>>> On 04.08.15 at 20:08, wrote:
> On 03/08/15 18:31, Roger Pau Monné wrote:
>> struct vcpu_hvm_x86_16 {
>> uint16_t ax;
>> uint16_t cx;
>> uint16_t dx;
>> uint16_t bx;
>> uint16_t sp;
>> uint16_t bp;
>> uint16_t si;
>> uint16_t di;
>> uint16_t ip;
>>
>> uin
flight 60647 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60647/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate
fail pass in 60639
test-amd64-amd64-
On Tue, Aug 11, 2015 at 01:51:10AM +0100, Wei Liu wrote:
> On Mon, Aug 10, 2015 at 05:00:51PM -0700, sainath grandhi wrote:
> > Hello all,
> >
> >
> >
> > I was measuring amount of time taken on host by the Xen toolstack
> > while launching a PV guest.
> >
> > I notice that there is around 2-3
On Fri, Aug 07, 2015 at 01:44:41PM +0100, Andrew Cooper wrote:
> On 07/08/15 09:00, Shuai Ruan wrote:
> >
> >>> +goto skip;
> >>> +}
> >>> +
> >>> +if ( !guest_kernel_mode(v, regs) || (regs->edi & 0x3f) )
> >> What does edi have to do with xsaves?
On Fri, Aug 07, 2015 at 02:04:51PM +0100, Andrew Cooper wrote:
> On 07/08/15 09:22, Shuai Ruan wrote:
> >
> >>> void hvm_cpuid(unsigned int input, unsigned int *eax, unsigned int *ebx,
> >>> unsigned int *ecx, unsigned int *edx)
> >>> {
> >>> @@ -4456,6 +4460,3
On 8/10/2015 4:26 PM, Wei Liu wrote:
On Mon, Aug 10, 2015 at 11:33:40AM +0800, Yu Zhang wrote:
Currently in ioreq server, guest write-protected ram pages are
tracked in the same rangeset with device mmio resources. Yet
unlike device mmio, which can be in big chunks, the guest write-
protected
On 8/10/2015 6:57 PM, Paul Durrant wrote:
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: 10 August 2015 11:56
To: Paul Durrant; Wei Liu; Yu Zhang
Cc: xen-devel@lists.xen.org; Ian Jackson; Stefano Stabellini; Ian Campbell;
Keir (Xen.org); jbeul...@suse.co
> -Original Message-
> From: Yu, Zhang [mailto:yu.c.zh...@linux.intel.com]
> Sent: 11 August 2015 08:57
> To: Paul Durrant; Andrew Cooper; Wei Liu
> Cc: xen-devel@lists.xen.org; Ian Jackson; Stefano Stabellini; Ian Campbell;
> Keir (Xen.org); jbeul...@suse.com; Kevin Tian; zhiyuan...@intel.
On 8/11/2015 4:25 PM, Paul Durrant wrote:
-Original Message-
From: Yu, Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 11 August 2015 08:57
To: Paul Durrant; Andrew Cooper; Wei Liu
Cc: xen-devel@lists.xen.org; Ian Jackson; Stefano Stabellini; Ian Campbell;
Keir (Xen.org); jbeul...@suse.
On Fri, 2015-08-07 at 10:54 -0400, Konrad Rzeszutek Wilk wrote:
>
> > I've looked into this, and AFAICT you were probably using the udev
> > rules (you have run_hotplug_scripts=0 in xl.conf?) before 2ba368, and
>
> Correct. I think I needed that for driver domains and had left it in
> there.
> -Original Message-
> From: Yu, Zhang [mailto:yu.c.zh...@linux.intel.com]
> Sent: 11 August 2015 09:41
> To: Paul Durrant; Andrew Cooper; Wei Liu
> Cc: Kevin Tian; Keir (Xen.org); Ian Campbell; xen-devel@lists.xen.org;
> Stefano Stabellini; zhiyuan...@intel.com; jbeul...@suse.com; Ian Jack
On Fri, Aug 07, 2015 at 06:08:25PM +0200, Roger Pau Monne wrote:
> This is a simple fix to make sure libxl__build_hvm returns an error code in
> case of failure.
