On 01/30/2015 08:31 AM, Jan Beulich wrote:
On 05.01.15 at 22:44, boris.ostrov...@oracle.com wrote:
+static long vpmu_unload_next(void *arg)
+{
+struct vcpu *last;
+int ret;
+unsigned int thiscpu = smp_processor_id();
+
+if ( thiscpu != vpmu_next_unload_cpu )
+{
+/*
flight 33931 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33931/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-winxpsp3 7 windows-install fail REGR. vs. 33637
Regressions which
On 30/01/15 15:46, Julien Grall wrote:
Hello Denys,
On 30/01/15 15:40, Denis Drozdov wrote:
From: denys drozdov denys.droz...@globallogic.com
Update RT scheduler to run on arm platform
You need to give more background of the problem (i.e why you have to
disable the IRQ on ARM).
As the
On Fri, Jan 30, 2015 at 03:34:19PM +, Jan Beulich wrote:
On 30.01.15 at 16:09, daniel.ki...@oracle.com wrote:
I suppose that we should provide additional kexec hypercall
function which will return info about RS. kexec-tools should
load new kernel as usual and add relevant argument to
On 30.01.15 at 17:34, elena.ufimts...@oracle.com wrote:
On Tue, Jan 27, 2015 at 08:24:36AM +, Jan Beulich wrote:
On 26.01.15 at 18:30, elena.ufimts...@oracle.com wrote:
On Mon, Jan 26, 2015 at 05:06:12PM +, Jan Beulich wrote:
On 26.01.15 at 17:57, elena.ufimts...@oracle.com wrote:
Julien,
The details of this issue can be found in the current mailing list.
Please have a look at
http://lists.xen.org/archives/html/xen-devel/2014-09/msg04250.html.
This is exactly the same behaviour we are observing when running on our arm
setup.
The fix changes spin_lock_irq/spin_unlock_irq
On 01/29/2015 04:46 PM, Tamas K Lengyel wrote:
This is the third and final patch in the mem_event - vm_event renaming process
which removes all references and remaining code of mem_event from the Xen
source.
Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com
---
MAINTAINERS
On 30/01/15 15:56, Andrew Cooper wrote:
On 30/01/15 15:46, Julien Grall wrote:
Hello Denys,
On 30/01/15 15:40, Denis Drozdov wrote:
From: denys drozdov denys.droz...@globallogic.com
Update RT scheduler to run on arm platform
You need to give more background of the problem (i.e why you have
On 30/01/15 16:19, Denys Drozdov wrote:
Julien,
The details of this issue can be found in the current mailing list.
Please have a look
athttp://lists.xen.org/archives/html/xen-devel/2014-09/msg04250.html
http://lists.xen.org/archives/html/xen-devel/2014-09/msg04250.html.
This is exactly
On 30/01/15 16:44, Oleksandr Tyshchenko wrote:
On Fri, Jan 30, 2015 at 5:52 PM, Julien Grall julien.gr...@linaro.org wrote:
Hi Oleksandr,
Hi Julien
On 30/01/15 15:38, Oleksandr Tyshchenko wrote:
For example, such a simple thing as a formula for calculating divider
value for uart baudrate
On 30.01.15 at 16:09, daniel.ki...@oracle.com wrote:
I suppose that we should provide additional kexec hypercall
function which will return info about RS. kexec-tools should
load new kernel as usual and add relevant argument to its
command line. Most things are in place so we should just
On Fri, Jan 30, 2015 at 5:52 PM, Julien Grall julien.gr...@linaro.org wrote:
Hi Oleksandr,
Hi Julien
On 30/01/15 15:38, Oleksandr Tyshchenko wrote:
For example, such a simple thing as a formula for calculating divider
value for uart baudrate can differs from one family to
another despite
NMI watchdog sets APIC_LVTPC register to generate an NMI when PMU counter
overflow occurs. This may be overwritten by VPMU code later, effectively
turning off the watchdog.
