> From: Tian, Kevin
> Sent: Thursday, February 04, 2016 1:35 PM
>
> > From: Han, Huaitong
> > Sent: Thursday, February 04, 2016 1:25 PM
> >
> > On Thu, 2016-02-04 at 13:20 +0800, Huaitong Han wrote:
> > > On Thu, 2016-02-04 at 04:56 +, Tian, Kevin wrote:
> > > > > From: Huaitong Han
> > > > >
>>> On 04.02.16 at 07:49, wrote:
> On Tue, Feb 02, 2016 at 02:42:38AM -0700, Jan Beulich wrote:
>> >> > With this another question then is whether, when both XSAVEC
>> >> > and XSAVEOPT are available, it is indeed always better to use
>> >> > XSAVEC (as the code is doing after your enabling).
>> >
On 2/4/2016 1:50 AM, George Dunlap wrote:
On Wed, Feb 3, 2016 at 3:10 PM, Paul Durrant wrote:
* Is it possible for libxl to somehow tell from the rest of the
configuration that this larger limit should be applied ?
If a XenGT-enabled VM is provisioned through libxl then some larger lim
On 2/4/2016 2:21 AM, George Dunlap wrote:
On Wed, Feb 3, 2016 at 5:41 PM, George Dunlap
wrote:
I think at some point I suggested an alternate design based on marking
such gpfns with a special p2m type; I can't remember if that
suggestion was actually addressed or not.
FWIW, the thread where
On 2/4/2016 3:12 AM, George Dunlap wrote:
On 03/02/16 18:39, Andrew Cooper wrote:
On 03/02/16 18:21, George Dunlap wrote:
2. It's not technically difficult to extend the number of servers
supported to something sensible, like 4 (using 4 different write_dm
p2m types)
While technically true,
>>> On 04.02.16 at 08:00, wrote:
> Changes in v7:
> *Add static for pkey_fault.
> *Add a comment for page present check and adjust indentation.
> *Init pkru_ad and pkru_wd.
Sadly I've only now noticed that this hasn't been done the way it
was requested:
> --- a/xen/arch/x86/mm/guest_walk.c
> +++
Ian,
in my pvscsi code I have two copies of a helper function which appends
yet another instance of something to an Array, as shown below. This is
similar to the _copy variant. Is it worth to let gentypes generate such
a helper, like libxl_device_vscsictrl_append_vscsidev()?
While writing this I
Hi,
the following message shows up in the log file when the xen host goes down:
kernel: [ cut here ]
kernel: WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:303
dev_watchdog+0x23e/0x250()
kernel: NETDEV WATCHDOG: enp3s0f0 (e1000e): transmit queue 0 timed out
kernel:
On Thu, Feb 04, 2016 at 01:28:14PM +0800, Wen Congyang wrote:
> On 02/04/2016 03:40 AM, Wei Liu wrote:
> > On Fri, Jan 29, 2016 at 01:27:28PM +0800, Wen Congyang wrote:
> >> In COLO mode, both VMs are running, and are considered in sync if the
> >> visible network traffic is identical. After some
On Wed, 2016-02-03 at 17:18 +, Andrew Cooper wrote:
> On 03/02/16 17:12, Olaf Hering wrote:
> > On Mon, Feb 01, Andrew Cooper wrote:
> >
> > > c/s 2d2f789 "tools: rename libxc's evtchn_port_or_error_t with an xc_
> > > prefix" doesn't cater for older applications which have requested
> > > XC_
> -Original Message-
> From: Yu, Zhang [mailto:yu.c.zh...@linux.intel.com]
> Sent: 04 February 2016 08:51
> To: George Dunlap; Ian Jackson
> Cc: Paul Durrant; Kevin Tian; Wei Liu; Ian Campbell; Andrew Cooper; xen-
> de...@lists.xen.org; Stefano Stabellini; zhiyuan...@intel.com; Jan Beulich;
On Wed, 2016-02-03 at 15:28 -0500, Konrad Rzeszutek Wilk wrote:
> > > And I wonder if the XEN_DOMCTL_irq_permission aka,
> > > xc_domain_irq_permission
> > > had been called. I remember that at some point we missed it for
> > > Xend..
