| 2 +-
hw/block/meson.build | 2 +-
hw/char/meson.build| 2 +-
hw/display/meson.build | 2 +-
hw/usb/meson.build | 2 +-
hw/xen/meson.build | 5 -
7 files changed, 10 insertions(+), 7 deletions(-)
Reviewed-by: Paul Durrant
xen/xen_pvdev.h| 3 ++-
17 files changed, 47 insertions(+), 32 deletions(-)
rename include/hw/xen/{xen_common.h => xen_native.h} (98%)
Reviewed-by: Paul Durrant
On 07/03/2023 14:52, David Woodhouse wrote:
On Tue, 2023-03-07 at 14:44 +, Paul Durrant wrote:
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
Signed-off-by: Paul Durrant
Signed-off-by: David Woodhouse
---
Reviewed-by: Paul Durrant
You're reviewing your own code
On 07/03/2023 14:48, David Woodhouse wrote:
On Tue, 2023-03-07 at 14:40 +, Paul Durrant wrote:
-
-#define xenforeignmemory_unmap(h, p, s) munmap(p, s * XC_PAGE_SIZE)
-
Actually, probably best 'static inline' that, or at least put brackets
round the 'p' and 's' for safety.
That's
/block/dataplane/xen-block.c | 8
hw/display/xenfb.c | 12 ++--
hw/net/xen_nic.c | 12 ++--
hw/usb/xen-usb.c | 8
4 files changed, 20 insertions(+), 20 deletions(-)
Reviewed-by: Paul Durrant
at it.
Signed-off-by: David Woodhouse
---
accel/xen/xen-all.c | 61 ---
hw/char/xen_console.c | 45 +--
include/hw/xen/xen.h | 2 --
3 files changed, 43 insertions(+), 65 deletions(-)
Reviewed-by: Paul Durrant
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
Signed-off-by: Paul Durrant
Signed-off-by: David Woodhouse
---
accel/xen/xen-all.c | 11 +-
hw/char/xen_console.c | 2 +-
hw/i386/kvm/xen_xenstore.c | 3 -
hw/i386/kvm
On 02/03/2023 15:34, David Woodhouse wrote:
From: David Woodhouse
Signed-off-by: David Woodhouse
Signed-off-by: Paul Durrant
---
hw/char/xen_console.c| 8 +++---
hw/display/xenfb.c | 20 +++---
hw/xen/xen-operations.c | 45
xen-bus.h| 2 +-
include/hw/xen/xen-legacy-backend.h | 6 +++---
include/hw/xen/xen_backend_ops.h| 7 ---
11 files changed, 50 insertions(+), 26 deletions(-)
Reviewed-by: Paul Durrant
a
XEN_GNTTAB_OP_FEATURE_MAP_MULTIPLE flag to indicate that the native Xen
implementation *does* support multi-page maps, and a helper function to
query it.
Signed-off-by: David Woodhouse
Signed-off-by: Paul Durrant
[snip]
@@ -65,7 +195,34 @@ struct evtchn_backend_ops libxenevtchn_backend_ops = {
.pending
support.
Signed-off-by: David Woodhouse
Signed-off-by: Paul Durrant
---
hw/9pfs/xen-9p-backend.c| 24 +++---
hw/i386/xen/xen-hvm.c | 27 ---
hw/xen/meson.build | 1 +
hw/xen/xen-bus.c| 22 +++---
hw/xen/xen-legacy
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
Signed-off-by: Paul Durrant
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xen_xenstore.c | 70 ++
1 file changed, 70 insertions(+)
Reviewed-by: Paul Durrant
On 02/03/2023 15:34, David Woodhouse wrote:
From: David Woodhouse
In fact I think we want to only serialize the contents of the domain's
path in /local/domain/${domid} and leave the rest to be recreated? Will
defer to Paul for that.
Yes. Assuming backends have properly implemented
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
Store perms as a GList of strings, check permissions.
Signed-off-by: Paul Durrant
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xen_xenstore.c | 2 +-
hw/i386/kvm/xenstore_impl.c | 259
.
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xenstore_impl.c | 151 ++-
tests/unit/test-xs-node.c | 231 +++-
2 files changed, 380 insertions(+), 2 deletions(-)
Reviewed-by: Paul Durrant
... with a couple of nits in comments called out
-on commit.
