On Mon, 2015-06-01 at 14:20 -0700, Roy Franz wrote:
On Mon, Jun 1, 2015 at 4:24 AM, Ian Campbell ian.campb...@citrix.com wrote:
On Mon, 2015-06-01 at 12:10 +0100, Jan Beulich wrote:
On 01.06.15 at 12:17, ross.lagerw...@citrix.com wrote:
If calling ExitBootServices() fails, the required
After the first call to ExitBootServices(), avoid calling any boot
services by setting setting efi_bs to NULL and halting in blexit().
Signed-off-by: Ross Lagerwall ross.lagerw...@citrix.com
---
* Separated halt into an arch hook.
* Applies on top of the first patch from v3.
* Tested on x86, not
On 06/02/2015 05:38 PM, Wen Congyang wrote:
On 06/02/2015 05:26 PM, Yang Hongyang wrote:
[...]
+int libxl__qmp_restore(libxl__gc *gc, int domid, const char *state_file)
+{
+libxl__json_object *args = NULL;
+
+qmp_parameters_add_string(gc, args, filename, state_file);
+
+return
To do this, we create a new list that holds, for each
vcpu, the time least into the future that it may need to be
rescheduled. The scheduler chooses the lowest time off of this
list and waits until the specified time instead of running every
1 ms as it did before.
Signed-off-by: Dagaen Golomb
On Mon, 2015-06-01 at 15:57 -0700, Manish Jaggi wrote:
Anyway, the general shape of this plan seems plausible enough.
Could you modify the http://xenbits.xen.org/people/ianc/vits/draftC.html(5
vITS to pITS mapping) based on this approach
I'm updating things as I go and feed back will be
On 02/06/15 03:27, osstest service user wrote:
flight 57712 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57712/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-cubietruck 15
On 02.06.15 at 19:41, liang.z...@intel.com wrote:
@@ -1074,6 +1075,9 @@ void ept_sync_domain(struct p2m_domain *p2m)
if ( !paging_mode_hap(d) || !d-vcpu || !d-vcpu[0] )
return;
+if ( nestedhvm_enabled(d) )
+p2m_flush_nestedp2m(d);
+
On Tue, Jun 02, 2015 at 07:57:55AM +0100, Jan Beulich wrote:
On 02.06.15 at 08:35, chao.p.p...@linux.intel.com wrote:
On Fri, May 29, 2015 at 09:52:03AM +0100, Jan Beulich wrote:
On 29.05.15 at 10:28, chao.p.p...@linux.intel.com wrote:
On Fri, May 29, 2015 at 09:01:53AM +0100, Jan
All,
I am pretty new to xen . I am trying to boot DOMU with qemu qcow AARCH64
Ubuntu 15.04 disk on Xen but I am getting the errors which link to
/usr/local/lib/xen/bin/qemu-system-i386.
Since I am working on aarch64 system the
/usr/local/lib/xen/bin/qemu-system-i386 bin might not be present or
On 06/02/2015 05:26 PM, Yang Hongyang wrote:
Secondary vm is running in colo mode. So we will do
the following things again and again:
1. suspend both primay vm and secondary vm
2. sync the state
3. resume both primary vm and secondary vm
We will send qemu's state each time in step2, and
On 02.06.2015 09:40, Sanjeev Pandita wrote:
All,
I am pretty new to xen . I am trying to boot DOMU with qemu qcow AARCH64
Ubuntu 15.04 disk on Xen but I am getting the errors which link to
/usr/local/lib/xen/bin/qemu-system-i386.
Since I am working on aarch64 system the
From: Wen Congyang we...@cn.fujitsu.com
Currently, all callbacks return an integer value or void. We cannot
return some data to xc via callback. Update libxl_save_msgs_gen.pl
to support this case.
