> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, May 13, 2015 2:51 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; george.dun...@eu.citrix.com; Tian, Kevin;
> Zhang, Yang Z; xen-devel@lists.xen.org; k...@xen.org
> Subject: RE: [RFC v2 00/15] Add VT
>>> On 13.05.15 at 08:18, wrote:
> On 05/13/2015 08:01 AM, wei.l...@citrix.com wrote:
>> * VM event patches (none)
>>Add support for XSETBV vm_events,
>>Support hybernating guests
>>Support for VMCALL-based vm_events
>> - Razvan Cojocaru
>
> I've actually sent the first version of
>>> On 22.04.15 at 19:55, wrote:
> On Wed, 2015-04-22 at 17:33 +0100, Jan Beulich wrote:
>> >>> On 22.04.15 at 17:36, wrote:
>> > On Wed, 2015-04-22 at 15:41 +0100, Jan Beulich wrote:
>> >> >>> On 22.04.15 at 16:01, wrote:
>> >> > On Wed, 2015-04-22 at 13:02 +0100, Jan Beulich wrote:
>> >> >> Sa
"Jan Beulich" writes:
On 13.05.15 at 07:26, wrote:
>> The low 640k was weird. We copied it off in purgatory so that it could
>> be capture in a dump. The linux kernel itself winds up using that
>> memory fundamentally because to fire up subsequent processors you have
>> to have memory in
On 05/13/2015 10:04 AM, Jan Beulich wrote:
On 13.05.15 at 08:18, wrote:
>> On 05/13/2015 08:01 AM, wei.l...@citrix.com wrote:
>>> * VM event patches (none)
>>>Add support for XSETBV vm_events,
>>>Support hybernating guests
>>>Support for VMCALL-based vm_events
>>> - Razvan Coj
On Wed, 2015-05-06 at 11:59 -0600, Jim Fehlig wrote:
> Dario Faggioli wrote:
> > On Fri, 2015-05-01 at 15:32 -0600, Jim Fehlig wrote:
> >> E.g. if a domain is configured to use memory allocated from certain numa
> >> nodes, we'd want to make sure the dest has sufficient memory amongst
> >> those n
The added calculation related functions will be used in the intel_pstate.c.
Signed-off-by: Wei Wang
---
xen/include/asm-x86/div64.h | 68 +
xen/include/xen/kernel.h| 30
2 files changed, 98 insertions(+)
diff --git a/xen/inclu
Add a common interface for matching the current cpu against an
array of x86_cpu_ids. Also change mwait-idle.c to use it.
Signed-off-by: Wei Wang
---
xen/arch/x86/cpu/common.c | 39 +++
xen/arch/x86/cpu/mwait-idle.c | 30 +-
Register/unregister the CPU hotplug notifier when the driver is
registered, and move the driver register/unregister function to
the cpufreq.c.
Signed-off-by: Wei Wang
---
xen/drivers/cpufreq/cpufreq.c | 27 +++
xen/include/acpi/cpufreq/cpufreq.h | 28 ++--
In order to better support future Intel processors, intel_pstate
changes to use percentage values to tune P-states. The intel_pstate
driver uses its own internal governor, and it is recorded in the
"policy->policy" field. The setpolicy driver interface is used to
configure the intel_pstate internal
The unregister notifier function is needed to support cpu hotplug.
Signed-off-by: Wei Wang
---
xen/common/cpu.c | 7 +++
xen/include/xen/cpu.h | 1 +
2 files changed, 8 insertions(+)
diff --git a/xen/common/cpu.c b/xen/common/cpu.c
index 47e8b5b..508cee5 100644
--- a/xen/common/cpu.c
+
By default, the old P-state driver (acpi-freq) is used. Adding
"intel_pstate=enable" to the Xen booting param list to enable the
use of intel_pstate. However, if intel_pstate is enabled on a
machine which does not support the driver (e.g. Nehalem), the
old P-state driver will be loaded due to the f
Add support in the pmstat.c so that the xenpm tool can request to
access the intel_pstate driver.
