From: Shannon Zhao
Add a new member in gic_hw_operations which is used to creat MADT table
for Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/gic-v2.c | 34 ++
xen/arch/arm/gic-v3.c | 47 ++
Most callers of tmem_freeable_pages() checked to see if by checking
opt_tmem before calling tmem_freeable_pages() but not all of them did. This
seemed like an oversight and to avoid similar situations like that,
stick the check of tmem into tmem_freeable_pages(). Similarly other
places should not d
by using the sched_switch hook that we have introduced in
the various schedulers.
The key is to let the actual switch of scheduler and the
remapping of the scheduler lock for the CPU (if necessary)
happen together (in the same critical section) protected
(at least) by the old scheduler lock for th
Hello Benjamin,
Thank you for the patch.
On 16/03/16 20:51, Benjamin Sanda wrote:
From: bensanda
Modified p2m_lookup() to provide support for xentrace on the ARM platform.
Added check for DOMID_XEN which skips PFN to MFN translation. xentrace sends a
MFN dirrectly when requesting DOMID_XEN,
flight 86362 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86362/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 85884
test-amd64-i386-xl-qemuu-win
flight 86626 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86626/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
build-amd64-rumpuserx
This run is configured for baseline tests only.
flight 44256 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44256/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl 19 guest-start/debian.repe
On March 17, 2016 8:30pm, wrote:
> On Thu, Mar 17, 2016 at 6:54 AM, Quan Xu wrote:
> > diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index
> > c997b53..526548e 100644
> > --- a/xen/arch/x86/mm.c
> > +++ b/xen/arch/x86/mm.c
> > @@ -2467,7 +2467,7 @@ static int __get_page_type(struct page_info
flight 86369 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86369/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-xsm 14 guest-saver
George Dunlap writes ("[PATCH 2/8] libxl: Remove redundant setting of
phyical-device"):
> Regardless of whether we're running a custom hotplug script or using
> normal phy: or file:, the "block" script will be run, which will set
> all the necessary xenstore nodes.
>
> In fact, writing this value
On Fri, Mar 18, 2016 at 05:55:55AM -0600, Jan Beulich wrote:
> >>> On 15.03.16 at 18:56, wrote:
> > @@ -223,12 +224,15 @@ void __init do_initcalls(void)
> > /*
> > * Simple hypercalls.
> > */
> > -
> > DO(xen_version)(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
>
> Please retain the blank li
On 03/05/2016 01:29 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 19/27] COLO: introduce new API to
prepare/start/do/get_error/stop replication"):
From: Wen Congyang
We will use qemu block replication, and qemu provides some qmp commands
to prepare replication, start replication, g
On 17/03/16 17:53, George Dunlap wrote:
> On Thu, Mar 10, 2016 at 3:00 PM, Juergen Gross wrote:
>> libxl__need_xenpv_qemu() is called with configuration data for console,
>> vfbs, disks and channels today in order to evaluate the need for
>> starting a device model for a pv domain.
>>
>> The conso
On 3/8/16 10:50 AM, Wei Liu wrote:
> On Tue, Mar 08, 2016 at 10:34:42AM -0600, Doug Goldstein wrote:
>> On 3/8/16 9:38 AM, Wei Liu wrote:
>>> On Mon, Mar 07, 2016 at 08:23:40PM -0600, Doug Goldstein wrote:
The build should not use -O0 as that results in miscompilations. There
>>>
>>> This need
>>> On 17.03.16 at 13:43, wrote:
> --- a/xen/arch/x86/setup.c
> +++ b/xen/arch/x86/setup.c
> @@ -529,9 +529,33 @@ static void noinline init_done(void)
> }
> else
> {
> +/* Mark .text as RX (avoiding the first 2M superpage). */
> +map_pages_to_xen(XEN_VIRT_START + MB(
In preparation to fix a regression caused by 'commit 9cd25aac1f44
("x86/mm/pat: Emulate PAT when it is disabled")', PAT needs to
provide an interface that disables the OS to initialize PAT MSR.
