flight 88092 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/88092/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 60684
build-i386
Add generic virtualization support for pinning the current vcpu to a
specified physical cpu. As this operation isn't performance critical
(a very limited set of operations like BIOS calls and SMIs is expected
to need this) just add a hypervisor specific indirection.
Such a pinning should last as s
Use smp_call_sync_on_phys_cpu() to raise SMI on cpu 0.
Signed-off-by: Juergen Gross
---
drivers/firmware/dcdbas.c | 46 --
1 file changed, 20 insertions(+), 26 deletions(-)
diff --git a/drivers/firmware/dcdbas.c b/drivers/firmware/dcdbas.c
index 829ee
Import the actual version of include/xen/interface/sched.h from Xen.
Signed-off-by: Juergen Gross
---
include/xen/interface/sched.h | 100 ++
1 file changed, 82 insertions(+), 18 deletions(-)
diff --git a/include/xen/interface/sched.h b/include/xen/interf
Some hardware (e.g. Dell Studio laptops) require special functions to
be called on physical cpu 0 in order to avoid occasional hangs. When
running as dom0 under Xen this could be achieved only via special boot
parameters (vcpu pinning) limiting the hypervisor in it's scheduling
decisions.
This pat
On some hardware models (e.g. Dell Studio 1555 laptop) some hardware
related functions (e.g. SMIs) are to be executed on physical cpu 0
only. Instead of open coding such a functionality multiple times in
the kernel add a service function for this purpose. This will enable
the possibility to take sp
Use the smp_call_sync_on_phys_cpu() function to call system management
mode on cpu 0.
Signed-off-by: Juergen Gross
---
drivers/hwmon/dell-smm-hwmon.c | 27 ---
1 file changed, 12 insertions(+), 15 deletions(-)
diff --git a/drivers/hwmon/dell-smm-hwmon.c b/drivers/hwmon/d
Some hardware models (e.g. Dell Studio 1555 laptops) require calls to
the firmware to be issued on cpu 0 only. As Dom0 might have to use
these calls, add xen_pin_vcpu() to achieve this functionality.
In case either the domain doesn't have the privilege to make the
related hypercall or the hypervis
On Fri, Apr 01, 2016 at 09:14:30AM +0200, Juergen Gross wrote:
> + if (cpu >= nr_cpu_ids)
> + return -EINVAL;
> + if (cpu != 0)
> + return -EINVAL;
The other functions return -ENXIO for this.
___
Xen-devel mailing list
X
On 01/04/16 09:37, Peter Zijlstra wrote:
> On Fri, Apr 01, 2016 at 09:14:30AM +0200, Juergen Gross wrote:
>> +if (cpu >= nr_cpu_ids)
>> +return -EINVAL;
>
>> +if (cpu != 0)
>> +return -EINVAL;
>
> The other functions return -ENXIO for this.
Aah, okay. Will change.
Hi Jan,
A couple of weeks ago, Jianzhong reported an issue, the SRIOV NICs (Intel
82599, 82571 ) can't work correctly in Windows guest.
By debugging, we found your this patch, the commit ID
ad28e42bd1d28d746988ed71654e8aa670629753, caused the regression.
Could you help to take a look which par
On Fri, Apr 01, 2016 at 09:14:33AM +0200, Juergen Gross wrote:
> --- a/kernel/smp.c
> +++ b/kernel/smp.c
> @@ -14,6 +14,7 @@
> #include
> #include
> #include
> +#include
>
> #include "smpboot.h"
>
> @@ -758,9 +759,14 @@ struct smp_sync_call_struct {
> static void smp_call_sync_callback
flight 88091 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/88091/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt-xsm 12 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-qcow2 11 migrate-s
> -Original Message-
> From: dunl...@gmail.com [mailto:dunl...@gmail.com] On Behalf Of
> George Dunlap
> Sent: 31 March 2016 17:53
> To: Paul Durrant
> Cc: xen-devel; Kevin Tian; Keir (Xen.org); Jan Beulich; Andrew Cooper; Jun
> Nakajima
> Subject: Re: [Xen-devel] [PATCH] x86/hvm: separate
The code in hvm/hvm.c related to handling I/O emulation using the ioreq
server framework is large and mostly self-contained.
