>>> On 07.02.17 at 19:48, wrote:
> Until the IPI has completed, other processors might be running on this nested
> p2m object. clear_domain_page() does not guarantee to make 8-byte atomic
> updates, which means that a pagewalk on a remote processor might encounter a
> partial update.
>
> This is
libxl.c has grown to an uncomfortable size. Carve out the scheduler
related functions to libxl_sched.c.
Signed-off-by: Juergen Gross
---
tools/libxl/Makefile | 2 +-
tools/libxl/libxl.c | 891
tools/libxl/libxl_sched.c | 915 +
libxl.c has grown to an uncomfortable size. Carve out the domain
related functions to libxl_domain.c.
Signed-off-by: Juergen Gross
---
tools/libxl/Makefile |1 +
tools/libxl/libxl.c| 1724 ---
tools/libxl/libxl_domain.c | 1744 +++
Move the few generic device specific functions left in libxl.c to
libxl_device.c.
Signed-off-by: Juergen Gross
---
tools/libxl/libxl.c | 416 -
tools/libxl/libxl_device.c | 435 +--
tools/libxl/libxl_inter
libxl.c has grown to an uncomfortable size. Carve out the tmem
related functions to libxl_tmem.c.
Signed-off-by: Juergen Gross
---
tools/libxl/Makefile | 2 +-
tools/libxl/libxl.c | 142
tools/libxl/libxl_tmem.c | 167 ++
On 08/02/17 13:13, Jan Beulich wrote:
On 07.02.17 at 19:48, wrote:
>> Until the IPI has completed, other processors might be running on this nested
>> p2m object. clear_domain_page() does not guarantee to make 8-byte atomic
>> updates, which means that a pagewalk on a remote processor might
>>> On 08.02.17 at 14:03, wrote:
> On 08/02/17 12:30, Jan Beulich wrote:
> On 08.02.17 at 12:56, wrote:
>>> On 08/02/17 11:53, Jan Beulich wrote:
>>> On 08.02.17 at 11:44, wrote:
> On 08/02/17 10:42, Andrew Cooper wrote:
>> This results in rather more readable code. No functiona
>>> On 07.02.17 at 19:43, wrote:
> While adjusting these functions, use unsigned int rather than uint8_t for the
> loop variable, and fix the whitespace style.
>
> No functional change.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
__
>>> On 08.02.17 at 11:09, wrote:
> Any fail during the original __vmwrite() leads to BUG() which can be
> easily exploited from a guest in the nested vmx mode.
>
> The new function returns error code depending on the outcome:
>
> VMsucceed: 0
> VMfailValid: VM Instruction Error
Creating a domain with an invalid controller specification for a pvusb
device will currently segfault.
Avoid this by bailing out early in case of a mandatory xenstore path
not existing.
Signed-of-by: Juergen Gross
---
This patch is a backport candidate for 4.8
V2: introduce libxl__xs_read_manda
>>> On 08.02.17 at 11:09, wrote:
> The original function doesn't distinguish between Valid and Invalid
> VMfails. Improved function returns error code depending on the outcome:
>
> VMsucceed: 0
> VMfailValid: VM Instruction Error Number
> VMfailInvalid: VMX_INSN_FAIL_INVALID (~
On 02/02/2017 10:31 PM, Jim Fehlig wrote:
> When the libxl driver is initialized, it creates a virDomainDef
> object for dom0 and adds it to the list of domains. Total memory
> for dom0 was being set from the max_memkb field of libxl_dominfo
> struct retrieved from libxl, but this field can be set
>>> On 07.02.17 at 18:35, wrote:
> Current __hvm_copy assumes that the destination memory belongs to the current
> vcpu, but this is not always the case since for PVHv2 Dom0 build hvm copy
> functions are used with current being the idle vcpu. Add a new vcpu
> parameter
> to hvm copy in order to
>>> On 08.02.17 at 11:09, wrote:
> --- a/xen/arch/x86/hvm/vmx/vvmx.c
> +++ b/xen/arch/x86/hvm/vmx/vvmx.c
> @@ -305,6 +305,19 @@ void set_vvmcs_real(const struct vcpu *v, u32 encoding,
> u64 val)
> virtual_vmcs_vmwrite(v, encoding, val);
> }
>
> +enum vmx_insn_errno set_vvmcs_virtual_safe(
On Mon, Feb 06, 2017 at 03:18:53AM -0700, Jan Beulich wrote:
> >>> On 02.02.17 at 23:01, wrote:
> > This way Xen can be loaded on EFI platforms using GRUB2 and
> > other boot loaders which support multiboot2 protocol.
