> From: Zhang, Haozhong
> Sent: Tuesday, January 05, 2016 3:33 PM
>
> On 01/05/16 15:19, Tian, Kevin wrote:
> > > From: Zhang, Haozhong
> > > Sent: Tuesday, January 05, 2016 3:15 PM
> > >
> > > On 01/05/16 15:08, Tian, Kevin wrote:
> > > > > From: Zhang, Haozhong
> > > > > Sent: Wednesday, Decembe
On 01/05/16 15:19, Tian, Kevin wrote:
> > From: Zhang, Haozhong
> > Sent: Tuesday, January 05, 2016 3:15 PM
> >
> > On 01/05/16 15:08, Tian, Kevin wrote:
> > > > From: Zhang, Haozhong
> > > > Sent: Wednesday, December 30, 2015 7:49 PM
> > > >
> > > > Pass PCOMMIT CPU feature into HMV domain. Curre
This run is configured for baseline tests only.
flight 38591 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38591/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1
> From: Zhang, Haozhong
> Sent: Tuesday, January 05, 2016 3:15 PM
>
> On 01/05/16 15:08, Tian, Kevin wrote:
> > > From: Zhang, Haozhong
> > > Sent: Wednesday, December 30, 2015 7:49 PM
> > >
> > > Pass PCOMMIT CPU feature into HMV domain. Currently, we do not intercept
> > > pcommit instruction fo
On 01/05/16 15:08, Tian, Kevin wrote:
> > From: Zhang, Haozhong
> > Sent: Wednesday, December 30, 2015 7:49 PM
> >
> > Pass PCOMMIT CPU feature into HMV domain. Currently, we do not intercept
> > pcommit instruction for L1 guest, and allow L1 to intercept pcommit
> > instruction for L2 guest.
>
>
> From: Zhang, Haozhong
> Sent: Wednesday, December 30, 2015 7:49 PM
>
> Pass PCOMMIT CPU feature into HMV domain. Currently, we do not intercept
> pcommit instruction for L1 guest, and allow L1 to intercept pcommit
> instruction for L2 guest.
Could you elaborate why different policies are used f
> From: Zhang, Haozhong
> Sent: Wednesday, December 30, 2015 7:49 PM
>
> Pass CPU features CLFLUSHOPT and CLWB into HVM domain so that those two
> instructions can be used by guest.
>
> The specification of above two instructions can be found in
> https://software.intel.com/sites/default/files/ma
>>> On 1/4/2016 at 06:15 PM, in message , Wei Liu
wrote:
> This email only tracks big items for xen.git tree. Please reply for items you
> woulk like to see in 4.7 so that people have an idea what is going on and
> prioritise accordingly.
>
> You're welcome to provide description and use c
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Monday, January 04, 2016 6:00 PM
>
> Most #DB exceptions are traps rather than faults, meaning that the instruction
> pointer in the exception frame points after the instruction rather than at it.
>
> However, VMX intercepts all hav
> From: Brendan Gregg [mailto:bgr...@netflix.com]
> Sent: Tuesday, January 05, 2016 9:44 AM
>
> This introduces a way to have a restricted VPMU, by specifying one of two
> predefined groups of PMCs to make available. For secure environments, this
> allows the VPMU to be used without needing to ena
For below error:
[ 5023.070461] vGT error:(g2h_gm_range:1660) VM(21): invalid address range:
g_addr(0x1000), size(0x1000)
Likely you didn’t use a XenGT-aware i915 driver inside VM, which is required
e.g. to handle address space ballooning. A simple way is to copy same Dom0
kernel/initrd/module
This run is configured for baseline tests only.
flight 38589 linux-3.16 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38589/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 14 guest-stop
flight 76942 qemu-upstream-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76942/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 63071
test-am
Hi Michael,
On Thu, Dec 31, 2015 at 09:07:42PM +0200, Michael S. Tsirkin wrote:
> This defines __smp_xxx barriers for powerpc
> for use by virtualization.
>
> smp_xxx barriers are removed as they are
> defined correctly by asm-generic/barriers.h
>
> This reduces the amount of arch-specific boile
On 2015/11/30 23:22, Julien Grall wrote:
> Hi,
>
> On 27/11/15 12:04, Stefano Stabellini wrote:
>> > On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
>>> >> From: Parth Dixit
>>> >>
>>> >> Create a helper function for mapping with cached attributes.
