On Nov 29, 1:09pm, Pasi =?iso-8859-1?Q?K=E4rkk=E4inen?= wrote:
} Subject: Re: [Xen-devel] Q77 IGD instantly crashes on xen-pciback bind.
Good morning Pasi, thanks for taking the time to follow up.
> > > > So we are obviously working with qemu-dm-traditional and with the
> > > > IGD/LVDS BIOS con
On 12/1/2014 8:31 PM, Jan Beulich wrote:
On 01.12.14 at 13:13, wrote:
At 11:17 + on 01 Dec (1417429027), Jan Beulich wrote:
On 01.12.14 at 11:30, wrote:
At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote:
On 01.12.14 at 09:49, wrote:
To my understanding, pages with p2m_ram_ro
On 12/1/2014 8:13 PM, Tim Deegan wrote:
At 11:17 + on 01 Dec (1417429027), Jan Beulich wrote:
On 01.12.14 at 11:30, wrote:
At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote:
On 01.12.14 at 09:49, wrote:
To my understanding, pages with p2m_ram_ro are not supposed to be
modified
flight 31976 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31976/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-libvirt 5 xen-bootfail baseline untested
test-amd64-i386-xl5
On 01/12/2014 20:30, Konrad Rzeszutek Wilk wrote:
> On Fri, Nov 28, 2014 at 11:31:24AM +, Ian Campbell wrote:
>> On Tue, 2014-11-25 at 11:11 -0500, Boris Ostrovsky wrote:
>>> c/s d1b93ea causes substantial functional regressions in pygrub's ability to
>>> parse bootloader configuration files.
>
flight 31972 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31972/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 host-build-prep fail REGR. vs. 26303
test-amd64-amd64-xl-qe
flight 31969 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31969/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail in 31941 REGR.
vs. 31781
Tests whi
On Dec 1, 2014 2:08 PM, "Konrad Rzeszutek Wilk" wrote:
>
> On Wed, Oct 29, 2014 at 02:30:29PM -0700, Andy Lutomirski wrote:
> > On Oct 29, 2014 1:00 PM, "Konrad Rzeszutek Wilk"
> > wrote:
> > >
> > > On Tue, Oct 28, 2014 at 11:09:53AM -0700, Andy Lutomirski wrote:
> > > > On Tue, Oct 28, 2014 at
On 12/01/14 10:37, Stefano Stabellini wrote:
On Mon, 1 Dec 2014, Don Slutz wrote:
On 11/27/14 05:48, Stefano Stabellini wrote:
[...]
Works fine in both claim modes and with PoD used (maxmem > memory). Do
not know how to test with tmem. I do not see how it would be worse then
current
code
On 11/25/14 12:54, Stefano Stabellini wrote:
In libxl_set_memory_target when setting the new maxmem, retain the same
offset on top of the current target. The offset includes memory
allocated by QEMU for rom files.
Signed-off-by: Stefano Stabellini
diff --git a/tools/libxl/libxl.c b/tools/libxl
On Mon, Dec 01, 2014 at 06:16:28PM +, David Vrabel wrote:
> On 01/12/14 16:19, Luis R. Rodriguez wrote:
> > On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote:
> >> On 01/12/14 15:44, Luis R. Rodriguez wrote:
> >>> On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel
> >>> wrote:
> On
On Fri, Nov 28, 2014 at 11:52:26AM +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH v2] fix migration failure with xl migrate
> --debug"):
> > Acked-by: Ian Campbell
>
> Thanks for reviewing it :-).
