On 29.05.15 at 04:40, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 01:54:39PM +0100, Jan Beulich wrote:
On 21.05.15 at 10:41, chao.p.p...@linux.intel.com wrote:
+
+if ( !cpu_has(c, X86_FEATURE_CAT) )
+return;
+
+socket = cpu_to_socket(cpu);
+if (
On Fri, May 29, 2015 at 09:01:53AM +0100, Jan Beulich wrote:
On 29.05.15 at 04:35, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 01:38:05PM +0100, Jan Beulich wrote:
On 21.05.15 at 10:41, chao.p.p...@linux.intel.com wrote:
--- a/xen/arch/x86/mpparse.c
+++
flight 57458 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57458/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-qemut-winxpsp3 16 guest-stop fail REGR. vs. 53768
Tests which are
If calling ExitBootServices() fails, the memory map size may have
increased, so determine the new size and reallocate the memory map
before calling GetMemoryMap() again.
This was seen on the following machine when using the iscsidxe UEFI
driver. The machine would consistently fail the first call
On 2015/5/28 15:55, Jan Beulich wrote:
On 28.05.15 at 07:48, tiejun.c...@intel.com wrote:
On 2015/5/22 17:46, Jan Beulich wrote:
On 22.05.15 at 11:35, tiejun.c...@intel.com wrote:
As you know all devices are owned by Dom0 firstly before we create any
DomU, right? Do we allow Dom0 still own a
On 29.05.15 at 04:47, wei.w.w...@intel.com wrote:
On 26/05/2015 21:06, Jan Beulich wrote
On 13.05.16 at 09:50, wei.w.w...@intel.com wrote:
Register/unregister the CPU hotplug notifier when the driver is
registered, and move the driver register/unregister function to the
cpufreq.c.
When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to use it which
conflicts with QEMU.
This manifests itself such that the first time a device is passed to a
domain, it succeeds. Subsequent attempts fail unless the device is
On 29.05.15 at 04:35, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 01:38:05PM +0100, Jan Beulich wrote:
On 21.05.15 at 10:41, chao.p.p...@linux.intel.com wrote:
--- a/xen/arch/x86/mpparse.c
+++ b/xen/arch/x86/mpparse.c
@@ -87,6 +87,18 @@ void __init set_nr_cpu_ids(unsigned
On 26/05/2015 21:58, Jan Beulich wrote
On 13.05.16 at 09:50, wei.w.w...@intel.com wrote:
+static inline int ceiling_fp(int32_t x) {
+int mask, ret;
Please here and below, consider whether types really need to be signed.
One exception: If you intend to import the Linux source file
On Fri, May 29, 2015 at 09:06:46AM +0100, Jan Beulich wrote:
On 29.05.15 at 04:43, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 02:17:54PM +0100, Jan Beulich wrote:
On 21.05.15 at 10:41, chao.p.p...@linux.intel.com wrote:
+static int cat_cpu_init(unsigned int cpu)
+{
On 29.05.15 at 10:19, wei.w.w...@intel.com wrote:
On 26/05/2015 21:58, Jan Beulich wrote
On 13.05.16 at 09:50, wei.w.w...@intel.com wrote:
+static int intel_pstate_verify_policy(struct cpufreq_policy *policy)
+{
+cpufreq_verify_within_limits(policy, policy-cpuinfo.min_freq,
+
When an interrupt is received during an EFI runtime service call, Xen
may call map_domain_page() while using the EFI runtime page tables.
This fails because, although the EFI runtime page tables are a
copy of the idle domain's page tables, current points at a different
domain's vCPU.