>>> >>
>>> >> Signed-off-by: Parth Dixit
Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
CONFIG_XSM.
CC: Daniel De Graaf
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Daniel De Graaf
---
Change from v2:
flight 76919 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76919/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 66879
Tes
On 01/04/16 16:01, Stefano Stabellini wrote:
> CC'ing the Xen tools maintainers and Anthony.
>
> On Tue, 29 Dec 2015, Haozhong Zhang wrote:
> > Reuse existing NVDIMM ACPI code to build ACPI tables for pc-nvdimm
> > devices. The resulting tables are then copied into Xen guest domain so
> > tha they
After the commit d77570e7, libxl__domain_save_device_model() can
be dropped.
Signed-off-by: Wen Congyang
---
tools/libxl/libxl_dom.c | 91
tools/libxl/libxl_internal.h | 3 --
2 files changed, 94 deletions(-)
diff --git a/tools/libxl/libxl_dom.
flight 76944 qemu-upstream-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76944/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 62702
test-am
Signed-off-by: Wen Congyang
---
tools/libxc/xc_sr_save.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/tools/libxc/xc_sr_save.c b/tools/libxc/xc_sr_save.c
index 76ebb34..8090fcf 100644
--- a/tools/libxc/xc_sr_save.c
+++ b/tools/libxc/xc_sr_save.c
@@ -786,7 +786,9 @@ stati
Signed-off-by: Wen Congyang
Reviewed-by: Andrew Cooper
---
tools/libxc/xc_sr_save.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxc/xc_sr_save.c b/tools/libxc/xc_sr_save.c
index cefcef5..76ebb34 100644
--- a/tools/libxc/xc_sr_save.c
+++ b/tools/libxc/xc_sr_save.c
For example: if the secondary host is down, and we fail to send the data to
the secondary host. xc_domain_save() returns 0. So in the function
libxl__xc_domain_save_done(), rc is 0(the helper program exits normally),
and retval is 0(it is xc_domain_save()'s return value). In such case, we
just need
Wen Congyang (5):
remus: don't call stream_continue() when doing failover
remus: don't write xenstore data if it fails
tools/libxc: don't send end record if remus fails
tools/libxc: error handling for the postcopy() callback
tools/libxl: remove unused function libxl__domain_save_device_mo
stream_continue() is used for migration to read emulator
xenstore data and emulator context. For remus, if we do
failover, we have read it in the checkpoint cycle, and
we only need to complete the stream.
Signed-off-by: Wen Congyang
Reviewed-by: Andrew Cooper
---
tools/libxl/libxl_stream_read.c
This introduces a way to have a restricted VPMU, by specifying one of two
predefined groups of PMCs to make available. For secure environments, this
allows the VPMU to be used without needing to enable all PMCs.
Signed-off-by: Brendan Gregg
Reviewed-by: Boris Ostrovsky
---
Changes in v5:
* addre
Sorry for the delay...
On Thu, Dec 17, 2015 at 10:12 PM, Tian, Kevin wrote:
> > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> > Sent: Tuesday, December 08, 2015 3:14 AM
> >
> > On 11/30/2015 07:39 PM, Brendan Gregg wrote:
> > > This introduces a way to have a restricted VPMU, by sp
On 01/04/16 15:56, Stefano Stabellini wrote:
> On Tue, 29 Dec 2015, Haozhong Zhang wrote:
> > This patch series extends current vNVDIMM implementation to provide
> > vNVDIMM to HVM domains when QEMU is used as the device model of Xen.
> >
> > This patch series is based on upstream qemu rather of q
On 01/04/16 15:57, Stefano Stabellini wrote:
> On Tue, 29 Dec 2015, Xiao Guangrong wrote:
> > On 12/29/2015 07:28 PM, Haozhong Zhang wrote:
> > > This patch series extends current vNVDIMM implementation to provide
> > > vNVDIMM to HVM domains when QEMU is used as the device model of Xen.
> > >
> >
On 01/04/16 13:40, Boris Ostrovsky wrote:
> On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
> >This patch adds a field tsc_scaling_ratio in struct hvm_vcpu to
> >record the TSC scaling ratio, and sets it up when tsc_set_info() is
> >called for a vcpu or when a vcpu is restored or reset.