This patch separates the ioreq server code into a new hvm/ioreq.c source
module and accompanying asm-x86/hvm/ioreq.h header file. There is no
intended functional change, onl
On 01/04/16 09:43, Peter Zijlstra wrote:
> On Fri, Apr 01, 2016 at 09:14:33AM +0200, Juergen Gross wrote:
>> --- a/kernel/smp.c
>> +++ b/kernel/smp.c
>> @@ -14,6 +14,7 @@
>> #include
>> #include
>> #include
>> +#include
>>
>> #include "smpboot.h"
>>
>> @@ -758,9 +759,14 @@ struct smp_sy
flight 88073 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/88073/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 3 host-install(3) broken in 87395 REGR. vs. 66399
build-amd64-rumpuserxen
On Fri, Apr 01, 2016 at 10:28:46AM +0200, Juergen Gross wrote:
> On 01/04/16 09:43, Peter Zijlstra wrote:
> > On Fri, Apr 01, 2016 at 09:14:33AM +0200, Juergen Gross wrote:
> >> --- a/kernel/smp.c
> >> +++ b/kernel/smp.c
> >> @@ -14,6 +14,7 @@
> >> #include
> >> #include
> >> #include
> >> +#
>>> On 01.04.16 at 09:40, wrote:
> A couple of weeks ago, Jianzhong reported an issue, the SRIOV NICs (Intel
> 82599, 82571 ) can't work correctly in Windows guest.
> By debugging, we found your this patch, the commit ID
> ad28e42bd1d28d746988ed71654e8aa670629753, caused the regression.
That w
On Tue, Mar 29, 2016 at 11:01:16AM +0100, Stefano Stabellini wrote:
> Not my full time job anymore, but still maintaining it.
>
> Signed-off-by: Stefano Stabellini
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 32bafda..049aa1d 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -12193,16 +1
On 01/04/16 10:44, Peter Zijlstra wrote:
> On Fri, Apr 01, 2016 at 10:28:46AM +0200, Juergen Gross wrote:
>> On 01/04/16 09:43, Peter Zijlstra wrote:
>>> On Fri, Apr 01, 2016 at 09:14:33AM +0200, Juergen Gross wrote:
--- a/kernel/smp.c
+++ b/kernel/smp.c
@@ -14,6 +14,7 @@
#incl
On Thu, Mar 31, 2016 at 5:49 PM, George Dunlap wrote:
> On Thu, Mar 31, 2016 at 3:36 PM, Jim Fehlig wrote:
>> Jan Beulich wrote:
>> On 30.03.16 at 19:22, wrote:
Anthony PERARD wrote:
> Hi all,
>
> Few changes in V4:
> I leave the ACPI alone and only load the BIOS via l
Along with using the upper 32 bits of the written value, the address
also needs advancing, so that msix_write_completion() will use the
correct address for re-invocation of msixtbl_write().
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/vmsi.c
+++ b/xen/arch/x86/hvm/vmsi.c
@@ -295,6 +295,7 @@
Recent changes to Linux result in there just being a single unmask
operation prior to expecting the first interrupts to arrive. However,
we've had a chicken-and-egg problem here: Qemu invokes
xc_domain_update_msi_irq(), ultimately leading to
msixtbl_pt_register(), upon seeing that first unmask oper
On Fri, Apr 01, 2016 at 11:03:21AM +0200, Juergen Gross wrote:
> > Maybe just make the vpin thing an option like:
> >
> > smp_call_on_cpu(int (*func)(void *), int phys_cpu);
> > Also; is something like the vpin thing possible on KVM? because if we're
> > going to expose it to generic code lik
>>> On 31.03.16 at 23:26, wrote:
>> Also - how well will this O(n^2) lookup work once there are enough
>> payloads? I think this calls for the alternative vmap() extension I've
>> been suggesting earlier.
>
> Could you elaborate on the vmap extension a bit please?
