Ian Campbell writes (Re: ./configure: line 7058: python-config: command not
found after commit 0013245):
On Wed, 2015-03-04 at 15:02 +0100, Roger Pau Monné wrote:
Yes, I think so, for python versions 2.4 we should require
python-config.
ACK.
IMHO python_fortify_noopt.m4 should also
On 04.03.15 at 14:30, feng...@intel.com wrote:
- Introduce a new global vector which is used to wake up the HLT'ed vCPU.
Currently, there is a global vector 'posted_intr_vector', which is used as
the
global notification vector for all vCPUs in the system. This vector is
stored in
VMCS and
On Wed, Mar 04, 2015 at 02:31:08PM +0100, Juergen Gross wrote:
On 03/02/2015 12:39 PM, David Vrabel wrote:
On 26/02/15 13:35, Juergen Gross wrote:
Introduces the Xen pvUSB backend. With pvUSB it is possible for a Xen
domU to communicate with a USB device assigned to that domU. The
On Wed, Mar 04, 2015 at 09:55:11AM -0500, Boris Ostrovsky wrote:
On 03/04/2015 09:43 AM, Paul E. McKenney wrote:
On Tue, Mar 03, 2015 at 02:31:51PM -0800, Paul E. McKenney wrote:
On Tue, Mar 03, 2015 at 05:06:50PM -0500, Boris Ostrovsky wrote:
On 03/03/2015 04:26 PM, Paul E. McKenney wrote:
On 03/04/2015 04:27 PM, Greg KH wrote:
On Wed, Mar 04, 2015 at 02:31:08PM +0100, Juergen Gross wrote:
On 03/02/2015 12:39 PM, David Vrabel wrote:
On 26/02/15 13:35, Juergen Gross wrote:
Introduces the Xen pvUSB backend. With pvUSB it is possible for a Xen
domU to communicate with a USB device
On Wed, 2015-03-04 at 16:07 +, Ian Jackson wrote:
Ian Campbell writes (Re: ./configure: line 7058: python-config: command not
found after commit 0013245):
That would be ideal, but unless someone shows me/us a system with Python
=2.4 which suffers from this issue I'd also be inclined to
On Wed, 2015-03-04 at 18:32 +, Tao Chen wrote:
Defined the string of {xen-pvscsi: } as DRV_PFX, then use it in the pr
sentences and DPRINTK.
Also fixed up some comments just as eliminate redundant white spaces and
format the code.
These will make the code easier to read.
It'd probaby
On 4 Mar 2015, at 17:40, Amir Chaudhry am...@cam.ac.uk wrote:
I noticed this the other day and had a quick scout around.
Mozilla not accepted for Google Summer of Code 2015
http://blog.queze.net/post/2015/03/03/Mozilla-not-accepted-for-Google-Summer-of-Code-2015
Google’s program is
On 03/04/2015 10:45 AM, David Vrabel wrote:
On 04/03/15 14:55, Boris Ostrovsky wrote:
In the meantime, it turned out that HVM guests are broken by this patch
(with our without changes that we've been discussing), because HVM CPUs
die with
static void xen_hvm_cpu_die(unsigned int cpu)
{
Hi folks,
just a quick note to let you know that we were not accepted for GSoC this year.
Do note that the Linux Foundation, OpenStack Foundation and many of the other
usual suspects have not been accepted this year. We will find out more why on
Friday. However, there are at least 4 Xen
On 27/02/15 11:33, Roger Pau Monne wrote:
iommu_share_p2m_table should not prevent PVH guests from using a shared page
table between the IOMMU and EPT. Clean the code by removing the asserts in
the vendor specific implementations (amd_iommu_share_p2m, iommu_set_pgd),
and moving the hap_enabled
flight 35847 linux-3.16 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35847/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 15 guest-localmigrate/x10fail REGR. vs. 34167
test-amd64-i386-pair
On 04/03/15 13:30, Wu, Feng wrote:
VT-d Posted-interrupt (PI) design for XEN
Thankyou very much for this!
