On Mon, Jan 04, 2016 at 04:13:57PM +, Ian Jackson wrote:
> Konrad Rzeszutek Wilk writes ("blkback name greater than 16 characters
> issue"):
> > Way back in the past Jan pointed out this issue
> > http://lists.xenproject.org/archives/html/xen-devel/2015-05/msg03505.html
> >
> > which is that
On Mon, Jan 04, 2016 at 04:03:39PM +0100, Martin Schwidefsky wrote:
> On Mon, 4 Jan 2016 14:20:42 +0100
> Peter Zijlstra wrote:
>
> > On Thu, Dec 31, 2015 at 09:06:30PM +0200, Michael S. Tsirkin wrote:
> > > On s390 read_barrier_depends, smp_read_barrier_depends
> > >
On Mon, Jan 04, 2016 at 08:47:53AM -0800, Joe Perches wrote:
> On Mon, 2016-01-04 at 13:37 +0200, Michael S. Tsirkin wrote:
> > Add virt_ barriers to list of barriers to check for
> > presence of a comment.
>
> Are these virt_ barriers used anywhere?
>
> I see some virtio_ barrier like uses.
On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
This patch implements a common function hvm_scale_tsc() to scale TSC by
using TSC scaling information collected by architecture code.
Signed-off-by: Haozhong Zhang
Reviewed-by: Kevin Tian (except the
On Mon, Jan 04, 2016 at 03:41:28PM +, Stefano Stabellini wrote:
> On Mon, 4 Jan 2016, Lars Kurth wrote:
> > On 04/01/2016 14:47, "Stefano Stabellini"
> > wrote:
> >
> > >Unfortunately I don't have a setup to test this either. Maybe Lars can
> > >find out who
On 1/4/16 2:01 PM, Daniel De Graaf wrote:
> On 22/12/15 16:26, Doug Goldstein wrote:
>> Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
>> within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
>> CONFIG_XSM.
>>
>> CC: Keir Fraser
>> CC: Jan Beulich
On Mon, Jan 04, 2016 at 02:54:20PM +0100, Peter Zijlstra wrote:
> On Mon, Jan 04, 2016 at 02:36:58PM +0100, Peter Zijlstra wrote:
> > On Sun, Jan 03, 2016 at 11:12:44AM +0200, Michael S. Tsirkin wrote:
> > > On Sat, Jan 02, 2016 at 11:24:38AM +, Russell King - ARM Linux wrote:
> >
> > > > My
On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
This patch adds a field tsc_scaling_ratio in struct hvm_vcpu to
record the TSC scaling ratio, and sets it up when tsc_set_info() is
called for a vcpu or when a vcpu is restored or reset.
Before applying the TSC scaling ratio to CPU, we check its
On 04/01/16 15:33, Doug Goldstein wrote:
On 1/4/16 2:01 PM, Daniel De Graaf wrote:
On 22/12/15 16:26, Doug Goldstein wrote:
Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
CONFIG_XSM.
CC: Keir Fraser
On 01/04/2016 04:15 PM, Boris Ostrovsky wrote:
> On 01/04/2016 11:12 AM, David Vrabel wrote:
>> On 28/12/15 21:52, Joao Martins wrote:
>>> This option enables support for pvclock vsyscall/vdso
>>> support on Xen. Default is off, since Xen doesn't
>>> expose yet the PVCLOCK_TSC_STABLE_BIT flag.
