>>> On 07.01.16 at 07:58, wrote:
> On 2015/11/17 19:04, Jan Beulich wrote:
> On 17.11.15 at 10:40, wrote:
>>> > --- a/xen/arch/arm/mm.c
>>> > +++ b/xen/arch/arm/mm.c
>>> > @@ -1138,6 +1138,10 @@ int xenmem_add_to_physmap_one(
>>> > rcu_unlock_domain(od);
>>> > break;
>>> >
From: Tomasz Nowicki
New subtables and changes to other subtables. Tomasz Nowicki.
Signed-off-by: Tomasz Nowicki
Signed-off-by: Hanjun Guo
Signed-off-by: Bob Moore
Signed-off-by: Lv Zheng
Signed-off-by: Rafael J. Wysocki
[Linux commit d0c383e48d1b6cdc39cf9cc2f082bbb6f3c28b89]
Signed-off-by:
From: Bob Moore
ACPICA commit 532bf402a503061afd9d80a23e1d3c8fd99b052c
_STA override table.
Link: https://github.com/acpica/acpica/commit/532bf402
Signed-off-by: Bob Moore
Signed-off-by: Lv Zheng
Signed-off-by: Rafael J. Wysocki
[Linux commit 37e12657f8922ebc62f696494c56c81db509053e]
Signed-
From: Hanjun Guo
ACPICA commit 4b100dc43e8baee8c8b4891b23bc7ad03eba6a28
Support for the new version field in the generic distributor
subtable. Hanjun Guo
Link: https://github.com/acpica/acpica/commit/4b100dc4
Signed-off-by: Hanjun Guo
Signed-off-by: Bob Moore
Signed-off-by: Lv Zheng
Signed-
From: Bob Moore
ACPICA commit 02cbb41232bccf7a91967140cab95d5f48291f21
New subtable type. Some additions to existing subtables.
Link: https://github.com/acpica/acpica/commit/02cbb412
Signed-off-by: Bob Moore
Signed-off-by: Lv Zheng
Signed-off-by: Rafael J. Wysocki
[Linux commit 0cff8dc0099f6
From: Hanjun Guo
Mostly by Hanjun Guo
Signed-off-by: Hanjun Guo
Signed-off-by: Bob Moore
Signed-off-by: Lv Zheng
Signed-off-by: Rafael J. Wysocki
[Linux commit 34ea065e5e607dcbb249046c42a491f8b24ad849]
Signed-off-by: Shannon Zhao
---
xen/include/acpi/actbl3.h | 9 +++--
1 file changed
From: Bob Moore
Adds new file, actbl3.h
Signed-off-by: Bob Moore
Signed-off-by: Lin Ming
Signed-off-by: Len Brown
[Linux commit c5bd6537329e66a8b36234f19a36d94b72d07394]
[only port changes of Generic Interrupt and Generic Distributor, other
changes already exist]
Signed-off-by: Shannon Zhao
>>> On 06.01.16 at 18:41, wrote:
> On Tue, Nov 10, 2015 at 05:29:35AM -0700, Jan Beulich wrote:
>> >>> On 06.11.15 at 20:36, wrote:
>> > All of XENVER_* have now an XSM check.
>> >
>> > The subops for XENVER_[compile_info|changeset|commandline|
>> > extraversion] are now priviliged operations. T
Hi Jan,
On 2015/11/17 19:04, Jan Beulich wrote:
On 17.11.15 at 10:40, wrote:
>> > --- a/xen/arch/arm/mm.c
>> > +++ b/xen/arch/arm/mm.c
>> > @@ -1138,6 +1138,10 @@ int xenmem_add_to_physmap_one(
>> > rcu_unlock_domain(od);
>> > break;
>> > }
>> > +case XENMAPSPACE_d
On 06/01/16 17:03, Ian Campbell wrote:
> On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
>> The program init-xenstore-domain to start a xenstore domain instead
>> of the xenstored daemon is built, but not installed. Change that.
