On 23 June 2015 at 11:30, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
On Tue, 23 Jun 2015, Peter Maydell wrote:
I'm afraid I can't apply this -- this revert commit is missing a
signed-off-by
line. Can you respin, please?
I thought that being a straight revert, didn't need a
On Tue, 2015-06-23 at 15:52 +0100, Wei Liu wrote:
On Tue, Jun 23, 2015 at 03:45:14PM +0100, Jan Beulich wrote:
On 23.06.15 at 16:16, wei.l...@citrix.com wrote:
This reverts commit f5b43e95facdc17f925cb56a8963cd4531074034.
Even if the patch having introduced the regression this fixed is
1: drop is_pv_32on64_vcpu()
2: drop is_pv_32on64_domain()
3: use is_..._vcpu() instead of open coding it
Some of this extends into common code, hence the wider Cc list.
Signed-off-by: Jan Beulich jbeul...@suse.com
___
Xen-devel mailing list
... as being identical to is_pv_32bit_vcpu() after the x86-32 removal.
In a few cases this includes an additional is_pv_32bit_vcpu() -
is_pv_32bit_domain() conversion.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/cpu/mcheck/mce.c
+++ b/xen/arch/x86/cpu/mcheck/mce.c
@@ -1339,7
On 23/06/15 16:20, Jan Beulich wrote:
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Il 23/06/2015 12:39, Paul Durrant ha scritto:
This patch series re-works much of the code involved in emulation of port
and memory mapped I/O for HVM guests.
The code has become very convoluted and, at least by inspection, certain
emulations will apparently malfunction.
The series is broken
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1851,9 +1851,7 @@ unsigned long paging_gva_to_gfn(struct v
struct p2m_domain *hostp2m = p2m_get_hostp2m(v-domain);
const struct paging_mode *hostmode = paging_get_hostmode(v);
-
* Leaf 0x0007[ECX=0].EAX
* `mask_l7s0_ebx`
Those 'l' look like '1' in the PDF.
Can it be called something else?
If you can suggest a better name, yes. As for now, these are the
variable names used in-tree (top of xen/arch/x86/cpu/amd.c)
low?
* Leaf
... as being identical to is_pv_32bit_domain() after the x86-32
removal.
In a few cases this includes no longer open-coding is_pv_32bit_vcpu().
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -367,7 +367,7 @@ int switch_native(struct
On 23/06/15 16:09, Jan Beulich wrote:
- remove vcpu_info from xlat.lst (it isn't and can't be checked)
- drop pointless (redundant) casts
- make dummy_vcpu_info static
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
On Tue, Jun 23, 2015 at 03:45:14PM +0100, Jan Beulich wrote:
On 23.06.15 at 16:16, wei.l...@citrix.com wrote:
This reverts commit f5b43e95facdc17f925cb56a8963cd4531074034.
Even if the patch having introduced the regression this fixed is
being reverted, it's not clear to me why this change
flight 58833 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58833/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 3 host-install(3) broken in 58584 REGR. vs.
On 23/06/15 16:19, Jan Beulich wrote:
... as being identical to is_pv_32bit_domain() after the x86-32
removal.
In a few cases this includes no longer open-coding is_pv_32bit_vcpu().
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
On 22.06.15 at 18:37, elena.ufimts...@oracle.com wrote:
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -1444,6 +1444,9 @@ const struct hvm_function_table * __init
start_svm(void)
svm_function_table.hap_capabilities = HVM_HAP_SUPERPAGE_2MB |
On 22/06/15 02:20, Bob Liu wrote:
On 06/09/2015 10:07 PM, Roger Pau Monné wrote:
El 09/06/15 a les 15.39, Konrad Rzeszutek Wilk ha escrit:
...