PAT MSR initialization must be done on all CPUs with the specific
sequence of operations defined in Inte
On Fri, Mar 18, 2016 at 10:32:30AM +, Paul Durrant wrote:
> This patch adds code to enable the APIC assist enlightenment which,
> under certain conditions, means that the guest can avoid an EOI of
> the local APIC and thereby avoid a VMEXIT.
>
> Use of the enlightenment by the hypervisor is un
Now that Xen no longer allocates irqs in _cpu_up() we can restore
commit a89941816726 ("hotplug: Prevent alloc/free of irq descriptors
during cpu up/down")
Signed-off-by: Boris Ostrovsky
---
arch/x86/kernel/smpboot.c | 11 ---
kernel/cpu.c |8
2 files changed,
>>> On 15.03.16 at 16:35, wrote:
> Some bits in a featureset are not simple a indication of new functionality,
> and require special handling.
>
> APIC, OSXSAVE and OSPKE are fast-forwards of other pieces of state;
> IA32_APIC_BASE.EN, CR4.OSXSAVE and CR4.OSPKE. Xen will take care of filling
> t
From: Shannon Zhao
Add a bus_notifier for platform bus device in order to map the device
mmio regions when DOM0 booting with ACPI.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
drivers/xen/Makefile | 1 +
drivers/xen/arm-device.c | 141
The existing vIOPL interface is hard to use, and need not be.
Introduce a VMASSIST with which a guest can opt-in to having vIOPL behaviour
consistenly with native hardware.
Specifically:
- virtual iopl updated from do_iret() hypercalls.
- virtual iopl reported in bounce frames.
- guest kernels
On 03/05/2016 02:01 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 23/27] COLO proxy: preresume, postresume and
checkpoint"):
From: Wen Congyang
preresume, postresume and checkpoint
I think maybe this needs to be combined with the previous patch ?
Surely
Thanks
-Xie
This is slightly more efficient than loading 64-bit quantities.
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
--- a/xen/include/asm-x86/asm_defns.h
+++ b/xen/include/asm-x86/asm_defns.h
@@ -313,6 +313,13 @@ static always_inline void stac(void)
987:
.endm
+#define LOAD_ONE_REG(reg, c
Hi all
Today is that last posting day for new features. And we are two weeks
away from the anticipated freeze date.
I've gone through the outstanding patch series on the list and ask for
input from various core community members. I've enumerated a list
here, which covers several areas of this rel
On Fri, Mar 18, 2016 at 7:07 AM, Wei Liu wrote:
> Hi all
>
> Today is that last posting day for new features. And we are two weeks
> away from the anticipated freeze date.
>
> I've gone through the outstanding patch series on the list and ask for
> input from various core community members. I've e
On 03/16/2016 10:09 AM, George Dunlap wrote:
> Signed-off-by: George Dunlap
> ---
> CC: Ian Jackson
> CC: Wei Liu
> CC: Roger Pau Monne
> ---
> docs/misc/block-scripts.txt | 100
>
> 1 file changed, 100 insertions(+)
>
> diff --git a/docs/misc/bloc
On 18/03/16 19:06, Dario Faggioli wrote:
> like what's there already in both Credit1 and RTDS. In
> fact, when playing with affinity, a lot of cpumask
> manipulation is necessary, inside of various functions.
>
> To avoid having a lot of cpumask_var_t on the stack,
> this patch introduces a global
Hi,
> > Ian, thanks for your reply! It looks like the problem is how and when to
> > clear PV resources in seabios before handing over to guest. But I wonder
> > why virtio works in seabios. Does seabios using virtio need to clear
> > things like vrings? Or seabios doesn't clear the things and g
In order for HVM domains to provide emulated access to disks provided
by hotplug scripts, qemu needs access to a "cooked" version of the
disk. In the case of hotplug scripts, this "cooked" version is
available in the form of a block device passed to blkback. Make this
"cooked" version available t
flight 86513 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86513/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-buildfail like 85493
build-i386-rumpuserxen6
>>> On 18.03.16 at 11:06, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 17 March 2016 16:43
>> >>> On 17.03.16 at 13:13, wrote:
>> > @@ -1170,10 +1183,27 @@ int vlapic_has_pending_irq(struct vcpu *v)
>> > !nestedhvm_vcpu_in_guestmode(v) )
>> > return irr;
>> >
On 16/03/16 13:00, Paul Durrant wrote:
> Commit b38d426a "flush remote tlbs by hypercall" add support to allow
> Windows to request flush of remote TLB via hypercall rather than IPI.