Background
==
With the development of virtualization, there are more and more device
assignment requirements. However, today when a VM is running with
assigned devices (such
On Wed, Mar 04, 2015 at 01:51:53PM +0100, Stefan Bader wrote:
On 04.03.2015 07:14, Greg Kroah-Hartman wrote:
3.18-stable review patch. If anyone has any objections, please let me know.
I thought I replied earlier today but I cannot seem to find it coming back via
the mailing list. Hope
On Tue, Mar 03, 2015 at 04:11:09PM +0800, Wang Xiaoming wrote:
The maximum of SW-IOMMU is limited to 2^11*128 = 256K.
And the size of IO_TLB_DEFAULT_SIZE is limited to (64UL20) 64M now.
While in different platform and different requirement this seems improper.
So modifing the IO_TLB_SEGSIZE to
On 04/03/15 14:55, Boris Ostrovsky wrote:
In the meantime, it turned out that HVM guests are broken by this patch
(with our without changes that we've been discussing), because HVM CPUs
die with
static void xen_hvm_cpu_die(unsigned int cpu)
{
xen_cpu_die(cpu);
flight 35825 ovmf real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35825/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 35673
Tests which did not succeed, but are
David assertion that better performance and scalbility can be gained
with grant table locking and TLB flush avoidance is interesting - as
1). The grant locking is going in Xen 4.6 but not earlier - so when running
on older hypervisors this gives an performance benefit.
2). I have
On Tuesday, March 03, 2015 02:54:50 PM Mike Latimer wrote:
Thanks for all the help and patience as we've worked through this. Ack to
the whole series:
Acked-by: Mike Latimer mlati...@suse.com
I guess the more correct response is:
Reviewed-by: Mike Latimer mlati...@suse.com
Tested-by:
On Wed, Mar 04, 2015 at 10:07:56AM +, Ian Campbell wrote:
On Wed, 2015-03-04 at 09:04 +0800, Chao Peng wrote:
On Tue, Mar 03, 2015 at 10:09:39AM +, Ian Campbell wrote:
On Tue, 2015-03-03 at 16:00 +0800, Chao Peng wrote:
On Mon, Mar 02, 2015 at 01:48:43PM +, Ian Campbell
On 03/05/2015 05:21 AM, Konrad Rzeszutek Wilk wrote:
David assertion that better performance and scalbility can be gained
with grant table locking and TLB flush avoidance is interesting - as
1). The grant locking is going in Xen 4.6 but not earlier - so when running
on older hypervisors
Hi, all:
I want to learn how the emulated NICs work in XEN. So I boot a DomU with an
emulated rtl8139 NIC, ping host from DomU and capture the trace info using
xentrace tool, and then check the log of qemu-dm and trace info analyzed by
xenalyze tool. I have enabled debug in rtl8139.c and added
flight 35860 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35860/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
Regressions which are
Right. The key observation is that at any single point in time, a given
hardware thread can be fetching an instruction or reading data, but not
both.
Fine, as long as an instruction reading itself isn't going to lead to
a live lock.
That's not how the hardware works. By the time you
flight 35863 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35863/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 12 guest-start.2 fail REGR. vs. 35524
Regressions which are
On Wed, Mar 4, 2015 at 6:36 AM, Andrey Ryabinin a.ryabi...@samsung.com wrote:
On 03/03/2015 07:02 PM, Konrad Rzeszutek Wilk wrote:
If it is like that - then just using what had to be implemented
for the stack protection as a template ought to pave most of the
work?
Probably. I think I could
On Feb 18, 2015 17:03, Jan Beulich wrote:
In order for commit cbeeaa7d (x86/nmi: fix shootdown of pcpus
running in VMX non-root mode)'s re-use of that fixmap entry to not
cause undesirable (in crash context) cross-CPU TLB flushes, invalidate
the fixmap entry right after use.