Signed-off-by: Wen Congyang we...@cn.fujitsu.com
---
tools/libxl/libxl_internal.h | 3 ++
This patch is auto generated by the following commands:
1. git mv tools/libxl/libxl_remus_device.c
tools/libxl/libxl_checkpoint_device.c
2. perl -pi -e 's/libxl_remus_device/libxl_checkpoint_device/g'
tools/libxl/Makefile
3. perl -pi -e 's/\blibxl__remus_devices/libxl__checkpoint_devices/g'
When we are under COLO, we will send dirty page bitmap info from
secondary to primary at every checkpoint. So we need to get/test
the dirty page bitmap. We just expose xc_bitops.h for libxl use.
NOTE:
Need to make clean and rerun configure to get it compiled.
Signed-off-by: Yang Hongyang
Checkpoint device is an abstract layer to do checkpoint.
COLO can also use it to do checkpoint. But there are
still some codes in checkpoint device which touch remus:
1. remus_ops: we use remus ops directly in checkpoint
device. Store it in checkpoint device state.
2. concrete layer's private
Secondary vm is running in colo mode. So we will do
the following things again and again:
1. suspend both primay vm and secondary vm
2. sync the state
3. resume both primary vm and secondary vm
We will send qemu's state each time in step2, and
slave's qemu should read it each time before resuming
ioreq page contains evtchn which will be set when we resume the
secondary vm the first time. The hypervisor will check if the
evtchn is corrupted, so we cannot zero the ioreq page more
than one time.
The ioreq-state is always STATE_IOREQ_NONE after the vm is
suspended, so it is OK if we only zero
This is just tidying up after the previous automatic renaming.
Signed-off-by: Yang Hongyang yan...@cn.fujitsu.com
Signed-off-by: Wen Congyang we...@cn.fujitsu.com
---
tools/libxl/libxl_checkpoint_device.c | 21 +++--
tools/libxl/libxl_internal.h | 19 +++
Currently, libxl__domain_unpause() only supports
qemu-xen-traditional. Update it to support qemu-xen.
Signed-off-by: Wen Congyang we...@cn.fujitsu.com
Signed-off-by: Yang Hongyang yan...@cn.fujitsu.com
---
tools/libxl/libxl.c | 42 +-
1 file changed, 33
From: Wen Congyang we...@cn.fujitsu.com
The guest is paused after libxl_domain_create_restore().
Secondary vm is running in colo mode. So we need to unpause
the guest. The current API libxl_domain_unpause() is
not an internal API. Introduce a new API to support it.
No functional change.
This patchset is Prerequisite for COLO feature. For what COLO is, refer
to http://wiki.xen.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping
This patchset is based on:
[PATCH v1 0/5] Misc cleanups for libxl
http://lists.xenproject.org/archives/html/xen-devel/2015-05/msg02591.html
and is taken from
Secondary vm is running in colo mode, we need to send
secondary vm's dirty page information to master at checkpoint,
so we have to enable qemu logdirty on secondary.
libxl__domain_suspend_common_switch_qemu_logdirty() is to enable
qemu logdirty. But it uses domain_save_state, and calls
From: Wen Congyang we...@cn.fujitsu.com
For PVHVM, the hypercall return code is 0, and it can be resumed
in a new domain context.
we suspend PVHVM and resume it is like this:
1. suspend it via evtchn
2. modifty the return code to 1
3. the guest know that the suspend is cancelled, we will use fast
From: Wen Congyang we...@cn.fujitsu.com
In colo mode, slave needs to send data to master, but the io_fd
only can be written in master, and only can be read in slave.
Save recv_fd in domain_suspend_state, and send_fd in
domain_create_state.
Signed-off-by: Wen Congyang we...@cn.fujitsu.com
On 02.06.15 at 08:35, chao.p.p...@linux.intel.com wrote:
On Fri, May 29, 2015 at 09:52:03AM +0100, Jan Beulich wrote:
On 29.05.15 at 10:28, chao.p.p...@linux.intel.com wrote:
On Fri, May 29, 2015 at 09:01:53AM +0100, Jan Beulich wrote:
On 29.05.15 at 04:35, chao.p.p...@linux.intel.com
If the host EPT entry is changed, the nested EPT should be updated.
The current code does not do this, and it's wrong.