Signed-off-by: Wei Wang
---
tools/libxc/xc_pm.c | 4 +-
xen/drivers/acpi/pmstat.c | 106 +++-
xen/include/public/sysctl.h | 16 ++-
3 files c
The intel_pstate driver is ported following its kernel code logic
(commit: 93f0822d).
In the kernel, a user can adjust the limits via sysfs
(limits.min_sysfs_pct/max_sysfs_pct). In Xen, the
policy->min_perf_pct/max_perf_pct acts as the transit station.
A user interacts with it via xenpm.
Signed-o
The intel_pstate driver receives percentage values to set the
performance limits. This patch adds interfaces to support the
input of percentage values to control the intel_pstate driver.
Also, the "get-cpufreq-para" is modified to show percentage
based feedback info.
Signed-off-by: Wei Wang
---
On 13/05/2015 02:53, Yang Hongyang wrote:
> This is the combination of Andrew Cooper's misc patches and mine
> to aid migration v2 Remus support.
Everything looks in order now from my point of view!
~Andrew
>
> See individual patches for details.
>
> Git tree available at:
> https://github.
Control: tag -1 +upstream +forwarded
On Sun, 2015-05-10 at 12:33 +1000, Russell Coker wrote:
> Package: xen-utils-4.4
> Version: 4.4.1-9
> Severity: normal
>
> # /usr/lib/xen-4.4/bin/xl create -c /etc/xen/katana
> Parsing config from /etc/xen/katana
> libxl: error: libxl_utils.c:217:logrename: f
>>> On 13.05.15 at 09:35, wrote:
> Fundamentally if you are transfering control in long mode you have to
> set up some page table. I giant identity mapped page table that can use
> 1G or 2M pages takes up very little memory, and can be very simply
> and easily before the transfer of control takes
This patchset implement the Remus support for Migration v2 but without
memory compressing.
Git tree available at:
https://github.com/macrosheep/xen/tree/Remus-newmig-v3
This patchset is based on
[PATCH v5 00/14] Misc patches to aid migration v2 Remus support
https://github.com/macrosh
On Tue, 2015-05-12 at 14:36 -0600, Jim Fehlig wrote:
> > Ian.
> >
> > From f560b7eed781a93567d69bcf90260c7475854766 Mon Sep 17 00:00:00 2001
> > From: Ian Campbell
> > Date: Thu, 7 May 2015 16:37:18 +0100
> > Subject: [PATCH] Toolstack::libvirt: Support for ACPI fallback for shutdown
> >
> > This
With Remus, the restore flow should be:
the first full migration stream -> { periodically restore stream }
Signed-off-by: Yang Hongyang
Signed-off-by: Andrew Cooper
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
---
tools/libxc/xc_sr_common.h | 13 +
tools/libxc/xc_sr_restore.c | 124 +++
add checkpointed flag to the restore context.
Signed-off-by: Yang Hongyang
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
---
tools/libxc/xc_sr_common.h | 3 +++
tools/libxc/xc_sr_restore.c | 1 +
2 files changed, 4 insertions(+)
diff --git a/tools/libxc/xc_sr_common.h b/to
With Remus, the save flow should be:
live migration->{ periodically save(checkpointed save) }
Signed-off-by: Yang Hongyang
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
---
tools/libxc/xc_sr_save.c | 73 +++-
1 file changed, 54 ins
On Mon, 2015-05-11 at 10:36 -0600, Jim Fehlig wrote:
[...]
> > The qemu log is sadly empty so I've no clue why this timed out.
> >
>
> I guess qemu didn't run at all...
>
> > Perhaps there is something in
> > http://logs.test-lab.xenproject.org/osstest/logs/55257/test-amd64-amd64-libvirt/merl
Appologies if you received multiple emails of this patch. Just couldn't see it
showing up in the mailinglist.
Best,
Wei
On 28/04/2015 16:37, Wei Wang wrote
> Changes:
> *NO.1 The intel_pstate driver can be controlled via two ways:
> A. min_perf_pct and max_perf_pct
>The user directly adjust
(trimming the list of cc)
Hi Wei,
On 13/05/2015 06:01, wei.l...@citrix.com wrote:
=== Hypervisor ARM ===
* Mem_access for ARM (good)
v15 posted
- Tamas K Lengyel
I think all the patches for this patch series has been pushed. Tamas,
Can you confirm?
