flight 83003 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83003/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 78736
Regres
On 2/18/2016 11:25 PM, Tamas K Lengyel wrote:
On Thu, Feb 18, 2016 at 1:08 PM, Razvan Cojocaru
mailto:rcojoc...@bitdefender.com>> wrote:
On 02/18/2016 09:35 PM, Corneliu ZUZU wrote:
> This patch adds ARM support for guest-request monitor vm-events.
>
> Summary of changes:
On 18/02/16 17:58, Daniel Kiper wrote:
> On Thu, Feb 18, 2016 at 11:32:16AM +0100, Juergen Gross wrote:
>> On 18/02/16 11:12, Daniel Kiper wrote:
>>> On Wed, Feb 17, 2016 at 06:19:28PM +0100, Juergen Gross wrote:
The loader for xen paravirtualized environment isn't callable multiple
times
On 18/02/16 17:40, Daniel Kiper wrote:
> On Wed, Feb 17, 2016 at 06:19:36PM +0100, Juergen Gross wrote:
>> Modify the page table construction to allow multiple virtual regions
>> to be mapped. This is done as preparation for removing the p2m list
>> from the initial kernel mapping in order to suppo
On 18/02/16 18:00, Lennart Sorensen wrote:
> On Thu, Feb 18, 2016 at 11:34:49AM +0100, Juergen Gross wrote:
>> On 18/02/16 11:22, Daniel Kiper wrote:
>>> On Wed, Feb 17, 2016 at 06:19:29PM +0100, Juergen Gross wrote:
The loader for xen paravirtualized environment is using lots of global
v
flight 83001 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83001/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 81632
test-armhf-armhf-
Allow Xenoprof to be fully disabled when toggling the option off.
Signed-off-by: Doug Goldstein
---
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
change since v4:
- as much as possible disabled by CONFIG_XENOPROF as suggested by Andrew Cooper
change since v3:
- drop (void)var; from static
Convert the xenoprof x86 build time option to Kconfig.
Signed-off-by: Doug Goldstein
Reviewed-by: Andrew Cooper
Acked-by: Jan Beulich
---
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
change since v4:
- none
change since v3:
- move xenoprof entry to the main sources list as suggested by
bcc/ld86/as86 are only necessary when we build rombios and not always so
failing the build when they aren't available should not happen if the
user isn't building rombios.
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
change since v1:
-
On Thu, Feb 18, 2016 at 10:10:09PM +, Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> CC: Jan Beulich
> CC: Ian Campbell
> CC: Ian Jackson
> CC: Wei Liu
> CC: Doug Goldstein
> ---
> tools/firmware/hvmloader/xenbus.c | 2 +-
> 1 file change
Reported-by: Jonathan Creekmore
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
change since v1:
- don't screw up the white space
---
m4/python_devel.m4 | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/m4/python_devel.
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Before these changes I was seeing the following errors:
https://travis-ci.org/cardoe/xen/jobs/110174912
https://travis-ci.org/cardoe/xen/jobs/110196932#L1435 (you have to
expand the 'cat to
AC_CHECK_LIB() was running gcc -Llib -lm -lutils conftest.c which on
platforms that do as needed operations by default will result in
underlinking. Instead AC_CHECK_LIB() suggests supplying the extra
libraries necessary in a 5th argument.
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Ste
On 2/18/16 4:10 PM, Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper
> ---
> CC: Jan Beulich
> CC: Ian Campbell
> CC: Ian Jackson
> CC: Wei Liu
> CC: Doug Goldstein
> ---
Reviewed-by: Doug Goldstein
https://travis-ci.org/cardoe/xen/jobs/110249618 shows the patch in
action getting past t
Enable VT-d Posted-Interrupts and add a command line
parameter for it.
CC: Jan Beulich
Signed-off-by: Feng Wu
Reviewed-by: Kevin Tian
Acked-by: Jan Beulich
---
docs/misc/xen-command-line.markdown | 9 -
xen/drivers/passthrough/iommu.c | 3 +++
2 files changed, 11 insertions(+), 1
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt.