> > >
>
> False alarm.
>
> It was all in Linux. Attached are
On Thu, Feb 04, 2016 at 01:24:41PM +0800, Wen Congyang wrote:
> On 02/04/2016 03:40 AM, Wei Liu wrote:
> > On Fri, Jan 29, 2016 at 01:27:24PM +0800, Wen Congyang wrote:
> >> In normal migration, the qemu state is passed to qemu as a parameter.
> >> With COLO, secondary vm is running. So we will do
On 2/4/2016 5:28 PM, Paul Durrant wrote:
-Original Message-
From: Yu, Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 04 February 2016 08:51
To: George Dunlap; Ian Jackson
Cc: Paul Durrant; Kevin Tian; Wei Liu; Ian Campbell; Andrew Cooper; xen-
de...@lists.xen.org; Stefano Stabellini; z
On Thu, Feb 04, 2016 at 09:41:54AM +, Wei Liu wrote:
> On Thu, Feb 04, 2016 at 01:24:41PM +0800, Wen Congyang wrote:
> > On 02/04/2016 03:40 AM, Wei Liu wrote:
> > > On Fri, Jan 29, 2016 at 01:27:24PM +0800, Wen Congyang wrote:
> > >> In normal migration, the qemu state is passed to qemu as a p
On Thu, Feb 04, 2016 at 03:00:34PM +0800, Huaitong Han wrote:
> This patch adds pkeys support for cpuid handing.
>
> Pkeys hardware support is CPUID.7.0.ECX[3]:PKU. software support is
> CPUID.7.0.ECX[4]:OSPKE and it reflects the support setting of CR4.PKE.
>
> X86_FEATURE_OSXSAVE depends on gues
> -Original Message-
[snip]
> >>> Compare this to the downsides of the approach you're proposing:
> >>> 1. Using 40 bytes of hypervisor space per guest GPU pagetable page (as
> >>> opposed to using a bit in the existing p2m table)
> >>> 2. Walking down an RB tree with 8000 individual nodes
On Thu, 2016-02-04 at 10:23 +0100, Olaf Hering wrote:
> Ian,
>
> in my pvscsi code I have two copies of a helper function which appends
> yet another instance of something to an Array, as shown below. This is
> similar to the _copy variant. Is it worth to let gentypes generate such
> a helper, lik
On 01/02/16 15:38, Boris Ostrovsky wrote:
> HVMlite guests need to be viewed as having APIC, otherwise smpboot code,
> for example, will complain.
I think we should consider always giving HVMlite guests an emulated
APIC. I think this eliminates one of the biggest differences between
HVMlite and n
On Wed, 2016-02-03 at 17:41 +, George Dunlap wrote:
> But of course, since they they aren't actually ranges but just gpfns,
> they're scattered randomly throughout the guest physical address
> space.
(Possibly) stupid question:
Since, AIUI, the in-guest GPU driver is XenGT aware could it not
On 02/02/16 16:58, Boris Ostrovsky wrote:
> On 02/02/2016 11:21 AM, David Vrabel wrote:
>> This needs some more description in the commit message.
>>
>>> --- a/arch/x86/xen/smp.c
>>> +++ b/arch/x86/xen/smp.c
>> [...]
>>> +hctxt->cpu_regs.x86_32.cs_base = 0;
>>> +hctxt->cpu_regs.x86_
On Thu, Feb 04, Ian Campbell wrote:
> I think the append_to variant is probably least gross.
libxl_device_vscsidev_append_to_vscsictrl() would work too.
This is what I will use for the time being (modulo introduced runtime bugs):
void libxl_device_vscsictrl_append_vscsidev(libxl_ctx *ctx,
flight 38725 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38725/
Perfect :-)
All tests in this flight passed
baseline version:
flight 38710
jobs:
build-amd64 pass
build-armhf
This file stradles the xenevtchn and libxc evtchn_compat worlds, and
hence ends up with two evtchn_port_or_error_t typedefs which older
gcc's (and the C standard) do not like.
