On 02.03.15 at 18:12, ian.campb...@citrix.com wrote:
On Thu, 2015-02-26 at 13:53 +, Jan Beulich wrote:
... using struct domain as a container for passing the respective
affinity mask: Quite a number of allocations are domain specific, yet
not to be accounted for that domain. Introduce a
On Mon, Mar 02, 2015 at 01:48:43PM +, Ian Campbell wrote:
On Thu, 2015-02-26 at 16:45 +0800, Chao Peng wrote:
Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring
are supported: total and local memory bandwidth monitoring. To use it,
CMT should be enabled in hypervisor.
On 02.03.15 at 21:25, roy.fr...@linaro.org wrote:
On Mon, Mar 2, 2015 at 9:23 AM, Jan Beulich jbeul...@suse.com wrote:
On 30.01.15 at 18:54, daniel.ki...@oracle.com wrote:
@@ -192,12 +218,7 @@ static void __init
efi_arch_process_memory_map(EFI_SYSTEM_TABLE *SystemTable,
static void *__init
The maximum of SW-IOMMU is limited to 2^11*128 = 256K.
And the size of IO_TLB_DEFAULT_SIZE is limited to (64UL20) 64M now.
While in different platform and different requirement this seems improper.
So modifing the IO_TLB_SEGSIZE to io_tlb_segsize and IO_TLB_DEFAULT_SIZE
to io_tlb_default_size
On 03.03.15 at 04:15, dario.faggi...@citrix.com wrote:
On Sun, 2015-02-08 at 17:45 -1000, Justin T. Weaver wrote:
--- a/xen/common/sched_credit2.c
+++ b/xen/common/sched_credit2.c
@@ -194,6 +194,12 @@ int opt_overload_balance_tolerance=-3;
integer_param(credit2_balance_over,
On Mon, 2015-03-02 at 15:49 -0700, Mike Latimer wrote:
On Monday, March 02, 2015 04:15:41 PM Stefano Stabellini wrote:
On Mon, 2 Mar 2015, Ian Campbell wrote:
? Continue as long as progress is being made is exactly what
2563bca1154 libxl: Wait for ballooning if free memory is increasing
Hi Ian,
On 02/03/2015 17:01, Ian Campbell wrote:
On Mon, 2015-03-02 at 12:56 +, Julien Grall wrote:
From 852f6e3fe49f7fab801f2857b8b505922556d746 Mon Sep 17 00:00:00 2001
From: Ian Campbell ian.campb...@citrix.com
Date: Mon, 2 Mar 2015 11:09:35 +
Subject: [PATCH] xen: arm: Assume
On 02/03/2015 17:04, Ian Campbell wrote:
On Mon, 2015-03-02 at 15:42 +, Julien Grall wrote:
I've just noticed that the support on the previous driver (i.e in
Xen 4.5) may incorrectly expose this feature when all the SMMUs is
not supporting coherent table walk.
I'm not
On Tue, 2015-03-03 at 12:18 +, Ian Campbell wrote:
+/* Xen s/w state */
+unsigned long inprogress:1;
+};
Using a uint32_t bitmask would be more in line the rest of the code
style, but it is just a matter of taste.
You mean uint32_t inprogress:1 for
On Tue, Mar 03, 2015 at 12:10:35PM +, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:54 +0100, Daniel Kiper wrote:
xen/arch/x86/Makefile | 17 ++--
xen/arch/x86/boot/Makefile|3 +-
xen/arch/x86/boot/head.S | 291
On Tue, 2015-03-03 at 13:36 +0100, Daniel Kiper wrote:
On Tue, Mar 03, 2015 at 12:10:35PM +, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:54 +0100, Daniel Kiper wrote:
xen/arch/x86/Makefile | 17 ++--
xen/arch/x86/boot/Makefile|3 +-
Translate gawk regex to mawk regex to allow using mawk. The new regex
works on both gawk and mawk.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Daniel De Graaf dgde...@tycho.nsa.gov
---
On Thu, 2015-02-26 at 20:14 +, xen.org wrote:
flight 35257 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35257/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 12
On Tue, 2015-03-03 at 12:44 +, Ian Campbell wrote:
On Thu, 2015-02-26 at 20:14 +, xen.org wrote:
version targeted for testing:
xen 24b2b8dea180098a3acc809a91cde6c0cc4c8607
I have force pushed this revision.
