>>> On 07.03.16 at 18:43, wrote:
> On 04/03/16 11:28, Jan Beulich wrote:
>> Alternatives patching code picks the most suitable NOPs for the
>> running system, so simply use it to replace the pre-populated ones.
>>
>> Use an arbitrary, always available feature to key off from.
>
> I would be tempt
>>> On 07.03.16 at 19:07, wrote:
> On Mon, 2016-03-07 at 04:46 -0700, Jan Beulich wrote:
>> > > > On 04.03.16 at 19:45, wrote:
>> > On Fri, 2016-03-04 at 09:48 -0700, Jan Beulich wrote:
>
>> > > --- a/tools/libxl/libxl.c
>> > > +++ b/tools/libxl/libxl.c
>> > > @@ -5958,6 +5958,26 @@ int libxl_se
flight 44232 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44232/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3863 host-install(3) broken R
Hi All,
I'm working on a research project with IBM, and I want to run Xen on Nvidia Tegra Jetson-tk1 board.
I looked at a post on this mailing list (http://lists.xenproject.org/archives/html/xen-devel/2015-03/msg01122.html),
and I am using this git tree -
git://xenbits.xen.org/people/ianc/xen.g
>>> On 07.03.16 at 23:04, wrote:
>> +[param_pericom_4port] = {
>> +.base_baud = 921600,
>> +.uart_offset = 8,
>> +.reg_width = 1,
>> +.fifo_size = 16,
>> +.lsr_mask = UART_LSR_THRE,
>> +.bar0 = 1,
>> +.max_ports = 4,
>> +},
>> +[
>>> On 07.03.16 at 18:53, wrote:
> On Mon, 2016-03-07 at 09:40 -0700, Jan Beulich wrote:
>> > > > On 07.03.16 at 17:28, wrote:
>> > On Mon, Mar 7, 2016 at 6:59 AM, Jan Beulich
>> > wrote:
>> > >
>> > > > @@ -1163,6 +1173,96 @@ rt_dom_cntl(
>> > > >
>> > > > +case XEN_DOMCTL_SCHEDOP_getvcpu
On 03/04/16 10:20, Haozhong Zhang wrote:
> On 03/02/16 06:03, Jan Beulich wrote:
> > >>> On 02.03.16 at 08:14, wrote:
> > > It means NVDIMM is very possibly mapped in page granularity, and
> > > hypervisor needs per-page data structures like page_info (rather than the
> > > range set style nvdimm_
>>> On 08.03.16 at 10:15, wrote:
> More thoughts on reserving NVDIMM space for per-page structures
>
> Currently, a per-page struct for managing mapping of NVDIMM pages may
> include following fields:
>
> struct nvdimm_page
> {
> uint64_t mfn;/* MFN of SPA of this NVDIMM page */
>
>>> On 07.03.16 at 19:42, wrote:
> Let Kconfig set the XSM_MAGIC value for us.
What's the benefit of doing this at the Kconfig layer?
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -113,6 +113,14 @@ config XSM
>
> If unsure, say N.
>
> +# XSM magic for policy detection
>
>>> On 07.03.16 at 19:42, wrote:
> Have Kconfig set CONFIG_FLASK_AVC_STATS and prefix all uses with CONFIG_
> to use the Kconfig variable.
Same question here: What's the benefit of doing it this way?
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -23,6 +23,12 @@ config FLASK
>
>
>>> On 07.03.16 at 19:28, wrote:
> --- a/tools/include/xen-foreign/Makefile
> +++ b/tools/include/xen-foreign/Makefile
> @@ -35,6 +35,8 @@ x86_32.h: mkheader.py structs.py
> $(ROOT)/arch-x86/xen-x86_32.h $(ROOT)/arch-x86/
>
> x86_64.h: mkheader.py structs.py $(ROOT)/arch-x86/xen-x86_64.h
> $(
>>> On 07.03.16 at 19:12, wrote:
> --- a/xen/include/asm-arm/domain.h
> +++ b/xen/include/asm-arm/domain.h
> @@ -65,6 +65,7 @@ struct arch_domain
> RELMEM_mapping,
> RELMEM_done,
> } relmem;
> +struct page_list_head relmem_list;
Well, if I was ARM maintainer I would say
>>> On 08.03.16 at 08:19, wrote:
> After doing some performance test on xsavec and xsaveopt(suggested by jan),
> the result show xsaveopt performs better than xsavec. This patch will clean
> up xsavec suppot code in xen.
