.c
Add a new libxc function xc_domain_set_gnttbl_limits() setting the
limits for the maximum numbers of grant table frames and maptrack
frames of a domain.
Signed-off-by: Juergen Gross
---
tools/libxc/include/xenctrl.h | 14 ++
tools/libxc/xc_domain.c | 13 +
2 files
Many definitions can be moved from xen/grant_table.h to
common/grant_table.c now, as they are no longer used in other sources.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Reviewed-by: Wei Liu
---
xen/common/grant_table.c | 83 --
xen
The x86 and arm versions of XENMAPSPACE_grant_table handling are nearly
identical. Move the code into a function in grant_table.c and add an
architecture dependant hook to handle the differences.
Switch to mfn_t in order to be more type safe.
Signed-off-by: Juergen Gross
Reviewed-by: Paul
Add a domctl hypercall to set the domain's resource limits regarding
grant tables. It is accepted only as long as neither
gnttab_setup_table() has been called for the domain, nor the domain
has started to run.
Signed-off-by: Juergen Gross
---
V3:
- rename *gnttbl* to *gnttab* (Paul Du
Delay the allocation of the grant table sub structures in order to
allow modifying parameters needed for sizing of these structures at a
per domain basis. Either do it from gnttab_setup_table() or just
before the domain is started the first time.
Signed-off-by: Juergen Gross
---
V3:
- move call
Add new domain config items for setting the limits for the maximum
numbers of grant table frames and maptrack frames of a domain.
Signed-off-by: Juergen Gross
---
docs/man/xl.cfg.pod.5.in| 15 +++
tools/libxl/libxl.h | 6 ++
tools/libxl/libxl_dom.c | 8
On 06/09/17 17:11, Wei Liu wrote:
> On Wed, Sep 06, 2017 at 02:46:48PM +0200, Juergen Gross wrote:
>> diff --git a/xen/common/domain.c b/xen/common/domain.c
>> index 5aebcf265f..11eb1778a3 100644
>> --- a/xen/common/domain.c
>> +++ b/xen/common/domain.c
>>
avoid this disable the virt_spin_lock_key.
Signed-off-by: Juergen Gross
---
arch/x86/xen/spinlock.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/arch/x86/xen/spinlock.c b/arch/x86/xen/spinlock.c
index 25a7c4302ce7..e8ab80ad7a6f 100644
--- a/arch/x86/xen/spinlock.c
+++ b/arch/x86/xen/spinlock.
static key controlling whether virt_spin_lock() should be
called or not. When running on bare metal set the new key to false.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/qspinlock.h | 11 +++
arch/x86/kernel/paravirt-spinlocks.c | 6 ++
arch/x86/kernel/smpboot.c
metal behavior.
V2:
- use static key instead of making virt_spin_lock() a pvops function
Juergen Gross (2):
paravirt/locks: use new static key for controlling call of
virt_spin_lock()
paravirt,xen: correct xen_nopvspin case
arch/x86/include/asm/qspinlock.h | 11 +++
arch/x86
On 06/09/17 17:32, Wei Liu wrote:
> On Wed, Sep 06, 2017 at 05:15:46PM +0200, Juergen Gross wrote:
>>>> +grant_table_init(struct domain *d)
>>>> +{
>>>> +struct grant_table *gt = d->grant_table;
>>>> +unsigned int i, j;
>>>
of __WARN()
Arvind Yadav (1):
xen-platform: constify pci_device_id.
Boris Ostrovsky (1):
xen: Don't try to call xen_alloc_p2m_entry() on autotranslating guests
Juergen Gross (4):
xen: cleanup xen.h
xen: remove tests for pvh mode in pure pv paths
xen: remove u
On 06/09/17 18:13, Waiman Long wrote:
> On 09/06/2017 12:04 PM, Peter Zijlstra wrote:
>> On Wed, Sep 06, 2017 at 11:49:49AM -0400, Waiman Long wrote:
#define virt_spin_lock virt_spin_lock
static inline bool virt_spin_lock(struct qspinlock *lock)
{
+ if (!static_branch_likely
static key controlling whether virt_spin_lock() should be
called or not. When running on bare metal set the new key to false.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/qspinlock.h | 11 ++-
arch/x86/kernel/paravirt-spinlocks.c | 6 ++
arch/x86/kernel/smpboot.c
metal behavior.