[...]
+ echo 'branch
Hi Ian,
On 20/02/2015 17:41, Julien Grall wrote:
+/* Only SPIs are supported */
+if ( virq 32 || virq = vgic_num_irqs(d) )
+return -EINVAL;
+
+p = irq_to_pending(d-vcpu[0], virq);
+if ( !p-desc )
+return -EINVAL;
Are we seeing this pattern a lot? It seems
On Tue, Mar 03, 2015 at 12:39:45PM +, Ian Campbell wrote:
On Tue, 2015-03-03 at 13:36 +0100, Daniel Kiper wrote:
On Tue, Mar 03, 2015 at 12:10:35PM +, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:54 +0100, Daniel Kiper wrote:
xen/arch/x86/Makefile | 17 ++--
I am afraid that Xend is still widespread enough that we need some way to
deal with it.
The #idef hackery - while not a nice way can make this work.
Or we can add this in an header/function as a quirk.
boolean xen_pvfb_dont_init_quirk(void)
{
#ifdef CONFIG_X86
On Mon, Mar 02, 2015 at 05:31:53PM +, Ian Campbell wrote:
On Thu, 2015-02-26 at 11:56 +, Wei Liu wrote:
From: Ian Jackson ian.jack...@eu.citrix.com
We are going to want to use some but not all of the machinery
previously in xc_minios.c. Split the privcmd and gnttab code into its
On 03/03/2015 07:44 AM, Wei Liu wrote:
Translate gawk regex to mawk regex to allow using mawk. The new regex
works on both gawk and mawk.
Signed-off-by: Wei Liu wei.l...@citrix.com
Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov
___
Xen-devel
On 03/03/15 15:36, Frediano Ziglio wrote:
Hello Frediano,
On 03/03/15 11:19, Frediano Ziglio wrote:
The GIC in this platform is mainly compatible with the standard
GICv2 beside:
- ITARGET is extended to 16 bit to support 16 CPUs;
- SGI mask is extended to support 16 CPUs;
- maximum
Until vGIC support is not implemented and tested, this will prevent
guest kernels to use their Hip04 driver, or crash when they don't
have any.
Signed-off-by: Frediano Ziglio frediano.zig...@huawei.com
---
xen/arch/arm/gic-hip04.c | 18 +++---
xen/include/asm-arm/gic.h | 4 +++-
2
On 03/03/2015 05:16 PM, Konrad Rzeszutek Wilk wrote:
On Tue, Mar 03, 2015 at 04:15:06PM +0300, Andrey Ryabinin wrote:
On 03/03/2015 12:40 PM, Luis R. Rodriguez wrote:
Andrey,
I believe that on Xen we should disable kasan, would like confirmation
I guess Xen guests won't work with kasan
Rump kernel is going to use some but not all of the machinery previously
in xc_minios.c. Split the privcmd and gnttab code into its own file.
This part is pure code motion.
But we also have to:
- Alter the Makefile to build and link xc_minios_common.c too.
- Rename some of the minios_*_ops
We are going to want to reuse this code for NetBSD rump kernels, where
there is no gntmap device and we just want to call the MiniOS gntmap
code directly.
As part of this we want to abstract away the use of files[] inside the
actual functions. Do this with a #define whose definition we are
going
Xen's build system has a target for rump kernel called NetBSDRump. We
want to build libxc against rump kernel, so we need to copy NetBSD's
evtchn.h to NetBSDRump. This copy is not very likely to diverge from
NetBSD's copy, but we don't preclude such possibility.
The actual implementation of evtch
Rump kernel is going to use some but not all of the machinery previously
in xc_netbsd.c. Split the evtchn and ancillary code into its own file.
This part is pure code motion.
But we also have to alter the Makefile, and rename some symbols, as
with xc_minios*.c.
Signed-off-by: Ian Jackson
Wei Liu (5):
NetBSDRump: provide evtchn.h
libxc: split off xc_minios_common.c
libxc: split off xc_netbsd_evtchn.c
libxc: minios: introduce abstraction for files[]
libxc: rumpxen: provide xc_osdep_info
tools/include/xen-sys/NetBSDRump/evtchn.h | 86
tools/libxc/Makefile
This allows programs which use the bulk of libxc to link. We use
/dev/xenevt for event channels, the raw minios functions for privcmd
and gnttab, and the netbsd versions of discard_file_cache and
xc_memalign.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
Signed-off-by: Wei Liu
Hello Frediano,
On 03/03/15 11:19, Frediano Ziglio wrote:
The GIC in this platform is mainly compatible with the standard
GICv2 beside:
- ITARGET is extended to 16 bit to support 16 CPUs;
- SGI mask is extended to support 16 CPUs;
- maximum supported interrupt is 510;
510 is not
This set of patches add Xen support for hip04-d01 platform (see
https://wiki.linaro.org/Boards/D01 for details).