> >
> > Signed-off-by: Daniel Kiper
> > ---
> > v14 - suggestions/fixes:
> >
flight 105629 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105629/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 105619
test-amd64-i386-xl-qemuu-wi
>>> On 08.02.17 at 14:44, wrote:
> On Mon, Feb 06, 2017 at 03:18:53AM -0700, Jan Beulich wrote:
>> >>> On 02.02.17 at 23:01, wrote:
>> > bad_cpu:
>> > mov $(sym_phys(.Lbad_cpu_msg)),%esi # Error message
>> > -jmp print_err
>> > +jmp .Lget_vtb
>> > not_multib
flight 105630 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105630/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-buildfail REGR. vs. 105279
build-amd64
Hi,
At 12:36 + on 08 Feb (1486557378), Andrew Cooper wrote:
> XSA-173 (c/s 8b1764833) introduces gfn_bits, and an upper limit which might be
> lower than the real maxphysaddr, to avoid overflowing the superpage shadow
> backpointer.
>
> However, plenty of hardware has a physical address width
flight 105625 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105625/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 16 guest-saverestore.2 fail REGR. vs. 59254
test-amd64-amd64-xl
Hi,
On 07/02/17 15:59, Vijay Kilari wrote:
> On Tue, Feb 7, 2017 at 6:57 PM, Julien Grall wrote:
>>
>>
>> On 07/02/2017 13:25, Vijay Kilari wrote:
>>>
>>> On Tue, Feb 7, 2017 at 6:30 PM, Julien Grall wrote:
One more thing, if Xen 4.7 was able to go up to booting Dom0 without any
>
On Wed, Feb 8, 2017 at 8:44 PM, Jan Beulich wrote:
On 07.02.17 at 16:44, wrote:
>> On Mon, Feb 6, 2017 at 8:40 PM, Jan Beulich wrote:
>> On 05.02.17 at 06:51, wrote:
I finally get some spare time to collect the debug info.
>>>
>>> As I continue to be puzzled, best I could come up
On Wed, Feb 08, 2017 at 09:39:09AM +0800, Haozhong Zhang wrote:
> On 01/27/17 15:44 -0500, Konrad Rzeszutek Wilk wrote:
> > On Mon, Oct 10, 2016 at 08:32:25AM +0800, Haozhong Zhang wrote:
> > > One guest page is reserved for the device model to place guest ACPI. The
> >
> > guest ACPI what? ACPI S
On 02/08/2017 05:57 AM, Ross Lagerwall wrote:
> This fixes a crash when running out of grant refs when creating many
> queues across many netdevs.
>
> * If creating queues fails (i.e. there are no grant refs available),
> call xenbus_dev_fatal() to ensure that the xenbus device is set to the
> clos
Juergen Gross writes ("[PATCH 0/9] libxl: spolit up libxl.c"):
> Code movement only. No functional change intended.
This statement is not true because
> Juergen Gross (9):
> libxl: adjust copyright comment of libxl.c
... that patch is not just code motion.
Can you please double-check, and exp
.giant snip..
> > > + * - "type":
> > > + * * DM_ACPI_BLOB_TYPE_TABLE
> > > + * The data blob specified by this directory is an ACPI table.