We should disable VPMU when NMI watchdog is running.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
Use NMI_NONE when testing whether NMI watchdog is off.
Remove unused NMI_INVALID macro.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
xen/arch/x86/nmi.c | 4 ++--
xen/arch/x86/traps.c | 3 ++-
xen/include/asm-x86/apic.h | 1 -
3 files changed, 4 insertions(+), 4
On 28/01/15 17:27, Julien Grall wrote:
On 28/01/15 17:06, David Vrabel wrote:
On 28/01/15 16:45, Julien Grall wrote:
On 27/01/15 16:53, Wei Liu wrote:
On Tue, Jan 27, 2015 at 04:47:45PM +, Julien Grall wrote:
On 27/01/15 16:45, Wei Liu wrote:
On Tue, Jan 27, 2015 at 04:03:52PM +,
On Tue, Jan 27, 2015 at 08:24:36AM +, Jan Beulich wrote:
On 26.01.15 at 18:30, elena.ufimts...@oracle.com wrote:
On Mon, Jan 26, 2015 at 05:06:12PM +, Jan Beulich wrote:
On 26.01.15 at 17:57, elena.ufimts...@oracle.com wrote:
On Fri, Jan 23, 2015 at 10:50:23AM +, Jan Beulich
On Fri, Jan 30, 2015 at 08:37:33PM +, Andrew Cooper wrote:
On 30/01/15 19:51, Luis R. Rodriguez wrote:
On Fri, Jan 30, 2015 at 02:23:48PM +, Andrew Cooper wrote:
On 30/01/15 01:14, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
There are several ways that a Xen
On Tue, Jan 27, 2015 at 04:44:02PM +, David Vrabel wrote:
This series fixes a number of long-standing bugs in the handling of
grant maps. Refer to the following for all the details.
http://xenbits.xen.org/people/dvrabel/grant-improvements-C.pdf
In summary, the important uses that
On 01/30/2015 03:37 PM, Andrew Cooper wrote:
The actions Xen needs to take are:
- Copy the buffer into Xen.
- Scan the buffer for the correct patch
Why not have the toolstack search for the right patch? Hypervisor will
verify that it's appropriate but won't have to spend time scanning the
On 30/01/2015 21:24, Boris Ostrovsky wrote:
On 01/30/2015 03:37 PM, Andrew Cooper wrote:
The actions Xen needs to take are:
- Copy the buffer into Xen.
- Scan the buffer for the correct patch
Why not have the toolstack search for the right patch? Hypervisor will
verify that it's
..which collects system tables data. We need this to support
multiboot2 protocol on EFI platforms.
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
---
xen/common/efi/boot.c | 51 -
1 file changed, 29 insertions(+), 22 deletions(-)
diff --git
..which initializes basic EFI variables. We need this to support
multiboot2 protocol on EFI platforms.
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
---
xen/common/efi/boot.c | 26 --
1 file changed, 16 insertions(+), 10 deletions(-)
diff --git
Use %ecx instead of %eax to store low memory upper limit from EBDA.
This way we do not wipe multiboot protocol identifier. It is needed
in reloc() to differentiate between multiboot (v1) and
multiboot2 protocol.
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
Reviewed-by: Andrew Cooper
Create generic alloc and copy functions. We need
separate tools for memory allocation and copy to
provide multiboot2 protocol support.
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
---
xen/arch/x86/boot/reloc.c | 52 -
1 file changed, 33
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
---
xen/arch/x86/shutdown.c |3 ++-
xen/common/efi/boot.c|5 +
xen/common/efi/runtime.c |6 ++
3 files changed, 13 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/shutdown.c b/xen/arch/x86/shutdown.c
index
The main goal is to modify as little the Linux code to be able to port
easily new feature added in Linux repo for the driver.