>
> Your earlier email seems t
> >>> On 01.04.16 at 09:40, wrote:
> > A couple of weeks ago, Jianzhong reported an issue, the SRIOV NICs
> > (Intel 82599, 82571 ) can't work correctly in Windows guest.
> > By debugging, we found your this patch, the commit ID
> > ad28e42bd1d28d746988ed71654e8aa670629753, caused the regression.
On 01/04/16 11:15, Peter Zijlstra wrote:
> On Fri, Apr 01, 2016 at 11:03:21AM +0200, Juergen Gross wrote:
>>> Maybe just make the vpin thing an option like:
>>>
>>> smp_call_on_cpu(int (*func)(void *), int phys_cpu);
>
>>> Also; is something like the vpin thing possible on KVM? because if we'r
>>> On 01.04.16 at 11:21, wrote:
>> Beyond that I guess I could use some help in at least diagnosing the issue,
>> e.g.
>> by logging the actions done by Xen, so we can understand why
>> guest_mask_msi_irq() doesn't get called to unmask the MSI-X vector(s). I've
>> found the reason why this isn't
>>> On 01.04.16 at 06:59, wrote:
> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
> to independently get and set the scheduling parameters of each
> vCPU of a domain.
>
> Also fix a bug in XEN_DOMCTL_SCHEDOP_getinfo, where PERIOD and
> BUDGET are not divided by MICROSECS(1) before
>>> On 01.04.16 at 08:12, wrote:
> flight 88047 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/88047/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-libvirt-pair 21 guest-migrate/src
I will resend them as soon as I managed to check it all once again.
At 22 April the decision of selected candidates is going to be posted.
During that time I should complete the bite-size task and according
to the https://wiki.gnome.org/Outreachy work on more contributions
if that is possible.
Pa
>>> On 01.04.16 at 11:15, wrote:
> Recent changes to Linux result in there just being a single unmask
> operation prior to expecting the first interrupts to arrive. However,
> we've had a chicken-and-egg problem here: Qemu invokes
> xc_domain_update_msi_irq(), ultimately leading to
> msixtbl_pt_re
On Fri, Apr 01, 2016 at 01:41:40AM +, Xu, Quan wrote:
> On March 31, 2016 9:50pm, Wei Liu wrote:
> > On Thu, Mar 31, 2016 at 10:21:22AM +, Xu, Quan wrote:
> > > On March 11, 2016 12:53am, Wei Liu wrote:
> > > > -build: $(STUBDOMPATH)
> > > > +build: $(STUBDOM_BUILD)
> > >
> > > Wei,
> > >
On Fri, Apr 01, 2016 at 10:52:08AM +0800, Changlong Xie wrote:
> My build machine is
>
> master:/etc # cat SuSE-release
> SUSE Linux Enterprise Server 11 (x86_64)
> VERSION = 11
> PATCHLEVEL = 3
>
> You may not to reproduce the same errors on fedora or some other platforms.
>
Olaf posted a simi
Hello Dushyant,
On 29/03/16 21:56, Dushyant Behl wrote:
On Wed, Mar 30, 2016 at 12:31 AM, Julien Grall wrote:
On 24/03/16 11:05, Dushyant Behl wrote:
(XEN) DOM0: [0.00] irq: no irq domain found for /interrupt-controller !
(XEN) DOM0: [0.00] irq: no irq domain found for /inte
Hi Roger,
An another point that needs to be filled up in the application is timeline.
I made the proposition of it, I am not sure if it should be more complex.
Could you look at it in your free time?
Timeline:
22 April - 22 May [Before the intership]
* Elaborate performance measurement methodol
On 2016/3/31 20:42, Mark Rutland wrote:
> On Thu, Mar 31, 2016 at 01:44:08PM +0200, Ard Biesheuvel wrote:
>> > The heuristic is there to decide whether some DTB image contains a
>> > complete description of the platform, or only some data handed over by
>> > the bootloader. Arguably, a DT contain
On 2016/4/1 17:25, Shannon Zhao wrote:
> If it really needs is_xen_node(), I will not factor
> fdt_find_hyper_node() in patch 11 since it uses flat DT while here it's
> going to use unflatten DT.
