On 07/23/2015 06:36 AM, Greg KH wrote:
On Thu, Jul 23, 2015 at 06:04:39AM +0200, Juergen Gross wrote:
On 07/23/2015 01:46 AM, Greg KH wrote:
On Tue, Jun 23, 2015 at 08:53:23AM +0200, Juergen Gross wrote:
Add the definition of pvUSB protocol used between the pvUSB frontend in
a Xen domU and the
From: Fu Wei
xen_hypervisor
xen_linux
xen_initrd
xen_xsm
xen_module
Signed-off-by: Fu Wei
---
docs/grub.texi | 56
1 file changed, 56 insertions(+)
diff --git a/docs/grub.texi b/docs/grub.texi
index b9f41a7..e94b03c
From: Fu Wei
- This adds support for the Xen boot on ARM specification for arm64.
- Add and export some accessor functions of "loaded" flag and
grub_linux_get_fdt function in include/grub/arm64/linux.h for xen boot.
- Introduce xen_hypervisor, xen_linux, xen_initrd and xen_xsm
to
From: Fu Wei
This patch adds the support of boot command on aarch64 for XEN:
xen_hypervisor
xen_linux
xen_initrd
Signed-off-by: Fu Wei
---
util/grub.d/20_linux_xen.in | 16 +---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/util/grub.d/20_linux_xen.in b
From: Fu Wei
grub-core/loader/arm64/xen_boot.c
- This adds support for the Xen boot on ARM specification for arm64.
- Introduce xen_hypervisor, xen_linux, xen_initrd and xen_xsm
to load different binaries for xen boot;
Introduce xen_module to load common or custom module for xen boot
From: Fu Wei
Add accessor functions of "loaded" flag in
grub-core/loader/arm64/linux.c.
Export accessor functions of "loaded" flag and
grub_linux_get_fdt function in include/grub/arm64/linux.h.
Purpose: Reuse the existing code of devicetree in linux module.
Signed-off-by: Fu Wei
---
grub-cor
On 07/22/2015 04:44 PM, Boris Ostrovsky wrote:
On 07/22/2015 10:09 AM, Juergen Gross wrote:
On 07/22/2015 03:58 PM, Boris Ostrovsky wrote:
On 07/22/2015 09:50 AM, Juergen Gross wrote:
On 07/22/2015 03:36 PM, Dario Faggioli wrote:
On Tue, 2015-07-21 at 16:00 -0400, Boris Ostrovsky wrote:
On 0
On Thu, Jul 23, 2015 at 06:04:39AM +0200, Juergen Gross wrote:
> On 07/23/2015 01:46 AM, Greg KH wrote:
> >On Tue, Jun 23, 2015 at 08:53:23AM +0200, Juergen Gross wrote:
> >>Add the definition of pvUSB protocol used between the pvUSB frontend in
> >>a Xen domU and the pvUSB backend in a Xen driver
flight 59819 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59819/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 11 guest-saverestore fail REGR.
vs. 58880
T
On 07/23/2015 01:46 AM, Greg KH wrote:
On Tue, Jun 23, 2015 at 08:53:23AM +0200, Juergen Gross wrote:
Add the definition of pvUSB protocol used between the pvUSB frontend in
a Xen domU and the pvUSB backend in a Xen driver domain (usually Dom0).
This header was originally provided by Fujitsu fo
flight 59820 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59820/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-build fail REGR. vs. 30511
Regressions which are r
flight 59818 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59818/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 6 xen-boot fail REGR. vs. 59789
test-amd64-i386-xl-qemut-stubdo
Ian,
This was supposed to be my responsibility to resend this series so
appreciate for your extra effort.
git branch here:
http://xenbits.xen.org/gitweb/?p=people/iwj/xen.git;a=summary
git://xenbits.xen.org/people/iwj/xen.git
base.rdm-v13..wip.rdm-v13
I pick all RMRR patches from
Ian,
Thanks for your effort.
