Displaying 20 results from an estimated 47 matches for "xc_interfac".
Did you mean:
xc_interface
2011 Sep 08
5
[PATCH 0 of 2] v2: memshare/xenpaging/xen-access fixes for xen-unstable
The following two patches allow the parallel use of memsharing, xenpaging and
xen-access by using an independent ring buffer for each feature.
Please review.
v2:
- update mem_event_check_ring arguments, check domain rather than domain_id
- check ring_full first because its value was just evaluated
- check if ring buffer is initialized before calling
mem_access_domctl/mem_paging_domctl
2013 Mar 13
0
[PATCH 3 of 4] PoC: libxc+ocaml: add interfaces to send triggers to HVM guests
...gned-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
diff -r b279ec057736 -r 03997417771b tools/libxc/xc_domain.c
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -1562,6 +1562,36 @@ int xc_domain_get_acpi_s_state(xc_interf
return value;
}
+int xc_domain_trigger_power(xc_interface *xch, unsigned int domid)
+{
+ int ret;
+ DECLARE_DOMCTL;
+
+ domctl.cmd = XEN_DOMCTL_sendtrigger;
+ domctl.domain = domid;
+ domctl.u.sendtrigger.trigger = XEN_DOMCTL_SENDTRIGGER_POWER;
+
+ ret = do_domctl(xch, &domctl);
+ if (ret != 0)
+ ERROR("power button f...
2011 Jan 22
53
Xen 4.1 rc1 test report
Hi, All
Intel QA conducted a full validation for xen 4.1 rc1, it includes VT-x, VT-d, SRIOV, RAS, TXT and xl tools testing. 24 issues were exposed. Refer the bug list, please.
We already assigned 14 bugs to Intel developers (which has an ''Intel'' tag in the bug title), most of the rest 10 bugs are related xl command. For the these bugs, need community''s help to fix
2012 Apr 24
1
[PATCH] [resend] xen-access: Check return values and clean up on errors during init
...20,6 +121,7 @@ typedef struct xenaccess {
} xenaccess_t;
static int interrupted;
+bool evtchn_bind = 0, evtchn_open = 0, mem_access_enable = 0;
static void close_handler(int sig)
{
@@ -167,9 +169,68 @@ int xc_wait_for_event_or_timeout(xc_inte
return -errno;
}
+int xenaccess_teardown(xc_interface *xch, xenaccess_t *xenaccess)
+{
+ int rc;
+
+ if ( xenaccess == NULL )
+ return 0;
+
+ /* Tear down domain xenaccess in Xen */
+ if ( xenaccess->mem_event.ring_page )
+ munmap(xenaccess->mem_event.ring_page, PAGE_SIZE);
+
+ if ( mem_access_enable )
+ {
+...
2012 Jan 05
3
[PATCH 0 of 2] xenpaging:speed up page-in
The following two patches are about how to speed up in xenpaging when page in pages.
On suse11-64 with 4G memory,if we page out 2G pages,it will cost about 15.5 seconds,
but take 2088 seconds to finish paging in.If page-in costs too much time,it will cause
unmesurable problems when vm or dom0 access the paged_out page,such as BSOD,crash.
What鈥檚 more,the dom0 is always in high I/O pressure.
2011 Nov 29
10
[PATCH 0 of 2] Fix correctness race in xc_mem_paging_prep
ging_prep ensures that an mfn is backing the paged-out gfn, and
transitions to the next state in the paging state machine for this page.
Foreign mappings of the gfn will now succeed. This is the key idea, as it
allows the pager to now map the gfn and fill in its contents.
Unfortunately, it also allows any other foreign mapper to map the gfn and read
its contents. This is particularly dangerous
2011 Dec 16
13
[PATCH 0 of 4] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
Patch 1 modifies the guest ro and rw node creation to an open coding style
and cleans up some extraneous node creation.
Patch 2 modifies creation of the hvmloader key in xenstore and adds
2011 Dec 14
18
[PATCH 0 of 3] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
The first patch modifies creation of the hvmloader key in xenstore and adds
creation of a new read/write hvmloader/generation-id-addr key.
The second patch changes hvmloader to use the new key (as
2013 Sep 24
0
Bug#710650: Bug#718767: transition: ocaml 4.00.1
...bs.c:497:21: error: too few arguments to function 'xc_domain_save'
> c_flags, &callbacks, Bool_val(hvm));
> ^
> In file included from xenguest_stubs.c:23:0:
> /usr/include/xenguest.h:87:5: note: declared here
> int xc_domain_save(xc_interface *xch, int io_fd, uint32_t dom, uint32_t max_iters,
> ^
> xenguest_stubs.c: In function 'stub_xc_domain_restore':
> xenguest_stubs.c:552:10: warning: passing argument 7 of 'xc_domain_restore' makes integer from pointer without a cast [enabled by default]
>...
2011 Dec 14
9
[PATCH 0 of 2] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID
buffer address in xenstore across save/restore and migrate, and also
code to increment the value in all cases except for migration.
The vast majority of the code is in second patch. The first patch
merely changes the xenstore key name used by hvmloader to store the
buffer address.
2013 Apr 25
17
[PATCH V3] libxl: write IO ABI for disk frontends
...ols/libxc/xc_dom_arm.c b/tools/libxc/xc_dom_arm.c
index 041832e..aaf35ca 100644
--- a/tools/libxc/xc_dom_arm.c
+++ b/tools/libxc/xc_dom_arm.c
@@ -29,6 +29,13 @@
#define CONSOLE_PFN_OFFSET 0
#define XENSTORE_PFN_OFFSET 1
+/* get guest IO ABI protocol */
+const char *xc_domain_get_native_protocol(xc_interface *xch,
+ uint32_t domid)
+{
+ return XEN_IO_PROTO_ABI_ARM;
+}
+
/* ------------------------------------------------------------------------ */
/*
* arm guests are hybrid and start off with paging disabled, therefore no
diff --git a/tools/libxc/xc_dom_...