Roger, I put them (patches) on devel/for-jens-4.2 on
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
I think these two patches:
On 23.06.15 at 13:06, konrad.w...@oracle.com wrote:
On June 23, 2015 3:21:17 AM EDT, Jan Beulich jbeul...@suse.com wrote:
On 22.06.15 at 21:31, konrad.w...@oracle.com wrote:
@@ -1804,8 +1804,12 @@ static bool_t pci_cfg_ok(struct domain *
start |= CF8_ADDR_HI(currd-arch.pci_cf8);
On Tue, 23 Jun 2015, Julien Grall wrote:
Hi,
On 23/06/15 15:19, Stefano Stabellini wrote:
diff --git a/arch/arm/xen/enlighten.c b/arch/arm/xen/enlighten.c
index 224081c..dcfe251 100644
--- a/arch/arm/xen/enlighten.c
+++ b/arch/arm/xen/enlighten.c
@@ -93,8 +93,8 @@ static void
There is an issue in libxl_set_memory_target whereby the target and
the max mem can get out of sync, this is because the call the
xc_domain_setmaxmem is not tied in any way to the xenstore transaction
which controls updates to the xenstore side of things.
Consider a domain with 1M of RAM
On 23.06.15 at 12:39, paul.durr...@citrix.com wrote:
...otherwise they will simply carry on to the next page using a normal
linear-to-phys translation.
And what's wrong about this?
--- a/xen/arch/x86/hvm/emulate.c
+++ b/xen/arch/x86/hvm/emulate.c
@@ -586,7 +586,6 @@ static int
Hi Vijay,
On 22/06/15 13:01, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Implements hw_irq_controller api's required
to handle LPI's
This patch doesn't hw_irq_controller for LPI but just hack around the
current GICv3 host hw_irq_controller.
As said on
Hi,
On 23/06/15 15:19, Stefano Stabellini wrote:
diff --git a/arch/arm/xen/enlighten.c b/arch/arm/xen/enlighten.c
index 224081c..dcfe251 100644
--- a/arch/arm/xen/enlighten.c
+++ b/arch/arm/xen/enlighten.c
@@ -93,8 +93,8 @@ static void xen_percpu_init(void)
pr_info(Xen: initializing
- remove vcpu_info from xlat.lst (it isn't and can't be checked)
- drop pointless (redundant) casts
- make dummy_vcpu_info static
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -70,7 +70,7 @@ integer_param(hardware_dom, hardware_d
struct
On 23.06.15 at 16:16, wei.l...@citrix.com wrote:
This reverts commit f5b43e95facdc17f925cb56a8963cd4531074034.
Even if the patch having introduced the regression this fixed is
being reverted, it's not clear to me why this change needs to be
reverted too - it seems correct to me to use 64-bit
On 23/06/15 15:49, Stefano Stabellini wrote:
Yes, you are right, I was reading an older version of Linux that still
had xen_remap_domain_mfn_range properly implemented.
The new function is called xen_remap_domain_mfn_array which calls
xen_xlate_remap_gfn_array.
I'll rephrase my question
On 23/06/15 16:18, Jan Beulich wrote:
... as being identical to is_pv_32bit_vcpu() after the x86-32 removal.
In a few cases this includes an additional is_pv_32bit_vcpu() -
is_pv_32bit_domain() conversion.
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper
Jan Beulich writes (Re: [Xen-devel] [xen-4.2-testing test] 58817: FAIL):
On 22.06.15 at 08:54, osst...@xenbits.xen.org wrote:
flight 58817 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58817/
Failures and problems with tests :-(
Tests which did not
On Tue, 2015-06-23 at 11:55 +0100, Stefano Stabellini wrote:
I don't know if we should introduce a new name for this, but I wanted to
point out that this is different from PVH from Xen point of view. In
particular most of the outstanding PVH work items (32bit, AMD) on the
hypervisor would be
On Tue, 2015-06-23 at 12:15 +0100, Anthony PERARD wrote:
On Mon, Jun 08, 2015 at 10:22:28AM +0100, Ian Campbell wrote:
On Mon, 2015-06-08 at 04:37 +, osstest service user wrote:
flight 58119 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58119/
Regressions
On 6/22/2015 10:02 PM, Julien Grall wrote:
On 22/06/15 12:17, Peng Fan wrote:
I add debug log in this piece of code:
void __init sanity_check_meminfo(void)
{
phys_addr_t memblock_limit = 0;
int i, j, highmem = 0;
phys_addr_t vmalloc_limit = __pa(vmalloc_min - 1) + 1;
On Tue, 23 Jun 2015, Ian Campbell wrote:
On Tue, 2015-06-23 at 11:55 +0100, Stefano Stabellini wrote:
I don't know if we should introduce a new name for this, but I wanted to
point out that this is different from PVH from Xen point of view. In
particular most of the outstanding PVH work
Ian Jackson writes (Re: [Xen-devel] Tools backports for 4.5 [and 1 more
messages]):
Jan Beulich writes (Re: [Xen-devel] Tools backports for 4.5):
3380f5b6270e ocaml/xenctrl: Check return values from hypercalls
c8945d516134 ocaml/xenctrl: Make failwith_xc() thread safe
1a010ca99e9b
Hi,
On 23/06/15 14:03, Peng Fan wrote:
I did not enable LPAE for DOM0 kernel, use shor page table.
