On 1/22/2016 7:43 PM, Jan Beulich wrote:
On 22.01.16 at 04:20, wrote:
@@ -2601,6 +2605,16 @@ struct hvm_ioreq_server *hvm_select_ioreq_server(struct
domain *d,
type = (p->type == IOREQ_TYPE_PIO) ?
HVMOP_IO_RANGE_PORT : HVMOP_IO_RANGE_MEMORY;
addr = p->ad
On 01/26/2016 03:41 AM, Konrad Rzeszutek Wilk wrote:
> On Wed, Dec 30, 2015 at 10:29:02AM +0800, Wen Congyang wrote:
>> In COLO mode, both VMs are running, and are considered in sync if the
>> visible network traffic is identical. After some time, they fall out of
>> sync.
>>
>> At this point, the
On 01/26/2016 03:43 AM, Konrad Rzeszutek Wilk wrote:
> On Thu, Dec 17, 2015 at 03:48:18PM +0800, Wen Congyang wrote:
>> From: Yang Hongyang
>>
>> The error code ERROR_REMUS_XXX was introduced in Xen 4.5, and
>> changed to ERROR_CHECKPOINT_XXX after previous renaming.
>> The patch fix the backword
On 01/26/2016 03:55 AM, Konrad Rzeszutek Wilk wrote:
> On Wed, Dec 30, 2015 at 10:29:06AM +0800, Wen Congyang wrote:
>> Checkpoint device is an abstract layer to do checkpoint.
>> COLO can also use it to do checkpoint. But there are
>> still some codes in checkpoint device which touch remus.
>>
>>
On Mon, 2016-01-25 at 08:25 -0700, Jan Beulich wrote:
> > > > On 19.01.16 at 08:30, wrote:
> > Changes in v6:
> > *2 patches merged are not included.
> > *Don't write XSTATE_PKRU to PV's xcr0.
> > *Use "if()" instead of "?:" in cpuid handling patch.
> > *Update read_pkru function.
> > *Use value 4
On 2016/1/26 0:44, Stefano Stabellini wrote:
> On Sat, 23 Jan 2016, Shannon Zhao wrote:
>> > From: Shannon Zhao
>> >
>> > Move x86 specific codes to architecture directory and export those EFI
>> > runtime service functions. This will be useful for initializing runtime
>> > service on ARM later
On Tue, 2016-01-26 at 00:00 +, Andrew Cooper wrote:
> On 25/01/2016 20:36, Konrad Rzeszutek Wilk wrote:
> > On Wed, Dec 30, 2015 at 11:00:52AM +, Andrew Cooper wrote:
> > > On 30/12/2015 05:25, Wen Congyang wrote:
> > > > On 12/30/2015 12:11 PM, Doug Goldstein wrote:
> > > > > On 12/29/15 8
On Mon, 2016-01-25 at 12:36 -0500, Boris Ostrovsky wrote:
> On 01/25/2016 12:22 PM, Ian Jackson wrote:
> > Ian Campbell writes ("[PATCH 2/2] tools: avoid redefinining
> > xenevtchn_handle typedef for xc_suspend_*"):
> > > Similar to the previous xentoollog case this is not allowed. Switch
> > > to
On Mon, Jan 25, 2016 at 10:12:11PM -0800, Paul E. McKenney wrote:
> On Mon, Jan 25, 2016 at 06:02:34PM +, Will Deacon wrote:
> > Thanks for having a go at this. I tried defining something axiomatically,
> > but got stuck pretty quickly. In my scheme, I used "data-directed
> > transitivity" ins
On Mon, Jan 25, 2016 at 10:03:22PM -0800, Paul E. McKenney wrote:
> On Mon, Jan 25, 2016 at 04:42:43PM +, Will Deacon wrote:
> > On Fri, Jan 15, 2016 at 01:58:53PM -0800, Paul E. McKenney wrote:
> > > On Fri, Jan 15, 2016 at 10:27:14PM +0100, Peter Zijlstra wrote:
> > > > Yes, that seems a goo
On Thu, Jan 14, 2016 at 02:20:46PM -0800, Paul E. McKenney wrote:
> On Thu, Jan 14, 2016 at 01:24:34PM -0800, Leonid Yegoshin wrote:
> > On 01/14/2016 12:48 PM, Paul E. McKenney wrote:
> > >
> > >So SYNC_RMB is intended to implement smp_rmb(), correct?