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xenstore_impl.c | 150 ++--
tests/unit/test-xs-node.c | 118
2 files changed, 262 insertions(+), 6 deletions(-)
Reviewed-by: Paul Durrant
anged, 323 insertions(+), 15 deletions(-)
Reviewed-by: Paul Durrant
... with one suggestion...
[snip]
+/* Check for duplicates */
+w = g_hash_table_lookup(s->watches, abspath);
+while (w) {
+if (!g_strcmp0(token, w->token) && opaque == w->cb_opaque &&
...
Reviewed-by: Paul Durrant
/xenstore_impl.c
create mode 100644 hw/i386/kvm/xenstore_impl.h
Reviewed-by: Paul Durrant
kin
Xen parts...
Reviewed-by: Paul Durrant
On 02/03/2023 08:35, Jan Beulich wrote:
Hello,
in (I think) Intel SDM version 076 a new guarantee of atomicity of certain
aligned 16-byte accesses appeared. While initially I thought this would be
another special case we need to invent a solution for (it still is, in
certain cases, as per
On 21/02/2023 13:43, Jan Beulich wrote:
On 09.02.2023 11:38, Jan Beulich wrote:
This is the only file left with a use of an __s type coming from
Linux. Since the file has been using an apparently random mix of all
three classes of fixed-width types (__{s,u}, {s,u}, and
{,u}int_t), consolidate
On 15/02/2023 15:34, Philippe Mathieu-Daudé wrote:
Unused since introduction in commit 04b0de0ee8
("xen: factor out common functions").
Signed-off-by: Philippe Mathieu-Daudé
---
accel/xen/xen-all.c | 10 --
1 file changed, 10 deletions(-)
Acked-by: Paul Durrant
/xen_platform.c
+++ b/hw/i386/xen/xen_platform.c
@@ -25,7 +25,6 @@
#include "qemu/osdep.h"
#include "qapi/error.h"
-#include "hw/ide.h"
#include "hw/ide/pci.h"
#include "hw/pci/pci.h"
#include "hw/xen/xen_common.h"
Acked-by: Paul Durrant
On 01/02/2023 18:22, Vikram Garhwal wrote:
Hi Paul,
Thanks for reviewing this and other patches in series.
Please see my reply below.
On 2/1/23 12:30 AM, Paul Durrant wrote:
On 31/01/2023 22:51, Vikram Garhwal wrote:
Add a new machine xenpvh which creates a IOREQ server to
register/connect
On 31/01/2023 22:51, Vikram Garhwal wrote:
Add a new machine xenpvh which creates a IOREQ server to register/connect with
Xen Hypervisor.
Is this really the right way? Is it not possible to do the Xen
initialization (including ioreq server registration) off the back of the
accelerator init
On 31/01/2023 22:51, Vikram Garhwal wrote:
Replace g_malloc with g_new and perror with error_report.
Signed-off-by: Vikram Garhwal
Reviewed-by: Stefano Stabellini
---
hw/xen/xen-hvm-common.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
Reviewed-by: Paul Durrant
-by: Paul Durrant
to the PV backends initialization.
Signed-off-by: Stefano Stabellini
Signed-off-by: Vikram Garhwal
Reviewed-by: Stefano Stabellini
---
include/hw/xen/xen_common.h | 13 -
1 file changed, 8 insertions(+), 5 deletions(-)
Reviewed-by: Paul Durrant
100644 include/hw/i386/xen_arch_hvm.h
create mode 100644 include/hw/xen/arch_hvm.h
create mode 100644 include/hw/xen/xen-hvm-common.h
Reviewed-by: Paul Durrant
10 insertions(+), 6 deletions(-)
rename hw/{i386 => }/xen/xen-mapcache.c (100%)
Reviewed-by: Paul Durrant
...
Tested-by: Paul Durrant
Signed-off-by: David Woodhouse
---
src/fw/xen.c | 45 -
1 file changed, 32 insertions(+), 13 deletions(-)
Also...
Reviewed-by: Paul Durrant
.
The TSC frequency should also be set in sub-leaf 2.
Signed-off-by: Paul Durrant
---
Cc: Sean Christopherson
Cc: Paolo Bonzini
Cc: Juergen Gross
Cc: Boris Ostrovsky
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: Borislav Petkov
Cc: Dave Hansen
Cc: "H. Peter Anvin"
Cc: David Woodhouse
-by: Paul Durrant
---
Cc: Sean Christopherson
Cc: Paolo Bonzini
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: Borislav Petkov
Cc: Dave Hansen
Cc: David Woodhouse
v7:
- Morph kvm_update_hypervisor_cpuid() into kvm_get_hypervisor_cpuid()
- Place the definition of struct kvm_hypervisor_cpuid to avoid
Patch #2 was the original patch. It has been expended to a series in v6.