A tiny change may be needed but I don't block this.
+libxl__xc_device_get_rdm(libxl__gc *gc,
+ uint32_t flag,
Since now we are sitting on xc_reserved_device_memory_map(, flags, xxx),
s/flag/flags may be better.
+
64e91244e7befaa2317519ea15dc9c89 # 07:24 0-
> 19 pmem: convert to generic memremap
> # extra tests on tree/branch linus/master
> git bisect good 5a5ca73ac0a73c876b62858f0753a25ee430e370 # 07:26 66+
> 2 Merge tag 'arm64-fixes' of
> git://git.kernel.or
On Tue, Jun 23, 2015 at 08:53:23AM +0200, Juergen Gross wrote:
> Add the definition of pvUSB protocol used between the pvUSB frontend in
> a Xen domU and the pvUSB backend in a Xen driver domain (usually Dom0).
>
> This header was originally provided by Fujitsu for Xen based on Linux
> 2.6.18.
>
git bisect good 72a68fd733c8b6cd2e0ebc0586a9103067cd4ed7 # 07:29 65+
0 Add linux-next specific files for 20150722
This script may reproduce the error.
#!/bin/bash
kernel=$1
initrd=yocto-minimal-i386.cgz
wget --no
From: Tamas K Lengyel
Working altp2m test-case. Extended the test tool to support singlestepping
to better highlight the core feature of altp2m view switching.
Signed-off-by: Tamas K Lengyel
Signed-off-by: Ed White
Reviewed-by: Razvan Cojocaru
Acked-by: Wei Liu
---
Changes since v6:
From: Tamas K Lengyel
Wrappers to issue altp2m hvmops.
Signed-off-by: Tamas K Lengyel
Signed-off-by: Ravi Sahita
Acked-by: Ian Campbell
---
Changes since v6:
no changes
tools/libxc/Makefile | 1 +
tools/libxc/include/xenctrl.h | 22
tools/libxc/xc_altp2m.c |
From: Ravi Sahita
Signed-off-by: Ravi Sahita
Acked-by: Daniel De Graaf
---
Changes since v6:
no changes
tools/flask/policy/policy/modules/xen/xen.if | 4 ++--
xen/arch/x86/hvm/hvm.c | 6 ++
xen/include/xsm/dummy.h | 12
xe
The altp2mhvm and nestedhvm parameters are mutually
exclusive and cannot be set together.
Signed-off-by: Ed White
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
---
Changes since v6:
no changes
docs/man/xl.cfg.pod.5 | 12
tools/libxl/libxl.h | 6
Signed-off-by: Ed White
Acked-by: Jan Beulich
---
Changes since v6:
fix cmd range check
rework domain locking
add Jan's ack
xen/arch/x86/hvm/hvm.c | 138
xen/include/public/hvm/hvm_op.h | 89 ++
Add the remaining routines required to support enabling the alternate
p2m functionality.
Signed-off-by: Ed White
Reviewed-by: Andrew Cooper
---
Changes since v6:
rename altp2m lazy copier, make bool_t, use __put_gfn throughout,
and move to p2m.c, eliminating altp2m_hap.c
From: George Dunlap
The existing ept_set_entry() and ept_get_entry() routines are extended
to optionally set/get suppress_ve. Passing -1 will set suppress_ve on
new p2m entries, or retain suppress_ve flag on existing entries.
Signed-off-by: George Dunlap
Signed-off-by: Ravi Sahita
Reviewed-b
Add a flag to indicate that a memory event occurred in an alternate p2m
and a field containing the p2m index. Allow any event response to switch
to a different alternate p2m using the same flag and field.
Modify p2m_mem_access_check() to handle alternate p2m's.