>
> > It's pretty big but a large chunk is pretty mechanical. Were you
> > intending
On Wed, Oct 29, 2014 at 04:19:09PM -0400, Waiman Long wrote:
> This patch adds para-virtualization support to the queue spinlock
> code base with minimal impact to the native case. There are some
> minor code changes in the generic qspinlock.c file which should be
> usable in other architectures. T
On Mon, Dec 01, 2014 at 09:21:24AM +, Ian Campbell wrote:
> On Mon, 2014-12-01 at 01:21 -0700, Chun Yan Liu wrote:
> >
> > >>> Ian Campbell 2014-11-28 下午 20:01 >>>
> > On Fri, 2014-11-28 at 13:55 +0800, Chunyan Liu wrote:
> > >> Found by Stefano, this chunk of the patch was never applied to
On Fri, Oct 31, 2014 at 06:30:01PM +0300, Dan Carpenter wrote:
> Hello Konrad Rzeszutek Wilk,
>
> The patch a92336a1176b: "xen/pciback: Drop two backends, squash and
> cleanup some code." from Jul 19, 2011, leads to the following static
> checker warning:
>
> drivers/xen/xen-pciback/conf_sp
On Wed, Oct 29, 2014 at 02:30:29PM -0700, Andy Lutomirski wrote:
> On Oct 29, 2014 1:00 PM, "Konrad Rzeszutek Wilk"
> wrote:
> >
> > On Tue, Oct 28, 2014 at 11:09:53AM -0700, Andy Lutomirski wrote:
> > > On Tue, Oct 28, 2014 at 10:57 AM, Josh Triplett
> > > wrote:
> > > > On Tue, Oct 28, 2014 a
On Fri, Nov 28, 2014 at 03:17:06PM +, Julien Grall wrote:
> Some platforms (such as Xgene and ARMv8 models) use an edge-triggered
> interrupt
> for the virtual timer. Even if the timer output signal is masked in the
> context switch, the GIC will keep track that of any interrupts raised
> whil
On Fri, Nov 28, 2014 at 11:31:24AM +, Ian Campbell wrote:
> On Tue, 2014-11-25 at 11:11 -0500, Boris Ostrovsky wrote:
> > c/s d1b93ea causes substantial functional regressions in pygrub's ability to
> > parse bootloader configuration files.
> >
> > c/s d1b93ea itself changed an an interface wh
On Mon, Dec 01, 2014 at 11:31:11AM +, Wei Liu wrote:
> Return value of libxl_basename was erroneously marked as "const". This
> series removes that "const" and fixes two memory leaks in xl.
>
> I think these fixes should be included in 4.5, given that they fix real
> issues and are very straig
On Tue, Nov 25, 2014 at 07:33:58PM -0500, Waiman Long wrote:
> On 10/27/2014 02:02 PM, Konrad Rzeszutek Wilk wrote:
> >On Mon, Oct 27, 2014 at 01:38:20PM -0400, Waiman Long wrote:
> >>
> >>My concern is that spin_unlock() can be called in many places, including
> >>loadable kernel modules. Can the
On Fri, Nov 28, 2014 at 12:31:34PM +, Ian Jackson wrote:
> Razvan Cojocaru writes ("[PATCH] xenstore: Clarify xs_open() semantics"):
> > Added to the xs_open() comments in xenstore.h. The text has been
> > taken almost verbatim from a xen-devel email by Ian Campbell,
> > and confirmed as accura
On Mon, Dec 01, 2014 at 02:32:44PM +0100, Olaf Hering wrote:
> On Mon, Dec 01, Olaf Hering wrote:
>
> > # xl pci-assignable-add 01:10.0
> > # xl pci-assignable-list
> > :01:10.0
> > # xl create -f domU.cfg
> > # xl console domU
> > ## lspci gives just emulated PCI devices
>
> ttyS0:Rescue:~ #
On Sun, Nov 02, 2014 at 09:32:20AM -0800, Josh Triplett wrote:
> This will allow making set_iopl_mask optional later.
>
> Signed-off-by: Josh Triplett
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> arch/x86/include/asm/paravirt_types.h | 1 +
> arch/x86/kernel/paravirt.c| 2 +-
> arch/
On Fri, Nov 28, 2014 at 08:00:40PM -0600, Dr. Greg Wettstein wrote:
> On Nov 27, 12:11pm, Sander Eikelenboom wrote:
> } Subject: Re: [Xen-devel] Q77 IGD instantly crashes on xen-pciback bind.