On 01/04/2016 04:07 PM, Boris Ostrovsky wrote:
> On 12/28/2015 04:52 PM, Joao Martins wrote:
>> +
>> +static int xen_setup_vsyscall_time_info(int cpu)
>> +{
>> +struct pvclock_vsyscall_time_info *ti;
>> +struct vcpu_register_time_memory_area t;
>> +struct pvclock_vcpu_time_info
flight 77025 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77025/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Tue, Dec 15, 2015 at 02:54:31PM +0100, Marek Marczykowski-Górecki wrote:
> Hi,
>
> Booting kernel with both CONFIG_X86_MCE=y and CONFIG_XEN_MCE_LOG=y
> results in "mce: Unable to init device /dev/mcelog (rc: -16)" error. I
> think that's because both drivers tries to register that character
>
On Mon, Jan 04, 2016 at 03:49:11PM -0500, Konrad Rzeszutek Wilk wrote:
> On Tue, Dec 15, 2015 at 02:54:31PM +0100, Marek Marczykowski-Górecki wrote:
> > Hi,
> >
> > Booting kernel with both CONFIG_X86_MCE=y and CONFIG_XEN_MCE_LOG=y
> > results in "mce: Unable to init device /dev/mcelog (rc: -16)"
On 22/12/15 16:26, Doug Goldstein wrote:
Converts the Config.mk option of FLASK_ENABLE into a Kconfig option for
the hypervisor called CONFIG_FLASK. This commit knowingly breaks the
dependent relationship on XSM_ENABLE which is addressed when XSM_ENABLE
is converted to Kconfig.
Signed-off-by:
On 22/12/15 16:26, Doug Goldstein wrote:
Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
CONFIG_XSM.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
On Mon, Jan 04, 2016 at 02:45:25PM +0100, Peter Zijlstra wrote:
> On Thu, Dec 31, 2015 at 09:08:38PM +0200, Michael S. Tsirkin wrote:
> > This defines __smp_xxx barriers for s390,
> > for use by virtualization.
> >
> > Some smp_xxx barriers are removed as they are
> > defined correctly by
> > You've put the consumer values into the shared page. I'd rather not have
> > to scrutinize your shared ring implementation for other security bugs.
> > Similarly, if there's another security issues like XSA-155 I'd rather
> > not have to look at another non-standard shared ring implementation.
On Mon, Jan 04, 2016 at 04:01:08PM +, Stefano Stabellini wrote:
> CC'ing the Xen tools maintainers and Anthony.
>
> On Tue, 29 Dec 2015, Haozhong Zhang wrote:
> > Reuse existing NVDIMM ACPI code to build ACPI tables for pc-nvdimm
> > devices. The resulting tables are then copied into Xen
On Mon, Jan 04, 2016 at 02:36:58PM +0100, Peter Zijlstra wrote:
> On Sun, Jan 03, 2016 at 11:12:44AM +0200, Michael S. Tsirkin wrote:
> > On Sat, Jan 02, 2016 at 11:24:38AM +, Russell King - ARM Linux wrote:
>
> > > My only concern is that it gives people an additional handle onto a
> > >
On Mon, Jan 04, 2016 at 02:20:42PM +0100, Peter Zijlstra wrote:
> On Thu, Dec 31, 2015 at 09:06:30PM +0200, Michael S. Tsirkin wrote:
> > On s390 read_barrier_depends, smp_read_barrier_depends
> > smp_store_mb(), smp_mb__before_atomic and smp_mb__after_atomic match the
> > asm-generic variants
On Mon, Jan 04, 2016 at 08:07:40AM -0800, Joe Perches wrote:
> On Mon, 2016-01-04 at 13:36 +0200, Michael S. Tsirkin wrote:
> > SMP-only barriers were missing in checkpatch.pl
> >
> > Refactor code slightly to make adding more variants easier.
> >
> > Signed-off-by: Michael S. Tsirkin
The original code is fine.
regards,
dan carpenter
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Thu, 2015-12-24 at 07:47 +, osstest service owner wrote:
> flight 67045 linux-3.18 real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/67045/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>
On Wed, 2015-12-23 at 20:54 +, osstest service owner wrote:
> flight 66976 linux-3.16 real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/66976/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>
This email only tracks big items for xen.git tree. Please reply for items you
woulk like to see in 4.7 so that people have an idea what is going on and
prioritise accordingly.
You're welcome to provide description and use cases of the feature you're
working on.
= Timeline =
We now adopt a fixed
> -Original Message-
[snip]
> > We send the I/O request to the default I/O request server, but no backing
> > DM hands it. We wil wait the I/O forever..
>
> Hmm yes. This needs fixing.
>
> CC'ing Paul who did the ioreq server work.
>
> This bug is caused by the read side effects of
On 04/01/16 10:28, Paul Durrant wrote:
>> -Original Message-
> [snip]
>>> We send the I/O request to the default I/O request server, but no backing
>>> DM hands it. We wil wait the I/O forever..