Signed-off-by: Ed White
Acked-by:
From: Ravi Sahita
Signed-off-by: Ravi Sahita
Acked-by: Jan Beulich
---
Changes since v6:
remove incorrect cast
add Jan's ack
xen/arch/x86/hvm/emulate.c | 18 +++--
xen/arch/x86/hvm/vmx/vmx.c | 36 ++
xen/arch
Add the basic data structures needed to support alternate p2m's and
the functions to initialise them and tear them down.
Although Intel hardware can handle 512 EPTP's per hardware thread
concurrently, only 10 per domain are supported in this patch for
performance reasons.
This change also splits
In preparation for selectively enabling #VE in a later patch, set
suppress #VE on all EPTE's.
Suppress #VE should always be the default condition for two reasons:
it is generally not safe to deliver #VE into a guest unless that guest
has been modified to receive it; and even then for most EPT viol
Implement and hook up the code to enable VMX support of VMFUNC and #VE.
VMFUNC leaf 0 (EPTP switching) emulation is added in a later patch.
Signed-off-by: Ed White
Reviewed-by: Andrew Cooper
Acked-by: Jun Nakajima
---
Changes since v6:
remove casts around p2midx handling
fix v
Currently, neither is enabled globally but may be enabled on a per-VCPU
basis by the altp2m code.
Remove the check for EPTE bit 63 == zero in ept_split_super_page(), as
that bit is now hardware-defined.
Signed-off-by: Ed White
Reviewed-by: Andrew Cooper
Acked-by: George Dunlap
Acked-by: Jun N
As implemented here, only supported on platforms with VMX HAP.
By default this functionality is force-disabled, it can be enabled
by specifying altp2m=1 on the Xen command line.
Signed-off-by: Ed White
Reviewed-by: Andrew Cooper
---
Changes since v6:
no changes
docs/misc/xen-command-
From: Andrew Cooper
For use on codepaths which would need to use domain_pause() but might be in
the target domain's context. In the case that the target domain is in
context, all other vcpus are paused.
Signed-off-by: Andrew Cooper
Reviewed-by: George Dunlap
---
Changes since v6:
add
This set of patches adds support to hvm domains for EPTP switching by creating
multiple copies of the host p2m (currently limited to 10 copies).
The primary use of this capability is expected to be in scenarios where access
to memory needs to be monitored and/or restricted below the level at which
flight 59816 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59816/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3863 host-install(3) broken REGR. vs. 58842
build-i386-pvops
On 07/22/2015 03:23 PM, Andy Lutomirski wrote:
modify_ldt has questionable locking and does not synchronize
threads. Improve it: redesign the locking and synchronize all
threads' LDTs using an IPI on all modifications.
This will dramatically slow down modify_ldt in multithreaded
programs, but t
If systemd is configured for use AND you are building oxenstored, the C
systemd library must be linked in to the oxenstored binary instead of
just into the static ocaml stub.
Signed-off-by: Jonathan Creekmore
---
tools/ocaml/xenstored/Makefile | 4 +++-
1 file changed, 3 insertions(+), 1 deletio
flight 59815 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59815/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
59254
build-i386-pvop
flight 59811 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59811/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 11 guest-saverestore fail
REGR. vs. 59393
test-a
This tests general modify_ldt behavior (only writes, so far) as
well as synchronous updates via IPI. It fails on old kernels.
I called this ldt_gdt because I'll add set_thread_area tests to
it at some point.
Signed-off-by: Andy Lutomirski
---
tools/testing/selftests/x86/Makefile | 2 +-
too
The modify_ldt syscall exposes a large attack surface and is
unnecessary for modern userspace. Make it optional.
Signed-off-by: Andy Lutomirski
---
arch/x86/Kconfig | 17 +
arch/x86/include/asm/mmu.h | 2 ++
arch/x86/include/asm/mmu_context.h | 31
Here's v3. It fixes the "dazed and confused" issue, I hope. It's also
probably a good general attack surface reduction, and it replaces some
scary code with IMO less scary code.
Also, servers and embedded systems should probably turn off modify_ldt.
This makes that possible.