Avoid this by gating the compat definition on a gate provided by the
compat implementation.
Note that this would still be
On Wed, 2016-02-03 at 19:53 -0700, Jim Fehlig wrote:
> > disk=[
> > 'backendtype=qdisk,format=raw,vdev=hda,access=rw,target=rbd:rbd/ubuntu1204.img'
> > ]
>
> I thought I tried disk config along those lines with no success. But I'll
> certainly take a closer look at using target= to encod
Adding Olaf, I forgot that Reported-by doesn't turn into a Cc.
On Thu, 2016-02-04 at 10:15 +, Ian Campbell wrote:
> This file stradles the xenevtchn and libxc evtchn_compat worlds, and
> hence ends up with two evtchn_port_or_error_t typedefs which older
> gcc's (and the C standard) do not like
flight 80237 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80237/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 14 guest-saverestore.2
fail REGR. vs. 79422
>>> On 04.02.16 at 10:38, wrote:
> So another question is, if value of this limit really matters, will a
> lower one be more acceptable(the current 256 being not enough)?
If you've carefully read George's replies, a primary aspect is
whether we wouldn't better revert commit f5a32c5b8e
("x86/HVM:
On 01/02/16 15:38, Boris Ostrovsky wrote:
> HVMlite secondary VCPUs use baremetal bringup path (i.e. native_*
> smp_ops) but need to do some preparation in PV code.
If we always provided an emulated APIC could we use the native SMP
bring-up instead?
David
___
On Thu, Feb 04, 2016 at 09:58:14AM +, Ian Campbell wrote:
> On Thu, 2016-02-04 at 10:23 +0100, Olaf Hering wrote:
> > Ian,
> >
> > in my pvscsi code I have two copies of a helper function which appends
> > yet another instance of something to an Array, as shown below. This is
> > similar to th
On Thu, Feb 04, 2016 at 11:07:58AM +0100, Olaf Hering wrote:
> On Thu, Feb 04, Ian Campbell wrote:
>
> > I think the append_to variant is probably least gross.
>
> libxl_device_vscsidev_append_to_vscsictrl() would work too.
>
> This is what I will use for the time being (modulo introduced runtim
On Thu, Feb 4, 2016 at 8:51 AM, Yu, Zhang wrote:
>> Going forward, we probably will, at some point, need to implement a
>> parallel "p2t" structure to keep track of types -- and probably will
>> whether end up implementing 4 separate write_dm types or not (for the
>> reasons you describe).
>>
>
>
On Thu, 2016-02-04 at 08:50 +1100, Alex Braunegg wrote:
> A better solution however in my mind would be to store the websocket & x509
> path in the .cfg file for each virtual machine:
Correct. This would involve adding the appropriate fields to the struct(s)
in tools/libxl/libxl_types.idl, populat
On 04/02/16 10:19, Ian Campbell wrote:
> Adding Olaf, I forgot that Reported-by doesn't turn into a Cc.
>
> On Thu, 2016-02-04 at 10:15 +, Ian Campbell wrote:
>> This file stradles the xenevtchn and libxc evtchn_compat worlds, and
>> hence ends up with two evtchn_port_or_error_t typedefs which
On Thu, 2016-02-04 at 08:50 +1100, Alex Braunegg wrote:
> [root@mynas-s5000xvn services]# /usr/sbin/xl reboot -F Windows_2008_R2
> Rebooting domain 5
> PV control interface not available: sending ACPI reset button event.
> libxl: error: libxl.c:5947:libxl_send_trigger: Send trigger 'reset' failed:
On Thu, Feb 4, 2016 at 9:38 AM, Yu, Zhang wrote:
> On 2/4/2016 5:28 PM, Paul Durrant wrote:
>> I assume this means that the emulator can 'unshadow' GTTs (I guess on an
>> LRU basis) so that it can shadow new ones when the limit has been exhausted?