> Unfortunately it seems that this code was broken in a couple of ways:
>
> 1) The allocation of the per-vcpu flush
i'm trying to run xen on omap5 and installing some guests .. it seems it
works and a xen boot dom0 as shown the screen shot
but with this arago project i can't download any package ..all commands
such as apt-get ,update ... are not found
i tried to have another file system but its not working ..
c
On 03/15/2016 08:18 PM, Konrad Rzeszutek Wilk wrote:
On Mon, Mar 14, 2016 at 05:55:37PM +, Anthony PERARD wrote:
@@ -624,8 +628,6 @@ static int alloc_magic_pages_hvm(struct xc_dom_image *dom)
if ( !dom->device_model )
{
-size_t start_info_size = sizeof(struct hvm_
From: Shannon Zhao
When running on Xen hypervisor, runtime services are supported through
hypercall. Add a Xen specific function to initialize runtime services.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/include/asm/xen/xen-ops.h | 6 ++
arch/arm/xen/Makef
That will turn out useful in following patches, where such
code will need to be called more than just once. Create an
helper now, and move the code there, to avoid mixing code
motion and functional changes later.
In Credit2, some style cleanup is also done.
No functional change intended.
Signed-
Jan Beulich writes ("Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for
Xen"):
> So that again leaves unaddressed the question of what you
> imply to do when a guest elects to use such a page as page
> table. I'm afraid any attempt of yours to invent something that
> is not struct page_info
On 17/03/16 15:32, Jan Beulich wrote:
On 17.03.16 at 15:44, wrote:
>> On 17/03/16 14:31, Jan Beulich wrote:
>>> Also - do we really want to make this code dependent on
>>> map_pages_to_xen() not intermediately zapping the mappings
>>> being changed?
>> Do you mean "immediately"?
> No.
>
>> As
If image requested EFI boot services then skip multiboot2 memory maps.
Main reason for not providing maps is because they will likely be
invalid. We do a few allocations after filling them, e.g. for relocator
needs. Usually we do not care as we would have finished boot services.
If we keep boot ser
On Wed, Mar 16, 2016 at 11:47:49AM -0500, Chong Li wrote:
> Add xc_sched_rtds_vcpu_get/set functions to interact with
> Xen to get/set a domain's per-VCPU parameters.
>
> Signed-off-by: Chong Li
> Signed-off-by: Meng Xu
> Signed-off-by: Sisu Xi
Acked-by: Wei Liu
_
The human running this script might want to update a suite-specific
value, or the global value. Print an example of the suite-specific
value too.
No functional change other than to example config output.
Signed-off-by: Ian Jackson
---
mg-debian-installer-update |1 +
1 file changed, 1 inse
Konrad Rzeszutek Wilk writes ("[PATCH v4 08/34] vmap: Make the while loop less
fishy."):
> error:
> -while ( i-- )
> -free_domheap_page(mfn_to_page(mfn_x(mfn[i])));
> +while ( i )
> +free_domheap_page(mfn_to_page(mfn_x(mfn[--i])));
I quite strongly dislike this. It is g
>>> On 17.03.16 at 09:58, wrote:
> On 03/16/16 09:23, Jan Beulich wrote:
>> >>> On 16.03.16 at 15:55, wrote:
>> > On 03/16/16 08:23, Jan Beulich wrote:
>> >> >>> On 16.03.16 at 14:55, wrote:
>> >> > On 03/16/16 07:16, Jan Beulich wrote:
>> >> >> And
>> >> >> talking of fragmentation - how do you
This patch allows xenstore-watch to exit even if no changes to its
XenStore key have occured in a specified interval (in seconds), via
a new -T parameter.