Changes from v8:
- added a maintainer (Julien Grall);
- reduce difference from gic-hip04.c and gic-v2.c (Julien Grall);
- specify base gic-v2.c for gic-hip04.c (Julien Grall);
- other
Instead of having a list with all matches use device list to detect
if a node is an interrupt controller.
Signed-off-by: Frediano Ziglio frediano.zig...@huawei.com
---
xen/arch/arm/domain_build.c | 8 +---
1 file changed, 1 insertion(+), 7 deletions(-)
diff --git
2015-03-03 14:45 GMT+00:00 Julien Grall julien.gr...@linaro.org:
Hello Frediano,
On 03/03/15 11:19, Frediano Ziglio wrote:
This check allow to detect mail interrupt controller even if it does
main
not match one of the standard ones.
This allow boards with non standard controllers to be
On 03/03/15 15:07, Frediano Ziglio wrote:
2015-03-03 14:45 GMT+00:00 Julien Grall julien.gr...@linaro.org:
Hello Frediano,
On 03/03/15 11:19, Frediano Ziglio wrote:
This check allow to detect mail interrupt controller even if it does
main
not match one of the standard ones.
This allow
flight 35764 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35764/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
Regressions which are
On Mon, Mar 02, 2015 at 05:33:13PM +, Ian Campbell wrote:
On Thu, 2015-02-26 at 11:56 +, Wei Liu wrote:
From: Ian Jackson ian.jack...@eu.citrix.com
We are going to want to use some but not all of the machinery
previously in xc_netbsd.c Split the evtchn and ancillary code into its
Hello Frediano,
On 03/03/15 11:19, Frediano Ziglio wrote:
The GIC in this platform is mainly compatible with the standard
GICv2 beside:
- ITARGET is extended to 16 bit to support 16 CPUs;
- SGI mask is extended to support 16 CPUs;
- maximum supported interrupt is 510;
510 is not a multiple
On Tue, 2015-03-03 at 10:20 -0500, Konrad Rzeszutek Wilk wrote:
I am afraid that Xend is still widespread enough that we need some way
to
deal with it.
The #idef hackery - while not a nice way can make this work.
Or we can add this in an header/function as a quirk.
The GIC in this platform is mainly compatible with the standard
GICv2 beside:
- ITARGET is extended to 16 bit to support 16 CPUs;
- SGI mask is extended to support 16 CPUs;
- maximum supported interrupt is 510;
- GICH APR and LR register offsets.
Signed-off-by: Frediano Ziglio
HiSilison Hip04 platform use a slightly different version.
This is just a verbatim copy of the file to workaround git
not fully supporting copy operation.
Signed-off-by: Frediano Ziglio frediano.zig...@huawei.com
---
xen/arch/arm/gic-hip04.c | 801 +++
On Mon, Mar 02, 2015 at 05:36:33PM +, Ian Campbell wrote:
On Thu, 2015-02-26 at 11:56 +, Wei Liu wrote:
diff --git a/tools/libxc/xc_netbsd_rumpkern.c
b/tools/libxc/xc_netbsd_rumpkern.c
new file mode 100644
index 000..11d4a63
--- /dev/null
+++
Hi,
xen 4.5 building from source on debian wheezy kernel 3.16 amd64
$ xl create wheezy-template-amd64.cfg
Parsing config from wheezy-template64.mens-net.private.cfg
xc: error: panic: xc_dom_bzimageloader.c:730: xc_dom_probe_bzimage_kernel
unable to XZ decompress kernel: Invalid kernel
xc: error:
On 03.03.15 at 04:42, raistlin...@gmail.com wrote:
On Mon, 2015-03-02 at 18:19 +, Andrew Cooper wrote:
In this case, a pnode of XEN_NO_NUMA_NODE seems like precisely the
correct value to report.
