>>> On 17.03.16 at 13:44, wrote:
> On 03/17/16 05:04, Jan Beulich wrote:
>> >>> On 17.03.16 at 09:58, wrote:
>> > On 03/16/16 09:23, Jan Beulich wrote:
>> >> >>> On 16.03.16 at 15:55, wrote:
>> >> > On 03/16/16 08:23, Jan Beulich wrote:
>> >> >> >>> On 16.03.16 at 14:55, wrote:
>> >> >> > On 03
Hi,
I have a question about the network setup with COLO.
so in the colo page(
http://wiki.xenproject.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping)
it shows a network topology graph:
master:
br0: 192.168.0.33
eth1: 192.168.1.33
eth2: 192.168.2.33
slave:
br0: 192.168.0.88
br1: no ip address
eth1:
[[PATCH v2 0/5] xen: avoid module usage in non-modular code] On 21/02/2016 (Sun
19:06) Paul Gortmaker wrote:
> This series of commits is a part of a larger project to ensure
> people don't reference modular support functions in non-modular
> code. Overall there was roughly 5k lines of dead code
On March 17, 2016 4:14pm, wrote:
> >>> On 17.03.16 at 09:11, wrote:
> > On March 17, 2016 3:45pm, Tian, Kevin wrote:
> >> > From: Xu, Quan
> >> > Sent: Thursday, March 17, 2016 3:13 PM diff --git
> >> > a/xen/drivers/passthrough/vtd/qinval.c
> >> > b/xen/drivers/passthrough/vtd/qinval.c
> >> >
this patch set is a prereq patch set for Patch:'VT-d Device-TLB flush issue'.
Current code would be panic(), when VT-d Device-TLB flush timed out. the panic()
is going to be eliminated, so we must check all kinds of error and all the way
up
the call trees.
Quan Xu (2):
IOMMU/MMU: Adjust top lev
Trim CC list
On Fri, Mar 18, 2016 at 05:18:11PM +0100, Fabio Fantoni wrote:
> Il 18/03/2016 13:07, Wei Liu ha scritto:
> >Hi all
> >
> >Today is that last posting day for new features. And we are two weeks
> >away from the anticipated freeze date.
> >
> >I've gone through the outstanding patch ser
> -Original Message-
> From: Bob Liu [mailto:bob@oracle.com]
> Sent: 16 March 2016 13:59
> To: Ian Jackson
> Cc: xen-devel@lists.xen.org; Paul Durrant; konrad.w...@oracle.com;
> jgr...@suse.com; Roger Pau Monne; annie...@oracle.com
> Subject: Re: [RFC PATCH] blkif.h: document scsi/0x12/
On Thu, 2016-03-17 at 17:06 -0700, Luis R. Rodriguez wrote:
> On Mar 17, 2016 2:04 PM, "Toshi Kani" wrote:
> >
> > On Wed, 2016-03-16 at 00:29 +0100, Luis R. Rodriguez wrote:
> > > On Tue, Mar 15, 2016 at 05:48:44PM -0600, Toshi Kani wrote:
> > > > On Tue, 2016-03-15 at 01:15 +0100, Luis R. Rodri
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 17 March 2016 08:12
> To: Paul Durrant
> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
> Subject: RE: [PATCH v2] x86/hvm/viridian: fix the TLB flush hypercall
>
> >>> On 16.03.16 at 18:35, wrot
Current code would be panic(), when VT-d Device-TLB flush timed out.
the panic() is going to be eliminated, so we must check all kinds of
error and all the way up the call trees.
Signed-off-by: Quan Xu
CC: Jan Beulich
CC: Liu Jinsong
CC: Keir Fraser
CC: Andrew Cooper
CC: Jun Nakajima
CC: Ke
On Thu, Mar 17, 2016 at 6:22 PM, Ian Jackson wrote:
> George Dunlap writes ("[PATCH 5/8] libxl: Share logic for finding path
> between qemuu and pygrub"):
>> From: George Dunlap
>
> Thanks. There are a few format inconsistencies (long lines, spaces)
> which I won't enumerate.