>
> Also xsaves will be disabled (xsaves will be used when supervised state
This run is configured for baseline tests only.
flight 44231 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44231/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-in
On Tue, 2016-03-08 at 02:10 -0700, Jan Beulich wrote:
> > > > On 07.03.16 at 18:53, wrote:
> > On Mon, 2016-03-07 at 09:40 -0700, Jan Beulich wrote:
> > >
> > IIRC, I was looking at how XEN_SYSCTL_pcitopoinfo is handled, for
> > reference, and that has some guest_handle_is_null()==>EINVAL
> > sai
On 08/03/16 05:32, Wen Congyang wrote:
> xc_save_domain()'s parameter use this type, so it should
> be public.
xc_domain_save() currently uses an int, which also needs fixing.
>
> Signed-off-by: Wen Congyang
Does this even compile? You have removed a variable without any
replacement.
> ---
>
On 03/08/2016 06:38 PM, Andrew Cooper wrote:
> On 08/03/16 05:32, Wen Congyang wrote:
>> xc_save_domain()'s parameter use this type, so it should
>> be public.
>
> xc_domain_save() currently uses an int, which also needs fixing.
OK. Will fix it in the next version.
>
>>
>> Signed-off-by: Wen Co
On Thu, 2016-03-03 at 17:48 +0100, Juergen Gross wrote:
> When schedule_cpu_switch() called from cpupool_unassign_cpu_helper()
> returns an error, the domlist_read_lock isn't released again.
>
> As cpu_disable_scheduler() might have changed affinity of some
> domains domain_update_node_affinity()
On 08/03/16 09:57, Jan Beulich wrote:
On 07.03.16 at 19:12, wrote:
>> --- a/xen/include/asm-arm/domain.h
>> +++ b/xen/include/asm-arm/domain.h
>> @@ -65,6 +65,7 @@ struct arch_domain
>> RELMEM_mapping,
>> RELMEM_done,
>> } relmem;
>> +struct page_list_head relmem_li
This patch set makes the pcidevs_lock a recursive one. It is a prereq
patch set for Patch:'VT-d Device-TLB flush issue', as the pcidevs_lock
may be recursively held for hiding the ATS device, when IOMMU Device-TLB
flush timed out.
In detail:
1. Fix a bug found in AMD IOMMU initialization.
Doing wh
On Fri, Mar 04, 2016 at 01:39:38AM -0700, Jan Beulich wrote:
> >>> On 03.03.16 at 18:59, wrote:
> > On Tue, Mar 01, 2016 at 09:17:25AM -0700, Jan Beulich wrote:
> >> >>> On 25.02.16 at 15:56, wrote:
> >> > --- a/tools/firmware/hvmloader/hvmloader.c
> >> > +++ b/tools/firmware/hvmloader/hvmloader.
Doing what we do serves as a fix for a bug found in AMD IOMMU initialization.
The current code is using spin_lock{_irqsave(), _irqrestore()} to
protect pci_get_dev() in the set_iommu_interrupt_handler(). However,
this can only be called during AMD IOMMU initialization, with interrupt
enabled, so a
Signed-off-by: Quan Xu
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Suravee Suthikulpanit
CC: Aravind Gopalakrishnan
CC: Feng Wu
CC: Kevin Tian
CC: Dario Faggioli
---
xen/arch/x86/domctl.c | 8 +--
xen/arch/x86/hvm/vmsi.c | 4 +-
xen/ar
On 08/03/16 09:54, Jan Beulich wrote:
On 07.03.16 at 19:28, wrote:
>> --- a/tools/include/xen-foreign/Makefile
>> +++ b/tools/include/xen-foreign/Makefile
>> @@ -35,6 +35,8 @@ x86_32.h: mkheader.py structs.py
>> $(ROOT)/arch-x86/xen-x86_32.h $(ROOT)/arch-x86/
>>
>> x86_64.h: mkheader.py s
On Fri, Mar 04, 2016 at 10:57:59AM +, Andrew Cooper wrote:
> On 03/03/16 18:03, Anthony PERARD wrote:
> > In this series, there are plenty of places where one blob loaded by libxl
> > to be consume by hvmloader is called acpi_module or acpi_table... where in
> > fact it is only the DSDT table.