Following is the full log from uboot to kernel with DOM0 512M:
Which CONFIG_VMSPLIT_* do you use? Can you try to use another one? I
remembered it had some effect on the offset between physical
Hi,
On 6/23/2015 9:36 PM, Julien Grall wrote:
Hi,
On 23/06/15 14:03, Peng Fan wrote:
I did not enable LPAE for DOM0 kernel, use shor page table.
Following is the full log from uboot to kernel with DOM0 512M:
Which CONFIG_VMSPLIT_* do you use? Can you try to use another one? I
remembered
Ian Jackson writes (Re: [Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix build
of 32bit toolstacks on CentOS 5.x following XSA-125):
Andrew Cooper writes ([Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix build
of 32bit toolstacks on CentOS 5.x following XSA-125):
gcc 4.1 of CentOS 5.x era does
On 06/23/2015 02:22 PM, Tim Deegan wrote:
George has a long record of contributions to the x86 memory management
and p2m code. He will be taking over as the primary maintainer of
x86/mm; I will still help out with the shadow pagetable code.
Signed-off-by: Tim Deegan t...@xen.org
Cc: George
On 23/06/15 15:16, Ian Jackson wrote:
Ian Jackson writes (Re: [Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix build
of 32bit toolstacks on CentOS 5.x following XSA-125):
Andrew Cooper writes (Re: [Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix
build of 32bit toolstacks on CentOS 5.x following
On Tue, Jun 23, 2015 at 03:16:23PM +0100, Wei Liu wrote:
This reverts commit f5b43e95facdc17f925cb56a8963cd4531074034.
Could you include some detail of why the revert is needed?
Thanks.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
tools/libxc/include/xenctrl.h | 2 +-
kdd's knowledge of Windows kernel internals is several releases out of
date now. However the underlying implementation of the serial protocol
is still sound. I have heard that some people are using it, and I'm happy
to answer questions/bug reports, so don't deprecate it just yet.
Signed-off-by:
Razvan and Tamas have been working on this code for a while now, and
have kindly agreed to act as maintainers.
Signed-off-by: Tim Deegan t...@xen.org
Cc: Razvan Cojocaru rcojoc...@bitdefender.com
Cc: Tamas K Lengyel tleng...@novetta.com
---
MAINTAINERS | 3 ++-
1 file changed, 2 insertions(+), 1
In practice I haven't been actively involved in this code for some time.
Signed-off-by: Tim Deegan t...@xen.org
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Stefano Stabellini stefano.stabell...@citrix.com
---
MAINTAINERS | 2 --
1 file changed, 2 deletions(-)
diff --git a/MAINTAINERS
George has a long record of contributions to the x86 memory management
and p2m code. He will be taking over as the primary maintainer of
x86/mm; I will still help out with the shadow pagetable code.
Signed-off-by: Tim Deegan t...@xen.org
Cc: George Dunlap george.dun...@eu.citrix.com
---
On 20.06.15 at 05:09, boris.ostrov...@oracle.com wrote:
--- a/xen/arch/x86/domain_build.c
+++ b/xen/arch/x86/domain_build.c
@@ -141,6 +141,13 @@ static struct vcpu *__init setup_dom0_vcpu(struct domain
*d,
if ( !d-is_pinned !dom0_affinity_relaxed )
This code now has no active maintainers, as neither Andres nor I
can commit the time.