>
>> * In the case
On Wed, Mar 16, 2016 at 12:12:00PM +, Julien Grall wrote:
> Hi Konrad,
>
> On 15/03/2016 17:56, Konrad Rzeszutek Wilk wrote:
> >diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> >index 8fbc46d..dbe9ccc 100644
> >--- a/xen/common/Kconfig
> >+++ b/xen/common/Kconfig
> >@@ -168,4 +168,15 @@
Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
to independently get and set the scheduling parameters of each
vCPU of a domain
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v6:
1) Add explain for nr_vcpus in struct xen_domctl_schedul
flight 44257 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44257/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-armhf-jessie-netboot-pygrub 3 host-install(3) broken blocked
in 44240
test-am
Allows expert users to disable tmem via Kconfig. Incorporates feedback
from Jan and Konrad. Patch 2 & 3 from v1 were merged and patch 4 was
dropped.
Doug Goldstein (3):
tmem: add tmem_disable() function
tmem: drop direct usage of opt_tmem
tmem: allow tmem to be disabled with Kconfig
xen/a
Hey,
This series is a repost with the comments that I got so far and
hopefully could be considered for Xen 4.7.
PVCLOCK_TSC_STABLE_BIT is the flag telling the guest that the
vcpu_time_info (pvti) are monotonic as seen by any CPU, a feature
which is currently not supported. As it is (i.e. bindly s
This run is configured for baseline tests only.
flight 44249 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44249/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 9 debian-di-ins
flight 86624 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86624/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 60684
build-i386
On Wed, 2016-03-16 at 11:47 -0500, Chong Li wrote:
> Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
> functions to support per-VCPU settings.
>
And a couple more things that I forgot.
I'd shorten the subject line, as already suggested for libxc.
> +/* Get the RTDS scheduling par
> -Original Message-
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: 16 March 2016 17:44
> To: xen-de...@lists.xenproject.org
> Cc: Paul Durrant; Keir (Xen.org); Jan Beulich; Andrew Cooper
> Subject: [PATCH v3 1/2] x86/hvm/viridian: keep APIC assist page mapped...
>
> ... for
On Fri, Mar 18, 2016 at 06:40:31AM -0600, Jan Beulich wrote:
> >>> On 15.03.16 at 18:56, wrote:
> > --- a/xen/include/asm-arm/bug.h
> > +++ b/xen/include/asm-arm/bug.h
> > @@ -31,6 +31,7 @@ struct bug_frame {
> > #define BUGFRAME_warn 0
> > #define BUGFRAME_bug1
> > #define BUGFRAME_asser
flight 86477 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86477/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
> Then there is another problem (which also exists in the current
> design): does Xen need to emulate NVDIMM _DSM for dom0? Take the _DSM
> that access label storage area (for namespace) for example:
No. And it really can't as each vendors _DSM is different - and there
is no ACPI AML interpreter i
On 2016/3/17 19:31, Jan Beulich wrote:
On 17.03.16 at 12:03, wrote:
>> > On 2016/3/17 18:52, Jan Beulich wrote:
>> > On 17.03.16 at 10:41, wrote:
> >>> > --- a/xen/include/asm-arm/config.h
> >>> > +++ b/xen/include/asm-arm/config.h
> >>> > @@ -31,6 +31,10 @@
> >>> >
On 17/03/16 10:25, Jan Beulich wrote:
On 16.03.16 at 21:05, wrote:
>> @@ -1742,8 +1742,10 @@ static void load_segments(struct vcpu *n)
>> cs_and_mask = (unsigned short)regs->cs |
>> ((unsigned int)vcpu_info(n, evtchn_upcall_mask) << 16);
>> /* Fold u
flight 86434 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86434/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 3 host-install(3) broken REGR. vs. 86376
test-armhf-armhf-xl-
On 2016/3/17 19:29, Jan Beulich wrote:
On 17.03.16 at 12:04, wrote:
>> On 2016/3/17 18:42, Jan Beulich wrote:
>> On 17.03.16 at 10:41, wrote:
> --- a/xen/include/public/hvm/params.h
> +++ b/xen/include/public/hvm/params.h
> @@ -49,11 +49,24 @@
> * Domain = val[47:32],
From: Shannon Zhao
Copy main MADT table contents and distributor subtable from physical
ACPI MADT table. Make other subtables through the callback of
gic_hw_ops.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 50 ++
TRAPBOUNCE_flags are always available via a displacement from %rdx. This
allows all of %rcx to be used as a scratch register.