Sorry, I'm wrong. They both use flat DT. But it's no need to factor
fdt_find_hyper_node() since is_xe
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 01 April 2016 10:59
> To: xen-devel
> Cc: Andrew Cooper; Anthony Perard; Paul Durrant; Stefano Stabellini; Keir
> (Xen.org)
> Subject: Re: [PATCH RFC] x86/vMSI-X: avoid missing first unmask of vectors
>
> >>> On 01
Adding xen-devel to the Cc, since this is AFAICT a real bug.
On Thu, 24 Mar 2016, Alex Velazquez wrote:
> On Wed, Mar 23, 2016 at 6:56 AM, Roger Pau Monné wrote:
> > Hello,
> >
> > On Mon, 21 Mar 2016, Alex Velazquez wrote:
> >> Hello,
> >>
> >> I am running Xen 4.6.0, with Ubuntu 14.04 as my Do
>>> On 01.04.16 at 12:56, wrote:
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 01 April 2016 10:59
>> To: xen-devel
>> Cc: Andrew Cooper; Anthony Perard; Paul Durrant; Stefano Stabellini; Keir
>> (Xen.org)
>> Subject: Re: [PATCH RFC] x86/vMSI-X: avoid miss
>>> On 31.03.16 at 11:06, wrote:
> 4. __gnttab_unmap_common():rollback (no change)
>
> (Existing code)
>>>...
> if ( !kind )
> err = iommu_unmap_page(ld, op->frame);
> else if ( !(kind & MAPKIND_WRITE) )
> err = iommu_map_page(ld, op->frame, op
On Fri, Apr 01, 2016 at 01:04:42PM +0200, Roger Pau Monné wrote:
> Hello,
>
> I've been able to reproduce this locally using the latest Xen unstable,
> and it is indeed a bug. The issue happens because libxl compares the JSON
> status with the list of backends it fetches from Domain 0 only, and
On Fri, 2016-03-25 at 09:29 -0400, Konrad Rzeszutek Wilk wrote:
> On Wed, Mar 23, 2016 at 12:35:36PM +, George Dunlap wrote:
> >
> > On 12/03/16 11:33, Dario Faggioli wrote:
> > >
> > > (i.e., domain creation and destruction) so the
> > > trace will show properly decoded info, rather
> > > th
Hi,
anyone had any luck compiling just libxenstore on OSX? Any pointers?
Thanks
Marin
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Thu, 2016-03-31 at 23:59 -0500, Chong Li wrote:
> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
> to independently get and set the scheduling parameters of each
> vCPU of a domain.
>
> Also fix a bug in XEN_DOMCTL_SCHEDOP_getinfo, where PERIOD and
> BUDGET are not divided by MI
Return rc value instead of allways 0.
Signed-off-by: Paulina Szubarczyk
---
tools/libxl/libxl_pci.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c
index 6051ee4..e4a2c2c 100644
--- a/tools/libxl/libxl_pci.c
+++ b/tools/libxl/
This is my bite-sized outreachy project [1][2]. I resend it due to the mistake
I made in the first try.
The patch aims to improve coding_style and return failure for more xl commands:
- pci-*
-- tmem-*
After rebase to staging it seems that the patch {09} cleaning
libxl_set_memory_target()
to r
- Use EXIT_{SUCCESS,FAILURE} for main_mem*() function
- Use 0/1 as return values of set_memory_{max,target}
Signed-off-by: Paulina Szubarczyk
---
tools/libxl/xl_cmdimpl.c | 24
1 file changed, 16 insertions(+), 8 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/to
Returning error codes makes it easier for shell scripts to tell if a
command has failed or succeeded.
NB this violates the CODING_STYLE preference for not initializing the
return-value variable at declaration; but in these cases, having a
"goto out" that jumped over nothing but an "r = 0" seemed
a
Retrun error code instead of allways 0. Remove assigned-only
ret variable.
