On 16/04/18 20:22, Juergen Gross wrote:
> On 16/04/18 17:34, Tim Deegan wrote:
>> Hi,
>>
>> At 02:43 -0600 on 13 Apr (1523587395), Jan Beulich wrote:
>> On 12.04.18 at 20:09, wrote:
For mitigation of Meltdown the current L4 page table is copied to the
cpu local root page table each t
On 04/17/2018 11:57 PM, Dongwon Kim wrote:
On Tue, Apr 17, 2018 at 09:59:28AM +0200, Daniel Vetter wrote:
On Mon, Apr 16, 2018 at 12:29:05PM -0700, Dongwon Kim wrote:
Yeah, I definitely agree on the idea of expanding the use case to the
general domain where dmabuf sharing is used. However, what
Hi all,
Xen 4.11 rc1 is tagged. You can check that out from xen.git:
git://xenbits.xen.org/xen.git 4.11.0-rc1
For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.11.0-rc1/xen-4.11.0-rc1.tar.gz
And the signature is at:
https://downloads.xenproject.org/
On 04/17/2018 07:33 PM, Laura Abbott wrote:
> On 04/17/2018 12:16 AM, Juergen Gross wrote:
>> On 16/04/18 15:27, Boris Ostrovsky wrote:
>>> On 04/13/2018 06:11 PM, Laura Abbott wrote:
There's an ongoing effort to remove VLAs[1] from the kernel to
eventually
turn on -Wvla. The few VLA
On 04/17/2018 12:16 AM, Juergen Gross wrote:
On 16/04/18 15:27, Boris Ostrovsky wrote:
On 04/13/2018 06:11 PM, Laura Abbott wrote:
There's an ongoing effort to remove VLAs[1] from the kernel to eventually
turn on -Wvla. The few VLAs in use have an upper bound based on a size
of 64K. This doesn'
flight 122347 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122347/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt6 libvirt-buildfail REGR. vs. 118324
test-amd64-amd64-xl
On Tue, Apr 17, 2018 at 09:59:28AM +0200, Daniel Vetter wrote:
> On Mon, Apr 16, 2018 at 12:29:05PM -0700, Dongwon Kim wrote:
> > Yeah, I definitely agree on the idea of expanding the use case to the
> > general domain where dmabuf sharing is used. However, what you are
> > targetting with propose
This run is configured for baseline tests only.
flight 74631 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74631/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 55f67014d7b4a1228754313917ccca5539764802
baseline v
George Dunlap writes ("Re: [PATCH] mktarball: For qemu upstream, use their
scripts/archive-source.sh"):
> On 04/17/2018 06:04 PM, Ian Jackson wrote:
> > +tar
> I'm not sure why we're piping from a file and then specifying `-`, but
> now's not really the time for bike shedding:
C and f inter
On 04/17/2018 06:04 PM, Ian Jackson wrote:
> qemu upstream uses git submodules. git archive does not work with git
> submodules (and could not work properly with them, because this is one
> of the many things it is inherently impossible to do correctly with
> git submodules).
>
> qemu upstream ha
p2m_change_type_range() handles end > max_mapped_pfn, but not
start > max_mapped_pfn. Check the latter just after grabbing the
lock and bail if true.
Signed-off-by: Razvan Cojocaru
Suggested-by: George Dunlap
---
xen/arch/x86/mm/p2m.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/x
On Tue, Apr 17, 2018 at 9:13 AM, Razvan Cojocaru
wrote:
> On 04/17/2018 05:58 PM, George Dunlap wrote:
It might be nice to have a more structured way of keeping all these
changes in sync, rather than relying on this open-coding everywhere.
>>>
>>> Very true. It has also occured to me tha
---
tools/misc/mktarball | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/tools/misc/mktarball b/tools/misc/mktarball
index 73282b5..42d5430 100755
--- a/tools/misc/mktarball
+++ b/tools/misc/mktarball
@@ -29,7 +29,21 @@ mkdir -p $tdir
git_archive_into $xen_r
qemu upstream uses git submodules. git archive does not work with git
submodules (and could not work properly with them, because this is one
of the many things it is inherently impossible to do correctly with
git submodules).
qemu upstream have worked around this by providing a rather scary
shell
On Tue, 2018-04-17 at 15:08 +0100, Andrew Cooper wrote:
> On 17/04/18 15:02, Juergen Gross wrote:
> > Is this something we should be aware of in Xen, too?