>> If so, how bad is performance likely to be if w
On Thu, 2016-02-04 at 10:49 +, George Dunlap wrote:
> On Thu, Feb 4, 2016 at 8:51 AM, Yu, Zhang
> wrote:
> > > Going forward, we probably will, at some point, need to implement a
> > > parallel "p2t" structure to keep track of types -- and probably will
> > > whether end up implementing 4 sepa
On Thu, Feb 04, 2016 at 10:19:55AM +, Ian Campbell wrote:
> Adding Olaf, I forgot that Reported-by doesn't turn into a Cc.
>
> On Thu, 2016-02-04 at 10:15 +, Ian Campbell wrote:
> > This file stradles the xenevtchn and libxc evtchn_compat worlds, and
> > hence ends up with two evtchn_port_
On Thu, 2016-02-04 at 11:08 +, Ian Campbell wrote:
> On Thu, 2016-02-04 at 10:49 +, George Dunlap wrote:
> > On Thu, Feb 4, 2016 at 8:51 AM, Yu, Zhang
> > wrote:
> > > > Going forward, we probably will, at some point, need to implement a
> > > > parallel "p2t" structure to keep track of ty
On Thu, Feb 04, Ian Campbell wrote:
> Reported-by: Olaf Hering
be05b53 + this change can be compiled in SLE11 and SLE12. Thanks.
Tested-by: Olaf Hering
Olaf
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Thu, 2016-02-04 at 10:53 +1100, Alex Braunegg wrote:
>
> There was a thread on this in 2013
> (http://lists.xen.org/archives/html/xen-devel/2013-03/msg00806.html) however
> I have looked at the disk configuration, and there is no phy: / raw: / file:
> prefix to the disk specification.
Not sure
El 4/2/16 a les 11:04, David Vrabel ha escrit:
> On 01/02/16 15:38, Boris Ostrovsky wrote:
>> HVMlite guests need to be viewed as having APIC, otherwise smpboot code,
>> for example, will complain.
>
> I think we should consider always giving HVMlite guests an emulated
> APIC. I think this elimin
On Thu, 4 Feb 2016, Haozhong Zhang wrote:
> On 02/03/16 15:22, Stefano Stabellini wrote:
> > On Wed, 3 Feb 2016, George Dunlap wrote:
> > > On 03/02/16 12:02, Stefano Stabellini wrote:
> > > > On Wed, 3 Feb 2016, Haozhong Zhang wrote:
> > > >> Or, we can make a file system on /dev/pmem0, create fil
Currently, after receiving a vm_event reply requesting emulation,
the actual emulation is triggered in p2m_mem_access_check(),
which means that we're waiting for the page fault to occur again
before emulating. Aside from the performance impact, this
complicates the code since between hvm_do_resume(
On 04/02/16 12:27, Razvan Cojocaru wrote:
> Currently, after receiving a vm_event reply requesting emulation,
> the actual emulation is triggered in p2m_mem_access_check(),
> which means that we're waiting for the page fault to occur again
> before emulating.
Presumably this means that we re-enter
On 02/04/2016 02:36 PM, Andrew Cooper wrote:
> On 04/02/16 12:27, Razvan Cojocaru wrote:
>> Currently, after receiving a vm_event reply requesting emulation,
>> the actual emulation is triggered in p2m_mem_access_check(),
>> which means that we're waiting for the page fault to occur again
>> before
On 2/2/16 10:58 AM, Boris Ostrovsky wrote:
> On 02/02/2016 11:21 AM, David Vrabel wrote:
>> This needs some more description in the commit message.
>>
>>> --- a/arch/x86/xen/smp.c
>>> +++ b/arch/x86/xen/smp.c
>> [...]
