>>> On 30.03.16 at 17:49, wrote:
> Joao Martins writes ("[PATCH v2 1/6] public/xen.h: add flags field to
> vcpu_time_info"):
>> This field has two possible flags (as of latest pvclock ABI
>> shared with KVM).
>>
>> flags: bits in this field indicate extended capabilities
>> coordinated between t
>>> On 29.03.16 at 15:44, wrote:
> This field has two possible flags (as of latest pvclock ABI
> shared with KVM).
>
> flags: bits in this field indicate extended capabilities
> coordinated between the guest and the hypervisor. Specifically
> on KVM, availability of specific flags has to be chec
>>> On 30.03.16 at 19:22, wrote:
> Anthony PERARD wrote:
>> Hi all,
>>
>> Few changes in V4:
>> I leave the ACPI alone and only load the BIOS via libxl now.
>>
>> Detail of changes in each patches.
>>
>> I've look at loading the BIOS via the toolstack instead of having them
> embedded
>> i
thanks Dario,
But do you mean i must add the line directly in "/boot/grub/grub.cfg" ? Is
there any way to do this via a variable in "/etc/default/grub" and then do
"update-grub" to take effect and does the corresponding changes in
"/boot/grub/grub.cfg"?
Regards.
I have made many modifications to this code over the past few years
so I'm probably the one most familiar with it.
Signed-off-by: Paul Durrant
---
MAINTAINERS | 16
1 file changed, 16 insertions(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index e765311..43bbb8f 100644
--- a/MAINT
>>> On 23.03.16 at 17:36, wrote:
> --- a/tools/libxc/xc_cpuid_x86.c
> +++ b/tools/libxc/xc_cpuid_x86.c
> @@ -398,54 +398,97 @@ static void intel_xc_cpuid_policy(xc_interface *xch,
> }
> }
>
> +/* XSTATE bits in XCR0. */
> +#define X86_XCR0_X87(1ULL << 0)
> +#define X86_XCR0_SSE(1U
>>> On 31.03.16 at 09:28, wrote:
> I have made many modifications to this code over the past few years
> so I'm probably the one most familiar with it.
>
> Signed-off-by: Paul Durrant
> ---
> MAINTAINERS | 16
> 1 file changed, 16 insertions(+)
>
> diff --git a/MAINTAINERS b/M
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
> Beulich
> Sent: 31 March 2016 08:52
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org
> Subject: Re: [Xen-devel] [PATCH] MAINTAINERS: Add myself as x86 I/O
> emulation and viridian maint
>>> On 31.03.16 at 10:00, wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
>> Beulich
>> Sent: 31 March 2016 08:52
>> To: Paul Durrant
>> Cc: xen-de...@lists.xenproject.org
>> Subject: Re: [Xen-devel] [PATCH] MAINTAINERS: Add mysel
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 31 March 2016 09:17
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org
> Subject: RE: [Xen-devel] [PATCH] MAINTAINERS: Add myself as x86 I/O
> emulation and viridian maintainer
>
> >>> On 31.03.16 at 10:00, w
On Wed, Mar 30, 2016 at 5:00 PM, Ian Jackson wrote:
> Doug Goldstein writes ("Re: [PATCH 2/2] tools: detect appropriate debug
> optimization level"):
>> On 3/8/16 9:38 AM, Wei Liu wrote:
>> > On Mon, Mar 07, 2016 at 08:23:40PM -0600, Doug Goldstein wrote:
>> >> The build should not use -O0 as tha
On 2016/3/31 0:47, Julien Grall wrote:
> Hi,
>
> On 30/03/16 17:11, Konrad Rzeszutek Wilk wrote:
>> On Wed, Mar 30, 2016 at 06:08:13PM +0800, Shannon Zhao wrote:
>>> From: Shannon Zhao
>>>
>>> It needs to map platform or amba device mmio to Dom0 on ARM. But when
>>> booting with ACPI, it can't
The offset at which components xsaved by xsave[sc] are not fixed.
So when when a save with v->fpu_dirtied set is followed by one
with v->fpu_dirtied clear, non-lazy xsave[sc] may overwriting data
written by the lazy one.
The solution is when using_xsave_compact is enabled and taking xcr0_accum int
From: Shuai Ruan
1. get_xsave_addr() will only be called when
xsave_area_compressed(xsave) is true. So drop the
conditional expression.
2. expand_xsave_states() will memset the area when
get NULL from get_xsave_addr().