To fix this,
On 29.05.15 at 04:43, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 02:17:54PM +0100, Jan Beulich wrote:
On 21.05.15 at 10:41, chao.p.p...@linux.intel.com wrote:
+static int cat_cpu_init(unsigned int cpu)
+{
+int rc;
+const struct cpuinfo_x86 *c = cpu_data + cpu;
On 29.05.15 at 04:47, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 02:26:03PM +0100, Jan Beulich wrote:
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -694,6 +694,20 @@ struct xen_sysctl_pcitopoinfo {
typedef struct xen_sysctl_pcitopoinfo
On 28.05.15 at 18:09, dvra...@cantab.net wrote:
On 28/05/15 15:55, Jan Beulich wrote:
On 26.05.15 at 20:00, david.vra...@citrix.com wrote:
@@ -254,23 +254,23 @@ double_gt_lock(struct grant_table *lgt, struct
grant_table *rgt)
{
if ( lgt rgt )
{
-spin_lock(lgt-lock);
On 28.05.15 at 18:10, dvra...@cantab.net wrote:
On 28/05/15 16:39, Jan Beulich wrote:
On 26.05.15 at 20:00, david.vra...@citrix.com wrote:
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -57,7 +57,7 @@ integer_param(gnttab_max_frames, max_grant_frames);
* New options
On 29.05.15 at 10:28, chao.p.p...@linux.intel.com wrote:
On Fri, May 29, 2015 at 09:01:53AM +0100, Jan Beulich wrote:
On 29.05.15 at 04:35, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 01:38:05PM +0100, Jan Beulich wrote:
On 21.05.15 at 10:41, chao.p.p...@linux.intel.com
Checking that the subject domain is not the current one is pointless
when already having paused that domain: domain_pause() already
ASSERT()s this to be the case.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/mm/hap/hap.c
+++ b/xen/arch/x86/mm/hap/hap.c
@@ -464,13 +464,6 @@ int
Hi,
About rx zerocopy, I have a question:
If some application make a socket, then listen and accept, the client
sends packets to it, but it doesn't recv from this socket right now, all
persistent grant page would be in used.
So other application cannot receive any packets. Is
On Wed, 20 May 2015, Major Hayden wrote:
On 05/20/2015 05:41 AM, Jan Beulich wrote:
Considering that no-one else is seeing this - is this perhaps connected
to you building Xen with pre-release gcc 5.0.1? This is also because in
order for the above to indeed occur, mmio_ro_do_page_fault()'s
No functional changes introduced.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
tools/libxc/xc_hvm_build_x86.c | 30 +++---
1 file changed, 27 insertions(+), 3 deletions(-)
diff --git
Make the setup process similar to PV counterpart. That is, to allocate a
P2M array that covers the whole memory range and start from there. This
is clearer than using an array with no holes in it.
Also the dummy layout should take MMIO hole into consideration. We might
end up having two
This patch does two thing:
The original code erroneously fills in xc_hvm_build_args before
generating vmemranges. The effect is that guest memory is populated
without vNUMA information. Move the hunk to right place to fix this.
Move the subtraction of video ram to
Boris discovered that HVM vNUMA didn't actually work. This patch series fixes
that.
The first patch is a prerequisite patch for the actual fixes. The second patch
is to help debugging. The fixes are in the last two patches, which can be
squashed into one if necessary.
Patch 3 is updated in this
When building HVM guests, originally some fields of xc_hvm_build_args
are filled in xc_hvm_build (and buried in the wrong function), some are
set in libxl__build_hvm before passing xc_hvm_build_args to
xc_hvm_build. This is fragile.
After examining the code in xc_hvm_build that sets those fields,
On Mon, 2015-05-25 at 17:06 +0800, Yang Hongyang wrote:
Ping...
Acked + Applied.
Sorry for the delay, for some reason I thought I was waiting for Andrew
to comment even though they all already had Reviewed-by.
Ian.
On 05/18/2015 03:03 PM, Yang Hongyang wrote:
This patchset implement the
On 29/05/15 08:48, Ross Lagerwall wrote:
If calling ExitBootServices() fails, the memory map size may have
increased, so determine the new size and reallocate the memory map
before calling GetMemoryMap() again.
This was seen on the following machine when using the iscsidxe UEFI
driver. The
Nothing in asm/io.h uses anything from vmalloc.h, so remove the include
and fix up the build problems in an allmodconfig (64 bit and 32 bit)
build.
This may be the place where x86 builds get vmalloc.h implicitly included
and that tends to hide places where vmalloc() et al are added to files
but
On 05/29/2015 10:41 AM, Wei Liu wrote:
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to use it which
conflicts with QEMU.