>>
>> Move the program to a new tools subdirectory "helpers" t
On 06/01/16 16:52, Ian Campbell wrote:
> On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
>> Support the xenstore domain flag for obtaining domain info.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> tools/libxc/include/xenctrl.h | 2 +-
>> tools/libxc/xc_domain.c | 17 +--
On 1/6/2016 5:58 PM, Jan Beulich wrote:
On 06.01.16 at 10:44, wrote:
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 06 January 2016 08:59
To: Zhang Yu
Cc: Andrew Cooper; Paul Durrant; Wei Liu; Ian Jackson; Stefano Stabellini;
Kevin Tian; zhiyuan...@intel.com;
On 1/6/2016 4:59 PM, Jan Beulich wrote:
On 31.12.15 at 10:33, wrote:
On 12/21/2015 10:45 PM, Jan Beulich wrote:
On 15.12.15 at 03:05, wrote:
--- a/xen/include/asm-x86/hvm/domain.h
+++ b/xen/include/asm-x86/hvm/domain.h
@@ -48,8 +48,8 @@ struct hvm_ioreq_vcpu {
bool_t pendi
Hi Wei,
On 01/04/16 10:15, Wei Liu wrote:
[...]
> = Projects =
>
> == Hypervisor ==
[...]
> === x86 ===
[...]
> == Toolstack ==
* vNVDIMM support
- Haozhong Zhang
This is another item I'm working on and would like to see in 4.7. Not
quite sure if it belongs to only toolstack, because
On 06/01/16 16:59, Ian Campbell wrote:
> On Fri, 2015-12-18 at 15:10 +0100, Juergen Gross wrote:
>> On 18/12/15 14:53, Andrew Cooper wrote:
>>> On 18/12/15 13:14, Juergen Gross wrote:
Add libxl_xenstore_domid() to obtain the domain id of the xenstore
domain.
Signed-off-by: Juerg
flight 77203 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77203/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-build fail REGR. vs. 65650
build-amd64-prev
Hi,
Can anyone guide me on how to compile Xen with Infiniband support?
(Particularly Mellanox)
I want to perform some RDMA read/write functionality from within the Xen
code (it is for a course project) using the Verbs API.
Thanks,
Gohar
___
Xen-devel ma
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
flight 77199 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77199/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 5 xen-build fail REGR. vs. 66458
build-i386-prev
Nope. That commit is present in 4.6 and results in x200 being able to boot
xen.
Not having that option makes xen hang at boot.
If present, it works until other vm access pass-through devices, which I'm
not able to troubleshoot even through amt SOL.
See here for debug logs:
https://groups.google.
flight 77210 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77210/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 5 kernel-build fail REGR. vs. 60684
build-amd6
On 2016/1/4 19:54, David Vrabel wrote:
> On 29/12/15 05:49, Ouyangzhaowei (Charles) wrote:
>> Hi David,
>>
>> This patch has been applied to for-linus-4.1b, and we wonder if this patch
>> will be applied to linux kernel, or does
>> it still needs more test to apply to linux kernel?
>
> Sorry, i
On January 06, 2016 7:26 PM, wrote:
> > > diff --git a/xen/drivers/passthrough/vtd/qinval.c
> > > b/xen/drivers/passthrough/vtd/qinval.c
> > > index b227e4e..7330c5d 100644
> > > --- a/xen/drivers/passthrough/vtd/qinval.c
> > > +++ b/xen/drivers/passthrough/vtd/qinval.c
> > > @@ -190,9 +190,19 @@
Sure. I'll test it soon.
Thanks,
-Xudong
> -Original Message-
> From: Stefano Stabellini [mailto:stefano.stabell...@eu.citrix.com]
> Sent: Wednesday, January 6, 2016 8:18 PM
> To: Lars Kurth
> Cc: Stefano Stabellini ; Hao, Xudong
> ; Lars Kurth ; Cao jin
> ; xen-de...@lists.xensource.com
This run is configured for baseline tests only.
flight 38597 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38597/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1
On Wed, Jan 06, 2016 at 10:23:51PM +0200, Michael S. Tsirkin wrote:
[...]
