On 9/15/2015 7:00 PM, Paolo Bonzini wrote:
On 15/09/2015 11:55, Stefano Stabellini wrote:
On Mon, 14 Sep 2015, Paolo Bonzini wrote:
> On 10/09/2015 12:29, Stefano Stabellini wrote:
> > +if (lseek(config_fd, pos, SEEK_SET) != pos) {
> > +return -errno;
> > +}
> > do {
>
flight 61955 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/61955/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-libvirt-vhd 17 guest-start/debian.repeat fail in 61789 pass in
61955
On Tue, Sep 15, 2015 at 02:50:27PM +0100, Andrew Cooper wrote:
> On 15/09/15 14:42, Haozhong Zhang wrote:
> >
> >>> +mfn = mfn_x(get_gfn(d, gpfn, ));
> >>> +
> >>> +if (mfn == INVALID_MFN) {
> >>> +put_domain(d);
> >>> +return
The page freed from the domain should be on held, until the
Device-TLB flush is completed. The page previously associated
with the freed portion of GPA should not be reallocated for
another purpose until the appropriate invalidations have been
performed. Otherwise, the original page owner can
Introduction
VT-d code currently has a number of cases where completion of certain
operations
is being waited for by way of spinning. The majority of instances use that
variable
indirectly through IOMMU_WAIT_OP() macro , allowing for loops of up to 1 second
Signed-off-by: Quan Xu
---
xen/drivers/passthrough/vtd/iommu.c | 133
xen/drivers/passthrough/vtd/iommu.h | 10 +++
2 files changed, 143 insertions(+)
diff --git a/xen/drivers/passthrough/vtd/iommu.c
b/xen/drivers/passthrough/vtd/iommu.c
the Device-TLB flush is completed.
Signed-off-by: Quan Xu
---
xen/drivers/passthrough/vtd/iommu.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/xen/drivers/passthrough/vtd/iommu.c
b/xen/drivers/passthrough/vtd/iommu.c
index 5c03e41..1297dea 100644
---
not completed when to map the transferring page to a remote
domain, schedule and wait on a waitqueue until the Device-TLB
flush is completed.
Signed-off-by: Quan Xu
---
xen/common/grant_table.c | 16
1 file changed, 16 insertions(+)
diff --git
entry guest mode and put into the SCHEDOP_yield list.
Signed-off-by: Quan Xu
---
xen/arch/x86/hvm/vmx/entry.S | 10 ++
xen/arch/x86/x86_64/asm-offsets.c | 1 +
xen/common/domain.c | 5 +
xen/include/xen/hvm/iommu.h | 2 ++
4 files
invalidataion requests. If the IF bit is Set, the interrupt based mechanism
will be used to track the Device-TLB invalidation requests. Do not do polling
to detect whether hardware completes the Device-TLB invalidation during Device-
TLB invalidation.
Signed-off-by: Quan Xu
QI interrupt handler and QI startup. If the IWC field was already
Set at the time of setting this field, it is not treated as a new
interrupt conditions.
In QI interrupt handler, Check IP field of Invalidation Event Control
register after scan domain status. if IP field is Set, scan agian,
instead
The qi_flag is Set when submit Device-TLB invalidation requests. The
qi_flag will be Clear in QI interrupt handler if there are no in-flight
Device-TLB invalidation requests.
Signed-off-by: Quan Xu
---
xen/drivers/passthrough/vtd/iommu.c | 1 +
Signed-off-by: Quan Xu
---
xen/drivers/passthrough/vtd/iommu.c | 21 -
1 file changed, 12 insertions(+), 9 deletions(-)
diff --git a/xen/drivers/passthrough/vtd/iommu.c
b/xen/drivers/passthrough/vtd/iommu.c
index 1dffc40..17bfb76 100644
---
to destroy virtual machine, schedule and wait on a waitqueue
until the Device-TLB flush is completed.
Signed-off-by: Quan Xu
---
xen/common/domain.c | 10 ++
xen/drivers/passthrough/vtd/iommu.c | 9 +
xen/include/xen/hvm/iommu.h | 6
if it has no in-flight Device-TLB invalidation request.