>
> Signed-off-by: Roger Pau Monné
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: Wei Li
On Mon, 2015-08-10 at 10:47 -0400, Konrad Rzeszutek Wilk wrote:
> On Mon, Aug 10, 2015 at 05:14:28PM +0300, M. Ivanov wrote:
> > On Mon, 2015-08-10 at 09:58 -0400, Konrad Rzeszutek Wilk wrote:
> > > On Mon, Aug 10, 2015 at 02:11:38AM +0300, M. Ivanov wrote:
> > > > Hello,
> > > >
> > > > excuse me
On Mon, 2015-08-10 at 09:58 -0400, Konrad Rzeszutek Wilk wrote:
> On Mon, Aug 10, 2015 at 02:11:38AM +0300, M. Ivanov wrote:
> > Hello,
> >
> > excuse me for bothering you, but I've read an old thread on a mailing
> > list about X10SAE compatibility.
> > http://lists.xen.org/archives/html/xen-dev
flight 37818 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/37818/
Perfect :-)
All tests in this flight passed
baseline version:
flight 37776
jobs:
build-amd64 pass
build-armhf
>>> On 24.07.15 at 19:54, wrote:
> On 07/23/2015 10:07 AM, Jan Beulich wrote:
>> Plus - is this in line with what the tools are doing? Aren't they
>> assuming !PV <=> native format context? I.e. don't you need
>> to treat differently v->domain == current->domain and its
>> opposite? Roger btw. rai
On 11/08/15 03:44, big strong wrote:
> My goal is to intercept hyprcalls to detect malicious calls. So I need
> firstly find where the hypercalls are.
As I have said before, a guest may have an arbitrary number of hypercall
pages. Furthermore, the hypercall page is merely a convenience; nothing
p
On 11/08/15 09:01, Shuai Ruan wrote:
>
>>> +
>>> +/*
>>> + * The FP xstates and SSE xstates are legacy states. They are always
>>> + * in the fixed offsets in the xsave area in either compacted form
>>> + * or standard form.
>>> + */
>>> +xstate_comp_offsets[0] = 0;
>>> +
>>> On 24.07.15 at 20:35, wrote:
> On 07/23/2015 10:21 AM, Jan Beulich wrote:
> On 11.07.15 at 00:20, wrote:
>>> Signed-off-by: Boris Ostrovsky
>>> ---
>>> Changes in v3:
>>> * Defined compat_mmuext_op(). (XEN_GUEST_HANDLE_PARAM(mmuext_op_compat_t)
>>>is not defined in header files so I
On 11/08/15 08:59, Shuai Ruan wrote:
> On Fri, Aug 07, 2015 at 02:04:51PM +0100, Andrew Cooper wrote:
>> On 07/08/15 09:22, Shuai Ruan wrote:
> void hvm_cpuid(unsigned int input, unsigned int *eax, unsigned int *ebx,
> unsigned int *ecx, unsigned int *ed
>>> On 09.08.15 at 17:45, wrote:
> On Mon, Jul 13, 2015 at 3:37 AM, Jan Beulich wrote:
> On 11.07.15 at 06:52, wrote:
>>> @@ -1162,8 +1176,82 @@ rt_dom_cntl(
>>> }
>>> spin_unlock_irqrestore(&prv->lock, flags);
>>> break;
>>> +case XEN_DOMCTL_SCHEDOP_getvcpuinf
On Thu, 2015-08-06 at 21:55 +0100, Andrew Cooper wrote:
> On 06/08/15 17:45, Ben Catterall wrote:
> > The process to switch into and out of deprivileged mode can be likened
> > to
> > setjmp/longjmp.
> >
> > To enter deprivileged mode, we take a copy of the stack from the
> > guest's
> > registe
On 11/08/15 03:09, Shannon Zhao wrote:
> Hi Julien,
Hi Shannon,
> On 2015/8/7 18:33, Julien Grall wrote:
>> Hi Shannon,
>>
>> Just some clarification questions.