>
> Hi, hope the week has gone well for everyone.
>
> > > So we are obviously working with qemu-dm-tradit
On Mon, Dec 01, 2014 at 02:14:56PM +, David Vrabel wrote:
> On 21/11/14 22:17, Konrad Rzeszutek Wilk wrote:
> > The commit "xen/pciback: Don't deadlock when unbinding." was using
> > the version of pci_reset_function which would lock the device lock.
> > That is no good as we can dead-lock. As
On Fri, Nov 28, 2014 at 12:09:41PM +, Ian Campbell wrote:
> On Wed, 2014-11-26 at 21:19 +, Andrew Cooper wrote:
> > On 26/11/2014 19:54, M A Young wrote:
> >
> > > If differences are found during the verification phase of xl migrate
> > > --debug then it is likely to crash with a segfault
On Fri, Nov 28, 2014 at 11:38:52AM +, Ian Campbell wrote:
> On Thu, 2014-11-27 at 12:34 +, Andrew Cooper wrote:
> > Don't leak a 16k allocation if PyArg_ParseTupleAndKeywords() or the first
> > xc_readconsolering() fail. It is trivial to run throught the processes
> > memory
> > by repeat
On Thu, Nov 27, 2014 at 12:34:34PM +, Andrew Cooper wrote:
> The code now now matches its comment, and will actually catch the case of a
> bad xs handle.
>
> Signed-off-by: Andrew Cooper
> Coverity-ID: 1055948
> CC: Ian Campbell
> CC: Ian Jackson
> CC: Wei Liu
> CC: Xen Coverity Team
Rel
On Mon, Dec 01, 2014 at 02:50:56PM +, Ian Campbell wrote:
> On Mon, 2014-12-01 at 14:27 +, Euan Harris wrote:
> > libxl__domain_rename() unconditionally dereferences its new_name
> > parameter, to check whether it is an empty string. Add a check to
> > avoid a segfault if new_name is null
Hello, is it possible to implement time dilation in XEN 4.2 without
modyfing kernel(also hints are welcome)? Thank you for replies.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
xc_physdev_unmap_pirq might revoke the permission to map the irq from
the domain causing the following xc_domain_irq_permission call to fail
and return error (domain_pirq_to_irq returns 0).
Call xc_domain_irq_permission first to prevent this from happening
(xc_physdev_unmap_pirq calls irq_deny_acc
flight 31970 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31970/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 5 xen-boot fail REGR. vs. 31900
version targeted for
> On 1 Dec 2014, at 17:15, Andrew Cooper wrote:
>
> On 01/12/14 14:37, John Haxby wrote:
>> With gcc 4.8.3, compiling xen-detect gives a compilation warning if
>> you're optimising:
>>
>> $ cc -Wall -Os xen-detect.c
>> xen-detect.c: In function ‘check_for_xen’:
>> xen-detect.c:65:9: warning: de
On 01/12/14 16:19, Luis R. Rodriguez wrote:
> On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote:
>> On 01/12/14 15:44, Luis R. Rodriguez wrote:
>>> On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel
>>> wrote:
On 01/12/14 15:05, Luis R. Rodriguez wrote:
> On Mon, Dec 01, 2014 at 11
flight 31963 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31963/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 31932
Tests which did not succeed,
On 01/12/14 14:22, David Vrabel wrote:
> On 28/11/14 15:19, Anthony Wright wrote:
>> We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2 to
>> 3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0.