Signed-off-by: Razvan Cojocaru
---
tools/xenstore/xenstore_client.c | 64 ++--
1 file changed, 48 inserti
On Wed, Mar 16, 2016 at 05:08:30AM -0600, Jan Beulich wrote:
> >>> On 15.03.16 at 18:56, wrote:
> > It is not used.
>
> Consistently please - either keep them all (just to cover the case
> that they might get used) or remove them all: xen_compile_info,
> xen_changeset_info, etc are all unused too
TRAPBOUNCE_flags are always available via a displacement from %rdx. This
allows all of %rcx to be used as a scratch register.
No functional change.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/x86_64/compat/entry.S | 5 ++---
xen/arch/x86/x86_64/entry.S| 5 ++
From: Shannon Zhao
Copy main MADT table contents and distributor subtable from physical
ACPI MADT table. Make other subtables through the callback of
gic_hw_ops.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 50 ++
On 2016/3/17 19:29, Jan Beulich wrote:
On 17.03.16 at 12:04, wrote:
>> On 2016/3/17 18:42, Jan Beulich wrote:
>> On 17.03.16 at 10:41, wrote:
> --- a/xen/include/public/hvm/params.h
> +++ b/xen/include/public/hvm/params.h
> @@ -49,11 +49,24 @@
> * Domain = val[47:32],
flight 86434 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86434/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 3 host-install(3) broken REGR. vs. 86376
test-armhf-armhf-xl-
On 17/03/16 10:25, Jan Beulich wrote:
On 16.03.16 at 21:05, wrote:
>> @@ -1742,8 +1742,10 @@ static void load_segments(struct vcpu *n)
>> cs_and_mask = (unsigned short)regs->cs |
>> ((unsigned int)vcpu_info(n, evtchn_upcall_mask) << 16);
>> /* Fold u
On 2016/3/17 19:31, Jan Beulich wrote:
On 17.03.16 at 12:03, wrote:
>> > On 2016/3/17 18:52, Jan Beulich wrote:
>> > On 17.03.16 at 10:41, wrote:
> >>> > --- a/xen/include/asm-arm/config.h
> >>> > +++ b/xen/include/asm-arm/config.h
> >>> > @@ -31,6 +31,10 @@
> >>> >
> Then there is another problem (which also exists in the current
> design): does Xen need to emulate NVDIMM _DSM for dom0? Take the _DSM
> that access label storage area (for namespace) for example:
No. And it really can't as each vendors _DSM is different - and there
is no ACPI AML interpreter i
flight 86477 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86477/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
On Fri, Mar 18, 2016 at 06:40:31AM -0600, Jan Beulich wrote:
> >>> On 15.03.16 at 18:56, wrote:
> > --- a/xen/include/asm-arm/bug.h
> > +++ b/xen/include/asm-arm/bug.h
> > @@ -31,6 +31,7 @@ struct bug_frame {
> > #define BUGFRAME_warn 0
> > #define BUGFRAME_bug1
> > #define BUGFRAME_asser
> -Original Message-
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: 16 March 2016 17:44
> To: xen-de...@lists.xenproject.org
> Cc: Paul Durrant; Keir (Xen.org); Jan Beulich; Andrew Cooper
> Subject: [PATCH v3 1/2] x86/hvm/viridian: keep APIC assist page mapped...
>
> ... for
On Wed, 2016-03-16 at 11:47 -0500, Chong Li wrote:
> Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
> functions to support per-VCPU settings.
>
And a couple more things that I forgot.
I'd shorten the subject line, as already suggested for libxc.
> +/* Get the RTDS scheduling par
flight 86624 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86624/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 60684
build-i386
This run is configured for baseline tests only.
flight 44249 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44249/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 9 debian-di-ins
Hey,
This series is a repost with the comments that I got so far and
hopefully could be considered for Xen 4.7.
PVCLOCK_TSC_STABLE_BIT is the flag telling the guest that the
vcpu_time_info (pvti) are monotonic as seen by any CPU, a feature
which is currently not supported. As it is (i.e. bindly s
Allows expert users to disable tmem via Kconfig. Incorporates feedback
from Jan and Konrad. Patch 2 & 3 from v1 were merged and patch 4 was
dropped.
