On 26/10/2015 17:42, Jan Beulich wrote:
> >>> On 26.10.15 at 08:59, wrote:
> > On 26/10/2015 15:03, Jan Beulich wrote:
> >> >>> "Wang, Wei W" 10/26/15 7:27 AM >>>
> >> >On 08/10/2015 12:11, Jan Beulich wrote:
> >> >> >>> On 14.09.15 at 04:32,
flight 63304 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63304/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-libvirt 3 host-install(3) broken in 63275 pass in 63304
The xenbus thread didn't send notification to other end when it expected
more data or consumed responses, which led to stalling the ring from
time to time.
This is the culprit that guest was less responsive when using stubdom
because the device model was stalled.
Fix this by sending notification
This reverts commit 9befcd335c21818caaf5c5ab764d31a4006d2800.
This commit breaks the build:
libxl_arm.c: In function 'libxl__arch_domain_init_hw_description':
libxl_arm.c:591:76: error: 'state' undeclared (first use in this function)
libxl_arm.c:591:76: note: each undeclared identifier is
This requires adjustments to the tool generating the symbol table and
its as well as nm's invocation.
Note: Not warning about duplicate symbols in the EFI case for now, as
a binutils bug causes misnamed file name entries to appear in EFI
binaries' symbol tables when the file name is longer than
To make it possible to tell apart the static symbols in files built a
second for compat guest support, arrange for their source file names to
be prefixed by a suitable path. We can't do this without explicit .file
directives, since gcc has always been stripping paths from file names
handed to the
>>> On 26.10.15 at 10:48, wrote:
> On 26/10/2015 17:42, Jan Beulich wrote:
>> >>> On 26.10.15 at 08:59, wrote:
>> > On 26/10/2015 15:03, Jan Beulich wrote:
>> >> >>> "Wang, Wei W" 10/26/15 7:27 AM >>>
>> >> >On 08/10/2015
On Sat, 2015-10-24 at 11:01 +0530, Harmandeep Kaur wrote:
> turning parsing related functions xl exit codes towards using the
> EXIT_[SUCCESS|FAILURE] macros, instead of instead of arbitrary
> numbers
> or libxl return codes.
>
I think the changelog, in this case, can be restructured and
On Mon, Oct 26, 2015 at 1:14 PM, Jan Beulich wrote:
> ing maintained by (and hence re
I only turned off the cpu which has ID = 1 from 80th second to 100th
second. As you can see in the result of "xenpm get-cpuidle-state" in time
100.7, the residency in C0 of cpu1 is equal to
On Fri, Oct 23, 2015 at 04:44:11PM +0100, Ian Jackson wrote:
> def_getopt would print a message to stderr, but blunder on anyway.
>
> Sadly this is probably not a backport candidate.
>
> Signed-off-by: Ian Jackson
Acked-by: Wei Liu
> ---
>
On 08/10/2015 12:11, Jan Beulich wrote:
> >>> On 14.09.15 at 04:32, wrote:
> > --- a/tools/libxc/xc_pm.c
> > +++ b/tools/libxc/xc_pm.c
> > @@ -260,13 +260,14 @@ int xc_get_cpufreq_para(xc_interface *xch, int
> cpuid,
> > }
> > else
> > {
> > -
From: Jiri Kosina
xen_blkif_schedule() kthread calls try_to_freeze() at the beginning of
every attempt to purge the LRU. This operation can't ever succeed though,
as the kthread hasn't marked itself as freezable.
Before (hopefully eventually) kthread freezing gets converted
Hi everybody
I need to understand when these pending and mask bits are set and cleared.
It seems pending bits are set by evtchn_set_pending method in
event_channel.c but I don't understand where pending bit is cleared by the
guest and where mask bit is set and reset?
Can anybody help me with
Thank you for pointing out the changelog errors to me, I will definitely
keep those in mind and be careful next time.
Thanks
Lasya V
On 26 October 2015 at 14:48, Lasya Venneti wrote:
> Hello,
>
> I just wanted to submit this as one of the bugs, the one which George
>
>>> On 26.10.15 at 08:07, wrote:
> flight 63303 xen-4.5-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/63303/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-armhf
On Sat, 2015-10-24 at 11:01 +0530, Harmandeep Kaur wrote:
> turning cpupools related functions xl exit codes towards using the
> EXIT_[SUCCESS|FAILURE] macros, instead of instead of arbitrary
> numbers
> or libxl return codes.