>> Hmm yes. This needs fixing.
>>
>> CC'ing Paul who did the ioreq server work.
>>
>> This
On Tue, Dec 29, 2015 at 07:31:50PM +0800, Haozhong Zhang wrote:
> This configure is used to specify vNVDIMM devices which are provided to
> the guest. xl parses this configuration and passes the result to qemu
> that is responsible to create vNVDIMM devices.
>
> Signed-off-by: Haozhong Zhang
On Tue, 2015-12-22 at 09:47 -0600, Doug Goldstein wrote:
> On 12/22/15 9:44 AM, Doug Goldstein wrote:
> > This should retain the .config file from the Kconfig process so that we
> > know how this build of Xen was configured.
> >
> > Signed-off-by: Doug Goldstein
> > ---
> >
On 25/12/15 22:09, Toshi Kani wrote:
> Set IORESOURCE_SYSTEM_RAM to 'flags' of struct resource entries
> with "System RAM".
[...]
> --- a/drivers/xen/balloon.c
> +++ b/drivers/xen/balloon.c
> @@ -257,7 +257,7 @@ static struct resource
> *additional_memory_resource(phys_addr_t size)
>
On Thu, 2015-12-31 at 04:45 -0500, Tianyang Chen wrote:
> Budget replenishment is now handled by a dedicated timer which is
> triggered at the most imminent release time of all runnable vcpus.
>
> Signed-off-by: Tianyang Chen
> Signed-off-by: Meng Xu
On 29/12/15 05:49, Ouyangzhaowei (Charles) wrote:
> Hi David,
>
> This patch has been applied to for-linus-4.1b, and we wonder if this patch
> will be applied to linux kernel, or does
> it still needs more test to apply to linux kernel?
Sorry, it looks like I forgot to send a pull request for
On Thu, 31 Dec 2015, Michael S. Tsirkin wrote:
> drivers/xen/xenbus/xenbus_comms.c uses
> full memory barriers to communicate with the other side.
>
> For guests compiled with CONFIG_SMP, smp_wmb and smp_mb
> would be sufficient, so mb() and wmb() here are only needed if
> a non-SMP guest runs on
flight 38586 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38586/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-armhf-sid-netboot-pygrub 9 debian-di-install fail like 38567
On 04/01/16 09:37, Paul Durrant wrote:
>>> + * The layout of the shared page is as follows:
>>> + *
>>> + *0 1 2 3 4 5 6 7 octet
>>> + * +-+-+-+-+-+-+-+-+
>>> + * |req_cons |req_prod |
>>> + *
On Tue, 2015-12-22 at 17:12 +, Chris Law wrote:
> Hey can someone add AMD Radeon R9 390 to the Tested Adapters list here ht
> tp://wiki.xenproject.org/wiki/Xen_VGA_Passthrough_Tested_Adapters
>
> I've requested edit access, but don't yet have it.
Sorry, looks like our coverage was a bit
On 31/12/15 19:10, Michael S. Tsirkin wrote:
> drivers/xen/xenbus/xenbus_comms.c uses
> full memory barriers to communicate with the other side.
>
> For guests compiled with CONFIG_SMP, smp_wmb and smp_mb
> would be sufficient, so mb() and wmb() here are only needed if
> a non-SMP guest runs on
On 31/12/15 19:10, Michael S. Tsirkin wrote:
> include/xen/interface/io/ring.h uses
> full memory barriers to communicate with the other side.
>
> For guests compiled with CONFIG_SMP, smp_wmb and smp_mb
> would be sufficient, so mb() and wmb() here are only needed if
> a non-SMP guest runs on an
Most #DB exceptions are traps rather than faults, meaning that the instruction
pointer in the exception frame points after the instruction rather than at it.