> > > + * * DM_ACPI_BLOB_TYPE_NSDEV
> > > + * The data blob specified by this directory is an ACPI namespace
> > > device.
> > > + * Its name
Cc Yi Sun as well.
Haozhong and Yi: This is just a heads-up -- Juergen from SuSE took the
time to split libxl.c so things are better organised. It's likely this
series will go in before yours, so you will then need to rebase your
series. I don't expect there to be much breakage because it is all
m
Juergen Gross writes ("[PATCH v3] libxl: don't segfault when creating domain
with invalid pvusb device"):
> Creating a domain with an invalid controller specification for a pvusb
> device will currently segfault.
Acked-by: Ian Jackson
Good choice of function name, thanks.
Ian.
___
. snip..
> After consulting the driver developers, I'm going to remove the file
> support in the version, because there is current no stable way to fix
> the mapping between file extents and their physical locations (some of
> my previous understanding about file mapping was wrong).
Could you exp
flight 68536 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68536/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-i386-squeeze-netboot-pygrub 9 debian-di-install fail blocked
in 68503
test-am
On Wed, Feb 08, 2017 at 09:38:18AM +0200, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Multi-touch fields re-use the page that is used by the other features
> which means that you can interleave multi-touch, motion, and key
> events.
>
> Reviewed-by: Stefano Stabellini
Re
Callers to xc_cpupool_create() can either request a specific pool id,
or request that Xen do it for them. But at the moment, the
"automatic" selection is indicated by using a magic value, 0. This is
undesirable both because it doesn't obviously have meaning, but also
because '0' is a valid cpupoo
Callers to libxl_cpupool_create() can either request a specific pool
id, or request that Xen do it for them. But at the moment, the
"automatic" selection is indicated by using a magic value, 0. This is
undesirable both because it doesn't obviously have meaning, but also
because '0' is a valid cpu
flight 105637 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105637/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On 08/02/17 15:33, Ian Jackson wrote:
> Juergen Gross writes ("[PATCH 0/9] libxl: spolit up libxl.c"):
>> Code movement only. No functional change intended.
>
> This statement is not true because
>
>> Juergen Gross (9):
>> libxl: adjust copyright comment of libxl.c
>
> ... that patch is not ju
On Wed, Feb 8, 2017 at 10:29 PM, G.R. wrote:
> On Wed, Feb 8, 2017 at 8:44 PM, Jan Beulich wrote:
> On 07.02.17 at 16:44, wrote:
>>> On Mon, Feb 6, 2017 at 8:40 PM, Jan Beulich wrote:
>>> On 05.02.17 at 06:51, wrote:
> I finally get some spare time to collect the debug info.
>
Hi,
Code is trying to destroy multiple vcpus held by the domain:
complete_domain_destroy->hvm_vcpu_destroy() for each vcpu.
In vmx_vcpu_destroy, we have a call for vmx_vcpu_disable_pml which leads
to a race while destroying foreign vcpu's with other domains rebooting
on the same vcpus .
Wi
This run is configured for baseline tests only.
flight 68535 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68535/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d03c056b2946cc2f83b6d206297915dadc08f230
baseline v
flight 105632 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105632/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-raw 12 saverestore-support-checkfail like 104271
test-armhf-armhf-libvirt
On 02/07/2017 01:59 PM, Vineeth Remanan Pillai wrote:
> The commit 90c311b0eeea ("xen-netfront: Fix Rx stall during network
> stress and OOM") caused the refill timer to be triggerred almost on
> all invocations of xennet_alloc_rx_buffers for certain workloads.