> > >
> > > Sorry, I don't understand - why do you have to do anything?
> > > I changed all users of smp_lwsync so they
> > > use __smp_lwsync on SMP and barrier() on !SMP.
> > >
> > > This is exactly the current behaviour,
flight 77183 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77183/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-prev 5 xen-build fail REGR. vs. 66426
test-amd64-amd64-
flight 77190 qemu-upstream-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77190/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 62702
test-am
On Wed, Jan 06, 2016 at 09:51:52AM +0800, Boqun Feng wrote:
> On Tue, Jan 05, 2016 at 06:16:48PM +0200, Michael S. Tsirkin wrote:
> [snip]
> > > > > Another thing is that smp_lwsync() may have a third user(other than
> > > > > smp_load_acquire() and smp_store_release()):
> > > > >
> > > > > http:/
With commit 8c45adec18e0 ("libxc: create unmapped initrd in domain
builder if supported") location of ramdisk may not be available to
HVMlite guests by the time alloc_magic_pages_hvm() is invoked if the
guest supports unmapped initrd.
So let's move ramdisk info initialization (along with a few oth
When copying boot command string for HVMlite guests we explicitly write
'\0' at MAX_GUEST_CMDLINE offset. Unless the string is close to
MAX_GUEST_CMDLINE in length this write will end up in the wrong place,
beyond the end of the mapped range.
We don't need to limit the size of command string to so
v3:
* Dropped test for MAX_GUEST_CMDLINE, use strncpy(.., cmdline_size)
instead of strcpy() in patch 1
* Dropped comment about dom->cmdline size having been tested in
alloc_magic_pages_hvm() in patch 2
Boris Ostrovsky (2):
libxc: Don't write terminating NULL character to command string
lib
In antcipation of XSM and FLASK migrating to Kconfig add support for
building them via Kconfig or the existing mechanism.
Signed-off-by: Doug Goldstein
---
Still untested but visually looks correct.
Changes since v3:
- Wrap all hunks of code with checks for Kconfig to not dirty the tree
Changes
On Wed, Jan 6, 2016 at 4:48 PM, Ian Campbell
wrote:
> On Wed, 2015-12-23 at 15:53 +0100, Tamas K Lengyel wrote:
> > Introduce new vm_event domctl option which allows an event subscriber
> > to request all vCPUs not currently pending a vm_event request to be
> > paused,
> > thus allowing the subsc
flight 77180 qemu-upstream-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77180/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 62044
build-a
On Fri, Oct 09, 2015 at 09:18:43AM -0600, Jan Beulich wrote:
> >>> On 09.10.15 at 04:56, wrote:
> > --- a/xen/arch/x86/Makefile
> > +++ b/xen/arch/x86/Makefile
> > @@ -108,12 +108,13 @@ $(TARGET)-syms: prelink.o xen.lds
> > $(BASEDIR)/common/symbols-dummy.o
> > $(BASEDIR)/common/symbols-d
flight 77179 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77179/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 62112
build-a
On Wed, 6 Jan 2016, Stefano Stabellini wrote:
> Please CC linux-arm for the non-RFC patches
>
> On Wed, 9 Dec 2015, Ian Campbell wrote:
> > Replace various stub functions with real functionality, including
> > reestablishing the shared info page and the per-vcpu info pages on
> > restore.
> >
> >
Please CC linux-arm for the non-RFC patches
On Wed, 9 Dec 2015, Ian Campbell wrote:
> Replace various stub functions with real functionality, including
> reestablishing the shared info page and the per-vcpu info pages on
> restore.
>
> Reestablishing the vcpu info page is a little subtle. The
> V
Please CC linux-arm for the non-RFC patches
On Wed, 9 Dec 2015, Ian Campbell wrote:
> Replace various stub functions with real functionality, including
> reestablishing the shared info page and the per-vcpu info pages on
> restore.