>>
>> Shortly after the upgrade we started to lose network connectivity to the
>> Dom
On Mon, Dec 01, 2014 at 06:07:48PM +0100, Juergen Gross wrote:
> On 12/01/2014 05:19 PM, Luis R. Rodriguez wrote:
>> On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote:
>>> On 01/12/14 15:44, Luis R. Rodriguez wrote:
On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel
wrote:
> O
On 01/12/14 14:37, John Haxby wrote:
> With gcc 4.8.3, compiling xen-detect gives a compilation warning if
> you're optimising:
>
> $ cc -Wall -Os xen-detect.c
> xen-detect.c: In function ‘check_for_xen’:
> xen-detect.c:65:9: warning: dereferencing type-punned pointer will break
> strict-aliasing r
On 12/01/2014 05:19 PM, Luis R. Rodriguez wrote:
On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote:
On 01/12/14 15:44, Luis R. Rodriguez wrote:
On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel wrote:
On 01/12/14 15:05, Luis R. Rodriguez wrote:
On Mon, Dec 01, 2014 at 11:11:43AM +
On 01/12/14 14:38, David Vrabel wrote:
> On 20/11/14 18:28, Andrew Cooper wrote:
>> 1) Freeze the guests p2m during live migrate
>> 2) Deep p2m dirty tracking
>> 3) Eagerly check for p2m structure changes.
>> 4) Request p2m structure change updates from the guest
>> Proposed solution: A combinatio
On 12/01/2014 05:28 PM, Jan Beulich wrote:
On 01.12.14 at 15:33, wrote:
On 12/01/2014 02:37 PM, Jan Beulich wrote:
On 01.12.14 at 14:11, wrote:
On 12/01/2014 12:29 PM, Jan Beulich wrote:
On 01.12.14 at 12:19, wrote:
On 01/12/14 10:15, Jan Beulich wrote:
On 01.12.14 at 10:29, wrote:
The
>>> On 01.12.14 at 15:33, wrote:
> On 12/01/2014 02:37 PM, Jan Beulich wrote:
> On 01.12.14 at 14:11, wrote:
>>> On 12/01/2014 12:29 PM, Jan Beulich wrote:
>>> On 01.12.14 at 12:19, wrote:
> On 01/12/14 10:15, Jan Beulich wrote:
> On 01.12.14 at 10:29, wrote:
>>> The x86
On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote:
> On 01/12/14 15:44, Luis R. Rodriguez wrote:
> > On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel
> > wrote:
> >> On 01/12/14 15:05, Luis R. Rodriguez wrote:
> >>> On Mon, Dec 01, 2014 at 11:11:43AM +, David Vrabel wrote:
> On 2
This is done with three major changes:
1. Rework internal representation of setting.
2. Extend grammar of parser.
3. Introduce new APIs.
New APIs introduced:
1. xlu_cfg_value_type
2. xlu_cfg_value_get_string
3. xlu_cfg_value_get_list
4. xlu_cfg_get_listitem2
Previous APIs work as before.
Signed-
Hvmloader issues XENMEM_get_vnumainfo hypercall and stores the
information retrieved in scratch space for later use.
Signed-off-by: Wei Liu
Cc: Jan Beulich
---
tools/firmware/hvmloader/Makefile|2 +-
tools/firmware/hvmloader/hvmloader.c |3 ++
tools/firmware/hvmloader/vnuma.c |
And then returns low memory end, high memory end and mmio start to
caller.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxc/include/xenguest.h |7 ++
tools/libxc/xc_hvm_build_x86.c | 224 ++
Disallow memory relocation when vNUMA is enabled, because relocated
memory ends up off node. Further more, even if we dynamically expand
node coverage in hvmloader, low memory and high memory may reside
in different physical nodes, blindly relocating low memory to high
memory gives us a sub-optimal
Signed-off-by: Wei Liu
Cc: Jan Beulich
---
xen/common/compat/memory.c | 38 ++
xen/include/xlat.lst |2 ++
2 files changed, 40 insertions(+)
diff --git a/xen/common/compat/memory.c b/xen/common/compat/memory.c
index 06c90be..58cb847 100644
--- a/x
Libxc has more involvement in building vmemranges in HVM case. The
building of vmemranges is placed after xc_hvm_build returns, because it
relies on memory hole information provided by xc_hvm_build.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxl/libxl_dom.c | 71 +++
1 file changed, 71 insertions(+)
diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
index 74ea84b..73
Signed-off-by: Wei Liu
Cc: Jan Beulich
---
Changes in v2:
1. Adapt to new vNUMA retrieval routine.
2. Move SLIT very late in secondary table build.
---
tools/firmware/hvmloader/acpi/acpi2_0.h |8 +++
tools/firmware/hvmloader/acpi/build.c | 40 ++-
2 files
Signed-off-by: Wei Liu
Cc: Jan Beulich
---
Changes in v2:
1. Remove explicit zero initializers.
2. Adapt to new vNUMA retrieval routine.
3. Move SRAT very late in secondary table build.
---
tools/firmware/hvmloader/acpi/acpi2_0.h | 53 +++
tools/firmware/hvmloader/acpi/buil
This patch includes configuration options parser and documentation.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
Changes in v2:
1. Make vnuma_vdistances mandatory.
2. Use nested list to specify vdistances.
3. Update documentation.
---
doc
On 01/12/14 15:44, Luis R. Rodriguez wrote:
> On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel wrote:
>> On 01/12/14 15:05, Luis R. Rodriguez wrote:
>>> On Mon, Dec 01, 2014 at 11:11:43AM +, David Vrabel wrote:
On 27/11/14 18:36, Luis R. Rodriguez wrote:
> On Thu, Nov 27, 2014 at 07:36:3
On Mon, Dec 01, 2014 at 03:42:33PM +0100, Juergen Gross wrote:
> On 12/01/2014 02:32 PM, Luis R. Rodriguez wrote:
>> On Mon, Dec 01, 2014 at 11:01:18AM +, David Vrabel wrote:
>>> On 28/11/14 04:49, Juergen Gross wrote:
On 11/27/2014 07:50 PM, Andrew Cooper wrote:
>
> XenServer uses
> On 28/11/14 15:19, Anthony Wright wrote:
> > We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2
> > to
> > 3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0.
> >
> > Shortly after the upgrade we started to lose network connectivity to
> > the
> > DomU a few times a day that r
On Mon, 1 Dec 2014, Don Slutz wrote:
> On 11/27/14 05:48, Stefano Stabellini wrote:
> > On Wed, 26 Nov 2014, Don Slutz wrote:
> > > On 11/26/14 13:17, Stefano Stabellini wrote:
> > > > On Tue, 25 Nov 2014, Andrew Cooper wrote:
> > > > > On 25/11/14 17:45, Stefano Stabellini wrote:
> > > > > > Incre
On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel wrote:
> On 01/12/14 15:05, Luis R. Rodriguez wrote:
>> On Mon, Dec 01, 2014 at 11:11:43AM +, David Vrabel wrote:
>>> On 27/11/14 18:36, Luis R. Rodriguez wrote:
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
> On 11/26/201
Hi all
This is version 2 of this series.
This patch series implements virtual NUMA support for both PV and HVM guest.
That is, admin can configure via libxl what virtual NUMA topology the guest
sees.
This is the stage 1 (basic vNUMA support) and part of stage 2 (vNUMA-ware
ballooning, hypervisor
Signed-off-by: Elena Ufimsteva
Signed-off-by: Wei Liu
Cc: Jan Beulich
---
Changes in v2:
1. Use unsigned int for loop vars.
2. Use strlcpy.
3. Properly align output.
---
xen/arch/x86/numa.c | 47 ++-
1 file changed, 46 insertions(+), 1 deletion(-)
Currently we haven't exported vmemrange interface to libxl user.