Signed-off-by:
On Feb 18, 2015 17:03, Jan Beulich wrote:
There's no need for more than one variable, no need for casts, and no
point in using the type-safe xmalloc_array() here.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/tboot.c
+++ b/xen/arch/x86/tboot.c
@@ -435,13 +435,12 @@ int
On 3/4/2015 at 08:33 PM, in message 1425472438.25940.147.ca...@citrix.com,
Ian Campbell ian.campb...@citrix.com wrote:
On Wed, 2015-03-04 at 12:26 +, George Dunlap wrote:
On 03/04/2015 10:00 AM, Ian Campbell wrote:
On Wed, 2015-03-04 at 00:26 -0700, Chun Yan Liu wrote:
On
On 3/4/2015 at 10:41 PM, in message 54f71992.5080...@eu.citrix.com, George
Dunlap george.dun...@eu.citrix.com wrote:
On 03/04/2015 08:28 AM, Chun Yan Liu wrote:
On 3/4/2015 at 01:15 AM, in message 54f5ec4e.6020...@eu.citrix.com,
George
Dunlap george.dun...@eu.citrix.com
-Original Message-
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: Thursday, March 5, 2015 3:43 AM
To: Wang, Xiaoming
Cc: ch...@chris-wilson.co.uk; david.vra...@citrix.com;
lau...@codeaurora.org; heiko.carst...@de.ibm.com; li...@horizon.com;
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Thursday, March 05, 2015 2:48 AM
To: Wu, Feng; xen-devel@lists.xen.org
Cc: Zhang, Yang Z; Tian, Kevin; Jan Beulich
Subject: Re: [Xen-devel] VT-d Posted-interrupt (PI) design for XEN
On 04/03/15
On 05.03.15 at 06:04, feng...@intel.com wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, March 04, 2015 11:19 PM
On 04.03.15 at 14:30, feng...@intel.com wrote:
- Introduce a new global vector which is used to wake up the HLT'ed vCPU.
Currently, there is a global vector
On 03/04/2015 03:06 PM, Tamas K Lengyel wrote:
Right. The key observation is that at any single point in time, a given
hardware thread can be fetching an instruction or reading data, but not
both.
Fine, as long as an instruction reading itself isn't going to lead to
a live lock.
That's
I noticed this the other day and had a quick scout around.
Mozilla not accepted for Google Summer of Code 2015
http://blog.queze.net/post/2015/03/03/Mozilla-not-accepted-for-Google-Summer-of-Code-2015
Google’s program is enormously popular, and over-subscribed, meaning Google
has had to rotate
flight 35867 xen-4.3-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35867/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 35702
Regressions
... because of him indicating that he hasn't been working on it for the
past 4+ years.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -180,7 +180,6 @@
F: tools/debugger/kdd/
INTEL(R) TRUSTED EXECUTION TECHNOLOGY (TXT)
-M: Joseph Cihula
On 04.03.15 at 04:26, ian.jack...@eu.citrix.com wrote:
flight 35810 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35810/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64
(re-adding xen-devel to Cc)
On 04.03.15 at 08:59, joseph.cih...@intel.com wrote:
FYI, I no longer work on tboot (haven't for 4+ years). Jimmy is still Mr.
tboot, however ;-)
Thanks for letting us know. I'll send a patch to update
./MAINTAINERS then.
Jan
On 3/4/2015 at 01:15 AM, in message 54f5ec4e.6020...@eu.citrix.com, George
Dunlap george.dun...@eu.citrix.com wrote:
On 01/19/2015 08:28 AM, Chunyan Liu wrote:
To attach a usb device, a virtual usb controller should be created first.
This patch defines usbctrl and usbdevice related
On Tue, 2015-03-03 at 19:41 +, Julien Grall wrote:
python-dev is not installed. Although I have libpython-dev installed.