>>
>> On 07/08/15 03:11, Shannon Zhao wrote:
>>> 3. Dom0 gets grant table and event channel irq information
>>>
On 11/08/15 07:08, Bob Liu wrote:
> On 08/10/2015 11:52 PM, Jens Axboe wrote:
>> On 08/10/2015 05:03 AM, Rafal Mielniczuk wrote:
>>> On 01/07/15 04:03, Jens Axboe wrote:
On 06/30/2015 08:21 AM, Marcus Granado wrote:
> Hi,
>
> Our measurements for the multiqueue patch indicate a cle
At 11:14 +0100 on 10 Aug (1439205273), Andrew Cooper wrote:
> On 10/08/15 10:49, Tim Deegan wrote:
> > Hi,
> >
> > At 17:45 +0100 on 06 Aug (1438883118), Ben Catterall wrote:
> >> The process to switch into and out of deprivileged mode can be likened to
> >> setjmp/longjmp.
> >>
> >> To enter depri
On 10/08/15 19:10, Julien Grall wrote:
> The commit ccc9d90a9a8b5c4ad7e9708ec41f75ff9e98d61d "xenbus_client:
> Extend interface to support multi-page ring" removes the call to
> free_xenballooned_pages in xenbus_unmap_ring_vfree_hvm.
>
> This will result to not give back the pages to Linux and loo
>>> On 27.07.15 at 07:48, wrote:
>> > +/*
>> > + * clamp_t - return a value clamped to a given range using a given
>> > +type
>> > + * @type: the type of variable to use
>> > + * @val: current value
>> > + * @lo: minimum allowable value
>> > + * @hi: maximum allowable value
>> > + *
>> > + * This
>>> On 27.07.15 at 11:30, wrote:
> On 24/07/2015 21:54, Jan Beulich wrote:
>> >>> On 25.06.15 at 13:16, wrote:
>> > +int __init intel_pstate_init(void)
>> > +{
>> > + int cpu, rc = 0;
>> > + const struct x86_cpu_id *id;
>> > + struct cpu_defaults *cpu_info;
>> > +
>> > + id = x86_match_cpu(i
>>> On 28.07.15 at 09:34, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Friday, July 24, 2015 11:28 PM
>> >>> On 23.07.15 at 13:35, wrote:
>> > +GET_IREMAP_ENTRY(ir_ctrl->iremap_maddr, remap_index,
>> iremap_entries, p);
>> > +
>> > +old_ire = new_ire = *p;
>> > +
>> > +
On Mon, 2015-08-03 at 11:47 +0100, Ian Campbell wrote:
> After the initial expected logging the file is simply full of:
>
> 2015-08-02 19:12:12 UTC libxl: debug:
> libxl.c:1004:domain_death_xswatch_callback: [evg=0x7f3cc44fa3f0:3] from
> domid=0 nentries=1 rc=1
> 2015-08-02 19:12:12 UTC libxl: d
>>> On 30.07.15 at 20:26, wrote:
> On Thu, 2015-07-30 at 02:04 +, Wu, Feng wrote:
>> > -Original Message-
>> > From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
>> > Since this is one of the differences
>> > between the two, was it the cause of the issues you were seeing? If yes,
On 11/08/15 08:50, Shuai Ruan wrote:
> On Fri, Aug 07, 2015 at 01:44:41PM +0100, Andrew Cooper wrote:
>> On 07/08/15 09:00, Shuai Ruan wrote:
> +goto skip;
> +}
> +
> +if ( !guest_kernel_mode(v, regs) || (regs->edi & 0x3f) )
W
On 2015/8/11 17:46, Julien Grall wrote:
> On 11/08/15 03:09, Shannon Zhao wrote:
>> Hi Julien,
>
> Hi Shannon,
>
>> On 2015/8/7 18:33, Julien Grall wrote:
>>> Hi Shannon,
>>>
>>> Just some clarification questions.
