On 20.05.15 at 17:54, david.vra...@citrix.com wrote:
@@ -505,7 +526,7 @@ static int grant_map_exists(const struct domain *ld,
unsigned long mfn,
unsigned int *ref_count)
{
-const struct active_grant_entry *act;
+struct
Hi
Dario,
Thanks for your comments,
Here Priority will be prime Method of Sorting of VCPUs in local run queue
in addition to it I am Proposing Shortest Credit First
which is similar to SJF not exactly SJF of O.S. because this is credit
based.
My suggestion is Replace FCFS by SCF(Shortest
On 21/05/2015 08:13, Jan Beulich wrote:
On 20.05.15 at 15:10, andrew.coop...@citrix.com wrote:
As an extension to 931f5777c7 (public: clarify xen_arch_domainconfig
ABI statement) limit the respective definitions' visibility to
hypervisor and tools.
Signed-off-by: Jan Beulich
flight 56821 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56821/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail REGR. vs. 56728
On Thu, 2015-05-21 at 07:43 +0100, Jan Beulich wrote:
On 21.05.15 at 05:34, osst...@xenbits.xen.org wrote:
flight 56811 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56811/
Regressions :-(
Tests which did not succeed and are blocking,
including tests
On Thu, 2015-05-21 at 08:13 +0100, Jan Beulich wrote:
On 20.05.15 at 15:10, andrew.coop...@citrix.com wrote:
As an extension to 931f5777c7 (public: clarify xen_arch_domainconfig
ABI statement) limit the respective definitions' visibility to
hypervisor and tools.
Signed-off-by: Jan Beulich
flight 56875 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56875/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
Dne 21.5.2015 v 02:53 Luis R. Rodriguez napsal(a):
From: Luis R. Rodriguez mcg...@suse.com
Michal Marek, Xen folks (David Vrabel, Konrad, Ian), which tree should
these go through?
Not kbuild, if I may ask :). Otherwise people will find me in
get_maintainer.pl output and keep CCing me on
On Thu, 2015-05-21 at 14:56 +0800, Robert Hu wrote:
On Wed, 2015-05-20 at 16:39 +0100, Ian Campbell wrote:
On Wed, 2015-05-13 at 11:36 +0800, longtao.pang wrote:
parsing grub which has 'submenu' primitive
Changes to support '/boot' leading paths of kernel, xen, in grub
Use - instead of _ for monitor types.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Reviewed-by: Dario Faggioli dario.faggi...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxl/xl_cmdimpl.c | 6 +++---
tools/libxl/xl_cmdtable.c | 6 +++---
2 files changed, 6
This is the xc/xl changes to support Intel Cache Allocation
Technology(CAT).
'xl psr-hwinfo' is updated to show CAT info and two new commands
for CAT are introduced:
- xl psr-cat-cbm-set [-s socket] domain cbm
Set cache capacity bitmasks(CBM) for a domain.
- xl psr-cat-show domain
Show CAT
Add dedicated one to show hardware information.
[root@vmm-psr]xl psr-hwinfo
Cache Monitoring Technology (CMT):
Enabled : 1
Total RMID : 63
Supported monitor types:
cache-occupancy
total-mem-bandwidth
local-mem-bandwidth
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Changes in v8:
Address comments from Jan, mainly:
* Remove total_cpus and retrofit the algorithm for calculating nr_sockets.
* Change per-socket cpumask allocation as on demand.
* Remove cat_socket_init_bitmap and rename cat_socket_enable_bitmap.
* Ensure opt_cos_max is not too small.
* Use the
Add document to introduce basic concepts and terms in PSR family
technologies and the xl interfaces.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
Changes in v7:
* Correct 'xl psr-hwinfo'.
Changes in v6:
* Address comments from Ian.
On context switch, write the the domain's Class of Service(COS) to MSR
IA32_PQR_ASSOC, to notify hardware to use the new COS.