* ITS support (fair )
-
Hi,
while trying to build a pvusb backend in qemu I think I've found a
general issue in xl: qemu for pv-domains is started only at domain
creation and only if there is at least one backend in qemu required.
If there is no qemu process started for the domain at creation time
it will be impossible
>> * Clean-up of mem-event subsystem (good)
>>v9 posted
>> - Tamas K Lengyel
Completed and merged.
>> * Mem_access for ARM (good)
>>v15 posted
>> - Tamas K Lengyel
Completed and merged.
Cheers,
Tamas
___
Xen-devel mailing list
Xen-dev
On 05/13/2015 01:01 PM, wei.l...@citrix.com wrote:
(Note, please trim your quotes when replying, and also trim the CC list if
necessary. You might also consider changing the subject line of your reply to
"Status of (Was: Xen 4.6 Development Update (X months reminder)")
Hi all
We are now four
On Tue, 2015-05-12 at 12:46 +0100, Stefano Stabellini wrote:
> > Would a separate clone of the same raisin version with some sort of
> > "dist" directory transported over be sufficient and supportable? Or are
> > raisin's outputs not in one place and easily transportable?
> >
> > i.e. today build-$
On Tue, 2015-05-12 at 19:04 +0100, Stefano Stabellini wrote:
> On Tue, 12 May 2015, Ian Jackson wrote:
> > Stefano Stabellini writes ("[PATCH v5] OSSTEST: introduce a raisin build
> > test"):
> > > Signed-off-by: Stefano Stabellini
> > ...
> > > +echo >>config XEN_URL=\\"$r{tree_xen}\\"
> > >
On Tue, 2015-05-12 at 16:52 +0100, Ian Jackson wrote:
> Ian Campbell writes ("[OSSTEST v6 13/24] distros: support PV guest install
> from Debian netinst media."):
> > The netinst media are iso images containing a base Debian install and
> > some (image size dependent) additional tasks.
>
> Most o
On Wed, 13 May 2015 09:12:47 +0100
"Jan Beulich" wrote:
> >>> On 13.05.15 at 09:35, wrote:
> > Fundamentally if you are transfering control in long mode you have to
> > set up some page table. I giant identity mapped page table that can use
> > 1G or 2M pages takes up very little memory, and ca
On Tue, 2015-05-12 at 16:54 +0100, Ian Jackson wrote:
> Ian Campbell writes ("[OSSTEST v6 14/24] Test pygrub and pvgrub on the
> regular flights"):
> > Since we now have the ability to test these drop one of each of
> > pygrub, pvgrub-32 and pvgrub-64 into the standard flights. Omitting
> > the {G
On Tue, 2015-05-12 at 17:03 +0100, Ian Jackson wrote:
> Ian Campbell writes ("[OSSTEST v6 15/24] distros: add branch infrastructure"):
> > Since the distro nightlies are not version controlled we cannot use
> > the usual mechanisms for detecting regressions. Special case things
> > appropriately. W
On Tue, 2015-05-12 at 17:14 +0100, Ian Jackson wrote:
> Ian Jackson writes ("Re: [OSSTEST v6 13/24] distros: support PV guest install
> from Debian netinst media."):
> > Ian Campbell writes ("[OSSTEST v6 13/24] distros: support PV guest install
> > from Debian netinst media."):
> > > +my $bas
On Tue, 2015-05-12 at 17:06 +0100, Ian Jackson wrote:
> Ian Campbell writes ("[Xen-devel] [PATCH OSSTEST v5 00/24] add distro domU
> testing flight"):
> > As last time there are some patches in here which I think will be useful
> > to the Intel folks doing the nested virt testing, specifically the
>>> On 11.05.15 at 16:37, wrote:
> @@ -53,6 +67,19 @@ void __bad_atomic_size(void);
> } \
> })
>
> +#define add_sized(p, x) ({\
> +typeof(*(p)) __x = (x); \
> +unsigned
>>> On 11.05.15 at 16:45, wrote:
> On 11/05/15 15:37, David Vrabel wrote:
>> add_sized(ptr, inc) adds inc to the value at ptr using only the correct
>> size of loads and stores for the type of *ptr. The add is /not/ atomic.