>>>
>>> On 07/08/15 03:11, Shannon Zhao wrote:
3. Dom0 gets grant table and
>>> On 31.07.15 at 18:06, wrote:
> On 07/24/2015 05:41 AM, Jan Beulich wrote:
>> @@ -1693,14 +1703,22 @@ int nvmx_handle_vmclear(struct cpu_user_
>> else
>> {
>> /* Even if this VMCS isn't the current one, we must clear it. */
>> -vvmcs = hvm_map_guest_frame_rw(gpa >>
On 10/08/15 11:07, Tim Deegan wrote:
Hi,
@@ -685,8 +685,17 @@ static int hap_page_fault(struct vcpu *v, unsigned long va,
{
struct domain *d = v->domain;
+/* If we get a page fault whilst in HVM security user mode */
+if( v->user_mode == 1 )
+{
+printk("HVM: #PF (
On 10/08/15 10:49, Tim Deegan wrote:
Hi,
At 17:45 +0100 on 06 Aug (1438883118), Ben Catterall wrote:
The process to switch into and out of deprivileged mode can be likened to
setjmp/longjmp.
To enter deprivileged mode, we take a copy of the stack from the guest's
registers up to the current
On 04/08/15 14:46, George Dunlap wrote:
On Mon, Aug 3, 2015 at 3:34 PM, Ian Campbell wrote:
On Mon, 2015-08-03 at 14:54 +0100, Andrew Cooper wrote:
On 03/08/15 14:35, Ben Catterall wrote:
Hi all,
I am working on an x86 proof-of-concept to evaluate if it is feasible
to move device models an
Hi all
RC1 is going to be tagged this week (maybe today). We need to figure
out when to branch / reopen -unstable for committing and what rules
should be applied until 4.6 is out of the door.
Ian, Ian and I had a conversation IRL. We discussed several things,
but figured it is necessary to have m
Disk snapshot handling depends on disk format. Currently since disk
format is not saved into xenstore, when getting device disk list,
disk->format is LIBXL_DISK_FORMAT_UNKNOWN. Disk snapshot cannot
continue without correct disk format information, so adding code
to save disk format to xenstore so t
Add vm snapshot implementation. Support snapshot-create and
snapshot-revert.
Current Limitations:
About disk snapshot create, there are many cases:
- qdisk, internal, should calls qmp command to do the work.
- qdisk, external, should calls qmp command to do the work, qemu
will replace disk b
Changes to V10:
- several updates to xl design and libxl design to address comments on V10.
- few updates to keep consitent with code implementation
V10:
http://lists.xenproject.org/archives/html/xen-devel/2015-01/msg03071.html
Codes implementation is posted right after.
___
Add domain snapshot create/revert commands implementation.
Since xl is expected to not maintain domain snapshot info itself,
it has no idea about how many snapshots and snapshot related
files and info, xl won't supply snapshot delete command. It'll
depend on users to delete things.
Signed-off-by:
Define libxl_disk_snapshot_type and libxl_disk_snapshot for VM
snapshot usage.
Signed-off-by: Chunyan Liu
---
tools/libxl/libxl_types.idl | 31 +++
tools/libxl/libxl_types_internal.idl | 8
2 files changed, 39 insertions(+)
diff --git a/tools/libxl
1. Introduction
There are several types of snapshots:
disk snapshot
Contents of disks are saved at a given point of time, and can be
restored back to that state.
On a running guest, a disk snapshot is likely to be only
crash-consistent rather than clean (that is, it represe
Add snapshot related APIs for xl, including:
create disk snapshots, revert disk snapshots.
Together with existing memory save/restore APIs, xl can create domain
snapshot and revert from a domain snapshot.
Limitations:
About disk snapshot create, there are many cases:
- qdisk, internal, should ca
Terminology
* Active domain: domain created and started
(also referred as "live")
* Inactive domain: domain created but not started
(also referred as "offline")
* Domain snapshot:
Domain sn
Currently this group of APIs are not used by xl toolstack since xl
doesn't maintain domain snapshot info and so depends on user to
delete things.
But for libvirt, they are very useful since libvirt maintains domain
snapshot info itself and needs these APIs to delete
internal/external disk snapshot
libxl Design
1. New Structures
libxl_disk_snapshot_type = Enumeration("disk_snapshot_type", [
(0, "invalid"),
(1, "internal"),
(2, "external"),
])
libxl_disk_snapshot = Struct("disk_snapshot",[
# target disk
("disk", libxl_device_disk),
# disk snapshot name
("na
Xl doesn't maintain domain snapshot info and has no idea of snapshot
info and related files after creation, so it doesn't supply domain
snapshot delete command. These qmp handlers won't be used by xl.