This manifests itself such that
On 28/05/15 11:10, Jan Beulich wrote:
On 28.05.15 at 11:26, ian.campb...@citrix.com wrote:
On Thu, 2015-05-28 at 09:50 +0100, Jan Beulich wrote:
On 27.05.15 at 18:04, ian.campb...@citrix.com wrote:
On Tue, 2015-05-26 at 14:29 +0100, Ian Campbell wrote:
I've now managed to reproduce using the
On 05/29/2015 10:45 AM, Jan Beulich wrote:
On 29.05.15 at 09:48, ross.lagerw...@citrix.com wrote:
--- a/xen/common/efi/boot.c
+++ b/xen/common/efi/boot.c
@@ -1053,14 +1053,14 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE
*SystemTable)
efi_arch_video_init(gop, info_size,
On 29/05/15 07:24, Jason Fritcher wrote:
On Wed, 20 May 2015, Major Hayden wrote:
/ On 05/20/2015 05:41 AM, Jan Beulich wrote:/
/ Considering that no-one else is seeing this - is this perhaps connected/
/ to you building Xen with pre-release gcc 5.0.1? This is also because in/
/ order for
On Fri, May 29, 2015 at 10:54:09AM +0100, Ross Lagerwall wrote:
On 05/29/2015 10:50 AM, Wei Liu wrote:
On Fri, May 29, 2015 at 10:43:08AM +0100, Ross Lagerwall wrote:
On 05/29/2015 10:41 AM, Wei Liu wrote:
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing passthrough
On Tue, 2015-05-26 at 09:59 +0100, Ian Campbell wrote:
On Mon, 2015-05-25 at 18:59 -0500, Chong Li wrote:
This series arrived in my mailbox as 5 distinct mails.
Please use git send-email such that the mails arrive as a single email
thread (i.e. each mail as a reply to the previous or to
On 29/05/15 12:37, Wei Liu wrote:
When building HVM guests, originally some fields of xc_hvm_build_args
are filled in xc_hvm_build (and buried in the wrong function), some are
set in libxl__build_hvm before passing xc_hvm_build_args to
xc_hvm_build. This is fragile.
After examining the code
On 29.05.15 at 09:48, ross.lagerw...@citrix.com wrote:
--- a/xen/common/efi/boot.c
+++ b/xen/common/efi/boot.c
@@ -1053,14 +1053,14 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE
*SystemTable)
efi_arch_video_init(gop, info_size, mode_info);
}
-
On Tue, May 26, 2015 at 5:49 PM, Ian Campbell ian.campb...@citrix.com
wrote:
On Tue, 2015-05-26 at 17:38 +0200, Lengyel, Tamas wrote:
Hi all,
I'm wondering if someone can point me in the right direction. I'm
trying to understand the process around domain save/restore using XL.
I can
On Thu, 2015-05-28 at 14:26 +0100, Jan Beulich wrote:
On 21.05.15 at 10:41, chao.p.p...@linux.intel.com wrote:
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -694,6 +694,20 @@ struct xen_sysctl_pcitopoinfo {
typedef struct xen_sysctl_pcitopoinfo
On 28.05.15 at 18:32, rcojoc...@bitdefender.com wrote:
On 05/28/2015 07:06 PM, Lengyel, Tamas wrote:
That seems a bit odd to me that we now have both a macro and a function
with the same name. I think making the macro at least all capital would
avoid confusion and make the code a lot more
* Stephen Rothwell s...@canb.auug.org.au wrote:
Nothing in asm/io.h uses anything from vmalloc.h, so remove the include
and fix up the build problems in an allmodconfig (64 bit and 32 bit)
build.
This may be the place where x86 builds get vmalloc.h implicitly included
and that tends to
On 29.05.15 at 11:23, dario.faggi...@citrix.com wrote:
On Fri, 2015-05-29 at 09:07 +0100, Jan Beulich wrote:
On 29.05.15 at 04:47, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 02:26:03PM +0100, Jan Beulich wrote:
--- a/xen/include/public/sysctl.h
+++
The sharing vm_event ring being enabled is not necessary for mem_sharing
memops.
