flight 57872 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57872/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 5 xen-build fail REGR. vs. 57815
flight 57880 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57880/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 12 guest-localmigrate fail never
pass
H. Peter Anvin h...@zytor.com writes:
On 06/04/2015 12:55 PM, Rusty Russell wrote:
Yeah, hard cases make bad law.
I'm not too unhappy with this fix; ideally we'd rename save_fl and
restore_fl to save_eflags_if and restore_eflags_if too.
I would be fine with this... but please document
On 06/04/15 11:04, Fabio Fantoni wrote:
Today after trying xen-unstable build (tested many hours) of some days
ago I tried update qemu to latest development version (from git master
commit 6fa6b312765f698dc81b2c30e7eeb9683804a05b) and seems that there is
a regression:
xl create
On 06/04/15 17:59, Don Slutz wrote:
On 06/04/15 11:04, Fabio Fantoni wrote:
Today after trying xen-unstable build (tested many hours) of some days
ago I tried update qemu to latest development version (from git master
commit 6fa6b312765f698dc81b2c30e7eeb9683804a05b) and seems that there is
a
flight 57865 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57865/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect
test-amd64-amd64-pair
On 06/04/2015 10:56 PM, Jan Beulich wrote:
Razvan Cojocaru rcojoc...@bitdefender.com 06/04/15 3:46 PM
On 06/04/2015 04:43 PM, Tim Deegan wrote:
At 14:40 +0100 on 04 Jun (1433428815), Tim Deegan wrote:
At 16:45 +0300 on 29 May (1432917959), Razvan Cojocaru wrote:
As suggested by Andrew
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/04/15 18:10, Eric Blake wrote:
[adding Markus, as author of the regression]
On 06/04/2015 03:59 PM, Don Slutz wrote:
On 06/04/15 11:04, Fabio Fantoni wrote:
Today after trying xen-unstable build (tested many hours) of
some days ago I
[adding Markus, as author of the regression]
On 06/04/2015 03:59 PM, Don Slutz wrote:
On 06/04/15 11:04, Fabio Fantoni wrote:
Today after trying xen-unstable build (tested many hours) of some days
ago I tried update qemu to latest development version (from git master
commit
On Thu, Jun 04, 2015 at 06:01:23AM +0100, Al Viro wrote:
So we need
* per-page exclusion for reallocation time (normal page locks are
doing that)
* per-fs exclusion for block and fragment allocations (-s_lock?)
* per-fs exclusion for inode allocations (-s_lock?)
*
On Mon, 2015-05-25 at 19:09 -0500, Chong Li wrote:
Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set functions to
support
per-VCPU settings for RTDS scheduler.
Add a new data structure (libxl_vcpu_sched_params) to help per-VCPU settings.
Signed-off-by: Chong Li
I have the impression that this is HTML mail. Please don't post HTML
mail; it falls apart when it is quoted.
That said,
On 06/04/15 16:07, Maoming wrote:
Hi all:
I started a virtual machine(VM) (redhat6.3_64bit) using OVMF in XEN4.6.
And the memory of the VM is 64G.
But I only
Hi all,
Apologies for dropping the ball on this.
I've created a doodle poll with an initial set of options at
http://doodle.com/596a39y9t9dhah65. The timezone is currently set to London
(BST) but can be changed on the link to your local timezone.
If there are others who would like to attend
Hi Ian,
On 04/06/15 14:54, Ian Campbell wrote:
### Device Identifiers
Each device using the ITS is associated with a unique Device
Identifier.
The device IDs are properties of the implementaiton and are typically
implementation
described via system firmware, e.g. the ACPI IORT table or
flight 57861 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57861/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 9 windows-install fail REGR. vs. 57740
Regressions which are
On 06/04/2015 12:55 PM, Rusty Russell wrote:
Yeah, hard cases make bad law.
I'm not too unhappy with this fix; ideally we'd rename save_fl and
restore_fl to save_eflags_if and restore_eflags_if too.
I would be fine with this... but please document what the bloody
semantics of pvops is
On Wed, 2015-06-03 at 18:06 +0100, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
This new libxl_domain_create_info field is used to set
XEN_DOMCTL_CONFIG_VMWARE_PORT_MASK in the xc_domain_configuration_t
for x86.