Reported-by: Tim Deegan t...@xen.org
Signed-off-by: Liang Li liang.z...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
---
xen/arch/x86/mm/p2m-ept.c | 4
1 file
flight 57731 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57731/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 6 xen-boot fail REGR. vs. 57516
On Mon, 2015-06-01 at 16:29 +0100, Julien Grall wrote:
On 01/06/15 14:12, Ian Campbell wrote:
On Fri, 2015-05-29 at 14:40 +0100, Julien Grall wrote:
Hi Ian,
Hi Ian,
NIT: You used my Linaro email which I think is de-activated now :).
I keep finding new address books with that
On Mon, 1 Jun 2015, Jiang Liu wrote:
diff --git a/arch/x86/kernel/apic/vector.c b/arch/x86/kernel/apic/vector.c
index 9b62f690b0ff..dfa3a5f5b3d3 100644
--- a/arch/x86/kernel/apic/vector.c
+++ b/arch/x86/kernel/apic/vector.c
@@ -494,9 +494,8 @@ static int apic_set_affinity(struct irq_data
flight 57749 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57749/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 3 host-install(3) broken in 57680 REGR. vs. 53768
From: Elena Ufimtseva elena.ufimts...@oracle.com
Signed-off-by: Elena Ufimtseva elena.ufimts...@oracle.com
---
xen/include/xen/pci.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h
index 3908146..414106a 100644
--- a/xen/include/xen/pci.h
+++
From: Elena Ufimtseva elena.ufimts...@oracle.com
v7 of rmrr comman line patches.
Thank you for comments on v6.
Add Xen command line option rmrr to specify RMRR
regions for devices that are not defined
From: Elena Ufimtseva elena.ufimts...@oracle.com
Third attempt to incorporate memory leak fix.
Thanks for comment on v2.
Release memory allocated for scope.devices when disabling
dmar units. Also set device count after memory allocation when
device scope parsing.
Changes in v3:
- make freeing
flight 57755 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57755/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 12 guest-localmigrate fail never
pass
On Mon, 1 Jun 2015 10:22:24 -0400 Dan Streetman ddstr...@ieee.org wrote:
Change frontswap single pointer to a singly linked list of frontswap
implementations. Update Xen tmem implementation as register no longer
returns anything.
Frontswap only keeps track of a single implementation; any
From: Elena Ufimtseva elena.ufimts...@oracle.com
From: Elena Ufimtseva elena.ufimts...@oracle.com
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH mode.
New Xen command line
From: Elena Ufimtseva elena.ufimts...@oracle.com
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
Signed-off-by: Elena Ufimtseva elena.ufimts...@oracle.com
---
On 06/02/2015 11:49 PM, Ian Campbell wrote:
On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote:
[...]
So here is a proof of concept patch to record and honour that value
during migration. A new field is added in IDL. Note that we don't
provide xl level config option for it and mandate it to be
On Tue, 2 Jun 2015 18:08:46 -0400 Dan Streetman ddstr...@ieee.org wrote:
Change frontswap single pointer to a singly linked list of frontswap
implementations. Update Xen tmem implementation as register no longer
returns anything.
Frontswap only keeps track of a single implementation; any
On Tue, Jun 2, 2015 at 5:06 PM, Andrew Morton a...@linux-foundation.org wrote:
On Mon, 1 Jun 2015 10:22:24 -0400 Dan Streetman ddstr...@ieee.org wrote:
Change frontswap single pointer to a singly linked list of frontswap
implementations. Update Xen tmem implementation as register no longer
Change frontswap single pointer to a singly linked list of frontswap
implementations. Update Xen tmem implementation as register no longer
returns anything.
Frontswap only keeps track of a single implementation; any implementation
that registers second (or later) will replace the previously
On 06/03/2015 12:22 AM, Yang Hongyang wrote:
On 06/02/2015 10:48 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
move toolstack code into libxl_toolstack.c
It's not clear to me what toolstack code is here, the whole of libxl
and xl is toolstack code.
Is
flight 57781 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57781/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-winxpsp3 16 guest-stop fail REGR. vs. 53018
On 2015/6/3 0:36, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:08PM +0800, Tiejun Chen wrote:
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning devices to a VM.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
+=item Brdm= RDM_RESERVE_STRING
Stray space after before and after RDM_RESERVE_STRING.