> > Yes.
> > >
> > >You could use SYNC_ACQUIRE
On 2016/1/25 22:35, Jan Beulich wrote:
On 23.01.16 at 09:00, wrote:
>> > --- a/xen/include/xen/config.h
>> > +++ b/xen/include/xen/config.h
>> > @@ -7,7 +7,7 @@
>> > #ifndef __XEN_CONFIG_H__
>> > #define __XEN_CONFIG_H__
>> >
>> > -#include
>> > +#include
> Why? I don't see why all so
On 01/25/2016 08:26 PM, Konrad Rzeszutek Wilk wrote:
>> +if ( clocksource_is_tsc )
>> +{
>> +plt_init();
>> +}
>> +else
>> +{
>> +plt_overflow_period = scale_delta(
>> +1ull << (pts->counter_bits-1), &plt_scale);
>> +init_timer(&plt_overflow
On 01/25/2016 08:11 PM, Konrad Rzeszutek Wilk wrote:
> On Mon, Dec 28, 2015 at 04:59:40PM +, Joao Martins wrote:
>> This field has two possible flags (as of latest pvclock ABI
>> shared with KVM).
>
>
>
> Wish they had CC-ed xen-devel instead of just doing their
> change
Indeed, Andrew was
On Tue, Jan 26, 2016 at 11:24:02AM +0100, Peter Zijlstra wrote:
> Yeah, this goes under the header: memory-barriers.txt is _NOT_ a
> specification (I seem to keep repeating this).
Do we want this ?
---
Documentation/memory-barriers.txt | 17 +
1 file changed, 17 insertions(+)
d
>>> On 25.01.16 at 22:49, wrote:
> The case is 1) disabling iommu for IGD, unilaterally since i915 + gm45
> doesn't play well together. Iommu is still desired to isolate usb and
> network devices, so we don't want to disable iommu completely. The side
> effect of this would be to have IGD only for
Hi,
while playing around with xen-4.6 I stumbled over an odd problem and am
wondering whether anybody has seen the same. A method to relatively quickly
reproduce this for me seems to:
- Start one domU (PV or HVM does not seem to matter)
- Repeatedly call xenstore-ls a few times
I think I never g
>>> On 26.01.16 at 08:32, wrote:
> On 1/22/2016 4:01 PM, Jan Beulich wrote:
> On 22.01.16 at 04:20, wrote:
>>> --- a/xen/arch/x86/hvm/hvm.c
>>> +++ b/xen/arch/x86/hvm/hvm.c
>>> @@ -940,6 +940,10 @@ static int hvm_ioreq_server_alloc_rangesets(struct
>>> hvm_ioreq_server *s,
>>> {
>>> u
On Sat, 2016-01-09 at 00:33 +, osstest service owner wrote:
According to http://logs.test-lab.xenproject.org/osstest/results/all-branch
-statuses.txt the ovmf push gate has been broken for a while (48 days).
The bisector seems to have fingered the commit below (there are some other
intermitte
On Tue, Jan 26, 2016 at 11:32:00AM +0100, Peter Zijlstra wrote:
> On Tue, Jan 26, 2016 at 11:24:02AM +0100, Peter Zijlstra wrote:
>
> > Yeah, this goes under the header: memory-barriers.txt is _NOT_ a
> > specification (I seem to keep repeating this).
>
> Do we want this ?
>
> ---
> Documentati
On 22/01/16 03:20, Yu Zhang wrote:
> --- a/docs/man/xl.cfg.pod.5
> +++ b/docs/man/xl.cfg.pod.5
> @@ -962,6 +962,24 @@ FIFO-based event channel ABI support up to 131,071 event
> channels.
> Other guests are limited to 4095 (64-bit x86 and ARM) or 1023 (32-bit
> x86).
>
> +=item B
> +
> +Limit t
On 22/01/16 16:54, Elena Ufimtseva wrote:
> Hello all!
>
> Dario, Gerorge or anyone else, your help will be appreciated.
>
> Let me put some intro to our findings. I may forget something or put something
> not too explicit, please ask me.
