flight 117311 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117311/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 117258
test-armhf-armhf-libvirt-xsm 14
This run is configured for baseline tests only.
flight 73075 xen-4.7-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/73075/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
flight 117305 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117305/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 7 xen-boot fail REGR. vs. 115643
Just a quick follow-up, same behaviour with:
dom0 running CentOS 7 with
https://buildlogs.centos.org/centos/7/virt/x86_64/xen/kernel-4.9.70-29.el7.x86_64.rpm
domU running CentOS 7 with kernel-ml-4.14.7-1.el7.elrepo.x86_64
dom0 stacktrace:
[ 287.710812] [ cut here ]
[
About patch 16,
"Replace xenstore and console pfns with the correspondent mfns"
seems exactly contrary to what the code does.
Apart from that,
Reviewed-by: Samuel Thibault
Samuel
___
Xen-devel mailing list
About patch 15, it seems your terminal is set to see tabs as 4 spaces.
Where tabs are used, the mini-os source code assumes 8 spaces. Avoid
using tabs, just use spaces :)
And, avoid
for (list = dev_list; list->next != NULL; list = list->next);
better write
for (list = dev_list; list->next !=
Bruno Alvisio, on mar. 19 déc. 2017 15:42:08 -0800, wrote:
> +void suspend_gnttab(void)
> +{
> +#ifdef CONFIG_PARAVIRT
> +int i;
> +
> +for (i = 0; i < NR_GRANT_FRAMES; i++) {
> +HYPERVISOR_update_va_mapping((unsigned long)(((char *)gnttab_table)
> + PAGE_SIZE*i),
> +
Bruno Alvisio, on mar. 19 déc. 2017 15:42:07 -0800, wrote:
> Signed-off-by: Bruno Alvisio
Reviewed-by: Samuel Thibault
> ---
> events.c | 5 +
> include/events.h | 1 +
> kernel.c | 2 ++
> 3 files changed, 8
Again, I didn't find patch 11, so I got it from here
Bruno Alvisio, on mar. 19 déc. 2017 15:41:55 -0800, wrote:
> https://github.com/balvisio/mini-os/tree/feature/mini-os-suspend-support
There are indentation oddities bringing spurious hunks. Apart from that,
Reviewed-by: Samuel Thibault
Bruno Alvisio, on mar. 19 déc. 2017 15:42:05 -0800, wrote:
> Signed-off-by: Bruno Alvisio
> +void resume_time(void)
> +{
> +port = bind_virq(VIRQ_TIMER, _handler, NULL);
> +unmask_evtchn(port);
> +}
I'd say rather factorize it with init_time.
(you could even
Bruno Alvisio, on mar. 19 déc. 2017 15:42:03 -0800, wrote:
> For PV guests the pagetables reference the real MFNs rather than PFNs, so when
> the guest is resumed into a different area of a hosts memory, these will need
> to
> be rewritten. Thus for PV guests the MFNs need to be replaced with
Bruno Alvisio, on mar. 19 déc. 2017 15:42:04 -0800, wrote:
> Signed-off-by: Bruno Alvisio
Reviewed-by: Samuel Thibault
> ---
> kernel.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/kernel.c b/kernel.c
>
Bruno Alvisio, on mar. 19 déc. 2017 15:42:02 -0800, wrote:
> This function is necessary as part of the pre-suspend operation.
>
> Signed-off-by: Bruno Alvisio
> ---
> +void unmap_shared_info(void)
> +{
> +int rc;
> +
> +if ( (rc =
Bruno Alvisio, on mar. 19 déc. 2017 15:42:00 -0800, wrote:
> + * NEC Europe Ltd. PROPRIETARY INFORMATION
> + *
> + * This software is supplied under the terms of a license agreement
> + * or nondisclosure agreement with NEC Europe Ltd. and may not be
> + * copied or disclosed except in
Bruno Alvisio, on mar. 19 déc. 2017 15:41:59 -0800, wrote:
> xenbus_release_wait_for_watch generates a fake event to trigger make
> xenbus_wait_for_watch return. This is necessary to wake up waiting threads.
Please also document the release_xenbus_id change.
> Signed-off-by: Bruno Alvisio
Bruno Alvisio, on mar. 19 déc. 2017 15:41:58 -0800, wrote:
> For mini-OS to support suspend and restore, the kernel will have to suspend
> different modules such as xenbus, console, irq, etc. During save/restore the
> kernel and arch pre_suspend and post_suspend functions will be invoked to
>
Bruno Alvisio, on mar. 19 déc. 2017 15:41:57 -0800, wrote:
> Currently the setup of the IDT and the request to set the HVM vector callbacks
> are performed both in the trap_init function.