>
> If we had something close to a working topology representation,
> probably.
>
True, as far as letting the guest know about these details (
flight 122343 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122343/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 16 guest-localmigrate/x10 fail
pass in 122332
test-amd64-amd64-x
flight 74630 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74630/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-i386-daily-netboot-pvgrub 10 debian-di-install fail like 74569
test-amd64-amd64-i386-d
On 17/04/2018, 14:22, "Ian Jackson" wrote:
Lars Kurth writes ("Re: [PATCH 4/5] SUPPORT.md: Move descriptions up before
Status info"):
> There were a couple of minor text changes for grammar reasons, which I
noticed and highlighted.
Thanks.
> I also checked the code
Hi Julien,
On Tue, Apr 17, 2018 at 4:11 PM, Julien Grall wrote:
>
>
> On 17/04/18 13:54, Mirela Simonovic wrote:
>>
>> Hi Julien,
>
>
> Hi,
>
>>
>> On Wed, Apr 11, 2018 at 5:11 PM, Julien Grall
>> wrote:
>>>
>>> Hi,
>>>
>>> On 11/04/18 14:19, Mirela Simonovic wrote:
In existing co
On 04/17/2018 05:58 PM, George Dunlap wrote:
>>> It might be nice to have a more structured way of keeping all these
>>> changes in sync, rather than relying on this open-coding everywhere.
>>
>> Very true. It has also occured to me that some of these issues would be
>> at least partially mitigated
On 04/17/2018 03:33 AM, Juergen Gross wrote:
> On 15/03/18 04:08, Simon Gaiser wrote:
>> xenbus_command_reply() did not actually copy the response string and
>> leaked stack content instead.
>>
>> Fixes: 9a6161fe73bd ("xen: return xenstore command failures via response
>> instead of rc")
>> Signed
flight 122344 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122344/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 122300
test-armhf-armhf-libvirt-xsm 14 saveresto
On 04/12/2018 01:26 PM, Oleksandr Andrushchenko wrote:
> This is the sync up with the canonical definition of the sound
> protocol in Xen:
>
> 1. Protocol version was referenced in the protocol description,
>but missed its definition. Fixed by adding a constant
>for current protocol version
On 04/09/2018 11:03 AM, Jia-Ju Bai wrote:
> pcistub_probe() is never called in atomic context.
> This function is only set as ".probe" in struct pci_driver.
>
> Despite never getting called from atomic context,
> pcistub_probe() calls kmalloc() with GFP_ATOMIC,
> which does not sleep for allocation
On 04/17/2018 03:21 PM, Razvan Cojocaru wrote:
> On 04/17/2018 04:53 PM, George Dunlap wrote:
>> On 04/17/2018 11:50 AM, Razvan Cojocaru wrote:
>>> void p2m_init_altp2m_ept(struct domain *d, unsigned int i)
>>> {
>>> struct p2m_domain *p2m = d->arch.altp2m_p2m[i];
>>> +struct p2m_domain
On 17/04/18 16:47, Ian Jackson wrote:
> Non-leaf sections with footnotes must have a row of their own, for
> just that section, because footnotes only appear if there is status
> information.
>
> In that case, the footnote applies to only the rows for that section
> in the markdown document, ie th
On 17/04/18 13:45, Jan Beulich wrote:
On 17.04.18 at 14:30, wrote:
>> On 17/04/18 12:41, Jan Beulich wrote:
>>> Following commit a6aa678fa3 ("x86/msr: Correct the emulation behaviour
>>> of MSR_PRED_CMD") we may end up writing the low bit with the wrong
>>> value. While it's unlikely for a gu
On 17/04/18 16:47, Ian Jackson wrote:
> This makes the result easier for humans to read.
>
> Signed-off-by: Ian Jackson
Release-acked-by: Juergen Gross
Juergen
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/m
Commit 99605175c (xen-pt: Fix PCI devices re-attach failed) introduced
a subtle bug. As soon as the guest switches off Bus Mastering on the
device it immediately causes all the BARs be unmapped due to the DMA
address space of the device being changed. This is undesired behavior
because the guest ma
Non-leaf sections with footnotes must have a row of their own, for
just that section, because footnotes only appear if there is status
information.
In that case, the footnote applies to only the rows for that section
in the markdown document, ie that RealSect.
And of course for a leaf section tha
This makes the result easier for humans to read.
