Il 23/07/2015 19:26, Stefano Stabellini ha scritto:
Hi all,
this patch series changes libxl to start QEMU as device model with the
new xsrestrict option (http://marc.info/?l=xen-develm=143341692707358).
It also starts a second QEMU to provide PV backends in userspace (qdisk)
to HVM guests.
At 13:02 +0100 on 24 Jul (1437742964), Andrew Cooper wrote:
On 24/07/15 10:41, Jan Beulich wrote:
Beyond that log-dirty handling in _hvm_map_guest_frame() looks bogus
too: What if a XEN_DOMCTL_SHADOW_OP_* gets issued and acted upon
between the setting of the dirty flag and the actual write
flight 59942 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59942/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
flight 59961 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59961/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are
On Mon, 2015-07-27 at 11:49 +0100, Andrew Cooper wrote:
On 27/07/15 11:41, George Dunlap wrote:
Can you expand a little on this? I'm having trouble figuring out
exactly what user-space applications are reading and how they're using
it -- and, how they work currently in virtual
The main one is the middle one which would have made
http://logs.test-lab.xenproject.org/osstest/logs/59681/test-amd64-i386-xl
-qemuu-debianhvm-amd64/info.html a lot easier to read due to the
DEBIAN_FRONTEND=text.
Since v1 applied some acks and refactored the middle patch to make it all
less
The current arrangement is a bit odd, I'm not sure why it would be
that way and it results in a huge list of files in the middle of the
log which is rather boring to scroll through.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
This is primarily to get DEBIAN_FRONTEND=test, for easier to read
logging.
Previously the command line consisted of the console and
preseed/file=/preseed.cfg. After this it is more complex.
The preseed file uses file= which is an alias for preseed/file. Extra
options are given including
I don't think there is any point in these since c60b6d20b0fd
ts-debian-hvm-install: Arrange for installed guest to use a serial
console and they represent an unexplained difference between the
islinux and grub cases.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson
Il 23/07/2015 19:08, Stefano Stabellini ha scritto:
Try to use xen-qemudepriv-domid$domid first, then
xen-qemudepriv-shared and root if everything else fails.
The uids need to be manually created by the user or, more likely, by the
xen package maintainer.
Expose a device_model_user setting in
On 27/07/15 10:30, David Vrabel wrote:
On 25/07/15 00:21, Julien Grall wrote:
On 24/07/2015 12:47, David Vrabel wrote:
@@ -550,6 +551,11 @@ int alloc_xenballooned_pages(int nr_pages, struct
page **pages)
page = balloon_retrieve(true);
if (page) {
Currently, the event channel rebind code is gated with the presence of
the vector callback.
The virtual interrupt controller on ARM has the concept of per-CPU
interrupt (PPI) which allow us to support per-VCPU event channel.
Therefore there is no need of vector callback for ARM.
Xen is already
On Friday, 24.07.2015 at 17:01, Ian Jackson wrote:
Martin Lucina writes ([PATCH v3] xenconsole: Ensure exclusive access to
console using locks):
If more than one instance of xenconsole is run against the same DOMID
then each instance will only get some data. This change ensures
exclusive
On 27/07/15 13:35, David Vrabel wrote:
On 27/07/15 12:35, Julien Grall wrote:
Currently, the event channel rebind code is gated with the presence of
the vector callback.
The virtual interrupt controller on ARM has the concept of per-CPU
interrupt (PPI) which allow us to support per-VCPU
On Mon, Jul 27, 2015 at 02:29:14PM +0800, Xuehan Xu wrote:
Hi, everyone.
Is there any way to run a stub domain on linux not mini-os?
Thanks:-)
Use your favourite mailing list archive to search for message-id
1423022775-7132-1-git-send-email-eshel...@pobox.com
Wei.