Sure,
=item Brdm=RDM_RESERVE_STRING
+
+(HVM/x86 only) Specifies the information about Reserved Device Memory (RDM),
+which is necessary to enable robust device passthrough usage. One example of
On 2015/6/3 3:19, Thomas Gleixner wrote:
On Mon, 1 Jun 2015, Jiang Liu wrote:
diff --git a/arch/x86/kernel/apic/vector.c b/arch/x86/kernel/apic/vector.c
index 9b62f690b0ff..dfa3a5f5b3d3 100644
--- a/arch/x86/kernel/apic/vector.c
+++ b/arch/x86/kernel/apic/vector.c
@@ -494,9 +494,8 @@
On 2015/6/3 0:29, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:04PM +0800, Tiejun Chen wrote:
While building a VM, HVM domain builder provides struct hvm_info_table{}
to help hvmloader. Currently it includes two fields to construct guest
e820 table by hvmloader, low_mem_pgend and
Use access helper irq_data_get_affinity_mask() to hide implementation
details of struct irq_desc.
Signed-off-by: Jiang Liu jiang@linux.intel.com
---
Hi Thomas,
This version changes the patch to correctly support bisecting.
Thanks!
Gerry
---
arch/x86/kernel/apic/io_apic.c |2 +-
This is the xc/xl changes to support Intel Cache Allocation
Technology(CAT).
'xl psr-hwinfo' is updated to show CAT info and two new commands
for CAT are introduced:
- xl psr-cat-cbm-set [-s socket] domain cbm
Set cache capacity bitmasks(CBM) for a domain.
- xl psr-cat-show domain
Show CAT
Detect Intel Cache Allocation Technology(CAT) feature and store the
cpuid information for later use. Currently only L3 cache allocation is
supported. The L3 CAT features may vary among sockets so per-socket
feature information is stored. The initialization can happen either at
boot time or when
Add xsm policies for Cache Allocation Technology(CAT) related hypercalls
to restrict the functions visibility to control domain only.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov
---
tools/flask/policy/policy/modules/xen/xen.if | 2 +-
Add document to introduce basic concepts and terms in PSR family
technologies and the xl interfaces.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
Changes in v7:
* Correct 'xl psr-hwinfo'.
Changes in v6:
* Address comments from Ian.
For CAT, COS is maintained in hypervisor only while CBM is exposed to
user space directly to allow getting/setting domain's cache capacity.
For each specified CBM, hypervisor will either use a existed COS which
has the same CBM or allocate a new one if the same CBM is not found. If
the allocation
Maintain socket_cpumask which contains all the HT and core siblings
in the same socket.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
Changes in v9:
* Add comments for set_nr_sockets.
* Move set_nr_sockets() invocation from __start_xen() to smp_prepare_cpus().
Changes in v8:
* Remove
For each socket, a COS to CBM mapping structure is maintained for each
COS. The mapping is indexed by COS and the value is the corresponding
CBM. Different VMs may use the same CBM, a reference count is used to
indicate if the CBM is available.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
In Xen's implementation, the CAT enforcement granularity is per domain.
Due to the length of CBM and the number of COS may be socket-different,
each domain has COS ID for each socket. The domain get COS=0 by default
and at runtime its COS is then allocated dynamically when user specifies
a CBM for
General CAT information such as maximum COS and CBM length are exposed to
user space by a SYSCTL hypercall, to help user space to construct the CBM.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
Changes in v9:
* Initialize 'info'
Changes in v9:
Address comments from Jan, mainly:
* Move set_nr_sockets() invocation from __start_xen() to smp_prepare_cpus().
* Add check for cpuid_level.
* Add priority for cpu notifier.
* Allocate cos_to_cbm with opt_cos_max instead of the actual cos_max from cpuid.
* Move CAT initialization
On context switch, write the the domain's Class of Service(COS) to MSR
IA32_PQR_ASSOC, to notify hardware to use the new COS.