Signed-off-by: Paulina Szubarczyk
---
tools/libxl/libxl_pci.c | 8 ++--
1 file changed, 2 insertions(+), 6 deletions(-)
diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c
index dc10cb7..3435ce2 100644
---
libxl_device_pci_assignable_list returns:
- list of the libxl_device_pci
- NULL in case of error
the rc variable is unused as return code.
Signed-off-by: Paulina Szubarczyk
---
tools/libxl/libxl_pci.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/tools/libxl/libxl_pci
- Return 0 or 1 for freemem function
- Correct the condition of checking return values of freemem
Signed-off-by: Paulina Szubarczyk
---
tools/libxl/xl_cmdimpl.c | 26 +++---
1 file changed, 11 insertions(+), 15 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl
- Use EXIT_{SUCCESS,FAILURE} for main_cd*() function
- Use 0/1 as return values of cd_insert function
Signed-off-by: Paulina Szubarczyk
---
tools/libxl/xl_cmdimpl.c | 18 +-
1 file changed, 13 insertions(+), 5 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl
Functions libxl_tmem_freeze(), libxl_tmem_thaw(), libxl_tmem_set() and
libxl_tmem_shared_auth() located in libxl.c file return ERROR_FAIL/ERROR_INVAL
or internal error codes from libxc library.
Improve main_tmem_* return codes by returning EXIT_{SUCCESS/FAILURE}
accordingly to return codes of tho
In accordance with CODING_SYTLE:
- Use 'r' for return values to functions whose return values are a
different error space (like xc_tmem_control, xc_tmem_auth)
Signed-off-by: Paulina Szubarczyk
---
tools/libxl/libxl.c | 58 ++---
1 file changed,
libxl_set_memory_target seems to have the following return values:
* 1 on failure, if the failure happens because of a xenstore error *or*
* invalid
target
* -1 if the setmaxmem hypercall
* -errno if the set_pod_target hypercall target fails
* 0 on success
Make it consistently return ERROR_FAI
On Thu, 2016-03-31 at 23:59 -0500, Chong Li wrote:
> Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
> functions to support per-VCPU settings.
>
> Signed-off-by: Chong Li
> Signed-off-by: Meng Xu
> Signed-off-by: Sisu Xi
>
> Acked-by: Wei Liu
> Reviewed-by: Dario Faggioli
>
Y
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 01 April 2016 12:21
> To: Paul Durrant
> Cc: Andrew Cooper; Anthony Perard; Stefano Stabellini; xen-devel; Keir
> (Xen.org)
> Subject: RE: [PATCH RFC] x86/vMSI-X: avoid missing first unmask of vectors
>
> >>> On 01
On Thu, 31 Mar 2016, Ben Sanda wrote:
> Stefano,
>
> Thank you for the comments. In response:
>
> > Changing cycles_t to uint64_t sounds good, but why did you move
> > boot_count here from below?
>
> I had to move it up so it would be defined for use in the updated
> get_cycles() call:
> return
Hi all
Today is the anticipated freeze date. Unfortunately many maintainers
and committers were not available during this week because of Easter
holiday. We also suffered from the departure of two major contributors
(Ian and Stefano). Furthermore, there is a huge backlog of patches
waiting to be
On Thu, 2016-03-31 at 23:59 -0500, Chong Li wrote:
> Change main_sched_rtds and related output functions to support
> per-VCPU settings.
>
> Signed-off-by: Chong Li
> Signed-off-by: Meng Xu
> Signed-off-by: Sisu Xi
>
> Acked-by: Wei Liu
>
This Acked-by, I'm should have been removed. In fact,
>>> On 24.03.16 at 21:00, wrote:
> From: Ross Lagerwall
>
> Implement support for the apply, revert and replace actions.