And this used to work I suppose?
As I said in 1425404173.25940.82.ca...@citrix.com:
m4/python_devel.m4 seems to suggest it was made optional on
purpose,
On Tue, 2015-03-03 at 16:26 +, David Vrabel wrote:
Every time a VIF is destroyed up-to 256 pages may be leaked if packets
with more than MAX_SKB_FRAGS frags where transmitted from the guest.
Even worse, if another user of ballooned pages allocated one of these
ballooned pages it would not
On Wed, 2015-03-04 at 00:26 -0700, Chun Yan Liu wrote:
On 3/3/2015 at 07:10 PM, in message
1425381019.24959.87.ca...@citrix.com, Ian
Campbell ian.campb...@citrix.com wrote:
On Mon, 2015-01-19 at 16:28 +0800, Chunyan Liu wrote:
Sorry for the long delay in replying.
To
Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring
are supported: total and local memory bandwidth monitoring. To use it,
CMT should be enabled in hypervisor.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
Changes in v11:
1. term change: *_MEM_BANDWIDTH = *_MEM_COUNT.
On 03/04/2015 11:06 AM, Ian Campbell wrote:
On Wed, 2015-03-04 at 09:42 +, Jan Beulich wrote:
On 04.03.15 at 10:35, ian.campb...@citrix.com wrote:
On Wed, 2015-03-04 at 08:58 +, Jan Beulich wrote:
On 03.03.15 at 11:32, jgr...@suse.com wrote:
On 03/03/2015 11:27 AM, Jan Beulich wrote:
Hi, Juergen.
Thanks for your advice. I will send a v2 patch based on your suggested
modifications.
On 2015/3/3 17:52, Juergen Gross wrote:
On 03/03/2015 09:37 AM, Tao Chen wrote:
Replace the string of {xen-pvscsi:} in the pr sentences with DRV_PFX,
it makes the code easier to read.
I'm
On Wed, 2015-03-04 at 08:58 +, Jan Beulich wrote:
On 03.03.15 at 11:32, jgr...@suse.com wrote:
On 03/03/2015 11:27 AM, Jan Beulich wrote:
On 03.03.15 at 10:29, jgr...@suse.com.non-mime.internet wrote:
In order to indicate the Xen tools capability to support the virtual
mapped linear
On 04.03.15 at 10:35, ian.campb...@citrix.com wrote:
On Wed, 2015-03-04 at 08:58 +, Jan Beulich wrote:
On 03.03.15 at 11:32, jgr...@suse.com wrote:
On 03/03/2015 11:27 AM, Jan Beulich wrote:
On 03.03.15 at 10:29, jgr...@suse.com.non-mime.internet wrote:
In order to indicate the Xen
On 04/03/15 09:10, Jan Beulich wrote:
... making more obvious what its so far open coded users intend.
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -310,7 +310,7 @@ void
On Tue, 3 Mar 2015, Gordan Bobic wrote:
Hi,
I've been looking into custom e820 maps for domUs again, and
found that functionality to provide QEMU with hints regarding
e820 mapping has been upstream since some time in
2010 (FW_CFG_E820_TABLE) with more finely grained control
(usable rather
On Tue, 3 Mar 2015, Julien Grall wrote:
Hi Stefano,
On 03/03/2015 18:07, Stefano Stabellini wrote:
I would like to see a more generic handling of virq != physical irq.
This is not specific to LPIs but to any scenario where the physical irq
differs from the virtual irq.
