On Fri, Dec 05, Olaf Hering wrote:
On Thu, Dec 04, Konrad Rzeszutek Wilk wrote:
On Thu, Dec 04, 2014 at 08:47:56AM +0100, Olaf Hering wrote:
Is that something the sysadmin has to adjust, or should the xen source
provide proper values?
It would be rather cumbersome if the sysadmin had
On Fri, Dec 05, Olaf Hering wrote:
So looking again at
tools/hotplug/Linux/systemd/var-lib-xenstored.mount.in it seems that it
happens to work for me because XENSTORED_MOUNT_CTX is set within that
file. So if something happens to need a different value for
XENSTORED_MOUNT_CTX it has to be
On 04.12.14 at 17:35, roger@citrix.com wrote:
I've just stumbled upon this assert while testing PVH on different
hardware. It was added in 7c4870 as a safe belt, but it turns out INS
and OUTS go through handle_mmio. So using this instructions from a PVH
guest basically kills Xen.
I've
Please don't top post.
On Fri, 2014-12-05 at 14:51 +0530, Sagun Garg wrote:
Thanks Ian for helping me with the links,
FYI, I found following link :
https://blog.xenproject.org/2014/04/01/virtualization-on-arm-with-xen/
(Here it suggests using Foundation Model and Linaro, basically an
flight 32086 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32086/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
Regressions which are
Hi,
At 10:00 +0800 on 05 Dec (1417770044), Yu, Zhang wrote:
@@ -5978,7 +5982,8 @@ long do_hvm_op(unsigned long op,
XEN_GUEST_HANDLE_PARAM(void) arg)
goto param_fail4;
}
if ( !p2m_is_ram(t)
- (!p2m_is_hole(t) ||
On 03.12.14 at 17:04, david.vra...@citrix.com wrote:
The default limit for the number of PIRQs for hardware domains (dom0)
is not sufficient for some (x86) systems.
Since the pirq structures are individually and dynamically allocated,
the limit for hardware domains may be increased to the
At 09:20 + on 05 Dec (1417767654), Jan Beulich wrote:
On 04.12.14 at 18:25, t...@xen.org wrote:
Potential feature flags, based on whiteboard notes at the session.
Things that are 'Yes' in both columns might not need actual flags :)
'HVM' 'PVH'
64bit
On Thu, 2014-12-04 at 18:24 +, xen.org wrote:
flight 32083 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32083/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build
On Tue, Dec 02, Wei Liu wrote:
AC_CHECK_LIB fails on Debian Jessie since the ld flag it generates is
incorrect, even in the event systemd library is available. Use
PKG_CHECK_MODULES instead.
Tested on Debian Jessie and Arch Linux.
I just tested this and got this failure. The reason is
On Fri, 2014-12-05 at 09:47 +, Jan Beulich wrote:
On 05.12.14 at 10:33, ian.campb...@citrix.com wrote:
On Fri, 2014-12-05 at 07:37 +, Jan Beulich wrote:
On 04.12.14 at 22:22, roy.fr...@linaro.org wrote:
On Thu, Dec 4, 2014 at 1:35 AM, Jan Beulich jbeul...@suse.com wrote:
On
On Fri, 2014-12-05 at 10:49 +0100, Tim Deegan wrote:
At 09:20 + on 05 Dec (1417767654), Jan Beulich wrote:
On 04.12.14 at 18:25, t...@xen.org wrote:
Potential feature flags, based on whiteboard notes at the session.
Things that are 'Yes' in both columns might not need actual flags :)
On Fri, 2014-12-05 at 10:51 +0100, Olaf Hering wrote:
On Tue, Dec 02, Wei Liu wrote:
AC_CHECK_LIB fails on Debian Jessie since the ld flag it generates is
incorrect, even in the event systemd library is available. Use
PKG_CHECK_MODULES instead.