>
> To perform and action on a payload, the hypercall sets up a data
> structure to schedule the work. A hook is added in all the
> return-to-guest paths to check for work t
>>> On 24.03.16 at 21:00, wrote:
> --- a/xen/Makefile
> +++ b/xen/Makefile
> @@ -75,6 +75,7 @@ _install: $(TARGET)$(CONFIG_XEN_INSTALL_SUFFIX)
> echo 'EFI installation only partially done (EFI_VENDOR
> not set)' >&2; \
> fi; \
> fi
> + $(MAKE) -f $(BA
Please don't top post, it breaks the flow of the conversation.
I'm also adding Anthony (one of the QEMU/Xen maintainers).
On Fri, 1 Apr 2016, Paulina Szubarczyk wrote:
> Hi Roger,
>
> An another point that needs to be filled up in the application is timeline.
> I made the proposition of it, I am
Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 88047: regressions -
FAIL"):
> On 01.04.16 at 08:12, wrote:
> > Tests which did not succeed and are blocking,
> > including tests which could not be run:
> > test-amd64-i386-libvirt-pair 21 guest-migrate/src_host/dst_host fail REGR.
> > v
On Thu, Mar 31, 2016 at 11:59:45PM -0500, Chong Li wrote:
> Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
> functions to support per-VCPU settings.
>
> Signed-off-by: Chong Li
> Signed-off-by: Meng Xu
> Signed-off-by: Sisu Xi
>
> Acked-by: Wei Liu
This should have been drop
On Fri, Apr 01, 2016 at 03:15:18PM +0200, Dario Faggioli wrote:
> On Thu, 2016-03-31 at 23:59 -0500, Chong Li wrote:
> > Change main_sched_rtds and related output functions to support
> > per-VCPU settings.
> >
> > Signed-off-by: Chong Li
> > Signed-off-by: Meng Xu
> > Signed-off-by: Sisu Xi
>
>>> On 01.04.16 at 15:01, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 01 April 2016 12:21
>> >>> On 01.04.16 at 12:56, wrote:
>> >> From: Jan Beulich [mailto:jbeul...@suse.com]
>> >> Sent: 01 April 2016 10:59
>> >> >>> On 01.04.16 at 11:15, wrote:
>> >> > Recent changes to Li
On Fri, 1 Apr 2016, Marin Bek wrote:
> Hi,
> anyone had any luck compiling just libxenstore on OSX? Any pointers?
Even if you could get it to compile, what are you going to do with it?
AFAIK there's no xenstore user-space device in the OS X kernel, so it
won't be able to do anything.
Roger.
__
>>> On 01.04.16 at 15:36, wrote:
> Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 88047: regressions -
> FAIL"):
>> On 01.04.16 at 08:12, wrote:
>> > Tests which did not succeed and are blocking,
>> > including tests which could not be run:
>> > test-amd64-i386-libvirt-pair 21 guest-m
Wei Liu writes ("Re: [Xen-users] DomU fails to reboot with storage driver
domain"):
> On Fri, Apr 01, 2016 at 01:04:42PM +0200, Roger Pau Monné wrote:
> > TBH, I don't see an easy way to solve this, I've thought about fetching
> > the "backend" node from the xenstore frontend path of each device,
On Thu, Mar 31, 2016 at 01:23:03PM +0200, Olaf Hering wrote:
> Tools fails to build with gcc 4.5, it does not provide ssize_t.
>
> Fixes d275ec9 ("libxc/libxl/python/xenstat/ocaml: Use new XEN_VERSION
> hypercall")
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Wei Liu
Acked-by: Wei L
Wei Liu writes ("[PATCH 0/2] Remaining prerequisite patches for COLO"):
> Konrad Rzeszutek Wilk (1):
> libxc: Document xc_domain_resume
>
> Wen Congyang (1):
> libxc: support to resume uncooperative HVM guests
Committed-by: Ian Jackson
___
Xen-dev
Changlong Xie writes ("Re: [PATCH v13 00/26] COarse-grain LOck-stepping Virtual
Machines for Non-stop Service"):
> https://github.com/Pating/xen/tree/changlox/colo_v14
>
> Just add A-B for p12,p14,20,p23,p25,p26 in this version, no other changes.
>
> *Note*, dont merge
> https://github.com/Pati
On Thu, Mar 31, 2016 at 01:25:30PM +0200, Olaf Hering wrote:
> Tools fails to build with gcc 4.5, it does not provide ssize_t.