>
> Reestablishing the vcpu info page is a little subtle. The
> V
On Tue, Nov 10, 2015 at 02:51:35PM -0500, Daniel De Graaf wrote:
> On 06/11/15 14:36, Konrad Rzeszutek Wilk wrote:
> >All of XENVER_* have now an XSM check.
> >
> >The subops for XENVER_[compile_info|changeset|commandline|
> >extraversion] are now priviliged operations. To not break
> >guests we st
On Tue, Nov 10, 2015 at 05:29:35AM -0700, Jan Beulich wrote:
> >>> On 06.11.15 at 20:36, wrote:
> > All of XENVER_* have now an XSM check.
> >
> > The subops for XENVER_[compile_info|changeset|commandline|
> > extraversion] are now priviliged operations. To not break
> > guests we still return an
On Tue, Nov 10, 2015 at 09:49:00AM -0700, Jan Beulich wrote:
> >>> On 06.11.15 at 20:36, wrote:
> > --- a/xen/arch/x86/Makefile
> > +++ b/xen/arch/x86/Makefile
> > @@ -109,15 +109,19 @@ $(TARGET)-syms: prelink.o xen.lds
> > $(BASEDIR)/common/symbols-dummy.o
> > $(NM) -pa --format=sysv $(@D)/.
Injecting a fault to the guest just because it is writing to one of the
GICD_ICACTIVER registers, which are part of the GICv2 and GICv3 specs,
is harsh. Additionally it causes recent linux kernels to fail to boot on
Xen.
Ignore writes to GICD_ICACTIVER ... GICD_ICACTIVERN instead, to solve
the boo
On 1/6/16 4:25 AM, Ian Campbell wrote:
> On Tue, 2016-01-05 at 23:25 -0600, Doug Goldstein wrote:
>> In antcipation of XSM and FLASK migrating to Kconfig add support for
>> building them via Kconfig or the existing mechanism.
>>
>> Signed-off-by: Doug Goldstein
>> ---
>> Still untested but visuall
Ian Campbell writes ("Re: [Xen-devel] OVMF related osstest failures on multiple
branches"):
> [Ian Jackson:]
> > So I would be tempted to just update the Config.mk reference in stable
> > trees.
>
> That's my inclination too.
Let's give it another day to see if anyone objects. I not, I will do
On Wed, 2016-01-06 at 16:28 +, Ian Jackson wrote:
> Jan Beulich writes ("Re: [Xen-devel] OVMF related osstest failures on
> multiple branches"):
> > On 06.01.16 at 16:28, wrote:
> > > Running xen-4.6-testing with ovmf.git 52a99493cce8 instead of
> > > cb9a7ebabcd6
> > > does seem to have worke
On Wed, 2016-01-06 at 16:51 +, Andrew Cooper wrote:
> On 06/01/16 16:44, Ian Campbell wrote:
> > On Tue, 2016-01-05 at 23:01 +, Andrew Cooper wrote:
> > > On 05/01/2016 22:59, Boris Ostrovsky wrote:
> > > > On 01/05/2016 05:42 PM, Andrew Cooper wrote:
> > > > > On 05/01/2016 22:26, Boris Os
On 06/01/16 16:49, Jan Beulich wrote:
On 06.01.16 at 17:38, wrote:
>> On 06/01/16 16:31, Jan Beulich wrote:
>> On 06.01.16 at 15:44, wrote:
We did have an internal request for an HVM guest userspace netfront
driver to be able to use evntchnop calls directly.
>>> And this can't
flight 77156 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77156/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 76941
Tests which did not succeed, but a
The next Xen technical call is scheduled for:
Wed 13 Jan 17:00:00 GMT 2016
`date -d @1452704400`
However I am away then. In the (unlikely) event there is something to
discuss then we can either schedule another time or I can find a
standin to actually run the call.