> This reworks the fix by reverting t
On 08/02/17 13:28, Jan Beulich wrote:
On 08.02.17 at 14:03, wrote:
>> On 08/02/17 12:30, Jan Beulich wrote:
>> On 08.02.17 at 12:56, wrote:
On 08/02/17 11:53, Jan Beulich wrote:
On 08.02.17 at 11:44, wrote:
>> On 08/02/17 10:42, Andrew Cooper wrote:
>>> This result
On Thu, Jan 26, 2017 at 07:16:32AM -0700, Jan Beulich wrote:
> >>> On 19.01.17 at 18:29, wrote:
> > +static int __init pvh_setup_acpi_madt(struct domain *d, paddr_t *addr)
> > +{
> > +struct acpi_table_madt *madt;
> > +struct acpi_table_header *table;
> > +struct acpi_madt_io_apic *io_
On Wed, Feb 08, 2017 at 10:48:45AM +0200, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Add ABI for the two halves of a para-virtualized
> sound driver to communicate with each other.
>
> The ABI allows implementing audio playback and capture as
> well as volume control and
On 02/08/2017 05:16 PM, Konrad Rzeszutek Wilk wrote:
On Wed, Feb 08, 2017 at 10:48:45AM +0200, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Add ABI for the two halves of a para-virtualized
sound driver to communicate with each other.
The ABI allows implementing audio playbac
On Wed, Feb 08, 2017 at 10:15:28AM +, Xuquan (Quan Xu) wrote:
>On February 08, 2017 4:52 PM, Jan Beulich wrote:
> On 08.02.17 at 09:27, wrote:
>>> Assumed vCPU is in guest_mode..
>>> When apicv is enabled, hypervisor calls vmx_deliver_posted_intr(),
>>> then
>>> __vmx_deliver_posted_interr
. snip..
> > Reviewed-by: Konrad Rzeszutek Wilk
> Do you want me to send v18 with the changes requested?
Please wait a week for other folks to get a chance to look at this
patch.
> May I put your "Reviewed-by: Konrad Rzeszutek Wilk" in v18?
Of course! Do please put my Reviewed-by on the patch a
On 08/02/17 14:12, Tim Deegan wrote:
> Hi,
>
> At 12:36 + on 08 Feb (1486557378), Andrew Cooper wrote:
>> XSA-173 (c/s 8b1764833) introduces gfn_bits, and an upper limit which might
>> be
>> lower than the real maxphysaddr, to avoid overflowing the superpage shadow
>> backpointer.
>>
>> Howeve
On 02/08/2017 05:29 PM, Konrad Rzeszutek Wilk wrote:
. snip..
Reviewed-by: Konrad Rzeszutek Wilk
Do you want me to send v18 with the changes requested?
Please wait a week for other folks to get a chance to look at this
patch.
May I put your "Reviewed-by: Konrad Rzeszutek Wilk" in v18?
Of c
On 02/08/2017 06:33 AM, Joe Perches wrote:
> This function error patch can be simplified, so do so.
>
> Remove fail: label and somewhat obfuscating, used once "error_path"
> function.
>
> Signed-off-by: Joe Perches
Applied to for-linus-4.11.
-boris
__
>>> On 07.02.17 at 18:26, wrote:
> Facing a issue where bootstorm of guests leads to host crash. I debugged
> and found that that enabling PML introduces a race condition during
> guest teardown stage while disabling PML on a vcpu and context switch
> happening for another vcpu.
>
> Crash h
>>> On 08.02.17 at 15:58, wrote:
> Code is trying to destroy multiple vcpus held by the domain:
> complete_domain_destroy->hvm_vcpu_destroy() for each vcpu.
>
> In vmx_vcpu_destroy, we have a call for vmx_vcpu_disable_pml which leads
> to a race while destroying foreign vcpu's with other domain
On Wed, Feb 08, 2017 at 02:35:53PM +, Ian Jackson wrote:
> Juergen Gross writes ("[PATCH v3] libxl: don't segfault when creating domain
> with invalid pvusb device"):
> > Creating a domain with an invalid controller specification for a pvusb
> > device will currently segfault.