>>> +hctxt->cpu_regs.x86_32.cs_base = 0;
>>> +hctxt->cpu_regs.x86
Otherwise the name clashes with the libxc evtchn_compat use of the
name (which is compat, so can't really change), and triggers an error
with older gcc relating to redefining typedefs (which are not allowed
per the spec, but which are tolerated by newer gcc)
None of qemu-trad, qemu-xen or mini-os
flight 80441 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80441/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
flight 80336 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80336/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 15 guest-localmigrate/x10 fail REGR. vs.
79947
Regressions w
Jan Beulich writes ("Re: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter
max_wp_ram_ranges."):
> On 04.02.16 at 10:38, wrote:
> > So another question is, if value of this limit really matters, will a
> > lower one be more acceptable(the current 256 being not enough)?
>
> If you've carefull
On Thu, Feb 04, Ian Campbell wrote:
> Cc: Olaf Hering
Also this builds on SLE11/12.
Tested-by: Olaf Hering
Olaf
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 04 February 2016 13:34
> To: Jan Beulich
> Cc: Zhang Yu; Andrew Cooper; George Dunlap; Ian Campbell; Paul Durrant;
> Stefano Stabellini; Wei Liu; Kevin Tian; zhiyuan...@intel.com; xen-
> de...@lists.xen.org;
On 02/04/2016 05:38 AM, David Vrabel wrote:
On 01/02/16 15:38, Boris Ostrovsky wrote:
HVMlite secondary VCPUs use baremetal bringup path (i.e. native_*
smp_ops) but need to do some preparation in PV code.
If we always provided an emulated APIC could we use the native SMP
bring-up instead?
We
On Thu, Feb 04, 2016 at 01:00:29PM +, Ian Campbell wrote:
> Otherwise the name clashes with the libxc evtchn_compat use of the
> name (which is compat, so can't really change), and triggers an error
> with older gcc relating to redefining typedefs (which are not allowed
> per the spec, but whic
On 02/04/2016 07:14 AM, Roger Pau Monné wrote:
El 4/2/16 a les 11:04, David Vrabel ha escrit:
On 01/02/16 15:38, Boris Ostrovsky wrote:
HVMlite guests need to be viewed as having APIC, otherwise smpboot code,
for example, will complain.
I think we should consider always giving HVMlite guests a
>>> On 04.02.16 at 14:33, wrote:
> Jan Beulich writes ("Re: [Xen-devel] [PATCH v3 3/3] tools: introduce
> parameter
> max_wp_ram_ranges."):
>> On 04.02.16 at 10:38, wrote:
>> > So another question is, if value of this limit really matters, will a
>> > lower one be more acceptable(the current 25
>>> On 04.02.16 at 14:47, wrote:
>> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
>> Sent: 04 February 2016 13:34
>> * Is it possible for libxl to somehow tell from the rest of the
>>configuration that this larger limit should be applied ?
>>
>>AFAICT there is nothing in libxl dir
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 04 February 2016 14:13
> To: Paul Durrant
> Cc: Andrew Cooper; George Dunlap; Ian Campbell; Ian Jackson; Stefano
> Stabellini; Wei Liu; Kevin Tian; zhiyuan...@intel.com; Zhang Yu; xen-
> de...@lists.xen.org; Keir (X
On 04/02/16 02:53, Chun Yan Liu wrote:
>
>
On 2/3/2016 at 10:33 PM, in message <56b20fcc.3010...@citrix.com>, George
> Dunlap wrote:
>> On 02/02/16 18:11, Ian Jackson wrote:
>>> George Dunlap writes ("Re: [Xen-devel] [PATCH V13 3/5] libxl: add pvusb
>> API"):
There are effectively
Paul Durrant writes ("RE: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter
max_wp_ram_ranges."):
> There are patches in the XenGT xen repo which add extra parameters
> into the VM config to allow libxl to provision a gvt-g instance (of
> which there are a finite number per GPU) for a VM. The
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 04 February 2016 15:06
> To: Paul Durrant
> Cc: Jan Beulich; Andrew Cooper; George Dunlap; Ian Campbell; Stefano
> Stabellini; Wei Liu; Kevin Tian; zhiyuan...@intel.com; Zhang Yu; xen-
> de...@lists.xen.org;
On Wed, 2016-02-03 at 14:21 +0100, Roger Pau Monne wrote:
> From: Roger Pau Monne
I dropped this as discussed on IRC.