>
> As part of the post-suspend operation, the HVM vector callback needs to be
> setup
> again while the IDT
Bruno Alvisio, on mar. 19 déc. 2017 15:41:56 -0800, wrote:
> Directly using the SHUTDOWN_suspend macro as a parameter for the schedop
> hypercall causes an error in the Xen hypercall handler. Also for consistency,
> the SHUTDOWN_suspend param is wrapped in the sched_shutdown struct.
>
>
This function is necessary as part of the pre-suspend operation.
Signed-off-by: Bruno Alvisio
---
arch/x86/setup.c | 12
hypervisor.c | 12
include/hypervisor.h | 1 +
3 files changed, 25 insertions(+)
diff --git
Currently the watch path is not saved in the watch struct when it is registered.
During xenbus resume the path is needed so that the watches can be registered
again.
Thus, 'path' field is added to struct watch so that watches can be re-registered
during xenbus resume.
Signed-off-by: Bruno
xenbus_release_wait_for_watch generates a fake event to trigger make
xenbus_wait_for_watch return. This is necessary to wake up waiting threads.
Signed-off-by: Bruno Alvisio
---
include/xenbus.h | 1 +
xenbus/xenbus.c | 10 +-
2 files changed, 10
Performed an additional cleanup to make the file more syntactically consistent.
Signed-off-by: Bruno Alvisio
---
include/netfront.h | 8 +-
kernel.c | 8 ++
netfront.c | 242 +
3 files changed,
Signed-off-by: Bruno Alvisio
---
kernel.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/kernel.c b/kernel.c
index 1cd40e8..782eb79 100644
--- a/kernel.c
+++ b/kernel.c
@@ -119,12 +119,12 @@ void start_kernel(void* par)
void pre_suspend(void)
For mini-OS to support suspend and restore, the kernel will have to suspend
different modules such as xenbus, console, irq, etc. During save/restore the
kernel and arch pre_suspend and post_suspend functions will be invoked to
suspend/resume each of the modules.
Signed-off-by: Bruno Alvisio
Currently the setup of the IDT and the request to set the HVM vector callbacks
are performed both in the trap_init function.
As part of the post-suspend operation, the HVM vector callback needs to be setup
again while the IDT does not. Thus, the trap_init function is split into two
separate
The shutdown thread present in kernel.c was removed and now the thread in
shutdown.c is created instead.
Signed-off-by: Bruno Alvisio
---
arch/x86/setup.c | 2 +-
include/kernel.h | 2 +-
kernel.c | 50 ++
3
For PV guests the pagetables reference the real MFNs rather than PFNs, so when
the guest is resumed into a different area of a hosts memory, these will need to
be rewritten. Thus for PV guests the MFNs need to be replaced with PFNs:
canonicalization.
PVH guests are auto-translated so no memory
Signed-off-by: Bruno Alvisio
---
gnttab.c | 33 +
include/gnttab.h | 2 ++
kernel.c | 4
3 files changed, 39 insertions(+)
diff --git a/gnttab.c b/gnttab.c
index 3f0e35f..a91c2e1 100644
--- a/gnttab.c
+++ b/gnttab.c
Signed-off-by: Bruno Alvisio
---
arch/x86/time.c | 13 +
include/time.h | 2 ++
kernel.c| 4
3 files changed, 19 insertions(+)
diff --git a/arch/x86/time.c b/arch/x86/time.c
index 3658142..8f79d69 100644
--- a/arch/x86/time.c
+++
Signed-off-by: Bruno Alvisio
---
events.c | 5 +
include/events.h | 1 +
kernel.c | 2 ++
3 files changed, 8 insertions(+)
diff --git a/events.c b/events.c
index e8ef8aa..342aead 100644
--- a/events.c
+++ b/events.c
@@ -183,6 +183,11 @@ void
Hi all,
I have been working on supporting save/restore for mini-os PVH. Some parts of
the implementation were taken from the sysml/mini-os repository. The branch can
be found at:
https://github.com/balvisio/mini-os/tree/feature/mini-os-suspend-support
Any feedback would be greatly appreciated.
flight 117314 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117314/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539
Tests which did not
I forgot to include this brief information about this patch series.