Doug Goldstein (3):
tmem: add tmem_disable() function
tmem: drop direct usage of opt_tmem
tmem: allow tmem to be disabled with Kconfig
xen/a
flight 44257 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44257/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-armhf-jessie-netboot-pygrub 3 host-install(3) broken blocked
in 44240
test-am
Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
to independently get and set the scheduling parameters of each
vCPU of a domain
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v6:
1) Add explain for nr_vcpus in struct xen_domctl_schedul
On Wed, Mar 16, 2016 at 12:12:00PM +, Julien Grall wrote:
> Hi Konrad,
>
> On 15/03/2016 17:56, Konrad Rzeszutek Wilk wrote:
> >diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> >index 8fbc46d..dbe9ccc 100644
> >--- a/xen/common/Kconfig
> >+++ b/xen/common/Kconfig
> >@@ -168,4 +168,15 @@
On Thu, Mar 17, 2016 at 6:22 PM, Ian Jackson wrote:
> George Dunlap writes ("[PATCH 5/8] libxl: Share logic for finding path
> between qemuu and pygrub"):
>> From: George Dunlap
>
> Thanks. There are a few format inconsistencies (long lines, spaces)
> which I won't enumerate.
>
>> * In the case
Current code would be panic(), when VT-d Device-TLB flush timed out.
the panic() is going to be eliminated, so we must check all kinds of
error and all the way up the call trees.
Signed-off-by: Quan Xu
CC: Jan Beulich
CC: Liu Jinsong
CC: Keir Fraser
CC: Andrew Cooper
CC: Jun Nakajima
CC: Ke
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 17 March 2016 08:12
> To: Paul Durrant
> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
> Subject: RE: [PATCH v2] x86/hvm/viridian: fix the TLB flush hypercall
>
> >>> On 16.03.16 at 18:35, wrot
On Thu, 2016-03-17 at 17:06 -0700, Luis R. Rodriguez wrote:
> On Mar 17, 2016 2:04 PM, "Toshi Kani" wrote:
> >
> > On Wed, 2016-03-16 at 00:29 +0100, Luis R. Rodriguez wrote:
> > > On Tue, Mar 15, 2016 at 05:48:44PM -0600, Toshi Kani wrote:
> > > > On Tue, 2016-03-15 at 01:15 +0100, Luis R. Rodri
> -Original Message-
> From: Bob Liu [mailto:bob@oracle.com]
> Sent: 16 March 2016 13:59
> To: Ian Jackson
> Cc: xen-devel@lists.xen.org; Paul Durrant; konrad.w...@oracle.com;
> jgr...@suse.com; Roger Pau Monne; annie...@oracle.com
> Subject: Re: [RFC PATCH] blkif.h: document scsi/0x12/
Trim CC list
On Fri, Mar 18, 2016 at 05:18:11PM +0100, Fabio Fantoni wrote:
> Il 18/03/2016 13:07, Wei Liu ha scritto:
> >Hi all
> >
> >Today is that last posting day for new features. And we are two weeks
> >away from the anticipated freeze date.
> >
> >I've gone through the outstanding patch ser
this patch set is a prereq patch set for Patch:'VT-d Device-TLB flush issue'.
Current code would be panic(), when VT-d Device-TLB flush timed out. the panic()
is going to be eliminated, so we must check all kinds of error and all the way
up
the call trees.
Quan Xu (2):
IOMMU/MMU: Adjust top lev
[[PATCH v2 0/5] xen: avoid module usage in non-modular code] On 21/02/2016 (Sun
19:06) Paul Gortmaker wrote:
> This series of commits is a part of a larger project to ensure
> people don't reference modular support functions in non-modular
> code. Overall there was roughly 5k lines of dead code
Hi,
I have a question about the network setup with COLO.
so in the colo page(
http://wiki.xenproject.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping)
it shows a network topology graph:
master:
br0: 192.168.0.33
eth1: 192.168.1.33
eth2: 192.168.2.33
slave:
br0: 192.168.0.88
br1: no ip address
eth1:
>>> On 17.03.16 at 13:44, wrote:
> On 03/17/16 05:04, Jan Beulich wrote:
>> >>> On 17.03.16 at 09:58, wrote:
>> > On 03/16/16 09:23, Jan Beulich wrote:
>> >> >>> On 16.03.16 at 15:55, wrote:
>> >> > On 03/16/16 08:23, Jan Beulich wrote:
>> >> >> >>> On 16.03.16 at 14:55, wrote:
>> >> >> > On 03
flight 86441 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86441/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399
build-i386-rumpuserxen
To fetch the last read from the clocksource which was used to
calculate system_time. In the case of clocksource=tsc we will
use it to set tsc_timestamp.