>
> Customer filled a bug where some of the applications
>>> On 26.01.16 at 08:59, wrote:
>
> On 1/22/2016 7:43 PM, Jan Beulich wrote:
> On 22.01.16 at 04:20, wrote:
>>> @@ -2601,6 +2605,16 @@ struct hvm_ioreq_server
> *hvm_select_ioreq_server(struct domain *d,
>>> type = (p->type == IOREQ_TYPE_PIO) ?
>>> HVMOP_IO_RAN
On Tue, 26 Jan 2016, Shannon Zhao wrote:
> On 2016/1/26 0:44, Stefano Stabellini wrote:
> > On Sat, 23 Jan 2016, Shannon Zhao wrote:
> >> > From: Shannon Zhao
> >> >
> >> > Move x86 specific codes to architecture directory and export those EFI
> >> > runtime service functions. This will be useful
(re-adding xen-devel)
>>> On 26.01.16 at 12:28, wrote:
> Iommu=0 let the whole Qubes system work, without enforcing hardware
> compartimentalisation (iommu is enforced in software mode)
>
> When iommu=no-igfx is enforced, shell console boot up works flawlessly. All
> domu machines get booted up.
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Add a new function to parse DT parameters for Xen specific UEFI just
> like the way for normal UEFI. Then it could reuse the existing codes.
>
> If Xen supports EFI, initialize runtime services.
>
> Signed-off-by: Shannon Zhao
flight 78997 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/78997/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 8 leak-check/basis(8) fail REGR. vs. 78857
Regressions which are
On Thu, Jan 21, 2016 at 2:52 PM, Jan Beulich wrote:
On 21.01.16 at 15:01, wrote:
>> On 01/21/16 03:25, Jan Beulich wrote:
>>> >>> On 21.01.16 at 10:10, wrote:
>>> > b) some _DSMs control PMEM so you should filter out these kind of _DSMs
>>> > and
>>> > handle them in hypervisor.
>>>
>>
When __p2m_get_mem_access gets called, the p2m lock is already taken
by either get_page_from_gva or p2m_get_mem_access.
Possible code paths:
1) -> get_page_from_gva
-> p2m_mem_access_check_and_get_page
-> __p2m_get_mem_access
2) -> p2m_get_mem_acce
On Mon, 2016-01-25 at 17:04 -0500, Tianyang Chen wrote:
> I have removed some of the Ccs so they won't get bothered as we
> discussed previously.
>
Yeah... I said you should have done that in the first place, and then
Cc-ed them myself! Sorry... :-P
> On 1/25/2016 4:00 AM, Dario Faggioli wrote:
Only dom0 talks directly to the i915 driver, other appvm being pv, which is
why I put in question the complete deactivation of IGD by iommu=no-igfx.
Is there anything I can provide to troubleshoot?
Le mar. 26 janv. 2016 06:37, Jan Beulich a écrit :
> (re-adding xen-devel)
>
> >>> On 26.01.16 at
On Mon, 2016-01-25 at 06:42 -0700, Jan Beulich wrote:
> > > > On 21.01.16 at 16:14, wrote:
> > On Wed, 2016-01-20 at 03:06 -0700, Jan Beulich wrote:
> > > But of course another question then is why the XRSTORS faults
> > > in the first place. I guess we'll need a debugging patch to dump
> > > the
On 22/01/16 14:27, Ian Campbell wrote:
> gcc-6 adds -Wmisleading-indentation which found these issues.
>
> xenalyze.c: In function 'weighted_percentile':
> xenalyze.c:2136:18: error: statement is indented as if it were guarded by...
> [-Werror=misleading-indentation]
> L=I; L_weight
On 22/01/16 14:27, Ian Campbell wrote:
> gcc-6 complains:
> xenalyze.c:4132:9: error: 'cr3_compare_total' defined but not used
> [-Werror=unused-function]
> int cr3_compare_total(const void *_a, const void *_b) {
> ^
>
> I believe it is correct.
>
> Signed-off-by: I
On Mon, Jan 25, 2016 at 05:06:46PM -0800, Paul E. McKenney wrote:
> On Mon, Jan 25, 2016 at 02:41:34PM +, Will Deacon wrote:
> > On Fri, Jan 15, 2016 at 11:28:45AM -0800, Paul E. McKenney wrote:
> > > On Fri, Jan 15, 2016 at 09:54:01AM -0800, Paul E. McKenney wrote:
> > > > On Fri, Jan 15, 2016
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Sometimes it needs to check if there is a node in FDT by full path.