With VT-d Posted-Interrupts enabled, external interrupts from
direct-assigned devices can be delivered to guests without VMM
intervention when guest is running in non-root mode.
You can find the VT-d Posted-Interrtups Spec. in
> > > QEMU would always use MFN above guest normal ram and I/O holes for
> > > vNVDIMM. It would attempt to search in that space for a contiguous range
> > > that is large enough for that that vNVDIMM devices. Is guest able to
> > > punch holes in such GFN space?
> >
> > See XENMAPSPACE_* and thei
This is the core logic handling for VT-d posted-interrupts. Basically it
deals with how and when to update posted-interrupts during the following
scenarios:
- vCPU is preempted
- vCPU is slept
- vCPU is blocked
When vCPU is preempted/slept, we update the posted-interrupts during
scheduling by intr
flight 83064 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83064/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Wed, 2016-02-17 at 16:47 +, Wei Liu wrote:
> On Wed, Feb 17, 2016 at 11:45:58AM -0500, Konrad Rzeszutek Wilk
> wrote:
> > On Wed, Feb 17, 2016 at 09:48:28AM +, Ian Campbell wrote:
> > >
> > > Acked-by: Ian Campbell
> >
> > Acked-by: Konrad Rzeszutek Wilk
> >
> > Is there an roadmap
Ian Campbell wrote:
> Signed-off-by: Ian Campbell
> Cc: Jim Fehlig
> ---
> docs/misc/xl-disk-configuration.txt | 18 ++
> 1 file changed, 18 insertions(+)
>
> diff --git a/docs/misc/xl-disk-configuration.txt
> b/docs/misc/xl-disk-configuration.txt
> index 6a2118d..a03ad10 10064
Reported-by: Jonathan Creekmore
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
---
m4/python_devel.m4 | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/m4/python_devel.m4 b/m4/python_devel.m4
index 659e7d4..deff19e 1006
bcc/ld86/as86 are only necessary when we build rombios and not always so
failing the build when they aren't available should not happen if the
user isn't building rombios.
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
---
README
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
CC: Doug Goldstein
---
tools/firmware/hvmloader/xenbus.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/firmware/hvmloader/xenbus.c
b/tools/firmware/hvmloader/xenbus.c
in
. snip..
> > Hmm, you're right, somehow I've managed to ignore the relevant
> > lines grep reported. Yet - how do things work then, without the
> > MWAIT feature flag currently getting cleared?
> I have never observed it being used. Do you have some local patches in
> the SLE
On Thu, Feb 18, 2016 at 1:08 PM, Razvan Cojocaru
wrote:
> On 02/18/2016 09:35 PM, Corneliu ZUZU wrote:
> > This patch adds ARM support for guest-request monitor vm-events.
> >
> > Summary of changes:
> > == Moved to common-side:
> > * XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST handling (moved from
On 18/02/2016 21:31, Doug Goldstein wrote:
> On 2/18/16 3:22 PM, Doug Goldstein wrote:
>> Rerun autoconf to regenerate configure
>>
>> Signed-off-by: Doug Goldstein
>> ---
>> CC: Ian Jackson
>> CC: Stefano Stabellini
>> CC: Ian Campbell
>> CC: Wei Liu
>> ---
>> tools/configure | 295
>> +
On 2/18/16 3:31 PM, Doug Goldstein wrote:
> On 2/18/16 3:22 PM, Doug Goldstein wrote:
>> Rerun autoconf to regenerate configure
>>
>> Signed-off-by: Doug Goldstein
>> ---
>> CC: Ian Jackson
>> CC: Stefano Stabellini
>> CC: Ian Campbell
>> CC: Wei Liu
>> ---
>> tools/configure | 295
>> ++
On 2/18/16 3:22 PM, Doug Goldstein wrote:
> Rerun autoconf to regenerate configure
>
> Signed-off-by: Doug Goldstein
> ---
> CC: Ian Jackson
> CC: Stefano Stabellini
> CC: Ian Campbell
> CC: Wei Liu
> ---
> tools/configure | 295
>
>
Rerun autoconf to regenerate configure
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
---
tools/configure | 295
1 file changed, 148 insertions(+), 147 deletions(-)
diff --git a/t
AC_CHECK_LIB() was running gcc -Llib -lm -lutils conftest.c which on
platforms that do as needed operations by default will result in
underlinking. Instead AC_CHECK_LIB() suggests supplying the extra
libraries necessary in a 5th argument.