But for libvirt, it maintains domain snapshot info itself and supplies
snapshot delete commands,
XL Design
1. User Interface
xl snapshot-create:
Create a snapshot (disk and RAM) of a domain.
SYNOPSIS:
snapshot-create [--live] [--internal|--external] [--path=path]
[]
OPTIONS:
-l,--livetake a live snapshot
-i,--internaltake internal disk sna
Add qmp handlers to take disk snapshots. This will be used when
creating a domain snapshots.
Signed-off-by: Chunyan Liu
---
tools/libxl/libxl_internal.h | 4 +++
tools/libxl/libxl_qmp.c | 66
2 files changed, 70 insertions(+)
diff --git a/tools
Applied to for-linus-4.3, thanks.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 10/08/15 14:40, Jason A. Donenfeld wrote:
> It turns out that domU also requires the Xen APIC driver. Otherwise we
> get stuck in busy loops that never exit, such as in this stack trace:
Applied to for-linus-4.2 and tagged for stable, thanks.
David
Wei Liu writes ("[URGENT RFC] Branching and reopening -unstable"):
> Branching should be done at one of the RC tags. It might not be enough
> time for us to reach consensus before tagging RC1, so I would say lets
> branch at RC2 if we don't observe blocker bugs.
>
> Maintainers should be responsib
On Mon, Aug 10, 2015 at 06:35:22PM +0800, Chunyan Liu wrote:
> Signed-off-by: Chunyan Liu
> Signed-off-by: Simon Cao
Acked-by: Wei Liu
>
> ---
> tools/libxl/libxl.c | 4 ++--
> tools/libxl/libxl_internal.h | 3 +++
> 2 files changed, 5 insertions(+), 2 deletions(-)
>
> diff --git a
On Mon, Aug 10, 2015 at 06:35:23PM +0800, Chunyan Liu wrote:
> Sysfs file has size=4096 but actual file content is less than that.
> Current libxl_read_file_contents will treat it as error when file size
> and actual file content differs, so reading sysfs file content with
> this function always fa
On Mon, Aug 10, 2015 at 06:35:24PM +0800, Chunyan Liu wrote:
> Add pvusb APIs, including:
> - attach/detach (create/destroy) virtual usb controller.
> - attach/detach usb device
> - list usb controller and usb devices
> - some other helper functions
>
> Signed-off-by: Chunyan Liu
> Signed-off
On Mon, Aug 10, 2015 at 06:35:28PM +0800, Chunyan Liu wrote:
> Add code to support pvusb in domain config file. One could specify
> usbctrl and usb in domain's configuration file and create domain,
> then usb controllers will be created and usb device would be attached
> to guest automatically.
>
On Mon, 2015-08-03 at 17:01 +0100, Ian Campbell wrote:
> On Fri, 2015-07-24 at 17:28 +0100, Ian Campbell wrote:
> > @@ -191,6 +208,27 @@ create_build_jobs () {
> > revision_ovmf=$REVISION_OVMF
> > done
> >
> > +if [ x$want_prevxen = xy ] ; then
> > +if [ "x$REVIS
tree: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip linux-next
head: 0d26d72cab825a0227c8d8e0e42161125b3116fd
commit: 3ad90fe1671a12522e3360aa4c39094360a10b38 [18/23] xen/PMU: Sysfs
interface for setting Xen PMU mode
reproduce:
# apt-get install sparse
git checkout 3ad90fe1671a1252
Signed-off-by: Fengguang Wu
---
sys-hypervisor.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/xen/sys-hypervisor.c b/drivers/xen/sys-hypervisor.c
index 0907275..b5a7342 100644
--- a/drivers/xen/sys-hypervisor.c
+++ b/drivers/xen/sys-hypervisor.c
@@ -377,7 +377,7
Signed-off-by: Fengguang Wu
---
pmu.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/xen/pmu.c b/arch/x86/xen/pmu.c
index 7218cea..1d1ae1b 100644
--- a/arch/x86/xen/pmu.c
+++ b/arch/x86/xen/pmu.c