> Introduce this helper to get the specified name subnode if it exists.
>
> Signed-off-by: Shannon Zhao
> ---
> CC: Rob Herring
> ---
> drivers/of/fdt.c
On Mon, Jan 25, 2016 at 10:03:22PM -0800, Paul E. McKenney wrote:
> On Mon, Jan 25, 2016 at 04:42:43PM +, Will Deacon wrote:
> > On Fri, Jan 15, 2016 at 01:58:53PM -0800, Paul E. McKenney wrote:
> > > PPC Overlapping Group-B sets version 4
> > > ""
> > > (* When the Group-B sets from two differ
On Sat, 23 Jan, at 11:19:44AM, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Add a new function to parse DT parameters for Xen specific UEFI just
> like the way for normal UEFI. Then it could reuse the existing codes.
>
> If Xen supports EFI, initialize runtime services.
>
> Signed-off-by: Shann
On 2016/1/26 19:31, Stefano Stabellini wrote:
> On Tue, 26 Jan 2016, Shannon Zhao wrote:
>> > On 2016/1/26 0:44, Stefano Stabellini wrote:
>>> > > On Sat, 23 Jan 2016, Shannon Zhao wrote:
> > >> > From: Shannon Zhao
> > >> >
> > >> > Move x86 specific codes to architecture directory
>>> On 26.01.16 at 12:57, wrote:
> Only dom0 talks directly to the i915 driver, other appvm being pv, which is
> why I put in question the complete deactivation of IGD by iommu=no-igfx.
>
> Is there anything I can provide to troubleshoot?
Hard to tell. The VT-d maintainers may be able to give yo
On 2016/1/26 20:11, Stefano Stabellini wrote:
> On Sat, 23 Jan 2016, Shannon Zhao wrote:
>> > From: Shannon Zhao
>> >
>> > Sometimes it needs to check if there is a node in FDT by full path.
>> > Introduce this helper to get the specified name subnode if it exists.
>> >
>> > Signed-off-by: Sha
>>> On 26.01.16 at 12:44, wrote:
> On Thu, Jan 21, 2016 at 2:52 PM, Jan Beulich wrote:
> On 21.01.16 at 15:01, wrote:
>>> On 01/21/16 03:25, Jan Beulich wrote:
>>> On 21.01.16 at 10:10, wrote:
> c) hypervisor should mange PMEM resource pool and partition it to
> multiple
>>>
Hi guys,
I tried the patch and I am very happy to inform you
all that the patch has solved my problem. Now I am
able to boot Xen without disabling XSAVE. I have
full log of boot at http://paste2.org/gVW0Z9nm (if
any one is interested. also "XXX Hello, this is my
first mod :)" is printed by my mod,
On 26/01/16 13:44, Jan Beulich wrote:
On 26.01.16 at 12:44, wrote:
>> On Thu, Jan 21, 2016 at 2:52 PM, Jan Beulich wrote:
>> On 21.01.16 at 15:01, wrote:
On 01/21/16 03:25, Jan Beulich wrote:
On 21.01.16 at 10:10, wrote:
>> c) hypervisor should mange PMEM resource poo
>>> On 26.01.16 at 02:34, wrote:
> There are some problems when msi guest_masked is set to 1 by default.
> When guest os is windows 2008 r2 server,
> the device(eg X540-AT2 vf) is not initialized correctly.
> Host will always receive message like this :"VF Reset msg received from vf".
> Guest has
flight 79008 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79008/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail REGR. vs. 66399
test-armhf-armhf-xl-xsm
The patch as I already said is letting me boot
into the Xen, but the system is now resetting
stating XSAVE as the cause. I have attached
links to two cases where system was reset as
the result. I don't think that problem is fully
solved yet.
http://paste2.org/Ky56Z92g
http://paste2.org/3hcbG6L7
Re
>>> On 26.01.16 at 13:51, wrote:
> I tried the patch and I am very happy to inform you
> all that the patch has solved my problem. Now I am
> able to boot Xen without disabling XSAVE. I have
> full log of boot at http://paste2.org/gVW0Z9nm (if
> any one is interested. also "XXX Hello, this is my
>
>>> On 26.01.16 at 14:13, wrote:
> The patch as I already said is letting me boot
> into the Xen, but the system is now resetting
> stating XSAVE as the cause. I have attached
> links to two cases where system was reset as
> the result. I don't think that problem is fully
> solved yet.