Signed-off-by: Tamas K Lengyel tkleng...@sec.in.tum.de
---
xen/arch/x86/mm/mem_sharing.c | 4
1 file changed, 4 deletions(-)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index
On 29.05.15 at 11:56, andrew.coop...@citrix.com wrote:
On 28/05/15 11:10, Jan Beulich wrote:
On 28.05.15 at 11:26, ian.campb...@citrix.com wrote:
On Thu, 2015-05-28 at 09:50 +0100, Jan Beulich wrote:
On 27.05.15 at 18:04, ian.campb...@citrix.com wrote:
On Tue, 2015-05-26 at 14:29 +0100, Ian
On Fri, 2015-05-29 at 10:56 +0100, Andrew Cooper wrote:
On 28/05/15 11:10, Jan Beulich wrote:
On 28.05.15 at 11:26, ian.campb...@citrix.com wrote:
On Thu, 2015-05-28 at 09:50 +0100, Jan Beulich wrote:
On 27.05.15 at 18:04, ian.campb...@citrix.com wrote:
On Tue, 2015-05-26 at 14:29 +0100,
On 29.05.15 at 12:39, wei.l...@citrix.com wrote:
On Fri, May 29, 2015 at 11:34:07AM +0100, Jan Beulich wrote:
On 11.05.15 at 19:25, venkat.x.venkatsu...@oracle.com wrote:
Please CC the maintainers of the driver. You can get that from
'scripts/get_maintainer.pl'
I've done that for
On 29/05/15 11:50, M A Young wrote:
On Fri, 29 May 2015, Andrew Cooper wrote:
Are you in a position to compile identical Xen 4.5 source with two different
versions of gcc? (current staging-4.5 staging even has the gcc5 build fix
in)
If it is a gcc compiler bug, we would expect the version
On 29/05/15 10:09, Jan Beulich wrote:
Checking that the subject domain is not the current one is pointless
when already having paused that domain: domain_pause() already
ASSERT()s this to be the case.
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to use it which
conflicts with QEMU.
This manifests itself such that the first time a device is passed to
On 29.05.15 at 11:37, tkleng...@sec.in.tum.de wrote:
The sharing vm_event ring being enabled is not necessary for mem_sharing
memops.
If indeed so, why would the same not apply to mem_paging memops?
Jan
___
Xen-devel mailing list
On 05/29/2015 10:50 AM, Wei Liu wrote:
On Fri, May 29, 2015 at 10:43:08AM +0100, Ross Lagerwall wrote:
On 05/29/2015 10:41 AM, Wei Liu wrote:
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing passthrough of a PCI device for an HVM guest, don't insert
the device into
On Thu, 28 May 2015, Jan Beulich wrote:
On 28.05.15 at 14:12, stefano.stabell...@eu.citrix.com wrote:
On Thu, 28 May 2015, Jan Beulich wrote:
On 28.05.15 at 12:58, stefano.stabell...@eu.citrix.com wrote:
Let's take a closer look at this table. After the boilierplate, these
are the
On Fri, May 29, 2015 at 11:34:07AM +0100, Jan Beulich wrote:
On 11.05.15 at 19:25, venkat.x.venkatsu...@oracle.com wrote:
Please CC the maintainers of the driver. You can get that from
'scripts/get_maintainer.pl'
I've done that for you.
Thanks, Konrad.
I am copying Wei too
Only the first block is expected to take longer (because it decompresses
the image and writes it to a LVM volume), the remaining commands should
execute much faster, so reduce the timeout.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Ian
Ping...
On Mon, May 18, 2015 at 04:34:48PM +0100, Wei Liu wrote:
Boris discovered that HVM vNUMA didn't actually work. This patch series fixes
that.
The first patch is a prerequisite patch for the actual fixes. The second patch
is to help debugging. The fixes are in the last two patches,
On Fri, 29 May 2015, Andrew Cooper wrote:
Are you in a position to compile identical Xen 4.5 source with two different
versions of gcc? (current staging-4.5 staging even has the gcc5 build fix
in)
If it is a gcc compiler bug, we would expect the version compiled with gcc
4.9 to work fine,
On Fri, 29 May 2015, Andrew Cooper wrote:
On 29/05/15 11:50, M A Young wrote:
On Fri, 29 May 2015, Andrew Cooper wrote:
Are you in a position to compile identical Xen 4.5 source with two
different
versions of gcc? (current staging-4.5 staging even has the gcc5 build fix
in)
If
On Fri, 2015-05-29 at 09:07 +0100, Jan Beulich wrote:
On 29.05.15 at 04:47, chao.p.p...@linux.intel.com wrote:
On Thu, May 28, 2015 at 02:26:03PM +0100, Jan Beulich wrote:
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -694,6 +694,20 @@ struct
On Fri, May 29, 2015 at 10:43:08AM +0100, Ross Lagerwall wrote:
On 05/29/2015 10:41 AM, Wei Liu wrote:
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to
On 11.05.15 at 19:25, venkat.x.venkatsu...@oracle.com wrote:
Please CC the maintainers of the driver. You can get that from
'scripts/get_maintainer.pl'
I've done that for you.
Thanks, Konrad.
I am copying Wei too who had fixed the below problem earlier.