>
Ditch "xl" :-)
With that:
> Signed-off-by: Harmandeep Kaur
On Mon, Oct 26, 2015 at 11:11:16AM +0100, Olaf Hering wrote:
> On Mon, Oct 26, Wei Liu wrote:
>
> > On Mon, Oct 26, 2015 at 10:43:15AM +0100, Olaf Hering wrote:
>
> > > Does it compile for anyone?
> > It compiles for me -- but I'm using gcc 4.9.
>
> I noticed that just now, fails only in
On 23/10/15 11:33, Julien Grall wrote:
> The last parameter of alloc_domheap_page{s,} contain the memory flags and
> not the order of the allocation.
>
> Use 0 for the call in p2m_pod_set_cache_target as it was before
> 1069d63c5ef2510d08b83b2171af660e5bb18c63 "x86/mm/p2m: use defines for
> page
On 26/10/2015 18:37, Jan Beulich wrote:
> >>> On 26.10.15 at 11:19, wrote:
> > On 26/10/2015 17:54, Jan Beulich wrote:
> >> That wasn't the question; I rather inquired what "meaning at the same time"
> >> both fields have.
> >
> > turbo_enable: indicates if turbo is
flight 63306 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63306/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops3 host-install(3) broken in 63280 REGR. vs. 62642
build-armhf-pvops
Ping?
On 10/13/2015 03:11 PM, Juergen Gross wrote:
The Xen hypervisor supports starting a dom0 with large memory (up to
the TB range) by not including the initrd and p2m list in the initial
kernel mapping. Especially the p2m list can grow larger than the
available virtual space in the initial
>>> On 25.10.15 at 09:59, wrote:
> I modified Xen kernel to turn off the core number 1 from 80th second to
> 100th.
> In 80th second I use cpu_down which is implemented in /xen/common/cpu.c to
> turn off the 1st core. But, as you can see in below, the core does not be
>
> -Original Message-
> From: Hu, Robert
> Sent: Monday, October 26, 2015 3:05 PM
> To: 'Ian Campbell' ; 'Ian Jackson'
> ; 'xen-de...@lists.xenproject.org'
>
> Subject: RE: [OSSTEST PATCH 26/26]
For me ovmf fails to build in staging-4.6:
...
[ 541s] + ./configure --host=x86_64-suse-linux-gnu
--build=x86_64-suse-linux-gnu --program-prefix= --disable-dependency-tracking
--prefix=/usr --exec-prefix=/usr --bindir=/usr/bin --sbindir=/usr/sbin
--sysconfdir=/etc --datadir=/usr/share
On Sat, 2015-10-24 at 11:01 +0530, Harmandeep Kaur wrote:
> turning scheduling related functions xl exit codes towards using the
> EXIT_[SUCCESS|FAILURE] macros, instead of instead of arbitrary
> numbers
> or libxl return codes.
>
"turning scheduling related xl functions exit codes..."
However,
On Mon, Oct 26, 2015 at 10:43:15AM +0100, Olaf Hering wrote:
> For me ovmf fails to build in staging-4.6:
>
> ...
> [ 541s] + ./configure --host=x86_64-suse-linux-gnu
> --build=x86_64-suse-linux-gnu --program-prefix= --disable-dependency-tracking
> --prefix=/usr --exec-prefix=/usr
On Sat, 2015-10-24 at 11:01 +0530, Harmandeep Kaur wrote:
> turning vcpu manipulation functions xl exit codes toward using the
> EXIT_[SUCCESS|FAILURE] macros, instead of instead of arbitrary
> numbers
> or libxl return codes.
>
Again, distch "xl" from the sentence above.
Again, just one small
On Mon, Oct 26, Wei Liu wrote:
> On Mon, Oct 26, 2015 at 10:43:15AM +0100, Olaf Hering wrote:
> > Does it compile for anyone?
> It compiles for me -- but I'm using gcc 4.9.