To achieve that we:
- Add helpers to Linux function not implemented on Xen
- Add callbacks used by Xen to do our own stuff and call Linux ones
- Only modify
The header asm/device.h has been included in the vgic code during
splitting to support multiple version. But no code within those files
requires it.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Acked-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
---
Changes in v3:
-
On 01/30/15 05:53, Paul Durrant wrote:
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 30 January 2015 00:53
To: xen-devel@lists.xen.org
Cc: Andrew Cooper; George Dunlap; Ian Campbell; Ian Jackson; Jan Beulich;
Keir (Xen.org); Stefano Stabellini; Wei Liu; Paul
On 30/01/15 17:15, Boris Ostrovsky wrote:
NMI watchdog sets APIC_LVTPC register to generate an NMI when PMU counter
overflow occurs. This may be overwritten by VPMU code later, effectively
turning off the watchdog.
We should disable VPMU when NMI watchdog is running.
Signed-off-by: Boris
On 30/01/15 17:54, Daniel Kiper wrote:
Add multiboot2 protocol support. Alter min memory limit handling as we
now may not find it from either multiboot (v1) or multiboot2.
This way we are laying the foundation for EFI + GRUB2 + Xen development.
Signed-off-by: Daniel Kiper
On 30/01/15 17:54, Daniel Kiper wrote:
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
---
xen/arch/x86/boot/head.S | 174
+++--
xen/arch/x86/efi/efi-boot.h | 29 +++
xen/arch/x86/setup.c | 23 ++---
On Thursday, January 29, 2015 10:14:26 AM Ian Campbell wrote:
I'm thinking it would be clearer if the comment and the condition were
logically inverted. e.g.:
/*
* If the amount of free mem has increased on this iteration (i.e.
* some progress has been made) then reset the
..because it is ignored by Xen.
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
---
xen/arch/x86/boot/reloc.c |1 -
1 file changed, 1 deletion(-)
diff --git a/xen/arch/x86/boot/reloc.c b/xen/arch/x86/boot/reloc.c
index f971920..63045c0 100644
--- a/xen/arch/x86/boot/reloc.c
+++
On 30/01/15 17:54, Daniel Kiper wrote:
Create generic alloc and copy functions. We need
separate tools for memory allocation and copy to
provide multiboot2 protocol support.
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
On 01/30/15 05:24, Jan Beulich wrote:
On 30.01.15 at 01:52, dsl...@verizon.com wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -2599,7 +2599,7 @@ static bool_t hvm_complete_assist_req(ioreq_t *p)
break;
}
-return 1;
+return 0; /* implicitly bins
On 30/01/2015 23:43, Daniel Kiper wrote:
On Fri, Jan 30, 2015 at 07:06:53PM +, Andrew Cooper wrote:
On 30/01/15 17:54, Daniel Kiper wrote:
+
+efi_multiboot2_proto:
+/* Skip Multiboot2 information fixed part */
+lea MB2_fixed_sizeof(%ebx),%ecx
+
+0:
+/* Get
On Fri, Jan 30, 2015 at 07:06:53PM +, Andrew Cooper wrote:
On 30/01/15 17:54, Daniel Kiper wrote:
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
---
xen/arch/x86/boot/head.S | 174
+++--
xen/arch/x86/efi/efi-boot.h | 29
-Original Message-
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Wei Liu
Sent: Friday, January 30, 2015 8:26 PM
To: Chen, Tiejun
Cc: Wei Liu; ian.campb...@citrix.com; m...@redhat.com; Ian Jackson;
qemu-de...@nongnu.org;
Up to now the pvscsi drivers haven't supported domain suspend and
resume. When a domain with an assigned pvscsi device was suspended
and resumed again, it was not able to use the device any more: trying
to do so resulted in hanging processes.
Support suspend and resume of pvscsi devices.
On Fri, Jan 30, 2015 at 03:01:11PM +0100, Fabio Fantoni wrote:
Il 30/01/2015 14:38, Wei Liu ha scritto:
On Thu, Jan 29, 2015 at 04:36:43PM +, Ian Campbell wrote:
On Mon, 2015-01-26 at 11:25 +0800, Chunyan Liu wrote:
Changes to V9:
This looks good to me, thanks.