>
> Fixes d275ec9 ("libxc/libxl/python/xenstat/ocaml: Use new XEN_VERSION
> hypercall")
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Wei Liu
Acked-by: Wei L
>>> On 01.04.16 at 09:54, wrote:
> The code in hvm/hvm.c related to handling I/O emulation using the ioreq
> server framework is large and mostly self-contained.
>
> This patch separates the ioreq server code into a new hvm/ioreq.c source
> module and accompanying asm-x86/hvm/ioreq.h header file.
Olaf Hering writes ("[PATCH v2] tools/libxc: Fix build error when using
xc_version_len"):
> Tools fails to build with gcc 4.5, it does not provide ssize_t.
Changlong Xie writes ("[PATCH] tools: add missing header for xenctrl.h"):
> Commit d275ec9c introduce ssize_t but not include relevant header
On Fri, 2016-04-01 at 14:43 +0100, Wei Liu wrote:
> On Fri, Apr 01, 2016 at 03:15:18PM +0200, Dario Faggioli wrote:
> >
> > I've found only a couple of style issues. I don't feel like
> > blocking
> > the series or asking to resend... perhaps they can be fixed during
> > commit? Or I'm up for send
>>> On 31.03.16 at 18:00, wrote:
> Current implementation of elf_load_bsdsyms is broken when loading inside of
> a HVM guest, because it assumes elf_memcpy_safe is able to write into guest
> memory space, which it is not.
>
> Take the oportunity to do some cleanup and properly document how
> elf_
On Thu, Mar 31, 2016 at 10:58:19PM +0200, Sjoer van der Ploeg wrote:
Heya!
Thank you for posting this and also adding the #ifdef for older
versions!
Was wondering thought - had you double-checked that the new
code path works with the certs?
Thanks!
P.S.
CC-ing Ian who is the QEMU-traditional m
On Fri, Apr 01, 2016 at 02:43:32PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [Xen-users] DomU fails to reboot with storage driver
> domain"):
> > On Fri, Apr 01, 2016 at 01:04:42PM +0200, Roger Pau Monné wrote:
> > > TBH, I don't see an easy way to solve this, I've thought about fetching
>
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 01 April 2016 14:43
> To: Paul Durrant
> Cc: Andrew Cooper; Anthony Perard; Stefano Stabellini; xen-devel; Keir
> (Xen.org)
> Subject: RE: [PATCH RFC] x86/vMSI-X: avoid missing first unmask of vectors
>
> >>> On 01
The latest staging tree doesn't build:
make[1]: Entering directory '/home/gross/xen/docs'
/usr/bin/pod2man --release=4.7-unstable --name=xl -s 1 -c "Xen"
man/xl.pod.1 man1/xl.1
man/xl.pod.1 around line 466: You can't have =items (as at line 471)
unless the first thing after the =over is an =item
P
On Thu, 2016-03-31 at 16:35 +, tutu sky wrote:
> Thanks a lot. That works.
> I think all boot parameters can be found here:
> http://xenbits.xenproject.org/docs/unstable/misc/xen-command-line.htm
> l
>
Indeed.
> you may want to use them or not, and if i don't make mistake, it does
> not make
On Fri, 1 Apr 2016, Paulina Szubarczyk wrote:
> Retrun error code instead of allways 0. Remove assigned-only
^ ur ^ extra "l"
> ret variable.
>
> Signed-off-by: Paulina Szubarczyk
You have missed to Cc one of the maintainers of the code, Ian Jackson.
Please either che
Dario Faggioli writes ("git branch for checking-in leftover patches [was: Re:
[Xen-devel] [PATCH 1/3] xenalyze: handle DOM0 operaions events]"):
> git://xenbits.xen.org/people/dariof/xen.git
> tracing/sched-events-improvements-leftover
> http://xenbits.xen.org/gitweb/?p=people/dariof/xen.git;a=
Roger Pau Monne writes ("[PATCH v6] libelf: rewrite symtab/strtab loading"):
> Current implementation of elf_load_bsdsyms is broken when loading inside of
> a HVM guest, because it assumes elf_memcpy_safe is able to write into guest
> memory space, which it is not.