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Ste
On Thu, Feb 18, 2016 at 09:45:30AM -0700, Jan Beulich wrote:
> >>> On 18.02.16 at 17:39, wrote:
> > Jan Beulich writes ("Re: [PATCH v3 5/5] mkelf32: Close those file
> > descriptors
> > in the error paths."):
> >> On 12.02.16 at 04:08, wrote:
> >> > While we are operating here we may as well fi
On 02/18/2016 09:35 PM, Corneliu ZUZU wrote:
> This patch adds ARM support for guest-request monitor vm-events.
>
> Summary of changes:
> == Moved to common-side:
> * XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST handling (moved from X86
> arch_monitor_domctl_event to common monitor_domctl)
> *
This patch adds ARM support for guest-request monitor vm-events.
Summary of changes:
== Moved to common-side:
* XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST handling (moved from X86
arch_monitor_domctl_event to common monitor_domctl)
* hvm_event_guest_request, hvm_event_traps (also added targe
Roger Pau Monne writes ("[PATCH RFC] osstest: add a cd-{insert/eject} test for
Debian HVM"):
> It could/should be expanded to other guest types, but at least it's a start.
> It should also test that the guest can correctly access the disk contents.
>
> The only supported toolstack for this test i
On 18/02/16 18:52, David Vrabel wrote:
> diff --git a/xen/arch/x86/hvm/viridian.c b/xen/arch/x86/hvm/viridian.c
> index 6bd844b..fb9f044 100644
> --- a/xen/arch/x86/hvm/viridian.c
> +++ b/xen/arch/x86/hvm/viridian.c
> @@ -148,6 +148,30 @@ static void dump_guest_os_id(const struct domain *d)
>
On 18/02/16 18:52, David Vrabel wrote:
> The x86 architecture allows either: a) the 64-bit FIP/FDP registers to be
> restored (clearing FCS and FDS); or b) the 32-bit FIP/FDP and FCS/FDS
> registers to be restored (clearing the upper 32-bits).
^ of FIP/FDP
> diff --git a/xen/include/asm-x86/domai
On 18/02/16 18:52, David Vrabel wrote:
> These are a thin wrapper around the XEN_DOMCTL_param hypercall.
>
> Signed-off-by: David Vrabel
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 18/02/16 18:52, David Vrabel wrote:
> Add XEN_DOMCTL_param to get/set generic numeric parameters for a domain.
> This should reduce the number of specialized domctls that need to be
> added.
>
> Signed-off-by: David Vrabel
As far as the code here goes, Reviewed-by: Andrew Cooper
However, you
This series extends the workaround for the inability for some x86 CPUs
to fully restore the FPU exception state (64-bit FIP/FDP and FCS/FDS).
32-bit save/restore is always done for Windows guests and the
toolstack may override the default behaviour.
The first 2 patches add a domctl to get/set num
Microsoft Windows always uses a 32-bit FPU state save/restore and expects
the FCS/FDS to be saved/restored. Ensure that for these guests, the
hypervisor does 32-bit save/restore to preserve FCS/FDS.
These guests are identified by the write to the Guest OS ID MSR.
This fixes an 0x3D BugCheck when
Add XEN_DOMCTL_param to get/set generic numeric parameters for a domain.
This should reduce the number of specialized domctls that need to be
added.
Signed-off-by: David Vrabel
---
xen/arch/x86/domctl.c | 14 ++
xen/common/domctl.c | 11 +++
xen/include/public/d
Add a parameter to allow the toolstack to set the x87 FIP width in case
the hypervisor's heuristics do the wrong thing.