For performance reason, the COS mask for current cpu is also cached in
the local per-CPU variable.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Jan
Maintain socket_cpumask which contains all the HT and core siblings
in the same socket.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
Changes in v8:
* Remove total_cpus and retrofit the algorithm for calculating nr_sockets.
* Change per-socket cpumask allocation as on demand.
*
General CAT information such as maximum COS and CBM length are exposed to
user space by a SYSCTL hypercall, to help user space to construct the CBM.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
Changes in v7:
* Copyback psr_cat_op
For each socket, a COS to CBM mapping structure is maintained for each
COS. The mapping is indexed by COS and the value is the corresponding
CBM. Different VMs may use the same CBM, a reference count is used to
indicate if the CBM is available.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Add libxl_socket_bitmap_alloc() to allow allocating a socket specific
libxl_bitmap (as it is for cpu/node bitmap).
Internal function libxl__count_physical_sockets() is introduced together
to get the socket count when the size of bitmap is not specified.
Signed-off-by: Chao Peng
In Xen's implementation, the CAT enforcement granularity is per domain.
Due to the length of CBM and the number of COS may be socket-different,
each domain has COS ID for each socket. The domain get COS=0 by default
and at runtime its COS is then allocated dynamically when user specifies
a CBM for
For CAT, COS is maintained in hypervisor only while CBM is exposed to
user space directly to allow getting/setting domain's cache capacity.
For each specified CBM, hypervisor will either use a existed COS which
has the same CBM or allocate a new one if the same CBM is not found. If
the allocation
Add xsm policies for Cache Allocation Technology(CAT) related hypercalls
to restrict the functions visibility to control domain only.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov
---
tools/flask/policy/policy/modules/xen/xen.if | 2 +-
Detect Intel Cache Allocation Technology(CAT) feature and store the
cpuid information for later use. Currently only L3 cache allocation is
supported. The L3 CAT features may vary among sockets so per-socket
feature information is stored. The initialization can happen either at
boot time or when
On Thu, 2015-05-21 at 07:50 +0100, Jan Beulich wrote:
On 21.05.15 at 08:40, huaitong@intel.com wrote:
@@ -329,7 +340,7 @@ static uint64_t acpi_pm_ticks_elapsed(uint64_t t1,
uint64_t t2)
}
uint64_t (*__read_mostly cpuidle_get_tick)(void) = get_acpi_pm_tick;
-static uint64_t
When checking the ACPI funciton of C-status, after 100 seconds sleep,
the sampling value of C0 status from the xenpm tool decreases.
Because C0=NOW()-C1-C2-C3-C4, when NOW() value is during idle time,
NOW() value is bigger than last C-status update time, and C0 value
is also bigger than ture
On 21.05.15 at 08:40, huaitong@intel.com wrote:
@@ -329,7 +340,7 @@ static uint64_t acpi_pm_ticks_elapsed(uint64_t t1,
uint64_t t2)
}
uint64_t (*__read_mostly cpuidle_get_tick)(void) = get_acpi_pm_tick;
-static uint64_t (*__read_mostly ticks_elapsed)(uint64_t, uint64_t)
+uint64_t
branch xen-unstable
xen branch xen-unstable
job build-amd64
test xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in
flight 56818 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56818/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect
test-amd64-amd64-pair
On 20.05.15 at 19:00, julien.gr...@citrix.com wrote:
On 20/05/15 17:22, Jan Beulich wrote:
On 17.05.15 at 22:03, parth.di...@linaro.org wrote:
Xen environment table is ACPI table that is used to pass grant table
and event channel interrupt information to dom0.
The documents linked to by
On 21.05.15 at 05:34, osst...@xenbits.xen.org wrote:
flight 56811 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56811/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 17
flight 56874 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56874/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 56492
build-amd64
On 20.05.15 at 15:10, andrew.coop...@citrix.com wrote:
As an extension to 931f5777c7 (public: clarify xen_arch_domainconfig
ABI statement) limit the respective definitions' visibility to
hypervisor and tools.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/include/public/arch-arm.h
+++
When checking the ACPI funciton of C-status, after 100 seconds sleep,
the sampling value of C0 status from the xenpm tool decreases.