Signed-off-by: Quan Xu
---
xen/drivers/passthrough/vtd/iommu.c | 22 ++
1 file changed, 22 insertions(+)
diff --git a/xen/drivers/passthrough/vtd/iommu.c
b/xen/drivers/passthrough/vtd/iommu.c
index
Signed-off-by: Quan Xu
---
xen/common/memory.c | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/xen/common/memory.c b/xen/common/memory.c
index 61bb94c..4b2def5 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -253,7 +253,21 @@
Update invalidation table's count of in-flight Device-TLB invalidation
request and assign the address of global polling parameter per domain in
the Status Address of each invalidation wait descriptor, when submit
Device-TLB invalidation requests.
Signed-off-by: Quan Xu
---
This patch removes the address translation in xen-mceinj which
translates the guest physical address passed-in through the argument of
'-p' to the host machine address. Instead, xen-mceinj now passes a flag
MC_MSRINJ_F_GPADDR to ask do_mca() in the hypervisor to do this
translation.
Remove trailing whitespaces and fix indentations in mce.c and xen_mca.h.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/cpu/mcheck/mce.c | 10 +-
xen/include/public/arch-x86/xen-mca.h | 30 +++---
2 files changed, 20
The existing xen-mceinj can not inject MCE through MSR_MCI_ADDR to a
domain w/ more than 4GB memory, e.g. if domain 0 has more than 4GB
memory, the execution of the command
xen-mceinj -d 0 -t 0 -p 0x2721a900
will fail w/ a message "Failed to get pfn list : Operation not
supported".
This patch adds a new flag MC_MSRINJ_F_GPADDR to
xen_mc_msrinject.mcinj_flags, and makes do_mca() to translate the
guest physical address passed-in through
xen_mc_msrinject.mcinj_msr[i].value to the host machine address if
this flag is present.
Signed-off-by: Haozhong Zhang
Remove trailing whitespaces in xen-mceinj.c.
Signed-off-by: Haozhong Zhang
---
tools/tests/mce-test/tools/xen-mceinj.c | 66 -
1 file changed, 33 insertions(+), 33 deletions(-)
diff --git a/tools/tests/mce-test/tools/xen-mceinj.c
flight 61961 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/61961/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-raw 9 debian-di-install fail REGR. vs. 60742
Tests which are
flight 61947 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/61947/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 60785
Regressions which are
On systems where the ACPI DSDT advertises the PCI MMCONFIG area but the
E820 table does not reserve it, it's up to Dom0 to inform Xen via
PHYSDEVOP_pci_mmcfg_reserved. This needs to happen before Xen tries to
access extended capabilities like SRIOV in pci_add_device(), which is
triggered when
Since commit 3848058e7dd6 (vtd/iommu: permit group devices to
passthrough in relaxed mode) is introduced, we always print
message as XENLOG_G_WARNING but its not correct in the case of
strict mode. So here is making this message depending on the
specific mode.
CC: Yang Zhang
This run is configured for baseline tests only.
flight 37930 qemu-upstream-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/37930/
Failures :-/ but no regressions.
Tests which did not succeed,
including tests which could not be run:
test-amd64-i386-xl-qemuu-winxpsp3
flight 61883 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/61883/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 16 guest-start/debian.repeat fail REGR. vs. 61666
This is so that callers can determine what range of address space would
get altered by a corresponding "set".
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/mm/p2m-pt.c
+++ b/xen/arch/x86/mm/p2m-pt.c
@@ -715,14 +715,26 @@ p2m_pt_get_entry(struct p2m_domain *p2m,
*a =
The xen store preserves this information across module invocations.
If you insmod netfront with two queues and later insmod again with one
queue, the backend will still believe you asked for two queues.
Signed-off-by: Chas Williams <3ch...@gmail.com>
---
drivers/net/xen-netfront.c | 12
When mapping large BARs (e.g. the frame buffer of a graphics card) the
overhead or establishing such mappings using onle 4k pages has,
particularly after the XSA-125 fix, become unacceptable. Alter the
XEN_DOMCTL_memory_mapping semantics once again, so that there's no
longer a fixed amount of
Please disregard this - hit "send" too early.