Signed-off-by: Shuai Ruan
---
xen/arch/x86/xstate.c | 10 --
1 fil
This patch set fix xsaves related bugs.
Shuai Ruan (3):
x86/xsaves: fix overwriting between non-lazy/lazy xsaves
x86/xsaves: fix two remained issues
x86/xsaves: ebx may return wrong value using CPUID eax=0xdh,ecx =1
xen/arch/x86/domain.c| 8 +
xen/arch/x86/domctl.c| 6
From: Shuai Ruan
Refer to SDM 13.4.3 Extended Region of an XSAVE Area. The value return
by ecx[1] with cpuid function 0xdh and sub-fucntion i (i>1) indicates
the alignment of the state component i when the compacted format of the
extended region of an xsave area is used.
So when hvm/pv guest usi
On 22/03/16 09:23, Olaf Hering wrote:
> Port pvscsi support from xend to libxl:
>
> vscsi=['pdev,vdev{,options}']
> xl scsi-attach
> xl scsi-detach
> xl scsi-list
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
> ---
> docs/man/
All,
Here is a summary of my investigation of the abstract model:
Below policies are adopted when deciding whether to rollback a callchain:
1. Domain will be crashed immediately within iommu_{,un}map_page, treated as a
fatal error (with the exception of the hardware one). Whether to rollback
d
From: Shannon Zhao
To avoid a lot of possible error logs in function map_dev_mmio_region,
make it printk ratelimited.
Signed-off-by: Shannon Zhao
---
xen/arch/arm/p2m.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index 001170
+to 2 key maintainers,
On March 31, 2016 5:06pm, Xu, Quan wrote:
> All,
>
> Here is a summary of my investigation of the abstract model:
>
> Below policies are adopted when deciding whether to rollback a callchain:
>
> 1. Domain will be crashed immediately within iommu_{,un}map_page, treated
>>> On 31.03.16 at 11:05, wrote:
> --- a/xen/arch/arm/p2m.c
> +++ b/xen/arch/arm/p2m.c
> @@ -1284,8 +1284,9 @@ int map_dev_mmio_region(struct domain *d,
> res = map_mmio_regions(d, start_gfn, nr, mfn);
> if ( res < 0 )
> {
> -printk(XENLOG_ERR "Unable to map [%#lx - %#lx] in
On Thu, Mar 31, Juergen Gross wrote:
> On 22/03/16 09:23, Olaf Hering wrote:
> > +#define COMPARE_VSCSI(a, b) ((a)->devid == (b)->devid)
> Is this really needed? I'd prefer using COMPARE_DEVID() instead.
COMPARE_VSCSI used to do something else in an earlier variant.
Now COMPARE_DEVID can be used
On 2016/3/31 17:12, Jan Beulich wrote:
On 31.03.16 at 11:05, wrote:
>> > --- a/xen/arch/arm/p2m.c
>> > +++ b/xen/arch/arm/p2m.c
>> > @@ -1284,8 +1284,9 @@ int map_dev_mmio_region(struct domain *d,
>> > res = map_mmio_regions(d, start_gfn, nr, mfn);
>> > if ( res < 0 )
>> > {
>>> On 24.03.16 at 21:00, wrote:
> +static struct payload *find_payload(const xen_xsplice_name_t *name)
> +{
> +struct payload *data, *found = NULL;
> +char n[XEN_XSPLICE_NAME_SIZE];
> +int rc;
> +
> +rc = verify_name(name);
> +if ( rc )
> +return ERR_PTR(rc);
> +
> +
From: Shannon Zhao
To distinguish the error logs in function map_dev_mmio_region, use
XENLOG_G_ERR instead of XENLOG_ERR.
Signed-off-by: Shannon Zhao
---
xen/arch/arm/p2m.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index 0011708
On March 11, 2016 12:53am, Wei Liu wrote:
> -build: $(STUBDOMPATH)
> +build: $(STUBDOM_BUILD)
Wei,
in original code, in stubdom/vtpm and stubdom/vtpmmgr, the code style is
inconsistent and ugly.
Do you have any plan to fix them? :)
btw, if the others(or me) want to fix the code style, how to fi
The code in hvm/hvm.c related to handling I/O emulation using the ioreq
server framework is large and mostly self-contained.