Because C0=NOW()-C1-C2-C3-C4, when NOW() value is during idle time,
NOW() value is bigger than last C-status update time, and C0 value
is also bigger than ture
On Wed, 2015-05-20 at 16:39 +0100, Ian Campbell wrote:
On Wed, 2015-05-13 at 11:36 +0800, longtao.pang wrote:
parsing grub which has 'submenu' primitive
Changes to support '/boot' leading paths of kernel, xen, in grub
Refactor installation of overlays for guest used
On Thu, 2015-05-21 at 06:59 +, osstest service user wrote:
branch xen-unstable
xen branch xen-unstable
job build-amd64
test xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen
On Wed, 2015-05-20 at 18:37 +0100, Stefano Stabellini wrote:
[...]
As a reference, this is a split of the xc_ calls made by QEMU, based on
functionality areas:
Very useful, thanks. I've added this to the doc.
___
Xen-devel mailing list
On 20 May 2015 at 21:43, Jan Beulich jbeul...@suse.com wrote:
On 17.05.15 at 22:03, parth.di...@linaro.org wrote:
add new function acpi_parse_entries which takes
acpi table as argument. This will avoid fetching table
everytime in acpi_table_parse_entries.
This explanation doesn't make a
The osstest instance in Cambridge appears to have found a machine
specific failure which a bisect has blamed on the x86/domctl: cleanup
patch below.
(NB: this is not the arm releated leak check thing which is currently
hitting the xen-unstable flights in the main osstest instance)
Since the logs
-Original Message-
From: Ian Campbell [mailto:ian.campb...@citrix.com]
Sent: Wednesday, May 20, 2015 11:39 PM
To: Pang, LongtaoX
Cc: xen-devel@lists.xen.org; ian.jack...@eu.citrix.com; wei.l...@citrix.com;
Hu,
Robert
Subject: Re: [OSSTEST Nested PATCH v10 0/9] Introduction of
On 21.05.15 at 11:16, ian.campb...@citrix.com wrote:
The osstest instance in Cambridge appears to have found a machine
specific failure which a bisect has blamed on the x86/domctl: cleanup
patch below.
(NB: this is not the arm releated leak check thing which is currently
hitting the
On 21.05.15 at 10:48, huaitong@intel.com wrote:
On Thu, 2015-05-21 at 07:50 +0100, Jan Beulich wrote:
On 21.05.15 at 08:40, huaitong@intel.com wrote:
@@ -329,7 +340,7 @@ static uint64_t acpi_pm_ticks_elapsed(uint64_t t1,
uint64_t t2)
}
uint64_t (*__read_mostly
On 21.05.15 at 11:14, parth.di...@linaro.org wrote:
On 20 May 2015 at 21:43, Jan Beulich jbeul...@suse.com wrote:
On 17.05.15 at 22:03, parth.di...@linaro.org wrote:
add new function acpi_parse_entries which takes
acpi table as argument. This will avoid fetching table
everytime in
flight 56886 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56886/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect
test-amd64-amd64-pair
Code for initializing/tearing down PMU for PV guests
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov
Acked-by: Jan Beulich jbeul...@suse.com
---
tools/flask/policy/policy/modules/xen/xen.te | 4 +
xen/arch/x86/domain.c
No need to compute those masks on every MSR access.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
Changes in v22:
* Added ARCH_CNTR_ENABLED macro
xen/arch/x86/hvm/vmx/vpmu_core2.c | 28 ++--
1 file changed, 18 insertions(+), 10 deletions(-)
diff --git
Add runtime interface for setting PMU mode and flags. Three main modes are
provided:
* XENPMU_MODE_OFF: PMU is not virtualized
* XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts.
* XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0
can profile
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an
error was encountered during MSR processing (instead of stating that the access
was to a VPMU register).