I noticed that just now, fails only in Tumbleweed which used gcc-5.1.1.
Sorry for the noise.
Olaf
>>> On 26.10.15 at 11:45, wrote:
> On 26/10/2015 18:37, Jan Beulich wrote:
>> >>> On 26.10.15 at 11:19, wrote:
>> > On 26/10/2015 17:54, Jan Beulich wrote:
>> >> That wasn't the question; I rather inquired what "meaning at the same
>> >> time"
>> >>
On 26/10/2015 18:52, Jan Beulich wrote:
> >>> On 26.10.15 at 11:45, wrote:
> > On 26/10/2015 18:37, Jan Beulich wrote:
> >> >>> On 26.10.15 at 11:19, wrote:
> >> > On 26/10/2015 17:54, Jan Beulich wrote:
> >> >> That wasn't the question; I rather
>>> On 26.10.15 at 12:13, wrote:
>>>
>>>
>>> Did you look at the code generating the stats?
>>
>> No.
Then may I suggest you do so, since ...
>> C0 gets accounted
>> to everything not explicitly accounted to any other C state (i.e. only
>> C1...Cn get explicit stats
None of its elements depends on GUEST_PAGING_LEVELS.
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
v2: Re-base on top of earlier changes.
--- a/xen/arch/x86/mm/guest_walk.c
+++ b/xen/arch/x86/mm/guest_walk.c
@@ -32,30 +32,32 @@
From: David Vrabel
Date: Mon, 26 Oct 2015 10:38:50 +
> On 24/10/15 12:55, David Miller wrote:
>> From: Paul Durrant
>> Date: Wed, 21 Oct 2015 11:36:17 +0100
>>
>>> This series adds xen-netback support for hash negotiation with a frontend
It doesn't depend on GUEST_PAGING_LEVELS. Moving the function to p2m.c
at once allows a bogus #define/#include pair to be removed from
hap/nested_ept.c.
Signed-off-by: Jan Beulich
---
v2: To ensure no dependency on GUEST_PAGING_LEVELS, move the function
to p2m.c.
---
flight 38212 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38212/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-i386-sid-netboot-pygrub 9 debian-di-install fail like 38180
On 26/10/2015 17:54, Jan Beulich wrote:
> >>> On 26.10.15 at 10:48, wrote:
> > On 26/10/2015 17:42, Jan Beulich wrote:
> >> >>> On 26.10.15 at 08:59, wrote:
> >> > On 26/10/2015 15:03, Jan Beulich wrote:
> >> >> >>> "Wang, Wei W"
>>> On 26.10.15 at 11:19, wrote:
> On 26/10/2015 17:54, Jan Beulich wrote:
>> That wasn't the question; I rather inquired what "meaning at the same time"
>> both fields have.
>
> turbo_enable: indicates if turbo is enabled or not.
> turbo_pct: shows the capability of turbo
On 25/10/15 09:25, amin.fall...@gmail.com wrote:
> Hi everybody
> I need to understand when these pending and mask bits are set and
> cleared. It seems pending bits are set by evtchn_set_pending method in
> event_channel.c but I don't understand where pending bit is cleared by
> the guest and
>>> On 26.10.15 at 11:40, wrote:
> On Mon, Oct 26, 2015 at 1:14 PM, Jan Beulich wrote:
>> ing maintained by (and hence re
This is rather too little context you left in place.
> I only turned off the cpu which has ID = 1 from 80th second to 100th
>
On Mon, Oct 26, Wei Liu wrote:
> Wait, so you're using gcc-5.1.1 but OVMF is reporting gcc-4.4 (see in
> the path of output string), there might be another problem with
> toolchain detection then.
As Linus said: detect old and known to be problematic, everything else has to
be handled as
Hi Jan,
On 26/10/15 09:29, Jan Beulich wrote:
On 26.10.15 at 08:07, wrote:
>> flight 63303 xen-4.5-testing real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/63303/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>>
>
>
> Did you look at the code generating the stats?
No.
> C0 gets accounted
> to everything not explicitly accounted to any other C state (i.e. only
> C1...Cn get explicit stats maintained).