>>
>> This is needed for ticket locks to ensure the increment of the hea
On Wed, 2015-05-13 at 10:54 +0200, Juergen Gross wrote:
> Hi,
>
> while trying to build a pvusb backend in qemu I think I've found a
> general issue in xl: qemu for pv-domains is started only at domain
> creation and only if there is at least one backend in qemu required.
>
> If there is no qemu
>>> On 11.05.15 at 16:37, wrote:
> Replace the byte locks with ticket locks. Ticket locks are: a) fair;
> and b) peform better when contented since they spin without an atomic
> operation.
>
> The lock is split into two ticket values: head and tail. A locker
> acquires a ticket by (atomically)
On 13/05/15 10:23, Jan Beulich wrote:
On 11.05.15 at 16:37, wrote:
>> @@ -53,6 +67,19 @@ void __bad_atomic_size(void);
>> } \
>> })
>>
>> +#define add_sized(p, x) ({\
>> +typeof(*(p)) __x = (x);
>>> On 13.05.15 at 11:35, wrote:
> On 13/05/15 10:23, Jan Beulich wrote:
> On 11.05.15 at 16:37, wrote:
>>> @@ -53,6 +67,19 @@ void __bad_atomic_size(void);
>>> } \
>>> })
>>>
>>> +#define add_sized(p, x) ({
This patch series provides x86 PVHVM domains with an ability to perform
kexec/kdump.
The main change in v6 is the XEN_DOMCTL_devour -> XENMEM_soft_reset change of
the newly introduced hypercall. This change was made because of two main
reasons:
1) Make it ARM-friendly by eliminating the mfn_to_gmf
Dummy policy just checks that the current domain is privileged,
in flask policy soft_reset is added to create_domain.
Signed-off-by: Vitaly Kuznetsov
---
tools/flask/policy/policy/modules/xen/xen.if | 2 +-
xen/common/memory.c | 4
xen/include/xsm/dummy.h
Use this in libxl_dm instead of hard-coding.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxc/include/xenguest.h | 1 +
tools/libxl/libxl_dm.c | 2 +-
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/tools/libxc/include/xenguest.h b/tools/libxc/include/xenguest.h
index d1227f
The new state is required as a prerequisite to implementing soft reset
operation for domains. In this operation we need to make sure that source
domain's mappings don't change while we are reassigning all its memory to
the destination domain. This new state indicates that the particular domain is
d
New operation reassigns all memory pages from source domain to the destination
domain mapping them at exactly the same GFNs. Pages mapped more than once (e.g.
grants) are being copied.
Signed-off-by: Vitaly Kuznetsov
---
xen/common/memory.c | 232 +
This special type of shutdown is supposed to be used by PVHVM guests when
they want to perform some sort of kexec/kdump. Toolstack will have to build
a new domain with the memory content of the original domain and start executing
the new one from the point where SHUTDOWN_soft_reset was called. This
Use letter 'S' to indicate a domain in such state.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxl/libxl.h | 7 +++
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_cmdimpl.c | 2 +-
tools/python/xen/lowlevel/xl/xl.c | 1 +
4 files changed, 10 insertions(+), 1 d
Add new xc_domain_soft_reset() function which performs so-called 'soft reset'
for an HVM domain. It is being performed in the following way:
- Save HVM context and all HVM params of the original domain;
- Transfer all the original domain's memory to a new domain with
XENMEM_soft_reset;
- Destroy
As a preparation before adding new restart type (soft reset) put all
restart types into an enum.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxl/xl.h | 6 ++
tools/libxl/xl_cmdimpl.c | 23 ++-
2 files changed, 16 insertions(+), 13 deletions(-)
diff --git a/tools
Introduce xc_domain_memory_soft_reset() function supporting XENMEM_soft_reset.