> >
> >Before
On 01/04/16 13:26, Boris Ostrovsky wrote:
> On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
> >This patch adds several functions to take multiplication, division and
> >shifting involving 64-bit integers. Those functions are derived from
> >Linux kernel and will be used by later patches to calculate
Both xm and xl config have long supported specifying vif rate
limiting, e.g.
vif = [ 'mac=00:16:3E:74:3d:76,bridge=br0,rate=10MB/s' ]
Add support for mapping rate to and from in the xenconfig
parser and formatter. rate is mapped to the required 'average' attribute
of the element, e.g.
.
Happy New Year!
This small series adds support for specifying vif outgoing rate limits
in Xen. The first patch adds support for converting rate limits between
sexpr config and domXML. The second patch does the same for xl/xm config.
The third patch adds outgoing rate limiting to the libxl driver.
The libxl_device_nic structure supports specifying an outgoing rate
limit based on a time interval and bytes allowed per interval. In xl
config a rate limit is specified as "/s@". INTERVAL
is optional and defaults to 50ms.
libvirt expresses outgoing limits by average (required), peak, burst,
and f
The xen sexpr config format has long supported specifying vif rate
limiting, e.g.
(device
(vif
(mac '00:16:3e:1b:b1:47')
(rate '10240KB/s')
...
)
)
Add support for mapping rate to and from in the xenconfig
sexpr parser and formatter. rate is mapped to the required '
On 01/04/16 13:09, Boris Ostrovsky wrote:
> On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
> >This patch makes the pvclock return the scaled host TSC and
> >corresponding scaling parameters to HVM domains if guest TSC is not
> >emulated and TSC scaling is enabled.
> >
> >Signed-off-by: Haozhong Zhan
flight 76941 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76941/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 67110
Tests which did not succeed, but a
On 01/04/16 12:48, Boris Ostrovsky wrote:
> On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
> >When the TSC mode of a HVM container is TSC_MODE_DEFAULT or
> >TSC_MODE_PVRDTSCP and no TSC emulation is used, the existing
> >tsc_get_info() uses the host TSC frequency (cpu_khz) as the guest TSC
> >freque
flight 76914 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76914/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 5 xen-build fail REGR. vs. 65650
build-i386
Hi Michael,
On Thu, Dec 31, 2015 at 09:08:22PM +0200, Michael S. Tsirkin wrote:
> This defines __smp_xxx barriers for metag,
> for use by virtualization.
>
> smp_xxx barriers are removed as they are
> defined correctly by asm-generic/barriers.h
>
> Note: as __smp_XX macros should not depend on C
On Thu, Dec 31, 2015 at 09:07:02PM +0200, Michael S. Tsirkin wrote:
> On metag dma_rmb, dma_wmb, smp_store_mb, read_barrier_depends,
> smp_read_barrier_depends, smp_store_release and smp_load_acquire match
> the asm-generic variants exactly. Drop the local definitions and pull in
> asm-generic/bar
This run is configured for baseline tests only.
flight 38588 linux-3.18 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38588/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start
On Mon, 2016-01-04 at 22:45 +0200, Michael S. Tsirkin wrote:
> On Mon, Jan 04, 2016 at 08:07:40AM -0800, Joe Perches wrote:
> > On Mon, 2016-01-04 at 13:36 +0200, Michael S. Tsirkin wrote:
> > > SMP-only barriers were missing in checkpatch.pl
> > >
> > > Refactor code slightly to make adding more
On Mon, 2016-01-04 at 23:07 +0200, Michael S. Tsirkin wrote:
> On Mon, Jan 04, 2016 at 08:47:53AM -0800, Joe Perches wrote:
> > On Mon, 2016-01-04 at 13:37 +0200, Michael S. Tsirkin wrote:
> > > Add virt_ barriers to list of barriers to check for
> > > presence of a comment.