> Due to the HVMlite changes there's a chance that the value in rc is
> checked
> without being initialised. Fix this by initialising it to 0 prior to the
> while loop. Also add
On Thu, 2016-02-04 at 14:36 +0100, Olaf Hering wrote:
> On Thu, Feb 04, Ian Campbell wrote:
>
> > Cc: Olaf Hering
>
> Also this builds on SLE11/12.
>
> Tested-by: Olaf Hering
Applied with this + Wei's ack, thanks.
Ian.
___
Xen-devel mailing list
X
On Wed, 2016-02-03 at 16:12 +, Ian Jackson wrote:
>
> Acked-by: Ian Jackson
Applied both, thanks.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
From: Dirk Behme
Starting in the wrong ELx mode I get the following debug output:
...
- Current EL 0004 -
- Xen must be entered in NS EL2 mode -
- Boot failed -
The output of "Please update the bootloader" is missing here.
Make sure this is output, too. With this, we get
...
- Current EL
While playing with CPU hotplug I noticed that if a guest fails to unplug
a VCPU the toolstack will mark VCPU's availability in xenstore as
"offline" even though that VCPU is still running in the guest.
It's easy to see this by doing 'xl vcpu-set 0', which is
presumably not a realistic scenari
On Thu, 2016-02-04 at 17:49 +0100, Dirk Behme wrote:
> From: Dirk Behme
>
> Starting in the wrong ELx mode I get the following debug output:
>
> ...
> - Current EL 0004 -
> - Xen must be entered in NS EL2 mode -
> - Boot failed -
>
> The output of "Please update the bootloader" is missing h
Hi Michael,
do you have any comments on this?
On Wed, 13 Jan 2016, Stefano Stabellini wrote:
> On Xen MSIs can be remapped into pirqs, which are a type of event
> channels. It's mostly for the benefit of PCI passthrough devices, to
> avoid the overhead of interacting with the emulated lapic.
>
>
On 04.02.2016 18:00, Ian Campbell wrote:
On Thu, 2016-02-04 at 17:49 +0100, Dirk Behme wrote:
From: Dirk Behme
Starting in the wrong ELx mode I get the following debug output:
...
- Current EL 0004 -
- Xen must be entered in NS EL2 mode -
- Boot failed -
The output of "Please update the
On 04/02/16 14:08, Jan Beulich wrote:
On 04.02.16 at 14:33, wrote:
>> Jan Beulich writes ("Re: [Xen-devel] [PATCH v3 3/3] tools: introduce
>> parameter
>> max_wp_ram_ranges."):
>>> On 04.02.16 at 10:38, wrote:
So another question is, if value of this limit really matters, will a
On Sat, 30 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> The first Mb handling is not necessary and the attribute of __vmap() is
> different for ARM. Factor the first Mb handling only for x86 and define
> a mapping attribute for each architecture.
>
> Cc: Jan Beulich
> Signed-off-by: S
On Sat, 30 Jan 2016, Shannon Zhao wrote:
> From: Graeme Gregory
>
> With the addition of ARM64 that does not have a traditional BIOS to
> scan, add a config option which is selected on x86 (ia64 doesn't need
> it either, it is EFI/UEFI based system) to do the traditional BIOS
> scanning for table
Hello,
I've Cced a bunch of people who have expressed interest in the HVMlite
design/implementation, both from a Xen or OS point of view. If you
would like to be removed, please say so and I will remove you in
further iterations. The same applies if you want to be added to the Cc.
This is an i
> The problem usually occurs over night while the machine is idle.
>
> The problem exclusively occurs on the machine running xen. None of
> the others are showing any issues whatsoever.
Try limiting the C states. Use the xenpm.