@@ -15,7 +15,7 @@
/* Shared page between hypervisor and domain
tree: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip linux-next
head: 0d26d72cab825a0227c8d8e0e42161125b3116fd
commit: 9cd3857a7d89a259870c6ee6994f5ef41511654c [19/23] xen/PMU:
Initialization code for Xen PMU
reproduce:
# apt-get install sparse
git checkout 9cd3857a7d89a259870c6ee69
Signed-off-by: Fengguang Wu
---
pmu.c |4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/xen/pmu.c b/arch/x86/xen/pmu.c
index cbd68dd..2b81722 100644
--- a/arch/x86/xen/pmu.c
+++ b/arch/x86/xen/pmu.c
@@ -208,7 +208,7 @@ bool pmu_msr_write(unsigned int msr, uint32
tree: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip linux-next
head: 0d26d72cab825a0227c8d8e0e42161125b3116fd
commit: 80ef65bb2362fd9eedcb4ec1d41d8a6d0b99dfbb [21/23] xen/PMU: Intercept
PMU-related MSR and APIC accesses
reproduce:
# apt-get install sparse
git checkout 80ef65bb2362f
On Sun, 2015-08-09 at 14:49 +0100, Julien Grall wrote:
> Hi Wei,
>
> On 08/08/2015 16:16, Wei Liu wrote:
> > On Fri, Aug 07, 2015 at 06:27:18PM +0100, Julien Grall wrote:
> > > The firmware directory is not built at all on ARM. Attempting to
> > > update
> > > it using the target subtree-force-up
flight 60648 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60648/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 60637
test-
On Tue, Aug 11, 2015 at 01:22:24PM +0100, Ian Campbell wrote:
> On Sun, 2015-08-09 at 14:49 +0100, Julien Grall wrote:
> > Hi Wei,
> >
> > On 08/08/2015 16:16, Wei Liu wrote:
> > > On Fri, Aug 07, 2015 at 06:27:18PM +0100, Julien Grall wrote:
> > > > The firmware directory is not built at all on A
CCing Hongyang, I missed him when I copy-n-paste emails from MAINTAINERS.
On Tue, Aug 11, 2015 at 11:44:07AM +0100, Wei Liu wrote:
> Hi all
>
> RC1 is going to be tagged this week (maybe today). We need to figure
> out when to branch / reopen -unstable for committing and what rules
> should be ap
> On 11 Aug 2015, at 12:13, Ian Jackson wrote:
>
> Wei Liu writes ("[URGENT RFC] Branching and reopening -unstable"):
>> Branching should be done at one of the RC tags. It might not be enough
>> time for us to reach consensus before tagging RC1, so I would say lets
>> branch at RC2 if we don't o
>>> On 11.08.15 at 12:44, wrote:
> As for bug fixes, here are two options.
>
> Option 1: bug fixes go into -unstable, backport / cherry-pick bug
> fixes back to 4.6. This seems to leave the tree in half frozen status
> because we need to reject refactoring patches in case they cause
> backporting
On Tue, 2015-08-11 at 09:57 +0100, Wei Liu wrote:
> On Fri, Aug 07, 2015 at 06:08:25PM +0200, Roger Pau Monne wrote:
> > This is a simple fix to make sure libxl__build_hvm returns an error
> > code in
> > case of failure.
> >
>
>
>
> > Signed-off-by: Roger Pau Monné
> > Cc: Ian Jackson
> > C
On Mon, 2015-08-10 at 09:00 +0100, Wei Liu wrote:
> There were two problems with original code:
>
> 1. sd_booted() was used to determined if the process was started by
>systemd, which was wrong.
> 2. Exit with error if pidfile was specified, which was too harsh.
>
> These two combined made cx
On Tue, Aug 11, 2015 at 01:44:45PM +0100, Ian Campbell wrote:
> On Tue, 2015-08-11 at 09:57 +0100, Wei Liu wrote:
> > On Fri, Aug 07, 2015 at 06:08:25PM +0200, Roger Pau Monne wrote:
> > > This is a simple fix to make sure libxl__build_hvm returns an error
> > > code in
> > > case of failure.