>>> On 15.09.15 at 09:31, wrote:
On 15.09.15 at 09:13, wrote:
>> ... where possible. This is in response to
>> http://lists.xenproject.org/archives/html/xen-devel/2015-09/msg01502.html,
>> albeit only the
flight 61890 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/61890/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 16
guest-start/debianhvm.repeat fail REGR. vs. 61770
>>> On 15.09.15 at 09:08, wrote:
> El 07/09/15 a les 12.05, Jan Beulich ha escrit:
> On 07.09.15 at 11:34, wrote:
>>> So AFAICS we have 3 options:
>>>
>>> 1. Overload VCPUOP_initialise like it's done in the current series (v6).
>>> For PV guests
... where possible. This is in response to
http://lists.xenproject.org/archives/html/xen-devel/2015-09/msg01502.html,
albeit only the first three patches are really needed for that (the
fourth one just leverages what the first two do in another way).
The third (main) patch is RFC for a number of
>>> On 15.09.15 at 09:13, wrote:
> ... where possible. This is in response to
> http://lists.xenproject.org/archives/html/xen-devel/2015-09/msg01502.html,
> albeit only the first three patches are really needed for that (the
> fourth one just leverages what the first two do in
This is so that callers can determine what range of address space would
get altered by a corresponding "set".
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/mm/p2m-ept.c
+++ b/xen/arch/x86/mm/p2m-ept.c
@@ -879,7 +879,13 @@ static mfn_t ept_get_entry(struct p2m_do
/*
>>> On 15.09.15 at 03:17, wrote:
>> > But looks its not better, so any idea?
>>
>> Did you at least make an attempt to find other examples of where
>> we dynamically determine the log level to be used for a message?
>> I would assume that if you did, you'd have come to
>>
El 07/09/15 a les 12.05, Jan Beulich ha escrit:
On 07.09.15 at 11:34, wrote:
>> So AFAICS we have 3 options:
>>
>> 1. Overload VCPUOP_initialise like it's done in the current series (v6).
>> For PV guests the hypercall parameter is of type vcpu_guest_context,
>> while
Now that p2m->get_entry() always returns a valid order, utilize this
to accelerate some of the operations in PoD code. (There are two uses
of p2m->get_entry() left which don't easily lend themselves to this
optimization.)
Also adjust a few types as needed and remove stale comments from
On Mon, Sep 14, 2015 at 04:46:28PM +0100, Marc Zyngier wrote:
> On 14/09/15 16:06, Will Deacon wrote:
> > When restoring the system register state for an AArch32 guest at EL2,
> > writes to DACR32_EL2 may not be correctly synchronised by Cortex-A57,
> > which can lead to the guest effectively
On Thursday 10 September 2015 06:42 AM, Julien Grall wrote:
> Hi Manish,
Hi Julien, sorry for late response..
>
> On 13/08/2015 10:42, Manish Jaggi wrote:
>> 3.2.Mapping between streamID - deviceID - pci sbdf - requesterID
>>
On Wed, 2015-09-02 at 16:30 +0200, Juergen Gross wrote:
> On 09/02/2015 04:08 PM, Boris Ostrovsky wrote:
> > On 09/02/2015 07:58 AM, Juergen Gross wrote:
> >> On 08/31/2015 06:12 PM, Boris Ostrovsky wrote:
> >>> If set_cpu_sibling_map()'s has_mp is false, wouldn't we effectively have
> >>> both
flight 61925 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/61925/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qcow2 9 debian-di-install fail REGR. vs. 60727
Andrew Cooper writes ("Re: [Xen-devel] [PATCH 1/4] libxl: convert to use LOG()
macro"):
> There are a number of entries like this where the number of lines could
> be reduced.
Indeed, but that's IMO no reason to block this patch which is a big
improvement.
> > -if (ret==0 || xcinfo.domain
Ian Campbell writes ("Re: [PATCH 0/4] libxl: use LOG() macro where
appropriate"):
> In terms of applying it seems like the sort of thing which would cause a
> lot of pain for backports to 4.6. Shall we hold off or do we think the
> inflow of backports has slowed sufficiently now?