Signed-off-by: Ian Jackson
---
v2: New patch
---
docs/parse-support-md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/parse-support-md b/docs/parse-support-md
index 653d216..615 100755
--- a/docs/parse-support-md
+++
No functional change.
Signed-off-by: Ian Jackson
Release-acked-by: Juergen Gross
---
docs/parse-support-md | 10 --
1 file changed, 8 insertions(+), 2 deletions(-)
diff --git a/docs/parse-support-md b/docs/parse-support-md
index decda33..5bf8405 100755
--- a/docs/parse-support-md
+++ b
The new support matrix output puts a [*] after each entry in the
support matrix in many cases where the linked-to text is simply a
longer description of the feature.
Remedy this by distinguishing text which expands on a feature
description from text which qualifies its support status.
There are 3
No functional change.
Signed-off-by: Ian Jackson
Release-acked-by: Juergen Gross
---
docs/parse-support-md | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/docs/parse-support-md b/docs/parse-support-md
index 5bf8405..6953930 100755
--- a/docs/parse-support-md
+++ b
Signed-off-by: Ian Jackson
Release-acked-by: Juergen Gross
---
SUPPORT.md | 5 +
1 file changed, 5 insertions(+)
diff --git a/SUPPORT.md b/SUPPORT.md
index 3e3890b..9eb6958 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
@@ -725,6 +725,11 @@ The file is in markdown format.
The machine-readable fr
Running text in feature sections in the markdown document currently
might be (i) a caveat, qualifying or clarifying the support statement
(ii) a plain description of the feature.
Caveats can be version-specific and deserve the [*] annotation in the
relevant feature matrix cell. They must link to
This turns all the things which were treated as caveats, but which
don't need to be footnoted in the matrix, into descriptions.
For the benefit of the support matrix generator, this patch (or a
version of it) should be backported to 4.10.
Signed-off-by: Ian Jackson
Release-acked-by: Juergen Gros
On Tue, Apr 17, 2018 at 03:18:55PM +0100, Igor Druzhinin wrote:
> On 17/04/18 15:15, Anthony PERARD wrote:
> > On Fri, Apr 06, 2018 at 10:21:23PM +0100, Igor Druzhinin wrote:
> >> The issue that the original patch tried to workaround (uneven number of
> >> region_add/del calls on device attach/deta
This run is configured for baseline tests only.
flight 74629 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74629/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5e0e476a9542a1f769fd5325c0be2d16d3ad1d42
baseline v
On 17/04/18 15:15, Anthony PERARD wrote:
> On Fri, Apr 06, 2018 at 10:21:23PM +0100, Igor Druzhinin wrote:
>> Commit 99605175c (xen-pt: Fix PCI devices re-attach failed) introduced
>> a subtle bug. As soon as the guest switches off Bus Mastering on the
>> device it immediately causes all the BARs b
On 17/04/18 13:41, Jan Beulich wrote:
> Following commit a6aa678fa3 ("x86/msr: Correct the emulation behaviour
> of MSR_PRED_CMD") we may end up writing the low bit with the wrong
> value. While it's unlikely for a guest to want to write zero there, we
> should still permit (this without incurring
On 17/04/18 15:03, Roger Pau Monne wrote:
> Current interface to the gntdev in FreeBSD is wrong, and mostly worked
> out of luck before the PTI FreeBSD fixes, when kernel and user-space
> where sharing the same page tables.
>
> On FreeBSD ioctls have the size of the passed struct encoded in the io
On 04/17/2018 04:53 PM, George Dunlap wrote:
> On 04/17/2018 11:50 AM, Razvan Cojocaru wrote:
>> void p2m_init_altp2m_ept(struct domain *d, unsigned int i)
>> {
>> struct p2m_domain *p2m = d->arch.altp2m_p2m[i];
>> +struct p2m_domain *hostp2m = p2m_get_hostp2m(d);
>> struct ept_data
On 17/04/18 15:15, Anthony PERARD wrote:
> On Fri, Apr 06, 2018 at 10:21:23PM +0100, Igor Druzhinin wrote:
>> Commit 99605175c (xen-pt: Fix PCI devices re-attach failed) introduced
>> a subtle bug. As soon as the guest switches off Bus Mastering on the
>> device it immediately causes all the BARs b
On Fri, Apr 06, 2018 at 10:21:23PM +0100, Igor Druzhinin wrote:
> Commit 99605175c (xen-pt: Fix PCI devices re-attach failed) introduced
> a subtle bug. As soon as the guest switches off Bus Mastering on the
> device it immediately causes all the BARs be unmapped due to the DMA
> address space of t
On 17/04/18 13:54, Mirela Simonovic wrote:
Hi Julien,
Hi,
On Wed, Apr 11, 2018 at 5:11 PM, Julien Grall wrote:
Hi,
On 11/04/18 14:19, Mirela Simonovic wrote:
In existing code the paging for secondary CPUs is setup only in boot flow.