This patch series contains the implementation of a new device driver,
hyper_dmabuf, which provides a method for DMA-BUF sharing across
different OSes running on the same virtual OS platform powered by
a hypervisor.
Detailed
On Thu, Dec 07, 2017 at 04:39:37PM +0100, Daniel Kiper wrote:
> On Thu, Dec 07, 2017 at 04:08:31AM -0700, Jan Beulich wrote:
> > >>> On 04.12.17 at 11:24, wrote:
> > > --- a/xen/arch/x86/setup.c
> > > +++ b/xen/arch/x86/setup.c
> > > @@ -653,7 +653,7 @@ void __init
On Tue, Dec 12, 2017 at 02:42:50AM -0700, Jan Beulich wrote:
> >>> On 11.12.17 at 16:12, wrote:
> > On Thu, Dec 07, 2017 at 05:02:02AM -0700, Jan Beulich wrote:
> >> >>> On 04.12.17 at 11:24, wrote:
> >> > Current limit, PFN_DOWN(xen_phys_start),
flight 117289 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117289/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stopfail like 116623
test-xtf-amd64-amd64-2 49
Fixing all styling problems caught by checkpatch.pl
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.c| 53 ++--
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.h| 6 +-
drivers/xen/hyper_dmabuf/hyper_dmabuf_event.c | 12 +-
Adding ID check to make sure a dma-buf is exported externally
since hyper_dmabuf only allows to export a dmabuf to a different
VM.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_ioctl.c | 6 ++
1 file changed, 6 insertions(+)
diff --git
From: Mateusz Polrola
This introduces use of xenstore for creating and managing
communication channels between two VMs in the system.
When hyper_dmabuf driver is loaded in the service VM (host OS),
a new xenstore directory, "/local/domain//data/hyper_dmabuf"
is
List of queries is re-defined. Now it supports following
items:
enum hyper_dmabuf_query {
DMABUF_QUERY_TYPE = 0x10,
DMABUF_QUERY_EXPORTER,
DMABUF_QUERY_IMPORTER,
DMABUF_QUERY_SIZE,
DMABUF_QUERY_BUSY,
Now, released hyper_dmabuf_ids are stored in a stack -
(hyper_dmabuf_private.id_queue) for reuse. This is to prevent
overflow of ids for buffers. We also limit maximum number for
the id to 1000 for the stability and optimal performance.
Signed-off-by: Dongwon Kim
---
From: Mateusz Polrola
hyper_dmabuf driver is generic driver that is designed to work
with any hypervisor with various backend implementations. So
moving out its device node out of /dev/xen.
Signed-off-by: Mateusz Polrola
Signed-off-by:
Now, use CONFIG_HYPER_DMABUF_XEN as a configuration option
for building hyper_dmabuf for Xen hypervisor.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git
Use workqueue mechanism to delay message parsing done
after exiting from ISR to reduce ISR execution time.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.c| 13 ++
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.h| 5 +
From: Mateusz Polrola
Wrong vmid is used in case of sending HYPER_DMABUF_EXPORT_FD_FAILED
message. Instead of vmid, hypder dmabuf id is being used.
Signed-off-by: Mateusz Polrola
Signed-off-by: Dongwon Kim
---
Reordering clean-up procedure
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_ioctl.c | 37 +--
1 file changed, 24 insertions(+), 13 deletions(-)
diff --git a/drivers/xen/hyper_dmabuf/hyper_dmabuf_ioctl.c
From: Mateusz Polrola
If shared pages of buffer were already mapped on importer side, do
not map them again on next request to export fd.
Signed-off-by: Mateusz Polrola
Signed-off-by: Dongwon Kim
---
The length of hyper_dmabuf_id is increased to 128bit by adding
random key (96bit) to the id. This is to prevent possible leak
of the id by guessing on importer VM (by unauthorized application).
hyper_dmabuf_id_t is now defined as,
typedef struct {
int id;
int
To make type's name compact, *_backend_ops is changed to '*_bknd_ops'. Also
'ops' is now changed to 'bknd_ops' to clarify it is a data structure with
entry points of 'backend' operations.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.c|
This patch fixes several defects on event handling
including:
1. Imported sgt info and exported sgt info now have
buffer for private data (priv) with variable size
2. Now user input to export_remote_ioctl contain sz_priv,
which specifies size of private data (e.g. meta data)
3. Increased
To make hyper_dmabuf_export_remote_ioctl more compact and readable,
a new function call, 'fastpath_export' is created to replace a routine
in hyper_dmabuf_export_remote_ioctl for the case requested buffer for
exporting is already in the LIST (exported previously).
