On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote:
snip
+static bool_t is_payload_symbol(const struct xsplice_elf *elf,
+const struct xsplice_elf_sym *sym)
+{
+if ( sym->sym->st_shndx == SHN_UNDEF ||
+ sym->sym->st_shndx >= elf->hdr->e_shnum )
+
>>> On 22.04.16 at 04:02, wrote:
> 2016-04-21 22:19 GMT+08:00 Jan Beulich :
>
>> >>> On 30.03.16 at 09:28, wrote:
>> > 2016-03-29 18:39 GMT+08:00 Jan Beulich :
>> >> ---
>> >> I assume this also addresses the issue which
>> >>
>> http://lists.xenproject.org/archives/html/xen-devel/2016-01/msg031
When a guest unmasks MSI-X interrupts before enabling MSI-X on the
device, so far nothing updates the {host,guest}_masked internal state;
this to date only gets done when MSI-X is already enabled. This is why
half way recent Linux works (as it enables MSI-X first), while Windows
doesn't (as it enab
>>> On 21.04.16 at 18:47, wrote:
> On April 21, 2016 11:36:24 AM EDT, Jan Beulich wrote:
> On 21.04.16 at 17:15, wrote:
>>> On Wed, Apr 20, 2016 at 11:59:34AM -0400, Konrad Rzeszutek Wilk
>>wrote:
> >@@ -29,6 +30,13 @@ struct payload {
> >uint32_t state; /
>>> On 21.04.16 at 22:27, wrote:
> On Thu, Apr 21, 2016 at 12:44:41AM -0600, Jan Beulich wrote:
>> >>> On 21.04.16 at 02:28, wrote:
>> >> >+ASSERT(sec);
>> >> >+if ( sec->sec->sh_size % sizeof(*payload->funcs) )
>> >> >+{
>> >> >+dprintk(XENLOG_ERR, XSPLICE "%s: Wrong size of
Hi all.
I've recently changed and added some line of code in some functions of credit
scheduler, then issue:
make clean
make world
(fix compilation errors, if any)
make install
rm -f /boot/xen.gz
and update-grub
then reboot the system to change to dom0, but when grub is loaded and i choose
"ubunt
>>> On 22.04.16 at 09:17, wrote:
> On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote:
> snip
>>>
+static bool_t is_payload_symbol(const struct xsplice_elf *elf,
+const struct xsplice_elf_sym *sym)
+{
+if ( sym->sym->st_shndx == SHN_UNDEF ||
On 22/04/16 09:48, tutu sky wrote:
> Hi all.
> I've recently changed and added some line of code in some functions of credit
> scheduler, then issue:
> make clean
> make world
> (fix compilation errors, if any)
> make install
> rm -f /boot/xen.gz
> and update-grub
> then reboot the system to chang
thanks Juergen,
i tried attaching serial console before in vmware (according
http://wiki.xenproject.org/wiki/XenSerialConsole) but it was not successful,
does your mentioned link need any command line options which must be added for
it to work correctly? or any extra compile and configuration st
Hi,
In linux kernel we can use affinity settings to ask scheduler for directly
running the special thread on special cpu or taskset for special command, I
have a question that: is it possible in Xen for having such a mechanism? I mean
is there any hypercall or something similar (I don't hav
>>> On 22.04.16 at 04:36, wrote:
> On 04/21/16 01:04, Jan Beulich wrote:
>> >>> On 21.04.16 at 07:09, wrote:
>> > On 04/12/16 16:45, Haozhong Zhang wrote:
>> >> On 04/08/16 09:52, Jan Beulich wrote:
>> >> > >>> On 08.04.16 at 07:02, wrote:
>> >> > > On 03/29/16 04:49, Jan Beulich wrote:
>> >> >
>>> On 21.04.16 at 18:03, wrote:
> Clarify the meaning of nested maintainership.
>
> Signed-off-by: George Dunlap
With the minor corrections suggested by Lars and Jürgen,
Acked-by: Jan Beulich
Thanks for this nice summary!
Jan
___
Xen-devel mailin
flight 92228 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92228/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
test-amd64-amd64-xl-c
I've been getting increasingly annoyed by people not applying common
sense to these docs updates.