The setup is triggered from start_xen function after
On 17/04/18 15:02, Juergen Gross wrote:
> Is this something we should be aware of in Xen, too?
If we had something close to a working topology representation, probably.
As things stand, I don't really know, but I doubt it will cause problems
in the default case, due to us being fairly NUMA-ineffi
Is this something we should be aware of in Xen, too?
Juergen
Forwarded Message
Subject: [tip:x86/urgent] x86,sched: Allow topologies where NUMA nodes
share an LLC
Date: Tue, 17 Apr 2018 06:46:12 -0700
From: tip-bot for Alison Schofield
Reply-To: h...@zytor.com, b...@suse.de,
ping?
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
This run is configured for baseline tests only.
flight 74628 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74628/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win10-i386 10 windows-installfa
On 04/17/2018 11:50 AM, Razvan Cojocaru wrote:
> void p2m_init_altp2m_ept(struct domain *d, unsigned int i)
> {
> struct p2m_domain *p2m = d->arch.altp2m_p2m[i];
> +struct p2m_domain *hostp2m = p2m_get_hostp2m(d);
> struct ept_data *ept;
>
> +p2m->max_mapped_pfn = hostp2m->max
>>> On 04.04.18 at 01:01, wrote:
> Adding new key-handler "j" for dumping AVIC-related information.
Considering how few keys we have left, I have significant reservations against
adding such a narrow purpose key. If you really want to expose such information,
add it to a suitable existing key or
flight 122346 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122346/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 55f67014d7b4a1228754313917ccca5539764802
baseline version:
ovmf 5e0e476a9542a1f769fd5
Lars Kurth writes ("Re: [PATCH 4/5] SUPPORT.md: Move descriptions up before
Status info"):
> There were a couple of minor text changes for grammar reasons, which I
> noticed and highlighted.
Thanks.
> I also checked the code motions. There are some things which need to be
> pointed out, but th
>>> On 04.04.18 at 01:01, wrote:
> --- a/xen/arch/x86/hvm/svm/svm.c
> +++ b/xen/arch/x86/hvm/svm/svm.c
> @@ -1711,7 +1711,10 @@ const struct hvm_function_table * __init
> start_svm(void)
> svm_avic = 0;
>
> if ( svm_avic )
> +{
> svm_function_table.deliver_posted_intr
>>> On 04.04.18 at 01:01, wrote:
> +void svm_avic_deliver_posted_intr(struct vcpu *v, u8 vec)
> +{
> +struct vlapic *vlapic = vcpu_vlapic(v);
> +
> +/* Fallback to use non-AVIC if vcpu is not enabled with AVIC. */
> +if ( !svm_avic_vcpu_enabled(v) )
> +{
> +if ( !vlapic_tes
Current interface to the gntdev in FreeBSD is wrong, and mostly worked
out of luck before the PTI FreeBSD fixes, when kernel and user-space
where sharing the same page tables.
On FreeBSD ioctls have the size of the passed struct encoded in the ioctl
number, because the generic ioctl handler in the
>>> On 04.04.18 at 01:01, wrote:
> --- a/xen/include/asm-x86/hvm/vlapic.h
> +++ b/xen/include/asm-x86/hvm/vlapic.h
> @@ -137,6 +137,10 @@ void vlapic_ipi(struct vlapic *vlapic, uint32_t icr_low,
> uint32_t icr_high);
>
> int vlapic_apicv_write(struct vcpu *v, unsigned int offset);
>
> +void
Hi Julien,
On Wed, Apr 11, 2018 at 5:11 PM, Julien Grall wrote:
> Hi,
>
> On 11/04/18 14:19, Mirela Simonovic wrote:
>>
>> In existing code the paging for secondary CPUs is setup only in boot flow.
>> The setup is triggered from start_xen function after all CPUs are brought
>> online. In other w
>>> On 17.04.18 at 14:30, wrote:
> On 17/04/18 12:41, Jan Beulich wrote:
>> Following commit a6aa678fa3 ("x86/msr: Correct the emulation behaviour
>> of MSR_PRED_CMD") we may end up writing the low bit with the wrong
>> value. While it's unlikely for a guest to want to write zero there, we
>> shou
Hello, Juergen!