As part of this patch we also check for validity of certain MSR accesses right
when we determine which register
Add pmu.h header files, move various macros and structures that will be
shared between hypervisor and PV guests to it.
Move MSR banks out of architectural PMU structures to allow for larger sizes
in the future. The banks are allocated immediately after the context and
PMU structures store offsets
Export Xen's symbols as {addresstypename} triplet via new XENPF_get_symbol
hypercall
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Reviewed-by: Dietmar Hahn
The two routines share most of their logic.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Reviewed-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com
---
xen/arch/x86/hvm/vpmu.c| 75 --
xen/include/asm-x86/hvm/vpmu.h | 14 ++--
2 files
We have several outstanding patch series which add devices that have
two levels: a controller and individual devices attached to that
controller.
In the interest of consistency, this patch introduces a section that
sketches out a template for interfaces for such devices.
Signed-off-by: George
On Thu, May 21, 2015 at 04:20:27PM +0800, Michal Marek wrote:
Dne 21.5.2015 v 02:53 Luis R. Rodriguez napsal(a):
From: Luis R. Rodriguez mcg...@suse.com
Michal Marek, Xen folks (David Vrabel, Konrad, Ian), which tree should
these go through?
Not kbuild, if I may ask :). Otherwise
Changes in v22:
* Clarified access permissions on shared fileds (patch 2)
* Added ARCH_CNTR_ENABLED macro (patch 10)
* Use hypervisor-private VPMU_CACHED instead of shared PMU_CACHED
(patch 11)
* A few cleanups (patch 11)
Changes in v21:
* Keep running VPMU's context private to hypervisor and
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops
for VCPU are not initialized (which is the case, for example, for PV guests that
are not VPMU-enlightened) access to MSRs will return failure.
Dump VPMU state for all domains (HVM and PV) when requested.
Signed-off-by:
Since PMU is now not HVM specific we can move VPMU-related files up from
arch/x86/hvm/ directory.
Specifically:
arch/x86/hvm/vpmu.c - arch/x86/cpu/vpmu.c
arch/x86/hvm/svm/vpmu.c - arch/x86/cpu/vpmu_amd.c
arch/x86/hvm/vmx/vpmu_core2.c - arch/x86/cpu/vpmu_intel.c
Add support for handling PMU interrupts for PV(H) guests.
VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush
hypercall. This allows the guest to access PMU MSR values that are stored in
VPMU context which is shared between hypervisor and domain, thus avoiding
traps to
Move some VPMU initilization operations into __initcalls to avoid performing
same tests and calculations for each vcpu.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Jan Beulich jbeul...@suse.com
---
xen/arch/x86/hvm/svm/vpmu.c | 106 --
vpmu structure will be used for both HVM and PV guests. Move it from
hvm_vcpu to arch_vcpu.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Kevin Tian kevin.t...@intel.com
Reviewed-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com
Save VPMU state during context switch for both HVM and PV(H) guests.
A subsequent patch (x86/VPMU: NMI-based VPMU support) will make it possible
for vpmu_switch_to() to call vmx_vmcs_try_enter()-vcpu_pause() which needs
is_running to be correctly set/cleared. To prepare for that, call
Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged
domain (dom0) profile both itself (and the hypervisor) and the guests. While
this mode is on profiling in guests is disabled.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Jan Beulich
On 05/21/2015 06:07 PM, George Dunlap wrote:
We have several outstanding patch series which add devices that have
two levels: a controller and individual devices attached to that
controller.
In the interest of consistency, this patch introduces a section that
sketches out a template for
On 05/21/2015 06:07 PM, George Dunlap wrote:
We have several outstanding patch series which add devices that have
two levels: a controller and individual devices attached to that
controller.
In the interest of consistency, this patch introduces a section that
sketches out a template for
On Thu, May 21, 2015 at 11:49:17PM +0900, Masahiro Yamada wrote:
Hi,
I am not familiar with xen at all, just some comments
from the build system side.