Tested on Debian Jessie and Arch
Hey folks,
In recent months I've been working on speed up the 'xl des' time of XEN
guest with large RAM, but there is still no good solution yet.
I'm looking forward to get more suggestions and appreciate for all of
your input.
(1) The problem
When 'xl destory' a guest with large memory, we
On Fri, Dec 05, Ian Campbell wrote:
On Fri, 2014-12-05 at 10:51 +0100, Olaf Hering wrote:
On Tue, Dec 02, Wei Liu wrote:
AC_CHECK_LIB fails on Debian Jessie since the ld flag it generates is
incorrect, even in the event systemd library is available. Use
PKG_CHECK_MODULES instead.
On 04/12/14 15:39, Alex Williamson wrote:
I don't know what workaround you're talking about. As devices are
released from the user, vfio-pci attempts to reset them. If
pci_reset_function() returns success we mark the device clean, otherwise
it gets marked dirty. Each time a device is
Wei Liu wei.l...@citrix.com writes:
(I've skipped the internal implementation since I don't know what's
required to fulfil soft reset.)
On Wed, Dec 03, 2014 at 06:16:20PM +0100, Vitaly Kuznetsov wrote:
[...]
+ libxl__domain_create_state *dcs);
Hi Vijay,
On 05/12/2014 00:46, Vijay Kilari wrote:
Yes, this is the behaviour that Iam seeing. In Linux, uart driver
masks TXI interrupt
in IMSC if buffer is empty. However in xen, this scenario is not
handled. This is the reason why cpu does not come out of uart irq
routine if TX interrupt
On Fri, 2014-12-05 at 11:49 +0100, Olaf Hering wrote:
Linking fails with undefined reference to the used systemd functions.
Move LDFLAGS after the object files to fix the failure.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Stefano Stabellini
On Thu, 2014-12-04 at 14:34 -0500, Konrad Rzeszutek Wilk wrote:
On Thu, Dec 04, 2014 at 07:26:55PM +, Julien Grall wrote:
A 0 was forgotten when the arm32 BUG instruction opcode has been added in
commit
3e802c6ca1fb9a9549258c2855a57cad483f3cbd xen/arm: Correctly support
WARN_ON.
On 04/12/14 17:25, Tim Deegan wrote:
'HVM' 'PVH'
64bit hypercalls Yes Yes
32bit hypercalls Yes No
Paging assistance Yes Yes
ioreq-servers Yes No
Perhaps, but no default one.
El 05/12/14 a les 10.15, Jan Beulich ha escrit:
On 04.12.14 at 17:35, roger@citrix.com wrote:
I've just stumbled upon this assert while testing PVH on different
hardware. It was added in 7c4870 as a safe belt, but it turns out INS
and OUTS go through handle_mmio. So using this instructions
Hello,
On 05/12/2014 09:32, Ian Campbell wrote:
On Fri, 2014-12-05 at 14:51 +0530, Sagun Garg wrote:
Not sure what sorts of risks you mean, I don't think there is anything
Xen specific here, just the usual stuff with running an untested OS on
any new platform.
I don't know if Nexus devices are
On 05/12/14 11:07, Roger Pau Monné wrote:
El 05/12/14 a les 10.15, Jan Beulich ha escrit:
On 04.12.14 at 17:35, roger@citrix.com wrote:
I've just stumbled upon this assert while testing PVH on different
hardware. It was added in 7c4870 as a safe belt, but it turns out INS
and OUTS go
On 05.12.14 at 12:07, roger@citrix.com wrote:
El 05/12/14 a les 10.15, Jan Beulich ha escrit:
On 04.12.14 at 17:35, roger@citrix.com wrote:
I've just stumbled upon this assert while testing PVH on different
hardware. It was added in 7c4870 as a safe belt, but it turns out INS
and
On 05/12/14 09:44, Jan Beulich wrote:
On 03.12.14 at 17:04, david.vra...@citrix.com wrote:
The default limit for the number of PIRQs for hardware domains (dom0)
is not sufficient for some (x86) systems.