>>> On 08.03.16 at 12:05, wrote:
> The two options are to make relmem_list common, or to remove x86
> specifics from common by introduce arch_free_domheap_page() helpers
> which maintain relmem_list on x86. On second thoughts, this latter
> option seems to be better, as it would also allow the re
>>> On 08.03.16 at 12:19, wrote:
> On 08/03/16 09:54, Jan Beulich wrote:
> On 07.03.16 at 19:28, wrote:
>>> --- a/tools/include/xen-foreign/Makefile
>>> +++ b/tools/include/xen-foreign/Makefile
>>> @@ -35,6 +35,8 @@ x86_32.h: mkheader.py structs.py
>>> $(ROOT)/arch-x86/xen-x86_32.h $(ROOT)/a
On 08/03/16 01:37, Chunyan Liu wrote:
> This patch series is to add pvusb toolstack work, supporting hot add|remove
> USB device to|from guest and specify USB device in domain configuration file.
>
> RESEND to remove a incorrect rc in 4/6:
> +out:
> +path = GCSPRINTF(USBBACK_INFO_PATH "/%s", u
On Thu, 2016-03-03 at 17:48 +0100, Juergen Gross wrote:
> Some hardware (e.g. Dell studio 1555 laptops) require SMIs to be
> called on physical cpu 0 only. Linux drivers like dcdbas or i8k try
> to achieve this by pinning the running thread to cpu 0, but in Dom0
> this is not enough: the vcpu must
>>> On 08.03.16 at 11:34, wrote:
> On Tue, 2016-03-08 at 02:10 -0700, Jan Beulich wrote:
>> > > > On 07.03.16 at 18:53, wrote:
>> > On Mon, 2016-03-07 at 09:40 -0700, Jan Beulich wrote:
>> > >
>> > IIRC, I was looking at how XEN_SYSCTL_pcitopoinfo is handled, for
>> > reference, and that has som
On 07/03/16 15:53, Konrad Rzeszutek Wilk wrote:
> On Mon, Mar 07, 2016 at 11:21:33AM +, George Dunlap wrote:
>> On Fri, Mar 4, 2016 at 10:00 PM, Konrad Rzeszutek Wilk
>> wrote:
+/* Handle VT-d posted-interrupt when VCPU is blocked. */
+static void pi_wakeup_interrupt(struct cpu_user_
On Tue, 2016-03-08 at 19:09 +0800, Quan Xu wrote:
> Doing what we do serves as a fix for a bug found in AMD IOMMU
> initialization.
>
This first line is rather useless, if not worse. :-)
I don't know (provided a new version is not necessary, and provided
maintainers agree with me :-)) whether you
On Tue, 2016-03-08 at 19:09 +0800, Quan Xu wrote:
> Signed-off-by: Quan Xu
> CC: Keir Fraser
> CC: Jan Beulich
> CC: Andrew Cooper
> CC: Suravee Suthikulpanit
> CC: Aravind Gopalakrishnan
> CC: Feng Wu
> CC: Kevin Tian
> CC: Dario Faggioli
>
I've gone through the code, and it looks fine.
On March 08, 2016 8:13pm, wrote:
> On Tue, 2016-03-08 at 19:09 +0800, Quan Xu wrote:
> > Doing what we do serves as a fix for a bug found in AMD IOMMU
> > initialization.
> >
> This first line is rather useless, if not worse. :-)
>
I will remove it in next v2. :)
> I don't know (provided a new v
On March 08, 2016 8:29pm, wrote:
> On Tue, 2016-03-08 at 19:09 +0800, Quan Xu wrote:
> > Signed-off-by: Quan Xu
> > CC: Keir Fraser
> > CC: Jan Beulich
> > CC: Andrew Cooper
> > CC: Suravee Suthikulpanit
> > CC: Aravind Gopalakrishnan
> > CC: Feng Wu
> > CC: Kevin Tian
> > CC: Dario Faggio
flight 85667 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85667/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
build-amd64-rumpuserx
[Adding (back?) George, which wrote and maintains xenalyze, and tracing
in general, and adding ARM people as well, because this is on ARM,
isn't it?]