However, VMX intercepts all have fault semantics, even when intercepting a
trap. Re-injecting an intercepted trap as a fault causes an
Hi Stefano,
On Thu, 2015-12-24 at 21:26 +, osstest service owner wrote:
> flight 67093 qemu-upstream-4.6-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/67093/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be
On Mon, 2015-12-21 at 10:16 -0700, Jan Beulich wrote:
> > > > On 21.12.15 at 18:01, wrote:
> > flight 66718 xen-4.4-testing real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/66718/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are
Andrew Morton writes:
> On Tue, 22 Dec 2015 17:32:30 +0100 Vitaly Kuznetsov
> wrote:
>
>> Currently, all newly added memory blocks remain in 'offline' state unless
>> someone onlines them, some linux distributions carry special udev rules
>>
> -Original Message-
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: 04 January 2016 10:56
> To: Paul Durrant; David Vrabel; xen-de...@lists.xenproject.org
> Cc: Tim (Xen.org); Keir (Xen.org); Ian Campbell; Jan Beulich; Ian Jackson
> Subject: Re: [Xen-devel] [PATCH 2/3]
On Mon, 2015-12-21 at 04:32 -0700, Jan Beulich wrote:
> > > > On 18.12.15 at 23:09, wrote:
> > On 18/12/2015 21:49, Doug Goldstein wrote:
> > > On 12/18/15 3:35 PM, Andrew Cooper wrote:
> > > > On 18/12/2015 20:06, Doug Goldstein wrote:
> > > > > Use the Kconfig
> -Original Message-
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: 04 January 2016 11:18
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Cc: Tim (Xen.org); Keir (Xen.org); Ian Campbell; Jan Beulich; Ian Jackson
> Subject: Re: [Xen-devel] [PATCH 2/3] public/io/netif.h:
On 22/12/15 16:32, Vitaly Kuznetsov wrote:
> @@ -1292,6 +1304,11 @@ int __ref add_memory_resource(int nid, struct resource
> *res)
> /* create new memmap entry */
> firmware_map_add_hotplug(start, start + size, "System RAM");
>
> + /* online pages if requested */
> + if
On 04/01/16 11:21, Paul Durrant wrote:
>> -Original Message-
>> From: David Vrabel [mailto:david.vra...@citrix.com]
>> Sent: 04 January 2016 11:18
>> To: Paul Durrant; xen-de...@lists.xenproject.org
>> Cc: Tim (Xen.org); Keir (Xen.org); Ian Campbell; Jan Beulich; Ian Jackson
>> Subject:
On Mon, 2015-12-21 at 08:35 -0600, Doug Goldstein wrote:
> On 12/21/15 6:11 AM, Jan Beulich wrote:
> > > > > On 18.12.15 at 22:35, wrote:
> > > Since we now support changing Xen options with Kconfig, we should
> > > save
> > > the configuration that was used to build up Xen.
> -Original Message-
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: 04 January 2016 11:29
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Cc: Tim (Xen.org); Keir (Xen.org); Ian Campbell; Jan Beulich; Ian Jackson
> Subject: Re: [Xen-devel] [PATCH 2/3] public/io/netif.h:
On Sat, 2015-12-26 at 23:38 +, Andrew Cooper wrote:
> On 26/12/2015 23:27, Carl Patenaude Poulin wrote:
> > Hi all,
> >
> > I'm writing some development tools for my team. Given a domain ID,
> > is there a way to programmatically check whether gdbsx is running on
> > that domain and what port
On Mon, Dec 14, 2015 at 11:46:35AM -0500, Konrad Rzeszutek Wilk wrote:
> Hey,
>
> Way back in the past Jan pointed out this issue
> http://lists.xenproject.org/archives/html/xen-devel/2015-05/msg03505.html
>
> which is that the device name is "blkback.."
>
> for exmaple: blkback.8.xvda,
On Wed, 30 Dec 2015, Michael S. Tsirkin wrote:
> drivers/xen/xenbus/xenbus_comms.c uses
> full memory barriers to communicate with the other side.
>
> For guests compiled with CONFIG_SMP, smp_wmb and smp_mb
> would be sufficient, so mb() and wmb() here are only needed if
> a non-SMP guest runs on
On Thu, 31 Dec 2015, Michael S. Tsirkin wrote:
> include/xen/interface/io/ring.h uses
> full memory barriers to communicate with the other side.