___
Xen-devel mailing l
On Wed, Feb 3, 2016 at 1:49 AM, David Vrabel wrote:
> On 03/02/16 05:46, Andy Lutomirski wrote:
>> Signed-off-by: Andy Lutomirski
>
> You forgot the previous Reviewed-by tags.
Whoops. If I send another version, they'll be there.
>
> David
--
Andy Lutomirski
AMA Capital Management, LLC
___
On Thu, Feb 04, 2016 at 05:05:46PM +, Stefano Stabellini wrote:
> Hi Michael,
>
> do you have any comments on this?
I dislike how it spreads xen specific stuff around,
but I don't have a better idea at the moment, so
I applied this.
> On Wed, 13 Jan 2016, Stefano Stabellini wrote:
> > On Xen
On 04/02/16 17:48, Roger Pau Monné wrote:
> Hello,
>
> I've Cced a bunch of people who have expressed interest in the HVMlite
> design/implementation, both from a Xen or OS point of view. If you
> would like to be removed, please say so and I will remove you in
> further iterations. The same app
On Wed, Feb 03, 2016 at 10:07:27AM -0500, Konrad Rzeszutek Wilk wrote:
> On Wed, Feb 03, 2016 at 02:34:47AM -0700, Jan Beulich wrote:
> > >>> On 02.02.16 at 23:05, wrote:
> > > This is getting more and more bizzare.
> > >
> > > I realized that this machine has VMCS shadowing so Xen does not trap
On 02/04/2016 12:48 PM, Roger Pau Monné wrote:
The format of the boot start info structure is the following (pointed to
be %ebx):
struct hvm_start_info {
#define HVM_START_MAGIC_VALUE 0x336ec578
uint32_t magic; /* Contains the magic value 0x336ec578
*/
Boris Ostrovsky, on Thu 04 Feb 2016 13:38:02 -0500, wrote:
> On 02/04/2016 12:48 PM, Roger Pau Monné wrote:
> >The format of the boot start info structure is the following (pointed to
> >be %ebx):
> >
> > struct hvm_start_info {
> > #define HVM_START_MAGIC_VALUE 0x336ec578
> > uint3
flight 80382 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80382/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 10 guest-start fail REGR. vs. 80121
test-amd64-i386-libvirt-p
flight 80508 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80508/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 02/04/2016 07:58 AM, Doug Goldstein wrote:
On 2/2/16 10:58 AM, Boris Ostrovsky wrote:
On 02/02/2016 11:21 AM, David Vrabel wrote:
This needs some more description in the commit message.
--- a/arch/x86/xen/smp.c
+++ b/arch/x86/xen/smp.c
[...]
+hctxt->cpu_regs.x86_32.cs_base = 0;
+
Roger Pau Monné, on Thu 04 Feb 2016 18:48:14 +0100, wrote:
> struct hvm_start_info {
> #define HVM_START_MAGIC_VALUE 0x336ec578
> uint32_t magic; /* Contains the magic value 0x336ec578
>*/
> /* ("xEn3" with the 0x80 bit of the
On 02/04/2016 02:09 PM, Samuel Thibault wrote:
Roger Pau Monné, on Thu 04 Feb 2016 18:48:14 +0100, wrote:
struct hvm_start_info {
#define HVM_START_MAGIC_VALUE 0x336ec578
uint32_t magic; /* Contains the magic value 0x336ec578
*/
Hi Ian,
As per http://xenbits.xen.org/docs/4.6-testing/misc/xl-disk-configuration.txt
the disk specification conforms to:
disk = [ '/dev/vg/guest-volume,,hda', '/root/image.iso,,hdc,cdrom' ]
Is there any additional information you need to replicate this issue?
Best regards,
Alex
---
On 02/03/2016 12:36 PM, Joao Martins wrote:
>
> On 02/02/2016 11:41 PM, Jim Fehlig wrote:
>> Also, if the connection dies, how are we informed about that?