Signed-off-by: Tim Deegan t...@xen.org
Cc: Andres Lagar-Cavilla and...@lagarcavilla.org
---
MAINTAINERS | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/MAINTAINERS b/MAINTAINERS
index
Hi,
As I'll be stepping down from paid work on Xen soon, this is a good time to
introduce some new maintainers: George will be taking over x86/mm and
Tamas and Razvan will be taking over vm-event/mem-access.
Andres has said he doesn't have time to pick up paging/sharing code,
so that will be
On Tue, 23 Jun 2015, Stefano Stabellini wrote:
On Mon, 18 May 2015, Julien Grall wrote:
Hi David,
On 15/05/15 16:45, David Vrabel wrote:
On 14/05/15 18:00, Julien Grall wrote:
Hi all,
ARM64 Linux is supporting both 4KB and 64KB page granularity. Although,
Xen
hypercall
Andrew Cooper writes (Re: [Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix build
of 32bit toolstacks on CentOS 5.x following XSA-125):
On 23/06/15 14:21, Ian Jackson wrote:
Sorry, I meant, to my staging-4.4.
You appear to have committed half of it as staging-4.4~2
Nnnngg. Sorry. I think I
On Tue, 2015-06-23 at 14:22 +0100, Tim Deegan wrote:
In practice I haven't been actively involved in this code for some time.
Signed-off-by: Tim Deegan t...@xen.org
Acked-by: Ian Campbell ian.campb...@citrix.com
Cc: Stefano Stabellini stefano.stabell...@citrix.com
---
MAINTAINERS | 2 --
This reverts commit f5b43e95facdc17f925cb56a8963cd4531074034.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
tools/libxc/include/xenctrl.h | 2 +-
tools/libxc/xc_domain.c | 2 +-
tools/libxl/libxl.c | 5 ++---
3 files changed, 4 insertions(+), 5 deletions(-)
diff --git
On 23/06/15 11:55, Ian Jackson wrote:
Andrew Cooper writes ([Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix build
of 32bit toolstacks on CentOS 5.x following XSA-125):
gcc 4.1 of CentOS 5.x era does not like the typecheck in min() between
uint64_t and unsigned long.
Signed-off-by: Andrew
On 20.06.15 at 05:09, boris.ostrov...@oracle.com wrote:
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -2652,7 +2652,7 @@ int vcpu_destroy_pagetables(struct vcpu *v)
if ( rc )
return rc;
-if ( is_pv_32on64_vcpu(v) )
+if ( is_pv_32on64_vcpu(v) !is_pvh_vcpu(v) )
On Tue, 2015-06-23 at 12:15 +0100, Anthony PERARD wrote:
On Mon, Jun 08, 2015 at 10:22:28AM +0100, Ian Campbell wrote:
On Mon, 2015-06-08 at 04:37 +, osstest service user wrote:
flight 58119 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58119/
Regressions
On Mon, 18 May 2015, Julien Grall wrote:
Hi David,
On 15/05/15 16:45, David Vrabel wrote:
On 14/05/15 18:00, Julien Grall wrote:
Hi all,
ARM64 Linux is supporting both 4KB and 64KB page granularity. Although, Xen
hypercall interface and PV protocol are always based on 4KB page
On 22.06.15 at 18:37, elena.ufimts...@oracle.com wrote:
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -1923,6 +1923,7 @@ void tsc_set_info(struct domain *d,
* but always_emulate does not for some reason. Figure out
* why.
*/
+d-arch.tsc_khz =
On 23.06.15 at 12:54, net...@crc.id.au wrote:
On 23/06/2015 8:45 PM, Ian Jackson wrote:
Ian Jackson writes (Re: [Xen-devel] Xen 4.5.1 released):
M A Young writes (Re: [Xen-devel] Xen 4.5.1 released):
I don't believe this release has the qemu-xen-traditional half of XSA-135.