Note that the time can
flight 77154 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77154/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 3 host-install(3) broken REGR. vs. 65639
test-amd64-i386-x
On 06/01/16 16:44, Ian Campbell wrote:
> On Tue, 2016-01-05 at 23:01 +, Andrew Cooper wrote:
>> On 05/01/2016 22:59, Boris Ostrovsky wrote:
>>> On 01/05/2016 05:42 PM, Andrew Cooper wrote:
On 05/01/2016 22:26, Boris Ostrovsky wrote:
> When copying boot command string for HVMlite guests
On Wed, Jan 06, 2016 at 03:28:30PM +, Ian Campbell wrote:
> (Adding Wei and Jan who I should have included before, thread starts at
> http://lists.xenproject.org/archives/html/xen-devel/2016-01/msg00442.html )
>
> On Wed, 2016-01-06 at 14:27 +, Ian Campbell wrote:
>
>
> > Next step is I
>>> On 06.01.16 at 17:38, wrote:
> On 06/01/16 16:31, Jan Beulich wrote:
> On 06.01.16 at 15:44, wrote:
>>> We did have an internal request for an HVM guest userspace netfront
>>> driver to be able to use evntchnop calls directly.
>> And this can't be accomplished using the evtchn and/or priv
On Tue, 2016-01-05 at 23:01 +, Andrew Cooper wrote:
> On 05/01/2016 22:59, Boris Ostrovsky wrote:
> > On 01/05/2016 05:42 PM, Andrew Cooper wrote:
> > > On 05/01/2016 22:26, Boris Ostrovsky wrote:
> > > > When copying boot command string for HVMlite guests we explicitly
> > > > write
> > > > '\
On 06/01/16 16:31, Jan Beulich wrote:
On 06.01.16 at 15:44, wrote:
>> We did have an internal request for an HVM guest userspace netfront
>> driver to be able to use evntchnop calls directly.
>
> And this can't be accomplished using the evtchn and/or privcmd
> drivers?
It can and should be
On 06/01/16 16:31, Jan Beulich wrote:
On 06.01.16 at 15:44, wrote:
>> We did have an internal request for an HVM guest userspace netfront
>> driver to be able to use evntchnop calls directly.
> And this can't be accomplished using the evtchn and/or privcmd
> drivers?
It can, and I don't beli
Ian Campbell writes ("Re: [Xen-devel] [PATCH v2 03/13] libxl: provide a
function to retrieve the xenstore domain id"):
> On Fri, 2015-12-18 at 15:10 +0100, Juergen Gross wrote:
> > The latter. It will be used in patch 13 to decide which domain to
> > stop via "xl shutdown --all".
>
> ITYM "not st
On Fri, 2015-12-18 at 15:53 +0100, Juergen Gross wrote:
> On 18/12/15 15:42, Andrew Cooper wrote:
> > On 18/12/15 13:14, Juergen Gross wrote:
> > > When restarting or shutting down dom0 the xendomains script tries to
> > > stop all other domains. Don't do this for the xenstore domain, as it
> > > m
On Wed, Jan 06, 2016 at 04:26:10PM +, Ian Campbell wrote:
> On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> > Split up tools/helpers/xen-init-dom0.c in order to prepare reusing
> > generation of the json configuration by init-xenstore-domain.c.
> >
> > Signed-off-by: Juergen Gross
>
If the frontend sets out_cons to a value higher than out_prod, it will
cause xenfb_handle_events to loop about 2^32 times. Avoid that by using
better checks at the beginning of the function.
Signed-off-by: Stefano Stabellini
Reported-by: Ling Liu
---
diff --git a/hw/display/xenfb.c b/hw/displa
On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> Move xen-init-dom0 from tools/libxl to tools/helpers, as it is just a
> helper program.
>
> Signed-off-by: Juergen Gross
> ---
> tools/helpers/Makefile | 10 ++
> tools/{libxl => helpers}/xen-init-dom0.c | 0
>
>>> On 06.01.16 at 15:44, wrote:
> We did have an internal request for an HVM guest userspace netfront
> driver to be able to use evntchnop calls directly.