Indeed. It tells Xen: hey Xen, toolstack here: we either don't care or
could not come up
On 03/03/15 09:40, Luis R. Rodriguez wrote:
Andrey,
I believe that on Xen we should disable kasan, would like confirmation
Why? This is the first of heard of this.
from someone on xen-devel though. Here's the thing though -- if true
-- I'd like to do it *properly*, where *properly* means
Campbell,
Are you free to look at my reply?
Thanks
Tiejun
On 2015/3/2 9:20, Chen, Tiejun wrote:
Here I just mean when Qemu realizes IGD is passed through but without
that appropriate option set, Qemu can post something to explicitly
notify user that this option is needed in his case. But it
On Tue, 2015-03-03 at 14:59 +0530, Vijay Kilari wrote:
On Tue, Mar 3, 2015 at 2:33 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2015-03-03 at 10:39 +0530, Vijay Kilari wrote:
On Mon, Feb 23, 2015 at 11:21 PM, Ian Campbell ian.campb...@citrix.com
wrote:
On Wed, 2015-02-18 at
On 03/03/2015 11:52 AM, Jan Beulich wrote:
On 03.03.15 at 11:32, jgr...@suse.com wrote:
On 03/03/2015 11:27 AM, Jan Beulich wrote:
Also I'm not particularly happy with the name, as it suggests to be
a statement about the initial P2M the guest gets handed - yet that
is always virtually mapped.
On Tue, Mar 03, 2015 at 07:44:25AM +, Jan Beulich wrote:
On 02.03.15 at 18:00, wei.l...@citrix.com wrote:
There are two issues here irrespective of this series:
1. should we expose that sentinel in ABI?
2. if so, what should the sentinel be?
I think Andrew and you disagree on
On 03/03/15 09:05, Fabio Fantoni wrote:
Il 02/03/2015 17:31, David Vrabel ha scritto:
On 02/03/15 16:23, Jan Beulich wrote:
On 02.03.15 at 16:52, fabio.fant...@m2r.biz wrote:
On systems with wheezy as dom0 and kernel 3.2 it seems there are no
visible problems.
After updating the kernel to
Now that libxl_wait_for_memory_target is capable of waiting until dom0
reaches its target, we can remove the other wait function call:
libxl_wait_for_free_memory. No need to wait twice. Once dom0 has met its
target, simply loop again and recalculate free_memkb.
Signed-off-by: Stefano Stabellini
Use a 2 sec sleep time in the loop to allow the guest to release a
decent amount of memory in an iteration (empirical tests show ballooning
speed to be 512MB/sec or recent boxes).
Signed-off-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
---
tools/libxl/libxl.c |4 ++--
1 file
Decrement wait_secs only if dom0 is making no progress toward reaching
the balloon target, otherwise loop again for free.
Signed-off-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
Tested-by: Mike Latimer mlati...@suse.com
---
tools/libxl/libxl.c | 29 ++---
Hi all,
this patch series fixes the freemem loop on machines with very large
amount of memory, where the current wait time is not enough.
In order to be able to handle arbitrarly large amount of ram, we
implement in libxl_wait_for_memory_target a policy of waiting until dom0
is making progress.
On Mon, 2015-01-19 at 16:28 +0800, Chunyan Liu wrote:
Sorry for the long delay in replying.
To attach a usb device, a virtual usb controller should be created first.
This patch defines usbctrl and usbdevice related structs.
Per 54ca17df026600095...@relay2.provo.novell.com please could you
This reverts commit 2563bca11544361dc2afa5e20b5663e10a0715cb.
---
tools/libxl/xl_cmdimpl.c | 17 +++--
1 file changed, 3 insertions(+), 14 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index e41f633..f4c4122 100644
--- a/tools/libxl/xl_cmdimpl.c
+++
On Mon, 2015-01-19 at 16:28 +0800, Chunyan Liu wrote:
Signed-off-by: Chunyan Liu cy...@suse.com
Signed-off-by: Simon Cao caobosi...@gmail.com
Acked-by: Ian Campbell ian.campb...@citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On Tue, 2015-03-03 at 09:32 +0530, Vijay Kilari wrote:
Hi Ian,
On Mon, Mar 2, 2015 at 11:09 PM, Ian Campbell ian.campb...@citrix.com wrote:
Forgot one series (albeit of a single patch):
On Mon, 2015-03-02 at 14:53 +, Ian Campbell wrote:
There's quite a few series out there right
On Mon, Mar 02, 2015 at 07:54:51PM -0800, Joe Perches wrote:
Use the built-in function instead of memset.