No functional change.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/x86_64/compat/entry.S | 5 ++---
xen/arch/x86/x86_64/entry.S| 5 ++
On Wed, Mar 16, 2016 at 05:08:30AM -0600, Jan Beulich wrote:
> >>> On 15.03.16 at 18:56, wrote:
> > It is not used.
>
> Consistently please - either keep them all (just to cover the case
> that they might get used) or remove them all: xen_compile_info,
> xen_changeset_info, etc are all unused too
This patch allows xenstore-watch to exit even if no changes to its
XenStore key have occured in a specified interval (in seconds), via
a new -T parameter.
Signed-off-by: Razvan Cojocaru
---
tools/xenstore/xenstore_client.c | 64 ++--
1 file changed, 48 inserti
>>> On 17.03.16 at 09:58, wrote:
> On 03/16/16 09:23, Jan Beulich wrote:
>> >>> On 16.03.16 at 15:55, wrote:
>> > On 03/16/16 08:23, Jan Beulich wrote:
>> >> >>> On 16.03.16 at 14:55, wrote:
>> >> > On 03/16/16 07:16, Jan Beulich wrote:
>> >> >> And
>> >> >> talking of fragmentation - how do you
Konrad Rzeszutek Wilk writes ("[PATCH v4 08/34] vmap: Make the while loop less
fishy."):
> error:
> -while ( i-- )
> -free_domheap_page(mfn_to_page(mfn_x(mfn[i])));
> +while ( i )
> +free_domheap_page(mfn_to_page(mfn_x(mfn[--i])));
I quite strongly dislike this. It is g
The human running this script might want to update a suite-specific
value, or the global value. Print an example of the suite-specific
value too.
No functional change other than to example config output.
Signed-off-by: Ian Jackson
---
mg-debian-installer-update |1 +
1 file changed, 1 inse
On Wed, Mar 16, 2016 at 11:47:49AM -0500, Chong Li wrote:
> Add xc_sched_rtds_vcpu_get/set functions to interact with
> Xen to get/set a domain's per-VCPU parameters.
>
> Signed-off-by: Chong Li
> Signed-off-by: Meng Xu
> Signed-off-by: Sisu Xi
Acked-by: Wei Liu
_
If image requested EFI boot services then skip multiboot2 memory maps.
Main reason for not providing maps is because they will likely be
invalid. We do a few allocations after filling them, e.g. for relocator
needs. Usually we do not care as we would have finished boot services.
If we keep boot ser
On 17/03/16 15:32, Jan Beulich wrote:
On 17.03.16 at 15:44, wrote:
>> On 17/03/16 14:31, Jan Beulich wrote:
>>> Also - do we really want to make this code dependent on
>>> map_pages_to_xen() not intermediately zapping the mappings
>>> being changed?
>> Do you mean "immediately"?
> No.
>
>> As
Jan Beulich writes ("Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for
Xen"):
> So that again leaves unaddressed the question of what you
> imply to do when a guest elects to use such a page as page
> table. I'm afraid any attempt of yours to invent something that
> is not struct page_info
That will turn out useful in following patches, where such
code will need to be called more than just once. Create an
helper now, and move the code there, to avoid mixing code
motion and functional changes later.
In Credit2, some style cleanup is also done.
No functional change intended.
Signed-
From: Shannon Zhao
When running on Xen hypervisor, runtime services are supported through
hypercall. Add a Xen specific function to initialize runtime services.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/include/asm/xen/xen-ops.h | 6 ++
arch/arm/xen/Makef
On 03/15/2016 08:18 PM, Konrad Rzeszutek Wilk wrote:
On Mon, Mar 14, 2016 at 05:55:37PM +, Anthony PERARD wrote:
@@ -624,8 +628,6 @@ static int alloc_magic_pages_hvm(struct xc_dom_image *dom)
if ( !dom->device_model )
{
-size_t start_info_size = sizeof(struct hvm_
i'm trying to run xen on omap5 and installing some guests .. it seems it
works and a xen boot dom0 as shown the screen shot
but with this arago project i can't download any package ..all commands
such as apt-get ,update ... are not found
i tried to have another file system but its not working ..
c
On 16/03/16 13:00, Paul Durrant wrote:
> Commit b38d426a "flush remote tlbs by hypercall" add support to allow
> Windows to request flush of remote TLB via hypercall rather than IPI.