Signed-off-by: Dongwon Kim
From: Mateusz Polrola
Replaces printk to debug macros
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.c| 4 +-
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.h| 4 ++
sgt_info->priv will be used to store user private info passed in
ioctl. Data in sgt_info->priv is transfered via comm channel to
the importer VM whenever DMA_BUF is exported to keep the private
data synchroized across VMs.
This patch also adds hyper_dmabuf_send_export_msg that replaces
some of
Comm env intialization is now scheduled to be done
when xenstore is initialized. This scheduling is done
in driver's init routine.
Also, adding a recursively scheduled routine
that monitors any new tx ch setup from other domains
and automaticlaly configure rx channel accordingly
(every 10 sec).
hyper_dmabuf driver on importing domain now generates event
every time new hyper_dmabuf is available (visible) to the
importer.
Each event comes with 128 byte private data, which can
contain any meta data or user data specific to the originator
of DMA BUF.
Signed-off-by: Dongwon Kim
hyper_dmabuf's sync_request (previously hyper_dmabuf_sync_request_
and_wait) now does not wait for the response from exporter if
WAIT_AFTER_SYNC_REQ==0. This is to prevent peformance degradation
due to the communication latency while doing indirect hyper DMABUF
synchronization.
This patch also
Added missing mutex_unlock to make sure mutex is unlocked
before returning.
Also, moved spinlock lock/unlock into hyper_dmabuf_send_event
and remove checking on spinlock (with assumption caller does
the spinlock in advance) to make it more straight forward.
This patch includes a couple of minor
From: Mateusz Polrola
This change adds two query items, 'HYPER_DMABUF_QUERY_PRIV_INFO_SIZE'
and 'HYPER_DMABUF_QUERY_PRIV_INFO', for retrieving buffer's private
info and its size.
'info' is an address of user-space buffer (user application provides
this) ,where
Upload of intial version of hyper_DMABUF driver enabling
DMA_BUF exchange between two different VMs in virtualized
platform based on hypervisor such as KVM or XEN.
Hyper_DMABUF drv's primary role is to import a DMA_BUF
from originator then re-export it to another Linux VM
so that it can be mapped
From: Mateusz Polrola
When error occurs while sharing pages, all pages already shared
needs to be un-shared and proper error code has to be returned.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_ioctl.c | 6 ++-
From: Mateusz Polrola
Extending DMA bitmask of hyper_dmabuf device to cover whole
address space driver may access.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_ioctl.c | 2 +-
1 file changed, 1 insertion(+), 1
Re-orginized source code for more intuitive structure
For this,
1. driver's file operations other than ioctls have been moved to
hyper_dmabuf_drv.c.
2. Separated out dma-buf operations from hyper_dmabuf_ops.c
and put those in a new file, 'hyper_dmabuf_ops.c'. Remaining part
(SGT core
From: Mateusz Polrola
When exporter or importer is disconnected, ring buffer should be
reinitialzed, otherwise on next reconnection exporter/importer will
receive old requests/responses remaining in the ring buffer, which are
not valid anymore.
This patch also blocks
Now relaese funcs checks f_count for the file instead of
our own refcount because it can't track dma_buf_get.
Also, importer now sends out HYPER_DMABUF_FIRST_EXPORT
to let the exporter know corresponding dma-buf has ever
exported on importer's side. This is to cover the case
where exporter
From: Mateusz Polrola
Using a word, 'private' is not recommended because of conflict
with language keyword when compiling with C++.
So changing those to 'priv'.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_ioctl.c | 8
From: Mateusz Polrola
This patch addresses several synchronization issues while sharing
DMA_BUF with another VM.
1. Set WAIT_AFTER_SYNC_REQ to false by default to prevent possible
performance degradation when waing for the response for every
syncrhonization
Redefined nents_last, which means # of gref in the last page
of lvl2 table in any situation even if it is same as REFS_PER_PAGE.
With this, loop can be simplified with less condition check.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/xen/hyper_dmabuf_xen_shm.c
From: Mateusz Polrola
To prevent overhead when a DMA BUF needs to be exported right after
it is unexported, a marginal delay is introduced in unexporting process.