Ian/Wei do you have any
On Fri, Jan 30, 2015 at 02:05:05PM +, Wei Liu wrote:
On Fri, Jan 30, 2015 at 03:01:11PM +0100, Fabio Fantoni wrote:
Il 30/01/2015 14:38, Wei Liu ha scritto:
On Thu, Jan 29, 2015 at 04:36:43PM +, Ian Campbell wrote:
On Mon, 2015-01-26 at 11:25 +0800, Chunyan Liu wrote:
Changes to
On Fri, Jan 30, 2015 at 02:19:53PM +, Dave Scott wrote:
Looks ok to me.
Signed-off-by: David Scott dave.sc...@citrix.com
I think this should be an Acked-by.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 30.01.15 at 14:51, jgr...@suse.com.non-mime.internet wrote:
A request in the ring buffer mustn't be read after it has been marked
as consumed. Otherwise it might already have been reused by the
frontend without violating the ring protocol.
To avoid inconsistencies in the backend only
A request in the ring buffer mustn't be read after it has been marked
as consumed. Otherwise it might already have been reused by the
frontend without violating the ring protocol.
To avoid inconsistencies in the backend only work on a private copy
of the request. This will ensure a malicious
Il 30/01/2015 14:38, Wei Liu ha scritto:
On Thu, Jan 29, 2015 at 04:36:43PM +, Ian Campbell wrote:
On Mon, 2015-01-26 at 11:25 +0800, Chunyan Liu wrote:
Changes to V9:
This looks good to me, thanks.
Ian/Wei do you have any comments? xapi folks?
Looks good to me.
Wei.
I looked to the
On 30/01/15 14:17, Konrad Rzeszutek Wilk wrote:
blinks kexec is OS agnostic?
Yes.
Extra information to be passed to (e.g., a Linux kernel being kexec'd)
can be supplied in an additional segment and marshalled into a suitable
format/location for the exec'd kernel by purgatory (or similar).
On 01/29/2015 08:14 PM, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
There are several ways that a Xen system can update the
CPU microcode on a pvops kernel [0] now, the preferred way
is through the early microcode update mechanism. At run
time folks should use this new
On 30.01.15 at 14:52, jgr...@suse.com.non-mime.internet wrote:
@@ -231,8 +242,23 @@ static int scsifront_cmd_done(struct vsc
return more_to_do;
}
+void scsifront_finish_all(struct vscsifrnt_info *info)
+{
+ unsigned i;
+ struct vscsiif_response resp;
+
On 05.01.15 at 22:44, boris.ostrov...@oracle.com wrote:
--- a/xen/arch/x86/hvm/vpmu.c
+++ b/xen/arch/x86/hvm/vpmu.c
@@ -497,3 +497,39 @@ long do_xenpmu_op(int op,
XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg)
return ret;
}
+
+static int __init vpmu_init(void)
+{
+int
On 01/30/2015 03:46 PM, Jan Beulich wrote:
On 30.01.15 at 14:52, jgr...@suse.com.non-mime.internet wrote:
@@ -231,8 +242,23 @@ static int scsifront_cmd_done(struct vsc
return more_to_do;
}
+void scsifront_finish_all(struct vscsifrnt_info *info)
+{
+ unsigned i;
+ struct
On 30/01/15 14:52, Konrad Rzeszutek Wilk wrote:
On Fri, Jan 30, 2015 at 02:40:46PM +, David Vrabel wrote:
On 30/01/15 14:17, Konrad Rzeszutek Wilk wrote:
blinks kexec is OS agnostic?
Yes.