>
> Take the oportunity to do so
On Fri, Apr 01, 2016 at 03:57:45PM +0200, Juergen Gross wrote:
> The latest staging tree doesn't build:
>
> make[1]: Entering directory '/home/gross/xen/docs'
> /usr/bin/pod2man --release=4.7-unstable --name=xl -s 1 -c "Xen"
> man/xl.pod.1 man1/xl.1
> man/xl.pod.1 around line 466: You can't have =
Roger Pau Monné writes ("Re: [PATCH v7] libxl: allow 'phy' backend to use empty
files"):
> This check is done inside of a switch branch that's only used by
> LIBXL_DISK_BACKEND_PHY, so it doesn't assume that every backend can handle
> empty files.
...
> I can move the check to a lower place (aft
Roger Pau Monne writes ("[PATCH v3 4/8] libxl: add support for disk hotplug
scripts on FreeBSD"):
> Allow FreeBSD to execute hotplug scripts when attaching disk devices.
I am going to commit the FreeBSD-only patches without detailed
review, on the basis that you're the expert.
Thanks,
Ian.
Wei Liu writes ("Re: [PATCH] libxl: introduce
LIBXL_VGA_INTERFACE_TYPE_UNKNOWN"):
> On Wed, Mar 02, 2016 at 04:46:43PM +0100, Roger Pau Monne wrote:
> > And use it as the default value for the VGA kind. This allows libxl to set
> > it to the default value later on when the domain type is known. Fo
On Fri, Apr 01, 2016 at 07:50:06AM -0600, Jan Beulich wrote:
> >>> On 01.04.16 at 09:54, wrote:
> > The code in hvm/hvm.c related to handling I/O emulation using the ioreq
> > server framework is large and mostly self-contained.
> >
> > This patch separates the ioreq server code into a new hvm/io
On Thu, Mar 31, 2016 at 05:41:49PM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> To distinguish the error logs in function map_dev_mmio_region, use
> XENLOG_G_ERR instead of XENLOG_ERR.
>
> Signed-off-by: Shannon Zhao
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> xen/arch/arm/p2m.c | 2 +
On Fri, 1 Apr 2016, Paulina Szubarczyk wrote:
> libxl_device_pci_assignable_list returns:
> - list of the libxl_device_pci
> - NULL in case of error
>
> the rc variable is unused as return code.
>
> Signed-off-by: Paulina Szubarczyk
> ---
> tools/libxl/libxl_pci.c | 5 ++---
> 1 file changed, 2
George Dunlap writes ("Re: [Xen-devel] [PATCH 5/8] libxl: Share logic for
finding path between qemuu and pygrub"):
> That's what the "qdisk_direct" argument is for -- it tells
> libxl__device_disk_find_local_path, "I can interpret QDISK backends".
> Pygrub will call this function with "qdisk_direc
>>> On 01.04.16 at 15:54, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 01 April 2016 14:43
>> >>> On 01.04.16 at 15:01, wrote:
>> >> From: Jan Beulich [mailto:jbeul...@suse.com]
>> >> Sent: 01 April 2016 12:21
>> >> >>> On 01.04.16 at 12:56, wrote:
>> >> >> From: Jan Beulich [
George Dunlap writes ("[PATCH v3 3/9] tools/hotplug: Write physical-device-path
in addition to physical-device"):
> Change block-common.sh on Linux to write physical-device-path with the
> path of the device node, in addition to physical-device with its
> major:minor numbers.
>
> Signed-off-by: G
George Dunlap writes ("[PATCH v3 6/9] libxl: Share logic for finding path
between qemuu and pygrub"):
> From: George Dunlap
>
> qemu can also access disks which will be provided with a qdisk backend
> directly; add a flag to libxl__device_disk_find_local_path to indicate
> whether to check for q
1 - 100 of 258 matches
Mail list logo