Since the pirq structures are individually and dynamically allocated,
the limit for
Konrad and Michael Young reported SELinux related failures in
var-lib-xenstored.mount. The first patch tries to address this by
makeing it easier to change the value of XENSTORED_MOUNT_CTX.
Its not clear to me if the mount option context= should be
adjustable by configure
On a non-SELinux system the mount option context=none works fine. But
with SELinux enabled a proper value has to be defined. To simplify the
required adjustment move XENSTORED_MOUNT_CTX from the service file to
the sysconfig file.
There is no need to require the creation of a new sysconfig file,
There is no need to require the creation of a new sysconfig file to
pass options to xenconsoled in the systemd service file. Reuse the
existing xencommons file. This file already contains the variable
XENCONSOLED_TRACE, which is used in the sysv runlevel script.
- Adjust systemd service file to
The sysv runlevel script handles the boolean variable XENSTORED_TRACE
from sysconfig.xencommons to enable tracing. Recognize this also to
the systemd service file.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Stefano Stabellini
The references Environment file does not exist, and the service file
does not make use of variables anyway.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Stefano Stabellini stefano.stabell...@eu.citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Wei
On 04.12.14 at 18:01, mdo...@bitdefender.com wrote:
--- a/xen/common/xmalloc_tlsf.c
+++ b/xen/common/xmalloc_tlsf.c
@@ -120,9 +120,120 @@ struct xmem_pool {
char name[MAX_POOL_NAME_LEN];
};
+static struct xmem_pool *xenpool;
+
+static inline void MAPPING_INSERT(unsigned long r,
On 05.12.14 at 13:02, andrew.coop...@citrix.com wrote:
On 05/12/14 09:44, Jan Beulich wrote:
On 03.12.14 at 17:04, david.vra...@citrix.com wrote:
The default limit for the number of PIRQs for hardware domains (dom0)
is not sufficient for some (x86) systems.
Since the pirq structures are
Olaf Hering writes ([PATCH 4/5] tools/hotplug: remove XENSTORED_ROOTDIR from
service file):
There is no need to export XENSTORED_ROOTDIR. This variable can be
enabled in sysconfig/xencommons. If the variable is unset xenstored
will automatically use @XEN_LIB_STORED@.
Acked-by: Ian Jackson
On 05.12.14 at 11:00, bob@oracle.com wrote:
5. Potential workaround
5.1 Use per-cpu list in idle_loop()
Delist a batch of pages from heap_list to a per-cpu list, then scrub the
per-cpu list and free back to heap_list.
But Jan disagree with this solution:
You should really drop the
Olaf Hering writes ([PATCH 5/5] tools/hotplug: support XENSTORED_TRACE in
systemd):
The sysv runlevel script handles the boolean variable XENSTORED_TRACE
from sysconfig.xencommons to enable tracing. Recognize this also to
the systemd service file.
...
-ExecStart=/bin/sh -c exec $XENSTORED
On Fri, Dec 05, Ian Jackson wrote:
Olaf Hering writes ([PATCH 1/5] tools/hotplug: move XENSTORED_MOUNT_CTX to
sysconfig.xencommons):
On a non-SELinux system the mount option context=none works fine. But
with SELinux enabled a proper value has to be defined. To simplify the
required
Introduce two helper functions to savely read and write unsigned long
values from or to memory without crashing the system in case of access
failures.
These helpers can be used instead of open coded uses of __get_user()
and __put_user() avoiding the need to do casts to fix sparse warnings.
Use
On Fri, Dec 05, Ian Jackson wrote:
I think the only way to make this work properly is to factor the
necessary parts out of init.d/xencommons into a new script which can
be used by both xencommons and systemd. I'm not sure such a patch
would be appropriate for 4.5 at this stage.
Yes, a
On Fri, Dec 05, 2014 at 01:17:16AM +, Zhangleiqiang (Trump) wrote:
[...]