> >
> > Are these virt
flight 76908 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76908/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 5 xen-build fail REGR. vs. 66458
build-i386-prev
On 01/04/2016 03:41 PM, Joao Martins wrote:
On 01/04/2016 04:07 PM, Boris Ostrovsky wrote:
On 12/28/2015 04:52 PM, Joao Martins wrote:
+
+ size = PAGE_ALIGN(sizeof(struct pvclock_vsyscall_time_info));
+ mem = memblock_alloc(size, PAGE_SIZE);
+ if (!mem)
+ retur
On Mon, Jan 04, 2016 at 04:01:08PM +, Stefano Stabellini wrote:
> CC'ing the Xen tools maintainers and Anthony.
>
> On Tue, 29 Dec 2015, Haozhong Zhang wrote:
> > Reuse existing NVDIMM ACPI code to build ACPI tables for pc-nvdimm
> > devices. The resulting tables are then copied into Xen guest
On Mon, Jan 04, 2016 at 08:47:53AM -0800, Joe Perches wrote:
> On Mon, 2016-01-04 at 13:37 +0200, Michael S. Tsirkin wrote:
> > Add virt_ barriers to list of barriers to check for
> > presence of a comment.
>
> Are these virt_ barriers used anywhere?
>
> I see some virtio_ barrier like uses.
The
On Mon, Jan 04, 2016 at 03:49:11PM -0500, Konrad Rzeszutek Wilk wrote:
> On Tue, Dec 15, 2015 at 02:54:31PM +0100, Marek Marczykowski-Górecki wrote:
> > Hi,
> >
> > Booting kernel with both CONFIG_X86_MCE=y and CONFIG_XEN_MCE_LOG=y
> > results in "mce: Unable to init device /dev/mcelog (rc: -16)"
On Tue, Dec 15, 2015 at 02:54:31PM +0100, Marek Marczykowski-Górecki wrote:
> Hi,
>
> Booting kernel with both CONFIG_X86_MCE=y and CONFIG_XEN_MCE_LOG=y
> results in "mce: Unable to init device /dev/mcelog (rc: -16)" error. I
> think that's because both drivers tries to register that character
> d
On 04/01/16 15:33, Doug Goldstein wrote:
On 1/4/16 2:01 PM, Daniel De Graaf wrote:
On 22/12/15 16:26, Doug Goldstein wrote:
Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
CONFIG_XSM.
CC: Keir Fraser
CC: Ja
On Mon, Jan 04, 2016 at 08:07:40AM -0800, Joe Perches wrote:
> On Mon, 2016-01-04 at 13:36 +0200, Michael S. Tsirkin wrote:
> > SMP-only barriers were missing in checkpatch.pl
> >
> > Refactor code slightly to make adding more variants easier.
> >
> > Signed-off-by: Michael S. Tsirkin
> > ---
>
On Mon, Jan 04, 2016 at 04:03:39PM +0100, Martin Schwidefsky wrote:
> On Mon, 4 Jan 2016 14:20:42 +0100
> Peter Zijlstra wrote:
>
> > On Thu, Dec 31, 2015 at 09:06:30PM +0200, Michael S. Tsirkin wrote:
> > > On s390 read_barrier_depends, smp_read_barrier_depends
> > > smp_store_mb(), smp_mb__befo
flight 77025 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77025/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 01/04/2016 04:07 PM, Boris Ostrovsky wrote:
> On 12/28/2015 04:52 PM, Joao Martins wrote:
>> +
>> +static int xen_setup_vsyscall_time_info(int cpu)
>> +{
>> +struct pvclock_vsyscall_time_info *ti;
>> +struct vcpu_register_time_memory_area t;
>> +struct pvclock_vcpu_time_info *pvti;
On 01/04/2016 04:15 PM, Boris Ostrovsky wrote:
> On 01/04/2016 11:12 AM, David Vrabel wrote:
>> On 28/12/15 21:52, Joao Martins wrote:
>>> This option enables support for pvclock vsyscall/vdso
>>> support on Xen. Default is off, since Xen doesn't
>>> expose yet the PVCLOCK_TSC_STABLE_BIT flag.
>>
On Mon, Jan 04, 2016 at 02:54:20PM +0100, Peter Zijlstra wrote:
> On Mon, Jan 04, 2016 at 02:36:58PM +0100, Peter Zijlstra wrote:
> > On Sun, Jan 03, 2016 at 11:12:44AM +0200, Michael S. Tsirkin wrote:
> > > On Sat, Jan 02, 2016 at 11:24:38AM +, Russell King - ARM Linux wrote:
> >
> > > > My o
On 1/4/16 2:01 PM, Daniel De Graaf wrote:
> On 22/12/15 16:26, Doug Goldstein wrote:
>> Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
>> within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
>> CONFIG_XSM.
