Displaying 20 results from an estimated 89 matches for "xch".
Did you mean:
ch
2011 Jan 22
53
Xen 4.1 rc1 test report
Hi, All
Intel QA conducted a full validation for xen 4.1 rc1, it includes VT-x, VT-d, SRIOV, RAS, TXT and xl tools testing. 24 issues were exposed. Refer the bug list, please.
We already assigned 14 bugs to Intel developers (which has an ''Intel'' tag in the bug title), most of the rest 10 bugs are related xl command. For the these bugs, need community''s help to fix
2013 Mar 13
0
[PATCH 3 of 4] PoC: libxc+ocaml: add interfaces to send triggers to HVM guests
...ndrew Cooper <andrew.cooper3@citrix.com>
diff -r b279ec057736 -r 03997417771b tools/libxc/xc_domain.c
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -1562,6 +1562,36 @@ int xc_domain_get_acpi_s_state(xc_interf
return value;
}
+int xc_domain_trigger_power(xc_interface *xch, unsigned int domid)
+{
+ int ret;
+ DECLARE_DOMCTL;
+
+ domctl.cmd = XEN_DOMCTL_sendtrigger;
+ domctl.domain = domid;
+ domctl.u.sendtrigger.trigger = XEN_DOMCTL_SENDTRIGGER_POWER;
+
+ ret = do_domctl(xch, &domctl);
+ if (ret != 0)
+ ERROR("power button failed&...
2013 Feb 21
4
help please - running a guest from an iSCSI disk ? getting more diagnostics than "cannot make domain: -3" ? how to make domain0 "privileged" ?
...at all , in dmesg output or
in the system log.
Tracing this command in gdb shows the hypervisor command is returning
-1, with errno set to 1 (EPERM) :
libxl: debug: libxl_create.c:1174:do_domain_create: ao 0x622890:
create: how=(nil) callback=(nil) poller=0x622920
Breakpoint 2, xc_domain_create (xch=0x622240, ssidref=0,
handle=handle@entry=0x7fffffffe1b0
"\316\260\203\242\376\252E\260\257\342;\324N\264\330\303\031",
flags=flags@entry=0, pdomid=pdomid@entry=0x7fffffffe28c) at xc_domain.c:33
33 {
(gdb) n
37 domctl.cmd = XEN_DOMCTL_createdomain;
(gdb)
38 domct...
2012 Apr 24
1
[PATCH] [resend] xen-access: Check return values and clean up on errors during init
...typedef struct xenaccess {
} xenaccess_t;
static int interrupted;
+bool evtchn_bind = 0, evtchn_open = 0, mem_access_enable = 0;
static void close_handler(int sig)
{
@@ -167,9 +169,68 @@ int xc_wait_for_event_or_timeout(xc_inte
return -errno;
}
+int xenaccess_teardown(xc_interface *xch, xenaccess_t *xenaccess)
+{
+ int rc;
+
+ if ( xenaccess == NULL )
+ return 0;
+
+ /* Tear down domain xenaccess in Xen */
+ if ( xenaccess->mem_event.ring_page )
+ munmap(xenaccess->mem_event.ring_page, PAGE_SIZE);
+
+ if ( mem_access_enable )
+ {
+ rc...
2011 Sep 08
5
[PATCH 0 of 2] v2: memshare/xenpaging/xen-access fixes for xen-unstable
The following two patches allow the parallel use of memsharing, xenpaging and
xen-access by using an independent ring buffer for each feature.
Please review.
v2:
- update mem_event_check_ring arguments, check domain rather than domain_id
- check ring_full first because its value was just evaluated
- check if ring buffer is initialized before calling
mem_access_domctl/mem_paging_domctl
2012 Apr 13
2
[PATCH] libxl: fix rtc_timeoffset setting
...d8 100644
--- a/tools/libxl/libxl_dom.c
+++ b/tools/libxl/libxl_dom.c
@@ -65,6 +65,8 @@ int libxl__build_pre(libxl__gc *gc, uint32_t domid,
libxl_ctx *ctx = libxl__gc_owner(gc);
int tsc_mode;
char *xs_domid, *con_domid;
+ uint32_t rtc_timeoffset;
+
xc_domain_max_vcpus(ctx->xch, domid, info->max_vcpus);
libxl_set_vcpuaffinity_all(ctx, domid, info->max_vcpus, &info->cpumap);
xc_domain_setmaxmem(ctx->xch, domid, info->target_memkb + LIBXL_MAXMEM_CONSTANT);
@@ -91,8 +93,19 @@ int libxl__build_pre(libxl__gc *gc, uint32_t domid,
if (libxl_defb...