On Fri, 2015-07-24 at 13:11 -0400, Boris Ostrovsky wrote:
On 07/24/2015 12:48 PM, Juergen Gross wrote:
On 07/24/2015 06:40 PM, Boris Ostrovsky wrote:
On 07/24/2015 12:10 PM, Juergen Gross wrote:
If we can fiddle with the masks on boot, we could do it in a running
system, too. Another
I found this in OSSTest
http://logs.test-lab.xenproject.org/osstest/logs/59910/test-amd64-amd64-xl-qemuu-ovmf-amd64/serial-fiano1.log
Jul 25 17:48:51.468985 (d1) HVM Loader
Jul 25 17:48:51.517028 (d1) Detected Xen v4.6-unstable
Jul 25 17:48:51.517056 (d1) Xenbus rings @0xfeffc000, event channel
In ea214001 (x86/altp2m: add altp2mhvm HVM domain parameter), a
check was added to ensure nestedhvm and altp2m cannot be enabled at
the same time. That check was added in xl, but in fact it should be in
libxl because it should be the entity that decides whether
the provided configuration is valid.
On 27/07/15 11:41, George Dunlap wrote:
On Fri, Jul 24, 2015 at 5:09 PM, Konrad Rzeszutek Wilk
konrad.w...@oracle.com wrote:
On Fri, Jul 24, 2015 at 05:58:29PM +0200, Dario Faggioli wrote:
On Fri, 2015-07-24 at 17:24 +0200, Juergen Gross wrote:
On 07/24/2015 05:14 PM, Juergen Gross wrote:
On
flight 59995 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59995/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 11 guest-saverestore fail REGR. vs. 59964
version targeted for
On Mon, Jul 27, 2015 at 02:44:57PM +0200, Martin Lucina wrote:
On Friday, 24.07.2015 at 17:01, Ian Jackson wrote:
Martin Lucina writes ([PATCH v3] xenconsole: Ensure exclusive access to
console using locks):
If more than one instance of xenconsole is run against the same DOMID
then
On Mon, 2015-07-27 at 12:11 +0100, George Dunlap wrote:
1. Userspace applications are in the habit of reading CPUID to determine
the topology of the system they're running on
I'd add this item here:
1b. Linux kernel uses CPUID to configure some bits of its scheduler. The
result of that,
On 07/27/2015 03:23 PM, Dario Faggioli wrote:
On Mon, 2015-07-27 at 14:01 +0200, Juergen Gross wrote:
On 07/27/2015 01:11 PM, George Dunlap wrote:
Or alternately, if the user wants to give up on the consolidation
aspect of virtualization, they can pin vcpus to pcpus and then pass in
the
On 27/07/15 12:01, Julien Grall wrote:
On 27/07/15 10:30, David Vrabel wrote:
On 25/07/15 00:21, Julien Grall wrote:
On 24/07/2015 12:47, David Vrabel wrote:
@@ -550,6 +551,11 @@ int alloc_xenballooned_pages(int nr_pages, struct
page **pages)
page = balloon_retrieve(true);
On 27/07/15 00:27, Andy Lutomirski wrote:
For SYSRET, I think the way to go is to force Xen to always use the
syscall slow path. Instead, Xen could hook into
syscall_return_via_sysret or even right before the opportunistic
sysret stuff. Then we could remove the USERGS_SYSRET hooks entirely.
On 07/27/2015 12:43 PM, George Dunlap wrote:
On Mon, Jul 27, 2015 at 5:35 AM, Juergen Gross jgr...@suse.com wrote:
On 07/24/2015 06:44 PM, Boris Ostrovsky wrote:
On 07/24/2015 12:39 PM, Juergen Gross wrote:
I don't say mangling cpuids can't solve the scheduling problem. It
surely can. But
By converting the current boolean $force_baseline into a keyword
indicating the reason.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
cr-daily-branch | 14 +-
1 file changed, 9 insertions(+), 5 deletions(-)
diff --git
On Fri, 2015-07-24 at 18:03 +0100, Ian Jackson wrote:
Ian Campbell writes ([PATCH OSSTEST v2] No longer export
$OSSTEST_CONFIG):
From cri-args-hostlists or invoke-daemon.
All sites now have a suitable $HOME/.xen-osstest/settings in place
which does this.
Signed-off-by: Ian
On 27/07/15 11:43, George Dunlap wrote:
On Mon, Jul 27, 2015 at 5:35 AM, Juergen Gross jgr...@suse.com wrote:
On 07/24/2015 06:44 PM, Boris Ostrovsky wrote:
On 07/24/2015 12:39 PM, Juergen Gross wrote:
I don't say mangling cpuids can't solve the scheduling problem. It
surely can. But it
Provide a new cr-daily-branch setting OSSTEST_BASELINES_ONLY which
causes it to only attempt to test the current baseline (if it is
untested) and never the tip version. Such tests will not result in any
push.