Signed-off-by: Joao Martins
---
Cc: Keir Fraser
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/time.c | 16 ++--
1 file chan
>>> On 17.03.16 at 21:42, wrote:
> On Thu, Mar 17, 2016 at 5:03 AM, Dario Faggioli
> wrote:
>> On Wed, 2016-03-16 at 11:47 -0500, Chong Li wrote:
>
>>
>>> --- a/xen/common/sched_rt.c
>>> +++ b/xen/common/sched_rt.c
>>> @@ -1129,24 +1145,22 @@ rt_dom_cntl(
>>> struct vcpu *v;
>>> unsign
flight 86376 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86376/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-buildfail like 86315
build-i386-rumpuserxen
On Tue, Mar 15, 2016 at 03:35:17PM +, Andrew Cooper wrote:
> And provide stubs for toolstack use.
>
> Signed-off-by: Andrew Cooper
> ---
> CC: Jan Beulich
> CC: Tim Deegan
> CC: Wei Liu
> CC: David Scott
> CC: Rob Hoes
>
> v3:
> * Provide libxc implementation for XEN_SYSCTL_get_cpu_lev
Hi all,
I've noticed the following problem that ends up with a non-repsonsive PV
DomU using kernel 4.4.5 under heavy disk IO:
INFO: rcu_sched self-detected stall on CPU
0-...: (6759098 ticks this GP) idle=cb3/141/0
softirq=3244615/3244615 fqs=4
(t=6762321 jiffies g=22
On March 17, 2016 4:14pm, wrote:
> >>> On 17.03.16 at 09:11, wrote:
> > On March 17, 2016 3:45pm, Tian, Kevin wrote:
> >> > From: Xu, Quan
> >> > Sent: Thursday, March 17, 2016 3:13 PM diff --git
> >> > a/xen/drivers/passthrough/vtd/qinval.c
> >> > b/xen/drivers/passthrough/vtd/qinval.c
> >> >
From: Shannon Zhao
Add a new function to parse DT parameters for Xen specific UEFI just
like the way for normal UEFI. Then it could reuse the existing codes.
If Xen supports EFI, initialize runtime services.
Signed-off-by: Shannon Zhao
Reviewed-by: Matt Fleming
Reviewed-by: Stefano Stabellini
George Dunlap writes ("[PATCH 4/8] libxl: Move check for local access to a
funciton"):
> +static char * libxl__device_disk_find_local_path(libxl__gc *gc,
> + const libxl_device_disk
> *disk) {
...
> +if (disk->format == LIBXL_DISK_FORMAT_RAW
>
On Thu, Mar 17, 2016 at 11:04:29AM +, Julien Grall wrote:
> Hi Konrad,
>
> On 17/03/16 01:16, Konrad Rzeszutek Wilk wrote:
> >And here is the patch. The change for uintXX_t type worked out - same
> >size and offset as on 64-bit. Thought I am tempted to add some
> >more BUILD_BUG checks.
> >
>
On 03/17/2016 01:29 PM, David Vrabel wrote:
On 17/03/16 16:53, Boris Ostrovsky wrote:
On 03/17/2016 12:03 PM, David Vrabel wrote:
On 17/03/16 12:45, Boris Ostrovsky wrote:
Moving an unmasked irq may result in irq handler being invoked on both
source and target CPUs.
With 2-level this can happ
On 03/16/2016 10:07 PM, Paul Durrant wrote:
>> -Original Message-
>> From: Bob Liu [mailto:bob@oracle.com]
..snip..