In xen it is is_vmware_port_enabled.
If
On Thu, 2015-06-04 at 16:28 +0100, Wei Liu wrote:
An alternative we came up with during our IRL discussion.
1. QEMU writes the size of additional memory in xenstore.
Above is orthogonal to below I think. You existing patch could be
reimplemented in terms of the below, while the above is
On 06/04/15 11:17, Ian Campbell wrote:
On Fri, 2015-05-22 at 11:50 -0400, Don Slutz wrote:
[...]
+=item Bvmware_hwver=NUMBER
+
+Turns on or off the exposure of VMware cpuid. The number is
+VMware's hardware version number, where 0 is off. A number = 7
+is needed to enable exposure of
On 06/04/15 10:14, George Dunlap wrote:
On 06/04/2015 01:37 PM, Don Slutz wrote:
On 06/03/15 12:58, George Dunlap wrote:
On 06/03/2015 05:41 PM, Don Slutz wrote:
On 06/03/15 12:23, George Dunlap wrote:
On 06/03/2015 04:58 PM, Andrew Cooper wrote:
On 03/06/15 16:26, George Dunlap wrote:
On
On Thu, 2015-06-04 at 13:52 +0100, Julien Grall wrote:
On 04/06/15 13:46, David Vrabel wrote:
On 04/06/15 13:45, Julien Grall wrote:
On 03/06/15 18:06, Joe Perches wrote:
On Wed, 2015-06-03 at 17:55 +0100, Julien Grall wrote:
rx-status is an int16_t, print it using %d rather than %u in
It uses a PPI which we cannot route to a guest, and will surely need
more support than just that anyway.
I noticed this on Mustang with UEFI where the built in DTB contains a
node of this type.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
xen/arch/arm/domain_build.c |1 +
1 file
flight 57859 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57859/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 11 guest-start fail REGR. vs. 53854
test-amd64-amd64-libvirt
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
xen/arch/arm/irq.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/arm/irq.c b/xen/arch/arm/irq.c
index 376c9f2..2dd43ee 100644
--- a/xen/arch/arm/irq.c
+++ b/xen/arch/arm/irq.c
@@ -417,7 +417,7 @@ int
Hi,
Those 2 patches was originally part of the Xen 64KB series [1]. They are
already acked/reviewed and can go in Linux via the net tree now
without waiting the rest of the series.
Sincerely yours,
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: David Vrabel
Hi Ian,
On 04/06/15 16:31, Ian Campbell wrote:
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Reviewed-by: Julien Grall julien.gr...@citrix.com
---
xen/arch/arm/irq.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/arm/irq.c b/xen/arch/arm/irq.c
On 06/04/15 11:49, Ian Campbell wrote:
On Wed, 2015-06-03 at 18:06 +0100, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
This new libxl_domain_create_info field is used to set
XEN_DOMCTL_CONFIG_VMWARE_PORT_MASK in the xc_domain_configuration_t
for x86.
In xen it is
flight 57857 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57857/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 56492
Hi
I want to toggle user/sypervisor priviledge bit in page table entry
associated to a given
this page. But I my code does'nt work. I have plenty buggs.
here is the method used to set access to hypervisor level
void remove_access(l1_pgentry_t *pl1e){
l1_pgentry_t ol1e;
l1_pgentry_t nl1e;
At 16:22 +0100 on 04 Jun (1433434934), David Vrabel wrote:
On 04/06/15 15:11, Tim Deegan wrote:
There has been talk before of an operation along the lines of revoke
this grant entry and wait for all users to release it but that would
only help with backends that are guaranteed to release
On 06/04/15 11:15, Ian Campbell wrote:
On Wed, 2015-06-03 at 15:53 +0100, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
This is used to set xen_arch_domainconfig vmware_hw. It is set to
the emulated VMware virtual hardware version.
Currently 0, 3-4, 6-11 are good values.