Signed-off-by: Joe Perches j...@perches.com
Acked-by: Wei Liu wei.l...@citrix.com
---
drivers/net/xen-netback/interface.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Wei Liu, le Tue 03 Mar 2015 15:57:21 +, a écrit :
This allows programs which use the bulk of libxc to link. We use
/dev/xenevt for event channels, the raw minios functions for privcmd
and gnttab, and the netbsd versions of discard_file_cache and
xc_memalign.
Signed-off-by: Ian Jackson
Use correct pointer arithmetic to get the pointer to each stat.
Signed-off-by: David Vrabel david.vra...@citrix.com
---
drivers/net/xen-netback/interface.c |3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/net/xen-netback/interface.c
A couple of bug fixes for netback:
- make ethool stats to report the correct values.
- don't leak 1 MiB every time a VIF is destroyed.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 03/03/2015 11:10 AM, Ian Campbell wrote:
On Mon, 2015-01-19 at 16:28 +0800, Chunyan Liu wrote:
Sorry for the long delay in replying.
To attach a usb device, a virtual usb controller should be created first.
This patch defines usbctrl and usbdevice related structs.
Per
On Tue, Mar 03, 2015 at 06:38:20PM +0300, Andrey Ryabinin wrote:
On 03/03/2015 05:16 PM, Konrad Rzeszutek Wilk wrote:
On Tue, Mar 03, 2015 at 04:15:06PM +0300, Andrey Ryabinin wrote:
On 03/03/2015 12:40 PM, Luis R. Rodriguez wrote:
Andrey,
I believe that on Xen we should disable kasan,
Every time a VIF is destroyed up-to 256 pages may be leaked if packets
with more than MAX_SKB_FRAGS frags where transmitted from the guest.
Even worse, if another user of ballooned pages allocated one of these
ballooned pages it would not handle the the unexpectedly non-zero page
count (e.g.,
The IRQ 1020 is reserved for special purpose, so the check should be
irq 1020 rather than irq 1021.
Signed-off-by: Julien Grall julien.gr...@linaro.org
---
xen/arch/arm/gic.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c
index
GICD_TYPER.ITLinesNumber can encode up to 1024 interrupts. Although,
IRQ 1020-1023 are reserved for special purpose.
This helps to check when an IRQ is valid or not.
Signed-off-by: Julien Grall julien.gr...@linaro.org
---
xen/arch/arm/gic-v2.c | 16 ++--
xen/arch/arm/gic-v3.c | 16
On 03/03/2015 12:40 PM, Luis R. Rodriguez wrote:
Andrey,
I believe that on Xen we should disable kasan, would like confirmation
I guess Xen guests won't work with kasan because Xen guests doesn't setup shadow
(kasan_map_early_shadow() is not called in xen guests).
Disabling kasan for Xen in
We now support !pattern, which undoes the effect of a pattern
specified previously (perhaps in another file).
Note that the logic is a bit poor: !... only undoes the effect of an
identical (or equivalent) earlier pattern; it doesn't provide a
specific override.
Improving that would involve a
We are going to make it possible for a branch-specific allow file to
override general allow information from allow.all.
No functional change yet.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
cri-args-hostlists |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git
We have a problem where virtd crashes, and this is causing problems
for other branches. So ignore libvirt test failures.
Use the new ability to override allowances to cause libvirt failures
to still block libvirt pushes.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
allow.all |
flight 35788 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35788/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 33866
flight 35800 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35800/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 13 guest-destroy fail REGR. vs. 35524
Regressions which are
On Tue, Mar 03, 2015 at 04:41:23PM +, Wei Liu wrote:
On Tue, Mar 03, 2015 at 05:05:29PM +0100, Samuel Thibault wrote:
Wei Liu, le Tue 03 Mar 2015 15:57:21 +, a écrit :
This allows programs which use the bulk of libxc to link. We use
/dev/xenevt for event channels, the raw minios
Wei Liu, le Tue 03 Mar 2015 16:41:23 +, a écrit :
On Tue, Mar 03, 2015 at 05:05:29PM +0100, Samuel Thibault wrote:
Wei Liu, le Tue 03 Mar 2015 15:57:21 +, a écrit :
This allows programs which use the bulk of libxc to link. We use
/dev/xenevt for event channels, the raw minios
This unifies the flask_enforcing and flask_enabled boot parameters into
a single parameter with additional states. Defined options are:
force - require policy to be loaded at boot time and enforce it
late - bootloader policy is not used; later loadpolicy is enforcing
permissive - a missing or
This series has changed quite a bit from v2; the focus has changed from
fixing the behavior on failed policy loads to adding the flask= boot
parameter. The first patch, which is purely cleanup with no functional
changes, was extracted to simplify review.