> Unfortunately it seems that this code was broken in a couple of ways:
>
> 1) The allocation of the per-vcpu flush
>>> On 18.03.16 at 11:06, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 17 March 2016 16:43
>> >>> On 17.03.16 at 13:13, wrote:
>> > @@ -1170,10 +1183,27 @@ int vlapic_has_pending_irq(struct vcpu *v)
>> > !nestedhvm_vcpu_in_guestmode(v) )
>> > return irr;
>> >
flight 86513 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86513/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-buildfail like 85493
build-i386-rumpuserxen6
In order for HVM domains to provide emulated access to disks provided
by hotplug scripts, qemu needs access to a "cooked" version of the
disk. In the case of hotplug scripts, this "cooked" version is
available in the form of a block device passed to blkback. Make this
"cooked" version available t
Hi,
> > Ian, thanks for your reply! It looks like the problem is how and when to
> > clear PV resources in seabios before handing over to guest. But I wonder
> > why virtio works in seabios. Does seabios using virtio need to clear
> > things like vrings? Or seabios doesn't clear the things and g
On 18/03/16 19:06, Dario Faggioli wrote:
> like what's there already in both Credit1 and RTDS. In
> fact, when playing with affinity, a lot of cpumask
> manipulation is necessary, inside of various functions.
>
> To avoid having a lot of cpumask_var_t on the stack,
> this patch introduces a global
On 03/16/2016 10:09 AM, George Dunlap wrote:
> Signed-off-by: George Dunlap
> ---
> CC: Ian Jackson
> CC: Wei Liu
> CC: Roger Pau Monne
> ---
> docs/misc/block-scripts.txt | 100
>
> 1 file changed, 100 insertions(+)
>
> diff --git a/docs/misc/bloc
On Fri, Mar 18, 2016 at 7:07 AM, Wei Liu wrote:
> Hi all
>
> Today is that last posting day for new features. And we are two weeks
> away from the anticipated freeze date.
>
> I've gone through the outstanding patch series on the list and ask for
> input from various core community members. I've e
Hi all
Today is that last posting day for new features. And we are two weeks
away from the anticipated freeze date.
I've gone through the outstanding patch series on the list and ask for
input from various core community members. I've enumerated a list
here, which covers several areas of this rel
This is slightly more efficient than loading 64-bit quantities.
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
--- a/xen/include/asm-x86/asm_defns.h
+++ b/xen/include/asm-x86/asm_defns.h
@@ -313,6 +313,13 @@ static always_inline void stac(void)
987:
.endm
+#define LOAD_ONE_REG(reg, c
On 03/05/2016 02:01 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 23/27] COLO proxy: preresume, postresume and
checkpoint"):
From: Wen Congyang
preresume, postresume and checkpoint
I think maybe this needs to be combined with the previous patch ?
Surely
Thanks
-Xie
The existing vIOPL interface is hard to use, and need not be.
Introduce a VMASSIST with which a guest can opt-in to having vIOPL behaviour
consistenly with native hardware.
Specifically:
- virtual iopl updated from do_iret() hypercalls.
- virtual iopl reported in bounce frames.
- guest kernels
From: Shannon Zhao
Add a bus_notifier for platform bus device in order to map the device
mmio regions when DOM0 booting with ACPI.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
drivers/xen/Makefile | 1 +
drivers/xen/arm-device.c | 141
>>> On 15.03.16 at 16:35, wrote:
> Some bits in a featureset are not simple a indication of new functionality,
> and require special handling.