At 16:19 +0100 on 04 Jun (1433434780), David Vrabel wrote:
On 04/06/15 15:05, Tim Deegan wrote:
At 15:35 +0200 on 03 Jun (1433345719), Vitaly Kuznetsov wrote:
We need to close all event channel so the domain performing soft reset
will be able to open them back. Interdomain channels are,
At 15:35 +0200 on 03 Jun (1433345719), Vitaly Kuznetsov wrote:
We need to close all event channel so the domain performing soft reset
will be able to open them back. Interdomain channels are, however,
special. We need to keep track of who opened it as in (the most common)
case it was opened by
Hi,
At 15:35 +0200 on 03 Jun (1433345718), Vitaly Kuznetsov wrote:
last week you expressed some concerns about if the toolstack-based
approach to PVHVM guest kexec is the best. Here you can see the 'reset
everything' approach to the same problem. It is the bare minimum of what
should be done
Today after trying xen-unstable build (tested many hours) of some days
ago I tried update qemu to latest development version (from git master
commit 6fa6b312765f698dc81b2c30e7eeb9683804a05b) and seems that there is
a regression:
xl create /etc/xen/W7.cfg
Parsing config from /etc/xen/W7.cfg
On 04/06/15 15:11, Tim Deegan wrote:
There has been talk before of an operation along the lines of revoke
this grant entry and wait for all users to release it but that would
only help with backends that are guaranteed to release grants in a
reasonable time.
Are you talking about my idea?
On 04/06/15 15:05, Tim Deegan wrote:
At 15:35 +0200 on 03 Jun (1433345719), Vitaly Kuznetsov wrote:
We need to close all event channel so the domain performing soft reset
will be able to open them back. Interdomain channels are, however,
special. We need to keep track of who opened it as in
On Fri, 2015-05-22 at 11:50 -0400, Don Slutz wrote:
[...]
+=item Bvmware_hwver=NUMBER
+
+Turns on or off the exposure of VMware cpuid. The number is
+VMware's hardware version number, where 0 is off. A number = 7
+is needed to enable exposure of VMware cpuid.
+
+The hardware version
On Tue, Jun 02, 2015 at 06:40:56PM +0100, Wei Liu wrote:
On Tue, Jun 02, 2015 at 05:11:02PM +0100, Andrew Cooper wrote:
On 02/06/15 16:49, Ian Campbell wrote:
On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote:
[...]
So here is a proof of concept patch to record and honour that value
At 16:19 +0200 on 03 Jun (1433348379), Lengyel, Tamas wrote:
On Wed, Jun 3, 2015 at 3:48 PM, Razvan Cojocaru rcojoc...@bitdefender.com
wrote:
On 06/03/2015 04:29 PM, Lengyel, Tamas wrote:
struct {
-uint16_t mov_to_cr0_enabled : 1;
-uint16_t
At 15:35 +0200 on 03 Jun (1433345722), Vitaly Kuznetsov wrote:
x86-specific hook cleans up the pirq-emuirq mappings and replaces the
shared_info frame with an empty page to support subsequent
XENMAPSPACE_shared_info call.
That's a bit roundabout. I think we might be better off allocating a
On Fri, 2015-05-22 at 11:50 -0400, Don Slutz wrote:
diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
index 86164a7..fcce7c3 100644
--- a/tools/libxl/libxl.h
+++ b/tools/libxl/libxl.h
@@ -205,6 +205,11 @@
#define LIBXL_HAVE_LIBXL_VGA_INTERFACE_TYPE_VMWARE 1
/*
+ *
flight 57854 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57854/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 15
rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR.
On Tue, 2015-06-02 at 17:28 +0100, George Dunlap wrote:
On Tue, May 26, 2015 at 1:05 AM, Chong Li lichong...@gmail.com wrote:
Add two hypercalls(XEN_DOMCTL_SCHEDOP_getvcpuinfo/putvcpuinfo) to get/set a
domain's
per-VCPU parameters. Hypercalls are handled by newly added hook
At 15:35 +0200 on 03 Jun (1433345720), Vitaly Kuznetsov wrote:
When soft reset is being performed we need to replace all actively
granted pages with empty pages to prevent possible future memory
corruption as the newly started kernel won't be aware of these
granted pages.