>>
>> CC: Keir Fraser
>> CC: Jan Beulich
>> CC: Andrew C
On Mon, Jan 04, 2016 at 02:20:42PM +0100, Peter Zijlstra wrote:
> On Thu, Dec 31, 2015 at 09:06:30PM +0200, Michael S. Tsirkin wrote:
> > On s390 read_barrier_depends, smp_read_barrier_depends
> > smp_store_mb(), smp_mb__before_atomic and smp_mb__after_atomic match the
> > asm-generic variants exac
On Mon, Jan 04, 2016 at 02:45:25PM +0100, Peter Zijlstra wrote:
> On Thu, Dec 31, 2015 at 09:08:38PM +0200, Michael S. Tsirkin wrote:
> > This defines __smp_xxx barriers for s390,
> > for use by virtualization.
> >
> > Some smp_xxx barriers are removed as they are
> > defined correctly by asm-gene
> > You've put the consumer values into the shared page. I'd rather not have
> > to scrutinize your shared ring implementation for other security bugs.
> > Similarly, if there's another security issues like XSA-155 I'd rather
> > not have to look at another non-standard shared ring implementation.
On Mon, Jan 04, 2016 at 02:36:58PM +0100, Peter Zijlstra wrote:
> On Sun, Jan 03, 2016 at 11:12:44AM +0200, Michael S. Tsirkin wrote:
> > On Sat, Jan 02, 2016 at 11:24:38AM +, Russell King - ARM Linux wrote:
>
> > > My only concern is that it gives people an additional handle onto a
> > > "new
On 22/12/15 16:26, Doug Goldstein wrote:
Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
CONFIG_XSM.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
The dependencies for L
On 22/12/15 16:26, Doug Goldstein wrote:
Converts the Config.mk option of FLASK_ENABLE into a Kconfig option for
the hypervisor called CONFIG_FLASK. This commit knowingly breaks the
dependent relationship on XSM_ENABLE which is addressed when XSM_ENABLE
is converted to Kconfig.
Signed-off-by: Do
On Mon, Jan 04, 2016 at 04:13:57PM +, Ian Jackson wrote:
> Konrad Rzeszutek Wilk writes ("blkback name greater than 16 characters
> issue"):
> > Way back in the past Jan pointed out this issue
> > http://lists.xenproject.org/archives/html/xen-devel/2015-05/msg03505.html
> >
> > which is that
On Mon, Jan 04, 2016 at 03:41:28PM +, Stefano Stabellini wrote:
> On Mon, 4 Jan 2016, Lars Kurth wrote:
> > On 04/01/2016 14:47, "Stefano Stabellini"
> > wrote:
> >
> > >Unfortunately I don't have a setup to test this either. Maybe Lars can
> > >find out who should be involved on the Intel si
On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
This patch implements a common function hvm_scale_tsc() to scale TSC by
using TSC scaling information collected by architecture code.
Signed-off-by: Haozhong Zhang
Reviewed-by: Kevin Tian (except the mul64 part)
Reviewed-by: Boris Ostrovsky
_
On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
This patch adds a field tsc_scaling_ratio in struct hvm_vcpu to
record the TSC scaling ratio, and sets it up when tsc_set_info() is
called for a vcpu or when a vcpu is restored or reset.
Before applying the TSC scaling ratio to CPU, we check its vali
flight 76980 qemu-upstream-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76980/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 62044
build-a
On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
This patch adds several functions to take multiplication, division and
shifting involving 64-bit integers. Those functions are derived from
Linux kernel and will be used by later patches to calculate scaling
ratio and scaled TSC.
Signed-off-by: Haozh
On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
This patch makes the pvclock return the scaled host TSC and
corresponding scaling parameters to HVM domains if guest TSC is not
emulated and TSC scaling is enabled.