Add a cronjob to Cambridge which runs in this manner, ensuring that
there will usually
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
ITS initialization required for all PCI devices in
ThunderX platform are done by calling from specific
mapping function.
This patch can be reverted once XEN PCI passthrough
framework for arm64 is in available.
For now all the PCI devices are
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
The linux driver is based on 4.1 with below commit id
3ad2a5f57656a14d964b673a5a0e4ab0e583c870
Only following code from Linux ITS driver is ported
and compiled
- LPI initialization
- ITS configuration code
- Physical command queue
On 07/27/2015 12:54 PM, Andrew Cooper wrote:
On 27/07/15 11:43, George Dunlap wrote:
On Mon, Jul 27, 2015 at 5:35 AM, Juergen Gross jgr...@suse.com wrote:
On 07/24/2015 06:44 PM, Boris Ostrovsky wrote:
On 07/24/2015 12:39 PM, Juergen Gross wrote:
I don't say mangling cpuids can't solve the
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Add APIs to add devices to RB-tree, assign and remove
devices to domain.
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
v5: - Removed its_detach_device API
- Pass nr_ites as parameter to its_add_device
v4: - Introduced
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Allocate irq descriptors for LPIs dynamically and
also update irq_to_pending helper for LPIs
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
xen/arch/arm/gic-v3-its.c | 15 +++
xen/arch/arm/gic-v3.c
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Helper function gic_is_lpi() is used to find
if irq is lpi or not. For GICv2 platforms this function
returns 0.
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
xen/arch/arm/gic-hip04.c |6 ++
xen/arch/arm/gic-v2.c
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Parse host dt and generate ITS node for Dom0.
ITS node resides inside GIC node so when GIC node
is encountered look for ITS node.
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
v5: - Moved ITS dt node generation to ITS
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Initialize physical ITS driver from GIC v3 driver
if LPIs are supported by hardware
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
v5: Made check of its dt node availability before
setting lpi_supported flag
---
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Implements hw_irq_controller api's required
to handle LPI's
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
v5: - Fixed review comments
- Exposed gicv3_[host|guest]_irq_end and hook to its
v4: - Implement separate
On 07/27/2015 11:54 AM, Juergen Gross wrote:
On 07/27/2015 12:43 PM, George Dunlap wrote:
On Mon, Jul 27, 2015 at 5:35 AM, Juergen Gross jgr...@suse.com wrote:
On 07/24/2015 06:44 PM, Boris Ostrovsky wrote:
On 07/24/2015 12:39 PM, Juergen Gross wrote:
I don't say mangling cpuids can't
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
This patch introduces virtual ITS driver with following
functionality
- Introduces helper functions to manage device table and
ITT table in guest memory
- Helper function to handle virtual ITS devices assigned
to domain
Signed-off-by:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Compilation is delayed till this patch.
From now on functions in physical ITS and virtual ITS
driver are required. So enable compilation
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
xen/arch/arm/Makefile |2 ++
1 file
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Add Domain and vcpu specific ITS initialization
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
xen/arch/arm/vgic-v3-its.c| 10 ++
xen/arch/arm/vgic-v3.c| 10 ++
xen/arch/arm/vgic.c
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Allocate and initialize irq descriptor for LPIs and
route LPIs to guest
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
xen/arch/arm/gic-v3-its.c | 20 +++
xen/arch/arm/gic-v3.c | 17 +-
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
dt_for_each_irq_map() returns error if no irq mapping is found.
With this patch, Ignore error and return success
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
xen/common/device_tree.c |2 +-
1 file changed, 1
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Emulate LPI related changes to GICR registers
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
v5: - Handled all sizes access to LPI configuration table
- Rename vits_unmap_lpi_prop as vits_map_lpi_prop
v4: - Added LPI
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
ITS translation space contains GITS_TRANSLATOR register
which is written by device to raise LPI. This space needs
to mapped to every domain address space for all physical
ITS available,so that device can access GITS_TRANSLATOR
register using
At 14:01 +0200 on 27 Jul (1438005701), Juergen Gross wrote:
There would be another solution, of course:
Support hyperthreads in the Xen scheduler via gang scheduling. While
this is not a simple solution, it is a fair one. Hyperthreads on one
core can influence each other rather much. With
On Mon, 2015-07-27 at 14:01 +0200, Juergen Gross wrote:
On 07/27/2015 01:11 PM, George Dunlap wrote:
Or alternately, if the user wants to give up on the consolidation
aspect of virtualization, they can pin vcpus to pcpus and then pass in
the actual host topology (hyperthreads and all).