Vmemranges are generated during domain build.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxl/libxl_internal.h |3 +++
1 file changed, 3 insertions(+)
diff --g
One vmemrange is generated for each vnode. And for those guests who care
about machine E820 map, vmemranges are further split to accommodate
memory holes.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxl/libxl_arch.h |6 ++
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxl/libxl_types.idl |9 +
1 file changed, 9 insertions(+)
diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
index f7fc695..75855fb 100644
--- a/tools/li
This vNUMA function (and future ones) is placed in a new file called
libxl_vnuma.c
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxl/Makefile |2 +-
tools/libxl/libxl_internal.h |5 ++
tools/libxl/libxl_vnuma.c|
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxl/libxl_arm.c |8
tools/libxl/libxl_x86.c |8
2 files changed, 16 insertions(+)
diff --git a/tools/libxl/libxl_arm.c b/tools/libxl/libxl_arm.c
index 448ac07.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxc/include/xc_dom.h |5 +++
tools/libxc/xc_dom_x86.c | 72 +++---
tools/libxc/xc_private.h |2 ++
3 files changed, 68 insertions(+)
Make XENMEM_increase_reservation and XENMEM_populate_physmap
vNUMA-aware.
That is, if guest requests Xen to allocate memory for specific vnode,
Xen can translate vnode to pnode using vNUMA information of that guest.
XENMEMF_vnode is introduced for the guest to mark the node number is in
fact virt
This function gets the machine E820 map and sanitize it according to PV
guest configuration.
This will be used in later patch.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Dario Faggioli
Cc: Elena Ufimtseva
---
tools/libxl/libxl_x86.c | 31 ++-
1
On 01/12/14 15:05, Luis R. Rodriguez wrote:
> On Mon, Dec 01, 2014 at 11:11:43AM +, David Vrabel wrote:
>> On 27/11/14 18:36, Luis R. Rodriguez wrote:
>>> On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote:
> From: "Luis R. Ro
On Mon, Dec 01, 2014 at 11:11:43AM +, David Vrabel wrote:
> On 27/11/14 18:36, Luis R. Rodriguez wrote:
> > On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
> >> On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote:
> >>> From: "Luis R. Rodriguez"
> >>>
> >>> Some folks had reported t
On Mon, 2014-12-01 at 14:27 +, Euan Harris wrote:
> libxl__domain_rename() unconditionally dereferences its new_name
> parameter, to check whether it is an empty string. Add a check to
> avoid a segfault if new_name is null.
>
> Signed-off-by: Euan Harris
Acked-by: Ian Campbell
I think t
Monday, December 1, 2014, 3:34:09 PM, you wrote:
> On Mon, Dec 01, Sander Eikelenboom wrote:
>> Hmm the wiki also still mentions it:
>> http://wiki.xen.org/wiki/Xen_PCI_Passthrough
>>
>> It was the ability with xend + qemu-trad to be able to specify the slot to
>> use in the guest for the pci
On Mon, Dec 01, Ian Campbell wrote:
> On Mon, 2014-12-01 at 15:34 +0100, Olaf Hering wrote:
> > On Mon, Dec 01, Sander Eikelenboom wrote:
> > > Hmm the wiki also still mentions it:
> > > http://wiki.xen.org/wiki/Xen_PCI_Passthrough
> > >
> > > It was the ability with xend + qemu-trad to be able
flight 31965 xen-4.3-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31965/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 31811
Tests which are f
On 12/01/2014 02:32 PM, Luis R. Rodriguez wrote:
On Mon, Dec 01, 2014 at 11:01:18AM +, David Vrabel wrote:
On 28/11/14 04:49, Juergen Gross wrote:
On 11/27/2014 07:50 PM, Andrew Cooper wrote:
XenServer uses
https://github.com/xenserver/linux-3.x.pg/blob/master/master/0001-x86-xen-allow-p
On Mon, 2014-12-01 at 15:34 +0100, Olaf Hering wrote:
> On Mon, Dec 01, Sander Eikelenboom wrote:
>
> > Hmm the wiki also still mentions it:
> > http://wiki.xen.org/wiki/Xen_PCI_Passthrough
> >
> > It was the ability with xend + qemu-trad to be able to specify the slot to
> > use in the guest f
On 20/11/14 18:28, Andrew Cooper wrote:
>
> 1) Freeze the guests p2m during live migrate
> 2) Deep p2m dirty tracking
> 3) Eagerly check for p2m structure changes.