> http://pa
> On January 25, 2016 at 10:09pm, wrote:
> >>> On 22.01.16 at 16:57, wrote:
> >> On January 22, 2016 at 12:31am, wrote:
> >> >>> On 21.01.16 at 17:16, wrote:
> >> >> On January 20, 2016 at 7:29 pm, wrote:
> >> >> >>> On 20.01.16 at 11:26, wrote:
> >> >> >> On January 15, 2016 at 9:10, wro
On 26/01/16 12:44, Jan Beulich wrote:
On 26.01.16 at 12:44, wrote:
>> On Thu, Jan 21, 2016 at 2:52 PM, Jan Beulich wrote:
>> On 21.01.16 at 15:01, wrote:
On 01/21/16 03:25, Jan Beulich wrote:
On 21.01.16 at 10:10, wrote:
>> c) hypervisor should mange PMEM resource poo
>>> On 26.01.16 at 14:47, wrote:
> As you mentioned , I simply need to consult the bitmap along with the domain
> ID array.
>
> +If ( test_bit(did, iommu->domid_bitmap) && iommu->domid_map[did] >= 0 )
> + d = rcu_lock_domain_by_id(iommu->domid_map[did]);
>
> Is it right now?
Mostly, except t
On Mon, 2016-01-25 at 18:00 -0500, Meng Xu wrote:
> On Mon, Jan 25, 2016 at 5:04 PM, Tianyang Chen
> wrote:
> > I have removed some of the Ccs so they won't get bothered as we
> > discussed
> > previously.
> >
> > On 1/25/2016 4:00 AM, Dario Faggioli wrote:
> > >
> > > On Thu, 2015-12-31 at 05:2
On Tue, Jan 26, 2016 at 03:04:39PM +0800, Wen Congyang wrote:
> On 01/26/2016 02:59 AM, Konrad Rzeszutek Wilk wrote:
> > On Wed, Dec 30, 2015 at 10:28:59AM +0800, Wen Congyang wrote:
> >> Secondary vm is running in colo mode, we need to send
> >> secondary vm's dirty page information to master at c
> > Or is that suppose to be done in another patch? If so you may want to
> > mention that in the commit description?
>
> Do you mean where is the code that uses back_fd? It is in another series:
> http://lists.xenproject.org/archives/html/xen-devel/2015-12/msg02904.html
Ah right that big patchse
Hi,
At 15:30 +0800 on 19 Jan (1453217458), Huaitong Han wrote:
> At the moment, the pfec argument to gva_to_gfn has two functions:
>
> * To inform guest_walk what kind of access is happenind
>
> * As a value to pass back into the guest in the event of a fault.
>
> Unfortunately this is not quit
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 21 January 2016 15:46
> To: Ian Campbell
> Cc: Paul Durrant; xen-de...@lists.xenproject.org; Ian Jackson; Jan Beulich;
> Keir (Xen.org); Tim (Xen.org); Wei Liu; Roger Pau Monne
> Subject: Re: [PATCH] public/io/netif.h
Shuai,
originally I only meant to inquire about the state of the promised
alternatives improvement to the XSAVE code. However, while
looking over the code in question again I stumbled across a
separate issue: XSAVES, just like XSAVEOPT, may use the
"modified" optimization. However, the fcs and fds
On Tue, Jan 26, 2016 at 10:23:52AM +0800, Wen Congyang wrote:
> On 01/26/2016 01:29 AM, Konrad Rzeszutek Wilk wrote:
> > .snip..
> >> --- a/tools/libxl/libxl_dom_suspend.c
> >> +++ b/tools/libxl/libxl_dom_suspend.c
> >> @@ -19,14 +19,71 @@
> >>
> >> /*== Domain suspend ==
Hi Will,
On Tue, Jan 26, 2016 at 12:16:09PM +, Will Deacon wrote:
> On Mon, Jan 25, 2016 at 10:03:22PM -0800, Paul E. McKenney wrote:
> > On Mon, Jan 25, 2016 at 04:42:43PM +, Will Deacon wrote:
> > > On Fri, Jan 15, 2016 at 01:58:53PM -0800, Paul E. McKenney wrote:
> > > > PPC Overlapping
> Last year at Linux Plumbers Conference I attended a session dedicated
> to NVDIMM support. I asked the very same question and the INTEL guy
> there told me there is indeed something like a partition table meant
> to describe the layout of the memory areas and their contents.