>
> Acked-by: I
On 08/02/17 14:18, Julien Grall wrote:
> Hi,
>
> On 07/02/17 15:59, Vijay Kilari wrote:
>> On Tue, Feb 7, 2017 at 6:57 PM, Julien Grall wrote:
>>>
>>>
>>> On 07/02/2017 13:25, Vijay Kilari wrote:
On Tue, Feb 7, 2017 at 6:30 PM, Julien Grall wrote:
>
>
> One more thing, if
>>> On 08.02.17 at 16:04, wrote:
> On 08/02/17 13:28, Jan Beulich wrote:
> On 08.02.17 at 14:03, wrote:
>>> On 08/02/17 12:30, Jan Beulich wrote:
>>> On 08.02.17 at 12:56, wrote:
> On 08/02/17 11:53, Jan Beulich wrote:
> On 08.02.17 at 11:44, wrote:
>>> On 08/02/17 10:42
May be "causes". But not sure, as disabling this feature solves the
issue (no hypervisor crash) and we have reports that the same code base
works fine on Haswell (again no hardware support for PML in Haswell, but
code base is same. But inherently it leads to non-execution of PML code
path, so n
>>> On 08.02.17 at 16:10, wrote:
> On Thu, Jan 26, 2017 at 07:16:32AM -0700, Jan Beulich wrote:
>> >>> On 19.01.17 at 18:29, wrote:
>> > +/*
>> > + * The APIC ID field of the local APIC struct is only 1byte, so we
>> > need
>> > + * to limit the number of local APIC entries to 128 be
On Wed, Feb 08, 2017 at 08:50:54AM -0700, Jan Beulich wrote:
> >>> On 08.02.17 at 16:10, wrote:
> > On Thu, Jan 26, 2017 at 07:16:32AM -0700, Jan Beulich wrote:
> >> >>> On 19.01.17 at 18:29, wrote:
> >> > +/*
> >> > + * The APIC ID field of the local APIC struct is only 1byte, so we
> >
Hi everyone,
a quick note to let you know about the status of this year's Hackathon and
Developer Summit. We are running a little bit late in terms of planning,
because the board asked me in November to investigate co-location with OSCON,
OpenStack and a few other industry events instead of app
>>> On 08.02.17 at 15:56, wrote:
> On Wed, Feb 8, 2017 at 10:29 PM, G.R.
> wrote:
>> On Wed, Feb 8, 2017 at 8:44 PM, Jan Beulich wrote:
>> On 07.02.17 at 16:44, wrote:
On Mon, Feb 6, 2017 at 8:40 PM, Jan Beulich wrote:
On 05.02.17 at 06:51, wrote:
>> I finally get some
On Wed, Feb 08, 2017 at 04:15:53PM +0800, Yi Sun wrote:
> This patch creates CAT and CDP feature document in doc/features/. It describes
> key points to implement L3 CAT/CDP and L2 CAT which is described in details in
> Intel SDM "INTEL® RESOURCE DIRECTOR TECHNOLOGY (INTEL® RDT) ALLOCATION
> FEATU
At 15:29 + on 08 Feb (1486567798), Andrew Cooper wrote:
> On Intel, a guest can get an PTE shadowed which should have faulted and
> didn't (because the smfn is actually within 39 bits)
Yes.
, while on AMD, a
> guest can try to create a PTE which shouldn't fault (because CPUID says
> anything
> Signed-off-by: Yi Sun
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 08.02.17 at 16:58, wrote:
> On Wed, Feb 08, 2017 at 08:50:54AM -0700, Jan Beulich wrote:
>> >>> On 08.02.17 at 16:10, wrote:
>> > On Thu, Jan 26, 2017 at 07:16:32AM -0700, Jan Beulich wrote:
>> >> >>> On 19.01.17 at 18:29, wrote:
>> >> > +/*
>> >> > + * The APIC ID field of the lo
On Wed, 2017-02-08 at 14:51 +, George Dunlap wrote:
> Callers to xc_cpupool_create() can either request a specific pool id,
> or request that Xen do it for them. But at the moment, the
> "automatic" selection is indicated by using a magic value, 0. This
> is
> undesirable both because it does
On Thu, 2017-01-26 at 14:50 +, David Woodhouse wrote:
>
> Finally, add a comment clarifying how that 'return -1' works — it isn't
> returning an error and causing the mapping to fail; it relies on…
Btw, something odd happened when committing this. That U+2014 emdash in
the first (cited) line
On Wed, 2017-02-08 at 10:33 -0500, Boris Ostrovsky wrote:
> On 02/08/2017 06:33 AM, Joe Perches wrote:
> > This function error patch can be simplified, so do so.