I'm not sure about
Hi all,
Recently, I am testing the TMEM support on Xen. I discovered that when
enabled TMEM in ubuntu 14.10 as guest on Xen 4.1 Xen 4.3, xm save xm
restore“ failed after there are more than 1000 pages put in persistent pool
of TMEM in Xen. My operations are list as follows:
In ubuntu guest
(redirecting to xen-devel as I originally intended)
On Wed, 2015-06-03 at 13:02 +0800, lwch...@cs.hku.hk wrote:
Hi,
Wonder if there is any follow-ups from the relevant developers:
(1) are you able to reproduce the spinning behavior of xl vcpu-set?
I am with Xen 4.5, but not with
On 06/03/2015 06:51 PM, Andrew Cooper wrote:
On 03/06/15 09:01, Yang Hongyang wrote:
This patchset mainly focus on libxl save, most of the patches are
simply move codes out of libxl_dom.c, except a refactor patch.
Please see individual patch for detail.
Can get the whole patchset from:
Draft D follows. Also at:
http://xenbits.xen.org/people/ianc/vits/draftD.{pdf,html}
In this iteration I took a step back and tried to simplify a lot of
things, in an attempt to get closer to something we can agree on as a
first cut that is achievable for 4.6, since I felt we were getting
bogged
At 12:43 +0100 on 03 Jun (145401), Andrew Cooper wrote:
Following c/s e758ed14 which describes the current terms used in Xens memory
management, introduce some infrastructure so that new code can be written
correctly.
This is the start of a long potential cleanup.
Acked-by: Tim Deegan
On 06/04/2015 01:37 PM, Don Slutz wrote:
On 06/03/15 12:58, George Dunlap wrote:
On 06/03/2015 05:41 PM, Don Slutz wrote:
On 06/03/15 12:23, George Dunlap wrote:
On 06/03/2015 04:58 PM, Andrew Cooper wrote:
On 03/06/15 16:26, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
On Fri, 2015-05-29 at 11:47 -0500, Chong Li wrote:
On Fri, May 29, 2015 at 8:51 AM, Dario Faggioli
dario.faggi...@citrix.com wrote:
On Mon, 2015-05-25 at 19:05 -0500, Chong Li wrote:
diff --git a/xen/common/domctl.c b/xen/common/domctl.c
index 28aea55..8143c44 100644
---
On Wed, 2015-06-03 at 15:53 +0100, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
This is used to set xen_arch_domainconfig vmware_hw. It is set to
the emulated VMware virtual hardware version.
Currently 0, 3-4, 6-11 are good values. However the code only
checks for ==
On Fri, 2015-05-29 at 14:14 +0100, Jan Beulich wrote:
On 29.05.15 at 15:01, dario.faggi...@citrix.com wrote:
On Wed, 2015-05-27 at 12:41 +0100, Jan Beulich wrote:
On 26.05.15 at 19:18, lichong...@gmail.com wrote:
On Tue, May 26, 2015 at 4:08 AM, Jan Beulich jbeul...@suse.com wrote:
On
flight 57842 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57842/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-winxpsp3 16 guest-stop fail REGR. vs. 53018
On 06/03/2015 02:31 AM, Andrew Cooper wrote:
There appears to be no formal statement of what pv_irq_ops.save_fl() is
supposed to return precisely. Native returns the full flags, while lguest and
Xen only return the Interrupt Flag, and both have comments by the
implementations stating that
On 04/06/2015 09:18, Wei Wang wrote
On 03/06/2015 19:51, Jan Beulich wrote
On 03.06.15 at 10:07, wei.w.w...@intel.com wrote:
On 26/05/2015 22:02, Jan Beulich wrote
On 13.05.16 at 09:51, wei.w.w...@intel.com wrote:
--- a/xen/arch/x86/acpi/cpufreq/cpufreq.c
+++
On Thu, 2015-06-04 at 10:14 +0100, Wei Liu wrote:
The main objection is that we shouldn't call xc_domain_setmaxmem in the
middle of a migration stream.
In the middle of an _xc_ migration stream.
This seems like the sort of thing it would be OK to have in a (to be
introduced) libxl stream
On Thu, 2015-06-04 at 10:32 +0100, Andrew Cooper wrote:
On 04/06/15 10:26, Ian Campbell wrote:
On Thu, 2015-06-04 at 10:14 +0100, Wei Liu wrote:
The main objection is that we shouldn't call xc_domain_setmaxmem in the
middle of a migration stream.
In the middle of an _xc_ migration stream.