And this can't be accomplished using the evtchn and/or privcmd
drivers?
Jan
___
Xen-devel mail
Lars Kurth writes ("Re: [PATCH] MAINTAINERS: add myself for kconfig"):
> As we have seen last year in the survey, in theory - aka according to our
> governance - committers should always act on the wishes (ACKs) of
> maintainers. In practice it comes down to whether the committers trusts a
> mainta
On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> After starting the xenstore domain write the basic data (domid, name
> and memory values) to the xenstore. This makes the domain appear
> correctly in xl list. Create a stub json object in order to make e.g.
> xl list -l happy.
>
> Add a ne
Jan Beulich writes ("Re: [Xen-devel] OVMF related osstest failures on multiple
branches"):
> On 06.01.16 at 16:28, wrote:
> > Running xen-4.6-testing with ovmf.git 52a99493cce8 instead of cb9a7ebabcd6
> > does seem to have worked (i.e. the flight hasn't actually finished yet but
> > it has passed
On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> Split up tools/helpers/xen-init-dom0.c in order to prepare reusing
> generation of the json configuration by init-xenstore-domain.c.
>
> Signed-off-by: Juergen Gross
Wei, was there a reason for using atexit() to free the handles which I'm
On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> Create the xenstore domain with the xs_domain flag specified. This
> enables us to test whether such a domain is already running before
> we create it. As there ought to be only one xenstore in the system
> we don't need to start another one
>>> On 06.01.16 at 17:20, wrote:
> On 06/01/16 16:09, Jan Beulich wrote:
>>
> For PV guests, I propose that userspace hypercalls get implemented with
> the int $0x82 path exclusively. i.e. enabling userspace hypercalls
> causes the hypercall page writing logic to consider the guest a
On Wed, 6 Jan 2016, Gerd Hoffmann wrote:
> > > +for (i = 0; i < len; i++) {
> > > +rc = pread(config_fd, guest->config + list[i].offset,
> > > + list[i].len, list[i].offset);
> > > +if (rc != list[i].len) {
> >
> > pread is allowed to return early, returning t
On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> init-xenstore-domain takes only positional parameters today. Change
> this to a more flexible parameter syntax allowing to specify additional
> options or to omit some.
>
> Today the supported usage is:
>
> init-xenstore-domain
>
>>> On 06.01.16 at 16:28, wrote:
> Running xen-4.6-testing with ovmf.git 52a99493cce8 instead of cb9a7ebabcd6
> does seem to have worked (i.e. the flight hasn't actually finished yet but
> it has passed the debian-hvm-install step).
>
> We have in the past, after much discussion[0], backported ch
On 06/01/16 16:09, Jan Beulich wrote:
>
For PV guests, I propose that userspace hypercalls get implemented with
the int $0x82 path exclusively. i.e. enabling userspace hypercalls
causes the hypercall page writing logic to consider the guest a ring1
kernel, and the int $0x82 ent
On 01/12/15 16:43, David Vrabel wrote:
> Add IOCTL_GNTDEV_GRANT_COPY to allow applications to copy between user
> space buffers and grant references.
>
> This interface is similar to the GNTTABOP_copy hypercall ABI except
> the local buffers are provided using a virtual address (instead of a
> GFN
>>> On 06.01.16 at 15:44, wrote:
> On 06/01/16 14:14, Jan Beulich wrote:
> On 06.01.16 at 12:44, wrote:
>>> The HVM ABI (for whatever reason) unilaterally fails
>>> a userspace hypercall with -EPERM, making it impossible for the kernel
>>> to trap-and-forward even it wanted to.
>> Perhaps jus
On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> Move xen-init-dom0 from tools/libxl to tools/helpers, as it is just a
> helper program.
>
> Signed-off-by: Juergen Gross
> ---
> tools/helpers/Makefile | 10 ++
> tools/{libxl => helpers}/xen-init-dom0.c | 0
>
On 06/01/16 15:44, Jan Beulich wrote:
> Ping?