Signed-off-by: Vitaly Kuznetsov
---
tools/libxc/include/xenctrl.h | 5 +
tools/libxc/xc_domain.c | 18 ++
2 files changed, 23 insertions(+)
diff --git a/tools/libxc/include/xenctrl.h b/tool
Perform soft reset when a domain did SHUTDOWN_soft_reset. Migrate the
content with xc_domain_soft_reset(), reload dm and toolstack.
Signed-off-by: Vitaly Kuznetsov
---
docs/man/xl.cfg.pod.5| 12 +
tools/libxl/libxl.c | 4 ++
tools/libxl/libxl.h | 6 +++
tools/l
>>> On 11.05.15 at 16:57, wrote:
> --- a/xen/arch/x86/setup.c
> +++ b/xen/arch/x86/setup.c
> @@ -1446,6 +1446,9 @@ void __init noreturn __start_xen(unsigned long mbi_p)
>
> dmi_end_boot();
>
> +if ( is_hardware_domain(dom0) )
> +setup_io_bitmap(dom0);
Is it indeed possible fo
On 13/05/15 09:12, Jan Beulich wrote:
On 13.05.15 at 09:35, wrote:
>> Fundamentally if you are transfering control in long mode you have to
>> set up some page table. I giant identity mapped page table that can use
>> 1G or 2M pages takes up very little memory, and can be very simply
>> and
writes:
> * toolstack-based approach to pvhvm guest kexec (fair)
>also contains hypervisor side change
> - Vitaly Kuznetsov
>
> * Toolstack-based approach to pvhvm guest kexec (ok)
>v4 posted
> - Vitaly Kuznetsov
v6 was just sent.
--
Vitaly
__
>>> On 13.05.15 at 11:53, wrote:
> On 13/05/15 09:12, Jan Beulich wrote:
> On 13.05.15 at 09:35, wrote:
>>> Fundamentally if you are transfering control in long mode you have to
>>> set up some page table. I giant identity mapped page table that can use
>>> 1G or 2M pages takes up very littl
On Tue, May 12, 2015 at 10:35 AM, Andrew Cooper
wrote:
> diff --git a/tools/libxc/xc_sr_save_x86_hvm.c
> b/tools/libxc/xc_sr_save_x86_hvm.c
> index 58efdb9..f4604db 100644
> --- a/tools/libxc/xc_sr_save_x86_hvm.c
> +++ b/tools/libxc/xc_sr_save_x86_hvm.c
> @@ -184,7 +184,13 @@ static int x86_hvm_s
On 05/06/2015 05:00 PM, Stefano Stabellini wrote:
> Introduce a new command to run functional tests and unit tests.
> Introduce a generic infrastrucutre to run tests on the local machine.
> Add a library of common functions that can be used by the test scripts
> to setup guest VMs.
>
> Add a simpl
On 04/28/2015 03:46 PM, Arianna Avanzini wrote:
> Hello Christoph,
>
> Il 28/04/2015 09:36, Christoph Hellwig ha scritto:
>> What happened to this patchset?
>>
>
> It was passed on to Bob Liu, who published a follow-up patchset here:
> https://lkml.org/lkml/2015/2/15/46
>
Right, and then I wa
On 13/05/15 11:09, George Dunlap wrote:
> On Tue, May 12, 2015 at 10:35 AM, Andrew Cooper
> wrote:
>> diff --git a/tools/libxc/xc_sr_save_x86_hvm.c
>> b/tools/libxc/xc_sr_save_x86_hvm.c
>> index 58efdb9..f4604db 100644
>> --- a/tools/libxc/xc_sr_save_x86_hvm.c
>> +++ b/tools/libxc/xc_sr_save_x86_
On Wed, May 13, 2015 at 11:23 AM, Andrew Cooper
wrote:
> On 13/05/15 11:09, George Dunlap wrote:
>> On Tue, May 12, 2015 at 10:35 AM, Andrew Cooper
>> wrote:
>>> diff --git a/tools/libxc/xc_sr_save_x86_hvm.c
>>> b/tools/libxc/xc_sr_save_x86_hvm.c
>>> index 58efdb9..f4604db 100644
>>> --- a/tools
On 12/05/15 18:18, Joao Martins wrote:
>
> Packet I/O Tests:
>
> Measured on a Intel Xeon E5-1650 v2, Xen 4.5, no HT. Used pktgen "burst 1"
> and "clone_skbs 10" (to avoid alloc skb overheads) with various pkt
> sizes. All tests are DomU <-> Dom0, unless specified otherwise.