>
> Jan
>
> I dont think so. C0 only accounted when all parts of cpu being on. I was
wondering if
On 25/10/15 15:35, Meng Xu wrote:
> Hi,
Hi Meng,
> Does anyone know if Xen 4.5+ can run on Freescale IMX6 QuadCore SABRE board
> [1]?
> I found a video back to 2013 which shows an automotive demo [2] of
> Mentor Graphics' Embedded ARM Hypervisor on Freescale i.MX6 Board.
>
> I'm curious if
To make it possible to tell apart the static symbols therein, use their
object file names instead of their source ones.
Signed-off-by: Jan Beulich
---
v2: Introduce __OBJECT_FILE__.
--- a/xen/Rules.mk
+++ b/xen/Rules.mk
@@ -42,10 +42,10 @@ ALL_OBJS-y +=
On Sat, 2015-10-24 at 11:01 +0530, Harmandeep Kaur wrote:
> turning main function xl exit codes towards using the
> EXIT_[SUCCESS|FAILURE] macros, instead of instead of arbitrary
> numbers
> or libxl return codes.
>
I'd say "turning xl main() function exit codes..."
Also in the subject "xl:
>>> On 26.10.15 at 08:59, wrote:
> On 26/10/2015 15:03, Jan Beulich wrote:
>> >>> "Wang, Wei W" 10/26/15 7:27 AM >>>
>> >On 08/10/2015 12:11, Jan Beulich wrote:
>> >> >>> On 14.09.15 at 04:32, wrote:
>> >> > -
Aside from what Dario said.
On Sun, Oct 25, 2015 at 03:32:24PM +0530, Lasya Venneti wrote:
> ---
> tools/xenstore/init-xenstore-domain.c | 2 ++
> 1 file changed, 2 insertions(+)
>
> diff --git a/tools/xenstore/init-xenstore-domain.c
> b/tools/xenstore/init-xenstore-domain.c
> index
On Sat, 2015-10-24 at 11:01 +0530, Harmandeep Kaur wrote:
> turning parsing related functions xl exit codes towards using the
> EXIT_[SUCCESS|FAILURE] macros, instead of instead of arbitrary
> numbers
> or libxl return codes.
>
> it doesn't include parse_config_data() which is big enough to
>>> On 26.10.15 at 11:29, wrote:
> On 23/10/15 11:33, Julien Grall wrote:
>> Note that the patch has only been build tested.
>
> It would be nice if we could properly test the codepath in question
> before checking it in, but we have lots of time before the release for
On 24/10/15 12:55, David Miller wrote:
> From: Paul Durrant
> Date: Wed, 21 Oct 2015 11:36:17 +0100
>
>> This series adds xen-netback support for hash negotiation with a frontend
>> driver, and an implementation of toeplitz hashing as the initial negotiable
>> algorithm.
Triggered by Konrad's needs for xSplice, but having been on my todo
list for a very long time to help interpretation of stack traces, here's a
revised remainder of changes allowing to tell apart identically named
static symbols. The main and general thing is to prefix them by file
name. Some
On 26/10/15 10:40, Jan Beulich wrote:
On 26.10.15 at 11:29, wrote:
>> On 23/10/15 11:33, Julien Grall wrote:
>>> Note that the patch has only been build tested.
>>
>> It would be nice if we could properly test the codepath in question
>> before checking it in, but
Expose them to assembly code, and replace open-coded versions.
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/boot/head.S | 2 +-
xen/arch/x86/boot/trampoline.S | 2 +-
xen/arch/x86/cpu/common.c
More patches as a result of my cpuid levelling improvement work.
These changes are all purely mechanical and neither of these two patches have
any functional change; the compiled binaries are identical other than their
timestamps.
Andrew Cooper (2):
xen/x86: Helpers for cpu feature manipuation
Future work will rearange it, invalidating these assumptions.