Signed-off-by: Jan Beulich
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -129,6 +129,7 @@ M: Stefano Stabellini
S: Supported
L: xen-devel@lists.xen.org
+F: docs/misc/arm/
F: xen/arch/
Short of getting any feedback on the previous discussion item
http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg00571.html
here's a formal revert request: Please revert commit 19f6c522a6
from the staging tree (afaict it didn't get mirrored to any of the
stable trees yet), as the change
On 04/22/2016 08:51 AM, Jan Beulich wrote:
On 22.04.16 at 09:17, wrote:
On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote: snip
+static bool_t is_payload_symbol(const struct xsplice_elf
*elf, +const struct
xsplice_elf_sym *sym) +{ +if ( sym->sym->st_shnd
On 22/04/16 10:18, tutu sky wrote:
> thanks Juergen,
> i tried attaching serial console before in vmware (according
> http://wiki.xenproject.org/wiki/XenSerialConsole) but it was not successful,
> does your mentioned link need any command line options which must be added
> for it to work correct
`invlpg` and `invlpga` are specified to be NOPs when issued on non-canonical
addresses.
These instructions are not normally intercepted. They are however intercepted
for HVM guests running in shadow paging mode. AMD hardware lacking decode
hardware assistance uses the general instruction emulato
yeah i tried, attaching a serial console was not possible for me, so i tried
vmware and i tried match the information in link with some links on do the same
using vmware. actually when using vmware for doing so, i changed:
GRUB_CMDLINE_XEN line of grub to "loglvl=all guest_loglvl=all
com1=11520
On Fri, 22 Apr 2016, Jan Beulich wrote:
> I've been getting increasingly annoyed by people not applying common
> sense to these docs updates.
>
> Signed-off-by: Jan Beulich
Acked-by: Stefano Stabellini
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -129,6 +129,7 @@ M:Stefano Stabellini
Hi Dirk,
On 22/04/2016 07:23, Dirk Behme wrote:
On 20.04.2016 15:21, Julien Grall wrote:
I would create a specific section in this documentation to list what the
firmware should do in EL3 before starting Xen.
Done:
http://lists.xen.org/archives/html/xen-devel/2016-04/msg02687.html
Thank y
>>> On 21.04.16 at 15:29, wrote:
> --- a/xen/arch/x86/time.c
> +++ b/xen/arch/x86/time.c
> @@ -784,7 +784,7 @@ static void __update_vcpu_system_time(struct vcpu *v, int
> force)
> struct cpu_time *t;
> struct vcpu_time_info *u, _u = {};
> struct domain *d = v->domain;
> -
>>> On 22.04.16 at 10:59, wrote:
> `invlpg` and `invlpga` are specified to be NOPs when issued on non-canonical
> addresses.
>
> These instructions are not normally intercepted. They are however
> intercepted
> for HVM guests running in shadow paging mode. AMD hardware lacking decode
> hardwar
On Tue, 12 Apr 2016, Julien Grall wrote:
> On 11/04/2016 10:52, George Dunlap wrote:
> > On Fri, Apr 8, 2016 at 6:58 PM, Andrew Cooper
> > wrote:
> > > On 08/04/16 16:49, Jan Beulich wrote:
> > > > > > > On 08.04.16 at 12:42, wrote:
> > > > > On 04/04/16 19:48, Benjamin Sanda wrote:
> > > > > > +
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 22 April 2016 10:31
> To: Andrew Cooper
> Cc: Paul Durrant; Wei Liu; Xen-devel
> Subject: Re: [PATCH for-4.7] x86/hvm: Correct emulation of invlpg instruction
>
> >>> On 22.04.16 at 10:59, wrote:
> > `invlpg` and
Commit-ID: 103f6112f253017d7062cd74d17f4a514ed4485c
Gitweb: http://git.kernel.org/tip/103f6112f253017d7062cd74d17f4a514ed4485c
Author: Jan Beulich
AuthorDate: Thu, 21 Apr 2016 00:27:04 -0600
Committer: Ingo Molnar
CommitDate: Fri, 22 Apr 2016 10:05:00 +0200
x86/mm/xen: Suppress hugetlb