This patch separates the ioreq server code into a new hvm/ioreq.c source
module and accompanying asm-x86/hvm/ioreq.h header file. There is no
intended functional change, onl
On 03/31/2016 08:13 AM, Jan Beulich wrote:
On 29.03.16 at 15:44, wrote:
>> This field has two possible flags (as of latest pvclock ABI
>> shared with KVM).
>>
>> flags: bits in this field indicate extended capabilities
>> coordinated between the guest and the hypervisor. Specifically
>> on
XenGT leverages ioreq server to track and forward the accesses to GPU
I/O resources, e.g. the PPGTT(per-process graphic translation tables).
Currently, ioreq server uses rangeset to track the BDF/ PIO/MMIO ranges
to be emulated. To select an ioreq server, the rangeset is searched to
see if the I/O
For clarity this patch breaks the code to set/get memory types out
of do_hvm_op() into dedicated functions: hvmop_set/get_mem_type().
Also, for clarity, checks for whether a memory type change is allowed
are broken out into a separate function called by hvmop_set_mem_type().
There is no intentiona
Previously p2m type p2m_mmio_write_dm was introduced for write-
protected memory pages whose write operations are supposed to be
forwarded to and emulated by an ioreq server. Yet limitations of
rangeset restrict the number of guest pages to be write-protected.
This patch replaces the p2m type p2m_
A new HVMOP - HVMOP_map_mem_type_to_ioreq_server, is added to
let one ioreq server claim/disclaim its responsibility for the
handling of guest pages with p2m type p2m_ioreq_server. Users
of this HVMOP can specify whether the p2m_ioreq_server is supposed
to handle write accesses or read ones or both
On Wed, 30 Mar 2016, Shannon Zhao wrote:
> Hi Will, Mark,
>
> On 2016/3/30 0:31, Mark Rutland wrote:
> > On Tue, Mar 29, 2016 at 05:18:38PM +0100, Will Deacon wrote:
> >> > On Thu, Mar 24, 2016 at 10:44:31PM +0800, Shannon Zhao wrote:
> >>> > > When it's a Xen domain0 booting with ACPI, it will su
On Tue, 29 Mar 2016, Will Deacon wrote:
> On Sat, Mar 26, 2016 at 12:54:09PM +, Stefano Stabellini wrote:
> > are you OK with this patch?
>
> Nothing against it, but the only arm64 bit is:
>
> > > diff --git a/arch/arm64/kernel/setup.c b/arch/arm64/kernel/setup.c
> > > index 450987d..6cf5051
flight 87977 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87977/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
test-amd64-amd64-xl
Tools fails to build with gcc 4.5, it does not provide ssize_t.
Fixes d275ec9 ("libxc/libxl/python/xenstat/ocaml: Use new XEN_VERSION
hypercall")
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Wei Liu
---
tools/libxc/include/xenctrl.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/
On Thu, 2016-03-31 at 07:25 +, tutu sky wrote:
> thanks Dario,
> But do you mean i must add the line directly in "/boot/grub/grub.cfg"
> ? Is there any way to do this via a variable in "/etc/default/grub"
> and then do "update-grub" to take effect and does the corresponding
> changes in "/boot/
From: Shannon Zhao
Add a bus_notifier for platform bus device in order to map the device
mmio regions when DOM0 booting with ACPI.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
drivers/xen/Makefile | 1 +
drivers/xen/arm-device.c | 141
From: Shannon Zhao
Make xen_xlate_map_ballooned_pages work with 64K pages. In that case
Kernel pages are 64K in size but Xen pages remain 4K in size. Xen pfns
refer to 4K pages.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
drivers/xen/xlate_mmu.c | 38 ++
From: Shannon Zhao
This patch set adds ACPI support for Xen Dom0 on ARM64. The relevant Xen
ACPI on ARM64 design document could be found from [1].
This patch set adds a new FDT node "uefi" under /hypervisor to pass UEFI
information. Introduce a bus notifier of AMBA and Platform bus to map
the ne
From: Shannon Zhao
When it's a Xen domain0 booting with ACPI, it will supply a /chosen and
a /hypervisor node in DT. So check if it needs to enable ACPI.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
Acked-by: Hanjun Guo
---
arch/arm64/kernel/acpi.c | 12
1 file ch
From: Shannon Zhao
Sync the changes of HVM_PARAM_CALLBACK_VIA ABI introduced by
Xen commit (public/hvm: export the HVM_PARAM_CALLBACK_VIA
ABI in the API).