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpu/amd.c | 2 +-
xen/arch/x86/cpu/centaur.c | 6 ++
On 10/23/2015 05:23 PM, Konrad Rzeszutek Wilk wrote:
On Fri, Oct 23, 2015 at 04:28:25PM +0100, Ross Lagerwall wrote:
Limitations
===
The above is enough to fully implement an update system where multiple
source patches are combined (using combinediff) and built into a single
binary
>>> "Wang, Wei W" 10/26/15 7:27 AM >>>
>On 08/10/2015 12:11, Jan Beulich wrote:
>> >>> On 14.09.15 at 04:32, wrote:
>> > --- a/tools/libxc/xc_pm.c
>> > +++ b/tools/libxc/xc_pm.c
>> > @@ -260,13 +260,14 @@ int xc_get_cpufreq_para(xc_interface *xch, int
Hello,
I just wanted to submit this as one of the bugs, the one which George
assigned to me is still pending(it's a patch series), I will submit that
ASAP. As for this bug, if I have incorrectly handled it, can you please
point out my mistake, I will correct it and re-submit.
Thanks
Lasya V
> -Original Message-
> From: Hu, Robert
> Sent: Sunday, October 25, 2015 10:46 AM
> To: Ian Campbell ; 'Ian Jackson'
> ; 'xen-de...@lists.xenproject.org'
>
> Subject: RE: [OSSTEST PATCH 26/26]
flight 63303 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63303/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 5 xen-build fail REGR. vs. 63099
build-armhf
On 26/10/2015 15:03, Jan Beulich wrote:
> >>> "Wang, Wei W" 10/26/15 7:27 AM >>>
> >On 08/10/2015 12:11, Jan Beulich wrote:
> >> >>> On 14.09.15 at 04:32, wrote:
> >> > -new_policy.governor = __find_governor(op-
> >u.set_gov.scaling_governor);
>
On Sun, 2015-10-25 at 15:32 +0530, Lasya Venneti wrote:
> *This is part of my 'bite sized contribution' to Xen for the
> OutreachY program.
>
> *The change handles the return value of the function xc_dom_allocate,
> if the function returns NULL the function returns -1. It would not be
> useful
Hi,
I am trying to scan guests' pages and check whether they contain specific
instructions (e.g., LOCK). I summarize how I did it as follows. Could you
please give some suggestions about whether am I on the right direction? Thank
you.
In my testing environment, XEN 4.4.0 is deployed. Both
On Mon, Oct 26, 2015 at 08:03:55AM -0600, Jan Beulich wrote:
> >>> On 23.10.15 at 11:48, wrote:
> > Signed-off-by: Shuai Ruan
> > Reviewed-by: Andrew Cooper
>
> There were actual bugs fixed from v7 to v8, plus
On 10/16/2015 10:01 AM, Ian Jackson wrote:
Anthony PERARD writes ("[PATCH] libxl: No emulated disk driver for xvdX disk"):
When a guest configuration list xvdX for its disks, there is no need to
provide an emulated driver for the same target.
Such configuration can work with the OVMF firmware,
On 10/16/2015 10:01 AM, Ian Jackson wrote:
Anthony PERARD writes ("[PATCH] libxl: No emulated disk driver for xvdX disk"):
When a guest configuration list xvdX for its disks, there is no need to
provide an emulated driver for the same target.
Such configuration can work with the OVMF firmware,
(Replacing dsl...@verizon.com with rb...@verizon.com since dslutz is no longer
at Verizon.)
From: Ross Lagerwall [ross.lagerw...@citrix.com]
Sent: Monday, October 26, 2015 1:03 PM
To: Konrad Rzeszutek Wilk
Cc: elena.ufimts...@oracle.com;
On 26/10/2015 13:04, John Doe wrote:
> Hi, i'm getting this problem with linux 4.3.0-rcX branch.
> Full log is attached. My hardware is based on intel skylake i7-6700k on
> z170 chipset and it is working properly. It does boot correctly with
> older kernels (3.12).