Are all these me
> -Original Message-
> From: wei.l...@citrix.com [mailto:wei.l...@citrix.com]
> Sent: Wednesday, May 13, 2015 1:02 PM
> To: xen-de...@lists.xenproject.org; White, Edmund H;
> xumengpa...@gmail.com; dgol...@seas.upenn.edu; jtwea...@hawaii.edu;
> oleksandr.dmytrys...@globallogic.com; cheg...@
Signed-off-by: Ian Jackson
---
ts-xen-build-prep | 12
1 file changed, 4 insertions(+), 8 deletions(-)
diff --git a/ts-xen-build-prep b/ts-xen-build-prep
index 23c901b..a9c9e4a 100755
--- a/ts-xen-build-prep
+++ b/ts-xen-build-prep
@@ -65,11 +65,11 @@ sub lvextend_stage1 () {
This did not really help. We are going to do something different.
This reverts commit ee31a32af1fc9a38ad08b4a36ee69e1c58ea0828.
---
ts-xen-build-prep |5 +
1 file changed, 1 insertion(+), 4 deletions(-)
diff --git a/ts-xen-build-prep b/ts-xen-build-prep
index 3684c0a..23c901b 100755
---
And make $lv a global.
Signed-off-by: Ian Jackson
---
ts-xen-build-prep | 11 +++
1 file changed, 7 insertions(+), 4 deletions(-)
diff --git a/ts-xen-build-prep b/ts-xen-build-prep
index a9c9e4a..856d97b 100755
--- a/ts-xen-build-prep
+++ b/ts-xen-build-prep
@@ -28,8 +28,9 @@ $whhost
Online resize is 40x slower than mkfs. It appears that the
backgrounded resize2fs can starve build tasks of IO bandwidth.
So instead, use mkfs to make a new filesystem for /home/osstest.
We use rsync to copy in the old contents.
For convenience of (a) review (b) possible reversion, we keep (for
Signed-off-by: Ian Jackson
---
Osstest/TestSupport.pm | 17 +++--
1 file changed, 11 insertions(+), 6 deletions(-)
diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm
index 3ff70a5..bfccaf1 100644
--- a/Osstest/TestSupport.pm
+++ b/Osstest/TestSupport.pm
@@ -61,7 +61,8 @@
On Wed, 2015-05-13 at 11:03 +0200, Armin Zentai wrote:
> Dear Xen Developers!
>
>
> I'd like to report you a bug, that can cause HV reboot.
Thanks.
FWIW this is a dom0 kernel panic somewhere in either the network or
iscsi stack, not a panic in the hypervisor itself.
I mention this because the
This is no longer generated.
This reverts commit 9f299b936d1812bfd958d2771676a8de3cf9c060.
---
ts-logs-capture |2 --
1 file changed, 2 deletions(-)
diff --git a/ts-logs-capture b/ts-logs-capture
index 4ad55b9..f6eca78 100755
--- a/ts-logs-capture
+++ b/ts-logs-capture
@@ -128,8 +128,6 @@ su
At the moment, when we set up a machine for builds, we:
- install Debian, leaving plenty of space in the root LVM VG
- install the build tools
- resize the root fs to make room for the builds
This fs resize runs (mostly) in the background, alongside the first
build(s). This is, it turns out, n
Hi,
I will publish a spreadsheet with all the submissions later today (when I get
the latest export from the Linux Foundation).
Any other volunteer can still come forward.
I also have a call later today where I will verify all my assumptions re space,
timing, etc. such that we can determine t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-3456 / XSA-133
version 2
Privilege escalation via emulated floppy disk drive
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
On Wed, 13 May 2015, George Dunlap wrote:
> On 05/06/2015 05:00 PM, Stefano Stabellini wrote:
> > Introduce a new command to run functional tests and unit tests.
> > Introduce a generic infrastrucutre to run tests on the local machine.