> >
On Fri, 2015-08-07 at 22:45 +0100, Wei Liu wrote:
> On Fri, Aug 07, 2015 at 07:53:55PM +0100, Julien Grall wrote:
> > The grants are based on the Xen granularity (i.e 4KB). While the
> > function
> > to map grants for Linux (linux_gnttab_grant_map) is using the correct
> > size (XC_PAGE_SIZE), the
On Tue, 2015-08-11 at 12:13 +0100, Ian Jackson wrote:
> Wei Liu writes ("[URGENT RFC] Branching and reopening -unstable"):
> > Branching should be done at one of the RC tags. It might not be enough
> > time for us to reach consensus before tagging RC1, so I would say lets
> > branch at RC2 if we do
Ian Campbell writes ("Re: OSSTEST -- nested test case development, RFC:
ts-guest-destroy doesn't call guest_await_dhcp_tcp() if guest has fixed IP"):
> However by reconfiguring things to be static the L1 host will no longer be
> generating DHCP RENEW requests when the lease times out, so the DHCP
On 11/08/15 12:13, Ian Jackson wrote:
> Wei Liu writes ("[URGENT RFC] Branching and reopening -unstable"):
>> Branching should be done at one of the RC tags. It might not be enough
>> time for us to reach consensus before tagging RC1, so I would say lets
>> branch at RC2 if we don't observe blocker
On Tue, 11 Aug 2015, Wei Liu wrote:
> Hi all
>
> RC1 is going to be tagged this week (maybe today). We need to figure
> out when to branch / reopen -unstable for committing and what rules
> should be applied until 4.6 is out of the door.
>
> Ian, Ian and I had a conversation IRL. We discussed sev
On Tue, 11 Aug 2015, Ian Jackson wrote:
> Wei Liu writes ("[URGENT RFC] Branching and reopening -unstable"):
> > Branching should be done at one of the RC tags. It might not be enough
> > time for us to reach consensus before tagging RC1, so I would say lets
> > branch at RC2 if we don't observe bl
On Tue, 2015-08-11 at 13:55 +0100, Andrew Cooper wrote:
> On 11/08/15 12:13, Ian Jackson wrote:
> > Wei Liu writes ("[URGENT RFC] Branching and reopening -unstable"):
> > > Branching should be done at one of the RC tags. It might not be
> > > enough
> > > time for us to reach consensus before tagg
Please avoid committing anything just now. We need the push gate
clear for a patch to update the tools library sonames, which is needed
for rc1.
Thanks,
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
In 25652f23 ("tools/libxl: detect and avoid conflicts with RDM"), new
code was added to use rc to store libxl function call return value,
which complied to libxl coding style. That patch, however, didn't change
other locations where return value was stored in ret. In the end
libxl__build_hvm could
>>> On 27.07.15 at 13:09, wrote:
> At 13:02 +0100 on 24 Jul (1437742964), Andrew Cooper wrote:
>> On 24/07/15 10:41, Jan Beulich wrote:
>> > Beyond that log-dirty handling in _hvm_map_guest_frame() looks bogus
>> > too: What if a XEN_DOMCTL_SHADOW_OP_* gets issued and acted upon
>> > between the s
>>> On 27.07.15 at 13:11, wrote:
> From: Vijaya Kumar K
>
> bitmap_find_next_zero_area helper function will be used
> by physical ITS driver. This is imported from linux 4.2
>
> Signed-off-by: Vijaya Kumar K
Acked-by: Jan Beulich
___
Xen-devel ma
On Tue, 2015-08-11 at 14:48 +0100, Wei Liu wrote:
> In 25652f23 ("tools/libxl: detect and avoid conflicts with RDM"), new
> code was added to use rc to store libxl function call return value,
> which complied to libxl coding style. That patch, however, didn't change
> other locations where return v
On Tue, Aug 11, 2015 at 02:55:41PM +0100, Ian Campbell wrote:
> On Tue, 2015-08-11 at 14:48 +0100, Wei Liu wrote:
> > In 25652f23 ("tools/libxl: detect and avoid conflicts with RDM"), new
> > code was added to use rc to store libxl function call return value,
> > which complied to libxl coding styl
>>> On 27.07.15 at 21:20, wrote:
> --- a/xen/include/xen/compile.h.in
> +++ b/xen/include/xen/compile.h.in
> @@ -10,4 +10,5 @@
> #define XEN_EXTRAVERSION "@@extraversion@@"
>
> #define XEN_CHANGESET"@@changeset@@"
> +#define XEN_BUILD_ID"@@changeset@@"
How can the
This is the result of me going through the relevant (pre-tagging) part
of the release checklist.