Paul Durrant (2):
KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also
capture limit
KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if
present
arch/x86/include/asm/kvm_host.h | 8
with better information. A lot of simplicity was added.
---
Reviewed-by: Paul Durrant
umber of packages")
Signed-off-by: Yang Yingliang
Reviewed-by: Paul Durrant
On 28/11/2022 12:26, Jan Beulich wrote:
On 28.11.2022 12:06, Roger Pau Monné wrote:
On Mon, Nov 28, 2022 at 09:21:47AM +0100, Jan Beulich wrote:
On 26.11.2022 23:19, Julien Grall wrote:
On 25/11/2022 14:15, Per Bilse wrote:
This patch modifies ioreq_broadcast() to allow partial success.
rs")
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
nction logic at this point.
---
Changes since v1:
- Fix Viridian MSR tip conditions.
Reviewed-by: Paul Durrant
On 04/11/2022 16:10, Roger Pau Monné wrote:
On Fri, Nov 04, 2022 at 04:05:05PM +, Paul Durrant wrote:
On 04/11/2022 16:01, Roger Pau Monné wrote:
On Fri, Nov 04, 2022 at 03:55:54PM +, Paul Durrant wrote:
On 04/11/2022 14:22, Roger Pau Monne wrote:
The current reporting
On 04/11/2022 16:01, Roger Pau Monné wrote:
On Fri, Nov 04, 2022 at 03:55:54PM +, Paul Durrant wrote:
On 04/11/2022 14:22, Roger Pau Monne wrote:
The current reporting of the hardware assisted APIC options is done by
checking "virtualize APIC accesses" which is not ve
On 04/11/2022 14:22, Roger Pau Monne wrote:
The current reporting of the hardware assisted APIC options is done by
checking "virtualize APIC accesses" which is not very helpful, as that
feature doesn't avoid a vmexit, instead it does provide some help in
order to detect APIC MMIO accesses in
On 04/11/2022 14:22, Roger Pau Monne wrote:
The "APIC register virtualization" Intel hardware feature applies to
both MMIO or MSR APIC accesses depending on whether "virtualize x2APIC
mode" is also available.
As such also suggest MSR APIC accesses if both "APIC register
virtualization" and
On 15/10/2022 06:07, Vikram Garhwal wrote:
xenstore_record_dm_state() will also be used in aarch64 xenpv machine.
Signed-off-by: Vikram Garhwal
Signed-off-by: Stefano Stabellini
Reviewed-by: Paul Durrant
On 15/10/2022 06:07, Vikram Garhwal wrote:
[snip]
+qemu_add_vm_change_state_handler(xen_hvm_change_state_handler, state);
+
+state->memory_listener = xen_memory_listener;
+memory_listener_register(>memory_listener, _space_memory);
+
+state->io_listener = xen_io_listener;
+
-by: Vikram Garhwal
Reviewed-by: Paul Durrant
the ones
related to dirty logging.
Updated XenIOState can be used for both aarch64 and x86.
Also, remove free_phys_offset as it was unused.
Signed-off-by: Stefano Stabellini
Signed-off-by: Vikram Garhwal
Reviewed-by: Paul Durrant
the ones
related to dirty logging.
Updated XenIOState can be used for both aarch64 and x86.
Also, remove free_phys_offset as it was unused.
Signed-off-by: Stefano Stabellini
Signed-off-by: Vikram Garhwal
Reviewed-by: Paul Durrant
.
This is done to keep the common ioreq functions in one place which will be
moved to new function in next patch in order to make it common to both x86 and
aarch64 machines.
Signed-off-by: Vikram Garhwal
Signed-off-by: Stefano Stabellini
Reviewed-by: Paul Durrant
On 15/10/2022 06:07, Vikram Garhwal wrote:
xen-mapcache.c contains common functions which can be used for enabling Xen on
aarch64 with IOREQ handling. Moving it out from hw/i386/xen to hw/xen to make it
accessible for both aarch64 and x86.