2010 Nov 25
4
[PATCH]improve suspend_evtchn lock processing
...0)
+ {
+ sscanf(buf, "%d", &pid);
+ /* pid does not exist, this lock file is obsolete, just delete it */
+ if ( kill(pid,0) )
+ {
+ unlink(suspend_file);
+ return;
+ }
+ }
+}
+
static int lock_suspend_event(xc_interface *xch, int domid)
{
int fd, rc;
@@ -27,6 +59,7 @@
snprintf(suspend_file, sizeof(suspend_file), "%s_%d_lock.d",
SUSPEND_LOCK_FILE, domid);
+ clean_obsolete_lock(domid);
mask = umask(022);
fd = open(suspend_file, O_CREAT | O_EXCL | O_RDWR, 0666);
if (fd <...
2011 Dec 14
18
[PATCH 0 of 3] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
The first patch modifies creation of the hvmloader key in xenstore and adds
creation of a new read/write hvmloader/generation-id-addr key.
The second patch changes hvmloader to use the new key (as
2011 Dec 16
13
[PATCH 0 of 4] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
Patch 1 modifies the guest ro and rw node creation to an open coding style
and cleans up some extraneous node creation.
Patch 2 modifies creation of the hvmloader key in xenstore and adds
2011 Dec 14
9
[PATCH 0 of 2] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID
buffer address in xenstore across save/restore and migrate, and also
code to increment the value in all cases except for migration.
The vast majority of the code is in second patch. The first patch
merely changes the xenstore key name used by hvmloader to store the
buffer address.
2013 Apr 25
17
[PATCH V3] libxl: write IO ABI for disk frontends
...om_arm.c b/tools/libxc/xc_dom_arm.c
index 041832e..aaf35ca 100644
--- a/tools/libxc/xc_dom_arm.c
+++ b/tools/libxc/xc_dom_arm.c
@@ -29,6 +29,13 @@
#define CONSOLE_PFN_OFFSET 0
#define XENSTORE_PFN_OFFSET 1
+/* get guest IO ABI protocol */
+const char *xc_domain_get_native_protocol(xc_interface *xch,
+ uint32_t domid)
+{
+ return XEN_IO_PROTO_ABI_ARM;
+}
+
/* ------------------------------------------------------------------------ */
/*
* arm guests are hybrid and start off with paging disabled, therefore no
diff --git a/tools/libxc/xc_dom_x86.c...
2012 Nov 29
14
Mem_event API and MEM_EVENT_REASON_SINGLESTEP
...ested in capturing write events anywhere in a domU guest''s
memory, _and_ not just once for each page write, but every time a page
is being written to.
To this end, I''ve looked at the xen-access.c example, where at first all
the pages are being monitored:
xc_hvm_set_mem_access(xch, domain_id, HVMMEM_access_rx, ~0ull, 0);
xc_hvm_set_mem_access(xch, domain_id, HVMMEM_access_rx, 0,
xenaccess->domain_info->max_pages);
Then, after an event is received:
xc_hvm_set_mem_access(xch, domain_id, HVMMEM_access_rwx, req.gfn, 1);
thus allowing ''rwx'' access to 1...
2012 Jan 05
3
[PATCH 0 of 2] xenpaging:speed up page-in
The following two patches are about how to speed up in xenpaging when page in pages.
On suse11-64 with 4G memory,if we page out 2G pages,it will cost about 15.5 seconds,
but take 2088 seconds to finish paging in.If page-in costs too much time,it will cause
unmesurable problems when vm or dom0 access the paged_out page,such as BSOD,crash.
What鈥檚 more,the dom0 is always in high I/O pressure.