>>> On 22.04.16 at 11:48, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 22 April 2016 10:31
>> >>> On 22.04.16 at 10:59, wrote:
>> > --- a/xen/arch/x86/hvm/emulate.c
>> > +++ b/xen/arch/x86/hvm/emulate.c
>> > @@ -1598,8 +1598,27 @@ static int hvmemul_invlpg(
>> > rc = hvmem
flight 44354 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44354/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-armhf 3 host-install(3) broken like 44334
build-armhf-pvop
On Thu, Apr 21, 2016 at 02:55:33AM -0600, Jan Beulich wrote:
> >>> On 21.04.16 at 10:36, wrote:
> > On 11/03/16 16:01, Jan Beulich wrote:
> >> In that case (with the new value being held in, or now in one case cast
> >> to, a 32-bit variable) there's no need to go through the long mode part
> >> o
>>> On 22.04.16 at 10:45, wrote:
> On 04/22/2016 08:51 AM, Jan Beulich wrote:
> On 22.04.16 at 09:17, wrote:
>>> On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote: snip
>
>> +static bool_t is_payload_symbol(const struct xsplice_elf
>> *elf, +const
On Fri, 22 Apr 2016, Jan Beulich wrote:
> >>> On 21.04.16 at 15:29, wrote:
> > --- a/xen/arch/x86/time.c
> > +++ b/xen/arch/x86/time.c
> > @@ -784,7 +784,7 @@ static void __update_vcpu_system_time(struct vcpu *v,
> > int force)
> > struct cpu_time *t;
> > struct vcpu_time_info *u,
On Thu, Apr 21, 2016 at 12:49:09AM -0600, Jan Beulich wrote:
> >>> On 21.04.16 at 02:29, wrote:
> > On Tue, Apr 19, 2016 at 02:17:35PM -0600, Jan Beulich wrote:
> >> >>> Konrad Rzeszutek Wilk 04/14/16 12:02 AM >>>
> >> >+bool_t is_patch(const void *ptr)
> >> >+{
> >> >+struct payload *data;
>
On 04/22/16 02:24, Jan Beulich wrote:
[..]
> >> >> Well, using existing range struct to manage guest access permissions
> >> >> to nvdimm could consume too much space which could not fit in either
> >> >> memory or nvdimm. If the above solution looks really error-prone,
> >> >> perhaps we can still
On 22/04/16 10:57, Jan Beulich wrote:
On 22.04.16 at 11:48, wrote:
>>> From: Jan Beulich [mailto:jbeul...@suse.com]
>>> Sent: 22 April 2016 10:31
>> On 22.04.16 at 10:59, wrote:
--- a/xen/arch/x86/hvm/emulate.c
+++ b/xen/arch/x86/hvm/emulate.c
@@ -1598,8 +1598,27 @@ static
On Thu, Apr 21, 2016 at 01:31:15AM -0600, Jan Beulich wrote:
> As proposed on the hackathon.
>
> Signed-off-by: Jan Beulich
> Acked-by: Ian Jackson
Acked-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.o
On Fri, Apr 22, 2016 at 04:08:10AM -0600, Jan Beulich wrote:
> >>> On 22.04.16 at 10:45, wrote:
> > On 04/22/2016 08:51 AM, Jan Beulich wrote:
> > On 22.04.16 at 09:17, wrote:
> >>> On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote: snip
> >
> >> +static bool_t is_payload_symbol(con
>>> On 22.04.16 at 12:16, wrote:
> On 22/04/16 10:57, Jan Beulich wrote:
> On 22.04.16 at 11:48, wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 22 April 2016 10:31
>>> On 22.04.16 at 10:59, wrote:
> --- a/xen/arch/x86/hvm/emulate.c
> +++ b/xen/arch/x86/hvm/em
Signed-off-by: Wei Liu
---
Cc: Roger Pau Monné
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
Contains build fix for FreeBSD and another fix for Q35 (which we don't
use at the moment). It should be pretty safe to go in.
---
Config.mk | 6 +++---
1 file changed, 3 insertions(
>>> On 22.04.16 at 12:10, wrote:
> On Thu, Apr 21, 2016 at 12:49:09AM -0600, Jan Beulich wrote:
>> >>> On 21.04.16 at 02:29, wrote:
>> > On Tue, Apr 19, 2016 at 02:17:35PM -0600, Jan Beulich wrote:
>> >> >>> Konrad Rzeszutek Wilk 04/14/16 12:02 AM >>>
>> >> >+bool_t is_patch(const void *ptr)
>>
On Wed, Apr 20, 2016 at 10:34:41AM +0100, Stefano Stabellini wrote:
> Hello Mark,
>
> do you think that this patch addresses your previous comments
> (http://marc.info/?l=devicetree&m=145926913008544&w=2) appropriately?