If this wasn't
On 23.06.15 at 14:10, vkuzn...@redhat.com wrote:
Jan Beulich jbeul...@suse.com writes:
On 22.06.15 at 18:24, vkuzn...@redhat.com wrote:
Jan Beulich jbeul...@suse.com writes:
On 22.06.15 at 18:00, vkuzn...@redhat.com wrote:
Jan Beulich jbeul...@suse.com writes:
On 03.06.15 at 15:35,
On 23/06/15 14:21, Ian Jackson wrote:
Ian Jackson writes (Re: [Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix build
of 32bit toolstacks on CentOS 5.x following XSA-125):
Andrew Cooper writes ([Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix build
of 32bit toolstacks on CentOS 5.x following
On Thu, 14 May 2015, Julien Grall wrote:
From: Julien Grall julien.gr...@linaro.org
Signed-off-by: Julien Grall julien.gr...@citrix.com
Cc: Stefano Stabellini stefano.stabell...@eu.citrix.com
Reviewed-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
arch/arm/include/asm/xen/page.h
On Tue, Jun 23, 2015 at 01:57:18PM +0100, Ian Campbell wrote:
On Tue, 2015-06-23 at 12:15 +0100, Anthony PERARD wrote:
On Mon, Jun 08, 2015 at 10:22:28AM +0100, Ian Campbell wrote:
On Mon, 2015-06-08 at 04:37 +, osstest service user wrote:
flight 58119 libvirt real [real]
On 20.06.15 at 05:09, boris.ostrov...@oracle.com wrote:
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -584,7 +584,7 @@ int arch_domain_create(struct domain *d, unsigned int
domcr_flags,
mapcache_domain_init(d);
HYPERVISOR_COMPAT_VIRT_START(d) =
-
On 20.06.15 at 05:09, boris.ostrov...@oracle.com wrote:
@@ -4959,8 +4979,10 @@ int hvm_do_hypercall(struct cpu_user_regs *regs)
return viridian_hypercall(regs);
if ( (eax = NR_hypercalls) ||
- (is_pvh_domain(currd) ? !pvh_hypercall64_table[eax]
-
A new memory model that allows QEMU to bump memory behind libxl's back was
merged a few months ago. We didn't fully understand the repercussions back
then. Now it breaks migration and becomes blocker of 4.6 release.
It's better to restore to original behaviour at this stage of the release
cycle,
Ian Jackson writes (Re: [Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix build
of 32bit toolstacks on CentOS 5.x following XSA-125):
Andrew Cooper writes (Re: [Xen-devel] [PATCH] [XEN-4.4] tools/libxc: Fix
build of 32bit toolstacks on CentOS 5.x following XSA-125):
On 23/06/15 14:21, Ian
This reverts commit 0c029c4da2169159064568ef4fea862a5d2cd84a.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
tools/libxl/libxl.c | 24 ++--
1 file changed, 14 insertions(+), 10 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 35caf42..e3e63b5 100644
Hi,
On 23/06/15 14:25, Stefano Stabellini wrote:
On Thu, 14 May 2015, Julien Grall wrote:
From: Julien Grall julien.gr...@linaro.org
Signed-off-by: Julien Grall julien.gr...@citrix.com
Cc: Stefano Stabellini stefano.stabell...@eu.citrix.com
Reviewed-by: Stefano Stabellini
On Tue, Jun 23, 2015 at 09:44:31AM +0100, Ian Campbell wrote:
On Mon, 2015-06-22 at 14:33 -0400, Konrad Rzeszutek Wilk wrote:
On Wed, Jun 17, 2015 at 03:35:02PM +0100, Stefano Stabellini wrote:
On Wed, 17 Jun 2015, Ian Campbell wrote:
On Wed, 2015-06-17 at 07:14 -0700, Manish Jaggi
On Thu, 14 May 2015, Julien Grall wrote:
The hypercall interface is always using 4KB page granularity. This is
requiring to use xen page definition macro when we deal with hypercall.
Note that pfn_to_mfn is working with a Xen pfn (i.e 4KB). We may want to
rename pfn_mfn to make this
CC Jan, author of one of the patches.
On Tue, Jun 23, 2015 at 03:16:22PM +0100, Wei Liu wrote:
A new memory model that allows QEMU to bump memory behind libxl's back was
merged a few months ago. We didn't fully understand the repercussions back
then. Now it breaks migration and becomes blocker
On Tue, Jun 23, 2015 at 6:22 AM, Tim Deegan t...@xen.org wrote:
This code now has no active maintainers, as neither Andres nor I
can commit the time.