On Mon, 2016-03-07 at 19:36 +, Ben Sanda wrote:
> it was in a mercurial repo here:
> http://xenbits.xensource.com/ext/xenalyze.hg
>
> but th
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: Tuesday, March 8, 2016 8:02 PM
> To: Konrad Rzeszutek Wilk ; George Dunlap
>
> Cc: Wu, Feng ; Tian, Kevin ; Keir
> Fraser ; Andrew Cooper ; Dario
> Faggioli ; xen-devel@lists.xen.org; Jan Beulich
>
> Su
On Thu, 2016-03-03 at 17:48 +0100, Juergen Gross wrote:
> The hypervisor might return EBUSY when trying to remove a cpu from a
> cpupool when a domain running in this cpupool has pinned a vcpu
> temporarily. Do some retries in this case, perhaps the situation
> cleans up.
>
I now I'm at high risk
On Thu, 2016-03-03 at 17:48 +0100, Juergen Gross wrote:
> An error occurring when calling "xl cpupool-cpu-remove" might leave
> the system in a state where a cpu is neither completely free nor in
> a cpupool. This can easily be repaired by adding the cpu via
> "xl cpupool-cpu-add" to the cpupool wh
On Thu, 2016-03-03 at 17:48 +0100, Juergen Gross wrote:
> In order to be able to undo a vcpu pin override in case of a kernel
> driver error add a flag "-f" to the "xl vcpu-pin" command forcing the
> hypervisor to undo the override.
>
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Wei Liu
> S
>>> On 08.03.16 at 13:39, wrote:
> On March 08, 2016 8:29pm, wrote:
>> On Tue, 2016-03-08 at 19:09 +0800, Quan Xu wrote:
>> > Signed-off-by: Quan Xu
>> > CC: Keir Fraser
>> > CC: Jan Beulich
>> > CC: Andrew Cooper
>> > CC: Suravee Suthikulpanit
>> > CC: Aravind Gopalakrishnan
>> > CC: Feng
>>> On 08.03.16 at 12:09, wrote:
> Doing what we do serves as a fix for a bug found in AMD IOMMU initialization.
>
> The current code is using spin_lock{_irqsave(), _irqrestore()} to
> protect pci_get_dev() in the set_iommu_interrupt_handler(). However,
> this can only be called during AMD IOMMU
On March 08, 2016 9:49pm, wrote:
> >>> On 08.03.16 at 13:39, wrote:
> > On March 08, 2016 8:29pm, wrote:
> >> On Tue, 2016-03-08 at 19:09 +0800, Quan Xu wrote:
> >> > Signed-off-by: Quan Xu
> >> > CC: Keir Fraser
> >> > CC: Jan Beulich
> >> > CC: Andrew Cooper
> >> > CC: Suravee Suthikulpani
On Tue, Mar 8, 2016 at 8:08 AM, Jan Beulich wrote:
On 07.03.16 at 19:07, wrote:
>> On Mon, 2016-03-07 at 04:46 -0700, Jan Beulich wrote:
>>> > > > On 04.03.16 at 19:45, wrote:
>>> > On Fri, 2016-03-04 at 09:48 -0700, Jan Beulich wrote:
>>
>>> > > --- a/tools/libxl/libxl.c
>>> > > +++ b/tool
[Re-adding xen-devel... please, don't drop it. :-)]
On Tue, 2016-03-08 at 13:08 +0530, Harmandeep Kaur wrote:
> On Thu, Feb 25, 2016 at 5:03 PM, Dario Faggioli
> wrote:
> >
>
> > > diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
> > >
> > > @@ -3457,8 +3457,8 @@ int main_vncvi
Signed-off-by: Gerd Hoffmann
Reviewed-by: Stefano Stabellini
---
hw/pci-host/igd.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/hw/pci-host/igd.c b/hw/pci-host/igd.c
index 3654298..8a8b37b 100644
--- a/hw/pci-host/igd.c
+++ b/hw/pci-host/igd.c
@@ -11,9 +11,9 @@ typed
Signed-off-by: Gerd Hoffmann
---
hw/i386/pc_piix.c | 113 --
hw/pci-host/igd.c | 108 +++
2 files changed, 108 insertions(+), 113 deletions(-)
diff --git a/hw/i386/pc_piix.c b/hw/i386/pc_piix.c
in
Signed-off-by: Gerd Hoffmann
Reviewed-by: Stefano Stabellini
Reviewed-by: Eduardo Habkost
---
hw/i386/pc_piix.c | 2 +-
hw/xen/xen_pt.h | 5 +++--
vl.c | 10 --
3 files changed, 4 insertions(+), 13 deletions(-)
diff --git a/hw/i386/pc_piix.c b/hw/i386/pc_piix.c
index 6
Signed-off-by: Gerd Hoffmann
Reviewed-by: Stefano Stabellini
---
hw/pci-host/igd.c | 9 -
1 file changed, 4 insertions(+), 5 deletions(-)
diff --git a/hw/pci-host/igd.c b/hw/pci-host/igd.c
index 331e9e1..93b86ca 100644
--- a/hw/pci-host/igd.c
+++ b/hw/pci-host/igd.c
@@ -56,7 +56,7 @@ ou
Signed-off-by: Gerd Hoffmann
---
hw/pci-host/igd.c | 29 ++---
1 file changed, 26 insertions(+), 3 deletions(-)
diff --git a/hw/pci-host/igd.c b/hw/pci-host/igd.c
index 93b86ca..3654298 100644
--- a/hw/pci-host/igd.c
+++ b/hw/pci-host/igd.c
@@ -56,12 +56,32 @@ out:
r
Pure code motion, except for dropping instance_size for
TYPE_IGD_PASSTHROUGH_I440FX_PCI_DEVICE (no need to set,
we can inherit it from TYPE_I440FX_PCI_DEVICE).