>
> Thanks,
>
> Stefano
>
> On Thu, 7 Apr 2016, Shannon Zhao wrote:
> > Fro
flight 92237 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92237/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 15 guest-localmigrate/x10 fail REGR.
vs. 87998
Tests w
On Wed, Apr 20, 2016 at 01:49:41AM -0600, Jan Beulich wrote:
> >>> Konrad Rzeszutek Wilk 04/14/16 12:03 AM >>>
> >+.PHONY: note.o
> >+note.o:
> >+$(OBJCOPY) -O binary --only-section=.note.gnu.build-id
> >$(BASEDIR)/xen-syms $@.bin
> >+$(OBJCOPY) -I binary -O elf64-x86-64 -B i386:x86-64 \
On Tue, Apr 19, 2016 at 08:18:14AM +0100, David Vrabel wrote:
> Hi Wei,
>
> This patch has all the required acks now. Can you consider it for 4.7?
>
> It's a signficant scalability improvement (see the cover letter for
> details).
>
> v7 has been in XenServer's upcoming release for a while now
>>> On 22.04.16 at 12:28, wrote:
> On Fri, Apr 22, 2016 at 04:08:10AM -0600, Jan Beulich wrote:
>> >>> On 22.04.16 at 10:45, wrote:
>> > On 04/22/2016 08:51 AM, Jan Beulich wrote:
>> > On 22.04.16 at 09:17, wrote:
>> >>> On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote: snip
>> >
>> >
On Thu, Apr 07, 2016 at 08:03:28PM +0800, Shannon Zhao wrote:
> --- a/arch/arm64/kernel/setup.c
> +++ b/arch/arm64/kernel/setup.c
> @@ -320,6 +320,7 @@ void __init setup_arch(char **cmdline_p)
>*/
> cpu_uninstall_idmap();
>
> + xen_early_init();
> efi_init();
> arm64
> > Ideas?
>
> Well, this presumably being a redundant .section directive
> somewhere it would require seeing the full .c together with the
> intermediate .s in order to tell. But I guess to avoid you spending
> more time on this secondary aspect, let's just drop this for now
> and just put it on
On 22/04/16 11:49, Wei Liu wrote:
> On Tue, Apr 19, 2016 at 08:18:14AM +0100, David Vrabel wrote:
>> Hi Wei,
>>
>> This patch has all the required acks now. Can you consider it for 4.7?
>>
>> It's a signficant scalability improvement (see the cover letter for
>> details).
>>
>> v7 has been in XenS
On Thu, Apr 07, 2016 at 08:03:29PM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> When it's a Xen domain0 booting with ACPI, it will supply a /chosen and
> a /hypervisor node in DT. So check if it needs to enable ACPI.
>
> Signed-off-by: Shannon Zhao
> Reviewed-by: Stefano Stabellini
> Ac
On Fri, Apr 22, 2016 at 11:52:07AM +0100, George Dunlap wrote:
> On 22/04/16 11:49, Wei Liu wrote:
> > On Tue, Apr 19, 2016 at 08:18:14AM +0100, David Vrabel wrote:
> >> Hi Wei,
> >>
> >> This patch has all the required acks now. Can you consider it for 4.7?
> >>
> >> It's a signficant scalability
>>> On 22.04.16 at 12:16, wrote:
> On 04/22/16 02:24, Jan Beulich wrote:
> [..]
>> >> >> Well, using existing range struct to manage guest access permissions
>> >> >> to nvdimm could consume too much space which could not fit in either
>> >> >> memory or nvdimm. If the above solution looks really
On Thu, Apr 07, 2016 at 08:03:32PM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> When running on Xen hypervisor, runtime services are supported through
> hypercall. Add a Xen specific function to initialize runtime services.