This patch does the following:
1. Use local variables for dummy vNUMA layout in PV case.
2. Avoid leaking dummy layout back to caller in PV case.
3. Use local variables to reference vNUMA layout (whether it is dummy
or provided by caller) for both PV and HVM.
Signed-off-by: Wei Liu
On Thu, Jun 04, 2015 at 11:06:39AM +0100, Stefano Stabellini wrote:
On Tue, 2 Jun 2015, Wei Liu wrote:
On Mon, Jun 01, 2015 at 05:01:34PM +0100, Stefano Stabellini wrote:
The device model is going to restrict its xenstore connection to $DOMID
level. Let it access
On Thu, Jun 04, 2015 at 10:58:18AM +0100, Ian Campbell wrote:
Unless the author or someone else in the know speaks up I would propose
to remove this text from the wiki.
+1 for this.
Wei.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 04/06/2015 18:55, Julien Grall wrote:
After reading this draft, I think we can avoid to browse the Device
Table and the ITT. As said on the previous paragraph, the pending_irq
structure is linked to an irq_desc. In your proposal, you suggested to
store the its_device in the irq_guest (part
On Thu, Jun 4, 2015 at 3:53 PM, Tim Deegan t...@xen.org wrote:
At 16:19 +0200 on 03 Jun (1433348379), Lengyel, Tamas wrote:
On Wed, Jun 3, 2015 at 3:48 PM, Razvan Cojocaru
rcojoc...@bitdefender.com
wrote:
On 06/03/2015 04:29 PM, Lengyel, Tamas wrote:
struct {
-
Wang, Wei W wei.w.w...@intel.com 06/04/15 4:21 AM
On 26/05/2015 22:16, Jan Beulich wrote
On 13.05.16 at 09:51, wei.w.w...@intel.com wrote:
--- a/xen/drivers/acpi/pmstat.c
+++ b/xen/drivers/acpi/pmstat.c
@@ -261,29 +272,47 @@ static int get_cpufreq_para(struct
xen_sysctl_pm_op *op)
Wang, Wei W wei.w.w...@intel.com 06/04/15 3:15 AM
On 03/06/2015 19:51, Jan Beulich wrote
On 03.06.15 at 10:07, wei.w.w...@intel.com wrote:
@@ -650,9 +650,12 @@ static int __init cpufreq_driver_init(void)
int ret = 0;
if ((cpufreq_controller == FREQCTL_xen)
-
Hi Dario,
On 04/06/2015 09:57, Dario Faggioli wrote:
On Tue, 2015-06-02 at 16:07 +0100, Julien Grall wrote:
The commit 376bbbabbda607d2039b8f839f15ff02721597d2 sched_rt: print useful
affinity info when dumping breaks build on ARM64:
sched_rt.c: In function ‘rt_init’:
sched_rt.c:442:26: error:
On 06/04/2015 04:36 PM, Ian Campbell wrote:
On Thu, 2015-06-04 at 09:01 +0800, Yang Hongyang wrote:
On 06/02/2015 06:11 PM, Andrew Cooper wrote:
On 02/06/15 10:26, Yang Hongyang wrote:
When we are under COLO, we will send dirty page bitmap info from
secondary to primary at every
On 04/06/15 07:38, H. Peter Anvin wrote:
On 06/03/2015 02:31 AM, Andrew Cooper wrote:
There appears to be no formal statement of what pv_irq_ops.save_fl() is
supposed to return precisely. Native returns the full flags, while lguest
and
Xen only return the Interrupt Flag, and both have
On Tue, 2015-06-02 at 16:07 +0100, Julien Grall wrote:
The commit 376bbbabbda607d2039b8f839f15ff02721597d2 sched_rt: print useful
affinity info when dumping breaks build on ARM64:
sched_rt.c: In function ‘rt_init’:
sched_rt.c:442:26: error: assignment from incompatible pointer type [-Werror]
On Thu, 2015-06-04 at 09:01 +0800, Yang Hongyang wrote:
On 06/02/2015 06:11 PM, Andrew Cooper wrote:
On 02/06/15 10:26, Yang Hongyang wrote:
When we are under COLO, we will send dirty page bitmap info from
secondary to primary at every checkpoint. So we need to get/test
the dirty page
Hi all,
I was reading
http://wiki.xen.org/wiki/XenBus
In the section on Store Organization, there is the statement Information should not
be replicated in the store and required to be consistent I'm not sure what that
means.