Signed-off-by: David Vrabel
---
xen/arch/x86/domctl.c | 10 ++
xen/include/public/domctl.h | 1 +
2 files changed, 11 insertions(+)
diff --git a/xen/arch/x86/do
The x86 architecture allows either: a) the 64-bit FIP/FDP registers to be
restored (clearing FCS and FDS); or b) the 32-bit FIP/FDP and FCS/FDS
registers to be restored (clearing the upper 32-bits).
Add a per-domain field to indicate which of these options a guest needs.
The options are: 8, 4 or 0
These are a thin wrapper around the XEN_DOMCTL_param hypercall.
Signed-off-by: David Vrabel
---
tools/libxc/include/xenctrl.h | 5 +
tools/libxc/xc_domain.c | 35 +++
2 files changed, 40 insertions(+)
diff --git a/tools/libxc/include/xenctrl.h b/tools/
flight 83012 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83012/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Ian Campbell writes ("Re: [Xen-devel] Current LibXL Status"):
> The only one I can find which isn't one of this is
> in libxl__event_disaster, and that is only if the applications (or language
> bindings) haven't provided a suitable disaster callback.
libxl__event_disaster can currently happen in
On 18/02/16 18:03, Andrew Cooper wrote:
> And make use of NX and RO attributes wherever possible.
>
> Andrew Cooper (4):
> xen: Introduce IS_ALIGNED()
> xen/memguard: Drop memguard_init() entirely
> xen/x86: Use 2M superpages for text/data/bss mappings
> xen/x86: Unilaterally remove .init m
Andrew Cooper writes ("Re: [Xen-devel] Current LibXL Status"):
> There really is a show-stopper, which I have stated before.
>
> Languages such as OCaml use -ENOMEM as a hint to run the garbage
> collector some more. I expect Haskell is the same.
This cannot possibly be true (if what you mean is
It could/should be expanded to other guest types, but at least it's a start.
It should also test that the guest can correctly access the disk contents.
The only supported toolstack for this test is xl.
Signed-off-by: Roger Pau Monné
---
CC: Ian Jackson
---
Osstest/TestSupport.pm | 17
Because of the new 2M alignment of .init and .bss, the existing memory
guarding infrastructure causes a shattered 2M superpage with non-present
entries for .init, and present entries for the alignment space.
Do away with the difference in behaviour between debug and non-debug builds;
always destro
It is not obvious what this code is doing. Most of it dates from 2007/2008,
and there have been substantial changes in Xen's memory handling since then.
It was previously optional, and isn't needed for any of the memguard
infrastructure to function. The use of MAP_SMALL_PAGES causes needless
sha
This balloons the size of Xen in memory from 3.4MB to 12MB, because of the
required alignment adjustments.
However
* All mappings are 2M superpages.
* .text (and .init at boot) are the only sections marked executable.
* .text and .rodata are marked read-only.
Signed-off-by: Andrew Cooper
---
And make use of NX and RO attributes wherever possible.
Andrew Cooper (4):
xen: Introduce IS_ALIGNED()
xen/memguard: Drop memguard_init() entirely
xen/x86: Use 2M superpages for text/data/bss mappings
xen/x86: Unilaterally remove .init mappings
xen/arch/x86/mm.c | 24 +++
And a few open-coded alignment checks which I encountered
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: Ian Campbell
---
xen/arch/x86/mm.c | 8
xen/arch/x86/xen.lds.S | 2 +-
xen/include/xen/config.h | 2 ++
xen/include/xen/tmem_xen.h | 3 +--
4 f
On Thu, 2016-02-18 at 17:39 +, Ian Campbell wrote:
> On Thu, 2016-02-18 at 17:26 +, George Dunlap wrote:
>
> > According to them, the ocaml garbage collector never frees memory. It
> > grows its own internal heap as necessary, but it never reduces the
> > size of its heap.