It fixed the incorrect
On Fri, May 29, 2015 at 11:54 AM, Jan Beulich jbeul...@suse.com wrote:
On 29.05.15 at 11:37, tkleng...@sec.in.tum.de wrote:
The sharing vm_event ring being enabled is not necessary for mem_sharing
memops.
If indeed so, why would the same not apply to mem_paging memops?
Jan
The ring
On 29.05.15 at 12:31, stefano.stabell...@eu.citrix.com wrote:
On Thu, 28 May 2015, Jan Beulich wrote:
On 28.05.15 at 14:12, stefano.stabell...@eu.citrix.com wrote:
Could you please make a concrete suggestion with table names and fields?
I already pointed you at 6.0's new FADT field
On 29.05.15 at 11:57, ross.lagerw...@citrix.com wrote:
On 05/29/2015 10:45 AM, Jan Beulich wrote:
On 29.05.15 at 09:48, ross.lagerw...@citrix.com wrote:
--- a/xen/common/efi/boot.c
+++ b/xen/common/efi/boot.c
@@ -1053,14 +1053,14 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE
On Fri, 2015-05-29 at 11:46 +0100, Wei Liu wrote:
Ping...
FWIW, I had a look at the patches and they seemed fine, sorry to not
having said that before.
TBH, that was partly because I was expecting a v2 to show up, fixing the
(trivial) issue you identified together with Boris, and was planning
Hi Ingo,
On Fri, 29 May 2015 11:21:05 +0200 Ingo Molnar mi...@kernel.org wrote:
Good idea.
Acked-by: Ingo Molnar mi...@kernel.org
Thanks.
Please also test x86 allnoconfig and defconfig 32/64, that tends to unearth
the
remaining places. People doing randconfig testing will find the
At Fri, 29 May 2015 19:18:47 +1000,
Stephen Rothwell wrote:
Nothing in asm/io.h uses anything from vmalloc.h, so remove the include
and fix up the build problems in an allmodconfig (64 bit and 32 bit)
build.
This may be the place where x86 builds get vmalloc.h implicitly included
and that
On Fri, May 29, 2015 at 01:29:18PM +0100, Andrew Cooper wrote:
On 29/05/15 12:37, Wei Liu wrote:
When building HVM guests, originally some fields of xc_hvm_build_args
are filled in xc_hvm_build (and buried in the wrong function), some are
set in libxl__build_hvm before passing
On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
If win7 doesn't shutdown given a power button request I'd be more
inclined to remove the setting in osstest for those flights and let
guest-stop go back to being never pass than to start making such changes
to the VM config which I think
On Wed, 2015-05-27 at 12:41 +0100, Jan Beulich wrote:
On 26.05.15 at 19:18, lichong...@gmail.com wrote:
On Tue, May 26, 2015 at 4:08 AM, Jan Beulich jbeul...@suse.com wrote:
On 26.05.15 at 02:05, lichong...@gmail.com wrote:
Add two hypercalls(XEN_DOMCTL_SCHEDOP_getvcpuinfo/putvcpuinfo) to
On Fri, 2015-05-29 at 14:14 +0100, Andrew Cooper wrote:
On 29/05/15 14:04, Jan Beulich wrote:
On 29.05.15 at 14:54, ian.campb...@citrix.com wrote:
On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
If win7 doesn't shutdown given a power button request I'd be more
inclined to remove
flight 57518 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57518/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
On 29.05.15 at 14:54, ian.campb...@citrix.com wrote:
On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
If win7 doesn't shutdown given a power button request I'd be more
inclined to remove the setting in osstest for those flights and let
guest-stop go back to being never pass than to
On Fri, 2015-05-29 at 14:04 +0100, Jan Beulich wrote:
On 29.05.15 at 14:54, ian.campb...@citrix.com wrote:
On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
If win7 doesn't shutdown given a power button request I'd be more
inclined to remove the setting in osstest for those flights
On 29.05.15 at 15:01, dario.faggi...@citrix.com wrote:
On Wed, 2015-05-27 at 12:41 +0100, Jan Beulich wrote:
On 26.05.15 at 19:18, lichong...@gmail.com wrote:
On Tue, May 26, 2015 at 4:08 AM, Jan Beulich jbeul...@suse.com wrote:
On 26.05.15 at 02:05, lichong...@gmail.com wrote:
+
+
On 29.05.15 at 15:14, andrew.coop...@citrix.com wrote:
On 29/05/15 14:04, Jan Beulich wrote:
On 29.05.15 at 14:54, ian.campb...@citrix.com wrote:
On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
If win7 doesn't shutdown given a power button request I'd be more
inclined to remove the
If calling ExitBootServices() fails, the memory map size may increase.