Signed-off-by: Haozhong Zhang
---
Changes in v3:
(addressing Boris Ostrovsky's com
On 04/01/16 17:46, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [Xen-devel] question about migration"):
>> On 04/01/16 15:31, Ian Jackson wrote:
>>> * It is not possible to resume the domain in the source after it has
>>> suspended.
>> This functionality exists and is already used in several c
On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
When the TSC mode of a HVM container is TSC_MODE_DEFAULT or
TSC_MODE_PVRDTSCP and no TSC emulation is used, the existing
tsc_get_info() uses the host TSC frequency (cpu_khz) as the guest TSC
frequency. However, tsc_set_info() may set the guest TSC fre
Andrew Cooper writes ("Re: [Xen-devel] question about migration"):
> On 04/01/16 15:31, Ian Jackson wrote:
> > * It is not possible to resume the domain in the source after it has
> > suspended.
>
> This functionality exists and is already used in several circumstances,
> both by libxl, and othe
On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
When TSC_MODE_PVRDTSCP is used for a HVM container and TSC scaling is
available, use the non-zero value of argument gtsc_khz of tsc_set_info()
as the guest TSC frequency rather than using the host TSC
frequency. Otherwise, TSC scaling will not be able
flight 77012 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77012/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
George Dunlap writes ("[PATCH v4 5/5] xl: Return error codes for pci*
commands"):
> Add return codes for pci-detach, pci-attach, pci-asssignable-add, and
> pci-assignable-remove.
>
> Returning error codes makes it easier for shell scripts to tell if a
> command has failed or succeeded.
>
> NB th
George Dunlap writes ("[PATCH v4 4/5] xl: Return an error on failed cd-insert"):
> This makes xl more useful in scripts.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
George Dunlap writes ("[PATCH v4 3/5] xl: Make set_memory_target return an
error code on failure"):
> Also move the rc -> shell code translation into set_memory_max() to
> make the two functions consistent with each other, and with other
> similar examples in xl_cmdimpl.c
Acked-by: Ian Jackson
On 04/01/16 16:56, Marek Marczykowski-Górecki wrote:
> On Mon, Jan 04, 2016 at 04:22:32PM +, David Vrabel wrote:
>> On 04/01/16 13:06, Marek Marczykowski-Górecki wrote:
>>> On Tue, Dec 22, 2015 at 10:06:25AM -0500, Eric Shelton wrote:
The XSA mentions that "PV frontend patches will be deve
George Dunlap writes ("[PATCH v4 2/5] libxl: Fix libxl_set_memory_target return
value"):
> 2. Use 'r' for return values to functions whose return values are a
> different error space (like xc_domain_setmaxmem and
> xc_domain_set_pod_target), or where a failure means retry, rather than
> fail the w
George Dunlap writes ("[PATCH v4 1/5] libxl: Remove pointless hypercall from
libxl_set_memory_target"):
> There's no obvious reason for the call to xc_domain_getinfolist -- all
> it seems to be doing is checking that the domain exists; but if it
> doesn't exist, it will have already failed by this
Hey Jens,
Please pull in your "for-4.5/drivers" branch the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git stable/for-jens-4.5
which is based on "bcache: Change refill_dirty() to always scan entire disk if
necessary"
(the tip of your branch as of today)
The pull
This is a note to let you know that I have just added a patch titled
x86/cpu: Fix SMAP check in PVOPS environments
to the linux-3.16.y-queue branch of the 3.16.y-ckt extended stable tree
which can be found at:
http://kernel.ubuntu.com/git/ubuntu/linux.git/log/?h=linux-3.16.y-queue
This
On Mon, 4 Jan 2016, Ian Campbell wrote:
> On Sat, 2015-12-19 at 11:18 +, Andre Fucs wrote:
> > Ian,
> >
> > Thanks for the reply.
> >
> > coredumpctl gbd PID_OF_PROCESS printed the following:
>
> A SIGBUS in QEMU's blk_handle_requests, how exciting!
>
> Copying xen-devel and some relevant maint
Wen Congyang writes ("[PATCH v5 COLOPre 00/18] Prerequisite patches for COLO"):
> This patchset is Prerequisite for COLO feature. Refer to:
> http://wiki.xen.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping
Thanks for this. I see no-one has replied yet. I wanted to reply to
say that this is on my rada
Ian Campbell writes ("Re: [PATCH] tools: allow configure time choice of libexec
subdirectory."):
> I somehow slipped a stray ` in there and didn't notice, sorry.