I would like to
Ian Campbell writes ("[PATCH OSSTEST 1/4] ts-hosts-allocate-Executive: Allow
dry-run"):
> Provide a new -n command line option which causes no allocations to be
> done, for debugging.
Acked-by: Ian Jackson
___
Xen-devel
Ian Campbell writes ("[PATCH OSSTEST 3/4] Add support for selecting resources
based on their properties."):
> In particular for allocating hosts based on host properties.
>
> To do this we extend the hostflags syntax with "condition:arg1:arg2".
> This specifies that the candidate host must pass
Daniel P. Berrange wrote:
> On Tue, Sep 15, 2015 at 10:57:50AM -0600, Jim Fehlig wrote:
>
>> Daniel P. Berrange wrote:
>>
>>> On Tue, Sep 15, 2015 at 09:26:23AM -0600, Jim Fehlig wrote:
>>>
>>>
Instead of a hardcoded DEBUG log level, use the overall
daemon log level
On Fri, Aug 14, 2015 at 9:57 AM, Martin Pohlack wrote:
> On 14.08.2015 15:54, Jan Beulich wrote:
> On 14.08.15 at 14:59, wrote:
>>> On 11.08.2015 16:12, Jan Beulich wrote:
>>> On 05.08.15 at 16:09, wrote:
> Todo:
>
On Thu, Sep 03, 2015 at 12:45:12PM +0200, Juergen Gross wrote:
> When Xen is using the qemu usb framework for pure passthrough of I/Os
> to host devices the handling of isoc jobs is rather complicated if
> multiple isoc frames are transferred with one call.
>
> Instead of calling the framework
This patch removes the address translation in xen-mceinj which
translates the guest physical address passed-in through the argument
of '-p' to the host machine address.
Signed-off-by: Haozhong Zhang
---
tools/tests/mce-test/tools/xen-mceinj.c | 135
Remove trailing spaces in xen-mceinj.c.
Signed-off-by: Haozhong Zhang
---
tools/tests/mce-test/tools/xen-mceinj.c | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/tools/tests/mce-test/tools/xen-mceinj.c
The existing xen-mceinj can not inject MCE through MSR_MCI_ADDR to a
domain w/ more than 4GB memory, e.g. if domain 0 has more than 4GB
memory, the execution of the command
xen-mceinj -d 0 -t 0 -p 0x2721a900
will fail w/ a message "Failed to get pfn list : Operation not
supported".
On Tue, 2015-09-15 at 00:08 +0100, Julien Grall wrote:
> On 14/09/2015 16:58, Will Deacon wrote:
> > > The Xen ctxt switch code[0] has DACR_EL2 in the midst of it all, and
> > > certainly followed by some sysregs, which I've got my fingers crossed
> > > happens to be sufficient (other than maybe
On Thu, 2015-09-10 at 10:32 +0100, Ian Campbell wrote:
> The Chardonnay case suggests that either something has been backported into
> 3.4.x which has broken things (current real flights, which reliably fail,
> are running on 3.4.108) or that it is simply unreliable (or both). I think
> I need to
This patch converts most LIBXL__LOG* macros to LOG macro. It's done with
spatch plus some hand coding.
Using spatch rune:
spatch --in-place --no-includes --include-headers \
--sp-file libxl.spatch \
tools/libxl/libxl*.c
with some exceptions.
libxl_json.c is untouched
By reading sg-run-job-adhoc if it exists.
Signed-off-by: Ian Campbell
---
sg-run-job | 4
1 file changed, 4 insertions(+)
diff --git a/sg-run-job b/sg-run-job
index 0b0449b..c51a508 100755
--- a/sg-run-job
+++ b/sg-run-job
@@ -370,6 +370,10 @@ proc
While I was doing some adhoc testing on chardonnay I needed to define some
adhoc recipes and ended up writing the following two patches.
In the end I didn't end up using the first (I just created the job out of
whole cloth rather than copying an existing template and modifying).
For the second I
When constructing an adhoc test it may be useful to copy an existing
job's configuration but run it with a custom recipe.