Signed-off-by: Tim Deegan t...@xen.org
Cc: Andres Lagar-Cavilla and...@lagarcavilla.org
Wistfully, Acked-by: Andres Lagar-Cavilla
On Tue, 2015-06-23 at 17:32 +0100, Wei Liu wrote:
On Tue, Jun 23, 2015 at 03:58:32PM +0100, Ian Campbell wrote:
There is an issue in libxl_set_memory_target whereby the target and
the max mem can get out of sync, this is because the call the
xc_domain_setmaxmem is not tied in any way to the
Hi,
Ping? I don't think this patch series depends on others (such as Linux
64K support) to review it.
Regards,
On 11/05/15 12:55, Julien Grall wrote:
Hi all,
This small series are the only changes required in Xen in order to run a guest
using 64K page granularity on top of an unmodified
flight 58834 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58834/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 58756
test-amd64-i386-xl-qemuu-win7-amd64
Where appropriate means if TftpDiVersion is set to current, which is
the default in standalone mode. The assumption is that someone wuth
that configration runs mg-debian-installer-update then they would
expected the update to be immediately effective.
There was some existing, but commented, code
Use this in libxl_dm instead of hard-coding.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxc/include/xenguest.h | 2 ++
tools/libxl/libxl_dm.c | 2 +-
2 files changed, 3 insertions(+), 1 deletion(-)
diff --git
Use existing create/restore path to perform 'soft reset' for HVM domains.
Tear everything down, e.g. destroy domain's device model, remove the domain
from xenstore, save toolstack record and start over.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
Changes since 'v7'
- 'Reset everything
Use letter 'S' to indicate a domain in such state.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_cmdimpl.c | 2 +-
tools/python/xen/lowlevel/xl/xl.c | 1 +
3 files changed, 3
New domctl resets state for a domain allowing it to 'start over': register
vcpu_info, switch to FIFO ABI for event channels. Still active grants are
being logged to help debugging misbehaving backends.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
xen/common/domain.c | 29
This patch series provides x86 PVHVM domains with an ability to perform
kexec/kdump-style operations.
The list of currently known issues blocking kexec (and why the series is
required) is:
- Bound event channels.
- Registered vcpu_info.
- PIRQ/emuirq mappings.
- shared_info frame after
Add new soft_reset vector to domain2 class, add it to create_domain
in the default policy.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
tools/flask/policy/policy/modules/xen/xen.if | 2 +-
xen/xsm/flask/hooks.c| 3 +++
xen/xsm/flask/policy/access_vectors
We need to close all event channel so the domain performing soft reset
will be able to open them back.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
xen/common/event_channel.c | 38 +++---
xen/include/xen/event.h| 3 +++
2 files changed, 22
Introduce xc_domain_soft_reset() function supporting XEN_DOMCTL_soft_reset.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
tools/libxc/include/xenctrl.h | 3 +++
tools/libxc/xc_domain.c | 9 +
2 files changed, 12 insertions(+)
diff --git a/tools/libxc/include/xenctrl.h
Log first 10 active grants of a domain. This function is going to be used
for soft reset, active grants on this path usually mean misbehaving backends
refusing to release their mappings on shutdown.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
xen/common/grant_table.c | 31
This special type of shutdown is supposed to be used by PVHVM guests when
they want to perform some sort of kexec/kdump.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
xen/common/shutdown.c | 6 ++
xen/include/public/sched.h | 3 ++-
2 files changed, 8 insertions(+), 1
x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq
servers and and replaces the shared_info frame with an empty page to support
subsequent XENMAPSPACE_shared_info call.
ARM-specific hook is a noop for now.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
Changes
That's indeed sad. I'm actively using the sharing system in my tools and
have a couple branches laying around for improving it, like batch
memsharing for example to support flash-cloning. Now that it's orphaned,
how would I go about merging these into mainline? I'm not yet confident
enough in my
Hi Vijay,
On 22/06/15 13:01, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
This patch introduces virtual ITS driver with following
functionality
- Introduces helper functions to manage device table and
ITT table in guest memory
- Helper function
This reverts commit 0c029c4da2169159064568ef4fea862a5d2cd84a.
A new memory model that allows QEMU to bump memory behind libxl's back
was merged a few months ago. We didn't fully understand the
repercussions back then. Now it breaks migration and becomes blocker of
4.6 release.