>
> APIC, OSXSAVE and OSPKE are fast-forwards of other pieces of state;
> IA32_APIC_BASE.EN, CR4.OSXSAVE and CR4.OSPKE. Xen will take care of filling
> t
Now that Xen no longer allocates irqs in _cpu_up() we can restore
commit a89941816726 ("hotplug: Prevent alloc/free of irq descriptors
during cpu up/down")
Signed-off-by: Boris Ostrovsky
---
arch/x86/kernel/smpboot.c | 11 ---
kernel/cpu.c |8
2 files changed,
On Fri, Mar 18, 2016 at 10:32:30AM +, Paul Durrant wrote:
> This patch adds code to enable the APIC assist enlightenment which,
> under certain conditions, means that the guest can avoid an EOI of
> the local APIC and thereby avoid a VMEXIT.
>
> Use of the enlightenment by the hypervisor is un
In preparation to fix a regression caused by 'commit 9cd25aac1f44
("x86/mm/pat: Emulate PAT when it is disabled")', PAT needs to
provide an interface that disables the OS to initialize PAT MSR.
PAT MSR initialization must be done on all CPUs with the specific
sequence of operations defined in Inte
>>> On 17.03.16 at 13:43, wrote:
> --- a/xen/arch/x86/setup.c
> +++ b/xen/arch/x86/setup.c
> @@ -529,9 +529,33 @@ static void noinline init_done(void)
> }
> else
> {
> +/* Mark .text as RX (avoiding the first 2M superpage). */
> +map_pages_to_xen(XEN_VIRT_START + MB(
On 17/03/16 17:53, George Dunlap wrote:
> On Thu, Mar 10, 2016 at 3:00 PM, Juergen Gross wrote:
>> libxl__need_xenpv_qemu() is called with configuration data for console,
>> vfbs, disks and channels today in order to evaluate the need for
>> starting a device model for a pv domain.
>>
>> The conso
On 3/8/16 10:50 AM, Wei Liu wrote:
> On Tue, Mar 08, 2016 at 10:34:42AM -0600, Doug Goldstein wrote:
>> On 3/8/16 9:38 AM, Wei Liu wrote:
>>> On Mon, Mar 07, 2016 at 08:23:40PM -0600, Doug Goldstein wrote:
The build should not use -O0 as that results in miscompilations. There
>>>
>>> This need
On 03/05/2016 01:29 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 19/27] COLO: introduce new API to
prepare/start/do/get_error/stop replication"):
From: Wen Congyang
We will use qemu block replication, and qemu provides some qmp commands
to prepare replication, start replication, g
On Fri, Mar 18, 2016 at 05:55:55AM -0600, Jan Beulich wrote:
> >>> On 15.03.16 at 18:56, wrote:
> > @@ -223,12 +224,15 @@ void __init do_initcalls(void)
> > /*
> > * Simple hypercalls.
> > */
> > -
> > DO(xen_version)(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
>
> Please retain the blank li
George Dunlap writes ("[PATCH 2/8] libxl: Remove redundant setting of
phyical-device"):
> Regardless of whether we're running a custom hotplug script or using
> normal phy: or file:, the "block" script will be run, which will set
> all the necessary xenstore nodes.
>
> In fact, writing this value
flight 86369 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86369/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-xsm 14 guest-saver
On March 17, 2016 8:30pm, wrote:
> On Thu, Mar 17, 2016 at 6:54 AM, Quan Xu wrote:
> > diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index
> > c997b53..526548e 100644
> > --- a/xen/arch/x86/mm.c
> > +++ b/xen/arch/x86/mm.c
> > @@ -2467,7 +2467,7 @@ static int __get_page_type(struct page_info
This run is configured for baseline tests only.
flight 44256 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44256/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl 19 guest-start/debian.repe
flight 86626 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86626/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
build-amd64-rumpuserx
flight 86362 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86362/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 85884
test-amd64-i386-xl-qemuu-win
by using the sched_switch hook that we have introduced in
the various schedulers.
The key is to let the actual switch of scheduler and the
remapping of the scheduler lock for the CPU (if necessary)
happen together (in the same critical section) protected
(at least) by the old scheduler lock for th
Most callers of tmem_freeable_pages() checked to see if by checking
opt_tmem before calling tmem_freeable_pages() but not all of them did. This
seemed like an oversight and to avoid similar situations like that,
stick the check of tmem into tmem_freeable_pages(). Similarly other
places should not d
Hello Benjamin,
Thank you for the patch.