Signed-off-by: Ian Campbell
---
cs-adjust-flight | 16
1 file changed, 16 insertions(+)
diff --git a/cs-adjust-flight
On Mon, 2015-09-14 at 16:32 +0100, Julien Grall wrote:
> GICR_PIDR2 and GICD_PIDR2 use the same register layout. Rather than
> define twice, one of which is an alias to the other, introduce
> GIC_PIDR2_*
> defines.
>
> Also:
> * Use the same prefix for the mask and the value
> * Integrate
On Tue, Sep 15, 2015 at 11:14:26AM +0200, Egger, Christoph wrote:
> On 2015/09/15 10:29, Haozhong Zhang wrote:
> > This patch adds a new flag MC_MSRINJ_F_GPADDR to
> > xen_mc_msrinject.mcinj_flags, and makes do_mca() to translate the
> > guest physical address passed-in through
> >
On Mon, 2015-09-14 at 16:32 +0100, Julien Grall wrote:
> It seems that there is some hardware which report start to report GICv4
s/report start to reports/reports/ ?
Also, this is an odd way to express it, what you mean is that some hardware
is now shipping with GICv4. Unless you are trying to
On Mon, 14 Sep 2015, Paolo Bonzini wrote:
> On 10/09/2015 12:29, Stefano Stabellini wrote:
> > +if (lseek(config_fd, pos, SEEK_SET) != pos) {
> > +return -errno;
> > +}
> > do {
> > -rc = pread(config_fd, (uint8_t *), len, pos);
> > +rc = read(config_fd,
I don't know this piece of code so my comments might be stupid.
On Tue, Sep 15, 2015 at 04:29:40PM +0800, Haozhong Zhang wrote:
> This patch removes the address translation in xen-mceinj which
> translates the guest physical address passed-in through the argument
> of '-p' to the host machine
Remove trailing spaces and fix indentations in mce.c and xen-mca.h.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/cpu/mcheck/mce.c | 10 +-
xen/include/public/arch-x86/xen-mca.h | 28 ++--
2 files changed, 19 insertions(+), 19
This patch adds a new flag MC_MSRINJ_F_GPADDR to
xen_mc_msrinject.mcinj_flags, and makes do_mca() to translate the
guest physical address passed-in through
xen_mc_msrinject.mcinj_msr[i].value to the host machine address if
this flag is present.
Signed-off-by: Haozhong Zhang
On Mon, 2015-09-14 at 17:15 +0100, Wei Liu wrote:
> FYI all other patches of this series were applied by Jan. You only need
> to resend this one.
Jan,
I appreciate you do not want to do so routinely for all commits you make
but when you are partially applying a series it would be very useful if
On 2015/09/15 10:29, Haozhong Zhang wrote:
> Remove trailing spaces in xen-mceinj.c.
>
> Signed-off-by: Haozhong Zhang
Acked-by: Christoph Egger
> ---
> tools/tests/mce-test/tools/xen-mceinj.c | 16
> 1 file changed, 8
On Tue, Sep 15, 2015 at 09:17:07AM +0800, Chen, Tiejun wrote:
> >>But looks its not better, so any idea?
> >
> >Did you at least make an attempt to find other examples of where
> >we dynamically determine the log level to be used for a message?
> >I would assume that if you did, you'd have come to
Previously, if vm_event emulation support was enabled, then REP
optimizations were disabled when emulating REP-compatible
instructions. This patch allows fine-tuning of this behaviour by
providing a dedicated libxc helper function.
Signed-off-by: Razvan Cojocaru
---
A previous version of this patch dealing with support for skipping
the current instruction when a vm_event response requested it
computed the instruction length in the hypervisor, adding non-trivial
code dependencies. This patch allows a userspace vm_event client to
simply request that the guest's
Hello,
This series adds two minor patches. The first one allows finer-grained
control over the emulation behaviour of REP instructions. Previously,
once vm_event-based emulation was enabled, no optimizations were allowed.
However, this has a performance impact on the monitored guest, so I've
On Tue, 2015-09-15 at 10:48 +0200, Egger, Christoph wrote:
> On 2015/09/15 10:29, Haozhong Zhang wrote:
> > Remove trailing spaces in xen-mceinj.c.