Thank you very much for reviewing the driver and providing
valuable comments! I will send v3 of the driver once I have
more reviews, especially I hope ALSA community can also take a look
Also, as you suggested on IRC, I will add a patch for adding
myself as sound/xen maintainer.
On Wed, 2018-04-11 at 14:45 +0200, Olaf Hering wrote:
> On Wed, Apr 11, Dario Faggioli wrote:
>
> > If you're interested in figuring out, I'd like to see:
> > - full output of `xl info -n'
> > - output of `xl debug-key u'
> > - xl vcpu-list
> > - xl list -n
>
> Logs for this .cfg attached:
>
> n
On 04/17/2018 03:32 PM, Juergen Gross wrote:
On 17/04/18 14:26, Oleksandr Andrushchenko wrote:
On 04/17/2018 02:32 PM, Oleksandr Andrushchenko wrote:
On 04/16/2018 05:09 PM, Juergen Gross wrote:
On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Implement essent
On 17/04/18 14:26, Oleksandr Andrushchenko wrote:
> On 04/17/2018 02:32 PM, Oleksandr Andrushchenko wrote:
>> On 04/16/2018 05:09 PM, Juergen Gross wrote:
>>> On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Implement essential initialization of the so
On 17/04/18 12:41, Jan Beulich wrote:
> Following commit a6aa678fa3 ("x86/msr: Correct the emulation behaviour
> of MSR_PRED_CMD") we may end up writing the low bit with the wrong
> value. While it's unlikely for a guest to want to write zero there, we
> should still permit (this without incurring
On 04/17/2018 02:32 PM, Oleksandr Andrushchenko wrote:
On 04/16/2018 05:09 PM, Juergen Gross wrote:
On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Implement essential initialization of the sound driver:
- introduce required data structures
- handle drive
Hi Julien,
On Fri, Jan 26, 2018 at 5:08 PM, Julien Grall wrote:
>
>
> On 24/01/18 17:55, Mirela Simonovic wrote:
>>
>> Hi Julien, Stefano,
>
>
> Hi Mirela,
>
>>
>> Thank you very much for the feedback!
>>
>>
>> On 01/11/2018 03:00 PM, Julien Grall wrote:
>>>
>>> Hi Mirela,
>>>
>>> Thank you for
Following commit a6aa678fa3 ("x86/msr: Correct the emulation behaviour
of MSR_PRED_CMD") we may end up writing the low bit with the wrong
value. While it's unlikely for a guest to want to write zero there, we
should still permit (this without incurring the overhead of an actual
barrier). Correcting
On 04/16/2018 05:09 PM, Juergen Gross wrote:
On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Implement essential initialization of the sound driver:
- introduce required data structures
- handle driver registration
- handle sound card registration
-
On 04/17/2018 02:14 PM, Juergen Gross wrote:
On 17/04/18 10:58, Oleksandr Andrushchenko wrote:
On 04/16/2018 04:12 PM, Juergen Gross wrote:
On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Handle Xen event channels:
- create for all configured streams and p
On 17/04/18 11:22, Oleksandr Andrushchenko wrote:
> On 04/16/2018 04:39 PM, Juergen Gross wrote:
>> On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
>>> +static int alloc_int_buffers(struct xen_snd_front_shbuf *buf,
>>> + int num_pages_dir, int num_pages_buffer,
>>> +
On 17/04/18 10:58, Oleksandr Andrushchenko wrote:
> On 04/16/2018 04:12 PM, Juergen Gross wrote:
>> On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
>>> From: Oleksandr Andrushchenko
>>>
>>> Handle Xen event channels:
>>> - create for all configured streams and publish
>>> corresponding r
On 17/04/18 10:42, Oleksandr Andrushchenko wrote:
> On 04/16/2018 03:55 PM, Juergen Gross wrote:
>> On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
>>> + goto fail;
>>> + }
>>> +
>>> + if (!strncasecmp(str, XENSND_STREAM_TYPE_PLAYBACK,
>>> + sizeof(XENSND_STREAM_TYPE_PLAY
On 17/04/18 11:52, Mirela Simonovic wrote:
Hi Julien,
Hi Mirela,
On Mon, Apr 16, 2018 at 5:21 PM, Julien Grall wrote:
On 16/04/18 14:41, Mirela Simonovic wrote:
On Mon, Apr 16, 2018 at 3:14 PM, Julien Grall
wrote:
On 12/04/18 22:31, Stefano Stabellini wrote:
On Thu, 12 Apr 2018,
flight 122339 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122339/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale broken
test-armhf-armhf-xl
Hi Julien,
On Mon, Apr 16, 2018 at 5:21 PM, Julien Grall wrote:
>
>
> On 16/04/18 14:41, Mirela Simonovic wrote:
>>
>> On Mon, Apr 16, 2018 at 3:14 PM, Julien Grall
>> wrote:
>>>
>>> On 12/04/18 22:31, Stefano Stabellini wrote:
On Thu, 12 Apr 2018, Julien Grall wrote:
>
> On 12
On 04/17/2018 01:49 PM, Razvan Cojocaru wrote:
> On 04/17/2018 11:24 AM, Razvan Cojocaru wrote:
>> On 04/16/2018 11:21 PM, George Dunlap wrote:
>>> On Mon, Apr 16, 2018 at 7:46 PM, Razvan Cojocaru
>>> wrote:
On 04/16/2018 08:47 PM, George Dunlap wrote:
> On 04/13/2018 03:44 PM, Razvan Coj
On 04/17/2018 11:24 AM, Razvan Cojocaru wrote:
> On 04/16/2018 11:21 PM, George Dunlap wrote:
>> On Mon, Apr 16, 2018 at 7:46 PM, Razvan Cojocaru
>> wrote:
>>> On 04/16/2018 08:47 PM, George Dunlap wrote:
On 04/13/2018 03:44 PM, Razvan Cojocaru wrote:
> On 04/11/2018 11:04 AM, Razvan Cojo
On Tue, 2018-04-03 at 22:25 +0530, Praveen Kumar wrote:
> The patch optimized the sorted credit2 runq from simple linked list
> to
> rb-tree implementation. This way we will gain performance and
> scalability when the number of vCPUs are huge.
>
> Signed-off-by: Praveen Kumar
> --- a/xen/common/
>>> On 17.04.18 at 07:44, wrote:
> 发件人: Jan Beulich
> 发送时间: 2018年4月16日 19:48
On 16.04.18 at 10:00, wrote:
>> --- a/xen/arch/x86/hpet.c
>> +++ b/xen/arch/x86/hpet.c
>> @@ -740,7 +740,9 @@ void hpet_broadcast_exit(void)
>> if ( !reprogram_timer(deadline) )
>> raise_softirq(TIMER
On 04/16/2018 04:39 PM, Juergen Gross wrote:
On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Implement shared buffer handling according to the
para-virtualized sound device protocol at xen/interface/io/sndif.h:
- manage buffer memory
- handle granted refer
On Mon, Apr 16, 2018 at 06:32:26PM +0100, Anthony PERARD wrote:
> When QEMU is restricted, the qemu on the receiving side cann't write
> anything to xenstore once the migration is started. So it cann't tell
> libxl that it is ready to continue running the guest.
>
> In order to find out if QEMU is
On 04/17/2018 12:04 PM, Daniel Vetter wrote:
On Tue, Apr 17, 2018 at 10:40:12AM +0300, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Even if xen-front allocates its buffers from contiguous memory
those are still not contiguous in PA space, e.g. the buffer is only
contiguous in I
>>> On 16.04.18 at 18:44, wrote:
> On 16/04/18 13:32, Jan Beulich wrote:
> On 16.04.18 at 14:18, wrote:
>>> On 13/04/18 12:39, Jan Beulich wrote:
>>> On 13.04.18 at 13:17, wrote:
> On 13/04/18 09:31, Jan Beulich wrote:
> On 12.04.18 at 18:55, wrote:
>>> do_get_debugreg()
On Tue, Apr 17, 2018 at 10:40:12AM +0300, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Even if xen-front allocates its buffers from contiguous memory
> those are still not contiguous in PA space, e.g. the buffer is only
> contiguous in IPA space.