V3:
- remove test for hypervisor environment from virt_spin_lock(9 as
suggested by Waiman Long
V2:
- use static key instead of making virt_spin_lock() a pvops function
Juergen Gross (2):
paravirt/locks: use new static key for controlling call of
virt_spin_lock()
paravirt
avoid this disable the virt_spin_lock_key.
Signed-off-by: Juergen Gross
---
arch/x86/xen/spinlock.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/arch/x86/xen/spinlock.c b/arch/x86/xen/spinlock.c
index 25a7c4302ce7..e8ab80ad7a6f 100644
--- a/arch/x86/xen/spinlock.c
+++ b/arch/x86/xen/spinlock.
On 07/09/17 10:55, Wei Liu wrote:
> On Wed, Sep 06, 2017 at 02:46:52PM +0200, Juergen Gross wrote:
>> Add a new libxc function xc_domain_set_gnttbl_limits() setting the
>> limits for the maximum numbers of grant table frames and maptrack
>> frames of a domain.
>>
>
On 07/09/17 11:02, Wei Liu wrote:
> On Wed, Sep 06, 2017 at 02:46:53PM +0200, Juergen Gross wrote:
>> Add new domain config items for setting the limits for the maximum
>> numbers of grant table frames and maptrack frames of a domain.
>>
>> Signed-off-by: Juergen
In case a system has memory above the 16TB boundary double the default
grant frame number limit per domain. This ensures a pv domain can still
establish the same number of grants even if it is required to use
version 2 grants which need twice the space of v1 grants.
Signed-off-by: Juergen Gross
Add a domctl hypercall to set the domain's resource limits regarding
grant tables. It is accepted only as long as neither
gnttab_setup_table() has been called for the domain, nor the domain
has started to run.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Reviewed-by: Wei Liu
-
Delay the allocation of the grant table sub structures in order to
allow modifying parameters needed for sizing of these structures at a
per domain basis. Either do it from gnttab_setup_table() or just
before the domain is started the first time.
Signed-off-by: Juergen Gross
Reviewed-by: Paul
Add new domain config items for setting the limits for the maximum
numbers of grant table frames and maptrack frames of a domain.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
---
V4:
- rename configuration items to use max_ prefixes (Wei Liu)
---
docs/man/xl.cfg.pod.5.in| 15
instead of different v1 and v2 limits
- double default limit for huge hosts
Juergen Gross (8):
xen: move XENMAPSPACE_grant_table code into grant_table.c
xen: clean up grant_table.h
xen: delay allocation of grant table sub structures
xen: make grant resource limits per domain
xen: double
Many definitions can be moved from xen/grant_table.h to
common/grant_table.c now, as they are no longer used in other sources.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Reviewed-by: Wei Liu
---
xen/common/grant_table.c | 83 --
xen
Add a new libxc function xc_domain_set_gnttbl_limits() setting the
limits for the maximum numbers of grant table frames and maptrack
frames of a domain.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Acked-by: Wei Liu
---
V4:
- use domid_t (Wei Liu)
---
tools/libxc/include/xenctrl.h
The x86 and arm versions of XENMAPSPACE_grant_table handling are nearly
identical. Move the code into a function in grant_table.c and add an
architecture dependant hook to handle the differences.
Switch to mfn_t in order to be more type safe.
Signed-off-by: Juergen Gross
Reviewed-by: Paul
.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Reviewed-by: Wei Liu
---
V3:
- correct error message (Paul Durrant)
---
xen/common/grant_table.c | 82 ++--
1 file changed, 45 insertions(+), 37 deletions(-)
diff --git a/xen/common/grant_table.c b
On 07/09/17 16:41, Roger Pau Monné wrote:
> On Tue, Sep 05, 2017 at 12:37:12PM +0100, Paul Durrant wrote:
>> A subsequent patch will remove the current implicit limitation on creation
>> of ioreq servers which is due to the allocation of gfns for the ioreq
>> structures and buffered ioreq ring.
>>
On 08/09/17 05:40, John Thomson wrote:
> Hi,
> I get a PV domU kernel crash booting Arch Linux 4.12.