> With mce=off on xen parameters
flight 63310 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63310/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 6 xen-boot fail REGR. vs. 62277
flight 63312 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63312/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl3 host-install(3) broken REGR. vs. 59254
test-amd64-amd64-xl
On Thu, Oct 22, 2015 at 08:17:29AM -0600, Jan Beulich wrote:
> >>> On 28.09.15 at 09:13, wrote:
> > The existing hvm_set_guest_tsc_fixed() and hvm_get_guest_tsc_fixed()
> > calculate the guest TSC by adding the TSC offset to the host TSC. When
> > the TSC scaling is
flight 63313 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63313/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-amd 3 host-install(3) broken REGR. vs. 63211
flight 63315 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63315/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 5d3a9896f0cbb0c8c3d375d9f82a7e397be862a7
baseline version:
ovmf
flight 63314 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63314/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 5 xen-build fail REGR. vs. 63099
build-armhf
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: Tuesday, October 27, 2015 12:29 AM
> To: Hu, Robert
> Cc: 'Ian Campbell' ;
> 'xen-de...@lists.xenproject.org'
> Subject: RE:
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Monday, October 26, 2015 10:40 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: Tian, Kevin ; Keir Fraser ; George
> Dunlap
flight 63311 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63311/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 3 host-install(3) broken REGR. vs. 60684
On 26/10/15 11:53, Jan Beulich wrote:
> None of its elements depends on GUEST_PAGING_LEVELS.
>
> Signed-off-by: Jan Beulich
> Reviewed-by: Andrew Cooper
> ---
> v2: Re-base on top of earlier changes.
Acked-by: George Dunlap
>>> On 26.10.15 at 15:57, wrote:
> On 26/10/15 14:34, Martin Pohlack wrote:
>> On 26.10.2015 12:51, Jan Beulich wrote:
>>> To make it possible to tell apart the static symbols therein, use their
>>> object file names instead of their source ones.
>>>
>>> Signed-off-by:
>>> On 26.10.15 at 12:17, wrote:
> --- a/xen/arch/x86/cpu/common.c
> +++ b/xen/arch/x86/cpu/common.c
> @@ -202,7 +202,7 @@ static void __init early_cpu_detect(void)
> c->x86_mask = tfms & 15;
> cap0 &= ~cleared_caps[0];
> cap4 &= ~cleared_caps[4];
> -
On Mon, Oct 26, 2015 at 01:33:12PM +0100, Samuel Thibault wrote:
> Wei Liu, le Mon 26 Oct 2015 12:30:28 +, a écrit :
> > On Mon, Oct 26, 2015 at 01:21:51PM +0100, Samuel Thibault wrote:
> > > Wei Liu, le Mon 26 Oct 2015 12:14:43 +, a écrit :
> > > > In my patch, mini-os notifies remote
>>> On 19.10.15 at 16:53, wrote:
> --- a/tools/libxc/xc_sr_save.c
> +++ b/tools/libxc/xc_sr_save.c
> @@ -537,7 +537,8 @@ static int suspend_and_send_dirty(struct
> if ( xc_shadow_control(
> xch, ctx->domid, XEN_DOMCTL_SHADOW_OP_CLEAN,
>
>>> On 22.10.15 at 19:13, wrote:
> --- a/xen/drivers/passthrough/vtd/dmar.c
> +++ b/xen/drivers/passthrough/vtd/dmar.c
> @@ -583,6 +583,68 @@ out:
> return ret;
> }
>
> +static int register_one_rmrr(struct acpi_rmrr_unit *rmrru)
> +{
> +bool_t ignore = 0;
>
On Mon, Oct 26, 2015 at 08:35:30AM +, Ross Lagerwall wrote:
> On 10/23/2015 05:23 PM, Konrad Rzeszutek Wilk wrote:
> >On Fri, Oct 23, 2015 at 04:28:25PM +0100, Ross Lagerwall wrote:
> >>Limitations
> >>===
> >>The above is enough to fully implement an update system where multiple
>
Hey,
Here I am reviewing this patch, sorry for the delay.
Ok, we have discussed a lot about all this, and in fact I had to go
back in my mail archive and re-read the rather long sub-thread for this
patch in v7. :-)
Also, in that thread, I found (as I was recalling there being) a couple of open
On 23/09/15 16:34, Jan Beulich wrote:
> Us extending the GDT limit past the Xen descriptors so far meant that
> guests (including user mode programs) accessing any descriptor table
> slot above the original OS'es limit but below the first Xen descriptor
> caused a #PF, converted to a #GP in our
On Wed, Oct 21, 2015 at 04:24:14PM +0100, Ian Campbell wrote:
> We intend to stabilise some parts of the libxenctrl interface by
> splitting out some functionality into separate stable libraries.