Allocate an extra page the first time around so that we hopefully
shouldn't have to reallocate the memory map. Allocate a new memory map
if needed, although this only a fallback, because some arches may use
boot services to
On Thu, 2015-05-28 at 11:26 +0100, Ian Campbell wrote:
On Thu, 2015-05-28 at 04:49 +, osstest service user wrote:
flight 57401 osstest real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57401/
Failures :-/ but no regressions.
Lontao, Robert,
The grub related bits of
On 29/05/15 12:37, Wei Liu wrote:
No functional changes introduced.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
This patch reminds me of a todo item I have wanted to do for a while
using setvcpucontext rather
On 29/05/15 14:04, Jan Beulich wrote:
On 29.05.15 at 14:54, ian.campb...@citrix.com wrote:
On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
If win7 doesn't shutdown given a power button request I'd be more
inclined to remove the setting in osstest for those flights and let
guest-stop go
On 05/28/15 17:05, Michael S. Tsirkin wrote:
On Thu, May 28, 2015 at 11:03:07PM +0200, Michael S. Tsirkin wrote:
On Thu, May 28, 2015 at 03:09:48PM -0400, Don Slutz wrote:
On 05/28/15 08:28, Michael S. Tsirkin wrote:
On Thu, May 28, 2015 at 07:25:50AM -0400, Don Slutz wrote:
On 05/28/15
Hi Ian,
NIT: You used my Linaro email which I think is de-activated now :).
On 27/05/2015 13:48, Ian Campbell wrote:
Here follows draft C based on previous feedback.
Also at:
http://xenbits.xen.org/people/ianc/vits/draftC.{pdf,html}
I think I've captured most of the previous discussion,
As suggested by Andrew Cooper, this patch attempts to remove
some redundancy and allow for an easier time when adding vm_events
for new control registers in the future, by having a single
VM_EVENT_REASON_WRITE_CTRLREG vm_event type, meant to serve CR0,
CR3, CR4 and (newly introduced) XCR0. The
On 29.05.15 at 15:30, ross.lagerw...@citrix.com wrote:
@@ -1053,14 +1053,23 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE
*SystemTable)
efi_arch_video_init(gop, info_size, mode_info);
}
-efi_bs-GetMemoryMap(efi_memmap_size, NULL, map_key,
-
On Mon, 2015-05-25 at 19:05 -0500, Chong Li wrote:
diff --git a/xen/common/domctl.c b/xen/common/domctl.c
index 28aea55..8143c44 100644
--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -841,6 +841,11 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t)
u_domctl)
copyback
On 05/29/2015 12:12 PM, Jan Beulich wrote:
On 28.05.15 at 18:32, rcojoc...@bitdefender.com wrote:
the macro will probably go out the window (or the first parameter will
need to be changed to VM_EVENT_##what instead of VM_EVENT_X86_##what) as
soon as ARM control register write events will come
On Fri, 2015-05-29 at 14:28 +0100, Jan Beulich wrote:
On 29.05.15 at 15:14, andrew.coop...@citrix.com wrote:
On 29/05/15 14:04, Jan Beulich wrote:
On 29.05.15 at 14:54, ian.campb...@citrix.com wrote:
On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
If win7 doesn't shutdown given a
Try to use xen-qemudepriv-$domname first, then xen-qemudepriv-base +
domid, finally xen-qemudepriv-shared and root if everything else fails.
The uids need to be manually created by the user or, more likely, by the
xen package maintainer.
To actually secure QEMU when running in Dom0, we need at
Hi Vijay,
On 27/05/15 17:44, Vijay Kilari wrote:
## Command Translation
Of the existing GICv3 ITS commands, `MAPC`, `MAPD`, `MAPVI`/`MAPI` are
potentially time consuming commands as these commands creates entry in
the Xen ITS structures, which are used to validate other ITS commands.
Hi Chen,
On 28/05/15 11:15, Chen Baozi wrote:
From: Chen Baozi baoz...@gmail.com
GIC-500 supports up to 128 cores in a single SoC. Increase MAX_VIRT_CPUS
to 128 on arm64.