> > Add a library of common functions that can be used by the t
On Wed, 13 May 2015, Ian Campbell wrote:
> On Tue, 2015-05-12 at 12:46 +0100, Stefano Stabellini wrote:
> > > Would a separate clone of the same raisin version with some sort of
> > > "dist" directory transported over be sufficient and supportable? Or are
> > > raisin's outputs not in one place and
Ping again.
These should be included in 4.5.1
~Andrew
On 22/04/15 16:43, Andrew Cooper wrote:
> Ping on the patches themselves?
>
> On 13/04/15 17:37, Andrew Cooper wrote:
>> On 13/04/15 17:33, Ian Jackson wrote:
>>> Andrew Cooper writes ("[Xen-devel] [PATCH] tools/libxc: Fix build of 32bit
>>>
On Wed, 2015-05-13 at 12:48 +0100, Stefano Stabellini wrote:
> On Wed, 13 May 2015, Ian Campbell wrote:
> > On Tue, 2015-05-12 at 12:46 +0100, Stefano Stabellini wrote:
> > > > Would a separate clone of the same raisin version with some sort of
> > > > "dist" directory transported over be sufficien
On Wed, 13 May 2015 11:01:24 +0100
"Jan Beulich" wrote:
> >>> On 13.05.15 at 11:53, wrote:
> > On 13/05/15 09:12, Jan Beulich wrote:
> > On 13.05.15 at 09:35, wrote:
> >>> Fundamentally if you are transfering control in long mode you have to
> >>> set up some page table. I giant identity m
On 05/06/2015 01:12 PM, Razvan Cojocaru wrote:
Arch_set_info_guest() doesn't set CR0, CR3 or CR4. Added code
that does that.
Signed-off-by: Razvan Cojocaru
---
xen/arch/x86/domain.c |3 +++
xen/arch/x86/hvm/emulate.c|6 +++---
xen/arch/x86/hvm/hvm.c|
>>> On 13.05.15 at 14:12, wrote:
> On Wed, 13 May 2015 11:01:24 +0100
> "Jan Beulich" wrote:
>> Okay, if the tools do this in v2, then I think the compatibility v1
>> path should indeed do so too (in the hypervisor).
>
> Are you working on a patch?
Not yet, but I'm going to as soon as I can fin
Hi Julien,
On Fri, May 08, 2015 at 02:29:21PM +0100, Julien Grall wrote:
> Hi all,
>
> This patch series adds support for GICv2 on GICv3. This feature is available
> only when the GICv3 hardware is compatible with GICv2.
>
> When it's the case, the same interface is provided in order to use a
>
Usage:
ahci=0|1 (default=0)
If enabled adds ich9 disk controller in ahci mode and uses it with
upstream qemu to emulate disks instead of ide.
It doesn't support cdroms which still use ide (cdroms will use "-device
ide-cd" as new qemu parameters)
Ahci requires new qemu parameters but for now other
On 13 May 2015, at 12:50, David Vrabel wrote:
> On 12/05/15 18:18, Joao Martins wrote:
>>
>> Packet I/O Tests:
>>
>> Measured on a Intel Xeon E5-1650 v2, Xen 4.5, no HT. Used pktgen "burst 1"
>> and "clone_skbs 10" (to avoid alloc skb overheads) with various pkt
>> sizes. All tests are Dom
Still waiting for AMD IOMMU maintainer feedback...
Thanks, Jan
>>> On 07.05.15 at 14:59, wrote:
> Handing INVALID_GFN to functions like hd->platform_ops->map_page()
> just can't do any good, and the ioreq server code results in such pages
> being on the list of ones owned by a guest.