Signed-off-by: Gerd Hoffmann
Acked-by: Stefano Stabellini
---
default-configs/x86_64-softmmu.mak | 1 +
hw/pci-host/Makefile.objs
That way a simple '-device igd-passthrough-isa-bridge,addr=1f' will
do the setup.
Also instead of looking up reasonable PCI IDs based on the graphic
device id simply copy over the ids from the host, thereby reusing the
infrastructure we have in place for the igd host bridges. Less code,
and shoul
flight 85673 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85673/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 11 guest-start fail like 85533
build-i386-rumpuserxen
Move all work to the host_pci_config_copy helper function,
which we can easily reuse when adding q35 support.
Open sysfs file only once for all values. Use pread.
Proper error handling.
Fix bug: Update config space directly (writing via
pci_default_write_config only works for registers
whitelist
Hi,
Next version of the patches, after a longish break.
Meanwhile it is more clear how we are going to handle the igd
passthrough quirks with kvm: vfio will get support for device-specific
regions, and we will use that for the opregion and also to provide
unpriviledged read access to host brid
This is just a test of the mailman bounce mechanism: I want to be sure
that I receive bounce messages (they have been filtered by SUSE's mail
server).
Please don't accept, reject or discard this message. I'll do it myself.
In case it makes it to the list: please ignore. :-)
Juergen
___
On Tue, Mar 8, 2016 at 1:10 PM, Wu, Feng wrote:
>> -Original Message-
>> From: George Dunlap [mailto:george.dun...@citrix.com]
[snip]
>> It seems like there are a couple of ways we could approach this:
>>
>> 1. Try to optimize the reverse look-up code so that it's not a linear
>> linked li
On 3/8/16 8:35 AM, Juergen Gross wrote:
> This is just a test of the mailman bounce mechanism: I want to be sure
> that I receive bounce messages (they have been filtered by SUSE's mail
> server).
>
> Please don't accept, reject or discard this message. I'll do it myself.
>
> In case it makes it
Hello.
How can I test Xen and report bug? Can it need programming?
Tnx.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Nested hap code assumed implict bitmask semantics of the p2m_access_t
enum prior to C/S 4c63692d7c38c5ac414fe97f8ef37b66e05abe5c
The change to the enum ordering broke this assumption and caused functional
problems for the nested hap code. As it may be error prone to audit and find
all other p2m_ac
On 08/03/16 15:30, Malcolm Crossley wrote:
> Nested hap code assumed implict bitmask semantics of the p2m_access_t
> enum prior to C/S 4c63692d7c38c5ac414fe97f8ef37b66e05abe5c
>
> The change to the enum ordering broke this assumption and caused functional
> problems for the nested hap code. As it m
On Mon, Mar 07, 2016 at 08:23:39PM -0600, Doug Goldstein wrote:
> Some versions of GCC complain that the 'firmware' variable can be used
> uninitialized. It looks like the switch inside of the else case is just
> confusing GCC.
>
> Signed-off-by: Doug Goldstein
Acked-by: Wei Liu
> ---
> CC: Ia
On Mon, Mar 07, 2016 at 08:23:40PM -0600, Doug Goldstein wrote:
> The build should not use -O0 as that results in miscompilations. There
This needs some (concrete) references. Is that a known issue in gcc? If
so can you reference the bug number?