>
> Not sure if this is more relevant to Xen, the Linux kernel or
> distributions.
>
> Running xen-4.9.0 on Arch Linux x86_64 with kernel 4.12.10.
> Booting UEFI -> grub2 -> linux -> reboot -> gru
Add new domain config items for setting the limits for the maximum
numbers of grant table frames and maptrack frames of a domain.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Acked-by: Wei Liu
---
V4:
- rename configuration items to use max_ prefixes (Wei Liu)
---
docs/man
)
- patch 6: rename *gnttbl* to *gnttab* (Paul Durrant)
Changes in V2:
- add per-domain grant limits instead of different v1 and v2 limits
- double default limit for huge hosts
Juergen Gross (8):
xen: move XENMAPSPACE_grant_table code into grant_table.c
xen: clean up grant_table.h
xen: delay
Delay the allocation of the grant table sub structures in order to
allow modifying parameters needed for sizing of these structures at a
per domain basis. Either do it from gnttab_setup_table() or just
before the domain is started the first time.
Signed-off-by: Juergen Gross
Reviewed-by: Paul
.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Reviewed-by: Wei Liu
---
V3:
- correct error message (Paul Durrant)
---
xen/common/grant_table.c | 82 ++--
1 file changed, 45 insertions(+), 37 deletions(-)
diff --git a/xen/common/grant_table.c b
Add a new libxc function xc_domain_set_gnttbl_limits() setting the
limits for the maximum numbers of grant table frames and maptrack
frames of a domain.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Acked-by: Wei Liu
---
V4:
- use domid_t (Wei Liu)
---
tools/libxc/include/xenctrl.h
Add a domctl hypercall to set the domain's resource limits regarding
grant tables. It is accepted only as long as neither
gnttab_setup_table() has been called for the domain, nor the domain
has started to run.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Reviewed-by: Wei Liu
-
In case a system has memory above the 16TB boundary double the default
grant frame number limit per domain. This ensures a pv domain can still
establish the same number of grants even if it is required to use
version 2 grants which need twice the space of v1 grants.
Signed-off-by: Juergen Gross
The x86 and arm versions of XENMAPSPACE_grant_table handling are nearly
identical. Move the code into a function in grant_table.c and add an
architecture dependant hook to handle the differences.
Switch to mfn_t in order to be more type safe.
Signed-off-by: Juergen Gross
Reviewed-by: Paul
Many definitions can be moved from xen/grant_table.h to
common/grant_table.c now, as they are no longer used in other sources.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Reviewed-by: Wei Liu
---
xen/common/grant_table.c | 83 --
xen
On 08/09/17 16:49, Jan Beulich wrote:
On 08.09.17 at 08:56, wrote:
>> --- a/xen/arch/x86/mm.c
>> +++ b/xen/arch/x86/mm.c
>> @@ -4631,40 +4631,19 @@ int xenmem_add_to_physmap_one(
>> {
>> struct page_info *page = NULL;
>> unsigned long gfn = 0; /* gcc ... */
>> -unsigned long pr
der to support
migration to hosts which only support v1.
V2 is selected only in case the host has memory frames populated
above the 16TB border.
Juergen Gross (4):
xen: re-introduce support for grant v2 interface
xen: limit grant v2 interface to the v1 functionality
xen: add grant interf
s machines with more than 16TB of memory are expected to be more
common in the near future support of grant v2 is mandatory in order
to be able to run a Xen pv domain at any memory location.
So re-add grant v2 support basically by reverting above commit.
Signed-off-by: Juergen Gross
---
arch/arm
Instead of having multiple variables with constants like
grant_table_version or grefs_per_grant_frame add those to struct
gnttab_ops and access them just via the gnttab_interface pointer.
Signed-off-by: Juergen Gross
---
drivers/xen/grant-table.c | 73
Based on the maximum page number of the host select either grant v1 or
grant v2.
For testing purposes add a way to specify the grant interface version
via a boot parameter.