Extra information to be passed to (e.g., a Linux kernel being kexec'd)
can be supplied in an
On 30.01.15 at 15:54, jgr...@suse.com wrote:
On 01/30/2015 03:46 PM, Jan Beulich wrote:
On 30.01.15 at 14:52, jgr...@suse.com.non-mime.internet wrote:
@@ -231,8 +242,23 @@ static int scsifront_cmd_done(struct vsc
return more_to_do;
}
+void scsifront_finish_all(struct vscsifrnt_info
flight 33958 ovmf real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33958/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-build fail REGR. vs. 33686
build-i386
On 01/30/2015 04:05 PM, Jan Beulich wrote:
On 30.01.15 at 15:54, jgr...@suse.com wrote:
On 01/30/2015 03:46 PM, Jan Beulich wrote:
On 30.01.15 at 14:52, jgr...@suse.com.non-mime.internet wrote:
@@ -231,8 +242,23 @@ static int scsifront_cmd_done(struct vsc
return more_to_do;
}
On Fri, Jan 30, 2015 at 02:57:32PM +, David Vrabel wrote:
On 30/01/15 14:52, Konrad Rzeszutek Wilk wrote:
On Fri, Jan 30, 2015 at 02:40:46PM +, David Vrabel wrote:
On 30/01/15 14:17, Konrad Rzeszutek Wilk wrote:
blinks kexec is OS agnostic?
Yes.
Extra information to be
On 29.01.15 at 18:30, t...@xen.org wrote:
OK, here's what I have. It keeps the mechanism the same, threading on
the main page list entry, but tidies it up to use the page_list operations
rather than open-coding. I've tested it (lightly - basically jsut
boot testing) with 32bit, 32pae and
On 29.01.15 at 18:34, t...@xen.org wrote:
At 11:10 + on 28 Jan (1422439811), Andrew Cooper wrote:
On 28/01/15 08:11, Jan Beulich wrote:
--- a/xen/arch/x86/mm/shadow/Makefile
+++ b/xen/arch/x86/mm/shadow/Makefile
@@ -1,4 +1,5 @@
-obj-$(x86_64) += common.o guest_2.o guest_3.o
Hi Xen developers,
Just a heads up as we will be applying some security patches to our VMs
hosting several XenProject services like wiki, mail, blog, etc.
These updates will require rebooting the VMs so the services will be
down for a short period of time (5 - 10 minutes) within the next hour.
On 29.01.15 at 18:58, boris.ostrov...@oracle.com wrote:
The first patch is a light cleanup of nmi_watchdog usage. (I removed
NMI_INVALID definition but left NMI_IO_APIC. Do we actually need it? I
don't see anyone using it except for one place, which doesn't really
use it neither)
As we
At 08:36 + on 30 Jan (1422603387), Jan Beulich wrote:
On 29.01.15 at 18:30, t...@xen.org wrote:
OK, here's what I have. It keeps the mechanism the same, threading on
the main page list entry, but tidies it up to use the page_list operations
rather than open-coding. I've tested it
On 30.01.15 at 01:52, dsl...@verizon.com wrote:
According to your 0/5
Suggested-by: Paul Durrant paul.durr...@citrix.com
?
Jan
Signed-off-by: Don Slutz dsl...@verizon.com
---
xen/arch/x86/hvm/hvm.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/hvm/hvm.c
On 30.01.15 at 01:52, dsl...@verizon.com wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -2599,7 +2599,7 @@ static bool_t hvm_complete_assist_req(ioreq_t *p)
break;
}
-return 1;
+return 0; /* implicitly bins the i/o operation */
}
This change
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 29 January 2015 19:41
To: Paul Durrant; Don Slutz; qemu-de...@nongnu.org; Stefano Stabellini
Cc: Peter Maydell; Olaf Hering; Alexey Kardashevskiy; Stefan Weil; Michael
Tokarev; Alexander Graf; Gerd Hoffmann; Stefan
On 30.01.15 at 01:52, dsl...@verizon.com wrote:
I.E. do just what no backing DM does.