Can anybody clarify this for me, please?
Thanks.
linda
On 06/03/15 12:23, George Dunlap wrote:
On 06/03/2015 04:58 PM, Andrew Cooper wrote:
On 03/06/15 16:26, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
Summary is that VMware treats in (%dx),%eax (or out %eax,(%dx))
to port 0x5658 specially. Note: since many operations return
Hi Julien,
When the property clock-frequency is present in the DT timer node, it means
that the bootloader/firmware didn't correctly configured the
CNTFRQ/CNTFRQ_EL0 on each processor.
I will test this patch, but it doesn't apply cleanly to the version of Xen I'm
currently using, so I need to
On Wed, Jun 03, 2015 at 02:22:25PM +0100, George Dunlap wrote:
On Tue, Jun 2, 2015 at 3:05 PM, Wei Liu wei.l...@citrix.com wrote:
Previous discussion at [0].
For the benefit of discussion, we refer to max_memkb inside hypervisor
as hv_max_memkb (name subject to improvement). That's the
On 04/06/15 10:26, Ian Campbell wrote:
On Thu, 2015-06-04 at 10:14 +0100, Wei Liu wrote:
The main objection is that we shouldn't call xc_domain_setmaxmem in the
middle of a migration stream.
In the middle of an _xc_ migration stream.
This seems like the sort of thing it would be OK to have
On Wed, 2015-06-03 at 09:24 -0600, Linda wrote:
Hi all,
I was reading
http://wiki.xen.org/wiki/XenBus
In the section on Store Organization, there is the statement
Information should not be replicated in the store and required to be
consistent I'm not sure what that means.
Can
On Tue, 2 Jun 2015, Wei Liu wrote:
On Mon, Jun 01, 2015 at 05:01:34PM +0100, Stefano Stabellini wrote:
The device model is going to restrict its xenstore connection to $DOMID
level. Let it access /local/domain/0/device-model/$DOMID, as it is
required by QEMU to read/write the physmap. It
Hi all,
this patch series changes libxl to start QEMU as device model with the
new xsrestrict option (http://marc.info/?l=xen-develm=143341692707358).
It also starts a second QEMU to provide PV backends in userspace (qdisk)
to HVM guests.
Changes in v2:
- fix xs permissions to actually do what
On 06/04/15 07:20, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
Also added missing TRAP_DEBUG VLAPIC.
Signed-off-by: Don Slutz dsl...@verizon.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
v11:
No change
v10:
Added Acked-by: Ian Campbell
Added back in
Hi everyone,
the developer summit schedule is now live at
http://events.linuxfoundation.org/events/xen-project-developer-summit/program/schedule
http://events.linuxfoundation.org/events/xen-project-developer-summit/program/schedule
and speakers should have gotten an acceptance mails. If not,
On 05/22/2015 04:50 PM, Don Slutz wrote:
Also added missing TRAP_DEBUG VLAPIC.
Signed-off-by: Don Slutz dsl...@verizon.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
v11:
No change
v10:
Added Acked-by: Ian Campbell
Added back in the trace point calls.
Why is cmd
Hi all,
this patch series introduces a new command line option to restrict the
privilege of the xenstore connection. Used together with -runas, can
help secure the execution of QEMU in Dom0.
Changes in v2:
- remove xenstore_record_dm_state and open code the xenstore write
instead
- change the
On Thu, Jun 04, 2015 at 11:35:23AM +0100, Wei Liu wrote:
On Thu, Jun 04, 2015 at 10:58:18AM +0100, Ian Campbell wrote:
Unless the author or someone else in the know speaks up I would propose
to remove this text from the wiki.
+1 for this.
Ian, I looked at the history of that page. It
On Thu, Jun 04, 2015 at 12:35:22PM +0100, Ian Campbell wrote:
On Thu, 2015-06-04 at 12:31 +0100, Wei Liu wrote:
On Thu, Jun 04, 2015 at 11:35:23AM +0100, Wei Liu wrote:
On Thu, Jun 04, 2015 at 10:58:18AM +0100, Ian Campbell wrote:
Unless the author or someone else in the know speaks up I
flight 57852 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57852/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 9 windows-install fail REGR. vs. 57419
Regressions which
The following patch will introduce a new option to restrict the
privilege of the xenstore connection. In that case, we do not want to
use multiple xenstore connections, but just the one, with lower
privileges.