>
> For guests compiled with CONFIG_SMP, smp_wmb and smp_mb
> would be sufficient, so mb() and wmb() here are only needed if
> a non-SMP guest runs on
On Tue, 2015-12-22 at 14:40 +, Stefano Stabellini wrote:
> On Tue, 22 Dec 2015, Jan Beulich wrote:
> > > > > On 22.12.15 at 14:55, wrote:
> > > On Mon, 21 Dec 2015, Jan Beulich wrote:
> > > > > > > On 20.12.15 at 13:25, wrote:
>
On Mon, 2015-12-21 at 04:54 -0700, Jan Beulich wrote:
> > > > On 21.12.15 at 04:05, wrote:
> > flight 66638 xen-4.3-testing real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/66638/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 04 January 2016 10:36
> To: Paul Durrant; Wen Congyang
> Cc: xen devel; Ian Campbell; Ian Jackson; Wei Liu
> Subject: Re: [Xen-devel] question about migration
>
> On 04/01/16 10:28, Paul Durrant wrote:
>
I think the original code is fine.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 04/01/16 11:14, Paul Durrant wrote:
You should use the standard ring format and infrastructure.
>>>
>>> Is there one for variable message size rings? I didn't find one. I
>>> don't want to use the fixed size balanced ring macros for control
>>> messages as fixed size messages really aren't
flight 76943 qemu-upstream-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76943/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 62044
/20160104-194916
config: x86_64-randconfig-x008-01040711 (attached as .config)
reproduce:
# save the attached .config to linux build tree
make ARCH=x86_64
All errors (new ones prefixed by >>):
drivers/xen/events/events_fifo.c: In function 'consume_one_event':
>> driver
On Wed, Dec 30, 2015 at 07:48:57PM +0800, Haozhong Zhang wrote:
> I split the previous patch series "[PATCH 0/4] add support for vNVDIMM"
> into two parts. This is the first part that enables clflushopt/clwb/pcommit
> instructions for HVM guests.
>
> [The second part will be sent separately after
As part of memory barrier cleanup, this patchset
extends checkpatch to make it easier to stop
incorrect memory barrier usage.
This applies on top of my series
arch: barrier cleanup + barriers for virt
and will be included in the next version of the series.
Michael S. Tsirkin (3):
Introduction of __smp barriers cleans up a bunch of duplicate code, but
it gives people an additional handle onto a "new" set of barriers - just
because they're prefixed with __* unfortunately doesn't stop anyone from
using it (as happened with other arch stuff before.)
Add a checkpatch test so
SMP-only barriers were missing in checkpatch.pl
Refactor code slightly to make adding more variants easier.
Signed-off-by: Michael S. Tsirkin
---
scripts/checkpatch.pl | 9 -
1 file changed, 8 insertions(+), 1 deletion(-)
diff --git a/scripts/checkpatch.pl
Add virt_ barriers to list of barriers to check for
presence of a comment.
Signed-off-by: Michael S. Tsirkin
---
scripts/checkpatch.pl | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/scripts/checkpatch.pl b/scripts/checkpatch.pl
index e3f9ad9..5fb6ef7
On 04/01/16 11:46, Michael S. Tsirkin wrote:
> drivers/xen/events/events_fifo.c uses rmb() to communicate with the
> other side.
>
> For guests compiled with CONFIG_SMP, smp_rmb would be sufficient, so
> rmb() here is only needed if a non-SMP guest runs on an SMP host.
>
> Switch to the virt_rmb
drivers/xen/events/events_fifo.c uses rmb() to communicate with the
other side.
For guests compiled with CONFIG_SMP, smp_rmb would be sufficient, so
rmb() here is only needed if a non-SMP guest runs on an SMP host.
Switch to the virt_rmb barrier which serves this exact purpose.
Pull in
On Thu, 2015-12-31 at 17:50 +, Jason Long wrote:
> Hello.
> Can anyone tell me about "Ganeti" ? Is it a replacement for Xen?
https://code.google.com/p/ganeti/ answers this quite clearly IMHO. You
should have been able to easily discover this page for yourself before
asking here.
(Completely
On Wed, 30 Dec 2015, Michael S. Tsirkin wrote:
> include/xen/interface/io/ring.h uses
> full memory barriers to communicate with the other side.