> 4) Request p2m structure change updates from the guest
> Proposed solution: A combination of 2, 3 and 4.
Option 5: don't change a
With gcc 4.8.3, compiling xen-detect gives a compilation warning if
you're optimising:
$ cc -Wall -Os xen-detect.c
xen-detect.c: In function ‘check_for_xen’:
xen-detect.c:65:9: warning: dereferencing type-punned pointer will break
strict-aliasing rules [-Wstrict-aliasing]
*(uint32_t *)(si
I needed xen-detect this morning so as usual I pulled it from git and it
didn't work and it threw a compilation warning. Thinking the problem
was the strict-aliasing warning (patch 1) I fixed that and ... it still
didn't work. Well, that's not entirely true, it was just
over-enthusiastically cla
At some stage, the cpuid instruction used to detect a xen hvm domain
also started working in a pv domain so pv domains were being identified
as hvm (dom0 excepted). Change the order so that pv is tested for
first.
Signed-off-by: John Haxby
---
tools/misc/xen-detect.c | 12 ++--
1 file c
On Mon, Dec 01, Sander Eikelenboom wrote:
> Hmm the wiki also still mentions it:
> http://wiki.xen.org/wiki/Xen_PCI_Passthrough
>
> It was the ability with xend + qemu-trad to be able to specify the slot to
> use in the guest for the pci device.
>
> See docs/misc/vtd.txt .. that seems it has n
On 12/01/2014 02:37 PM, Jan Beulich wrote:
On 01.12.14 at 14:11, wrote:
On 12/01/2014 12:29 PM, Jan Beulich wrote:
On 01.12.14 at 12:19, wrote:
On 01/12/14 10:15, Jan Beulich wrote:
On 01.12.14 at 10:29, wrote:
The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list
currently con
libxl__domain_rename() unconditionally dereferences its new_name
parameter, to check whether it is an empty string. Add a check to
avoid a segfault if new_name is null.
Signed-off-by: Euan Harris
---
tools/libxl/libxl.c |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
diff --g
On 28/11/14 15:19, Anthony Wright wrote:
> We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2 to
> 3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0.
>
> Shortly after the upgrade we started to lose network connectivity to the
> DomU a few times a day that required a reboot to
Tools debug builds are built with optimization level -O1, inherited from
the CFLAGS definition in StdGNU.mk. Optimizations confuse the debugger,
and the comment justifying -O1 in StdGNU.mk should not apply for a
userspace library. Disable optimization by appending -O0 to CFLAGS,
which overrides
On 21/11/14 22:17, Konrad Rzeszutek Wilk wrote:
> The commit "xen/pciback: Don't deadlock when unbinding." was using
> the version of pci_reset_function which would lock the device lock.
> That is no good as we can dead-lock. As such we swapped to using
> the lock-less version and requiring that th
On 01.12.2014 14:59, Zoltan Kiss wrote:
>
>
> On 01/12/14 13:36, David Vrabel wrote:
>> On 01/12/14 08:55, Stefan Bader wrote:
>>> On 11.08.2014 19:32, Zoltan Kiss wrote:
There is a long known problem with the netfront/netback interface: if the
guest
tries to send a packet which c
On 01/12/14 13:36, David Vrabel wrote:
On 01/12/14 08:55, Stefan Bader wrote:
On 11.08.2014 19:32, Zoltan Kiss wrote:
There is a long known problem with the netfront/netback interface: if the guest
tries to send a packet which constitues more than MAX_SKB_FRAGS + 1 ring slots,
it gets dropped
Monday, December 1, 2014, 2:42:11 PM, you wrote:
> On Mon, Dec 01, Olaf Hering wrote:
>> > # xl pci-attach domU :01:10.0
> "xl pci-attach -h" mentions [Virtual Slot], but the code does not seem
> to handle an additional parameter, pciattach() ignores *vs.