It is described in d
A user reported[0] that xl create failed with just:
libxl: error: libxl_create.c:892:initiate_domain_create: Unable to set
domain build info defaults
and some resulting fallout, but without indicating why it was unable
to set the defaults, even in verbose mode[1].
Go through libxl__domain_{cr
On Tue, Jan 26, 2016 at 01:58:35PM +, George Dunlap wrote:
> On 26/01/16 12:44, Jan Beulich wrote:
> On 26.01.16 at 12:44, wrote:
> >> On Thu, Jan 21, 2016 at 2:52 PM, Jan Beulich wrote:
> >> On 21.01.16 at 15:01, wrote:
> On 01/21/16 03:25, Jan Beulich wrote:
> On 21.
> >> +/* Remus stuff */
> >
> > /sRemus stuff//
>
> Do you mean remove this line?
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, Jan 26, 2016 at 02:17:08PM +0800, Wen Congyang wrote:
> On 01/26/2016 02:41 AM, Konrad Rzeszutek Wilk wrote:
> > On Thu, Dec 17, 2015 at 03:48:12PM +0800, Wen Congyang wrote:
> >> From: Yang Hongyang
> >>
> >> In normal migration, the qemu state was passed to qemu as a parameter.
> >
> >
>>> On 26.01.16 at 15:33, wrote:
> originally I only meant to inquire about the state of the promised
> alternatives improvement to the XSAVE code. However, while
> looking over the code in question again I stumbled across a
> separate issue: XSAVES, just like XSAVEOPT, may use the
> "modified" op
> On January 26, 2016 at 10:00pm, wrote:
> >>> On 26.01.16 at 14:47, wrote:
> > As you mentioned , I simply need to consult the bitmap along with the
> > domain ID array.
> >
> > +If ( test_bit(did, iommu->domid_bitmap) && iommu->domid_map[did] >= 0 )
> > + d = rcu_lock_domain_by_id(iommu->domi
On 01/26/16 05:44, Jan Beulich wrote:
> >>> On 26.01.16 at 12:44, wrote:
> > On Thu, Jan 21, 2016 at 2:52 PM, Jan Beulich wrote:
> > On 21.01.16 at 15:01, wrote:
> >>> On 01/21/16 03:25, Jan Beulich wrote:
> >>> On 21.01.16 at 10:10, wrote:
> > c) hypervisor should mange PMEM reso
This run is configured for baseline tests only.
flight 38702 linux-3.10 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38702/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm
On 01/26/16 23:30, Haozhong Zhang wrote:
> On 01/26/16 05:44, Jan Beulich wrote:
> > >>> On 26.01.16 at 12:44, wrote:
> > > On Thu, Jan 21, 2016 at 2:52 PM, Jan Beulich wrote:
> > > On 21.01.16 at 15:01, wrote:
> > >>> On 01/21/16 03:25, Jan Beulich wrote:
> > >>> On 21.01.16 at 10:10,
>>> On 26.01.16 at 15:44, wrote:
>> Last year at Linux Plumbers Conference I attended a session dedicated
>> to NVDIMM support. I asked the very same question and the INTEL guy
>> there told me there is indeed something like a partition table meant
>> to describe the layout of the memory areas an
From: Ian Campbell
In Xen 4.7 we are refactoring parts libxenctrl into a number of
separate libraries which will provide backward and forward API and ABI
compatiblity.
One such library will be libxengnttab which provides access to grant
tables.
In preparation for this switch the compatibility l
From: Ian Campbell
All of the work in con_disconnect applies to the primary console case
(when xendev->dev is NULL). Therefore remove the early check and bail
and allow it to fall through. All of the existing code is correctly
conditional already.
The ->dev and ->gnttabdev handles are either bot
From: Ian Campbell
Until the previous patch this relied on xc_fd(), which was only
implemented for Xen 4.0 and earlier.
Given this wasn't working since Xen 4.0 I have marked this as disabled
by default.