>
> Assume tha
On Thu, Feb 18, 2016 at 5:39 PM, Ian Campbell wrote:
> On Thu, 2016-02-18 at 17:26 +, George Dunlap wrote:
>
>> According to them, the ocaml garbage collector never frees memory. It
>> grows its own internal heap as necessary, but it never reduces the
>> size of its heap.
>
> Assume that's tr
On Thu, Feb 18, 2016 at 5:26 PM, Ian Campbell wrote:
> On Thu, 2016-02-18 at 17:19 +, Ian Jackson wrote:
>> George Dunlap writes ("Re: [Xen-devel] Current LibXL Status"):
>> > So what was the conclusion here? It looks like we've confirmed that
>> > exit() is only called:
>> >
>> > 1. In the c
On Thu, 2016-02-18 at 17:26 +, George Dunlap wrote:
> According to them, the ocaml garbage collector never frees memory. It
> grows its own internal heap as necessary, but it never reduces the
> size of its heap.
Assume that's true: Wow!
Although, I presume this is a factor of the current/p
On Thu, 2016-02-18 at 17:19 +, Ian Jackson wrote:
> George Dunlap writes ("Re: [Xen-devel] Current LibXL Status"):
> > So what was the conclusion here? It looks like we've confirmed that
> > exit() is only called:
> >
> > 1. In the case of a malloc() failure
> > 2. in libxl-save-helper (a sep
On Thu, Nov 19, 2015 at 11:23 AM, Ian Campbell wrote:
> create !
> title it libxl exit() on ENOMEM incompatible with gc'd languages
> thanks
>
> On Thu, 2015-11-19 at 10:55 +, Andrew Cooper wrote:
>> On 19/11/15 09:20, Ian Campbell wrote:
>> > On Wed, 2015-11-18 at 18:32 +, Martin Osterloh
On Thu, 2016-02-18 at 17:09 +, George Dunlap wrote:
> On Thu, Nov 19, 2015 at 12:16 PM, Ian Campbell
> wrote:
> > On Thu, 2015-11-19 at 11:55 +, Ian Campbell wrote:
> > > On Thu, 2015-11-19 at 11:48 +, Ian Campbell wrote:
> > > > On Thu, 2015-11-19 at 11:33 +, Andrew Cooper wrote:
On Thu, Feb 18, 2016 at 06:19:07PM +0100, Olaf Hering wrote:
> On Thu, Feb 18, Wei Liu wrote:
>
> > Sorry I don't follow. What do you mean by 1:1 copy? Why does it make the
> > update unnecessary?
>
> The current code does:
>
> libxl_device_nic_init(&nic_saved);
> libxl_device_nic_copy(CTX,
George Dunlap writes ("Re: [Xen-devel] Current LibXL Status"):
> So what was the conclusion here? It looks like we've confirmed that
> exit() is only called:
>
> 1. In the case of a malloc() failure
> 2. in libxl-save-helper (a separate process forked by the library)
> 3. In libxl__event_disaster
On Thu, Feb 18, 2016 at 01:43:33PM +0100, Juergen Gross wrote:
> On 18/02/16 12:18, Daniel Kiper wrote:
> > On Wed, Feb 17, 2016 at 06:19:35PM +0100, Juergen Gross wrote:
> >> Modern pvops linux kernels support an initrd not covered by the initial
> >> mapping. This capability is flagged by an elf-
On Thu, Feb 18, Wei Liu wrote:
> Sorry I don't follow. What do you mean by 1:1 copy? Why does it make the
> update unnecessary?
The current code does:
libxl_device_nic_init(&nic_saved);
libxl_device_nic_copy(CTX, &nic_saved, nic);
nic->devid = libxl__device_nextid(gc, domid, "vif");
libx
>>> On 01.02.16 at 06:44, wrote:
> This design treats host NVDIMM devices as ordinary MMIO devices:
Wrt the cachability note earlier on, I assume you're aware that with
the XSA-154 changes we disallow any cachable mappings of MMIO
by default.