It's better to
As a preparation before adding new restart type (soft reset) put all
restart types into an enum.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
Changes since v7:
- s,restarter,restarted, [Ian Campbell]
---
tools/libxl/xl.h | 6
On 06/23/2015 04:19 PM, Jan Beulich wrote:
... as being identical to is_pv_32bit_domain() after the x86-32
removal.
In a few cases this includes no longer open-coding is_pv_32bit_vcpu().
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: George Dunlap george.dun...@eu.citrix.com
Jan Beulich jbeul...@suse.com writes:
On 26.05.15 at 15:32, vkuzn...@redhat.com wrote:
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.c
@@ -1709,9 +1709,9 @@ bool_t p2m_mem_access_check(paddr_t gpa, vaddr_t gla,
const struct npfec npfec)
/*
* Set access type for a region of pfns.
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 23 June 2015 17:22
To: Paul Durrant
Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: RE: [PATCH v3 04/18] x86/hvm: make sure translated MMIO reads or
writes fall within a page
On
On 23 June 2015 at 17:19, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
On Tue, 23 Jun 2015, Peter Maydell wrote:
I have a bit in my pull-request-creation script that automatically
checks that every commit has my signoff, to avoid this kind of
mistake:
On Tue, 2015-06-23 at 16:50 +0100, Ian Jackson wrote:
And with that - will it ever clear?
Not unless we get lucky and that guest-stop passes.
The guest-stop is (now) an allowable fail. After discussing this with
Ian f2f it seems that he underlying issue is that the allowable-ness
check is
On Sat 20-06-15 00:07:39, Al Viro wrote:
On Wed, Jun 17, 2015 at 09:31:16PM +0100, Al Viro wrote:
On Wed, Jun 17, 2015 at 10:57:15AM +0200, Jan Kara wrote:
Joy... Folks, is anybody actively maintaining fs/ufs these days?
Looking into the changelog there wasn't anyone seriously
That is, the date without the suite suffix.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
mg-debian-installer-update | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/mg-debian-installer-update b/mg-debian-installer-update
index ba2fdc4..59f05ec 100755
---
On 06/23/2015 11:15 AM, Lengyel, Tamas wrote:
On Mon, Jun 22, 2015 at 2:56 PM, Ed White edmund.h.wh...@intel.com wrote:
Add the remaining routines required to support enabling the alternate
p2m functionality.
Signed-off-by: Ed White edmund.h.wh...@intel.com
---
xen/arch/x86/hvm/hvm.c
On 06/18/2015 10:02 AM, Ian Campbell wrote:
On Thu, 2015-06-18 at 16:18 +0100, Ian Campbell wrote:
On Mon, 2015-06-15 at 15:30 +0100, Anthony PERARD wrote:
The No response from client ... appear only on armhf as far as I can
tell.
Indeed, and I just noticed while developing osstest for arm64
On Tue, Jun 23, 2015 at 05:38:17PM +0100, Ian Campbell wrote:
On Tue, 2015-06-23 at 17:32 +0100, Wei Liu wrote:
On Tue, Jun 23, 2015 at 03:58:32PM +0100, Ian Campbell wrote:
There is an issue in libxl_set_memory_target whereby the target and
the max mem can get out of sync, this is
On Mon, Jun 22, 2015 at 2:56 PM, Ed White edmund.h.wh...@intel.com wrote:
Add the remaining routines required to support enabling the alternate
p2m functionality.
Signed-off-by: Ed White edmund.h.wh...@intel.com
---
xen/arch/x86/hvm/hvm.c | 60 +-
I think it's amazing that you're doing this work and I'll be happy to help
if you keep me on cc.
It's not serious for me to claim I'm a maintainer when I don't have the
time nor the resources to do serious debugging should the need arise.
Andres
On Tue, Jun 23, 2015 at 10:33 AM, Lengyel, Tamas
On 06/18/2015 09:18 AM, Ian Campbell wrote:
On Mon, 2015-06-15 at 15:30 +0100, Anthony PERARD wrote:
The No response from client ... appear only on armhf as far as I can
tell.
Indeed, and I just noticed while developing osstest for arm64 that the
daemon is segfaulting, and we even managed to
1 - 100 of 240 matches
Mail list logo