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
include/xen/interface/hvm/params.h | 27 +--
1 file
From: Shannon Zhao
Add a bus_notifier for AMBA bus device in order to map the device
mmio regions when DOM0 booting with ACPI.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
drivers/xen/arm-device.c | 43 +++
1 file changed, 43 insertio
From: Shannon Zhao
When running on Xen hypervisor, runtime services are supported through
hypercall. Add a Xen specific function to initialize runtime services.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/include/asm/xen/xen-ops.h | 6 ++
arch/arm/xen/Makef
From: Shannon Zhao
The kernel will get the event-channel IRQ through
HVM_PARAM_CALLBACK_IRQ.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/xen/enlighten.c | 36 +++-
1 file changed, 35 insertions(+), 1 deletion(-)
diff --git a/arch/a
From: Shannon Zhao
This new delivery type which is for ARM shares the same value with
HVM_PARAM_CALLBACK_TYPE_VECTOR which is for x86.
val[15:8] is flag: val[7:0] is a PPI.
To the flag, bit 8 stands the interrupt mode is edge(1) or level(0) and
bit 9 stands the interrupt polarity is active low(1
Tools fails to build with gcc 4.5, it does not provide ssize_t.
Fixes d275ec9 ("libxc/libxl/python/xenstat/ocaml: Use new XEN_VERSION
hypercall")
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Wei Liu
---
v2:
use correct summary
tools/libxc/include/xenctrl.h | 1 +
1 file changed, 1 insert
From: Shannon Zhao
Move x86 specific codes to architecture directory and export those EFI
runtime service functions. This will be useful for initializing runtime
service on ARM later.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/x86/xen/efi.c| 112 +
From: Shannon Zhao
Use xen_xlate_map_ballooned_pages to setup grant table. Then it doesn't
rely on DT or ACPI to pass the start address and size of grant table.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
arch/arm/xen/enlighten.c | 13 -
1 file changed, 4 insertio
From: Shannon Zhao
Move xlated_setup_gnttab_pages to common place, so it can be reused by
ARM to setup grant table.
Rename it to xen_xlate_map_ballooned_pages.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/x86/xen/grant-table.c | 57 +---
From: Shannon Zhao
Add a new type of Xen map space for Dom0 to map device's MMIO region.
Signed-off-by: Shannon Zhao
---
include/xen/interface/memory.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/include/xen/interface/memory.h b/include/xen/interface/memory.h
index 2ecfe4f..9aa8988 100
From: Shannon Zhao
ACPI 6.0 introduces a new table STAO to list the devices which are used
by Xen and can't be used by Dom0. On Xen virtual platforms, the physical
UART is used by Xen. So here it hides UART from Dom0.
CC: "Rafael J. Wysocki" (supporter:ACPI)
CC: Len Brown (supporter:ACPI)
CC:
From: Shannon Zhao
Move xen_early_init() before efi_init(), then when calling efi_init()
could initialize Xen specific UEFI.
Check if it runs on Xen hypervisor through the flat dts.
Cc: Russell King
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/kernel/setup.c |
From: Shannon Zhao
Add a "uefi" node under /hypervisor node in FDT, then Linux kernel could
scan this to get the UEFI information.
CC: Rob Herring
Signed-off-by: Shannon Zhao
Acked-by: Rob Herring
Reviewed-by: Stefano Stabellini
---
Documentation/devicetree/bindings/arm/xen.txt | 35 +++
From: Shannon Zhao
Sometimes it needs to check if there is a subnode of given node in FDT
by given name. Introduce this helper to get the subnode if it exists.
CC: Rob Herring
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
Acked-by: Rob Herring
---
drivers/of/fdt.c | 13
From: Shannon Zhao
Add a new function to parse DT parameters for Xen specific UEFI just
like the way for normal UEFI. Then it could reuse the existing codes.
If Xen supports EFI, initialize runtime services.
CC: Matt Fleming
Signed-off-by: Shannon Zhao
Reviewed-by: Matt Fleming
Reviewed-by:
On Thu, Mar 31, 2016 at 12:30:09AM -0600, Jan Beulich wrote:
> >>> On 30.03.16 at 17:43, wrote:
> > Since they're all cosmetic, if you take care of all of them, feel free
> > to stick my ack on the result.