> >
> > Remove fail: label and somewhat obfuscating, used once "error_path"
> > function.
btw: I left it alone, but likely
#define PRI
Joao Martins wrote:
> On 02/02/2017 10:31 PM, Jim Fehlig wrote:
>> When the libxl driver is initialized, it creates a virDomainDef
>> object for dom0 and adds it to the list of domains. Total memory
>> for dom0 was being set from the max_memkb field of libxl_dominfo
>> struct retrieved from libxl,
On Wed, 2017-02-08 at 14:51 +, George Dunlap wrote:
> Callers to libxl_cpupool_create() can either request a specific pool
> id, or request that Xen do it for them. But at the moment, the
> "automatic" selection is indicated by using a magic value, 0. This
> is
> undesirable both because it d
Juergen Gross writes ("Re: [PATCH 0/9] libxl: spolit up libxl.c"):
> Okay, more precise wording:
Thanks.
> Changes are:
> - moving functions into new or existing sources
> - modification of Copyright comment
> - made two functions non-static: libxl__get_memory_target(),
> xcinfo2xlinfo()
> - m
On 08/02/17 16:11, Dario Faggioli wrote:
> On Wed, 2017-02-08 at 14:51 +, George Dunlap wrote:
>> Callers to libxl_cpupool_create() can either request a specific pool
>> id, or request that Xen do it for them. But at the moment, the
>> "automatic" selection is indicated by using a magic value,
On Tue, Feb 7, 2017 at 11:48 PM, Razvan Cojocaru
wrote:
> On 02/08/2017 01:23 AM, Tamas K Lengyel wrote:
> >
> >
> > On Tue, Feb 7, 2017 at 1:41 PM, Razvan Cojocaru
> > mailto:rcojoc...@bitdefender.com>> wrote:
> >
> > On 02/07/2017 10:20 PM, Tamas K Lengyel wrote:
> > >
> > >
> >
On 08/02/17 17:12, Ian Jackson wrote:
> Juergen Gross writes ("Re: [PATCH 0/9] libxl: spolit up libxl.c"):
>> Okay, more precise wording:
>
> Thanks.
>
>> Changes are:
>> - moving functions into new or existing sources
>> - modification of Copyright comment
>
>> - made two functions non-static:
flight 105636 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105636/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 9fe9cf9acb475af9317dcdaf32a93f1cb77d95ac
baseline version:
ovmf cc20411062137e5d820a3
.snip..
> +static void free_feature(struct psr_socket_info *info)
> +{
> +struct feat_node *feat, *next;
> +
> +if ( !info )
> +return;
> +
> +/*
> + * Free resources of features. But we do not free global feature list
> + * entry, like feat_l3_cat. Although it may cause
This run is configured for baseline tests only.
flight 68534 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68534/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 9 debian-di-insta
On 08/02/17 10:02, Tim Deegan wrote:
> At 03:44 -0700 on 31 Jan (1485834259), Jan Beulich wrote:
> On 30.01.17 at 16:17, wrote:
>>> Commit 71bb7304e7a7a35ea6df4b0cedebc35028e4c159 added flushing of
>>> nested p2m tables whenever the host p2m table changed. Unfortunately
>>> in the process, it
On Wed, Feb 8, 2017 at 2:00 AM, Razvan Cojocaru
wrote:
> It is currently possible for the guest to lock when subscribing
> to synchronous vm_events if max_vcpus is larger than the
> number of available ring buffer slots. This patch no longer
> blocks already paused VCPUs, fixing the issue for thi
Is it still appropriate to have the unmodified_drivers subdirectory in
Xen's git repository?