For performance reason, the COS mask for current cpu is also cached in
the local per-CPU variable.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Jan
Add libxl_socket_bitmap_alloc() to allow allocating a socket specific
libxl_bitmap (as it is for cpu/node bitmap).
Internal function libxl__count_physical_sockets() is introduced together
to get the socket count when the size of bitmap is not specified.
Signed-off-by: Chao Peng
Add dedicated one to show hardware information.
[root@vmm-psr]xl psr-hwinfo
Cache Monitoring Technology (CMT):
Enabled : 1
Total RMID : 63
Supported monitor types:
cache-occupancy
total-mem-bandwidth
local-mem-bandwidth
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
This is a pre-patch for multi-page ring feature.
In connect_ring, we can know exactly how many pages are used for the shared
ring, delay pending_req allocation here so that we won't waste too much memory.
Signed-off-by: Bob Liu bob@oracle.com
---
drivers/block/xen-blkback/common.h |2 +-
The major responsibility of talk_to_blkback() is allocate and initialize
the request ring and write the ring info to xenstore.
But this work should be done after backend entered 'XenbusStateInitWait' as
defined in the protocol file.
See xen/include/public/io/blkif.h in XEN git tree:
Front
Extend xen/block to support multi-page ring, so that more requests can be
issued by using more than one pages as the request ring between blkfront
and backend.
As a result, the performance can get improved significantly.
We got some impressive improvements on our highend iscsi storage cluster
On 02.06.2015 12:35, Stefano Stabellini wrote:
On Tue, 2 Jun 2015, Stefano Stabellini wrote:
On Tue, 2 Jun 2015, Stefan Bader wrote:
On 02.06.2015 09:40, Sanjeev Pandita wrote:
All,
I am pretty new to xen . I am trying to boot DOMU with qemu qcow AARCH64
Ubuntu 15.04 disk on Xen but I am
On 02/06/15 10:26, Yang Hongyang wrote:
When we are under COLO, we will send dirty page bitmap info from
secondary to primary at every checkpoint. So we need to get/test
the dirty page bitmap. We just expose xc_bitops.h for libxl use.
NOTE:
Need to make clean and rerun configure to get it
Hi Eric
Sorry for coming late to the discussion.
On Thu, Apr 16, 2015 at 05:42:16AM -0700, Eric Dumazet wrote:
On Thu, 2015-04-16 at 11:01 +0100, George Dunlap wrote:
He suggested that after he'd been prodded by 4 more e-mails in which two
of us guessed what he was trying to get at.
On Tue, 2015-06-02 at 11:46 +0100, Julien Grall wrote:
Hi Ian,
On 01/06/15 14:36, Ian Campbell wrote:
On Fri, 2015-05-29 at 15:06 +0100, Julien Grall wrote:
Hi Vijay,
On 27/05/15 17:44, Vijay Kilari wrote:
## Command Translation
Of the existing GICv3 ITS commands, `MAPC`, `MAPD`,
On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
On 01/06/15 16:43, Ross Lagerwall wrote:
On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing
On Tue, 2 Jun 2015, Stefan Bader wrote:
On 02.06.2015 09:40, Sanjeev Pandita wrote:
All,
I am pretty new to xen . I am trying to boot DOMU with qemu qcow AARCH64
Ubuntu 15.04 disk on Xen but I am getting the errors which link to
/usr/local/lib/xen/bin/qemu-system-i386.
Since I am
On Tue, 2 Jun 2015, Stefan Bader wrote:
On 02.06.2015 12:35, Stefano Stabellini wrote:
On Tue, 2 Jun 2015, Stefano Stabellini wrote:
On Tue, 2 Jun 2015, Stefan Bader wrote:
On 02.06.2015 09:40, Sanjeev Pandita wrote:
All,
I am pretty new to xen . I am trying to boot DOMU with qemu
Hi Ian,
On 01/06/15 14:36, Ian Campbell wrote:
On Fri, 2015-05-29 at 15:06 +0100, Julien Grall wrote:
Hi Vijay,
On 27/05/15 17:44, Vijay Kilari wrote:
## Command Translation
Of the existing GICv3 ITS commands, `MAPC`, `MAPD`, `MAPVI`/`MAPI` are
potentially time consuming commands as these
On 06/02/2015 06:16 PM, Andrew Cooper wrote:
On 02/06/15 10:26, Yang Hongyang wrote:
ioreq page contains evtchn which will be set when we resume the
secondary vm the first time. The hypervisor will check if the
evtchn is corrupted, so we cannot zero the ioreq page more
than one time.