> >
> > Signed-off-by: Haozhong Zhang
>
> Acked-by: Christoph Egger
Acked-by: Ian Campbell
On Tue, Sep 15, 2015 at 12:08:32PM +0200, Egger, Christoph wrote:
> On 2015/09/15 12:02, Wei Liu wrote:
> > I don't know this piece of code so my comments might be stupid.
> >
> > On Tue, Sep 15, 2015 at 04:29:40PM +0800, Haozhong Zhang wrote:
> >> This patch removes the address translation in
>>> On 9/11/2015 at 09:26 PM, in message <1441978018.3549.33.ca...@citrix.com>,
>>> Ian
Campbell wrote:
> On Thu, 2015-09-10 at 23:42 -0600, Chun Yan Liu wrote:
> >
> > > Do these fields have any particular size requirements arising from e.g.
> the
> > > USB
On 2015/09/15 10:29, Haozhong Zhang wrote:
> Remove trailing spaces and fix indentations in mce.c and xen-mca.h.
>
> Signed-off-by: Haozhong Zhang
Acked-by: Christoph Egger
> ---
> xen/arch/x86/cpu/mcheck/mce.c | 10 +-
>
flight 37928 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/37928/
Perfect :-)
All tests in this flight passed
baseline version:
flight 37917
jobs:
build-amd64 pass
build-armhf
On Mon, 2015-09-14 at 07:53 -0600, Jan Beulich wrote:
> While "ioport" list element parsing already validates that the entire
> input string got consumed, its two siblings so far didn't.
>
> Signed-off-by: Jan Beulich
>
Reviewed-by: Dario Faggioli
On 2015/09/15 10:29, Haozhong Zhang wrote:
> This patch adds a new flag MC_MSRINJ_F_GPADDR to
> xen_mc_msrinject.mcinj_flags, and makes do_mca() to translate the
> guest physical address passed-in through
> xen_mc_msrinject.mcinj_msr[i].value to the host machine address if
> this flag is present.
There are mixed usage of different logging macros. Ideally we only use one
style to avoid confusion.
Wei Liu (4):
libxl: convert to use LOG() macro
libxl: fix overly lines and delete extraneous quotes
libxl: map LIBXL__LOG_VERBOSE to XTL_VERBOSE
libxl: fix places missed by spatch
Signed-off-by: Wei Liu
---
tools/libxl/libxl.c | 21 +
tools/libxl/libxl_utils.c | 8 ++--
2 files changed, 19 insertions(+), 10 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index ce8965d..9b2047f 100644
---
The spatch provided in previous patch didn't handle all sites that need
transformation.
Signed-off-by: Wei Liu
---
tools/libxl/libxl.c| 17 -
tools/libxl/libxl_create.c | 4 ++--
tools/libxl/libxl_pci.c| 39
There is code in libxl using XTL_VERBOSE. We should provide a libxl
mapping for it.
Signed-off-by: Wei Liu
---
tools/libxl/libxl_internal.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
index 5fa55a7..070b7d3
The current libxl code doesn't deal with read-only drives at all.
Upstream QEMU and qemu-xen only support read-only cdrom drives: make
sure to specify "readonly=on" for cdrom drives and return error in case
the user requested a non-cdrom read-only drive.
This is XSA-142, discovered by Lin Liu
CC Konrad
On Mon, 14 Sep 2015, Paolo Bonzini wrote:
> On 10/09/2015 19:15, Stefano Stabellini wrote:
> > +
> > +switch (reg->size) {
> > +case 1: rc = xen_host_pci_get_byte(>real_device, offset,
> > (uint8_t *));
>
> A bit ugly, and it relies on the host being little endian.
>
On Mon, Sep 14, 2015 at 7:33 PM, Olaf Hering wrote:
> On Mon, Sep 14, George Dunlap wrote:
>
>> Well if you "know nothing about SELinux", and you don't use it, and
>> don't have any test systems that use it, then why did you assert
>> "The proper place to specify [an SELinux mount
On Mon, 2015-09-14 at 10:50 +0100, George Dunlap wrote:
> On Thu, Sep 10, 2015 at 1:36 PM, Jan Beulich wrote:
> > While it appears to be intentional for "xl pci-assignable-remove" to
> > not re-bind the original driver by default (requires the -r option),
> > permanently losing
On Mon, 2015-09-14 at 07:53 -0600, Jan Beulich wrote:
> While "ioport" list element parsing already validates that the entire
> input string got consumed, its two siblings so far didn't.