I though we
On Tue, 2015-03-03 at 10:51 +, Jan Beulich wrote:
On 27.02.15 at 15:54, dario.faggi...@citrix.com wrote:
The idea is that, whether the mask is full because no one touched this
default, or because it has been manually set like that, there is nothing
to do at the soft affinity balancing
On 03/03/15 20:29, Konrad Rzeszutek Wilk wrote:
On Tue, Mar 03, 2015 at 03:20:41PM -0500, Konrad Rzeszutek Wilk wrote:
Most of the APIC code that use APIC_LDR is not used on
64-bit. On 32-bit it is bit of an hack - and the mechanism
it is uses is to setup the APIC_LDR via apci-init_apic_ldr
flight 35819 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35819/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 5 xen-boot fail REGR. vs. 35572
Regressions which
On Wed, 2015-03-04 at 09:56 +, David Vrabel wrote:
On 04/03/15 09:48, Ian Campbell wrote:
On Tue, 2015-03-03 at 16:26 +, David Vrabel wrote:
Every time a VIF is destroyed up-to 256 pages may be leaked if packets
with more than MAX_SKB_FRAGS frags where transmitted from the guest.
On Wed, 2015-03-04 at 09:04 +0800, Chao Peng wrote:
On Tue, Mar 03, 2015 at 10:09:39AM +, Ian Campbell wrote:
On Tue, 2015-03-03 at 16:00 +0800, Chao Peng wrote:
On Mon, Mar 02, 2015 at 01:48:43PM +, Ian Campbell wrote:
On Thu, 2015-02-26 at 16:45 +0800, Chao Peng wrote:
Add
On Wed, 2015-03-04 at 09:42 +, Jan Beulich wrote:
On 04.03.15 at 10:35, ian.campb...@citrix.com wrote:
On Wed, 2015-03-04 at 08:58 +, Jan Beulich wrote:
On 03.03.15 at 11:32, jgr...@suse.com wrote:
On 03/03/2015 11:27 AM, Jan Beulich wrote:
On 03.03.15 at 10:29,
On Wed, 4 Mar 2015, Gordan Bobic wrote:
Stefano,
Many thanks for responding to this. Resplies inline below.
On 2015-03-04 10:11, Stefano Stabellini wrote:
On Tue, 3 Mar 2015, Gordan Bobic wrote:
Hi,
I've been looking into custom e820 maps for domUs again, and
found that
On 04/03/15 18:32, Tao Chen wrote:
Defined the string of {xen-pvscsi: } as DRV_PFX, then use it in the pr
sentences and DPRINTK.
Also fixed up some comments just as eliminate redundant white spaces and
format the code.
These will make the code easier to read.
I have already said you needed
On 03.03.15 at 11:32, jgr...@suse.com wrote:
On 03/03/2015 11:27 AM, Jan Beulich wrote:
On 03.03.15 at 10:29, jgr...@suse.com.non-mime.internet wrote:
In order to indicate the Xen tools capability to support the virtual
mapped linear p2m list instead the 3 level mfn tree add a flag to the
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
On x86, for the pages mapped with PAGE_HYPERVISOR attribute
non-leaf page tables are allocated with valid pte entries.
and with MAP_SMALL_PAGES attribute only non-leaf page tables are
allocated with invalid (valid bit set to 0) pte entries.
As pointed out in the discussion of the patch at
http://lists.xenproject.org/archives/html/xen-devel/2015-02/msg03256.html
generalizing the conditions here means code elsewhere doesn't need to
take into consideration internals of how load balancing in the credit
scheduler works.
Signed-off-by:
On Wed, 2015-03-04 at 08:17 +, Jan Beulich wrote:
On 04.03.15 at 04:26, ian.jack...@eu.citrix.com wrote:
flight 35810 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35810/
Regressions :-(
Tests which did not succeed and are blocking,
including
Stefano,
Many thanks for responding to this. Resplies inline below.