The
While investigating a separate issue on Broadwell hardware, we encountered a
cascade crash, with 3 indepent issues. For anyone interested, the full
backtrace was:
(XEN) Xen SMAP violation
(XEN) [ Xen-4.5.0-xs101665-d x86_64 debug=y Not tainted ]
(XEN) CPU:15
(XEN) RIP:
'n % BYTES_PER_LONG' is at most 7, and doesn't need a 64bit register mov.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
---
Admittedly very trivial, but no need to be wasteful
---
xen/arch/x86/string.c |2 +-
1 file changed, 1 insertion(+), 1
__stop_this_cpu() may reset the LAPIC mode back from x2apic to xapic, but will
leave x2apic_enabled alone. This may cause disconnect_bsp_APIC() in
disable_IO_APIC() to suffer a #GP fault.
Disabling the LAPIC can safely be deferred to being the last action.
Signed-off-by: Andrew Cooper
Experimentally, this can result in memory allocation, and in particular a
failed assertion that interrupts are enabled when performing a TLB flush.
(XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:223
snip
(XEN) [82d08018a0d3] flush_area_mask+0x7/0x134
(XEN) [82d08011f7c6]
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
@@ -1762,16 +1762,18 @@ static void libxl__domain_suspend_callback(void *data)
{
libxl__save_helper_state *shs = data;
libxl__egc *egc = shs-egc;
-libxl__domain_suspend_state *dss = CONTAINER_OF(shs, *dss, shs);
+
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
move domain suspend codes into a separate file libxl_dom_suspend.c
Just code.
Signed-off-by: Yang Hongyang yan...@cn.fujitsu.com
Acked-by: Ian Campbell ian.campb...@citrix.com
___
Xen-devel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-4105 / XSA-130
version 2
Guest triggerable qemu MSI-X pass-through error messages
UPDATES IN VERSION 2
Public release.
CVE assigned.
ISSUE
Previous discussion at [0].
For the benefit of discussion, we refer to max_memkb inside hypervisor
as hv_max_memkb (name subject to improvement). That's the maximum number
of memory a domain can use.
Libxl doesn't know hv_max_memkb for a domain needs prior to QEMU start-up
because of optional
On Tue, 2 Jun 2015, Sanjeev Pandita wrote:
From: Stefan Bader [mailto:stefan.ba...@canonical.com]
Sent: Tuesday, June 02, 2015 1:52 PM
To: Sanjeev Pandita; xen-devel@lists.xen.org
Cc: ian.campb...@citrix.com; Pranavkumar Sawargaonkar;
stefano.stabell...@eu.citrix.com
Subject: Re: [Xen-devel]
On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote:
On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
On 01/06/15 16:43, Ross Lagerwall wrote:
On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
On Fri, May 29,
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
move toolstack code into libxl_toolstack.c
It's not clear to me what toolstack code is here, the whole of libxl
and xl is toolstack code.
Is the code being moved stuff to do with adding toolstack state to the
save stream? Perhaps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-4106 / XSA-131
version 3
Unmediated PCI register access in qemu
UPDATES IN VERSION 3
Public release.
CVE assigned.
ISSUE DESCRIPTION
Using gdbsx on Broadwell systems suffers a SMAP violation because
dbg_rw_guest_mem() uses memcpy() with a userspace pointer.
The functions dbg_rw_mem() and dbg_rw_guest_mem() have been updated to pass
'void * __user' pointers which indicates their nature clearly.
Signed-off-by: Andrew Cooper
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-4104 / XSA-129
version 2
PCI MSI mask bits inadvertently exposed to guests
UPDATES IN VERSION 2
Public release.