Xen people, can you
modify_ldt has questionable locking and does not synchronize
threads. Improve it: redesign the locking and synchronize all
threads' LDTs using an IPI on all modifications.
This will dramatically slow down modify_ldt in multithreaded
programs, but there shouldn't be any multithreaded programs that
flight 59810 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59810/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 12 guest-saverestore fail REGR. vs. 59059
test-amd64-i386-xl-
On 07/22/2015 11:49 AM, Dario Faggioli wrote:
On Wed, 2015-07-22 at 11:32 -0400, Boris Ostrovsky wrote:
On 07/22/2015 10:50 AM, Dario Faggioli wrote:
Yep. Exacty. As Boris says, this is a generic scheduling issue, although
it's tru that it's only (as far as I can tell) with vNUMA that it bite
u
On 20/07/15 15:23, Jan Beulich wrote:
> ... to hook up pci_conf_write_intercept() even for Dom0 not using
> method 1 accesses for the base part of PCI device config space.
>
> Signed-off-by: Jan Beulich
> ---
> Not entirely sure whether the complicated logging logic in x86/mm.c is
> actually worth
On 20/07/15 15:22, Jan Beulich wrote:
> ... by monitoring writes to the mask register.
>
> This allows reverting the main effect of the XSA-129 patches in qemu.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-d
On Wed, 22 Jul 2015, Stefano Stabellini wrote:
> On Wed, 22 Jul 2015, Jan Beulich wrote:
> > >>> On 22.07.15 at 16:50, wrote:
> > > On Wed, 22 Jul 2015, Jan Beulich wrote:
> > >> >> --- a/xen-hvm.c
> > >> >> +++ b/xen-hvm.c
> > >> >> @@ -981,19 +981,30 @@ static void handle_ioreq(XenIOState *sta
>
On Wed, 22 Jul 2015, Jan Beulich wrote:
> >>> On 22.07.15 at 16:50, wrote:
> > On Wed, 22 Jul 2015, Jan Beulich wrote:
> >> >> --- a/xen-hvm.c
> >> >> +++ b/xen-hvm.c
> >> >> @@ -981,19 +981,30 @@ static void handle_ioreq(XenIOState *sta
> >> >>
> >> >> static int handle_buffered_iopage(XenIOSt
flight 59807 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59807/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Tests which are failin
This was the rescheduled 8 July call, on the topic of PVH and related work
= Attendees =
* Ian Campbell
* David Vrabel
* Stefano Stabellini
* Boris Ostrovsky
* Elena Ufimtseva
* Wei Liu
* George Dunlap
* Konrad Rzeszutek Wilk
* Jan Beulich
* Daniel Kiper
* Andrew Cooper
* Roger Pau M
If xenconsole is run with stdin closed or redirected to /dev/null,
console_loop() will return immediately due to failure to read from
STDIN_FILENO. This patch tests if stdin and stdout are both connected to
a TTY and, if not, xenconsole will not attempt to read from stdin or
modify stdout terminal
>>> On 22.07.15 at 12:04, wrote:
> Tiejun Chen writes ("[v11][PATCH 11/16] tools/libxl: detect and avoid
> conflicts with RDM"):
>> While building a VM, HVM domain builder provides struct hvm_info_table{}
>> to help hvmloader. Currently it includes two fields to construct guest
>> e820 table by h
On Wed, Jul 22, 2015 at 04:44:14PM +0100, Ian Jackson wrote:
> From: Tiejun Chen
>
> While building a VM, HVM domain builder provides struct hvm_info_table{}
> to help hvmloader. Currently it includes two fields to construct guest
> e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we
On Wed, Jul 22, 2015 at 04:44:11PM +0100, Ian Jackson wrote:
> From: Tiejun Chen
>
> We will introduce the hypercall xc_reserved_device_memory_map
> approach to libxc. This helps us get rdm entry info according to
> different parameters. If flag == PCI_DEV_RDM_ALL, all entries
> should be exposed
Ian Jackson writes ("[PATCH v13 00/16] Fix RMRR (avoid RDM)"):
> Wei, can you please give your formal ack for the two changed patches ?