This adds a probation period to the unexporting process. If the same
DMA_BUF is requested to be exported
Cleaned up and corrected error codes and condition in various
error check routines. Also added proper err messages when func
returns error.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_drv.c| 14 +++--
Importer now sends a synchronization request to the
exporter when any of DMA_BUF operations on imported
Hyper_DMABUF is executed (e.g dma_buf_map and dma_buf_unmap).
This results in a creation of shadow DMA_BUF and exactly same
DMA_BUF operation to be executed on it.
The main purpose of this is
From: Mateusz Polrola
Added error checking on the result of function call,
dma_buf_map_attachment
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_ioctl.c | 5 +
1 file changed, 5 insertions(+)
diff --git
Set the license of the driver to "GPL and MIT-X dual" and owner
to "Intel". Also attached license term to all source and header
files
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_conf.h | 26 ++
From: Mateusz Polrola
Enabled built-in compilation option of hyper_dmabuf driver.
Also, moved backend initialization into open() to remove
its dependencies on Kernel booting sequence.
hyper_dmabuf.h is now installed as one of standard header
files of Kernel.
This
From: Mateusz Polrola
It is required to release all allocated buffers when the application
crashes. With the change, hyper_dmabuf_sgt_info includes file pointers
for the driver. If it's released unexpectedly, the driver is now
unexporting all already-exported buffers
From: Mateusz Polrola
It is needed to freeing already-mapped pages if it gets error
before finishing mapping all pages.
Signed-off-by: Dongwon Kim
---
.../xen/hyper_dmabuf/xen/hyper_dmabuf_xen_shm.c| 43 +++---
1 file
Now we re-use dma_buf instead of exporting it via normal process
(including new mappings). For this, hyper_dmabuf list entries can
be searched with "struct dma_buf*". Also, ioctl (export_remote) is
modified to just return hyper_dmabuf_id if the specific dmabuf
has already been exported to the
From: Michał Janiszewski
This adds two entries in SYSFS with information about imported
and exported entries. The information exposed contains details
about number of pages, whether a buffer is valid or not, and
importer/exporter count.
Sysfs for hyper_dmabuf can
hyper_dmabuf_importer_ring_setup creates new channel only if
there is no existing downstream communication channel previously
created for the exporter VM.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_imp.c | 13 +++--
From: Mateusz Polrola
Added mutex to export_fd ioctl to prevent double pages mapping of the
same buffer to prevent race condition when two consumers are trying to
map the same buffer on importer VM.
Also locked mutex before sending request via xen communication
Make sure list of mapping/attaching activities on impoter VM is not
empty before doing unmapping/detaching shadow DMA BUF for indirect
synchronization.
Signed-off-by: Dongwon Kim
---
.../xen/hyper_dmabuf/hyper_dmabuf_remote_sync.c| 68 +-
1 file
unexporting on exporter's side now have two options, one is
, that just remove and free everything to literally "disconnect"
from importer, the other is just to return fail if any apps
running on importer is still attached or DMAing. Currently whether
forcing or unforcing it is determined by how
From: Mateusz Polrola
Checking whether buffer has more than two pages should be done
by evaluating nents > 1 instead of i > 1 to properly cover the
case when nents == 2.
Signed-off-by: Dongwon Kim
---
Need a new index, k in hyper_dmabuf_extract_pgs function for
picking up a correct n-th page in contigous memory space.
Signed-off-by: Dongwon Kim
---
drivers/xen/hyper_dmabuf/hyper_dmabuf_imp.c | 11 ++-
1 file changed, 6 insertions(+), 5 deletions(-)
diff --git
From: Mateusz Polrola
In hyper_dmabuf_export_remote, page_info->pages needs to
be freed before freeing page_info.
Also, info_entry in hyper_dmabuf_remove_exported/imported
and hyper_dmabuf_remove_exporter/importer_ring needs to
be freed after removal of an entry.
Am 19.12.17 um 11:33 schrieb George Dunlap:
> On Sun, Dec 17, 2017 at 3:53 PM, Andreas Pflug
> wrote:
>> Still experiencing data corruption when migrating 3.16 VMs from one host
>> to another...
>> Seems independent of Xen version or storage backend.
>>
>> Regards
>>
On 18/12/2017 17:21, Yoni Bettan wrote:
according to Eduardo Habkost's commit fd3b02c889 all PCIEs now implement
INTERFACE_PCIE_DEVICE so we don't need is_express field anymore.