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Emulate GITS* registers
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
v4: - Removed GICR register emulation
---
xen/arch/arm/irq.c|3 +
xen/arch/arm/vgic-v3-its.c| 365
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Export physical ITS information to virtual ITS driver
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
xen/arch/arm/gic-v3-its.c | 27 ++-
xen/arch/arm/vgic-v3-its.c|9 +
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Add Virtual ITS command processing support to Virtual ITS driver
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
v5: - Rename vgic_its_*() to vits_*()
v4: - Use helper function to read from command queue
- Add MOVALL
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
This is based on DraftG version
http://xenbits.xen.org/people/ianc/vits/draftG.pdf
Following major features are supported
- GICv3 ITS support for arm64 platform
- Only Dom0 is supported. For DomU pci passthrough feature
is required.
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Helper functions to manage its devices using RB-tree
are introduced in physical ITS driver.
This is global list of all the devices.
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Acked-by: Ian Campbell ian.campb...@citrix.com
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
log2 helper apis are ported from linux from
commit 13c07b0286d340275f2d97adf085cecda37ede37
(linux/log2.h: Fix rounddown_pow_of_two(1))
Changes made for xen are:
- Only required functionality is retained
- Replace fls_long with flsl
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
bitmap_find_next_zero_area helper function will be used
by physical ITS driver. This is imported from linux 4.2
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
CC: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
nr_cpu_ids for arm platforms is set to 128 irrespective of
number of cpus supported by platform.
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
xen/arch/arm/setup.c |1 +
xen/arch/arm/smpboot.c| 11
El 24/07/15 a les 19.36, Konrad Rzeszutek Wilk ha escrit:
On Fri, Jul 24, 2015 at 06:54:09PM +0200, Roger Pau Monné wrote:
I have the feeling that we are over engineering this interface. IMHO we
should only allow the user to set the control registers, efer (on amd64)
and the GP registers.
Hi Wei,
On 24/07/15 16:39, Wei Liu wrote:
In ea214001 (x86/altp2m: add altp2mhvm HVM domain parameter), a
check was added to ensure nestedhvm and altp2m cannot be enabled at
the same time. That check was added in xl, but in fact it should be in
libxl because it should be the entity that
On 27/07/15 12:35, Julien Grall wrote:
Currently, the event channel rebind code is gated with the presence of
the vector callback.
The virtual interrupt controller on ARM has the concept of per-CPU
interrupt (PPI) which allow us to support per-VCPU event channel.
Therefore there is no need
On Mon, Jul 27, 2015 at 01:34:04PM +0100, Julien Grall wrote:
Hi Wei,
On 24/07/15 16:39, Wei Liu wrote:
In ea214001 (x86/altp2m: add altp2mhvm HVM domain parameter), a
check was added to ensure nestedhvm and altp2m cannot be enabled at
the same time. That check was added in xl, but in
On 07/27/2015 01:11 PM, George Dunlap wrote:
On 07/27/2015 11:54 AM, Juergen Gross wrote:
On 07/27/2015 12:43 PM, George Dunlap wrote:
On Mon, Jul 27, 2015 at 5:35 AM, Juergen Gross jgr...@suse.com wrote:
On 07/24/2015 06:44 PM, Boris Ostrovsky wrote:
On 07/24/2015 12:39 PM, Juergen Gross
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-5154 / XSA-138
version 2
QEMU heap overflow flaw while processing certain ATAPI commands.
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
On 24/07/15 19:56, li...@eikelenboom.it wrote:
Hi All,
On my AMD system running xen-unstable (last commit: ),
after a few restarts of a HVM guest with pci-passthrough i got these
on shutdown of the guest:
(never seen this before, so it should be something triggered by a
recent commit)
--
flight 60005 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60005/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 5 xen-build fail REGR. vs. 59254
build-i386
On Fri, 2015-07-10 at 23:52 -0500, Chong Li wrote:
Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
to independently get and set the scheduling parameters of each
vCPU of a domain
I'd add a note about the fact that, for now, this is only supported and
being implemented for RTDs.