>
> Tiejun, can you please test this series ? Hopefully if you say it
> still works after this, we can commit it tomorrow.
FAOD, I have not executed it, althoug
On Wed, 2015-07-22 at 11:32 -0400, Boris Ostrovsky wrote:
> On 07/22/2015 10:50 AM, Dario Faggioli wrote:
> > Yep. Exacty. As Boris says, this is a generic scheduling issue, although
> > it's tru that it's only (as far as I can tell) with vNUMA that it bite
> > us so hard...
>
> I am not sure tha
On Wed, 22 Jul 2015, Jan Beulich wrote:
> >>> On 22.07.15 at 16:49, wrote:
> > On Wed, 22 Jul 2015, Jan Beulich wrote:
> >> >>> On 21.07.15 at 18:18, wrote:
> >> > On Thu, 18 Jun 2015, Jan Beulich wrote:
> >> >> --- a/xen/arch/x86/hvm/hvm.c
> >> >> +++ b/xen/arch/x86/hvm/hvm.c
> >> >> @@ -921,7 +
From: Tiejun Chen
This patch enables XENMEM_memory_map in hvm. So hvmloader can
use it to setup the e820 mappings.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Tiejun Chen
Reviewed-by: Tim Deegan
Reviewed-by: Kevin Tian
Acked-by: Jan Beulich
Acked-by: George Dunlap
--
From: Tiejun Chen
USB RMRR may conflict with guest BIOS region. In such case, identity
mapping setup is simply skipped in previous implementation. Now we
can handle this scenario cleanly with new policy mechanism so previous
hack code can be removed now.
CC: Yang Zhang
CC: Kevin Tian
Signed-of
From: Tiejun Chen
This patch parses to enable user configurable parameters to specify
RDM resource and according policies which are defined previously,
Global RDM parameter:
rdm = "strategy=host,policy=strict/relaxed"
Per-device RDM parameter:
pci = [ 'sbdf, rdm_policy=strict/relaxed' ]
From: Tiejun Chen
RMRR reserved regions must be setup in the pfn space with an identity
mapping to reported mfn. However existing code has problem to setup
correct mapping when VT-d shares EPT page table, so lead to problem
when assigning devices (e.g GPU) with RMRR reported. So instead, this
pat
From: Tiejun Chen
This patch extends the existing hypercall to support rdm reservation policy.
We return error or just throw out a warning message depending on whether
the policy is "strict" or "relaxed" when reserving RDM regions in pfn space.
Note in some special cases, e.g. add a device to hwd
From: Tiejun Chen
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning devices to a VM.
Note this also bring some fallout to python usage of xc_assign_device().
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
CC: David Sc
From: Tiejun Chen
Here we'll construct a basic guest e820 table via
XENMEM_set_memory_map. This table includes lowmem, highmem
and RDMs if they exist, and hvmloader would need this info
later.
Note this guest e820 table would be same as before if the
platform has no any RDM or we disable RDM (by
From: Tiejun Chen
Previously we always fix that predefined boundary as 2G to handle
conflict between memory and rdm, but now this predefined boundar
can be changes with the parameter "rdm_mem_boundary" in .cfg file.
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-o
From: Tiejun Chen
This patch introduces user configurable parameters to specify RDM
resource and according policies,
Global RDM parameter:
rdm = "strategy=host,policy=strict/relaxed"
Per-device RDM parameter:
pci = [ 'sbdf, rdm_policy=strict/relaxed' ]
Global RDM parameter, "strategy",
From: Tiejun Chen
Now we get this map layout by call XENMEM_memory_map then
save them into one global variable memory_map[]. It should
include lowmem range, rdm range and highmem range. Note
rdm range and highmem range may not exist in some cases.