Signed-off-by: Juergen Gross
---
drivers/xen/grant-table.c | 13 +++--
1 file changed, 11 insertions(+), 2
-off-by: Juergen Gross
---
drivers/xen/grant-table.c | 138 --
include/xen/grant_table.h | 25 -
2 files changed, 163 deletions(-)
diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c
index 65c4bdb0b463..02451a696cc5 100644
--- a
On 05/10/17 16:28, Dario Faggioli wrote:
> Replace, in the 'M:' fields of the components I co-maintain
> ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix
> email, to which I don't have access any longer, with my
> personal emai
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.14c-rc5-tag
xen: fixes for 4.14 rc5
It contains a minor fix correcting the cpu hotplug name for Xen guests.
Thanks.
Juergen
arch/x86/xen/enlighten.c | 4 ++--
1 file changed, 2
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.14c-rc6-tag
xen: fix for 4.14-rc6
It contains a fix for the Xen pv network drivers (frontend and backend)
avoiding the network connection to become unusable due to an illegal
MTU.
On 06/10/17 15:30, Julien Grall wrote:
> Hi,
>
> On 27/09/17 15:36, Wei Liu wrote:
>> On Tue, Sep 26, 2017 at 02:02:56PM +0200, Juergen Gross wrote:
>>> Long ago domains to be saved were limited to 1TB size due to the
>>> migration stream v1 limitations which us
On 03/10/17 23:33, Boris Ostrovsky wrote:
> On 10/02/2017 05:37 PM, HW42 wrote:
>> Juergen Gross:
>>> When setting up the Xenstore watch for the memory target size the new
>>> watch will fire at once. Don't try to reach the configured target size
>>> by
online new memory initially")
Suggested-by: Boris Ostrovsky
Signed-off-by: Juergen Gross
---
drivers/xen/xen-balloon.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/drivers/xen/xen-balloon.c b/drivers/xen/xen-balloon.c
index e89136ab851e..374
On 04/10/17 17:58, Josh Poimboeuf wrote:
> Since lguest was removed, only the native version of wbinvd() is used.
> The paravirt interface is no longer needed.
>
> Signed-off-by: Josh Poimboeuf
Reviewed-by: Juergen Gross
Juergen
_
On 24/10/17 16:33, Boris Ostrovsky wrote:
> On 10/24/2017 04:10 AM, Juergen Gross wrote:
>> Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xen/balloon: don't
>> online new memory initially") introduced a regression when booting a
>> HVM domain with
On 24/10/17 16:56, Boris Ostrovsky wrote:
> On 10/24/2017 10:41 AM, Juergen Gross wrote:
>> On 24/10/17 16:33, Boris Ostrovsky wrote:
>>> On 10/24/2017 04:10 AM, Juergen Gross wrote:
>>>> Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xen/balloon: don
On 24/10/17 16:59, HW42 wrote:
> Juergen Gross:
>> On 24/10/17 16:56, Boris Ostrovsky wrote:
>>> On 10/24/2017 10:41 AM, Juergen Gross wrote:
>>>> On 24/10/17 16:33, Boris Ostrovsky wrote:
>>>>> On 10/24/2017 04:10 AM, Juergen Gross wrote:
>>&
On 24/10/17 18:06, Julien Grall wrote:
> Hi,
>
> I think this is 4.10 material (particularly patch #5). Juergen, would it
> be possible get the some feedback on this series?
Patch 5: Reviewed-by: Juergen Gross
Juergen
>
> Cheers,
>
> On 12/10/17 20:19, Andrew Coo
On 04/10/17 17:58, Josh Poimboeuf wrote:
> Some of the paravirt '*_CLOBBERS' macros refer to output constraints
> instead of clobbers, which makes the code extra confusing. Rename the
> output constraint related macros to '*_OUTPUTS'.
>
> Signed-off-by: Josh Poimboeuf
I'm fine with the changes,
'%' characters instead of one when specifying
> a register name.
>
> Signed-off-by: Josh Poimboeuf
Reviewed-by: Juergen Gross
Mind adding another patch to merge the now nearly identical
paravirt_patch_32.c and paravirt_patch_64.c either into paravirt.c
or paravirt_patch.c? This
extended asm syntax so the NATIVE_* macros can be shared more
> broadly.
>
> Signed-off-by: Josh Poimboeuf
Reviewed-by: Juergen Gross
Juergen
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 04/10/17 17:58, Josh Poimboeuf wrote:
> The paravirt.h file is quite big and the asm interfaces for paravirt
> don't need to be in the same file as the C interfaces. Move the asm
> interfaces to a dedicated header file.