2013 Sep 24
2
Bug#710650: Bug#718767: transition: ocaml 4.00.1
On 09/24/2013 10:04 PM, St?phane Glondu wrote:
> Le 24/09/2013 15:48, St?phane Glondu a ?crit :
>> If I remove all binary packages of xen-api from testing, the following
>> new packages are broken: xcp-guest-templates, nova-xcp-plugins,
>> nova-compute-xen.
>>
>> xcp-guest-templates is built by guest-templates which seems to be a leaf
>> package and could be
2013 Jan 25
3
[PATCH] xenguest: Add xsa-25 decompression limit prototypes
...rs to also make use of the extra protection added as
a result of xsa-25.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
diff -r 5af4f2ab06f3 -r daec50a41570 tools/libxc/xenguest.h
--- a/tools/libxc/xenguest.h
+++ b/tools/libxc/xenguest.h
@@ -177,6 +177,13 @@ int xc_dom_linux_build(xc_interface *xch
unsigned int console_evtchn,
unsigned long *console_mfn);
+#ifndef XC_HAVE_DECOMPRESS_LIMITS
+#define XC_HAVE_DECOMPRESS_LIMITS
+#endif
+
+int xc_dom_kernel_max_size(struct xc_dom_image *dom, size_t sz);
+int xc_dom_ramdisk_max_size(struct xc_dom_image *dom, size_t sz);...
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output
locations, and fixes some assumptions that all interrupts behaved like
GSI interrupts (which had useful non-dynamic IDs). It also cleans up the
policy build process and adds an example of how to use the user field in
the security context.
Debug output:
[PATCH 01/10] xsm: Add security labels to event-channel dump
[PATCH 02/10] xsm:
2010 Nov 25
4
[PATCH]improve suspend_evtchn lock processing
...if (n > 0)
+ {
+ sscanf(buf, "%d", &pid);
+ /* pid does not exist, this lock file is obsolete, just delete it */
+ if ( kill(pid,0) )
+ {
+ unlink(suspend_file);
+ return;
+ }
+ }
+}
+
static int lock_suspend_event(xc_interface *xch, int domid)
{
int fd, rc;
@@ -27,6 +59,7 @@
snprintf(suspend_file, sizeof(suspend_file), "%s_%d_lock.d",
SUSPEND_LOCK_FILE, domid);
+ clean_obsolete_lock(domid);
mask = umask(022);
fd = open(suspend_file, O_CREAT | O_EXCL | O_RDWR, 0666);
if (...
2010 Aug 17
3
libxl build failure in latest xen
...a683b174 tools/libxl/xenguest.c
--- a/tools/libxl/xenguest.c Mon Aug 16 18:05:07 2010 +0100
+++ b/tools/libxl/xenguest.c Tue Aug 17 13:53:13 2010 +0800
@@ -20,6 +20,7 @@
#include <string.h>
#include "libxl.h"
+#include "libxl_internal.h"
int hvm_build_set_params(xc_interface *handle, uint32_t domid,
libxl_domain_build_info *info,
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2011 Dec 21
2
[PATCH] xenpm: assorted adjustments
...{
- int temp = errno;
+ ret = -errno;
free(cxstat->triggers);
free(cxstat->residencies);
cxstat->triggers = NULL;
cxstat->residencies = NULL;
- return temp;
}
- return 0;
+ return ret;
}
static int show_max_cstate(xc_interface *xc_handle)
@@ -214,14 +213,13 @@ static void print_pxstat(int cpuid, stru
for ( i = 0; i < pxstat->total; i++ )
{
if ( pxstat->cur == i )
- printf("*P%d", i);
+ printf("*P%-9d", i);
else
- printf("P%d &...
2012 Apr 17
2
[PATCH BUILD FIX 0/2] build xc_hvm_inject_msi on Xen < 4.2
Hi all,
this small patch series fixes the build breakage introduced by
f1dbf015dfb0aa7f66f710a1f1bc58b662951de2 with Xen < 4.2.
The problem is that xc_hvm_inject_msi is only defined from Xen 4.2
onwards so we need to provide a compatibility function for older Xen
versions.
Stefano Stabellini (2):
xen,configure: detect Xen 4.2
xen: add a dummy xc_hvm_inject_msi for Xen < 4.2
2011 Nov 29
18
[PATCH 0 of 6] Add support for a VM generation ID virtual device (v2)
The following is a revised patch series to add support for a
VM generation ID virtual device for HVM guests.
The basic requirements of this device are as follows:
- It must be exposed somewhere in ACPI namespace with a _CID of
"VM_Gen_Counter".
- It must also include a _DDN of "VM_Gen_Counter".
- It must contain a _HID object but no particular value is
required.
- It must
2012 Dec 13
3
[PATCH] xenconsoled: use grant references instead of map_foreign_range
...24,6 +24,7 @@
#include "io.h"
#include <xenstore.h>
#include <xen/io/console.h>
+#include <xen/grant_table.h>
#include <stdlib.h>
#include <errno.h>
@@ -69,6 +70,7 @@ static int log_hv_fd = -1;
static evtchn_port_or_error_t log_hv_evtchn = -1;
static xc_interface *xch; /* why does xenconsoled have two xc handles ? */
static xc_evtchn *xce_handle = NULL;
+static xc_gnttab *xcg_handle = NULL;
struct buffer {
char *data;
@@ -501,6 +503,17 @@ static int xs_gather(struct xs_handle *xs, const char *dir, ...)
va_end(ap);
return ret;
}
+
+static void do...