> The only use-case for this
flight 122335 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122335/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-install fail REGR. vs. 118324
test-armhf-armhf-xl
On 04/16/2018 04:12 PM, Juergen Gross wrote:
On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Handle Xen event channels:
- create for all configured streams and publish
corresponding ring references and event channels in Xen store,
so backend can con
On 04/16/2018 03:55 PM, Juergen Gross wrote:
On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Read configuration values from Xen store according
to xen/interface/io/sndif.h protocol:
- introduce configuration structures for different
components, e.g. soun
On 04/16/2018 11:21 PM, George Dunlap wrote:
> On Mon, Apr 16, 2018 at 7:46 PM, Razvan Cojocaru
> wrote:
>> On 04/16/2018 08:47 PM, George Dunlap wrote:
>>> On 04/13/2018 03:44 PM, Razvan Cojocaru wrote:
On 04/11/2018 11:04 AM, Razvan Cojocaru wrote:
> Debugging continues.
Final
On 04/16/2018 03:25 PM, Juergen Gross wrote:
On 16/04/18 08:24, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Introduce skeleton of the para-virtualized Xen sound
frontend driver.
Initial handling for Xen bus states: implement
Xen bus state machine for the frontend driver accor
On 04/17/2018 10:59 AM, Daniel Vetter wrote:
On Mon, Apr 16, 2018 at 12:29:05PM -0700, Dongwon Kim wrote:
Yeah, I definitely agree on the idea of expanding the use case to the
general domain where dmabuf sharing is used. However, what you are
targetting with proposed changes is identical to the
Am Tue, 17 Apr 2018 09:20:33 +0200
schrieb Dario Faggioli :
> And I guess we can add a 'Tested-by: Olaf Hering', as he actually did
> that, what do you say Olaf?
Yes, that is true. I have tested these three patches with staging.
Tested-by: Olaf Hering
Olaf
pgp_9JRNwl7yn.pgp
Description: Digi
On Mon, Apr 16, 2018 at 12:29:05PM -0700, Dongwon Kim wrote:
> Yeah, I definitely agree on the idea of expanding the use case to the
> general domain where dmabuf sharing is used. However, what you are
> targetting with proposed changes is identical to the core design of
> hyper_dmabuf.
>
> On to
On Wed, 2018-04-11 at 13:25 +0100, George Dunlap wrote:
> Some compile-tested-only sketches of what I'm talking about. Let me
> know what you think.
>
So, patches 1 and 2 of this series solves what I think was one of the
nastiest races I've ever had to chase in the scheduler. :-)
Having figured
On Mon, Apr 16, 2018 at 12:48:49PM +0200, Paul Semel wrote:
> On 04/13/2018 02:05 PM, Roger Pau Monné wrote:
> > > +static inline uint64_t scale_delta(uint64_t delta, uint32_t mul_frac,
> > > int shift)
> > > +{
> > > +uint64_t product;
> > > +#ifdef __i386__
> > > +uint32_t tmp1, tmp2;
>
On Mon, Apr 16, 2018 at 12:45:17PM +0200, Paul Semel wrote:
> On 04/13/2018 03:55 PM, Roger Pau Monné wrote:
> > > those are helpful macro to use the time manager correctly
> > >
> > > Signed-off-by: Paul Semel
> > > ---
> > >
> > > Notes:
> > > v4:
> > > - new patch version
> > >
> >
On Mon, Apr 16, 2018 at 12:16:18PM +0200, Paul Semel wrote:
> Hi !
>
> Thanks a lot for reviewing !
>
> On 04/13/2018 03:39 PM, Roger Pau Monné wrote:
> > On Tue, Apr 10, 2018 at 09:16:57PM +0200, Paul Semel wrote:
> > > this function acts as the POSIX gettimeofday function
> > >
> > > Signed-of
From: Oleksandr Andrushchenko
Even if xen-front allocates its buffers from contiguous memory
those are still not contiguous in PA space, e.g. the buffer is only
contiguous in IPA space.
The only use-case for this mode was if xen-front is used to allocate
dumb buffers which later be used by some o
On Wed, 2018-04-11 at 13:25 +0100, George Dunlap wrote:
> In vcpu_acct(), we call _csched_cpu_pick() in order to decide whether
> to consider migrating; but then we throw that result away and do it
> again in context_saved() if we decide we do need to move.
>
> Instead, just initiate the migration
On 15/03/18 04:08, Simon Gaiser wrote:
> xenbus_command_reply() did not actually copy the response string and
> leaked stack content instead.
>
> Fixes: 9a6161fe73bd ("xen: return xenstore command failures via response
> instead of rc")
> Signed-off-by: Simon Gaiser
Reviewed-by: Juergen Gross
1 - 100 of 103 matches
Mail list logo