>
> Signed-off-by: Josh Poimboeuf
Reviewed-by: Juer
On 04/10/17 17:58, Josh Poimboeuf wrote:
> Some cleanup to make the code easier to read and understand:
>
> - Use the common "PV_" prefix
> - Simplify the PV_SITE macro interface
> - Improve whitespace
>
> Signed-off-by: Josh Poimboeuf
Review
On 04/10/17 17:58, Josh Poimboeuf wrote:
> Remove the inline asm duplication in PVOP_CALL().
>
> Also add 'IS_ENABLED(CONFIG_X86_32)' to the return variable logic,
> making the code clearer and rendering the comment unnecessary.
>
> Signed-off-by: Josh Poimboeuf
On 04/10/17 17:58, Josh Poimboeuf wrote:
> Make paravirt_types.h more understandable:
>
> - Use more consistent and logical naming
> - Simplify interfaces
> - Put related macros together
> - Improve whitespace
>
> Signed-off-by: Josh Poimboeuf
Reviewed-by:
On 04/10/17 17:58, Josh Poimboeuf wrote:
> The ALTERNATIVE() and ALTERNATIVE_2() macros are GNU assembler macros,
> which makes them quite inflexible for future changes. Convert them to
> preprocessor macros.
>
> Signed-off-by: Josh Poimboeuf
Reviewed-by: Juergen G
On 04/10/17 17:58, Josh Poimboeuf wrote:
> Add alternative patching support for replacing an instruction with an
> indirect call. This will be needed for the paravirt alternatives.
>
> Signed-off-by: Josh Poimboeuf
> ---
> arch/x86/kernel/alternative.c | 22 +++---
> 1 file chan
On 25/10/17 13:17, Arthur Borsboom wrote:
> Since about a month, possibly due to software updates, after a couple of
> days running several VMs, one of the VM guests crashes and the VM host
> is not stable anymore. I need to shutdown all the remaining VM guests
> (if possible) and reboot the server
little bit
earlier.
Cc:
Reported-by: Arthur Borsboom
Signed-off-by: Juergen Gross
---
drivers/xen/gntdev.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
index 82360594fa8e..57efbd3b053b 100644
--- a/drivers/xen/gntdev.c
+++ b
On 24/10/17 12:09, Andrew Cooper wrote:
> On 23/10/17 11:20, Juergen Gross wrote:
>> On 06/10/17 15:30, Julien Grall wrote:
>>> Hi,
>>>
>>> On 27/09/17 15:36, Wei Liu wrote:
>>>> On Tue, Sep 26, 2017 at 02:02:56PM +0200, Juergen Gross wrote:
>&g
online new memory initially")
Reported-by: Simon Gaiser
Suggested-by: Boris Ostrovsky
Signed-off-by: Juergen Gross
---
drivers/xen/xen-balloon.c | 19 +--
1 file changed, 13 insertions(+), 6 deletions(-)
diff --git a/drivers/xen/xen-balloon.c b/drivers/xen/xe
On 27/10/17 09:16, Dongli Zhang wrote:
> Hi Boris,
>
> On 10/25/2017 11:12 PM, Boris Ostrovsky wrote:
>> On 10/25/2017 02:45 AM, Dongli Zhang wrote:
>>> After guest live migration on xen, steal time in /proc/stat
>>> (cpustat[CPUTIME_STEAL]) might decrease because steal returned by
>>> xen_steal_l
/xen/p2m.c| 2 +-
drivers/xen/gntdev.c | 2 +-
drivers/xen/xen-balloon.c | 19 +--
4 files changed, 15 insertions(+), 9 deletions(-)
Juergen Gross (3):
xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap()
xen: fix booting ballooned down hvm
On 27/10/17 09:40, Dongli Zhang wrote:
> Hi Juergen,
>
> On 10/27/2017 03:31 PM, Juergen Gross wrote:
>> On 27/10/17 09:16, Dongli Zhang wrote:
>>> Hi Boris,
>>>
>>> On 10/25/2017 11:12 PM, Boris Ostrovsky wrote:
>>>> On 10/25/2017 02:45 AM, D
ing all non-dom0 requests with
> an EACCES).