>
> For guests compiled with CONFIG_SMP, smp_wmb and smp_mb
> would be sufficient, so mb() and wmb() here are only needed if
> a non-SMP guest runs on
On 2015/11/30 23:14, Julien Grall wrote:
> Hi Shannon,
>
> On 17/11/15 09:40, shannon.z...@linaro.org wrote:
>> diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c
>> index 53c7452..78d8ae9 100644
>> --- a/xen/common/efi/boot.c
>> +++ b/xen/common/efi/boot.c
>> @@ -13,6 +13,7 @@
>>
> -Original Message-
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: 23 December 2015 13:28
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Cc: Keir (Xen.org); Ian Campbell; Tim (Xen.org); Ian Jackson; Jan Beulich
> Subject: Re: [Xen-devel] [PATCH 2/3] public/io/netif.h:
On Mon, 2016-01-04 at 23:07 +0200, Michael S. Tsirkin wrote:
> On Mon, Jan 04, 2016 at 08:47:53AM -0800, Joe Perches wrote:
> > On Mon, 2016-01-04 at 13:37 +0200, Michael S. Tsirkin wrote:
> > > Add virt_ barriers to list of barriers to check for
> > > presence of a comment.
> >
> > Are these
This run is configured for baseline tests only.
flight 38588 linux-3.18 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38588/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start
flight 76908 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76908/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 5 xen-build fail REGR. vs. 66458
build-i386-prev
Hi Michael,
On Thu, Dec 31, 2015 at 09:08:22PM +0200, Michael S. Tsirkin wrote:
> This defines __smp_xxx barriers for metag,
> for use by virtualization.
>
> smp_xxx barriers are removed as they are
> defined correctly by asm-generic/barriers.h
>
> Note: as __smp_XX macros should not depend on
flight 76941 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76941/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 67110
Tests which did not succeed, but
On 01/04/16 12:48, Boris Ostrovsky wrote:
> On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
> >When the TSC mode of a HVM container is TSC_MODE_DEFAULT or
> >TSC_MODE_PVRDTSCP and no TSC emulation is used, the existing
> >tsc_get_info() uses the host TSC frequency (cpu_khz) as the guest TSC
>
On 01/04/2016 03:41 PM, Joao Martins wrote:
On 01/04/2016 04:07 PM, Boris Ostrovsky wrote:
On 12/28/2015 04:52 PM, Joao Martins wrote:
+
+ size = PAGE_ALIGN(sizeof(struct pvclock_vsyscall_time_info));
+ mem = memblock_alloc(size, PAGE_SIZE);
+ if (!mem)
+
On Mon, 2016-01-04 at 22:45 +0200, Michael S. Tsirkin wrote:
> On Mon, Jan 04, 2016 at 08:07:40AM -0800, Joe Perches wrote:
> > On Mon, 2016-01-04 at 13:36 +0200, Michael S. Tsirkin wrote:
> > > SMP-only barriers were missing in checkpatch.pl
> > >
> > > Refactor code slightly to make adding more
flight 76914 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76914/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 5 xen-build fail REGR. vs. 65650
build-i386
On 01/04/16 13:09, Boris Ostrovsky wrote:
> On 12/30/2015 10:03 PM, Haozhong Zhang wrote:
> >This patch makes the pvclock return the scaled host TSC and
> >corresponding scaling parameters to HVM domains if guest TSC is not
> >emulated and TSC scaling is enabled.
> >
> >Signed-off-by: Haozhong
On 01/04/16 15:57, Stefano Stabellini wrote:
> On Tue, 29 Dec 2015, Xiao Guangrong wrote:
> > On 12/29/2015 07:28 PM, Haozhong Zhang wrote:
> > > This patch series extends current vNVDIMM implementation to provide
> > > vNVDIMM to HVM domains when QEMU is used as the device model of Xen.
> > >
>
flight 76919 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/76919/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 66879
Hi Michael,
On Thu, Dec 31, 2015 at 09:07:42PM +0200, Michael S. Tsirkin wrote:
> This defines __smp_xxx barriers for powerpc
> for use by virtualization.