[PATCH 1/2] flask: clean up
This removes the FLASK_DEVELOP and FLASK_BOOTPARAM configuration
parameters which have never been settable by users. Disabling the
FLASK_DEVELOP configuration option has not produced a compiling
hypervisor for some time, and the FLASK_BOOTPARAM option will be
replaced with a more flexible boot
All,
aiming at releases with, as before, presumably no further RC on both
of the branches (even more so with the long delay already incurred),
please test! (The plan however is to incorporate the fixes for the XSAs
that are going to go public during the next several days; unless
something
On Tue, Mar 03, 2015 at 05:05:29PM +0100, Samuel Thibault wrote:
Wei Liu, le Tue 03 Mar 2015 15:57:21 +, a écrit :
This allows programs which use the bulk of libxc to link. We use
/dev/xenevt for event channels, the raw minios functions for privcmd
and gnttab, and the netbsd versions
On 03/03/15 16:26, David Vrabel wrote:
Every time a VIF is destroyed up-to 256 pages may be leaked if packets
up to (and maybe a comma before it?)
with more than MAX_SKB_FRAGS frags where transmitted from the guest.
were
Wei Liu, le Tue 03 Mar 2015 16:58:07 +, a écrit :
Rump kernel doesn't use mini-os's fd management facility so there is no
alloc_fd etc. On the other hand this makes me think number 1 is as good
as any other number we can use.
Does Rump have not fd at all? It'd probably still be good to
libxl is intended to be an LGPL 2.1 licensed library, however this
file inadvertently got given a GPL header.
The following people have touched this file, although all but Machon's
contributions are trivial and/or mechanical an Ack from each would be
unambiguous:
$ git log --format='%an %aE'
Ian Campbell writes ([PATCH] libxl: Correct license header on libxl_flask.c to
be LGPL):
libxl is intended to be an LGPL 2.1 licensed library, however this
file inadvertently got given a GPL header.
The following people have touched this file, although all but Machon's
contributions are
On March 3, 2015 1:15:42 PM EST, Luis R. Rodriguez mcg...@suse.com wrote:
On Tue, Mar 03, 2015 at 09:27:34AM -0500, Boris Ostrovsky wrote:
On 03/03/2015 12:35 AM, Luis R. Rodriguez wrote:
On Mon, Feb 23, 2015 at 9:09 AM, David Vrabel
david.vra...@citrix.com wrote:
On 23/02/15 16:01, Boris
On Mon, 2 Mar 2015, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Introduce new fields in irq descriptors for
LPI support. data field to hold irq related data
and virq to hold virtual lpi number for the corresponding
irq
Signed-off-by: Vijaya Kumar K
On Tue, Mar 03, 2015 at 05:46:08PM +, Julien Grall wrote:
On 03/03/15 17:36, Wei Liu wrote:
On Tue, Mar 03, 2015 at 05:22:39PM +, Julien Grall wrote:
Hi,
I've tried to use ./configure on the latest master and got the below error:
checking for python-config... no
checking
On 03/03/2015 18:48, Wei Liu wrote:
On Tue, Mar 03, 2015 at 05:46:08PM +, Julien Grall wrote:
On 03/03/15 17:36, Wei Liu wrote:
On Tue, Mar 03, 2015 at 05:22:39PM +, Julien Grall wrote:
Hi,
I've tried to use ./configure on the latest master and got the below error:
checking for
On 03/03/15 17:18, Jan Beulich wrote:
All,
aiming at releases with, as before, presumably no further RC on both
of the branches (even more so with the long delay already incurred),
please test! (The plan however is to incorporate the fixes for the XSAs
that are going to go public during the
On 03/03/15 18:10, Ian Jackson wrote:
Ian Campbell writes (Re: [PATCH 6/6] tools/libxl: Fix datacopier POLLHUP
handling to not always be fatal):
On Fri, 2015-02-20 at 13:55 +, Andrew Cooper wrote:
A different and far less invasive approach might be to have a per-fd
revent ignore mask.