>
> Testing: reproduced with the following command:
> python -c 'print 16*"\x00"' | nc -U $XENSTORED_RUNDIR/socket
>
> Signed-off-by: Pawel Wieczorkiewicz
> Reviewed-by: Martin Pohlack
Reviewed-by: Juergen
>> call of virt_spin_lock()")
>>>
>>> set the static virt_spin_lock_key to a value before jump_label_init()
>>> has been called, which will result in a WARN().
>>>
>>> Move the native_pv_lock_init() into xx_smp_prepare_cpus(). Make the
>>> setup
sult in a WARN().
>
> Move the native_pv_lock_init() into xx_smp_prepare_cpus(). Make the
> setup later to avoid the WARN().
>
> Reported-by: Juergen Gross
> Suggested-by: Juergen Gross
> Signed-off-by: Dou Liyang
> ---
> arch/x86/kernel/smpboot.c | 3 ++-
> arch
reading/writing a MFN from/to a pte don't use the kernel's
PTE_PFN_MASK but a new XEN_PTE_MFN_MASK allowing full 40 bit wide MFNs.
Signed-off-by: Juergen Gross
---
V2:
- use __sme_clr() to clear any SME bit from MFN (Boris Ostrovsky)
---
arch/x86/include/asm/xen/page.h | 11 ++-
On 28/10/17 09:34, Arthur Borsboom wrote:
> Hi Juergen,
>
> I have noticed that a patch has been developed an awaits the upcoming
> Linux kernel 4.14, maybe 4.15.
> In the mean time the server keeps crashing about every 2 days.
>
> Do you know a workaround I can apply?
Depends on why this happen
On 28/10/17 12:55, Borislav Petkov wrote:
> On Fri, Oct 27, 2017 at 07:25:04PM +0200, Juergen Gross wrote:
>>>> This is assuming CPU 0 is the boot cpu. I think you want
>>>> boot_cpu_data.cpu_index here or whatever is used on xen to identify the
>>>> BSP
On 30/10/17 06:26, Dongli Zhang wrote:
> After guest live migration on xen, steal time in /proc/stat
> (cpustat[CPUTIME_STEAL]) might decrease because steal returned by
> xen_steal_lock() might be less than this_rq()->prev_steal_time which is
> derived from previous return value of xen_steal_clock(
e8 df 2a 7b 00 5b
> 41 5c 5d c3 48 89 fa 48 c7 c6 40 93 a3 81 48 c7 c7 00 8b cb 81 e8 95 b5
> f3 ff <0f> ff eb a8 0f ff eb b3 48 89 df e8 14 fc ff ff eb c7 66 90 e8
> [ 0.00] ---[ end trace c12d07f00399ce78 ]---
> [ 0.00] Built 2 zonelists, mobility grouping on. Tot
On 30/10/17 09:05, Arthur Borsboom wrote:
> Hi Juergen,
>
> I needed to wait until the VM guest crashed again, so that caused this
> delay.
> I have extracted the hypervisor dmesg and the dom0 dmesg which can be
> found in the PasteBins.
> It is always the same domain crashing, if that is of any h
through to the approprate
> xlate_mmu function if the feature is present.
>
> This patch also moves xen_remap_domain_gfn_range() into the PV-only MMU
> code and #ifdefs the (only) calling code in privcmd accordingly.
>
> Signed-off-by: Paul Durrant
> ---
> Cc: Boris Ostro
On 01/11/17 14:45, Paul Durrant wrote:
>> -Original Message-
>> From: Juergen Gross [mailto:jgr...@suse.com]
>> Sent: 01 November 2017 13:40
>> To: Paul Durrant ; x...@kernel.org; xen-
>> de...@lists.xenproject.org; linux-ker...@vger.kernel.org
>> C
On 01/11/17 16:32, Waiman Long wrote:
> Currently, there are 3 different lock types that can be chosen for
> the x86 architecture:
>
> - qspinlock
> - pvqspinlock
> - unfair lock
>
> One of the above lock types will be chosen at boot time depending on
> a number of different factors.
>
> Idea
On 02/11/17 07:57, Rakesh Awanti wrote:
> Hello,
>
> I'm trying USB passthrough on x86 and ARM platforms. I've taken the USB
> frontend and backend code from
So from where?