Sorry - this is still on my todo list, but I have more urgent work
currently.
~Andrew
>
On 15.12.15 at 09:53, wrote:
> On 10.12.15 at 21:03, wrote:
>>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>>> +++ b/xen/arch/x86/x86_emulate/x86_emu
On Wed, 2015-12-16 at 10:24 +0100, Juergen Gross wrote:
> Set the SIF_VIRT_P2M_4TOOLS flag for pv-domUs in the domain builder
> to indicate the Xen tools have full support for the virtual mapped
> linear p2m list.
>
> This will enable pv-domUs to drop support of the 3 level p2m tree
> and use the
On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> The program init-xenstore-domain to start a xenstore domain instead
> of the xenstored daemon is built, but not installed. Change that.
>
> Move the program to a new tools subdirectory "helpers" to be able to
> use libxl in a later patch. O
On Fri, 2015-12-18 at 15:10 +0100, Juergen Gross wrote:
> On 18/12/15 14:53, Andrew Cooper wrote:
> > On 18/12/15 13:14, Juergen Gross wrote:
> > > Add libxl_xenstore_domid() to obtain the domain id of the xenstore
> > > domain.
> > >
> > > Signed-off-by: Juergen Gross
> >
> > What are the expec
On Tue, Jan 05, 2016 at 05:26:10PM -0500, Boris Ostrovsky wrote:
> With commit 8c45adec18e0 ("libxc: create unmapped initrd in domain
> builder if supported") location of ramdisk may not be available to
> HVMlite guests by the time alloc_magic_pages_hvm() is invoked if the
> guest supports unmapped
On Fri, 2015-12-18 at 14:14 +0100, Juergen Gross wrote:
> Support the xenstore domain flag for obtaining domain info.
>
> Signed-off-by: Juergen Gross
> ---
> tools/libxc/include/xenctrl.h | 2 +-
> tools/libxc/xc_domain.c | 17 +
> 2 files changed, 10 insertions(+), 9 del
On 01/06/16 15:37, Ian Campbell wrote:
> On Tue, 2015-12-29 at 19:31 +0800, Haozhong Zhang wrote:
> > This patch series is the Xen part patch to provide virtual NVDIMM to
> > guest. The corresponding QEMU patch series is sent separately with the
> > title "[PATCH 0/2] add vNVDIMM support for Xen".
On Mi, 2016-01-06 at 15:29 +, Stefano Stabellini wrote:
> On Tue, 5 Jan 2016, Gerd Hoffmann wrote:
> > That way a simple '-device igd-passthrough-isa-bridge,addr=1f' will
> > do the setup.
>
> Is this going to change the QEMU command line arguments to use it?
See patch 11 ;)
cheers,
Gerd
> > +for (i = 0; i < len; i++) {
> > +rc = pread(config_fd, guest->config + list[i].offset,
> > + list[i].len, list[i].offset);
> > +if (rc != list[i].len) {
>
> pread is allowed to return early, returning the number of bytes read.
>
This is a sysfs file tho
On Wed, 2015-12-23 at 15:53 +0100, Tamas K Lengyel wrote:
> Introduce new vm_event domctl option which allows an event subscriber
> to request all vCPUs not currently pending a vm_event request to be
> paused,
> thus allowing the subscriber to sync up on the state of the domain. This
> is especiall
> >
> > +static void (*i440fx_realize)(PCIDevice *pci_dev, Error **errp);
> > static void igd_pt_i440fx_realize(PCIDevice *pci_dev, Error **errp)
> > {
> > +Error *err = NULL;
> > uint32_t val = 0;
> > int rc, i, num;
> > int pos, len;
>
> Can't we get the parent PCIDeviceCl
Ping?