Signed-off-by: Vikram Garhwal
Signed-off-by: Stefano
On 15/10/2022 06:07, Vikram Garhwal wrote:
Build fails when have_xen_pci_passthrough is disabled. This is because of
incorrect build configuration for xen_pt_stub.c.
Signed-off-by: Stefano Stabellini
Signed-off-by: Vikram Garhwal
Reviewed-by: Paul Durrant
On 21/09/2022 02:19, Ji, Ruili wrote:
[AMD Official Use Only - General]
Hi Paul and AFAIK:
^^^ you mean Anthony :-)
Thanks for your help.
When could we see this patch on the master branch?
Our project urgently needs this solution.
Anthony? Ping?
Paul
On 14/09/2022 03:07, Ji, Ruili wrote:
[AMD Official Use Only - General]
Hi Paul,
Thank you!
But how could we merge this patch ?
AFAIK Anthony (anthony.per...@citrix.com) still deals with this.
Cheers,
Paul
On 13/09/2022 04:02, Ji, Ruili wrote:
[AMD Official Use Only - General]
Hi Paul,
Could you help to review this patch?
LGTM. You can add my R-b to it.
Paul
Thanks
*From:* Ji, Ruili
*Sent:* 2022年9月7日 9:04
*To:* 'Paul Durrant' ; 'qemu-de...@nongnu.org'
*Cc:* Liu, Aaron ; 'xen-devel
On 29/08/2022 10:03, Matias Ezequiel Vara Larsen wrote:
This commit creates a new doc to document the acquire resource interface. This
is a reference document.
Signed-off-by: Matias Ezequiel Vara Larsen
---
Changes in v1:
- correct documentation about how mfns are allocated
- correct
On 16/09/2021 16:45, Jan Beulich wrote:
On 15.07.2021 10:58, Jan Beulich wrote:
On 20.05.2021 13:46, Jan Beulich wrote:
On 25.02.2021 17:23, Paul Durrant wrote:
On 25/02/2021 14:00, Jan Beulich wrote:
On 25.02.2021 13:11, Paul Durrant wrote:
On 25/02/2021 07:33, Jan Beulich wrote
::has_work,
remove it along with the assertion in cpu_has_work().
Signed-off-by: Philippe Mathieu-Daudé
Xen parts...
Acked-by: Paul Durrant
ff-by: Jan Beulich
Reviewed-by: Paul Durrant
On 19/08/2021 09:04, Jan Beulich wrote:
The old (super)page's permissions ought to be propagated, rather than
blindly allowing both reads and writes.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
domain ID (from the [present]
context entry) gets used. See sub-section "IOTLB" of section "Address
Translation Caches" in the VT-d spec.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
On 18/08/2021 13:09, Jan Beulich wrote:
On 18.08.2021 12:51, Jan Beulich wrote:
Paul,
back at the time I did already question your intended meaning of
this flag. I notice that there's presently no consumer of it being
set (apart from yielding non-zero flush_flags). I'm afraid this
model makes
On 10/08/2021 14:37, Jan Beulich wrote:
Hello,
while I don't expect this case to occur often in practice, for
superpage support we will need to be able to correctly free a
page table (hierarchy) after replacing its mapping range by a
superpage. Following P2M by carrying out an immediate iotlb
On 21/07/2021 16:58, Jan Beulich wrote:
Paul,
the description of this says
"At the moment iommu_map() and iommu_unmap() take a page order rather than a
count, whereas iommu_iotlb_flush() takes a page count rather than an order.
This patch makes them consistent with each other, opting for a
On 07/07/2021 14:22, Jan Beulich wrote:
This amends commit 980d6acf1517 ("IOMMU: make DMA containment of
quarantined devices optional").
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -10,6 +10,13 @@ The format is based on [Keep a
Cooper
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -82,7 +82,7 @@ static int __init parse_iommu_param(cons
#ifdef CONFIG_HAS_PCI
else if ( (val = parse_boolean("qu
's wanted is a "return", eliminate the "out"
label at the same time.
Take the opportunity and also limit the control to builds supporting
PCI.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
On 05/07/2021 17:15, Jan Beulich wrote:
..., as are the majority of the locks involved. Conditionalize things
accordingly.
Also adjust the ioreq field's indentation at this occasion.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
...
Reviewed-by: Paul Durrant
On 01/07/2021 15:09, Anthony PERARD wrote:
This avoid the need to create the symbolic link "include/asm".