>> Would that be done via the connect close callback that was removed in this
>> version? It is not clear to me how errors on the dconn connecti
El 4/2/16 a les 19:51, Samuel Thibault ha escrit:
> Boris Ostrovsky, on Thu 04 Feb 2016 13:38:02 -0500, wrote:
>> On 02/04/2016 12:48 PM, Roger Pau Monné wrote:
>>> The format of the boot start info structure is the following (pointed to
>>> be %ebx):
>>>
>>> struct hvm_start_info {
>>> #de
flight 80370 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80370/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399
build-i386-rumpuserxen
El 4/2/16 a les 19:22, Andrew Cooper ha escrit:
> On 04/02/16 17:48, Roger Pau Monné wrote:
>> Hello,
>>
>> I've Cced a bunch of people who have expressed interest in the HVMlite
>> design/implementation, both from a Xen or OS point of view. If you
>> would like to be removed, please say so and I
On 02/03/2016 06:40 PM, Luis R. Rodriguez wrote:
On Wed, Feb 03, 2016 at 03:11:56PM -0500, Boris Ostrovsky wrote:
On 02/03/2016 01:55 PM, Luis R. Rodriguez wrote:
I saw no considerations for the recommendations I had made last on your v1:
https://lkml.kernel.org/r/CAB=NE6XPA0YzbnM8=rspkkai6d3g
On 02/04/2016 02:21 PM, Roger Pau Monné wrote:
El 4/2/16 a les 19:51, Samuel Thibault ha escrit:
Boris Ostrovsky, on Thu 04 Feb 2016 13:38:02 -0500, wrote:
On 02/04/2016 12:48 PM, Roger Pau Monné wrote:
The format of the boot start info structure is the following (pointed to
be %ebx):
st
On 02/04/2016 02:33 PM, Roger Pau Monné wrote:
So we should provide a lapic/ioapic set of options to xl configuration
files?
We already have 'apic' option. We can also use 'acpi=false' since then
that will mean no MADT and thus no APIC/IOAPIC.
-boris
__
> >>>If there is more than one module, how is the guest expected to sort out
> >>>which module is what?
> >In general I was expecting this would be done by position, or if that's
> >not enough an additional module (at either position 0 or n) should be
> >passed to contain that information.
>
> The
On 04/02/16 20:29, Konrad Rzeszutek Wilk wrote:
> If there is more than one module, how is the guest expected to sort out
> which module is what?
>>> In general I was expecting this would be done by position, or if that's
>>> not enough an additional module (at either position 0 or n) shoul
On Thu, Feb 04, 2016 at 02:54:15PM -0500, Boris Ostrovsky wrote:
> On 02/03/2016 06:40 PM, Luis R. Rodriguez wrote:
> >On Wed, Feb 03, 2016 at 03:11:56PM -0500, Boris Ostrovsky wrote:
> >>On 02/03/2016 01:55 PM, Luis R. Rodriguez wrote:
> >>>I saw no considerations for the recommendations I had mad
Hello, does Xen support sharing memory pages between multiple domains
(such as as Dom0, DomU1, DomU2)? The Grant Table hypercalls seem
limited to:
IOCTL_GNTALLOC_ALLOC_GREF
IOCTL_GNTALLOC_DEALLOC_GREF
IOCTL_GNTALLOC_SET_UNMAP_NOTIFY
Is there any mechanism to not allocate, but only share existing
Hi all,
Looking specifically at 4.6.0.
It seems that the Makefile for qemuu uses the following:
$$source/configure --enable-xen --target-list=i386-softmmu \
$(QEMU_XEN_ENABLE_DEBUG) \
--prefix=$(LIBEXEC) \
--libdir=$(LIBEXEC_LIB) \
From: Stefano Stabellini
On Xen MSIs can be remapped into pirqs, which are a type of event
channels. It's mostly for the benefit of PCI passthrough devices, to
avoid the overhead of interacting with the emulated lapic.
However remapping interrupts and MSIs is also supported for emulated
devices,
1 - 100 of 157 matches
Mail list logo