> have been a few instances on the ML where users w
>>> On 08.03.16 at 15:42, wrote:
> On Tue, Mar 8, 2016 at 1:10 PM, Wu, Feng wrote:
>>> -Original Message-
>>> From: George Dunlap [mailto:george.dun...@citrix.com]
> [snip]
>>> It seems like there are a couple of ways we could approach this:
>>>
>>> 1. Try to optimize the reverse look-up
>>> On 08.03.16 at 16:30, wrote:
> Nested hap code assumed implict bitmask semantics of the p2m_access_t
> enum prior to C/S 4c63692d7c38c5ac414fe97f8ef37b66e05abe5c
>
> The change to the enum ordering broke this assumption and caused functional
> problems for the nested hap code. As it may be er
On Thu, Mar 03, 2016 at 05:12:07PM +, Anthony PERARD wrote:
> On Tue, Mar 01, 2016 at 11:51:43AM +, Wei Liu wrote:
> > On Thu, Feb 25, 2016 at 02:56:04PM +, Anthony PERARD wrote:
> > > A user can provide a different ACPI tables than the default one by using
> > > the existing "acpi_firm
On Thu, Mar 03, 2016 at 05:03:00PM +, Anthony PERARD wrote:
> On Tue, Mar 01, 2016 at 11:51:36AM +, Wei Liu wrote:
> > On Thu, Feb 25, 2016 at 02:56:01PM +, Anthony PERARD wrote:
> > > Those paths are to be used by libxl, in order to load the firmware in
> > > memory. If a system path i
On Thu, Mar 03, 2016 at 05:48:50PM +0100, Juergen Gross wrote:
[...]
> int libxl_set_vcpuaffinity_all(libxl_ctx *ctx, uint32_t domid,
> unsigned int max_vcpus,
> const libxl_bitmap *cpumap_hard,
> diff --git a/tools/libxl/libxl.h b/to
On Thu, Mar 03, 2016 at 05:48:49PM +0100, Juergen Gross wrote:
> An error occurring when calling "xl cpupool-cpu-remove" might leave
> the system in a state where a cpu is neither completely free nor in
> a cpupool. This can easily be repaired by adding the cpu via
> "xl cpupool-cpu-add" to the cpu
On Tue, Mar 8, 2016 at 4:52 PM, Jan Beulich wrote:
> >>> On 08.03.16 at 16:30, wrote:
> > Nested hap code assumed implict bitmask semantics of the p2m_access_t
> > enum prior to C/S 4c63692d7c38c5ac414fe97f8ef37b66e05abe5c
> >
> > The change to the enum ordering broke this assumption and caused
On Tue, Mar 08, 2016 at 02:05:01PM +, George Dunlap wrote:
> On Tue, Mar 8, 2016 at 8:08 AM, Jan Beulich wrote:
> On 07.03.16 at 19:07, wrote:
> >> On Mon, 2016-03-07 at 04:46 -0700, Jan Beulich wrote:
> >>> > > > On 04.03.16 at 19:45, wrote:
> >>> > On Fri, 2016-03-04 at 09:48 -0700, J
On 08/03/16 16:58, Wei Liu wrote:
> On Thu, Mar 03, 2016 at 05:48:50PM +0100, Juergen Gross wrote:
> [...]
>> int libxl_set_vcpuaffinity_all(libxl_ctx *ctx, uint32_t domid,
>> unsigned int max_vcpus,
>> const libxl_bitmap *cpumap_hard
On 08/03/16 14:16, Dario Faggioli wrote:
> On Thu, 2016-03-03 at 17:48 +0100, Juergen Gross wrote:
>> The hypervisor might return EBUSY when trying to remove a cpu from a
>> cpupool when a domain running in this cpupool has pinned a vcpu
>> temporarily. Do some retries in this case, perhaps the sit
On Fri, Mar 04, 2016 at 09:47:32AM -0700, Jan Beulich wrote:
> Signed-off-by: Jan Beulich
>
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 03/08/2016 04:46 AM, Jan Beulich wrote:
On 07.03.16 at 19:42, wrote:
Have Kconfig set CONFIG_FLASK_AVC_STATS and prefix all uses with CONFIG_
to use the Kconfig variable.
Same question here: What's the benefit of doing it this way?