_If_ this is correct, the if() modified here should be folded with the
one a few lines up. But looking at the description of the commit that
introduced this (bac0999325 x86 hvm: Do not incorrectly retire an
On 01/26/15 20:03, Ard Biesheuvel wrote:
To allow a runtime self relocating PrePi instance to discover the base
address of the device tree at runtime, allow the use of a patchable PCD
for gArmVirtualizationTokenSpaceGuid.PcdDeviceTreeInitialBaseAddress.
We will not be using the build time
On Thu, Jan 29, Ian Campbell wrote:
This compiles for me on Debian with gcc 4.7.2-5.
Same here.
I'm honestly not sure what the C standard says about duplicate but
identical typedefs -- Ian?
How would that matter now? ;-) Old gcc can not deal with it, the commits
cause a regression for
On 01/30/2015 12:38 PM, Tamas K Lengyel wrote:
On Fri, Jan 30, 2015 at 8:58 AM, Razvan Cojocaru
rcojoc...@bitdefender.com wrote:
On 01/29/2015 11:46 PM, Tamas K Lengyel wrote:
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index c7a0bde..3b58700 100644
--- a/xen/arch/x86/mm/p2m.c
On 01/26/15 20:03, Ard Biesheuvel wrote:
Allow the use of a patchable PCD for gArmTokenSpaceGuid.PcdFvBaseAddress
by moving it from the [FixedPcd] to the [Pcd] section in the INF file of
PlatformPeiLib.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel
Up to now the pvscsi frontend hasn't supported domain suspend and
resume. When a domain with an assigned pvscsi device was suspended
and resumed again, it was not able to use the device any more: trying
to do so resulted in hanging processes.
Support suspend and resume of pvscsi devices.
When a xen domain is being restored the LUN state of a pvscsi device
is Connected and not Initialising as in case of attaching a new
pvscsi LUN.
This must be taken into account when adding a new pvscsi device for
a domain as otherwise the pvscsi LUN won't be connected to the
SCSI target
A request in the ring buffer mustn't be read after it has been marked
as consumed. Otherwise it might already have been reused by the
frontend without violating the ring protocol.
To avoid inconsistencies in the backend only work on a private copy
of the request. This will ensure a malicious
On Fri, Jan 30, 2015 at 03:32:26PM +0800, Tiejun Chen wrote:
When commit 6865e52b78f4, PCI multi-seg: adjust domctl interface,
is introduced, we missed to sync that head file.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
Acked-by: Wei Liu wei.l...@citrix.com
On 05.01.15 at 22:44, boris.ostrov...@oracle.com wrote:
+static long vpmu_unload_next(void *arg)
+{
+struct vcpu *last;
+int ret;
+unsigned int thiscpu = smp_processor_id();
+
+if ( thiscpu != vpmu_next_unload_cpu )
+{
+/* Continuation thread may have been
On Thu, Jan 29, 2015 at 04:36:43PM +, Ian Campbell wrote:
On Mon, 2015-01-26 at 11:25 +0800, Chunyan Liu wrote:
Changes to V9:
This looks good to me, thanks.
Ian/Wei do you have any comments? xapi folks?
Looks good to me.
Wei.
___
There are also places in patches yet to be published I've worked on
where we gate things on introspection_enabled being != 0, so please
don't remove it or have it misbehave.
I'll look into the extended_capture option in case it will allow future
removal of the MSR special case for
On Mon, Jan 26, 2015 at 09:53:25AM +, Thomas Leonard wrote:
[ Cc += Anil ]
On 25 January 2015 at 18:25, Wei Liu wei.l...@citrix.com wrote:
Cc Ian and Ian and some folks who might be interested in this work.