>
> Actually - no, please don't. While the patch is fine content wise
> then from my perspe
On 31 March 2016 at 13:04, Stefano Stabellini
wrote:
> On Wed, 30 Mar 2016, Shannon Zhao wrote:
>> Hi Will, Mark,
>>
>> On 2016/3/30 0:31, Mark Rutland wrote:
>> > On Tue, Mar 29, 2016 at 05:18:38PM +0100, Will Deacon wrote:
>> >> > On Thu, Mar 24, 2016 at 10:44:31PM +0800, Shannon Zhao wrote:
>>
The patches adding Xen tools support for paravirtualized USB devices
(pvUSB) omitted documenting the introduced Xenstore paths.
Add the paths to docs/misc/xenstore-paths.markdown
Signed-off-by: Juergen Gross
---
docs/misc/xenstore-paths.markdown | 11 +++
1 file changed, 11 insertions(+
The hyperlinks for the different I/O protocols are wrong.
Correct them.
Signed-off-by: Juergen Gross
---
docs/misc/xenstore-paths.markdown | 18 +-
1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/docs/misc/xenstore-paths.markdown
b/docs/misc/xenstore-paths.markdow
Update some Xenstore path related stuff.
Juergen Gross (2):
doc: correct hyperlinks in docs/misc/xenstore-paths.markdown
doc: document pvusb Xenstore paths
docs/misc/xenstore-paths.markdown | 29 -
1 file changed, 20 insertions(+), 9 deletions(-)
--
2.6.2
On Thu, Mar 31, 2016 at 12:46:24AM -0600, Jan Beulich wrote:
> >>> On 30.03.16 at 18:44, wrote:
> > On Wed, Mar 30, 2016 at 10:24:41AM -0600, Jan Beulich wrote:
> >> >>> On 24.03.16 at 21:00, wrote:
> >> > @@ -266,16 +275,15 @@ void *vzalloc(size_t size)
> >> > return p;
> >> > }
> >> >
>
On Thu, Mar 31, 2016 at 1:23 PM, Shannon Zhao wrote:
> From: Shannon Zhao
>
> ACPI 6.0 introduces a new table STAO to list the devices which are used
> by Xen and can't be used by Dom0. On Xen virtual platforms, the physical
> UART is used by Xen. So here it hides UART from Dom0.
>
> CC: "Rafael
>>> On 24.03.16 at 21:00, wrote:
> --- /dev/null
> +++ b/xen/common/xsplice_elf.c
> @@ -0,0 +1,294 @@
> +/*
> + * Copyright (C) 2016 Citrix Systems R&D Ltd.
> + */
> +
> +#include
> +#include
> +#include
> +#include
> +
> +struct xsplice_elf_sec *xsplice_elf_sec_by_name(const struct xsplice_el
>>> On 31.03.16 at 13:43, wrote:
> On Thu, Mar 31, 2016 at 12:30:09AM -0600, Jan Beulich wrote:
>> >>> On 30.03.16 at 17:43, wrote:
>> > Since they're all cosmetic, if you take care of all of them, feel free
>> > to stick my ack on the result.
>>
>> Actually - no, please don't. While the patch i
On Thu, Mar 31, 2016 at 01:44:08PM +0200, Ard Biesheuvel wrote:
> The heuristic is there to decide whether some DTB image contains a
> complete description of the platform, or only some data handed over by
> the bootloader. Arguably, a DT containing both /chosen and /hypervisor
> but nothing else c
flight 87980 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87980/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 10 guest-start fail REGR. vs. 86454
test-amd64-i386-fre
The current code in bootloader_copyfail will error out on expected POLLHUPs
because of a missing "else" in the if clause.
The behaviour that triggers this bug has only been seen on FreeBSD so far.
Signed-off-by: Roger Pau Monné
Suggested-by: Ian Jackson
---
Cc: Ian Jackson
Cc: Wei Liu
---
to
On Thu, Mar 31, 2016 at 06:07:58AM -0600, Jan Beulich wrote:
> >>> On 31.03.16 at 13:43, wrote:
> > On Thu, Mar 31, 2016 at 12:30:09AM -0600, Jan Beulich wrote:
> >> >>> On 30.03.16 at 17:43, wrote:
> >> > Since they're all cosmetic, if you take care of all of them, feel free
> >> > to stick my a
>>> On 24.03.16 at 21:00, wrote:
> --- a/xen/arch/x86/setup.c
> +++ b/xen/arch/x86/setup.c
> @@ -100,6 +100,9 @@ unsigned long __read_mostly xen_phys_start;
>
> unsigned long __read_mostly xen_virt_end;
>
> +unsigned long __read_mostly avail_virt_start;
> +unsigned long __read_mostly avail_vi
On Thu, Mar 31, 2016 at 10:21:22AM +, Xu, Quan wrote:
> On March 11, 2016 12:53am, Wei Liu wrote:
> > -build: $(STUBDOMPATH)
> > +build: $(STUBDOM_BUILD)
>
> Wei,
> in original code, in stubdom/vtpm and stubdom/vtpmmgr, the code style is
> inconsistent and ugly.