This removes the stats tracking, which might (I have not
On 03/07/2016 01:42 PM, Doug Goldstein wrote:
Let Kconfig set the XSM_MAGIC value for us.
Signed-off-by: Doug Goldstein
This is not the best place to define this constant: it doesn't
make sense for it to be user-configurable. If you want to move it
out of config.h, I think the best solution
On Fri, Mar 04, 2016 at 09:48:16AM -0700, Jan Beulich wrote:
> This is pretty simplistic for now, but I'd rather have someone better
> friends with the tools improve it (if desired).
>
> Signed-off-by: Jan Beulich
>
> --- a/tools/libxl/libxl.c
> +++ b/tools/libxl/libxl.c
> @@ -5958,6 +5958,26 @@
On 3/8/16 9:38 AM, Wei Liu wrote:
> On Mon, Mar 07, 2016 at 08:23:40PM -0600, Doug Goldstein wrote:
>> The build should not use -O0 as that results in miscompilations. There
>
> This needs some (concrete) references. Is that a known issue in gcc? If
> so can you reference the bug number?
So its n
On 03/01/2016 04:00 AM, Jim Fehlig wrote:
> Most hypervisors use Hardware Assisted Paging by default and don't
> require specifying the feature in domain conf. But some hypervisors
> support disabling HAP on a per-domain basis. To enable HAP by default
> yet provide a knob to disable it, extend t
On 03/01/2016 04:00 AM, Jim Fehlig wrote:
> hap is enabled by default in xm and xl config and usually only
> specified when it is desirable to disable hap (hap = 0). Change
> the xm,xl <-> xml converter to behave similarly. I.e. only
> produce 'hap = 0' when and vice versa.
>
> Signed-off-by: J
On 03/01/2016 04:00 AM, Jim Fehlig wrote:
> Until now, the libxl driver ignored any setting in domain XML
> and deferred to libxl, which enables hap if not specified. While
> this is a good default, it prevents disabling hap if desired.
>
> This change allows disabling hap with . hap is
> expli
On 03/01/2016 04:00 AM, Jim Fehlig wrote:
> Hardware Assisted Paging is enabled by default in Xen. Change
> the capabilities output to reflect this.
>
> Signed-off-by: Jim Fehlig
> ---
> src/libxl/libxl_conf.c | 2 +-
> src/xen/xen_hypervisor.c | 2 +-
> 2 files changed, 2 insertions(+), 2 d
Hi Andrei,
On 8 March 2016 at 14:54, Andrei Borzenkov wrote:
> 07.03.2016 11:22, Fu Wei пишет:
>> Hi Andrei,
>>
>> On 28 February 2016 at 00:44, Fu Wei wrote:
>>> Hi Andrei
>>>
>>> On 28 February 2016 at 01:26, Andrei Borzenkov wrote:
26.02.2016 14:13, fu@linaro.org пишет:
> From:
On Fri, Mar 04, 2016 at 04:38:23PM +, Ian Jackson wrote:
> Changlong Xie writes ("[PATCH v11 03/27] tools/libxl: Add back channel to
> allow migration target send data back"):
> > From: Wen Congyang
> >
> > In COLO mode, secondary needs to send the following data to primary:
> > 1. In libxl
On Fri, Mar 04, 2016 at 04:51:20PM +, Ian Jackson wrote:
[...]
>
> > @@ -212,6 +214,11 @@ class VerifyLibxl(VerifyBase):
> > if len(content) != 0:
> > raise RecordError("Checkpoint end record with non-zero length")
> >
> > +def verify_record_checkpoint_state(self, c
On Fri, Mar 04, 2016 at 05:26:44PM +, Ian Jackson wrote:
> Changlong Xie writes ("[PATCH v11 19/27] COLO: introduce new API to
> prepare/start/do/get_error/stop replication"):
> > From: Wen Congyang
> >
> > We will use qemu block replication, and qemu provides some qmp commands
> > to prepar
On Tue, Mar 08, 2016 at 10:34:42AM -0600, Doug Goldstein wrote:
> On 3/8/16 9:38 AM, Wei Liu wrote:
> > On Mon, Mar 07, 2016 at 08:23:40PM -0600, Doug Goldstein wrote:
> >> The build should not use -O0 as that results in miscompilations. There
> >
> > This needs some (concrete) references. Is that
>>> On 08.03.16 at 17:22, wrote:
> On 03/08/2016 04:46 AM, Jan Beulich wrote:
> On 07.03.16 at 19:42, wrote:
>>> Have Kconfig set CONFIG_FLASK_AVC_STATS and prefix all uses with CONFIG_
>>> to use the Kconfig variable.