On Tue, Mar 03, 2015 at 02:17:24PM -0500, Boris Ostrovsky wrote:
On 03/03/2015 12:42 PM, Paul E. McKenney wrote:
}
@@ -511,7 +508,8 @@ static void xen_cpu_die(unsigned int cpu)
schedule_timeout(HZ/10);
}
-cpu_die_common(cpu);
+(void)cpu_wait_death(cpu, 5);
+
Ian Campbell writes (Re: [PATCH 6/6] tools/libxl: Fix datacopier POLLHUP
handling to not always be fatal):
On Fri, 2015-02-20 at 13:55 +, Andrew Cooper wrote:
A different and far less invasive approach might be to have a per-fd
revent ignore mask. This would at least allow the callbacks
On Tue, Mar 03, 2015 at 09:27:34AM -0500, Boris Ostrovsky wrote:
On 03/03/2015 12:35 AM, Luis R. Rodriguez wrote:
On Mon, Feb 23, 2015 at 9:09 AM, David Vrabel david.vra...@citrix.com
wrote:
On 23/02/15 16:01, Boris Ostrovsky wrote:
Commit 1e02ce4cccdc (x86: Store a per-cpu shadow copy of
On Tue, Mar 3, 2015 at 2:06 AM, David Vrabel david.vra...@citrix.com wrote:
On 03/03/15 09:40, Luis R. Rodriguez wrote:
Andrey,
I believe that on Xen we should disable kasan, would like confirmation
Why? This is the first of heard of this.
Andrey chimed in here confirming this.
from
On 03/03/2015 12:42 PM, Paul E. McKenney wrote:
}
@@ -511,7 +508,8 @@ static void xen_cpu_die(unsigned int cpu)
schedule_timeout(HZ/10);
}
- cpu_die_common(cpu);
+ (void)cpu_wait_death(cpu, 5);
+ /* FIXME: Are the below calls really safe in case of
On Mon, 2 Mar 2015, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Add support for handling ITS(LPI) interrupts.
The LPI interrupts are handled by physical ITS
driver.
nested LPI interrupt handling is not tested and
enabled.
Signed-off-by: Vijaya
Hi Stefano,
On 03/03/2015 18:07, Stefano Stabellini wrote:
I would like to see a more generic handling of virq != physical irq.
This is not specific to LPIs but to any scenario where the physical irq
differs from the virtual irq.
I though we talked about it during the meeting at Connect...
On 03/03/15 14:38, Jan Beulich wrote:
As we get ready to use the information set for a domain here we should
make sure it is actually valid: Both vNode and pNode numbers should be
in range. Do a little bit of other cleanup so the code ends up looking
reasonably consistent in style.
Along
On Tuesday, March 03, 2015 11:08:38 AM Stefano Stabellini wrote:
Hi all,
this patch series fixes the freemem loop on machines with very large
amount of memory, where the current wait time is not enough.
In order to be able to handle arbitrarly large amount of ram, we
implement in
On 03/03/2015 04:26 PM, Paul E. McKenney wrote:
On Tue, Mar 03, 2015 at 03:13:07PM -0500, Boris Ostrovsky wrote:
On 03/03/2015 02:42 PM, Paul E. McKenney wrote:
On Tue, Mar 03, 2015 at 02:17:24PM -0500, Boris Ostrovsky wrote:
On 03/03/2015 12:42 PM, Paul E. McKenney wrote:
}
@@ -511,7
On Tue, Mar 03, 2015 at 03:20:41PM -0500, Konrad Rzeszutek Wilk wrote:
Most of the APIC code that use APIC_LDR is not used on
64-bit. On 32-bit it is bit of an hack - and the mechanism
it is uses is to setup the APIC_LDR via apci-init_apic_ldr
(which we set to NULL) and then use
On 03/03/15 14:40, Jan Beulich wrote:
- drop redundant ret = 0 statements
- drop unnecessary braces
- eliminate a few single use local variables
- move break statements inside case-specific braced scopes
Signed-off-by: Jan Beulich jbeul...@suse.com
One bug (one ret = 0 was not redundant)
1 - 100 of 212 matches
Mail list logo