>
> While
On Wed, May 13, 2015 at 10:30:40AM +0100, Ian Campbell wrote:
> On Wed, 2015-05-13 at 10:54 +0200, Juergen Gross wrote:
> > Hi,
> >
> > while trying to build a pvusb backend in qemu I think I've found a
> > general issue in xl: qemu for pv-domains is started only at domain
> > creation and only if
On Wed, 2015-05-13 at 14:06 +0100, Wei Liu wrote:
> On Wed, May 13, 2015 at 10:30:40AM +0100, Ian Campbell wrote:
> > On Wed, 2015-05-13 at 10:54 +0200, Juergen Gross wrote:
> > > Hi,
> > >
> > > while trying to build a pvusb backend in qemu I think I've found a
> > > general issue in xl: qemu for
On Tue, 2015-05-12 at 18:35 +0100, Julien Grall wrote:
> > Message signalled interrupts are translated into an LPI via a
> > translation table which must be configured for each device which can
> > generate an MSI. The ITS uses the device id of the originating device
> > to lookup the corresponding
Il 12/05/2015 16:44, Stefano Stabellini ha scritto:
On Tue, 12 May 2015, Stefano Stabellini wrote:
On Tue, 12 May 2015, Fabio Fantoni wrote:
Il 12/05/2015 12:26, Fabio Fantoni ha scritto:
Il 12/05/2015 11:23, Fabio Fantoni ha scritto:
Il 11/05/2015 17:04, Fabio Fantoni ha scritto:
Il 21/04/2
I think I remember some discussion of something in this area not too
long ago on xen-devel. CC-s added.
Konrad, do you know of any issues with ucode=scan in 4.4?
On Wed, 2015-05-13 at 10:27 +0200, Stephan Seitz wrote:
> Package: xen-hypervisor-4.5-amd64
> Version: 4.5.0-1
> Severity: normal
>
>
Acked-by: Suravee Suthikulpanit
Thanks,
Suravee
On 5/7/2015 7:59 AM, Jan Beulich wrote:
Handing INVALID_GFN to functions like hd->platform_ops->map_page()
just can't do any good, and the ioreq server code results in such pages
being on the list of ones owned by a guest.
While - as suggested
Hey Wei,
On Wed, May 13, 2015 at 06:01:57AM +0100, wei.l...@citrix.com wrote:
[...]
> * Xen multiboot2-EFI support (fair)
I think that it could be ok.
>See http://lists.xen.org/archives/html/xen-devel/2013-05/msg02281.html
Change above link to
http://lists.xen.org/archives/html/xen-deve
On Wed, 2015-05-13 at 08:18 +0100, Jan Beulich wrote:
> >>> On 22.04.15 at 19:55, wrote:
> > On Wed, 2015-04-22 at 17:33 +0100, Jan Beulich wrote:
> >> >>> On 22.04.15 at 17:36, wrote:
> >> > On Wed, 2015-04-22 at 15:41 +0100, Jan Beulich wrote:
> >> >> >>> On 22.04.15 at 16:01, wrote:
> >> >> >
On Tue, 2015-05-12 at 15:33 +0100, Julien Grall wrote:
> From: Julien Grall
>
> The functions fdt_{fisrt,next}_subnode may not be available because:
"first"
> * It has been introduced in 2013 => Doesn't work on Wheezy
> * The prototype exists but the functions are not exposed. Don't ask
On Wed, 2015-05-06 at 13:28 +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
Acked-by: Ian Campbell
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, 2015-05-06 at 13:28 +, Olaf Hering wrote:
> The pvops kernel expects either "naa.WWN:LUN" or "h:c:t:l" in the p-dev
> property. Add the missing :LUN part to the comment.
>
> Signed-off-by: Olaf Hering
Acked-by: Ian Campbell
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Keir Fraser
>
On Wed, 2015-05-06 at 13:28 +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
I'm not sure how much of this really belongs in an ABI document, but I
don't think there's really anywhere else so
Acked-by: Ian Campbell
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Keir Fraser
> Cc: Tim Deegan
On Wed, 2015-05-06 at 13:28 +, Olaf Hering wrote:
> Just to make them public, not meant for merging:
> The scripts used during development to create a bunch of SCSI devices in
> dom0 using the Linux target framework. targetcli3 and rtslib3 is used.
I'm not sure what this is all about, but is
On Wed, 2015-05-06 at 13:28 +, Olaf Hering wrote:
> Port pvscsi support from xend to libxl:
>
> vscsi=['pdev,vdev{,options}']
> xl scsi-attach
> xl scsi-detach
> xl scsi-list
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
>
1 - 100 of 180 matches
Mail list logo