2011 Nov 10
3
[PATCH] libxl: use named options for tsc_mode
...+++ b/tools/libxl/libxl_dom.c Thu Nov 10 10:54:39 2011 +0000
@@ -73,12 +73,29 @@ int libxl__build_pre(libxl__gc *gc, uint
libxl_domain_build_info *info, libxl__domain_build_state *state)
{
libxl_ctx *ctx = libxl__gc_owner(gc);
+ int tsc_mode;
xc_domain_max_vcpus(ctx->xch, domid, info->max_vcpus);
xc_domain_setmaxmem(ctx->xch, domid, info->target_memkb + LIBXL_MAXMEM_CONSTANT);
if (info->type == LIBXL_DOMAIN_TYPE_PV)
xc_domain_set_memmap_limit(ctx->xch, domid,
(info->max_memkb + info->u.pv.slack_memkb));
-...
2013 Dec 01
70
[PATCH 00/13] Coverity fixes for libxl
Matthew Daley (13):
libxl: fix unsigned less-than-0 comparison in e820_sanitize
libxl: check for xc_domain_setmaxmem failure in libxl__build_pre
libxl: correct file open success check in libxl__device_pci_reset
libxl: don''t leak p in libxl__wait_for_backend
libxl: remove unsigned less-than-0 comparison
libxl: actually abort if initializing a ctx''s lock fails
libxl:
2012 Jan 25
26
[PATCH v4 00/23] Xenstore stub domain
Changes from v3:
- mini-os configuration files moved into stubdom/
- mini-os extra console support now a config option
- Fewer #ifdefs
- grant table setup uses hypercall bounce
- Xenstore stub domain syslog support re-enabled
Changes from v2:
- configuration support added to mini-os build system
- add mini-os support for conditionally compiling frontends, xenbus
-
2013 Dec 02
3
[PATCH] libxenctrl: Fix xc_interface_close() crash if it gets NULL as an argument
...tools/libxc/xc_private.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/tools/libxc/xc_private.c b/tools/libxc/xc_private.c
index 524862e..838fd21 100644
--- a/tools/libxc/xc_private.c
+++ b/tools/libxc/xc_private.c
@@ -198,6 +198,9 @@ static int xc_interface_close_common(xc_interface *xch)
{
int rc = 0;
+ if (!xch)
+ return 0;
+
xc__hypercall_buffer_cache_release(xch);
xtl_logger_destroy(xch->dombuild_logger_tofree);
--
1.7.10.4
2011 Nov 29
10
[PATCH 0 of 2] Fix correctness race in xc_mem_paging_prep
ging_prep ensures that an mfn is backing the paged-out gfn, and
transitions to the next state in the paging state machine for this page.
Foreign mappings of the gfn will now succeed. This is the key idea, as it
allows the pager to now map the gfn and fill in its contents.
Unfortunately, it also allows any other foreign mapper to map the gfn and read
its contents. This is particularly dangerous
2013 Nov 04
17
Fwd: NetBSD xl core-dump not working... Memory fault (core dumped)
...e see:
> <http://www.gnu.org/software/gdb/bugs/>...
> Reading symbols from /usr/sbin/xl...done.
> [New process 1]
> Core was generated by `xl''.
> Program terminated with signal 11, Segmentation fault.
> #0 0x00007f7ff7007b45 in xc_domain_dumpcore_via_callback
> (xch=0x7f7ff7b0d800, domid=20, args=0x7f7fffffdae0,
> dump_rtn=0x7f7ff700632c<local_file_dump>)
> at xc_core.c:860
> 860 xc_core.c: No such file or directory.
> in xc_core.c
>
>
> (gdb) backtrace
> #0 0x00007f7ff7007b45 in xc_domain_dumpcore_via_callback...
2013 Sep 24
0
Bug#710650: Bug#718767: transition: ocaml 4.00.1
...rror: too few arguments to function 'xc_domain_save'
> c_flags, &callbacks, Bool_val(hvm));
> ^
> In file included from xenguest_stubs.c:23:0:
> /usr/include/xenguest.h:87:5: note: declared here
> int xc_domain_save(xc_interface *xch, int io_fd, uint32_t dom, uint32_t max_iters,
> ^
> xenguest_stubs.c: In function 'stub_xc_domain_restore':
> xenguest_stubs.c:552:10: warning: passing argument 7 of 'xc_domain_restore' makes integer from pointer without a cast [enabled by default]
> Bool_...