Removing this support drops the use of a bunch of symbols from
libxenctrl, specifically:
From: Ian Campbell
In Xen 4.7 we are refactoring parts libxenctrl into a number of
separate libraries which will provide backward and forward API and ABI
compatiblity.
Specifically libxenevtchn, libxengnttab and libxenforeignmemory.
Previous patches have already laid the groundwork for using th
From: Ian Campbell
In Xen 4.7 we are refactoring parts libxenctrl into a number of
separate libraries which will provide backward and forward API and ABI
compatiblity.
One such library will be libxenevtchn which provides access to event
channels.
In preparation for this switch the compatibility
t tags/xen-20160126
for you to fetch changes up to f4297d663d92844f87aeb6ea762244167490dadb:
xen: make it possible to build without the Xen PV domain builder (2016-01-26
15:03:38 +)
Xen
From: Ian Campbell
In Xen 4.7 we are refactoring parts libxenctrl into a number of
separate libraries which will provide backward and forward API and ABI
compatiblity.
One such library will be libxenforeignmemory which provides access to
privileged foreign mappings and which will provide an inte
From: Ian Campbell
Using an existing libxenctrl handle after a fork was never
particularly safe (especially if foreign mappings existed at the time
of the fork) and the xc fd has been unavailable for many releases.
Reopen the handle after fork and therefore do away with xc_fd().
Signed-off-by:
>>> On 26.01.16 at 16:27, wrote:
>> On January 26, 2016 at 10:00pm, wrote:
>> >>> On 26.01.16 at 14:47, wrote:
>> > As you mentioned , I simply need to consult the bitmap along with the
>> > domain ID array.
>> >
>> > +If ( test_bit(did, iommu->domid_bitmap) && iommu->domid_map[did] >= 0 )
>> >
On 01/26/16 08:37, Jan Beulich wrote:
> >>> On 26.01.16 at 15:44, wrote:
> >> Last year at Linux Plumbers Conference I attended a session dedicated
> >> to NVDIMM support. I asked the very same question and the INTEL guy
> >> there told me there is indeed something like a partition table meant
>
From: Ian Campbell
In Xen 4.7 we are refactoring parts libxenctrl into a number of
separate libraries which will provide backward and forward API and ABI
compatiblity.
One such library will be libxenforeignmemory which provides access to
privileged foreign mappings and which will provide an inte
>>> On 26.01.16 at 16:30, wrote:
> On 01/26/16 05:44, Jan Beulich wrote:
>> Interesting. This isn't the usage model I have been thinking about
>> so far. Having just gone back to the original 0/4 mail, I'm afraid
>> we're really left guessing, and you guessed differently than I did.
>> My understa
On Tue, Jan 19, Chunyan Liu wrote:
> +++ b/tools/libxl/libxl.c
> @@ -3204,7 +3204,7 @@ void
> libxl__device_disk_local_initiate_detach(libxl__egc *egc,
> aodev->dev = device;
> aodev->callback = local_device_detach_cb;
> aodev->force = 0;
> -libxl__initiate_devi
On Tue, 2016-01-26 at 13:46 +0200, Corneliu ZUZU wrote:
> When __p2m_get_mem_access gets called, the p2m lock is already taken
> by either get_page_from_gva or p2m_get_mem_access.
>
> Possible code paths:
> 1)-> get_page_from_gva
> -> p2m_mem_access_check_and_get_page
>
On Tue, 2016-01-26 at 15:02 +0800, Yang Hongyang wrote:
>
> On 01/26/2016 02:48 PM, Wen Congyang wrote:
> > On 01/26/2016 02:45 PM, Yang Hongyang wrote:
> > > ditto
> > >
> > > Reviewed-by: Yang Hongyang
> >
> > The newest version is v5, and this series is in the staging now.
>
> Sorry for the
On Mon, 2016-01-25 at 16:06 -0500, Konrad Rzeszutek Wilk wrote:
> To hopefully clarify what it meant.