On 2015-03-04 10:11, Stefano Stabellini wrote:
On Tue, 3 Mar 2015, Gordan Bobic wrote:
Hi,
I've been looking into custom e820 maps for domUs again, and
found that functionality to provide QEMU with hints regarding
e820
-Original Message-
From: Wei Liu [mailto:wei.l...@citrix.com]
Sent: Tuesday, February 17, 2015 6:47 PM
To: Hu, Robert
Cc: Wei Liu; Ian Jackson; xen-devel@lists.xen.org; jfeh...@suse.com;
ian.campb...@citrix.com; Pang, LongtaoX
Subject: Re: [PATCH OSSTEST 11/12] Changes on test
... making more obvious what its so far open coded users intend.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -310,7 +310,7 @@ void free_vcpu_guest_context(struct vcpu
{
if ( !per_cpu(vgc_pages[i], cpu) )
Hi Jan,
I am sorry, But had the impression you were somehow the owner of these
feature. My mistake.
I understand the feature is in preview, But are you feeling intense
presure when I ask for some status every 2 months? :-))
BR,
Jeroen
Jan Beulich schreef op 27-2-2015 om 09:08:
On
Defined the string of {xen-pvscsi: } as DRV_PFX, then use it in the pr
sentences and DPRINTK.
Also fixed up some comments just as eliminate redundant white spaces and format
the code.
These will make the code easier to read.
Signed-off-by: Tao Chen boby.c...@huawei.com
---
On Wed, 2015-03-04 at 11:20 +0100, Juergen Gross wrote:
On 03/04/2015 11:06 AM, Ian Campbell wrote:
On Wed, 2015-03-04 at 09:42 +, Jan Beulich wrote:
On 04.03.15 at 10:35, ian.campb...@citrix.com wrote:
On Wed, 2015-03-04 at 08:58 +, Jan Beulich wrote:
On 03.03.15 at 11:32,
On 04/03/15 10:20, Juergen Gross wrote:
I could, of course, wait with the flag bit until xl is ready and post
another kernel patch then. Unfortunately this would delay Linux support
for automatically be able to run as a pv-domain 500GB further, so I
strongly recommend accepting the interface
On Wed, 2015-03-04 at 10:50 +, Stefano Stabellini wrote:
On Wed, 4 Mar 2015, Gordan Bobic wrote:
On 2015-03-04 10:33, Stefano Stabellini wrote:
On Wed, 4 Mar 2015, Gordan Bobic wrote:
Stefano,
Many thanks for responding to this. Resplies inline below.
On 2015-03-04
On Tue, 2015-03-03 at 09:12 +, Jan Beulich wrote:
On 03.03.15 at 04:15, dario.faggi...@citrix.com wrote:
On Sun, 2015-02-08 at 17:45 -1000, Justin T. Weaver wrote:
+#define csched2_cpumask cpumask[smp_processor_id()]
+
I like the idea, but put the right side between parentheses.
On Wed, 2015-03-04 at 10:38 +, Gordan Bobic wrote:
I don't follow you here: what is the etc/e820 interface?
See the 2nd patch I mentioned above, which supposedly
adds etc/e820 fw_cfg file (whatever that means).
The problem here is that hvmloader controls and can make modifications
to
On 03/04/2015 11:59 AM, David Vrabel wrote:
On 04/03/15 10:20, Juergen Gross wrote:
I could, of course, wait with the flag bit until xl is ready and post
another kernel patch then. Unfortunately this would delay Linux support
for automatically be able to run as a pv-domain 500GB further, so I
At 10:52 + on 04 Mar (1425462776), Ian Campbell wrote:
On Wed, 2015-03-04 at 11:20 +0100, Juergen Gross wrote:
I'd like to do an appropriate change in xl, but I've been told this
would make sense only for migration protocol V2. OTOH I don't want to
wait for an undefined amount of time
On Wed, 2015-03-04 at 09:16 +, Jan Beulich wrote:
--- a/xen/common/sched_credit.c
+++ b/xen/common/sched_credit.c
@@ -292,11 +292,9 @@ __runq_remove(struct csched_vcpu *svc)
static inline int __vcpu_has_soft_affinity(const struct vcpu *vc,
On 2015-03-04 10:33, Stefano Stabellini wrote:
On Wed, 4 Mar 2015, Gordan Bobic wrote:
Stefano,
Many thanks for responding to this. Resplies inline below.