2015-05-21 3:53 GMT+09:00 Luis R. Rodriguez mcg...@do-not-panic.com:
From: Luis R. Rodriguez mcg...@suse.com
This lets you build
On 21/05/15 19:02, Ian Campbell wrote:
On Thu, 2015-05-21 at 19:44 +0200, Olaf Hering wrote:
On Thu, May 21, Ian Campbell wrote:
My pod2text doesn't seem to complain, but does this help?
Yes, this fixes it.
Pushed, thanks.
OOI what version of pod2text are you both using which exposes this?
On 21/05/15 17:34, Ian Campbell wrote:
On Thu, 2015-05-21 at 18:23 +0200, Olaf Hering wrote:
On Thu, May 21, Ian Campbell wrote:
On Thu, 2015-05-14 at 15:05 +0100, Ian Campbell wrote:
On Thu, 2015-05-14 at 13:41 +0100, Ian Jackson wrote:
xm migrate would do non-live migration (effectively,
On Thu, 2015-05-21 at 17:17 +0200, Marco Steinacher wrote:
Shall I try to build a 3.16.0-4-686-pae kernel with
CONFIG_NEED_DMA_MAP_STATE=y?
Yes, this is what I would recommend. Although it's not as simple as
turning it on, you actually need to patch the Kconfig as in this mail:
On Thu, May 21, Ian Campbell wrote:
My pod2text doesn't seem to complain, but does this help?
Yes, this fixes it.
Thanks!
Subject: [PATCH] docs: correct pod syntax
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 21.05.15 at 13:08, andrew.coop...@citrix.com wrote:
On 21/05/15 11:15, Jan Beulich wrote:
This is needed as stacks are going to become non-executable. Use
separate stub pages (shared among suitable CPUs on the same node)
instead.
Stub areas (currently 128 bytes each) are being split into
Hi everyone,
I've copied the committers, Lars as community manager, Wei as the
release manager, George as the scheduler maintainer, RT-Xen and
DornerWorks people, which have some interest in the field, I believe.
Please, widen the crowd if you think it's necessary/best.
Straight to the point:
diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c
index 9d5f9f3..310f0e8 100644
--- a/xen/arch/x86/hvm/event.c
+++ b/xen/arch/x86/hvm/event.c
@@ -88,55 +88,29 @@ static int hvm_event_traps(uint8_t sync,
vm_event_request_t *req)
return 1;
}
-static inline
-void
On 21.05.15 at 12:52, julien.gr...@citrix.com wrote:
On 21/05/15 11:46, Jan Beulich wrote:
On 21.05.15 at 12:34, julien.gr...@citrix.com wrote:
On 21/05/15 07:22, Jan Beulich wrote:
The linked to document (on our wiki) is versioned 0.something,
which doesn't look like a final stable version.
On 21/05/15 12:48, Jan Beulich wrote:
On 21.05.15 at 13:08, andrew.coop...@citrix.com wrote:
On 21/05/15 11:15, Jan Beulich wrote:
This is needed as stacks are going to become non-executable. Use
separate stub pages (shared among suitable CPUs on the same node)
instead.
Stub areas
On 21/05/15 12:38, Jan Beulich wrote:
On 21.05.15 at 12:52, julien.gr...@citrix.com wrote:
On 21/05/15 11:46, Jan Beulich wrote:
On 21.05.15 at 12:34, julien.gr...@citrix.com wrote:
On 21/05/15 07:22, Jan Beulich wrote:
The linked to document (on our wiki) is versioned 0.something,
which
On 05/21/2015 01:11 PM, George Dunlap wrote:
On 05/21/2015 11:52 AM, Juergen Gross wrote:
From your description, xm usb-assignable-list would list *all* USB
devices on the system which were available to be assigned to a guest.
xl pci-assignable-list does *not* list all PCI devices on a
On 05/21/2015 12:58 PM, Juergen Gross wrote:
Yes, from a pedantic perspective, both will tell you on which devices
you can run X-attach without any extra arguments. But from a
practical perspective, xm usb-assignable-list tells you something
practical about the state of devices on the whole
On 17/05/15 21:03, Parth Dixit wrote:
refactor gic related functions into dt and generic parts
this will be helpful when adding acpi support for gic
Signed-off-by: Parth Dixit parth.di...@linaro.org
---
xen/arch/arm/gic-v2.c | 13 ++---
xen/arch/arm/gic.c| 7 ++-
2 files
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
ACPI on Xen hypervisor uses MADT table for proper GIC initialization.