I think it should be either moved to a separate repository or just
deleted. Having Linux kernel sources in the Xen repository seems to be
wrong.
Thoughts?
Juergen
__
On Wed, Feb 8, 2017 at 1:31 AM, Edgar E. Iglesias wrote:
> On Tue, Feb 07, 2017 at 05:24:03PM -0700, Tamas K Lengyel wrote:
> > On Tue, Feb 7, 2017 at 1:51 PM, Julien Grall
> wrote:
> >
> > > Hi Tamas,
> > >
> > > On 07/02/2017 20:38, Tamas K Lengyel wrote:
> > >
> > >>
> > >>
> > >> On Tue, Feb
>>> On 08.02.17 at 17:32, wrote:
> Is it still appropriate to have the unmodified_drivers subdirectory in
> Xen's git repository?
>
> I think it should be either moved to a separate repository or just
> deleted.
Having a separate repo for these few files would seem overkill to
me. As to deleting
On Wed, Feb 08, 2017 at 04:15:57PM +0800, Yi Sun wrote:
> This patch implements the Domain init/free and schedule flows.
>
> Signed-off-by: Yi Sun
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen
On Fri, 2017-02-03 at 08:40 -0700, Jan Beulich wrote:
> > > > > > On 17.01.17 at 18:26, wrote:
> > > While I did manage to backport "xen: credit2: use the correct
> > > scratch
> > > cpumask" and "xen: credit2: fix shutdown/suspend when playing
> > > with
> > > cpupools" also to 4.7, this one is e
Hi Tamas,
On 08/02/17 16:40, Tamas K Lengyel wrote:
On Wed, Feb 8, 2017 at 1:31 AM, Edgar E. Iglesias
mailto:edgar.igles...@xilinx.com>> wrote:
On Tue, Feb 07, 2017 at 05:24:03PM -0700, Tamas K Lengyel wrote:
> On Tue, Feb 7, 2017 at 1:51 PM, Julien Grall mailto:julien.gr...@arm.com>> wr
On 08/02/17 17:41, Jan Beulich wrote:
On 08.02.17 at 17:32, wrote:
>> Is it still appropriate to have the unmodified_drivers subdirectory in
>> Xen's git repository?
>>
>> I think it should be either moved to a separate repository or just
>> deleted.
>
> Having a separate repo for these few
And CC Zhangchen
On Wed, Feb 08, 2017 at 02:35:27PM +, Wei Liu wrote:
> Cc Yi Sun as well.
>
> Haozhong and Yi: This is just a heads-up -- Juergen from SuSE took the
> time to split libxl.c so things are better organised. It's likely this
> series will go in before yours, so you will then nee
>>> On 08.02.17 at 17:48, wrote:
> On Fri, 2017-02-03 at 08:40 -0700, Jan Beulich wrote:
>> > > > > > On 17.01.17 at 18:26, wrote:
>> > > While I did manage to backport "xen: credit2: use the correct
>> > > scratch
>> > > cpumask" and "xen: credit2: fix shutdown/suspend when playing
>> > > with
>
flight 105633 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105633/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm 17 guest-localmigrate/x10 fail REGR. vs. 105625
test-amd64-amd64-xl-
On 02/08/2017 04:06 PM, Jim Fehlig wrote:
> Joao Martins wrote:
>> On 02/02/2017 10:31 PM, Jim Fehlig wrote:
>>> When the libxl driver is initialized, it creates a virDomainDef
>>> object for dom0 and adds it to the list of domains. Total memory
>>> for dom0 was being set from the max_memkb field o
>>> On 08.02.17 at 08:31, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Monday, February 06, 2017 11:38 PM
>>
>> >>> On 06.02.17 at 15:48, wrote:
>> > On Mon, 2017-02-06 at 07:26 -0700, Jan Beulich wrote:
>> >> >
>> >> > >
>> >> > > >
>> >> > > > On 06.02.17 at 14:55, wrote:
On 07/02/17 17:28, Roger Pau Monne wrote:
> There's nothing wrong with allowing the domain to perform DMA transfers to
> MMIO areas that it already can access from the CPU, and this allows us to
> remove the hack in set_identity_p2m_entry for PVH Dom0.