On Sun, Jan 25, 2015 at 06:13:41PM +, Wei Liu wrote:
There has been
Ack, the plan was actually to replace all references to
arch.hvm_domain.introspection_enabled with
arch.monitor_options.mov_to_msr.extended_capture. I see I forgot to
actually fully follow through that plan but that's the intention at
least. So the functionality would remain, it would just
On 01/30/2015 12:47 PM, Jan Beulich wrote:
On 30.01.15 at 12:21, jgr...@suse.com wrote:
@@ -734,11 +734,11 @@ static int scsiback_do_cmd_fn(struct vscsibk_info *info)
if (!pending_req)
return 1;
- ring_req = RING_GET_REQUEST(ring, rc);
+
From: denys drozdov denys.droz...@globallogic.com
Change-Id: I9b315f213775b8410fe75cd96968dcb213ea287b
Signed-off-by: denys drozdov denys.droz...@globallogic.com
---
xen/common/sched_rt.c |7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/xen/common/sched_rt.c
On 01/26/15 20:03, Ard Biesheuvel wrote:
On ARM, xen_pfn_t is 64 bits but the size of a pointer is only
32 bits, so casting between them needs to go via (UINTN). Also
move the xen_pfn_t cast outside the shift so that we can avoid
shifting 64-bit quantities on 32-bit architectures, which may
On Thu, 2015-01-29 at 18:01 +, David Vrabel wrote:
On 29/01/15 13:36, Ian Campbell wrote:
On Mon, 2014-09-01 at 18:52 +0100, David Vrabel wrote:
If the balloon driver is adding additional memory regions to the
balloon and add_memory() fails it will likely continuously fail so
cancel
On 01/30/2015 01:45 PM, Tamas K Lengyel wrote:
Ack, the plan was actually to replace all references to
arch.hvm_domain.introspection_enabled with
arch.monitor_options.mov_to_msr.extended_capture. I see I forgot to
actually fully follow through that plan but that's the intention at
least. So
On Fri, Jan 30, 2015 at 08:56:48AM +0800, Chen, Tiejun wrote:
[...]
Just remember to handle old option in libxl if your old option is already
released by some older version of QEMUs.
I just drop that old option, -gfx_passthru, if we're under qemu upstream
circumstance, like this,
The
flight 33918 linux-3.14 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33918/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 5 xen-boot fail REGR. vs. 33341
On 01/26/15 20:03, Ard Biesheuvel wrote:
This implements a MemoryInitPeiLib instance that differs from the
stock ArmPlatformPkg version only in the fact that it does not remove
the memory used by the flash device (FD). The reason is that, when using
PrePi, the DXE core is started immediately
On Fri, Jan 30, 2015 at 12:07 PM, Razvan Cojocaru
rcojoc...@bitdefender.com wrote:
On 01/30/2015 12:38 PM, Tamas K Lengyel wrote:
On Fri, Jan 30, 2015 at 8:58 AM, Razvan Cojocaru
rcojoc...@bitdefender.com wrote:
On 01/29/2015 11:46 PM, Tamas K Lengyel wrote:
diff --git a/xen/arch/x86/mm/p2m.c
On 30.01.15 at 12:21, jgr...@suse.com wrote:
@@ -734,11 +734,11 @@ static int scsiback_do_cmd_fn(struct vscsibk_info *info)
if (!pending_req)
return 1;
- ring_req = RING_GET_REQUEST(ring, rc);
+ memcpy(ring_req,
On 30 January 2015 at 11:26, Wei Liu wei.l...@citrix.com wrote:
On Mon, Jan 26, 2015 at 09:53:25AM +, Thomas Leonard wrote:
[ Cc += Anil ]
On 25 January 2015 at 18:25, Wei Liu wei.l...@citrix.com wrote:
Cc Ian and Ian and some folks who might be interested in this work.
On Sun, Jan
On 30.01.15 at 13:30, denys.droz...@globallogic.com wrote:
From: denys drozdov denys.droz...@globallogic.com
There's a description missing here of _what_ (case) you are fixing.
Change-Id: I9b315f213775b8410fe75cd96968dcb213ea287b
And the purpose of this line is unclear.
---
89 matches
Mail list logo