Devices that implements only INTERFACE_PCIE_DEVICE (is_express == 1)
or
devices that implements only
On Mon, Dec 18, 2017 at 05:21:40PM +0200, Yoni Bettan wrote:
> according to Eduardo Habkost's commit fd3b02c889 all PCIEs now implement
> INTERFACE_PCIE_DEVICE so we don't need is_express field anymore.
>
> Devices that implements only INTERFACE_PCIE_DEVICE (is_express == 1)
> or
> devices that
On 19/12/17 17:11, Roger Pau Monné wrote:
> On Tue, Dec 19, 2017 at 04:46:37PM +0100, Juergen Gross wrote:
>> On 19/12/17 16:38, Roger Pau Monné wrote:
>>> On Fri, Dec 01, 2017 at 03:14:07PM +0100, Juergen Gross wrote:
Instead of locating the RSDP table below 1MB put it just below 4GB
On Tue, Dec 19, 2017 at 04:46:37PM +0100, Juergen Gross wrote:
> On 19/12/17 16:38, Roger Pau Monné wrote:
> > On Fri, Dec 01, 2017 at 03:14:07PM +0100, Juergen Gross wrote:
> >> Instead of locating the RSDP table below 1MB put it just below 4GB
> >> like the rest of the ACPI tables in case of PVH
Juergen Gross writes ("[PATCH v2] libxl: put RSDP for PVH guest near 4GB"):
> Instead of locating the RSDP table below 1MB put it just below 4GB
> like the rest of the ACPI tables in case of PVH guests. This will
> avoid punching more holes than necessary into the memory map.
>
> Signed-off-by:
On 19/12/17 16:38, Roger Pau Monné wrote:
> On Fri, Dec 01, 2017 at 03:14:07PM +0100, Juergen Gross wrote:
>> Instead of locating the RSDP table below 1MB put it just below 4GB
>> like the rest of the ACPI tables in case of PVH guests. This will
>> avoid punching more holes than necessary into the
On Fri, Dec 01, 2017 at 03:14:07PM +0100, Juergen Gross wrote:
> Instead of locating the RSDP table below 1MB put it just below 4GB
> like the rest of the ACPI tables in case of PVH guests. This will
> avoid punching more holes than necessary into the memory map.
>
> Signed-off-by: Juergen Gross
Ping?
On 01/12/17 15:14, Juergen Gross wrote:
> Instead of locating the RSDP table below 1MB put it just below 4GB
> like the rest of the ACPI tables in case of PVH guests. This will
> avoid punching more holes than necessary into the memory map.
>
> Signed-off-by: Juergen Gross
On 12/19/2017 09:40 AM, Jan Beulich wrote:
On 19.12.17 at 15:25, wrote:
>> On 12/19/2017 03:23 AM, Jan Beulich wrote:
>> On 18.12.17 at 23:22, wrote:
+ if (!xen_e820_table)
+ return;
>>> Not saying "out of
On Tue, Dec 19, 2017 at 02:48:47PM +, Ian Jackson wrote:
> Roger Pau Monné writes ("Re: [PATCH] libxl/pvh: force PVH guests to use the
> xenstore shutdown"):
> > Yes, that's exactly what I meant but failed to express. Feel free to
> > replace the commit message with yours.
>
> OK, thanks
Roger Pau Monné writes ("Re: [PATCH] libxl/pvh: force PVH guests to use the
xenstore shutdown"):
> Yes, that's exactly what I meant but failed to express. Feel free to
> replace the commit message with yours.
OK, thanks :-). I have
Acked-by: Ian Jackson
and pushed
On Tue, Dec 19, 2017 at 07:25:51AM -0700, Jan Beulich wrote:
> >>> On 19.12.17 at 15:16, wrote:
> > --- a/xen/common/sched_null.c
> > +++ b/xen/common/sched_null.c
> > @@ -781,6 +781,10 @@ static struct task_slice null_schedule(const struct
> > scheduler *ops,
> >
Roger Pau Monne writes ("[PATCH] libxl/pvh: force PVH guests to use the
xenstore shutdown"):
> There's no other way to shutdown a PVH guest at the moment.
This commit message is rather confusing.
Do you mean, instead:
PVH guests are all required to support the xenstore-based shutdown
On 19/12/17 14:20, Roger Pau Monne wrote:
> Those where added when PVHv1 was sharing the domain builder with PV.
>
> Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
>>> On 19.12.17 at 15:20, wrote:
> Those where added when PVHv1 was sharing the domain builder with PV.
>
> Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
___
Xen-devel
1 - 100 of 115 matches
Mail list logo