>
> Signed-off-by: Konrad Rzeszutek Wilk
> ---
> tools/libxc/xc_resume.c | 7 +--
> 1 file changed, 5 insertions(+), 2 deletions(-)
>
> diff --git a/tools/libxc/xc_resume.c b/tools/libxc/xc
On Tue, Jan 26, 2016 at 7:43 AM, Chun Yan Liu wrote:
>
>
On 1/20/2016 at 12:56 PM, in message
> <569f83f502660009e...@relay2.provo.novell.com>, "Chun Yan Liu"
> wrote:
>
>>
> On 1/19/2016 at 11:48 PM, in message
>> <22174.23240.402164.635...@mariner.uk.xensource.com>, Ian Jackson
>>
On Mon, 2016-01-25 at 16:06 -0500, Konrad Rzeszutek Wilk wrote:
> The assert(info) is after quite a lot of manipulations
> on 'info' - which makes the assert pointless because if
> info was NULL it would have crashed earlier.
>
> Move it earlier so that it guards before we try using
> the 'info' s
Ian Campbell writes ("Re: [PATCH 1/3] libxc/xc_domain_resume: Update comment."):
> On Mon, 2016-01-25 at 16:06 -0500, Konrad Rzeszutek Wilk wrote:
> > To hopefully clarify what it meant.
...
> > + * 1. (fast=1) Resume with special return code (1) that the guest
> > + * gets from SCHEDOP_shutdo
Ian Campbell writes ("Re: [PATCH 2/3] libxl/remus: Move the assert before the
info is used."):
> On Mon, 2016-01-25 at 16:06 -0500, Konrad Rzeszutek Wilk wrote:
> > The assert(info) is after quite a lot of manipulations
> > on 'info' - which makes the assert pointless because if
> > info was NULL
On Tue, Jan 26, 2016 at 11:05:50AM +, Ian Campbell wrote:
> On Sat, 2016-01-09 at 00:33 +, osstest service owner wrote:
>
> According to http://logs.test-lab.xenproject.org/osstest/results/all-branch
> -statuses.txt the ovmf push gate has been broken for a while (48 days).
>
> The bisecto
On Mon, 2016-01-25 at 16:06 -0500, Konrad Rzeszutek Wilk wrote:
> Describe what the four (or more in the future) arguments
> are for.
I'd say that a code comment on the definition would be sufficient here, but
I'll defer to Ian J as author of this code.
>
> Signed-off-by: Konrad Rzeszutek Wilk
From: Jennifer Herbert
The current rwlocks are write-biased and unfair. This allows writers
to starve readers in situations where there are many writers (e.g.,
p2m type changes from log dirty updates during domain save).
Replace the current implementation with queued read-write locks which use
atomic_compareandswap() used atomic_t as the new, old and returned
values which is less convinient than using just int.
Signed-off-by: David Vrabel
---
v2:
- arm/arm64 already provided atomic_cmpxchg()
---
xen/common/domain.c | 5 +
xen/include/asm-arm/atomic.h | 8
xen/i
From: Jennifer Herbert
Reduce the size of struct lock_debug so increases in other lock
structures don't increase the size of struct domain too much.
Signed-off-by: Jennifer Herbert
Signed-off-by: David Vrabel
---
v2:
- Continue to use int for local variable.
---
xen/include/xen/spinlock.h | 2
From: Jennifer Herbert
In preparation for a replacement read-write lock implementation, move
the API and the per-cpu read-write locks into their own files.
Signed-off-by: Jennifer Herbert
Signed-off-by: David Vrabel
---
v2:
- new
---
xen/arch/x86/mm/mem_sharing.c | 1 +
xen/common/Makefile
This series replaces the current read-write lock implementation with
the queue read-write locks from Linux. These are fair; under
contention both readers and writers will be queued and obtain the lock
in FIFO order (due to the fairness of the internal ticket lock).
The implementation is all in C
Ian Campbell writes ("Re: [PATCH 3/3] tools/libxl: run_helper - add #define for
arguments."):
> On Mon, 2016-01-25 at 16:06 -0500, Konrad Rzeszutek Wilk wrote:
> > Describe what the four (or more in the future) arguments
> > are for.
>
> I'd say that a code comment on the definition would be suff
>>> On 26.01.16 at 16:57, wrote:
> On 01/26/16 08:37, Jan Beulich wrote:
>> >>> On 26.01.16 at 15:44, wrote:
>> >> Last year at Linux Plumbers Conference I attended a session dedicated
>> >> to NVDIMM support. I asked the very same question and the INTEL guy
>> >> there told me there is indeed s
1 - 100 of 208 matches
Mail list logo