>>
>> Same question here: What's the benefit of doing it this way?
>
> Th
On 08/03/16 15:42, Jan Beulich wrote:
On 08.03.16 at 15:42, wrote:
>> On Tue, Mar 8, 2016 at 1:10 PM, Wu, Feng wrote:
-Original Message-
From: George Dunlap [mailto:george.dun...@citrix.com]
>> [snip]
It seems like there are a couple of ways we could approach this:
>>>
08.03.2016 19:37, Fu Wei пишет:
> Hi Andrei,
>
> On 8 March 2016 at 14:54, Andrei Borzenkov wrote:
>> 07.03.2016 11:22, Fu Wei пишет:
>>> Hi Andrei,
>>>
>>> On 28 February 2016 at 00:44, Fu Wei wrote:
Hi Andrei
On 28 February 2016 at 01:26, Andrei Borzenkov wrote:
> 26.02.201
On 08/03/16 01:37, Chunyan Liu wrote:
> Add pvusb APIs, including:
> - attach/detach (create/destroy) virtual usb controller.
> - attach/detach usb device
> - list usb controller and usb devices
> - some other helper functions
>
> Signed-off-by: Simon Cao
> Signed-off-by: George Dunlap
> Sig
On Thu, 2016-03-03 at 17:48 +0100, Juergen Gross wrote:
> In order to be able to undo a vcpu pin override in case of a kernel
> driver error add a flag "-f" to the "xl vcpu-pin" command forcing the
> hypervisor to undo the override.
>
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Wei Liu
> S
On 08/03/16 18:16, Dario Faggioli wrote:
> On Thu, 2016-03-03 at 17:48 +0100, Juergen Gross wrote:
>> In order to be able to undo a vcpu pin override in case of a kernel
>> driver error add a flag "-f" to the "xl vcpu-pin" command forcing the
>> hypervisor to undo the override.
>>
>> Cc: Ian Jackso
On Mon, Mar 07, 2016 at 10:10:07AM +0800, Wen Congyang wrote:
> On 03/05/2016 04:30 AM, Konrad Rzeszutek Wilk wrote:
> > On Fri, Mar 04, 2016 at 05:52:09PM +, Ian Jackson wrote:
> >> Changlong Xie writes ("[PATCH v11 20/27] Support colo mode for qemu disk"):
> >>> +Enable COLO HA for disk. For
>>> On 08.03.16 at 18:05, wrote:
> On 08/03/16 15:42, Jan Beulich wrote:
> On 08.03.16 at 15:42, wrote:
>>> On Tue, Mar 8, 2016 at 1:10 PM, Wu, Feng wrote:
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
>
> 2. Try to test engineered situa
On 07/03/16 16:21, Jan Beulich wrote:
On 07.03.16 at 17:11, wrote:
>> On 07/03/16 15:56, Jan Beulich wrote:
>> On 07.03.16 at 16:43, wrote:
On 04/03/16 11:27, Jan Beulich wrote:
> Make sure the near JMP/CALL check doesn't consume uninitialized
> data, not even in a benign wa
On 03/08/2016 11:51 AM, Jan Beulich wrote:
On 08.03.16 at 17:22, wrote:
On 03/08/2016 04:46 AM, Jan Beulich wrote:
On 07.03.16 at 19:42, wrote:
Have Kconfig set CONFIG_FLASK_AVC_STATS and prefix all uses with CONFIG_
to use the Kconfig variable.
Same question here: What's the benefit of do
On Tue, 2016-03-08 at 14:05 +, George Dunlap wrote:
> On Tue, Mar 8, 2016 at 8:08 AM, Jan Beulich
> wrote:
> >
> > Right, and asking people myself to not follow bad examples when
> > adding new code, I did take all of your input to adjust the patch.
> > Just that in this case the set of bad e
All,
To update to the current situation. I have been able to get xentrace() and
xenalyze working completely (at least as far as I can tell) on ARM.
For xentrace there were changes to the memory allocation routines to allow
mapping of the Xen Heap by dom0, correcting the MFN->PFN translations, add
1 - 100 of 157 matches
Mail list logo