>
> Signed-off-by: Jan Beulich
Acked-by: Ian Campbell
On Mon, 2015-09-14 at 16:30 +0100, Julien Grall wrote:
> Signed-off-by: Julien Grall
Acked-by: Ian Campbell
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, 2015-09-15 at 12:19 +0300, Razvan Cojocaru wrote:
> Previously, if vm_event emulation support was enabled, then REP
> optimizations were disabled when emulating REP-compatible
> instructions. This patch allows fine-tuning of this behaviour by
> providing a dedicated libxc helper function.
On 2015/09/15 12:02, Wei Liu wrote:
> I don't know this piece of code so my comments might be stupid.
>
> On Tue, Sep 15, 2015 at 04:29:40PM +0800, Haozhong Zhang wrote:
>> This patch removes the address translation in xen-mceinj which
>> translates the guest physical address passed-in through
On Tue, 2015-09-15 at 15:50 +0100, Ian Jackson wrote:
> Wei Liu writes ("[PATCH 0/4] libxl: use LOG() macro where appropriate"):
> > There are mixed usage of different logging macros. Ideally we only use
> > one
> > style to avoid confusion.
>
> All four
>
> Acked-by: Ian Jackson
On Tue, Sep 15, 2015 at 04:12:57PM +0100, Andrew Cooper wrote:
> On 15/09/15 10:41, Wei Liu wrote:
> > @@ -440,15 +436,18 @@ int libxl__domain_rename(libxl__gc *gc, uint32_t
> > domid,
> > if (old_name) {
> > got_old_name = xs_read(ctx->xsh, trans, name_path, _old_len);
> >
Hi Razvan,
On 15/09/15 10:19, Razvan Cojocaru wrote:
> diff --git a/xen/common/domctl.c b/xen/common/domctl.c
> index 9e0fef5..214a22a 100644
> --- a/xen/common/domctl.c
> +++ b/xen/common/domctl.c
> @@ -1180,6 +1180,11 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t)
> u_domctl)
>
Hi, I'm replying to this thread from 2013:
http://lists.xen.org/archives/html/xen-devel/2013-03/threads.html#00649
Like James Sinclair, all I could find is a closed Debian bug from Dec 2010
with no resolution:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=60770
Do you have some news about
Instead of a hardcoded DEBUG log level, use the overall
daemon log level specified in libvirtd.conf when opening
a log stream with libxl. libxl is very verbose when DEBUG
log level is set, resulting in huge log files that can
potentially fill a disk. Control of libxl verbosity should
be placed in
2015-09-15 18:09 GMT+02:00 Andrew Cooper :
> The instantiation of HYPERVISOR_update_va_mapping() in set_aliased_prot()
> has always been buggy in pvops kernels.
>
> This bug should be fixed by c/s 0b0e55 "x86/xen: Probe target addresses in
> set_aliased_prot before the
On 09/15/2015 06:36 PM, Julien Grall wrote:
> Hi Razvan,
>
> On 15/09/15 10:19, Razvan Cojocaru wrote:
>> diff --git a/xen/common/domctl.c b/xen/common/domctl.c
>> index 9e0fef5..214a22a 100644
>> --- a/xen/common/domctl.c
>> +++ b/xen/common/domctl.c
>> @@ -1180,6 +1180,11 @@ long
On Tue, 2015-09-08 at 10:50 +0100, Wei Liu wrote:
> On Tue, Sep 08, 2015 at 01:21:04AM +, 甘清甜 wrote:
> > > So far, I have read the Xen NUMA Roadmap page and watched the
> > > video about vNUMA in Xen on Youtube. I have known that some work
> > > has been done for vNUMA in Xen. Since my
1 - 100 of 182 matches
Mail list logo