>
> Signed-off-by: Shannon Zhao
> Reviewed-by: Stefano Stabellin
On Fri, Apr 22, 2016 at 04:28:42AM -0600, Jan Beulich wrote:
> >>> On 22.04.16 at 12:10, wrote:
> > On Thu, Apr 21, 2016 at 12:49:09AM -0600, Jan Beulich wrote:
> >> >>> On 21.04.16 at 02:29, wrote:
> >> > On Tue, Apr 19, 2016 at 02:17:35PM -0600, Jan Beulich wrote:
> >> >> >>> Konrad Rzeszutek W
>>> On 22.04.16 at 12:46, wrote:
> On Wed, Apr 20, 2016 at 01:49:41AM -0600, Jan Beulich wrote:
>> >>> Konrad Rzeszutek Wilk 04/14/16 12:03 AM >>>
>> >+.PHONY: hello_world_note.o
>> >+hello_world_note.o:
>> >+ $(OBJCOPY) -O binary --only-section=.note.gnu.build-id $(XSPLICE) $@.bin
>> >+ $(OB
If Device-TLB flush timed out, we hide the target ATS device
immediately and crash the domain owning this ATS device. If
impacted domain is hardware domain, just throw out a warning.
By hiding the device, we make sure it can't be assigned to any
domain any longer (see device_assigned).
Signed-off
This patches fix current timeout concern and also allow limited ATS support:
1. Add a timeout parameter for Queued Invalidation
The parameter 'vtd_qi_timeout' specifies the timeout of the
VT-d Queued Invalidation in milliseconds. By default, the
timeout is 1ms, which can be boot-time changed.
The parameter 'vtd_qi_timeout' specifies the timeout of the
VT-d Queued Invalidation in milliseconds. By default, the
timeout is 1ms, which can be boot-time changed.
Add a __must_check annotation. The followup patch titled
'VT-d IOTLB/Context/IEC flush issue' addresses the __mustcheck.
That is the
Today we do Device-TLB flush synchronization after issuing flush
requests for all ATS devices belonging to a VM. Doing so however
imposes a limitation, i.e. that we can not figure out which flush
request is blocked in the flush queue list, based on VT-d spec.
To prepare correct Device-TLB flush ti
>>> On 22.04.16 at 12:54, wrote:
> The thing that makes it "safe" (in lieu of your comment about
> re-ordering) is that the trap code does:
>
> 1289 /* WARN, BUG or ASSERT: decode the filename pointer and line
> number. */
> 1290 filename = bug_ptr(bug);
> 1291 if ( !is_kernel(filena
On Fri, Apr 22, 2016 at 04:50:34AM -0600, Jan Beulich wrote:
> >>> On 22.04.16 at 12:28, wrote:
> > On Fri, Apr 22, 2016 at 04:08:10AM -0600, Jan Beulich wrote:
> >> >>> On 22.04.16 at 10:45, wrote:
> >> > On 04/22/2016 08:51 AM, Jan Beulich wrote:
> >> > On 22.04.16 at 09:17, wrote:
> >> >>
On Thu, Apr 21, 2016 at 8:31 AM, Jan Beulich wrote:
> As proposed on the hackathon.
>
> Signed-off-by: Jan Beulich
> Acked-by: Ian Jackson
>
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -437,10 +437,15 @@ F: xen/xsm/
> F: docs/misc/xsm-flask.txt
>
> THE REST
> +M: Andrew Cooper
> +M:
On Fri, Apr 22, 2016 at 04:58:19AM -0600, Jan Beulich wrote:
> >>> On 22.04.16 at 12:54, wrote:
> > The thing that makes it "safe" (in lieu of your comment about
> > re-ordering) is that the trap code does:
> >
> > 1289 /* WARN, BUG or ASSERT: decode the filename pointer and line
> > number.
>>> On 22.04.16 at 12:08, wrote:
> On Fri, 22 Apr 2016, Jan Beulich wrote:
>> >>> On 21.04.16 at 15:29, wrote:
>> > --- a/xen/arch/x86/time.c
>> > +++ b/xen/arch/x86/time.c
>> > @@ -784,7 +784,7 @@ static void __update_vcpu_system_time(struct vcpu *v,
> int force)
>> > struct cpu_time
On 04/22/2016 11:08 AM, Jan Beulich wrote:
On 22.04.16 at 10:45, wrote:
On 04/22/2016 08:51 AM, Jan Beulich wrote:
On 22.04.16 at 09:17, wrote:
On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote: snip
+static bool_t is_payload_symbol(const struct xsplice_elf
*elf, +
On Tue, Apr 12, 2016 at 10:12:28AM -0700, Stefano Stabellini wrote:
> On Tue, 12 Apr 2016, Wei Liu wrote:
> > In commit ac0487e1 ("xenfb.c: avoid expensive loops when prod <=
> > out_cons"), ">=" was used. In fact, a full ring is a legit state.