On 16/03/16 20:51, Benjamin Sanda wrote:
From: bensanda
Modified p2m_lookup() to provide support for xentrace on the ARM platform.
Added check for DOMID_XEN which skips PFN to MFN translation. xentrace sends a
MFN dirrectly when requesting DOMID_XEN,
From: Shannon Zhao
Add a new member in gic_hw_operations which is used to creat MADT table
for Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/gic-v2.c | 34 ++
xen/arch/arm/gic-v3.c | 47 ++
>> This is too detailed for a changelog. If you want this information to
>> live somewhere (it already lives in the list archives, actually), make
>> a cover letter (this is just one patch, so it's not required, but
>> nothing forbids that). Or put it in a wiki page. Or write a blog post.
>> Or (wh
>>> On 18.03.16 at 10:38, wrote:
> On Fri, 2016-03-18 at 03:29 -0600, Jan Beulich wrote:
>> >
>> Not sure what exactly you're asking for: As said, we first need to
>> settle on an abstract model. Do we want IOMMU mapping failures
>> to be fatal to the domain (perhaps with the exception of the
>>
... for the lifetime of the domain.
If Xen is to make use of the APIC assist enlightenment then a persistent
mapping needs to be kept, rather than the temporary one which is currently
used only to initialize the page content.
This patch also adds a comment block at the top of the source with
info
On Wed, 2016-03-16 at 10:37 -0400, Meng Xu wrote:
> On Wed, Mar 16, 2016 at 4:23 AM, Dario Faggioli
> wrote:
> >
> > I continue to think that it could be useful to have this logged,
> > but
> > I'm leaning toward just killing it for now (and maybe finding
> > another
> > way to check and warn abo
flight 86411 linux-3.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86411/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stopfail REGR. vs. 85851
build-i386-rumpuserxen6
On Fri, Mar 18, 2016 at 08:55:16AM -0700, PGNet Dev wrote:
> On 03/18/2016 08:48 AM, Wei Liu wrote:> The log message isn't necessarily
> indication for a bug.
> >
> >OVMF is huge, so it pushes up total memory consumption of the guest. It
> >is normal that you see that message when using OVMF durin
On 16/03/16 13:31, Jan Beulich wrote:
>
> That said, I now wonder anyway why this is a per-vCPU mask
> instead of a per-pCPU one: There's no need for every vCPU in
> the system to have its own afaics.
If every vcpu makes a viridian hypercall at the same time, Xen would end
up clobbering same mask
On Wed, 2016-03-16 at 00:29 +0100, Luis R. Rodriguez wrote:
> On Tue, Mar 15, 2016 at 05:48:44PM -0600, Toshi Kani wrote:
> > On Tue, 2016-03-15 at 01:15 +0100, Luis R. Rodriguez wrote:
> > > On Fri, Mar 11, 2016 at 06:16:36PM -0700, Toshi Kani wrote:
> > > > On Fri, 2016-03-11 at 15:34 -0800, Luis
Julien,
>How did you invoke get_maintainers.pl?
>
>I tried with the patch #4 and got the following ouput:
>
>42sh$ scripts/get_maintainers.pl <
>xentrace-ARM-platform-DOMID_XEN-mapping-support.patch
>
>Stefano Stabellini Julien Grall
> xen-devel@lists.xen.org
Since I had a multifile patch I in
>>> On 16.03.16 at 16:02, wrote:
>> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
>> Sent: 15 March 2016 23:18
>> On Tue, Mar 15, 2016 at 04:14:16PM +, Paul Durrant wrote:
>> > +domain_crash(v->domain);
>> > +
>> > +v->arch.hvm_vcpu.viridian.apic_assist.vector = vecto
On 3/14/16 12:55 PM, Anthony PERARD wrote:
> ... into the firmware directory, along with hvmloader.
>
> Signed-off-by: Anthony PERARD
> ---
> Change in V4:
> - remove install of acpi dsdt table
>
> Change in V3:
> - do not check if ROMs file exist before installing, they should exist
> - change
From: Shannon Zhao
Create a DT for Dom0 for ACPI-case only. DT contains minimal required
informations such as Dom0 bootargs, initrd, efi description table and
address of uefi memory table.