This should be the last patch. You still have to modify domain_max_vcpus
before being able to increase the number of
On Fri, 2015-05-29 at 15:31 +0100, Andrew Cooper wrote:
On 29/05/15 15:00, Ian Campbell wrote:
On Fri, 2015-05-29 at 14:28 +0100, Jan Beulich wrote:
On 29.05.15 at 15:14, andrew.coop...@citrix.com wrote:
On 29/05/15 14:04, Jan Beulich wrote:
On 29.05.15 at 14:54, ian.campb...@citrix.com
On 27.05.15 at 17:25, vkuzn...@redhat.com wrote:
+static XSM_INLINE int xsm_soft_reset(XSM_DEFAULT_ARG struct domain *d1,
+ struct domain *d2)
Hard tabs used here ...
+static inline int xsm_soft_reset (xsm_default_t def, struct domain *d1,
+
2015-05-29 4:15 GMT-07:00 Dario Faggioli dario.faggi...@citrix.com:
On Tue, 2015-05-26 at 09:59 +0100, Ian Campbell wrote:
On Mon, 2015-05-25 at 18:59 -0500, Chong Li wrote:
This series arrived in my mailbox as 5 distinct mails.
Please use git send-email such that the mails arrive as a
On Fri, 2015-05-29 at 14:47 +0100, Stefano Stabellini wrote:
Try to use xen-qemudepriv-$domname first, then xen-qemudepriv-base +
domid, finally xen-qemudepriv-shared and root if everything else fails.
The uids need to be manually created by the user or, more likely, by the
xen package
-Original Message-
From: Paul Durrant
Sent: 29 May 2015 16:07
To: Ian Campbell
Cc: Jan Beulich; Andrew Cooper; Ian Jackson; xen-devel
Subject: RE: [Xen-devel] ACPI shutdown unreliable with win7?
-Original Message-
From: Ian Campbell [mailto:ian.campb...@citrix.com]
-Original Message-
From: Ross Philipson [mailto:ross.philip...@gmail.com]
Sent: 29 May 2015 16:35
To: Ian Campbell; Paul Durrant
Cc: Andrew Cooper; xen-devel; Jan Beulich; Ian Jackson
Subject: Re: [Xen-devel] ACPI shutdown unreliable with win7?
On 05/29/2015 11:11 AM, Ian Campbell
On 05/29/2015 12:00 PM, Paul Durrant wrote:
-Original Message-
From: Ross Philipson [mailto:ross.philip...@gmail.com]
Sent: 29 May 2015 16:35
To: Ian Campbell; Paul Durrant
Cc: Andrew Cooper; xen-devel; Jan Beulich; Ian Jackson
Subject: Re: [Xen-devel] ACPI shutdown unreliable with win7?
On 29/05/15 17:45, Julien Grall wrote:
On 29/05/15 17:41, Andrew Cooper wrote:
On 29/05/15 17:20, Julien Grall wrote:
On 29/05/15 16:51, Julien Grall wrote:
diff --git a/xen/include/asm-arm/config.h b/xen/include/asm-arm/config.h
index 3b23e05..817c216 100644
---
On 29/05/15 16:55, Ian Campbell wrote:
On Fri, 2015-05-29 at 16:44 +0100, Julien Grall wrote:
+name = GCSPRINTF(cpu@%lx, mpidr_aff);
It's not necessary to change the cpu@.
AIUI it is conventional in DT for this to match the first reg entry.
Well, it's conventional when the reg
On Wed, 2015-05-27 at 17:04 +0100, Ian Campbell wrote:
Looking at the netback side though it seems like netback_remove is
switching to state=Closed _before_ it calls kobject_uevent(...,
KOBJ_OFFLINE) and it is this which generates the call to netback_uevent
which tries and fails to read script
On 05/29/2015 11:11 AM, Ian Campbell wrote:
On Fri, 2015-05-29 at 16:06 +0100, Paul Durrant wrote:
FWIW We appear to wait 200s, if we were seeing failures due to windows
update then I'd be inclined to extend that, but I think right now that
would be premature, unless WU happens with no status
drivers/net/xen-netback/netback.c: In function ‘xenvif_tx_build_gops’:
drivers/net/xen-netback/netback.c:1253:8: warning: format ‘%lu’ expects
argument of type ‘long unsigned int’, but argument 5 has type ‘int’ [-Wformat=]
(txreq.offset~PAGE_MASK) + txreq.size);
^
txreq.offset
1 - 100 of 168 matches
Mail list logo