> (1) Dom0 Linux NVDIMM driver is responsible to de
On Thu, Feb 18, 2016 at 05:54:38PM +0100, Olaf Hering wrote:
> On Thu, Feb 18, Wei Liu wrote:
>
> > For example, user might not have specified mac address so the library
> > generates one for (s)he. You don't want mac address to regenerate after
> > save / restore or migration. But you don't want
On Thu, Feb 18, 2016 at 11:35:52AM +0100, Juergen Gross wrote:
> On 18/02/16 11:30, Daniel Kiper wrote:
> > On Wed, Feb 17, 2016 at 06:19:30PM +0100, Juergen Gross wrote:
> >> Various features and parameters of a pv-kernel are specified via
> >> elf notes in the kernel image. Those notes are part o
The regex in mg-list-all-branches assumes that the BRANCHES= will
either be a singleton entry separated from the following command by a hard tab
or a single quoted list of space separated entries, however the
xen-unstable-coverity line is singleton separated from the command by a single
space.
Rat
On Thu, Feb 18, 2016 at 11:34:49AM +0100, Juergen Gross wrote:
> On 18/02/16 11:22, Daniel Kiper wrote:
> > On Wed, Feb 17, 2016 at 06:19:29PM +0100, Juergen Gross wrote:
> >> The loader for xen paravirtualized environment is using lots of global
> >> variables. Reduce the number by making them eit
On Thu, Nov 19, 2015 at 12:16 PM, Ian Campbell wrote:
> On Thu, 2015-11-19 at 11:55 +, Ian Campbell wrote:
>> On Thu, 2015-11-19 at 11:48 +, Ian Campbell wrote:
>> > On Thu, 2015-11-19 at 11:33 +, Andrew Cooper wrote:
>> > >
>> > > The majority of those are cases are not appropriate us
On Thu, 2016-02-18 at 17:06 +, George Dunlap wrote:
> On 18/02/16 17:02, Dario Faggioli wrote:
> > On Thu, 2016-02-18 at 15:28 +, George Dunlap wrote:
> > >
> > > > +case TRC_SCHED_CLASS_EVT(RTDS, 2): /*
> > > > RUNQ_PICK*/
> > > > +if(opt.dump_all) {
> > > > +
On 18/02/16 17:02, Dario Faggioli wrote:
> On Thu, 2016-02-18 at 15:28 +, George Dunlap wrote:
>> On 16/02/16 18:13, Dario Faggioli wrote:
>>> ---
>>> tools/xentrace/xenalyze.c | 59
>>> +
>>> 1 file changed, 59 insertions(+)
>>>
>>> diff --git a/t
>>> On 18.02.16 at 17:28, wrote:
> Wei Liu writes ("Re: Stabilising some tools only HVMOPs?"):
>> I think we come to the conclusion that these HVMOPs should be made
>> stable. And to do so I'm going to introduce a __XEN_TOOLS_STABLE__ macro
>> for them to distinguish from __XEN_TOOLS__. And then
El 18/2/16 a les 16:12, Andrew Cooper ha escrit:
> On 18/02/16 15:02, Roger Pau Monné wrote:
>> El 17/2/16 a les 20:02, Konrad Rzeszutek Wilk ha escrit:
>>> On Mon, Feb 15, 2016 at 03:41:41PM +, Andrew Cooper wrote:
On 15/02/16 15:02, Jan Beulich wrote:
On 15.02.16 at 15:53, wrot
On Thu, 2016-02-18 at 15:31 +, George Dunlap wrote:
> On 16/02/16 18:12, Dario Faggioli wrote:
> >
> > diff --git a/tools/xentrace/xenalyze.c b/tools/xentrace/xenalyze.c
> > index 17021f1..4ab2dba 100644
> > --- a/tools/xentrace/xenalyze.c
> > +++ b/tools/xentrace/xenalyze.c
> > @@ -7673,6 +76
On Thu, 2016-02-18 at 15:28 +, George Dunlap wrote:
> On 16/02/16 18:13, Dario Faggioli wrote:
> > ---
> > tools/xentrace/xenalyze.c | 59
> > +
> > 1 file changed, 59 insertions(+)
> >
> > diff --git a/tools/xentrace/xenalyze.c b/tools/xentrace/x
On Thu, Feb 18, 2016 at 11:34:49AM +0100, Juergen Gross wrote:
> On 18/02/16 11:22, Daniel Kiper wrote:
> > On Wed, Feb 17, 2016 at 06:19:29PM +0100, Juergen Gross wrote:
> >> The loader for xen paravirtualized environment is using lots of global
> >> variables. Reduce the number by making them eit
On Thu, Feb 18, 2016 at 11:32:16AM +0100, Juergen Gross wrote:
> On 18/02/16 11:12, Daniel Kiper wrote:
> > On Wed, Feb 17, 2016 at 06:19:28PM +0100, Juergen Gross wrote:
> >> The loader for xen paravirtualized environment isn't callable multiple
> >> times as it won't free any memory in case of fa
On Thu, Feb 18, Wei Liu wrote:
> For example, user might not have specified mac address so the library
> generates one for (s)he. You don't want mac address to regenerate after
> save / restore or migration. But you don't want to preserve all
> autogenerated state, so you use the original copy as
On Thu, Feb 18, 2016 at 09:41:01AM -0700, Jan Beulich wrote:
> >>> On 18.02.16 at 17:28, wrote:
> > Wei Liu writes ("Re: Stabilising some tools only HVMOPs?"):
> >> I think we come to the conclusion that these HVMOPs should be made
> >> stable. And to do so I'm going to introduce a __XEN_TOOLS_STA
On Thu, 2016-02-18 at 11:43 +, George Dunlap wrote:
> On 17/02/16 09:52, Dario Faggioli wrote:
> >
> > For instance, the thing that you can just change on the fly the way
> > a
> > trace is shown (by tweaking the format file) looks an interesting
> > feature to me, even considering all the lim
On 18/02/16 16:24, Boris Ostrovsky wrote:
>
>
> On 02/18/2016 10:12 AM, Andrew Cooper wrote:
>> On 18/02/16 15:02, Roger Pau Monné wrote:
>>> El 17/2/16 a les 20:02, Konrad Rzeszutek Wilk ha escrit:
On Mon, Feb 15, 2016 at 03:41:41PM +, Andrew Cooper wrote:
> On 15/02/16 15:02, Jan Beu
>>> On 18.02.16 at 17:39, wrote:
> Jan Beulich writes ("Re: [PATCH v3 5/5] mkelf32: Close those file descriptors
> in the error paths."):
>> On 12.02.16 at 04:08, wrote:
>> > While we are operating here we may as well fix some of the
>> > file descriptor leaks.
>>
>> I'm not convinced. The adde
Jan Beulich writes ("Re: Stabilising some tools only HVMOPs?"):
> On 18.02.16 at 17:28, wrote:
> > Wei Liu writes ("Re: Stabilising some tools only HVMOPs?"):
> >> I think we come to the conclusion that these HVMOPs should be made
> >> stable. And to do so I'm going to introduce a __XEN_TOOLS_STAB
On Wed, Feb 17, 2016 at 06:19:37PM +0100, Juergen Gross wrote:
> Modern pvops linux kernels support a p2m list not covered by the
> kernel mapping. This capability is flagged by an elf-note specifying
> the virtual address the kernel is expecting the p2m list to be mapped
> to.
>
> In case the elf-
Jan Beulich writes ("Re: [PATCH v3 5/5] mkelf32: Close those file descriptors
in the error paths."):
> On 12.02.16 at 04:08, wrote:
> > While we are operating here we may as well fix some of the
> > file descriptor leaks.
>
> I'm not convinced. The added goto-s make the code uglier to read,
> an
On Wed, Feb 17, 2016 at 06:19:36PM +0100, Juergen Gross wrote:
> Modify the page table construction to allow multiple virtual regions
> to be mapped. This is done as preparation for removing the p2m list
> from the initial kernel mapping in order to support huge pv domains.