Also port the document of this device tree bindings from Linux.
Signed-off-by: Naresh Bhat
Signed-off-by:
(nb, my citrix.com email is no longer valid)
On Wed, 2016-03-16 at 11:33 +0800, Shannon Zhao wrote:
> Hi,
>
> I noticed there are some efforts to add Xen PV block device support in
> Seabios in a GSoC project and there is a wiki page [1] for it. I found
> some patches [2] to add Xenstore R/W suppo
On 03/17/2016 02:27 PM, Dario Faggioli wrote:
Finally, when waking up a vcpu, it is now enough to tickle the
various
CPUs appropriately, like all other schedulers also do.
Signed-off-by: Tianyang Chen
Signed-off-by: Meng Xu
Signed-off-by: Dagaen Golomb
You seem to have taken care of all m
A Xorg failure on qemu32 was reported as a regression caused
by 'commit 9cd25aac1f44 ("x86/mm/pat: Emulate PAT when it is
disabled")'. [1] This patch-set fixes the regression.
Negative effects of this regression were two failures in Xorg
on qemu32 env, which were triggered by the fact that its vir
On Fri, Mar 18, 2016 at 3:04 PM, Dario Faggioli
wrote:
> by borrowing some of the code of .alloc_pdata, i.e.,
> the bits that perform initializations, leaving only
> actual allocations in there, when any, which is the
> case for Credit1 and RTDS.
I didn't follow the commit log.
I think the reason
From: bensanda
Modified to provide support for xentrace on the ARM platform. Added flask
credential to allow dom0 dom_xen mapping and write access for trace buffers.
Signed-off-by: Benjamin Sanda
---
tools/flask/policy/policy/modules/xen/xen.te | 2 ++
1 file changed, 2 insertions(+)
diff --
c/s cf39362 "x86: use 2M superpages for text/data/bss mappings" served two
purposes; to map the primary code and data with appropriate pagetable
permissions (rather than unilaterally RWX), and to reduce the TLB pressure.
The extra alignment exposed a SYSLinux issue, and was partly reverted by c/s
... for the lifetime of the domain.
If Xen is to make use of the APIC assist enlightenment then a persistent
mapping needs to be kept, rather than the temporary one which is currently
used only to initialize the page content.
This patch also adds a comment block at the top of the source with
info
On Wed, Mar 16, 2016 at 04:34:19PM +, Julien Grall wrote:
> Hi Konrad,
>
> On 04/03/2016 21:19, Konrad Rzeszutek Wilk wrote:
> >Anyhow what I am wondering if there are some semantincs when it comes to PPI
> >and it being able to 'mask' an vector until it exits or such? If so
> >you should docu
George Dunlap writes ("[PATCH 6/8] libxl: Allow local access for block devices
with hotplug scripts"):
> pygrub and qemuu need to be able to access a VM's disks locally in
> order to be able to pull out the kernel and provide emulated disk
> access, respectively. This can be done either by access
c/s cf39362 "x86: use 2M superpages for text/data/bss mappings" served two
purposes; to map the primary code and data with appropriate pagetable
permissions (rather than unilaterally RWX), and to reduce the TLB pressure.
The extra alignment exposed a SYSLinux issue, and was partly reverted by c/s
On 03/05/2016 12:53 AM, Ian Jackson wrote:
Changlong Xie writes ("[PATCH v11 08/27] libxc/migration: Specification update for
DIRTY_PFN_LIST records"):
From: Wen Congyang
Used by secondary to send it's dirty bitmap to primary under COLO.
Again, I think this will want a review from Andrew Co
Hi Konrad,
On 15/03/2016 17:56, Konrad Rzeszutek Wilk wrote:
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index 8fbc46d..dbe9ccc 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -168,4 +168,15 @@ config SCHED_DEFAULT
endmenu
+# Enable/Disable xsplice support
+config XSPLIC
flight 86490 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86490/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
On Tue, Mar 15, 2016 at 03:35:24PM +, Andrew Cooper wrote:
> It is unsafe to generate the guests xstate leaves from host information, as it
> prevents the differences between hosts from being hidden.
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
1 - 100 of 510 matches
Mail list logo