> > Correct the test to use ">".
> >
> > Reported-by:
>>> On 22.04.16 at 13:08, wrote:
> On Fri, Apr 22, 2016 at 04:50:34AM -0600, Jan Beulich wrote:
>> >>> On 22.04.16 at 12:28, wrote:
>> > On Fri, Apr 22, 2016 at 04:08:10AM -0600, Jan Beulich wrote:
>> >> >>> On 22.04.16 at 10:45, wrote:
>> >> > Rather than ignoring STT_NOTYPE, an alternative wou
On Fri, Apr 22, 2016 at 12:16:09PM +0100, Anthony PERARD wrote:
> On Tue, Apr 12, 2016 at 10:12:28AM -0700, Stefano Stabellini wrote:
> > On Tue, 12 Apr 2016, Wei Liu wrote:
> > > In commit ac0487e1 ("xenfb.c: avoid expensive loops when prod <=
> > > out_cons"), ">=" was used. In fact, a full ring
This run is configured for baseline tests only.
flight 44353 linux-3.14 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44353/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-build
On 22/04/16 11:30, Jan Beulich wrote:
On 22.04.16 at 12:16, wrote:
>> On 22/04/16 10:57, Jan Beulich wrote:
>> On 22.04.16 at 11:48, wrote:
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 22 April 2016 10:31
On 22.04.16 at 10:59, wrote:
>> --- a/xen/arch/x86/
On Fri, Apr 22, 2016 at 12:08 PM, George Dunlap
wrote:
> On Thu, Apr 21, 2016 at 8:31 AM, Jan Beulich wrote:
>> As proposed on the hackathon.
>>
>> Signed-off-by: Jan Beulich
>> Acked-by: Ian Jackson
>>
>> --- a/MAINTAINERS
>> +++ b/MAINTAINERS
>> @@ -437,10 +437,15 @@ F: xen/xsm/
>> F: docs
>>> On 22.04.16 at 13:13, wrote:
> On 04/22/2016 11:08 AM, Jan Beulich wrote:
> On 22.04.16 at 10:45, wrote:
>>> On 04/22/2016 08:51 AM, Jan Beulich wrote:
>>> On 22.04.16 at 09:17, wrote:
> On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote: snip
>>>
+static bool_t is_
On Thu, Apr 21, 2016 at 09:21:17PM +0800, Yu, Zhang wrote:
[...]
> It is a pity. And I'm the one to be blamed for. Thank you very much
Please don't blame yourself. I don't think anyone should be blamed here.
I can only speak for myself, but I feel grateful when other people want
to collaborate wi
>>> On 22.04.16 at 13:24, wrote:
> On Fri, Apr 22, 2016 at 12:08 PM, George Dunlap
> wrote:
>> On Thu, Apr 21, 2016 at 8:31 AM, Jan Beulich wrote:
>>> As proposed on the hackathon.
>>>
>>> Signed-off-by: Jan Beulich
>>> Acked-by: Ian Jackson
>>>
>>> --- a/MAINTAINERS
>>> +++ b/MAINTAINERS
>>>
On 22/04/16 12:27, Wei Liu wrote:
> On Thu, Apr 21, 2016 at 09:21:17PM +0800, Yu, Zhang wrote:
> [...]
>> It is a pity. And I'm the one to be blamed for. Thank you very much
>
> Please don't blame yourself. I don't think anyone should be blamed here.
There are lots of things that might have led t
On 22/04/16 12:28, Jan Beulich wrote:
On 22.04.16 at 13:24, wrote:
>> On Fri, Apr 22, 2016 at 12:08 PM, George Dunlap
>> wrote:
>>> On Thu, Apr 21, 2016 at 8:31 AM, Jan Beulich wrote:
As proposed on the hackathon.