On 07/27/2015 10:43 AM, Juergen Gross wrote:
On 07/27/2015 04:34 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct:
Hello all,
I'm very happy to announce that the library we've created to help us
perform virtual machine introspection is now on GitHub, under the LGPLv3
license, here:
https://github.com/razvan-cojocaru/libbdvmi
We hope that the community will find it useful, and welcome discussion
(the LibVMI
flight 60006 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60006/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build fail REGR. vs. 59907
build-amd64-pvops
On Fri, 2015-07-10 at 23:52 -0500, Chong Li wrote:
Using xl sched-rtds will output the default scheduling parameters
for each domain. An example would be like:
# xl sched-rtds
Cpupool Pool-0: sched=RTDS
NameIDPeriodBudget
Domain-0
On Mon, 2015-07-27 at 14:29 +0100, Wei Liu wrote:
On Mon, Jul 27, 2015 at 02:44:57PM +0200, Martin Lucina wrote:
On Friday, 24.07.2015 at 17:01, Ian Jackson wrote:
Martin Lucina writes ([PATCH v3] xenconsole: Ensure exclusive access
to console using locks):
If more than one instance
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you'd like to add an
abstraction layer, in Linux, like in generic (or, perhaps, scheduling)
code, to hide the direct interaction with
On 24/07/15 12:41, Ian Jackson wrote:
Andrew Cooper writes ([PATCH] tools/libxl: Fixes to stream v2 task joining
logic):
During review of the libxl migration v2 series, I changes the task
joining logic, but clearly didn't think the result through
properly. This patch fixes several errors.
On 07/27/2015 04:34 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you'd like to add an
abstraction layer, in
Monday, July 27, 2015, 4:07:39 PM, you wrote:
On 24/07/15 19:56, li...@eikelenboom.it wrote:
Hi All,
On my AMD system running xen-unstable (last commit: ),
after a few restarts of a HVM guest with pci-passthrough i got these
on shutdown of the guest:
(never seen this before, so it should
On 07/27/2015 04:34 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you'd like to add an
abstraction layer, in
On Mon, 2015-07-27 at 10:34 -0400, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
Of course, it's not that my opinion on where should be in Linux counts
that much! :-D Nevertheless, I wanted to make it clear that, while
skeptic at the beginning, I now think this is
On Sat, 2015-07-25 at 18:04 +0530, Abhinav Gupta wrote:
Hii everyone :) ,
Hi,
I'm quite familiar with the linux powerclamp driver now.
Nice to hear. Is there anything about that you think it would be
useful/interesting about to share here?
I have also started looking into xen's code
I forgot to mention: you need to use --enable-ovmf in ./configure to
enable OVMF support.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 07/27/2015 04:51 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:43 AM, Juergen Gross wrote:
On 07/27/2015 04:34 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So,
On 07/25/2015 01:36 AM, Andy Lutomirski wrote:
Here's v3. It fixes the dazed and confused issue, I hope. It's also
probably a good general attack surface reduction, and it replaces some
scary code with IMO less scary code.
Also, servers and embedded systems should probably turn off
On Mon, Jul 27, 2015 at 8:36 AM, Boris Ostrovsky
boris.ostrov...@oracle.com wrote:
On 07/25/2015 01:36 AM, Andy Lutomirski wrote:
Here's v3. It fixes the dazed and confused issue, I hope. It's also
probably a good general attack surface reduction, and it replaces some
scary code with IMO
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: 27 July 2015 15:08
To: li...@eikelenboom.it; xen-devel@lists.xen.org
Cc: Paul Durrant
Subject: Re: [Xen-devel] xen-unstabel + linux 4.2: MMIO emulation failed:
d23v0 64bit @ 0010:814e2b1c - 66 89
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you'd like to add an
abstraction layer, in Linux, like in generic (or, perhaps, scheduling)
On 16/07/15 11:32, Dario Faggioli wrote:
Anyway, is there anything we can do to fix or workaround things?
This thread has gotten a bit long...
For Linux I would like to see:
1. No support for NUMA in PV guests -- if you want new MM features in a
guest use HVM.