> Do you have any plan to fix
>>> On 31.03.16 at 15:28, wrote:
> On Thu, Mar 31, 2016 at 06:07:58AM -0600, Jan Beulich wrote:
>> >>> On 31.03.16 at 13:43, wrote:
>> > it should not really be there but in a new hypercall that can do
>> > three arguments (the length) and be able to return -EPERM. A sane
>> > one, not the cobble
On Thu, Mar 31, 2016 at 10:28:47AM +0800, Changlong Xie wrote:
> I've checked all patches in this thread after Ian's comments, it seems
> we can give A-B to p12, p14, p20, p23, p25, p26 now.
>
> All in all, *all patches are acked-by*.
>
Hello, can you rebase your branch on top of staging branch
On Thu, Mar 31, 2016 at 01:25:30PM +0200, Olaf Hering wrote:
> Tools fails to build with gcc 4.5, it does not provide ssize_t.
Which version of SLES/OpenSuSE had that? I had been using 4.4.4 and
5.3 and the compiler didn't hit that.
>
> Fixes d275ec9 ("libxc/libxl/python/xenstat/ocaml: Use new X
On Thu, Mar 31, 2016 at 07:49:01AM +0200, Juergen Gross wrote:
> In case libxl__need_xenpv_qemu() returns an error let domain creation
> fail.
>
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
Ian, this is a backport candidate.
Wei.
___
Xen-devel
On Thu, Mar 31, 2016 at 07:49:02AM +0200, Juergen Gross wrote:
> libxl__need_xenpv_qemu() is called with configuration data for console,
> vfbs, disks and channels today in order to evaluate the need for
> starting a device model for a pv domain.
>
> The console data is local to the caller and set
On Thu, Mar 31, 2016 at 07:49:03AM +0200, Juergen Gross wrote:
> Add a function to query whether the device model is supporting a
> specific backend type. The device model is writing the supported
> backend types to Xenstore on startup. The new query function checks
> for the appropriate entry to b
On Thu, Mar 31, Konrad Rzeszutek Wilk wrote:
> On Thu, Mar 31, 2016 at 01:25:30PM +0200, Olaf Hering wrote:
> > Tools fails to build with gcc 4.5, it does not provide ssize_t.
>
> Which version of SLES/OpenSuSE had that? I had been using 4.4.4 and
> 5.3 and the compiler didn't hit that.
SLE11 an
Actually CC Anthony
On Thu, Mar 31, 2016 at 03:33:59PM +0100, Wei Liu wrote:
> On Thu, Mar 31, 2016 at 07:49:03AM +0200, Juergen Gross wrote:
> > Add a function to query whether the device model is supporting a
> > specific backend type. The device model is writing the supported
> > backend types
On Thu, Mar 31, 2016 at 07:49:04AM +0200, Juergen Gross wrote:
> Add a new pvusb backend type "qusb" which is provided by qemu. It can
> be selected either by specifying the type directly in the configuration
> or it is selected automatically by libxl in case there is no "usbback"
> driver loaded.
On Thu, Mar 31, 2016 at 07:49:06AM +0200, Juergen Gross wrote:
> Add a service routine checking whether a device model must be started
> after adding a device to a domain.
>
> Signed-off-by: Juergen Gross
> Acked-by: Ian Jackson
Acked-by: Wei Liu
__
flight 88144 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/88144/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Jan Beulich wrote:
On 30.03.16 at 19:22, wrote:
>> Anthony PERARD wrote:
>>> Hi all,
>>>
>>> Few changes in V4:
>>> I leave the ACPI alone and only load the BIOS via libxl now.
>>>
>>> Detail of changes in each patches.
>>>
>>> I've look at loading the BIOS via the toolstack instead of ha
flight 87986 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87986/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 3 host-install(3) broken REGR. vs. 866
On Wed, Mar 30, 2016 at 07:19:41PM +0200, Paulina Szubarczyk wrote:
> Yes, I was looking at wrong branch, I am sorry. The patches
>
> * {01-04,08,11} were not attached in the previous patch [0].