>
> This is the mini-os part of the first phase of that change.
>
> This mail is (or is intended to
On Fri, Oct 23, 2015 at 05:44:44PM +0800, Joe Jin wrote:
> Should not allocate xen vif queues number more than online cpus.
I think it's absolutely fine for administrators to override the value
should they choose to.
Wei.
___
Xen-devel mailing list
On 26/10/15 14:55, Andrew Cooper wrote:
> On 26/10/15 14:43, David Vrabel wrote:
>> On 23/09/15 16:34, Jan Beulich wrote:
>>> Us extending the GDT limit past the Xen descriptors so far meant that
>>> guests (including user mode programs) accessing any descriptor table
>>> slot above the original
On 26/10/15 11:52, Jan Beulich wrote:
> It doesn't depend on GUEST_PAGING_LEVELS. Moving the function to p2m.c
> at once allows a bogus #define/#include pair to be removed from
> hap/nested_ept.c.
>
> Signed-off-by: Jan Beulich
> ---
> v2: To ensure no dependency on
>>> On 26.10.15 at 15:58, wrote:
> On 26/10/15 14:55, Andrew Cooper wrote:
>> On 26/10/15 14:43, David Vrabel wrote:
>>> On 23/09/15 16:34, Jan Beulich wrote:
Us extending the GDT limit past the Xen descriptors so far meant that
guests (including user mode
> On 22 Oct 2015, at 16:04, George Dunlap wrote:
>
> On Wed, Oct 21, 2015 at 4:02 PM, Stefano Stabellini
> wrote:
>>> ! = Summary =
>>> !
>>> ! There seems to be a clear consensus against the current veto model. From
>>> ! the comments there
On 26.10.2015 12:51, Jan Beulich wrote:
> To make it possible to tell apart the static symbols therein, use their
> object file names instead of their source ones.
>
> Signed-off-by: Jan Beulich
> ---
> v2: Introduce __OBJECT_FILE__.
>
> --- a/xen/Rules.mk
> +++
On 26/10/15 14:34, Martin Pohlack wrote:
> On 26.10.2015 12:51, Jan Beulich wrote:
>> To make it possible to tell apart the static symbols therein, use their
>> object file names instead of their source ones.
>>
>> Signed-off-by: Jan Beulich
>> ---
>> v2: Introduce
On 26/10/15 14:43, David Vrabel wrote:
> On 23/09/15 16:34, Jan Beulich wrote:
>> Us extending the GDT limit past the Xen descriptors so far meant that
>> guests (including user mode programs) accessing any descriptor table
>> slot above the original OS'es limit but below the first Xen descriptor
On 16.09.2015 23:01, Konrad Rzeszutek Wilk wrote:
[...]
> +### xsplice_patch
> +
> +This structure has the binary code (or data) to be patched. Depending on the
> +type it can either an inline patch (data or text) or require an relocation
> +change (which requires a trampoline). Naturally it
On 26/10/15 11:51, Jan Beulich wrote:
> To make it possible to tell apart the static symbols therein, use their
> object file names instead of their source ones.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
Wei Liu, le Mon 26 Oct 2015 12:47:56 +, a écrit :
> -if (xenstore_buf->rsp_prod - xenstore_buf->rsp_cons <
> sizeof(msg))
> +if (xenstore_buf->rsp_prod - xenstore_buf->rsp_cons <
> sizeof(msg)) {
> +notify_remote_via_evtchn(start_info.store_evtchn);
>
>>> On 19.10.15 at 16:51, wrote:
"REST" maintainers, could I please get an ack or otherwise on this
common code change?
Thanks, Jan
> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -1959,22 +1959,16 @@ __initcall(pagealloc_keyhandler_init);
>
> void
>>> On 22.10.15 at 19:13, wrote:
> From: Elena Ufimtseva
>
> On some platforms RMRR regions may be not specified in ACPI and thus will not
> be mapped 1:1 in dom0.
I think this may be misleading to readers: It sounds as if there was
the
1 - 100 of 184 matches
Mail list logo