>
> This allows a cleane
On Thu, 2016-02-18 at 12:51 +, Wei Liu wrote:
> On Wed, Feb 17, 2016 at 05:28:08PM +, Wei Liu wrote:
> > Hi all
> >
> > Tools people are in the process of splitting libxenctrl into a set of
> > stable libraries. One of the proposed libraries is libxendevicemodel
> > which has a collection
On Thu, Feb 18, 2016 at 04:28:16PM +, Ian Jackson wrote:
> Wei Liu writes ("Re: Stabilising some tools only HVMOPs?"):
> > I think we come to the conclusion that these HVMOPs should be made
> > stable. And to do so I'm going to introduce a __XEN_TOOLS_STABLE__ macro
> > for them to distinguish
>>> On 12.02.16 at 04:08, wrote:
> While we are operating here we may as well fix some of the
> file descriptor leaks.
I'm not convinced. The added goto-s make the code uglier to read,
and this being a standalone utility there's not really any leak here.
Jan
___
Wei Liu writes ("Re: Stabilising some tools only HVMOPs?"):
> I think we come to the conclusion that these HVMOPs should be made
> stable. And to do so I'm going to introduce a __XEN_TOOLS_STABLE__ macro
> for them to distinguish from __XEN_TOOLS__. And then libxendevicemodel
> will have -D__XEN_T
On 02/18/2016 10:12 AM, Andrew Cooper wrote:
On 18/02/16 15:02, Roger Pau Monné wrote:
El 17/2/16 a les 20:02, Konrad Rzeszutek Wilk ha escrit:
On Mon, Feb 15, 2016 at 03:41:41PM +, Andrew Cooper wrote:
On 15/02/16 15:02, Jan Beulich wrote:
On 15.02.16 at 15:53, wrote:
On 15/02/16 14:
>>> On 12.02.16 at 22:57, wrote:
> +struct xsplice_patch_func {
> +const char *name;
> +Elf64_Xwordnew_addr;
Missing space.
> +Elf64_Xword old_addr;
> +Elf64_Word new_size;
> +Elf64_Word long old_size;
There are still two types left here.
> +### XEN_SYSCTL_XSPLI
On 2/18/16 8:36 AM, Andrew Cooper wrote:
> These packages are not permitted inside travis, and are not necessary for
> building Xen.
>
> Signed-off-by: Andrew Cooper
> ---
> CC: Doug Goldstein
> CC: Ian Campbell
> CC: Ian Jackson
> CC: Wei Liu
> ---
Reviewed-by: Doug Goldstein
--
Doug Gol
On Thu, Feb 18, 2016 at 04:13:21PM +0100, Olaf Hering wrote:
> What is the point of libxl__update_config_nic and
> libxl__update_config_vtmp?
>
> In libxl__device_type_add (called from DEFINE_DEVICE_ADD) the input
> type is copied with libxl_device_type_copy to type_saved, which is a
> 1:1 copy. I
On 18/02/16 15:36, Harmandeep Kaur wrote:
> This is about a Coverity bug (included in the end), which I think is
> a false positive. I don't think pagesize can be zero in any case.
> pagesize = 1 << (((flags >> TMEM_POOL_PAGESIZE_SHIFT) &
> TMEM_POOL_PAGESIZE_MASK) + 12)
On 12/02/16 19:06, Andrew Cooper wrote:
> 1) EXIT_REASON_EXCEPTION_NMI is 0, and Clang complains:
>
> xenalyze.c:513:33: error: initializer overrides prior initialization of this
> subobject [-Werror,-Winitializer-overrides]
> [EXIT_REASON_EXCEPTION_NMI]="EXCEPTION_NMI",
>
What is the point of libxl__update_config_nic and
libxl__update_config_vtmp?
In libxl__device_type_add (called from DEFINE_DEVICE_ADD) the input
type is copied with libxl_device_type_copy to type_saved, which is a
1:1 copy. If needed, a new devid is assigned to the input. Later the
copy is updated
1 - 100 of 195 matches
Mail list logo