>
> Signed-off-by: Roger Pau Monné
> Reviewe
On 02/08/2017 06:25 PM, Tamas K Lengyel wrote:
>
>
> On Wed, Feb 8, 2017 at 2:00 AM, Razvan Cojocaru
> mailto:rcojoc...@bitdefender.com>> wrote:
>
> It is currently possible for the guest to lock when subscribing
> to synchronous vm_events if max_vcpus is larger than the
> number of
On 02/08/2017 11:05 AM, Joe Perches wrote:
> On Wed, 2017-02-08 at 10:33 -0500, Boris Ostrovsky wrote:
>> On 02/08/2017 06:33 AM, Joe Perches wrote:
>>> This function error patch can be simplified, so do so.
>>>
>>> Remove fail: label and somewhat obfuscating, used once "error_path"
>>> function.
>
On 08/02/17 13:07, Jan Beulich wrote:
On 07.02.17 at 19:57, wrote:
>> --- a/xen/include/xen/mm.h
>> +++ b/xen/include/xen/mm.h
>> @@ -599,4 +599,10 @@ static inline void filtered_flush_tlb_mask(uint32_t
>> tlbflush_timestamp)
>> }
>> }
>>
>> +static inline bool is_xen_fixed_mfn(mfn_t
On Wed, Feb 8, 2017 at 9:58 AM, Julien Grall wrote:
> Hi Tamas,
>
> On 08/02/17 16:40, Tamas K Lengyel wrote:
>
>> On Wed, Feb 8, 2017 at 1:31 AM, Edgar E. Iglesias
>> mailto:edgar.igles...@xilinx.com>> wrote:
>> On Tue, Feb 07, 2017 at 05:24:03PM -0700, Tamas K Lengyel wrote:
>> > On Tue
On 08/02/17 17:08, Razvan Cojocaru wrote:
> On 02/08/2017 06:25 PM, Tamas K Lengyel wrote:
>>
>> On Wed, Feb 8, 2017 at 2:00 AM, Razvan Cojocaru
>> mailto:rcojoc...@bitdefender.com>> wrote:
>>
>> It is currently possible for the guest to lock when subscribing
>> to synchronous vm_events if
Commit 71bb7304e7a7a35ea6df4b0cedebc35028e4c159 added flushing of
nested p2m tables whenever the host p2m table changed. Unfortunately
in the process, it added a filter to p2m_flush_table() function so
that the p2m would only be flushed if it was being used as a nested
p2m. This meant that the p2
flight 105642 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105642/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On Wed, Feb 08, 2017 at 04:58:44PM +, Julien Grall wrote:
> Hi Tamas,
>
> On 08/02/17 16:40, Tamas K Lengyel wrote:
> >On Wed, Feb 8, 2017 at 1:31 AM, Edgar E. Iglesias
> >mailto:edgar.igles...@xilinx.com>> wrote:
> >On Tue, Feb 07, 2017 at 05:24:03PM -0700, Tamas K Lengyel wrote:
> >>
At 17:22 + on 08 Feb (1486574546), George Dunlap wrote:
> Commit 71bb7304e7a7a35ea6df4b0cedebc35028e4c159 added flushing of
> nested p2m tables whenever the host p2m table changed. Unfortunately
> in the process, it added a filter to p2m_flush_table() function so
> that the p2m would only be f
flight 105639 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105639/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-buildfail REGR. vs. 105279
build-amd64
1 - 100 of 255 matches
Mail list logo