This looks like a reasonable change aside from that but we should
definitely do some build tests at commit time.
With the stray ` remo
On Mon, Jan 04, 2016 at 04:22:32PM +, David Vrabel wrote:
> On 04/01/16 13:06, Marek Marczykowski-Górecki wrote:
> > On Tue, Dec 22, 2015 at 10:06:25AM -0500, Eric Shelton wrote:
> >> The XSA mentions that "PV frontend patches will be developed and
> >> released (publicly) after the embargo dat
On 04/01/16 16:47, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH OSSTEST] Add a weekly coverity flight"):
>> Move collectversions into Osstest::BuildSupport rather than
>> duplicating with ts-xen-build (nothing else is really duplicated)
> This could profitably be split into a separate patch IM
On Mon, 2016-01-04 at 13:37 +0200, Michael S. Tsirkin wrote:
> Add virt_ barriers to list of barriers to check for
> presence of a comment.
Are these virt_ barriers used anywhere?
I see some virtio_ barrier like uses.
___
Xen-devel mailing list
Xen-de
Ian Campbell writes ("[PATCH OSSTEST] Add a weekly coverity flight"):
> Move collectversions into Osstest::BuildSupport rather than
> duplicating with ts-xen-build (nothing else is really duplicated)
This could profitably be split into a separate patch IMO.
> For the cr-* integration we treat bra
These two patches provide proper HTML titles for the planner output.
I have tested them by running them in the Citrix Cambridge instance,
where they are currently live.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
When ms-queuedaemon generates a resource-projection.html, it sometimes
does so from data-plan.pl (see proc report-plan). This means that
ms-planner does not get a reliable indication of whether it is being
run for the plan or the projection, and the resource-project.html
sometimes claims to be the
This means that these browser windows will actually get titles!
Signed-off-by: Ian Jackson
---
ms-flights-summary |2 ++
ms-planner |5 -
2 files changed, 6 insertions(+), 1 deletion(-)
diff --git a/ms-flights-summary b/ms-flights-summary
index ec8fa18..ea72088 100755
--- a/
On Mon, 2016-01-04 at 16:28 +, Ian Jackson wrote:
> Alex Xu writes ("Re: [PATCH] xen/tools/get-fields.sh: Use printf for
> POSIX compat"):
> > Argh, claws mangled the formatting. Please ignore.
>
> Indeed. But, your code is good. When you repost please add my ack.
Jan already committed it.
On Mon, 2015-12-28 at 00:16 -0500, Joshua Otto wrote:
> From: Chester Lin
>
> Fixes Coverity CID 1343299. The call to xc_psr_cat_set_domain_data()
> expects type xc_psr_cat_type but is provided libxl_psr_cbm_type which
> is defined in IDL.
I assume the values are the same by construction in the
Ian Campbell writes ("Re: [PATCH OSSTEST] Debian: Support runvar to set flask
mode"):
> On Mon, 2015-12-14 at 18:58 +, Ian Jackson wrote:
> > I thought we were hoping to eventually do away with our copy of this
> > file. Has this change gone upstream ?
>
> Sadly there has not been a peep fro
On Mon, 2015-12-28 at 00:16 -0500, Joshua Otto wrote:
Please check MAINTAINERS (perhaps using ./scripts/get_maintainers.pl) to
determine the maintainers in order to CC them.
(Hrm, I see now in your cover letter you have, I wonder why Jan et al are
missing?)
> From: Harley Armstrong
>
> Fix CID
On 04/01/16 15:31, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [Xen-devel] question about migration"):
>> On 25/12/2015 03:06, Wen Congyang wrote:
>>> Another problem:
>>> If migration fails after the guest is suspended, we will resume it in the
>>> source.
>>> In this case, we cannot shutdown
On Mon, Jan 04, 2016 at 03:55:53PM +0100, Juergen Gross wrote:
> get_domain_ids() in libxenstat used by read_attributes_qdisk() is
> limited to 1024 domains. Remove that limit.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
> ---
> tools/xenstat/libxenstat/src/xenstat_qmp.c | 67
> +++
1 - 100 of 229 matches
Mail list logo