>
> smp_xxx barriers are removed as they are
> defined correctly by asm-generic/barriers.h
>
> This reduces the amount of arch-specific
On 01/04/16 15:56, Stefano Stabellini wrote:
> On Tue, 29 Dec 2015, Haozhong Zhang wrote:
> > This patch series extends current vNVDIMM implementation to provide
> > vNVDIMM to HVM domains when QEMU is used as the device model of Xen.
> >
> > This patch series is based on upstream qemu rather of
This introduces a way to have a restricted VPMU, by specifying one of two
predefined groups of PMCs to make available. For secure environments, this
allows the VPMU to be used without needing to enable all PMCs.
Signed-off-by: Brendan Gregg
Reviewed-by: Boris Ostrovsky
The libxl_device_nic structure supports specifying an outgoing rate
limit based on a time interval and bytes allowed per interval. In xl
config a rate limit is specified as "/s@". INTERVAL
is optional and defaults to 50ms.
libvirt expresses outgoing limits by average (required), peak, burst,
and
The xen sexpr config format has long supported specifying vif rate
limiting, e.g.
(device
(vif
(mac '00:16:3e:1b:b1:47')
(rate '10240KB/s')
...
)
)
Add support for mapping rate to and from in the xenconfig
sexpr parser and formatter. rate is mapped to the required
Both xm and xl config have long supported specifying vif rate
limiting, e.g.
vif = [ 'mac=00:16:3E:74:3d:76,bridge=br0,rate=10MB/s' ]
Add support for mapping rate to and from in the xenconfig
parser and formatter. rate is mapped to the required 'average' attribute
of the element, e.g.
Happy New Year!
This small series adds support for specifying vif outgoing rate limits
in Xen. The first patch adds support for converting rate limits between
sexpr config and domXML. The second patch does the same for xl/xm config.
The third patch adds outgoing rate limiting to the libxl driver.
Sorry for the delay...
On Thu, Dec 17, 2015 at 10:12 PM, Tian, Kevin wrote:
> > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> > Sent: Tuesday, December 08, 2015 3:14 AM
> >
> > On 11/30/2015 07:39 PM, Brendan Gregg wrote:
> > > This introduces a way to have a
On 01/04/16 16:01, Stefano Stabellini wrote:
> CC'ing the Xen tools maintainers and Anthony.
>
> On Tue, 29 Dec 2015, Haozhong Zhang wrote:
> > Reuse existing NVDIMM ACPI code to build ACPI tables for pc-nvdimm
> > devices. The resulting tables are then copied into Xen guest domain so
> > tha
Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
CONFIG_XSM.
CC: Daniel De Graaf
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
On 2015/11/30 23:22, Julien Grall wrote:
> Hi,
>
> On 27/11/15 12:04, Stefano Stabellini wrote:
>> > On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
>>> >> From: Parth Dixit
>>> >>
>>> >> Create a helper function for mapping with cached attributes.
>>> >>
>>> >>
For example: if the secondary host is down, and we fail to send the data to
the secondary host. xc_domain_save() returns 0. So in the function
libxl__xc_domain_save_done(), rc is 0(the helper program exits normally),
and retval is 0(it is xc_domain_save()'s return value). In such case, we
just
Wen Congyang (5):
remus: don't call stream_continue() when doing failover
remus: don't write xenstore data if it fails
tools/libxc: don't send end record if remus fails
tools/libxc: error handling for the postcopy() callback
tools/libxl: remove unused function
stream_continue() is used for migration to read emulator
xenstore data and emulator context. For remus, if we do
failover, we have read it in the checkpoint cycle, and
we only need to complete the stream.
Signed-off-by: Wen Congyang
Reviewed-by: Andrew Cooper
Signed-off-by: Wen Congyang
---
tools/libxc/xc_sr_save.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/tools/libxc/xc_sr_save.c b/tools/libxc/xc_sr_save.c
index 76ebb34..8090fcf 100644
--- a/tools/libxc/xc_sr_save.c
+++ b/tools/libxc/xc_sr_save.c
@@
Signed-off-by: Wen Congyang
Reviewed-by: Andrew Cooper
---
tools/libxc/xc_sr_save.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxc/xc_sr_save.c b/tools/libxc/xc_sr_save.c
index cefcef5..76ebb34 100644
---
1 - 100 of 227 matches
Mail list logo