>
> * {05,06} are applied in the version made by George Dunlap.
> I added the changes to return 0/1
This code is extracted from the FreeBSD blkfront implementation.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
---
Cc: Ian Jackson
Cc: Wei Liu
---
tools/libxl/libxl_freebsd.c | 54 +++--
1 file changed, 52 insertions(+), 2 deletions(-)
diff --git a/
This is the default hotplug script for block devices. Its only job is to
copy the "params" blkback xenstore node to "physical-device".
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
---
Cc: Ian Jackson
Cc: Wei Liu
---
tools/hotplug/FreeBSD/Makefile | 2 +-
tools/hotplug/FreeBSD/block|
The fields that are printed might not be set in the case of a failure, which
generates a segmentation fault.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
---
Cc: Ian Jackson
Cc: Wei Liu
---
tools/libxl/libxl.c | 5 +
1 file changed, 1 insertion(+), 4 deletions(-)
diff --git a/tools/l
Allow FreeBSD to execute hotplug scripts when attaching disk devices.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: Wei Liu
---
Changes since v2:
- Split the refactoring in a separate patch.
---
tools/libxl/libxl_freebsd.c | 36
1 file changed, 36
This series enables using hotplug scripts with the FreeBSD blkback
implementation. Since FreeBSD blkback can use both block devices and regular
RAW files as disks, the physical-device-path xenstore backend node is used
in order to store the absolute path to the virtual disk image (either a
block
FreeBSD blkback uses the physical-device-path xenstore node in order to
fetch the path to the underlying backing storage (either a block device or
raw image). This node is set by the hotplug scripts. Also clarify the usage
of the physical-device node.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Ja
The current code in libxl assumed that vdev is equal to local device, but
this is only true for Linux systems. In other OSes the local device can use
a nomenclature completely different from the virtual device one.
Move the current libxl__devid_to_localdev Linux implementation out of the
OS-specif
This factors out the nic hotplug specific code from the common code path in
order to make it easier to add support for disk hotplug scripts. It
shouldn't include any functional change.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: Wei Liu
---
Changes since v2:
- Split the refactoring
Add the FreeBSD disk hotplug interface details to the block-scripts.txt
document.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: George Dunlap
Cc: Wei Liu
---
docs/misc/block-scripts.txt | 13 +
1 file changed, 13 insertions(+)
diff --git a/docs/misc/block-scripts.txt b/d
On Thu, 31 Mar 2016, Mark Rutland wrote:
> On Thu, Mar 31, 2016 at 01:44:08PM +0200, Ard Biesheuvel wrote:
> > The heuristic is there to decide whether some DTB image contains a
> > complete description of the platform, or only some data handed over by
> > the bootloader. Arguably, a DT containing
On Thu, 3 Mar 2016, Wei Liu wrote:
> On Wed, Mar 02, 2016 at 04:46:43PM +0100, Roger Pau Monne wrote:
> > And use it as the default value for the VGA kind. This allows libxl to set
> > it to the default value later on when the domain type is known. For HVM
> > guests the default value is LIBXL_VGA_
On Thu, Mar 31, 2016 at 4:09 PM, Roger Pau Monne wrote:
> This series enables using hotplug scripts with the FreeBSD blkback
> implementation. Since FreeBSD blkback can use both block devices and regular
> RAW files as disks, the physical-device-path xenstore backend node is used
> in order to sto
From: Wen Congyang
Before this patch:
1. Suspend
a. PVHVM and PV: we use the same way to suspend the guest (send the
suspend request to the guest). If the guest doesn't support evtchn, the
xenstore variant will be used, suspending the guest via XenBus control
node.
b. Pure HVM:
Current implementation of elf_load_bsdsyms is broken when loading inside of
a HVM guest, because it assumes elf_memcpy_safe is able to write into guest
memory space, which it is not.
Take the oportunity to do some cleanup and properly document how
elf_{parse/load}_bsdsyms works. The new implementa
On Tue, 2016-03-29 at 20:06 +, tutu sky wrote:
> Hi,
> I need to know what happens while a cpu which is running a vcpu,
> suddenly crash or down? I mean have xen any plane for such a
> situation?
>
I don't understand the question: what does it mean for a cpu to
"suddenly crash"?
It's typically
1 - 100 of 146 matches
Mail list logo