Signed-off-by: Jan Beulich
Acked-by: Ian Jackson
>
Hi Jan,
On 20/04/16 17:43, Jan Beulich wrote:
Julien Grall 04/20/16 2:35 PM >>>
It is a matter of taste.
Indeed.
Is there any reason to not allow different way to create a mask?
I dislike it, but not so much to stand in the way to get it in. I.e. I'm not
going
to NAK it, but I'm also no
... as per his agreement, which got privately forwarded to me by Lars.
Signed-off-by: Jan Beulich
--- unstable.orig/MAINTAINERS 2016-04-22 10:31:52.0 +0200
+++ unstable/MAINTAINERS2016-04-22 13:29:57.0 +0200
@@ -339,7 +339,6 @@ S: Supported
F: .travis.yml
UNMOD
On Fri, Apr 22, 2016 at 11:33:01AM +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> Cc: Roger Pau Monné
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Keir Fraser
> Cc: Tim Deegan
>
> Contains build fix for FreeBSD and another fix for Q35 (which we don't
> use at the moment). It should be p
>>> On 22.04.16 at 12:33, wrote:
> Signed-off-by: Wei Liu
FWIW:
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 22.04.16 at 13:18, wrote:
> On 22/04/16 11:30, Jan Beulich wrote:
> On 22.04.16 at 12:16, wrote:
>>> On 22/04/16 10:57, Jan Beulich wrote:
>>> On 22.04.16 at 11:48, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 22 April 2016 10:31
> On 22.04.16 at
On Fri, 22 Apr 2016, Julien Grall wrote:
> Hi Jan,
>
> On 20/04/16 17:43, Jan Beulich wrote:
> > > > > Julien Grall 04/20/16 2:35 PM >>>
> > > It is a matter of taste.
> >
> > Indeed.
> >
> > > Is there any reason to not allow different way to create a mask?
> >
> > I dislike it, but not so mu
On Fri, 22 Apr 2016, Catalin Marinas wrote:
> On Thu, Apr 07, 2016 at 08:03:32PM +0800, Shannon Zhao wrote:
> > From: Shannon Zhao
> >
> > When running on Xen hypervisor, runtime services are supported through
> > hypercall. Add a Xen specific function to initialize runtime services.
> >
> > Sig
1fb3a8b2cfb2 ("xen/spinlock: Fix locking path engaging too soon under
PVHVM.") moved the initalization of the kicker interrupt until after
native_cpu_up() is called. However, when using qspinlocks, a CPU may try
to kick another CPU that is spinning (because it has not yet initialized
its kicker int
flight 92242 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92242/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-i386-pvgrub 9 debian-di-install fail in 92183 pass in 92242
test-armhf-armhf-libvirt-raw 6
On 04/22/16 04:53, Jan Beulich wrote:
> >>> On 22.04.16 at 12:16, wrote:
> > On 04/22/16 02:24, Jan Beulich wrote:
> > [..]
> >> >> >> Well, using existing range struct to manage guest access permissions
> >> >> >> to nvdimm could consume too much space which could not fit in either
> >> >> >> mem
>>> On 22.04.16 at 14:26, wrote:
> On 04/22/16 04:53, Jan Beulich wrote:
>> Perhaps I have got confused by the back and forth. If we're to
>> use struct page_info, then everything should be following a
>> similar flow to what happens for normal RAM, i.e. normal page
>> allocation, and normal assig
On 04/22/16 06:36, Jan Beulich wrote:
> >>> On 22.04.16 at 14:26, wrote:
> > On 04/22/16 04:53, Jan Beulich wrote:
> >> Perhaps I have got confused by the back and forth. If we're to
> >> use struct page_info, then everything should be following a
> >> similar flow to what happens for normal RAM,
On Fri, Apr 22, 2016 at 05:39:41AM -0600, Jan Beulich wrote:
> >>> On 22.04.16 at 12:33, wrote:
> > Signed-off-by: Wei Liu
>
> FWIW:
> Acked-by: Jan Beulich
>
Thank you both.
I will push this later today.
Wei.