And here we need to check if any reserved memory
From: Tiejun Chen
Currently we're intending to cover this kind of devices
with shared RMRR simply since the case of shared RMRR is
a rare case according to our previous experiences. But
late we can group these devices which shared rmrr, and
then allow all devices within a group to be assigned to
From: Tiejun Chen
While building a VM, HVM domain builder provides struct hvm_info_table{}
to help hvmloader. Currently it includes two fields to construct guest
e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should
check them to fix any conflict with RDM.
RMRR can reside in ad
From: Tiejun Chen
We will introduce the hypercall xc_reserved_device_memory_map
approach to libxc. This helps us get rdm entry info according to
different parameters. If flag == PCI_DEV_RDM_ALL, all entries
should be exposed. Or we just expose that rdm entry specific to
a SBDF.
CC: Ian Jackson
From: George Dunlap
Try to avoid placing PCI BARs over RMRRs:
- If mmio_hole_size is not specified, and the existing MMIO range has
RMRRs in it, and there is space to expand the hole in lowmem without
moving more memory, then make the MMIO hole as large as possible.
- When placing RMRRs, fi
From: Jan Beulich
This is a prerequisite for punching holes into HVM and PVH guests' P2M
to allow passing through devices that are associated with (on VT-d)
RMRRs.
Signed-off-by: Jan Beulich
Signed-off-by: Tiejun Chen
Acked-by: Kevin Tian
Acked-by: Ian Campbell
---
v12a: Move interface struc
This is about v13 of the RDM series. Compared to v11, I have:
- imported it into git (dropping change notices for all previous version)
- brought in new versions of 01 (aka "v12a") and 06 from Jan
- made adjustments as needed by the new 01 from Jan
- double-checked the acks etc., dropping unju
From: Tiejun Chen
Now use the hypervisor-supplied memory map to build our final e820 table:
* Add regions for BIOS ranges and other special mappings not in the
hypervisor map
* Add in the hypervisor supplied regions
* Adjust the lowmem and highmem regions if we've had to relocate
memory (addi
>>> On 22.07.15 at 16:50, wrote:
> On Wed, 22 Jul 2015, Jan Beulich wrote:
>> >> --- a/xen-hvm.c
>> >> +++ b/xen-hvm.c
>> >> @@ -981,19 +981,30 @@ static void handle_ioreq(XenIOState *sta
>> >>
>> >> static int handle_buffered_iopage(XenIOState *state)
>> >> {
>> >> +buffered_iopage_t *buf
On 07/22/2015 10:50 AM, Dario Faggioli wrote:
On Wed, 2015-07-22 at 16:09 +0200, Juergen Gross wrote:
On 07/22/2015 03:58 PM, Boris Ostrovsky wrote:
What if I configure a guest to follow HW topology? I.e. I pin VCPUs to
appropriate cores/threads? With elfnote I am stuck with disabled topology.
I intend to produce a git branch RSN.
On the staging? Tomorrow I can pull to check/test this.
Thanks
Tiejun
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 22.07.15 at 16:49, wrote:
> On Wed, 22 Jul 2015, Jan Beulich wrote:
>> >>> On 21.07.15 at 18:18, wrote:
>> > On Thu, 18 Jun 2015, Jan Beulich wrote:
>> >> --- a/xen/arch/x86/hvm/hvm.c
>> >> +++ b/xen/arch/x86/hvm/hvm.c
>> >> @@ -921,7 +921,7 @@ static void hvm_ioreq_server_disable(str
>> >
On Wed, 2015-07-22 at 16:09 +0100, Wei Liu wrote:
> On Wed, Jul 22, 2015 at 03:19:08PM +0100, Ian Campbell wrote:
> > On Fri, 2015-07-17 at 18:12 +0100, Wei Liu wrote:
> > > On Fri, Jul 17, 2015 at 06:05:45PM +0100, Ian Jackson wrote:
> > > > Wei Liu writes ("[PATCH v4 2/3] libxl: localtime(3) can
Chen, Tiejun writes ("Re: [v11][PATCH 11/16] tools/libxl: detect and avoid
conflicts with RDM"):
> We just need to sync two patches:
Thanks.