It needs to parse GIC related subtables, collect CPU interface and distributor
addresses and call driver initialization function (which is hardware
abstraction agnostic). In a
On Tuesday 19 May 2015 07:18 AM, Ian Campbell wrote:
On Tue, 2015-05-19 at 19:34 +0530, Vijay Kilari wrote:
On Tue, May 19, 2015 at 7:24 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2015-05-19 at 14:36 +0100, Ian Campbell wrote:
On Tue, 2015-05-19 at 14:27 +0100, Julien Grall
On 05/21/2015 03:01 PM, George Dunlap wrote:
On 05/21/2015 12:58 PM, Juergen Gross wrote:
There might be existing users who know about xm usb-assignable-list.
Yes -- unfortunately something has to give: either we confuse new users
with two names that sound similar but do something different,
Enabling posted interrupts requires the virtual interrupt delivery feature,
which is disabled for PVH guests, so make sure posted interrupts are also
disabled or else vmlaunch will fail.
Signed-off-by: Roger Pau Monné roger@citrix.com
Reported-and-Tested-by: Lars Eggert l...@netapp.com
Cc:
A member of the security predisclosure list has asked that the security
team publish a time line relating to the short predisclosure period in
this case.
The final disclosure is at http://xenbits.xen.org/xsa/advisory-133.html
While the Xen Security policy[0] sets out various defaults it
On Thu, 2015-05-21 at 13:53 +0100, Wei Liu wrote:
On Thu, May 21, 2015 at 02:39:37PM +0200, Dario Faggioli wrote:
Oh and, whatever route we decide to go for, is it perhaps necessary that
we do something like deprecate it for one release (4.6), e.g., by
printing a warning saying that SEDF
As suggested by Andrew Cooper, this patch attempts to remove
some redundancy and allow for an easier time when adding vm_events
for new control registers in the future, by having a single
VM_EVENT_REASON_WRITE_CTRLREG vm_event type, meant to serve CR0,
CR3, CR4 and (newly introduced) XCR0. The
On 5/18/15, George Dunlap george.dun...@eu.citrix.com wrote:
On Thu, May 14, 2015 at 2:00 PM, Mr Idris m...@idris.web.id wrote:
I'm trying to create cpu scheduler on xen 4.4.1 using debian 7 which
inspired by arinc653 scheduler. When i use it, it gives me something
like kernel panic and reboot
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
Rename dt-uart.c to arm-uart.c and create new generic uart init function.
move dt_uart_init to uart_init.Refactor pl011 driver to dt and common
initialization parts. This will be useful later when acpi specific
uart initialization function is
On 05/21/2015 01:39 PM, Dario Faggioli wrote:
Hi everyone,
I've copied the committers, Lars as community manager, Wei as the
release manager, George as the scheduler maintainer, RT-Xen and
DornerWorks people, which have some interest in the field, I believe.
Please, widen the crowd if you
On Thu, May 21, 2015 at 02:39:37PM +0200, Dario Faggioli wrote:
Hi everyone,
I've copied the committers, Lars as community manager, Wei as the
release manager, George as the scheduler maintainer, RT-Xen and
DornerWorks people, which have some interest in the field, I believe.
Please, widen
On 05/21/2015 07:22 PM, Roger Pau Monné wrote:
El 20/05/15 a les 15.10, Bob Liu ha escrit:
...