>>> On 15.12.15 at 09:53, wrote:
On 10.12.15 at 21:03, wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -570,8 +570,10 @@ do{ asm volatile (
>>
>
>>\
>> /* Fetch next
On Wed, Dec 16, 2015 at 10:24:20AM +0100, Juergen Gross wrote:
> Set the SIF_VIRT_P2M_4TOOLS flag for pv-domUs in the domain builder
> to indicate the Xen tools have full support for the virtual mapped
> linear p2m list.
>
> This will enable pv-domUs to drop support of the 3 level p2m tree
> and u
On Wed, Dec 16, 2015 at 10:24:19AM +0100, Juergen Gross wrote:
> With support of the virtual mapped linear p2m list for migration it is
> now possible to detect structural changes of the p2m list which before
> would either lead to a crashing or otherwise wrong behaving domU.
>
> A guest supportin
On Wed, Dec 16, 2015 at 10:24:18AM +0100, Juergen Gross wrote:
[...]
> @@ -698,21 +868,19 @@ static int normalise_pagetable(struct xc_sr_context
> *ctx, const uint64_t *src,
> /* 32bit guests can only use the first 4 entries of their L3
> tables.
> * All other are poten
On Tue, 2015-12-29 at 19:31 +0800, Haozhong Zhang wrote:
> This patch series is the Xen part patch to provide virtual NVDIMM to
> guest. The corresponding QEMU patch series is sent separately with the
> title "[PATCH 0/2] add vNVDIMM support for Xen".
When you send multiple related series like thi
On Wed, Dec 16, 2015 at 10:24:17AM +0100, Juergen Gross wrote:
> In order to prepare using the virtual mapped linear p2m list for
> migration split mapping of the p2m leaf pages into a separate function.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
_
On Tue, 5 Jan 2016, Gerd Hoffmann wrote:
> This patch moves igd-passthrough-isa-bridge creation out of the xen
> passthrough code into machine init. It is triggered by the
> igd-passthru=on machine option. Advantages:
>
> * This works for on both xen and kvm.
> * It is activated for the pc mac
On 06/01/2016 14:26, "Tim Deegan" wrote:
>At 06:45 -0700 on 06 Jan (1452062722), Jan Beulich wrote:
>> >>> On 05.01.16 at 13:07, wrote:
>> > On Wed, 2015-12-16 at 08:41 -0600, Doug Goldstein wrote:
>> >> Added myself as the maintainer of kconfig.
>> >>
>> >> CC: Ian Campbell
>> >> CC: Ian Ja
(Adding Wei and Jan who I should have included before, thread starts at
http://lists.xenproject.org/archives/html/xen-devel/2016-01/msg00442.html )
On Wed, 2016-01-06 at 14:27 +, Ian Campbell wrote:
> Next step is I'm trying 4.6-testing with the newer OVMF to see if this is
> worth pursuing
On Tue, 5 Jan 2016, Gerd Hoffmann wrote:
> That way a simple '-device igd-passthrough-isa-bridge,addr=1f' will
> do the setup.
Is this going to change the QEMU command line arguments to use it?
> Also instead of looking up reasonable PCI IDs based on the graphic
> device id simply copy over the
On 01/06/16 05:40, Jan Beulich wrote:
> >>> On 29.12.15 at 12:31, wrote:
> > --- a/docs/man/xl.cfg.pod.5
> > +++ b/docs/man/xl.cfg.pod.5
> > @@ -962,6 +962,25 @@ FIFO-based event channel ABI support up to 131,071
> > event channels.
> > Other guests are limited to 4095 (64-bit x86 and ARM) or 10
On 01/06/16 09:50, Konrad Rzeszutek Wilk wrote:
> On Tue, Jan 05, 2016 at 10:01:26PM +0800, Haozhong Zhang wrote:
> > On 01/05/16 11:00, Stefano Stabellini wrote:
> > > On Mon, 4 Jan 2016, Konrad Rzeszutek Wilk wrote:
> > > > On Mon, Jan 04, 2016 at 04:01:08PM +, Stefano Stabellini wrote:
> > >
1 - 100 of 199 matches
Mail list logo