___
Xen-devel mailing list
Xen-devel
>>> On 22.04.16 at 14:54, wrote:
> On 04/22/16 06:36, Jan Beulich wrote:
>> >>> On 22.04.16 at 14:26, wrote:
>> > On 04/22/16 04:53, Jan Beulich wrote:
>> >> Perhaps I have got confused by the back and forth. If we're to
>> >> use struct page_info, then everything should be following a
>> >> simi
Folks,
given that we have we are getting close to RC's, I would like to start to spec
out the headline Features for the press release. The big items I am aware of
are COLO. I am a little confused about xSplice.
Maybe we can use this thread to start collating a short-list.
Best Regards
Lars
_
>>> On 11.04.16 at 10:23, wrote:
> Some examples:
> XSA-80: In addition to patching the code, a hook function is needed to
> set iommu_dont_flush_iotlb back to 0.
I don't think this is an issue that can be reasonably life patched:
Doing so would likely lead to the false impression that everythin
On Fri, Apr 22, 2016 at 02:26:39PM +0100, Lars Kurth wrote:
> Folks,
>
> given that we have we are getting close to RC's, I would like to start to
> spec out the headline Features for the press release. The big items I am
> aware of are COLO. I am a little confused about xSplice.
>
> Maybe we c
On 22/04/16 12:47, Jan Beulich wrote:
On 22.04.16 at 13:18, wrote:
>> On 22/04/16 11:30, Jan Beulich wrote:
>> On 22.04.16 at 12:16, wrote:
On 22/04/16 10:57, Jan Beulich wrote:
On 22.04.16 at 11:48, wrote:
>>> From: Jan Beulich [mailto:jbeul...@suse.com]
>>> Sent:
On 22/04/16 15:26, Lars Kurth wrote:
> Folks,
>
> given that we have we are getting close to RC's, I would like to start to
> spec out the headline Features for the press release. The big items I am
> aware of are COLO. I am a little confused about xSplice.
>
> Maybe we can use this thread to s
>>> On 11.04.16 at 10:23, wrote:
> On 04/08/2016 06:39 PM, Jan Beulich wrote:
> On 08.04.16 at 17:57, wrote:
>>> I've marked the following XSAs as potentially requiring hook functions
>>> or shadow variables:
>>>
>>> XSA-36
Again an example that I don't think can be live patched: The ACPI
ta
On Fri, Apr 22, 2016 at 02:39:43PM +0100, Wei Liu wrote:
> On Fri, Apr 22, 2016 at 02:26:39PM +0100, Lars Kurth wrote:
> > Folks,
> >
> > given that we have we are getting close to RC's, I would like to start to
> > spec out the headline Features for the press release. The big items I am
> > awa
>>> On 22.04.16 at 15:40, wrote:
> Hmm - Section 6.15 is rather more clear, and does state #GP(0) and
> #SS(0) for limit violations.
>
> In which case I am going to have to untangle hvmemul_virtual_to_linear()
> and hvm_virtual_to_linear_addr() to distinguish the two cases, and also
> to raise #
On Fri, Apr 22, 2016 at 2:26 PM, Lars Kurth wrote:
> Folks,
>
> given that we have we are getting close to RC's, I would like to start to
> spec out the headline Features for the press release. The big items I am
> aware of are COLO. I am a little confused about xSplice.
>
> Maybe we can use thi
On Fri, Apr 22, 2016 at 9:26 AM, Lars Kurth wrote:
>
> Folks,
>
> given that we have we are getting close to RC's, I would like to start to
> spec out the headline Features for the press release. The big items I am
> aware of are COLO. I am a little confused about xSplice.
>
> Maybe we can use t
As both INVLPG and INVLPGA have basically the same exception rules
(leaving aside that INVLPGA requires SVME enabled, which so far isn't
being taken care of, and that INVLPG requires ModRM.mod != 3), fold
the handling of the two as much as possible alongside achieving the
goal of the patch (at once
On Fri, Apr 22, 2016 at 12:13:02PM +0100, Ross Lagerwall wrote:
> On 04/22/2016 11:08 AM, Jan Beulich wrote:
> On 22.04.16 at 10:45, wrote:
> >>On 04/22/2016 08:51 AM, Jan Beulich wrote:
> >>On 22.04.16 at 09:17, wrote:
> On 04/21/2016 01:26 AM, Konrad Rzeszutek Wilk wrote: snip
> >>>
1 - 100 of 195 matches
Mail list logo