> Note I just compiled with these changes since right now I can't access
> any machine to test.
I intend to produce a git branch RSN.
Ian.
On Wed, Jul 22, 2015 at 03:19:08PM +0100, Ian Campbell wrote:
> On Fri, 2015-07-17 at 18:12 +0100, Wei Liu wrote:
> > On Fri, Jul 17, 2015 at 06:05:45PM +0100, Ian Jackson wrote:
> > > Wei Liu writes ("[PATCH v4 2/3] libxl: localtime(3) can return
> > > NULL"):
> > > > Signed-off-by: Wei Liu
> >
OOPS! Please refer to this version: (One miss changing flag to flags in
patch #11 although we can compile successfully.)
#1. To patch #8
diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h
index 2991333..9c5ef8b 100644
--- a/tools/libxc/include/xenctrl.h
+++ b/tools/libx
On Wed, Jul 22, 2015 at 02:06:46PM +0100, Ian Jackson wrote:
> Tiejun Chen writes ("[v11][PATCH 09/16] tools: extend xc_assign_device() to
> support rdm reservation policy"):
> > This patch passes rdm reservation policy to xc_assign_device() so the policy
> > is checked when assigning devices to a
On 2015/7/22 22:04, Ian Jackson wrote:
Chen, Tiejun writes ("Re: [v11][PATCH 11/16] tools/libxl: detect and avoid conflicts
with RDM"):
Sounds you start to merge them into your tree?
But now Jan is trying to update patch #1 as you see. I think something
needs to be synced on tool sides. Althou
>>> On 22.07.15 at 16:16, wrote:
> On Wed, 2015-07-22 at 13:07 +0200, Roger Pau Monne wrote:
>> Xen was using some non-POSIX error codes that are removed in this
>> patch. For
>> future reference, the list of POSIX error codes has been obtained
>> from:
>>
>> http://pubs.opengroup.org/onlinepub
On Tue, 2015-07-21 at 19:31 +0200, Dario Faggioli wrote:
> In fact, right now, the following (legitimate)
> configuration:
>
> vcpus = '4'
> vnuma = [ [ "pnode=0","size=512","vcpus=0,1","vdistances=10,20" ],
>[ "pnode=1","size=512","vcpus=2,3","vdistances=20,10" ] ]
>
> Prod
On Wed, 22 Jul 2015, Jan Beulich wrote:
> >> The number of slots per page being 511 (i.e. not a power of two) means
> >> that the (32-bit) read and write indexes going beyond 2^32 will likely
> >> disturb operation. The hypervisor side gets I/O req server creation
> >> extended so we can indicate t
On Wed, 22 Jul 2015, Jan Beulich wrote:
> >>> On 21.07.15 at 18:18, wrote:
> > On Thu, 18 Jun 2015, Jan Beulich wrote:
> >> --- a/xen/arch/x86/hvm/hvm.c
> >> +++ b/xen/arch/x86/hvm/hvm.c
> >> @@ -921,7 +921,7 @@ static void hvm_ioreq_server_disable(str
> >>
> >> static int hvm_ioreq_server_init
On Wed, 2015-07-22 at 16:09 +0200, Juergen Gross wrote:
> On 07/22/2015 03:58 PM, Boris Ostrovsky wrote:
> > What if I configure a guest to follow HW topology? I.e. I pin VCPUs to
> > appropriate cores/threads? With elfnote I am stuck with disabled topology.