Signed-off-by: Anthony PERARD
Acked-by: Paul Durrant
the lock. Contain all
command sending related locking to the latter function.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
o idea why it was used here in
the first place, instead of the cheaper list iteration.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
---
A first step beyond this could be to have the backing functions of
deassign_device() allow the caller to tell whether the failure was from
removing the d
On 17/05/2021 22:43, Marek Marczykowski-Górecki wrote:
On Tue, May 11, 2021 at 12:46:38PM +, Durrant, Paul wrote:
-Original Message-
From: Marek Marczykowski-Górecki
Sent: 11 May 2021 11:45
To: Durrant, Paul
Cc: Michael Brown ; p...@xen.org;
xen-devel@lists.xenproject.org;
:
* KEXEC_TYPE_LIVEUPDATE: New operation to request Live Update
* KEXEC_MA_RANGE_LIVEUPDATE: New range to query the Live Update
area below Xen
Signed-off-by: Julien Grall
Reviewed-by: Paul Durrant
---
xen/include/public/kexec.h | 13 ++---
1 file changed, 10 insertions(+), 3
On 06/05/2021 11:42, Julien Grall wrote:
From: Julien Grall
Looks good in general... just a few comments below...
Administrators often require updating the Xen hypervisor to address
security vulnerabilities, introduce new features, or fix software defects.
Currently, we offer the following
verything doesn't work anymore, we need to use the "host_device"
driver when the disk image is a block device and "file" driver when it
is a regular file.
Signed-off-by: Anthony PERARD
Acked-by: Paul Durrant
---
hw/block/xen-block.c | 14 +-
1 file changed
On 30/04/2021 17:37, Anthony PERARD wrote:
From: Anthony PERARD
Because Coverity complains about it and this is one leak that Valgrind
reports.
Signed-off-by: Anthony PERARD
Acked-by: Paul Durrant
---
hw/i386/xen/xen-hvm.c | 9 ++---
include/hw/xen/xen_common.h | 6
On 28/04/2021 09:49, Jan Beulich wrote:
On 28.04.2021 09:19, Paul Durrant wrote:
On 28/04/2021 07:15, Jan Beulich wrote:
Following the extension to the command line option I'm putting in place
in "IOMMU: make DMA containment of quarantined devices optional" (which
I still need to
On 28/04/2021 07:15, Jan Beulich wrote:
On 28.04.2021 00:00, Scott Davis wrote:
On 4/27/21, 2:56 AM, Jan Beulich wrote:
On 26.04.2021 19:25, Scott Davis wrote:
This patch modifies Xen's behavior when making devices assignable while the
iommu=no-quarantine command line option is in effect.
On 22/04/2021 16:11, Jan Beulich wrote:
On 22.04.2021 17:06, Jan Beulich wrote:
On 22.04.2021 16:55, Jan Beulich wrote:
+do {
+/* Limit rows to just as many to cover the next one to access. */
+cfg->start_row = i;
+cfg->rows[modrm_reg] = i + 1;
+
On 22/04/2021 12:38, Jan Beulich wrote:
On 16.04.2021 15:16, Jan Beulich wrote:
Zapping leaf data for out of range leaves is just one half of it: To
avoid guests (bogusly or worse) inferring information from mere leaf
presence, also shrink maximum indicators such that the respective
trailing
that it wouldn't make the replacement atomic for parallel accesses to
the replaced region - those might still fail with SIGBUS due to
xenforeignmemory_map not being atomic. So we're still not expecting those.
Tested-by: Anthony PERARD
Signed-off-by: Igor Druzhinin
Reviewed-by: Paul Durrant
---
hw/i386
behaviour that was previously assumed to exist.
Signed-off-by: Michael Brown
Reviewed-by: Paul Durrant
---
drivers/net/xen-netback/xenbus.c | 12
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
in
On 13/04/2021 11:48, Michael Brown wrote:
On 13/04/2021 08:12, Paul Durrant wrote:
If the frontend subsequently disconnects and reconnects (e.g.
transitions through Closed->Initialising->Connected) then:
- Nothing recreates "hotplug-status"
- When the frontend re-enters
On 10/04/2021 19:25, Michael Brown wrote:
Commit https://github.com/torvalds/linux/commit/1f25657 ("xen-netback:
remove 'hotplug-status' once it has served its purpose") seems to have
introduced a regression that prevents a vif frontend from transitioning
more than once into Connected state.