CVE assigned.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-4103 / XSA-128
version 2
Potential unintended writes to host MSI message data field via qemu
UPDATES IN VERSION 2
Public release.
CVE assigned.
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
move remus codes into libxl_remus.c
code
Apart from dropping some static and adding some prototypes to the
header this is purely motion, correct? (I assume this about the last one
too).
diff --git a/tools/libxl/libxl_internal.h
On 02/06/15 10:26, Yang Hongyang wrote:
ioreq page contains evtchn which will be set when we resume the
secondary vm the first time. The hypervisor will check if the
evtchn is corrupted, so we cannot zero the ioreq page more
than one time.
The ioreq-state is always STATE_IOREQ_NONE after the
On 29.05.15 at 18:32, ian.campb...@citrix.com wrote:
On Wed, 2015-05-27 at 17:04 +0100, Ian Campbell wrote:
Looking at the netback side though it seems like netback_remove is
switching to state=Closed _before_ it calls kobject_uevent(...,
KOBJ_OFFLINE) and it is this which generates the call
On Tue, 2 Jun 2015, Stefano Stabellini wrote:
On Tue, 2 Jun 2015, Stefan Bader wrote:
On 02.06.2015 09:40, Sanjeev Pandita wrote:
All,
I am pretty new to xen . I am trying to boot DOMU with qemu qcow AARCH64
Ubuntu 15.04 disk on Xen but I am getting the errors which link to
I fat-fingered Andrew's email address. Really CC him this time.
On Tue, Jun 02, 2015 at 03:05:07PM +0100, Wei Liu wrote:
Previous discussion at [0].
For the benefit of discussion, we refer to max_memkb inside hypervisor
as hv_max_memkb (name subject to improvement). That's the maximum number
On Tue, Jun 2, 2015 at 7:53 AM, George Dunlap
george.dun...@eu.citrix.com wrote:
On 05/26/2015 01:09 AM, Chong Li wrote:
Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set functions to
support
per-VCPU settings for RTDS scheduler.
Add a new data structure
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
diff --git a/tools/libxl/libxl_internal.h
b/tools/libxl/libxl_internal.h
index f86fc89..b2eeb89 100644
--- a/tools/libxl/libxl_internal.h
+++ b/tools/libxl/libxl_internal.h
@@ -3191,6 +3191,12 @@ _hidden void
On 02.06.15 at 14:47, ross.lagerw...@citrix.com wrote:
+void arch_hvm_load_post(struct domain *d)
+{
+/* Re-enable cache flushes and flush the cache. */
+this_cpu(memory_type_changed_ignore) = 0;
+memory_type_changed(d);
+}
Does this really need to be done unconditionally? I.e.
On 29/05/15 09:31, Jan Beulich wrote:
On 28.05.15 at 18:09, dvra...@cantab.net wrote:
On 28/05/15 15:55, Jan Beulich wrote:
On 26.05.15 at 20:00, david.vra...@citrix.com wrote:
@@ -254,23 +254,23 @@ double_gt_lock(struct grant_table *lgt, struct
grant_table *rgt)
{
if ( lgt rgt )
On 02/06/15 13:47, Ross Lagerwall wrote:
An MTRR record is processed for each vCPU during hvm_load. Each MTRR
record sets several mtrrs, each of which flushes the cache on all pCPUs.
This can take some time and trip the watchdog for HVM guests with many
CPUs.
To fix this, introduce a flag
An MTRR record is processed for each vCPU during hvm_load. Each MTRR
record sets several mtrrs, each of which flushes the cache on all pCPUs.
This can take some time and trip the watchdog for HVM guests with many
CPUs.
To fix this, introduce a flag which prevents flushing the cache on x86
while
On 05/26/2015 01:09 AM, Chong Li wrote:
Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set functions to
support
per-VCPU settings for RTDS scheduler.
Add a new data structure (libxl_vcpu_sched_params) to help per-VCPU settings.
Signed-off-by: Chong Li chong...@wustl.edu
1 - 100 of 195 matches
Mail list logo