+} else {
+unsigned int i;
+
+if (ring_page_order xen_blkif_max_ring_order) {
+err = -EINVAL;
+xenbus_dev_fatal(dev, err,
This is needed as stacks are going to become non-executable. Use
separate stub pages (shared among suitable CPUs on the same node)
instead.
Stub areas (currently 128 bytes each) are being split into two parts -
a fixed usage one (the syscall ones) and dynamically usable space,
which will be used
This is needed as stacks are going to become non-executable.
Signed-off-by: Jan Beulich jbeul...@suse.com
---
v2: Limit the testing tool's stub buffer size to MAX_INST_LEN + 1. Fix
formatting.
--- a/tools/tests/x86_emulator/x86_emulate.c
+++ b/tools/tests/x86_emulator/x86_emulate.c
@@ -17,4
This is needed as stacks are going to become non-executable.
Signed-off-by: Jan Beulich jbeul...@suse.com
---
v2: Use ~PAGE_MASK instead of PAGE_SIZE - 1 for page offset masking.
Comment adjustments.
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -2006,7 +2006,7 @@ static int
On 05/21/2015 04:35 AM, Juergen Gross wrote:
On 05/20/2015 05:25 PM, George Dunlap wrote:
On 05/20/2015 03:55 PM, Juergen Gross wrote:
On 05/20/2015 04:41 PM, George Dunlap wrote:
On Wed, May 20, 2015 at 3:33 PM, Juergen Gross jgr...@suse.com wrote:
On 05/20/2015 04:20 PM, George Dunlap
On Wed, 2015-05-20 at 15:30 +0100, Ian Campbell wrote:
Compared with v3 this uses Daniel's more comprehensive policy patch and
adds a default ssidref for stubdoms too.
Tested with and without XSM enabled for normal guests and HVM guests
with qemu in dom0. Stubdoms appeared to be broken in
On 21.05.15 at 12:34, julien.gr...@citrix.com wrote:
On 21/05/15 07:22, Jan Beulich wrote:
The linked to document (on our wiki) is versioned 0.something,
which doesn't look like a final stable version. The same applies to
the other (STAO?) one.
That's a mistake in the version number. Those
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
refactor gic related functions into dt and generic parts
this will be helpful when adding acpi support for gic
Please explain why you don't refactor neither gic-hip04 and gic-v3.
Signed-off-by: Parth Dixit parth.di...@linaro.org
---
On 21/05/15 11:15, Jan Beulich wrote:
This is needed as stacks are going to become non-executable. Use
separate stub pages (shared among suitable CPUs on the same node)
instead.
Stub areas (currently 128 bytes each) are being split into two parts -
a fixed usage one (the syscall ones) and
On Thu, 2015-05-21 at 13:25 +0530, Rajendra Bele wrote:
Hi
Dario,
Hi,
Here Priority will be prime Method of Sorting of VCPUs in local run
queue in addition to it I am Proposing Shortest Credit First
which is similar to SJF not exactly SJF of O.S. because this is
credit based.
Understood.
On Thu, May 21, 2015 at 10:54:44AM +0100, Ian Campbell wrote:
On Wed, 2015-05-20 at 15:30 +0100, Ian Campbell wrote:
Compared with v3 this uses Daniel's more comprehensive policy patch and
adds a default ssidref for stubdoms too.
Tested with and without XSM enabled for normal guests and
Hi Jan,
On 21/05/15 07:22, Jan Beulich wrote:
On 20.05.15 at 19:00, julien.gr...@citrix.com wrote:
On 20/05/15 17:22, Jan Beulich wrote:
On 17.05.15 at 22:03, parth.di...@linaro.org wrote:
Xen environment table is ACPI table that is used to pass grant table
and event channel interrupt
c/s 7e73a6e have architectures specify the number of PIRQs a hardware domain
gets increased the default number of pirqs for dom0, as 256 was found to be
too low in some cases.
However, it didn't account for the upper bound presented by the domains EOI
bitmap, registered with the
1 - 100 of 195 matches
Mail list logo