Juergen
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen
Instead of having multiple variables with constants like
grant_table_version or grefs_per_grant_frame add those to struct
gnttab_ops and access them just via the gnttab_interface pointer.
Signed-off-by: Juergen Gross
Reviewed-by: Boris Ostrovsky
---
drivers/xen/grant-table.c | 73
s machines with more than 16TB of memory are expected to be more
common in the near future support of grant v2 is mandatory in order
to be able to run a Xen pv domain at any memory location.
So re-add grant v2 support basically by reverting above commit.
Signed-off-by: Juergen Gross
---
arch/arm
for version select
Juergen Gross (5):
xen: re-introduce support for grant v2 interface
xen: limit grant v2 interface to the v1 functionality
xen: add grant interface version dependent constants to gnttab_ops
xen: update arch/x86/include/asm/xen/cpuid.h
xen: select grant interface vers
-off-by: Juergen Gross
---
V2:
- remove update_trans_entry() from gnttab_ops (Boris Ostrovsky)
---
drivers/xen/grant-table.c | 150 --
include/xen/grant_table.h | 25
2 files changed, 175 deletions(-)
diff --git a/drivers/xen/grant-table.c b
to specify the grant interface version
via a boot parameter.
Signed-off-by: Juergen Gross
---
V2:
- use cpuid on pv and max_possible_pfn on hvm for version select
---
drivers/xen/grant-table.c | 35 +--
1 file changed, 33 insertions(+), 2 deletions(-)
diff --git a
Update arch/x86/include/asm/xen/cpuid.h from the Xen tree to get newest
definitions.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/xen/cpuid.h | 42 ++--
1 file changed, 32 insertions(+), 10 deletions(-)
diff --git a/arch/x86/include/asm/xen/cpuid.h
On 02/11/17 08:56, Francesco De Francesco wrote:
> Hi everyone,
>
> I need to address an issue that prevents me from running Xen on new
> hardware. It's an HPE DL360 Gen10 with double Xeon Silver 4108 CPU and
> 256GB ECC DDR4 RDIMM. It happens with both CentOS6 and CentOS7.
>
> When I try to boot
On 02/11/17 14:25, Waiman Long wrote:
> On 11/01/2017 06:01 PM, Boris Ostrovsky wrote:
>> On 11/01/2017 04:58 PM, Waiman Long wrote:
>>> +/* TODO: To be removed in a future kernel version */
>>> static __init int xen_parse_nopvspin(char *arg)
>>> {
>>> - xen_pvspin = false;
>>> + pr_warn("xen
On 02/11/17 08:37, Rakesh Awanti wrote:
>>> Hello,
>>>
>>> I'm trying USB passthrough on x86 and ARM platforms. I've taken the USB
>>> frontend and backend code from
>
>>So from where?
>
>
> https://lists.xen.org/archives/html/xen-devel/2015-02/msg03245.html
The backend driver was discarded a
On 02/11/17 23:18, Boris Ostrovsky wrote:
> For any other error sync_cmos_clock() will reschedule itself
> every second or so, for no good reason.
>
> Suggested-by: Paolo Bonzini
> Signed-off-by: Boris Ostrovsky
Reviewed-by: Juergen G
On 02/11/17 19:41, Gustavo A. R. Silva wrote:
> In preparation to enabling -Wimplicit-fallthrough, mark switch cases
> where we are expecting to fall through.
>
> Addresses-Coverity-ID: 146562
> Addresses-Coverity-ID: 146563
> Signed-off-by: Gustavo A. R. Silva
Reviewed
GCC is expecting to find.
>
> Signed-off-by: Gustavo A. R. Silva
Reviewed-by: Juergen Gross
Juergen
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
.
>
> Detected by CoverityScan, CID#1460358 ("Unsigned compared against 0")
>
> Fixes: 219681909913 ("xen/pvcalls: connect to the backend")
> Signed-off-by: Colin Ian King
Reviewed-by: Juergen Gross
Juergen
___
quot;)
>
> Fixes: cb1c7d9bbc87 ("xen/pvcalls: implement connect command")
> Signed-off-by: Colin Ian King
Reviewed-by: Juergen Gross
Juergen
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
701 - 800 of 3777 matches
Mail list logo