> What is the "Virtual Slot", why
On my latest test with xen 4.5 and qemu 2.2 (from git) linux hvm domU
(Fedora 21) has no more crashed without any useful information in log
but was crashed only xorg on start:
[20.653] (EE)
[20.653] (EE) Backtrace:
[20.668] (EE) 0: /usr/libexec/Xorg.bin (OsLookupColor+0x119)
[0x59
On Mon, Dec 01, Olaf Hering wrote:
> > # xl pci-attach domU :01:10.0
"xl pci-attach -h" mentions [Virtual Slot], but the code does not seem
to handle an additional parameter, pciattach() ignores *vs.
What is the "Virtual Slot", why is it ignored?
Olaf
_
On 01/12/14 08:55, Stefan Bader wrote:
> On 11.08.2014 19:32, Zoltan Kiss wrote:
>> There is a long known problem with the netfront/netback interface: if the
>> guest
>> tries to send a packet which constitues more than MAX_SKB_FRAGS + 1 ring
>> slots,
>> it gets dropped. The reason is that netba
>>> On 01.12.14 at 14:11, wrote:
> On 12/01/2014 12:29 PM, Jan Beulich wrote:
> On 01.12.14 at 12:19, wrote:
>>> On 01/12/14 10:15, Jan Beulich wrote:
>>> On 01.12.14 at 10:29, wrote:
> The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list
> currently contains the mfn
On Mon, Dec 01, Olaf Hering wrote:
> # xl pci-assignable-add 01:10.0
> # xl pci-assignable-list
> :01:10.0
> # xl create -f domU.cfg
> # xl console domU
> ## lspci gives just emulated PCI devices
ttyS0:Rescue:~ # lspci
00:00.0 Host bridge: Intel Corporation 440FX - 82441FX PMC [Natoma] (rev
On 11/27/14 05:48, Stefano Stabellini wrote:
On Wed, 26 Nov 2014, Don Slutz wrote:
On 11/26/14 13:17, Stefano Stabellini wrote:
On Tue, 25 Nov 2014, Andrew Cooper wrote:
On 25/11/14 17:45, Stefano Stabellini wrote:
Increase maxmem before calling xc_domain_populate_physmap_exact to avoid
the r
On Mon, Dec 01, 2014 at 11:01:18AM +, David Vrabel wrote:
> On 28/11/14 04:49, Juergen Gross wrote:
> > On 11/27/2014 07:50 PM, Andrew Cooper wrote:
> >>
> >> XenServer uses
> >>
> >> https://github.com/xenserver/linux-3.x.pg/blob/master/master/0001-x86-xen-allow-privcmd-hypercalls-to-be-preem
On 26/11/14 17:28, David Miller wrote:
> From: Seth Forshee
> Date: Tue, 25 Nov 2014 20:28:24 -0600
>
>> These BUGs can be erroneously triggered by frags which refer to
>> tail pages within a compound page. The data in these pages may
>> overrun the hardware page while still being contained withi
On Mon, 2014-12-01 at 12:56 +, Ian Campbell wrote:
> The exception to that good news is that sg-report-flight
> --that-flight=NNN MMM doesn't seem to be considering failures in MMM
> regressions vs NNN. e.g. test-amd64-i386-i386-daily-netboot-pvgrub
> should appear as a regression from 31961 to
On 24/11/14 14:59, Zhuan Chen wrote:
> Hi,
>
> I am wondering whether it's possible to build 32-bit xen.efi for the
> 32-bit EFI platform? One way of building xen.efi I learnt is to make
> the binutils configured with the x86_64-pep emulation (according to
> the document http://xenbits.xenproject.
On 12/01/2014 12:29 PM, Jan Beulich wrote:
On 01.12.14 at 12:19, wrote:
On 01/12/14 10:15, Jan Beulich wrote:
On 01.12.14 at 10:29, wrote:
The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list
currently contains the mfn of the top level page frame of the 3 level
p2m tree, which is
1 - 100 of 185 matches
Mail list logo