>
> Add an option to do exactly that:
On 07/21/2015 05:06 PM, Dario Faggioli wrote:
> The function is called both when we want to remove a cpu
> from a cpupool, and during cpu teardown, for suspend or
> shutdown. If, however, the boot cpu (cpu 0, most of the
> times) is not present in the default cpupool, during
> suspend or shutdown,
On 07/22/2015 10:09 AM, Juergen Gross wrote:
On 07/22/2015 03:58 PM, Boris Ostrovsky wrote:
On 07/22/2015 09:50 AM, Juergen Gross wrote:
On 07/22/2015 03:36 PM, Dario Faggioli wrote:
On Tue, 2015-07-21 at 16:00 -0400, Boris Ostrovsky wrote:
On 07/20/2015 10:43 AM, Boris Ostrovsky wrote:
On 0
On Wed, Jul 22, 2015 at 03:09:55PM +0100, Ian Jackson wrote:
> Tiejun Chen writes ("[v11][PATCH 16/16] tools: parse to enable new rdm policy
> parameters"):
> > This patch parses to enable user configurable parameters to specify
> > RDM resource and according policies which are defined previously,
This being an in-guest component, it shouldn't get to see (and even
less so use) tools-only public interfaces.
Signed-off-by: Jan Beulich
--- a/tools/firmware/hvmloader/Makefile
+++ b/tools/firmware/hvmloader/Makefile
@@ -31,6 +31,9 @@ SMBIOS_REL_DATE ?= $(shell date +%m/%d/%
CFLAGS += $(CFLA
On Wed, 2015-07-22 at 13:07 +0200, Roger Pau Monne wrote:
> Xen was using some non-POSIX error codes that are removed in this
> patch. For
> future reference, the list of POSIX error codes has been obtained
> from:
>
> http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/errno.h.html
>
> Th
On Fri, 2015-07-17 at 18:12 +0100, Wei Liu wrote:
> On Fri, Jul 17, 2015 at 06:05:45PM +0100, Ian Jackson wrote:
> > Wei Liu writes ("[PATCH v4 2/3] libxl: localtime(3) can return
> > NULL"):
> > > Signed-off-by: Wei Liu
> >
> > > tm = localtime(&t);
> > > +if (!tm) {
> > > +
Tiejun Chen writes ("[v11][PATCH 16/16] tools: parse to enable new rdm policy
parameters"):
> This patch parses to enable user configurable parameters to specify
> RDM resource and according policies which are defined previously,
>
> Global RDM parameter:
> rdm = "strategy=host,policy=strict/
On 22/07/15 14:39, Julien Grall wrote:
> On 22/07/15 14:31, Vijay Kilari wrote:
+p->desc = desc;
>>>
>>> This should have happened during routing, not now.
>>
>> While routing we don't have vlpi to update p->desc.
>
> Why do you need the p->desc? You don't use at all the p->desc during th
This is a prerequisite for punching holes into HVM and PVH guests' P2M
to allow passing through devices that are associated with (on VT-d)
RMRRs.
Signed-off-by: Jan Beulich
Signed-off-by: Tiejun Chen
Acked-by: Kevin Tian
Acked-by: Ian Campbell
---
v12a: Move interface structure union member to
On 07/22/2015 03:58 PM, Boris Ostrovsky wrote:
On 07/22/2015 09:50 AM, Juergen Gross wrote:
On 07/22/2015 03:36 PM, Dario Faggioli wrote:
On Tue, 2015-07-21 at 16:00 -0400, Boris Ostrovsky wrote:
On 07/20/2015 10:43 AM, Boris Ostrovsky wrote:
On 07/20/2015 10:09 AM, Dario Faggioli wrote:
I
>>> On 22.07.15 at 15:31, wrote:
> On Wed, Jul 22, 2015 at 02:02:11AM -0600, Jan Beulich wrote:
>> >>> On 21.07.15 at 19:23, wrote:
>> > First of all ld generates .got.plt section and objcopy copy it to binary
>> > file.
>> > It is not needed because we do not link our stuff here with shared
>> >
1 - 100 of 201 matches
Mail list logo