2. For HVM guests, use the
On Fri, 2015-07-10 at 23:52 -0500, Chong Li wrote:
diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h
index d1d2ab3..58f1a7a 100644
--- a/tools/libxc/include/xenctrl.h
+++ b/tools/libxc/include/xenctrl.h
@@ -915,6 +915,15 @@ int xc_sched_rtds_domain_get(xc_interface
Found this when I did xl destroy to a hvm guest *without* altp2m turned
on.
Current staging branch.
(XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:C ]
(XEN) CPU:0
(XEN) RIP:e008:[82d0801fce0d] vmx_vmenter_helper+0x263/0x2f3
(XEN) RFLAGS: 00010242 CONTEXT:
On Mon, 2015-07-27 at 16:13 +0100, David Vrabel wrote:
On 16/07/15 11:32, Dario Faggioli wrote:
Anyway, is there anything we can do to fix or workaround things?
This thread has gotten a bit long...
Yep, indeed... :-(
For Linux I would like to see:
1. No support for NUMA in PV
Avoid stacking of check_all_finished() via synchronous teardown of
tasks. If the _abort() functions call back synchronously,
stream-completion_callback() ends up getting called twice, as first
and last check_all_finished() frames observe each task being finished.
Signed-off-by: Andrew Cooper
Only ever set stream-rc in check_all_finished(). The first version of
the migration v2 series had separate rc and joined_rc parameters, where
this logic worked. However when combining the two, the teardown path
fails to trigger if stream_complete() records stream-rc itself. A side
effect of
Document how cpupool_info works. Distinguish success (ERROR_FAIL +
ENOENT) vs failure in libxl_list_cpupool and properly clean up the array
in failure path.
Also switch to libxl__realloc and call libxl_cpupool_{init,dispose}
where appropriate.
There is change of behaviour. Previously if memory
. snip..
So, it looks to me that:
1) any application using CPUID for either licensing or
placement/performance optimization will get (potentially) random
results;
Right, that is a bug that Andrew outlined in this leveling document I
believe. We just pluck the cpuid results on
On 07/27/2015 11:53 AM, Andy Lutomirski wrote:
On Mon, Jul 27, 2015 at 8:36 AM, Boris Ostrovsky
boris.ostrov...@oracle.com wrote:
On 07/25/2015 01:36 AM, Andy Lutomirski wrote:
Here's v3. It fixes the dazed and confused issue, I hope. It's also
probably a good general attack surface
Split the original patch into 3 distinct fixes.
Andrew Cooper (3):
tools/libxl: Do not set stream-rc in stream_complete()
tools/libxl: Do not fire the stream callback multiple times
tools/libxl: Only continue stream operations if the stream is still
in progress
Part of the callback contract with check_all_finished() is that each
running parallel task shall call it exactly once.
Previously, it was possible for stream_continue() or
write_toolstack_record() to fail and call into check_all_finished(). As
the save helpers callback has fired, it no longer
There is no user in tree.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
tools/libxl/libxl_dom.c | 17 -
tools/libxl/libxl_internal.h | 1 -
2 files changed, 18 deletions(-)
diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
index b3ae5b5..fea 100644
---
Wei Liu (8):
libxl: properly clean up array in libxl_list_cpupool failure path
xl: lockdir should be lockfile in error message
xl: call libxl_dominfo_init in main_list
xl: valid fd can be 0 in main_loadpolicy
xl: call libxl_dominfo_{init,dispose} in main_cpupoolnumasplit
libxlu: free
Always call init and dispose function on info_buf though it's not
always used.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
tools/libxl/xl_cmdimpl.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index
Signed-off-by: Wei Liu wei.l...@citrix.com
---
tools/libxl/xl.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/xl.c b/tools/libxl/xl.c
index f014306..5316ad9 100644
--- a/tools/libxl/xl.c
+++ b/tools/libxl/xl.c
@@ -118,7 +118,7 @@ static void
On Mon, Jul 27, 2015 at 04:18:15PM +0100, Wei Liu wrote:
Found this when I did xl destroy to a hvm guest *without* altp2m turned
on.
Current staging branch.
(XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:C ]
(XEN) CPU:0
(XEN) RIP:e008:[82d0801fce0d]
1 - 100 of 167 matches
Mail list logo