For this reason, split the xenstore_record_dm_state calls for pv and hvm
machines, so
Introduce a new command line option xenopts, with one boolean
suboption xsrestrict. When xsrestrict=on is passed, QEMU will
restrict the xenstore connection calling xs_restrict. Also it won't
initialize the pv backends as they require higher privileges.
Change the xenpv machine xenstore path for
Starts a second QEMU to provide PV backends in userspace to HVM guests.
Signed-off-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
---
tools/libxl/libxl_create.c | 18 ++
tools/libxl/libxl_dm.c |9 -
2 files changed, 26 insertions(+), 1 deletion(-)
diff
The device model is going to restrict its xenstore connection to $DOMID
level. Let it access /local/domain/0/device-model/$DOMID, as it is
required by QEMU to read/write the physmap. It doesn't contain any
information the guest is not already fully aware of.
Signed-off-by: Stefano Stabellini
If QEMU is ran just to provide PV backends, change the xenstore path to
/local/domain/0/device-model/$DOMID/pv.
Add a parameter to libxl__device_model_xs_path to distinguish the device
model from the pv backends provider.
Store the device model binary path under
/local/domain/$DOMID/device-model
On 06/03/15 13:09, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
This adds synchronization of the 6 vcpu registers (only 32bits of
them) that vmport.c needs between Xen and QEMU.
This is to avoid a 2nd and 3rd exchange between QEMU and Xen to
fetch and put these 6 vcpu
When QEMU restricts its xenstore connection, it cannot provide PV
backends. A separate QEMU instance is required to provide PV backends in
userspace, such as qdisk. With two separate instances, it is not
possible to take advantage of vkb for mouse and keyboard, as the QEMU
that emulates the
Check whether QEMU supports the xsrestrict option, by parsing its --help
output. Store the result on xenstore for future reference on a per QEMU
binary basis, so that device_model_override still works fine with it.
Replace / with _ in the QEMU binary path before writing it to xenstore,
so that it
On Thu, 2015-06-04 at 12:31 +0100, Wei Liu wrote:
On Thu, Jun 04, 2015 at 11:35:23AM +0100, Wei Liu wrote:
On Thu, Jun 04, 2015 at 10:58:18AM +0100, Ian Campbell wrote:
Unless the author or someone else in the know speaks up I would propose
to remove this text from the wiki.
+1
flight 57853 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57853/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail in 57788 REGR. vs. 57312
Tests which are
Razvan Cojocaru rcojoc...@bitdefender.com 06/04/15 3:46 PM
On 06/04/2015 04:43 PM, Tim Deegan wrote:
At 14:40 +0100 on 04 Jun (1433428815), Tim Deegan wrote:
At 16:45 +0300 on 29 May (1432917959), Razvan Cojocaru wrote:
As suggested by Andrew Cooper, this patch attempts to remove
some
On 06/03/15 12:58, George Dunlap wrote:
On 06/03/2015 05:41 PM, Don Slutz wrote:
On 06/03/15 12:23, George Dunlap wrote:
On 06/03/2015 04:58 PM, Andrew Cooper wrote:
On 03/06/15 16:26, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
Summary is that VMware treats in (%dx),%eax
On 04/06/15 13:45, Julien Grall wrote:
On 03/06/15 18:06, Joe Perches wrote:
On Wed, 2015-06-03 at 17:55 +0100, Julien Grall wrote:
rx-status is an int16_t, print it using %d rather than %u in order to
have a meaningful value when the field is negative.
[]
diff --git
On 04/06/15 13:46, David Vrabel wrote:
On 04/06/15 13:45, Julien Grall wrote:
On 03/06/15 18:06, Joe Perches wrote:
On Wed, 2015-06-03 at 17:55 +0100, Julien Grall wrote:
rx-status is an int16_t, print it using %d rather than %u in order to
have a meaningful value when the field is negative.
1 - 100 of 107 matches
Mail list logo