>>>
>>
>> But we'd like to get the VPD information(of underlying storage device) also
>> in
>> Linux blkfront, even blkfront is not a SCSI device.
>>
>> That's because o
Hi Juergen, All.
I would like to apply PVUSB drivers for using in our platform while PVUSB
stuff doesn't reach upstream.
Unfortunately, I couldn't find more recent version of "kernel based"
backend driver in mailing list.
I have found it in v0 only.
[Xen-devel] [PATCH 0/4] xen, usb: support pvUS
This patch series enables use of the 'APIC assist' enlightenment in Xen.
See section 13.3.4.1 of the Microsoft Hypervisor Top Level Function
Specification v4.0b at:
https://msdn.microsoft.com/en-us/virtualization/hyperv_on_windows/develop/tlfs
for more information.
Patch #1 modifies the viridia
From: bensanda
Modified to provide building of the xenalyze binary for ARM platforms. This was
done in conjunction with patches to xentrace allowing its use on ARM. The
xenalyze binary is now built as part of the SBIN list.
Signed-off-by: Benjamin Sanda
---
tools/xentrace/Makefile | 3 +--
1
flight 86625 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86625/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 86536
Tests which did not succe
>>> On 17.03.16 at 01:44, wrote:
> On Wed, Mar 16, 2016 at 05:08:30AM -0600, Jan Beulich wrote:
>> >>> On 15.03.16 at 18:56, wrote:
>> > It is not used.
>>
>> Consistently please - either keep them all (just to cover the case
>> that they might get used) or remove them all: xen_compile_info,
>>
On 03/05/2016 01:03 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 12/27] tools/libx{l,c}: introduce wait_checkpoint
callback"):
From: Wen Congyang
Under COLO, we are doing checkpoint on demand, if this
callback returns 1, we will take another checkpoint.
0 indicates unexpected erro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-3157 / XSA-171
version 4
I/O port access privilege escalation in x86-64 Linux
UPDATES IN VERSION 4
Clarify Vulnerable Systems section.
Public rel
Instead of addressing these fields via the base of the stack (which
uniformly requires 4-byte displacements), address them from the end
(which for everything other than guest_cpu_user_regs requires just
1-byte ones). This yields a code size reduction somewhere between 8k
and 12k in my builds.
Sign
This patch adds code to enable the APIC assist enlightenment which,
under certain conditions, means that the guest can avoid an EOI of
the local APIC and thereby avoid a VMEXIT.
Use of the enlightenment by the hypervisor is under control of the
toolstack, and is added to the default set.
Signed-o
>>> On 18.03.16 at 11:32, wrote:
> This patch adds code to enable the APIC assist enlightenment which,
> under certain conditions, means that the guest can avoid an EOI of
> the local APIC and thereby avoid a VMEXIT.
>
> Use of the enlightenment by the hypervisor is under control of the
> toolsta
as doing that include changing the scheduler lock
mapping for the pCPU itself, and the correct way
of doing that is:
- take the lock that the pCPU is using right now
(which may be the lock of another scheduler);
- change the mapping of the lock to the RTDS one;
- release the lock (the one tha
David Vrabel writes ("Re: [Xen-devel] [RFC PATCH] blkif.h: document
scsi/0x12/0x83 node"):
> On 16/03/16 13:59, Bob Liu wrote:
> > But we'd like to get the VPD information(of underlying storage device) also
> > in Linux blkfront, even blkfront is not a SCSI device.
>
> Why does blkback/blkfront
On Fri, Mar 4, 2016 at 12:37 AM, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Sometimes it needs to check if there is a subnode of given node in FDT
> by given name. Introduce this helper to get the subnode if it exists.
>
> CC: Rob Herring
> Signed-off-by: Shannon Zhao
Acked-by: Rob Herring
flight 86491 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86491/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-buildfail like 86376
build-i386-rumpuserxen
A list of (request, response) pairs from the operations performed within the
transaction will be useful to support transaction replay.
Since this consumes memory, the number of requests per transaction must not be
left unbounded. Hence a new quota for this is introduced. This quota, configured
via
1 - 100 of 510 matches
Mail list logo