On 01/04/2021 14:38, George Dunlap wrote:
Signed-off-by: George Dunlap
---
CC: Paul Durrant
CC: Ian Jackson
CC: Wei Liu
Reviewed-by: Paul Durrant
---
CHANGELOG.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index f7ce6682b9
.
No functional change intended.
Requested-by: Jan Beulich
Signed-off-by: Roger Pau Monné
Reviewed-by: Paul Durrant
---
xen/arch/x86/hvm/viridian/synic.c | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/viridian/synic.c
b/xen/arch/x86/hvm
On 24/03/2021 16:44, George Dunlap wrote:
Signed-off-by: George Dunlap
---
CC: Ian Jackson
CC: Paul Durrant
Reviewed-by: Paul Durrant
---
CHANGELOG.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 7f03e85bd7..8c89212f14 100644
--- a/CHANGELOG.md
the opportunity
to update it as there is a user of the command.
Fixes: 13dd372834a4 ("docs/designs: re-work the xenstore migration document...")
Signed-off-by: Julien Grall
---
Cc: raphn...@gmail.com
Cc: jgr...@suse.com
Cc: p...@xen.org
Reviewed-by: Paul Durrant
Ian, would you stil
with `xendev' with
s/cann't/can't
With those fixed...
Reviewed-by: Paul Durrant
+ * xen_block_drive_destroy() below.
+ */
+drain_call_rcu();
+
if (iothread) {
xen_block_iothread_destroy(iothread, errp);
if (*errp) {
is enable.
Signed-off-by: ChiaHao Hsu
Reviewed-by: Paul Durrant
-off-by: ChiaHao Hsu
Reviewed-by: Paul Durrant
private.h. Fix the dmop design doc to discuss both reasons
behind the the ABI design.
Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
Release-Acked-by: Ian Jackson
Reviewed-by: Paul Durrant
---
CC: Jan Beulich
CC: Roger Pau Monné
CC: Wei Liu
CC: Paul Durrant
CC: Ian Jackson
v3
On 10/03/2021 14:58, Jason Andryuk wrote:
Hi,
I was running a loop of `xl block-attach ; xl block-detach` and I
triggered a BUG in xen-blkfront, drivers/block/xen-blkfront.c:1917
This is BUG_ON(info->nr_rings) in negotiate_mq called by blkback_changed.
I'm using Linux 5.4.103 and blktap3 on
On 09/03/2021 14:50, Ian Jackson wrote:
Signed-off-by: Ian Jackson
Perhaps we need a release.mana...@xenproject.org alias that can be
passed along. Anyway...
Acked-by: Paul Durrant
---
MAINTAINERS | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/MAINTAINERS b
On 09/03/2021 14:10, Hsu, Chiahao wrote:
On 25.02.21, 13:29, "Hsu, Chiahao" wrote:
In order to support live migration of guests between kernels
that do and do not support 'feature-ctrl-ring', we add a
module parameter that allows the feature to be disabled
at run time,
On 25/02/2021 14:00, Jan Beulich wrote:
On 25.02.2021 13:11, Paul Durrant wrote:
On 25/02/2021 07:33, Jan Beulich wrote:
On 24.02.2021 17:39, Paul Durrant wrote:
On 23/02/2021 16:29, Jan Beulich wrote:
When re-entering the main loop of xenvif_tx_check_gop() a 2nd time, the
special
On 25/02/2021 07:33, Jan Beulich wrote:
On 24.02.2021 17:39, Paul Durrant wrote:
On 23/02/2021 16:29, Jan Beulich wrote:
When re-entering the main loop of xenvif_tx_check_gop() a 2nd time, the
special considerations for the head of the SKB no longer apply. Don't
mistakenly report ERROR
On 23/02/2021 16:29, Jan Beulich wrote:
When re-entering the main loop of xenvif_tx_check_gop() a 2nd time, the
special considerations for the head of the SKB no longer apply. Don't
mistakenly report ERROR to the frontend for the first entry in the list,
even if - from all I can tell - this
failed
By restricting it to Xen, we display a clearer error message:
$ qemu-system-x86_64 -M xenpv,accel=kvm
qemu-system-x86_64: invalid accelerator 'kvm' for machine xenpv
Signed-off-by: Philippe Mathieu-Daudé
Acked-by: Paul Durrant
101 - 200 of 3550 matches
Mail list logo