On 2015-03-04 10:11, Stefano Stabellini wrote:
On Tue, 3 Mar 2015, Gordan Bobic wrote:
Hi,
I've been looking into custom e820 maps
On 04/03/15 11:09, Juergen Gross wrote:
On 03/04/2015 11:59 AM, David Vrabel wrote:
On 04/03/15 10:20, Juergen Gross wrote:
I could, of course, wait with the flag bit until xl is ready and post
another kernel patch then. Unfortunately this would delay Linux support
for automatically be able
On Tue, Mar 3, 2015 at 5:02 PM, Ian Campbell ian.campb...@citrix.com wrote:
libxl is intended to be an LGPL 2.1 licensed library, however this
file inadvertently got given a GPL header.
The following people have touched this file, although all but Machon's
contributions are trivial and/or
Every time a VIF is destroyed up to 256 pages may be leaked if packets
with more than MAX_SKB_FRAGS frags were transmitted from the guest.
Even worse, if another user of ballooned pages allocated one of these
ballooned pages it would not handle the unexpectedly 1 page count
(e.g., gntdev would
A couple of bug fixes for netback:
- make ethool stats to report the correct values.
- don't leak 1 MiB every time a VIF is destroyed.
Changes in v2:
- Split 2nd patch into leak fix and refactor patches
David
___
Xen-devel mailing list
When handling a from-guest frag list, xenvif_handle_frag_list()
replaces the frags before calling the destructor to clean up the
original (foreign) frags. Whilst this is safe (the destructor doesn't
actually use the frags), it looks odd.
Reorder the function to be less confusing.
Signed-off-by:
Use correct pointer arithmetic to get the pointer to each stat.
Signed-off-by: David Vrabel david.vra...@citrix.com
---
drivers/net/xen-netback/interface.c |3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/net/xen-netback/interface.c
On Tue, 3 Mar 2015, Stefano Stabellini wrote:
On Mon, 2 Mar 2015, vijay.kil...@gmail.com wrote:
@@ -94,19 +95,29 @@ static int __vgic_v3_rdistr_rd_mmio_read(struct vcpu
*v, mmio_info_t *info,
switch ( gicr_reg )
{
case GICR_CTLR:
-/* We have not implemented
On Wed, 2015-03-04 at 15:41 +0100, Juergen Gross wrote:
On 03/04/2015 03:29 PM, Ian Campbell wrote:
On Wed, 2015-03-04 at 14:19 +, David Vrabel wrote:
On 04/03/15 14:09, Juergen Gross wrote:
The main question whether it is worth to consider this alternative is
the performance
flight 35854 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35854/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 33866
On Tue, Mar 03, 2015 at 02:31:51PM -0800, Paul E. McKenney wrote:
On Tue, Mar 03, 2015 at 05:06:50PM -0500, Boris Ostrovsky wrote:
On 03/03/2015 04:26 PM, Paul E. McKenney wrote:
On Tue, Mar 03, 2015 at 03:13:07PM -0500, Boris Ostrovsky wrote:
On 03/03/2015 02:42 PM, Paul E. McKenney wrote:
On 04.03.15 at 12:03, dario.faggi...@citrix.com wrote:
I see the point you're making, and I can live with _choose_cpu(), but
the result would look a bit inconsistent, IMO.
I'm tempted to ask for a cleanup patch then.
Jan
___
Xen-devel mailing list
Hello.
On 3/3/2015 7:26 PM, David Vrabel wrote:
Use correct pointer arithmetic to get the pointer to each stat.