The qemu tags referred to have just been created.
Thanks,
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Update libxc to 4.6.
Update libxl to 4.6.
I did
git-grep 'MAJOR.*='
and also to check I had everything
git-grep 'SONAME_LDFLAG' | egrep -v 'MAJOR' |less
The other, un-updated, libraries are:
blktap2 (control, libvhd) 1.0 in-tree users only, no ABI changes
libfsimage1.0 no ABI ch
* Change README to say `Xen 4.6-rc'
* Change XEN_EXTRAVERSION so that we are `4.6.0-rc'
Note that the RC number (eg, 1 for rc1) is not in the version string,
so that we do not need to update this again when we cut the next RC.
Signed-off-by: Ian Jackson
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
(We will not necessarily bump this tag number for future RCs, unless
something has changed in qemu-xen-traditional.)
Signed-off-by: Ian Jackson
CC: Wei Liu
---
Config.mk |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index e9a7097..d8b650e 100644
When we make RC1 we arrange to get a specific version of
qemu-xen-upstream.
Signed-off-by: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
---
Config.mk |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index d8b650e..75b49a3 100644
--- a/Config.mk
+++
>>> On 05.08.15 at 16:09, wrote:
> Todo:
> * Should be moved to sysctl to only allow Dom0 access
Because of?
> * Maybe convert to binary transport to userland instead of printable form
Indeed.
> @@ -360,11 +366,30 @@ DO(xen_version)(int cmd, XEN_GUEST_HANDLE_PARAM(void)
> arg)
>
>
On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
>
[...]
> 3. Dom0 gets grant table and event channel irq information
> ---
> As said above, we assign the hypervisor_id be "XenVMM" to tell Dom0 that
> it runs on Xen hypervisor.
>
> For
On Tue, Aug 11, 2015 at 03:09:17PM +0100, Ian Jackson wrote:
> Update libxc to 4.6.
> Update libxl to 4.6.
>
> I did
> git-grep 'MAJOR.*='
> and also to check I had everything
> git-grep 'SONAME_LDFLAG' | egrep -v 'MAJOR' |less
>
> The other, un-updated, libraries are:
> blktap2 (control, l
On Tue, Aug 11, 2015 at 03:09:19PM +0100, Ian Jackson wrote:
> (We will not necessarily bump this tag number for future RCs, unless
> something has changed in qemu-xen-traditional.)
>
> Signed-off-by: Ian Jackson
> CC: Wei Liu
Acked-by: Wei Liu
> ---
> Config.mk |3 ++-
> 1 file changed,
On Tue, Aug 11, 2015 at 03:09:18PM +0100, Ian Jackson wrote:
> * Change README to say `Xen 4.6-rc'
> * Change XEN_EXTRAVERSION so that we are `4.6.0-rc'
>
> Note that the RC number (eg, 1 for rc1) is not in the version string,
> so that we do not need to update this again when we cut the next RC.
On Tue, Aug 11, 2015 at 03:09:20PM +0100, Ian Jackson wrote:
> When we make RC1 we arrange to get a specific version of
> qemu-xen-upstream.
>
> Signed-off-by: Ian Jackson
> CC: Wei Liu
> CC: Stefano Stabellini
Acked-by: Wei Liu
> ---
> Config.mk |2 +-
> 1 file changed, 1 insertion(+),
>>> On 31.07.15 at 17:46, wrote:
> On Thu, Jul 30, 2015 at 09:47:40AM -0700, Johannes Erdfelt wrote:
>> On Mon, Jul 27, 2015, Konrad Rzeszutek Wilk wrote:
>> > +struct xsplice_reloc_howto {
>> > +uint32_thowto; /* XSPLICE_HOWTO_* */
>> > +uint32_tflag; /* XSPLICE_HOWTO_FLAG_*
1 - 100 of 213 matches
Mail list logo