Signed-off-by: David Vrabel david.vra...@citrix.com
---
drivers/net/xen-netback/interface.c |3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git
On 04.03.15 at 13:08, dario.faggi...@citrix.com wrote:
On Wed, 2015-03-04 at 09:16 +, Jan Beulich wrote:
--- a/xen/common/sched_credit.c
+++ b/xen/common/sched_credit.c
@@ -292,11 +292,9 @@ __runq_remove(struct csched_vcpu *svc)
static inline int __vcpu_has_soft_affinity(const struct
On 03/02/2015 12:39 PM, David Vrabel wrote:
On 26/02/15 13:35, Juergen Gross wrote:
Introduces the Xen pvUSB backend. With pvUSB it is possible for a Xen
domU to communicate with a USB device assigned to that domU. The
communication is all done via the pvUSB backend in a driver domain
(usually
On Wed, 2015-03-04 at 12:27 +, Julien Grall wrote:
Hi Ian,
On 04/03/15 09:07, Ian Campbell wrote:
On Tue, 2015-03-03 at 19:41 +, Julien Grall wrote:
python-dev is not installed. Although I have libpython-dev installed.
And this used to work I suppose?
As I said in
On 04/03/15 12:35, Ian Campbell wrote:
On Wed, 2015-03-04 at 12:27 +, Julien Grall wrote:
Hi Ian,
On 04/03/15 09:07, Ian Campbell wrote:
On Tue, 2015-03-03 at 19:41 +, Julien Grall wrote:
python-dev is not installed. Although I have libpython-dev installed.
And this used to work I
On Wed, 2015-03-04 at 12:47 +, Julien Grall wrote:
On 04/03/15 12:35, Ian Campbell wrote:
On Wed, 2015-03-04 at 12:27 +, Julien Grall wrote:
Hi Ian,
On 04/03/15 09:07, Ian Campbell wrote:
On Tue, 2015-03-03 at 19:41 +, Julien Grall wrote:
python-dev is not installed.
On Wed, 2015-03-04 at 12:50 +, Jan Beulich wrote:
On 04.03.15 at 12:03, dario.faggi...@citrix.com wrote:
I see the point you're making, and I can live with _choose_cpu(), but
the result would look a bit inconsistent, IMO.
I'm tempted to ask for a cleanup patch then.
Yep, and I'd be
El 04/03/15 a les 14.00, Ian Campbell ha escrit:
On Wed, 2015-03-04 at 12:47 +, Julien Grall wrote:
On 04/03/15 12:35, Ian Campbell wrote:
On Wed, 2015-03-04 at 12:27 +, Julien Grall wrote:
Hi Ian,
On 04/03/15 09:07, Ian Campbell wrote:
On Tue, 2015-03-03 at 19:41 +, Julien
On 04/03/15 14:09, Juergen Gross wrote:
The main question whether it is worth to consider this alternative is
the performance aspect. Does anyone have an idea which USB devices would
typically be used via pvusb? I'd suspect memory sticks and USB disks
and perhaps webcams being the most
On 04/03/15 13:31, Juergen Gross wrote:
On 03/02/2015 12:39 PM, David Vrabel wrote:
On 26/02/15 13:35, Juergen Gross wrote:
Introduces the Xen pvUSB backend. With pvUSB it is possible for a Xen
domU to communicate with a USB device assigned to that domU. The
communication is all done via the
On Wed, 2015-03-04 at 15:02 +0100, Roger Pau Monné wrote:
Yes, I think so, for python versions 2.4 we should require
python-config.
ACK.
IMHO python_fortify_noopt.m4 should also be fixed to deal
with older python version that don't have python-config.
That would be ideal, but unless
On 03/04/2015 02:53 PM, David Vrabel wrote:
On 04/03/15 13:31, Juergen Gross wrote:
On 03/02/2015 12:39 PM, David Vrabel wrote:
On 26/02/15 13:35, Juergen Gross wrote:
Introduces the Xen pvUSB backend. With pvUSB it is possible for a Xen
domU to communicate with a USB device assigned to that
1 - 100 of 105 matches
Mail list logo