I think that's expected, because guest RX data path still uses grant_copy
while
guest TX uses grant_map to do zero-copy transmit.
As far as I know, there are three main grant-related operations used in split
On Fri, Dec 05, Ian Jackson wrote:
Olaf Hering writes (Re: [PATCH 1/5] tools/hotplug: move XENSTORED_MOUNT_CTX
to sysconfig.xencommons):
On Fri, Dec 05, Ian Jackson wrote:
This patch looks like just the hook. It seems to be missing the part
where the actual selinux context is defined
On Fri, Dec 05, Ian Jackson wrote:
Can systemd not launch these daemons by running the existing
xencommons et al init scripts ? Obviously that won't give you all of
systemd's shiny features but IMO it ought to work.
I think the point was to let systemd pass the file descriptors. Thats why
UART is not able to receive bytes when idle mode is not
configured properly. When we use Xen with old Linux
Kernel (for example 3.8) this kernel configures UART
idle mode even if the UART node in device tree is absent.
So UART works normally in this case. But new Linux
Kernel (3.12 and upper)
On Tue, 2014-12-02 at 23:14 -0700, Chun Yan Liu wrote:
On 11/28/2014 at 11:43 PM, in message
1417189409.23604.62.ca...@citrix.com,
Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2014-11-25 at 02:08 -0700, Chun Yan Liu wrote:
Hi, Ian,
According to previous discussion,
A generic dma_get_required_mask() is useful even for architectures (such
as ia64) that define ARCH_HAS_GET_REQUIRED_MASK.
Signed-off-by: David Vrabel david.vra...@citrix.com
Reviewed-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
---
drivers/base/platform.c | 10 --
Signed-off-by: David Vrabel david.vra...@citrix.com
Reviewed-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
Cc: Tony Luck tony.l...@intel.com
Cc: Fenghua Yu fenghua...@intel.com
Cc: linux-i...@vger.kernel.org
---
arch/ia64/include/asm/machvec.h |2 +-
On a Xen PV guest the DMA addresses and physical addresses are not 1:1
(such as Xen PV guests) and the generic dma_get_required_mask() does
not return the correct mask (since it uses max_pfn).
Some device drivers (such as mptsas, mpt2sas) use
dma_get_required_mask() to set the device's DMA mask
On systems where DMA addresses and physical addresses are not 1:1
(such as Xen PV guests), the generic dma_get_required_mask() will not
return the correct mask (since it uses max_pfn).
Some device drivers (such as mptsas, mpt2sas) use
dma_get_required_mask() to set the device's DMA mask to allow
On 05/12/14 12:48, Zoltan Kiss wrote:
Hi,
Maybe I'm misreading it, but it seems to me that netfront doesn't slice
up the linear buffer at all, just blindly sends it. In xennet_start_xmit:
This is handled in the beginning of xennet_make_frags() (which I would
agree isn't not the obvious place
On Fri, 2014-12-05 at 14:36 +, Julien Grall wrote:
Hi,
On 05/12/14 14:27, Ian Campbell wrote:
On Fri, 2014-12-05 at 13:51 +, Jan Beulich wrote:
#define nr_static_irqs NR_IRQS
+#define arch_hwdom_irqs(domid) NR_IRQS
FWIW gic_number_lines() is the ARM equivalent of getting
On 05.12.14 at 15:36, andrew.coop...@citrix.com wrote:
On 05/12/14 11:31, Jan Beulich wrote:
Andrew validly points out that even if these masks aren't a formal part
of the hypercall interface, we aren't free to change them: A guest
suspended for migration in the middle of a continuation would
On 05.12.14 at 15:27, ian.campb...@eu.citrix.com wrote:
On Fri, 2014-12-05 at 13:51 +, Jan Beulich wrote:
#define nr_static_irqs NR_IRQS
+#define arch_hwdom_irqs(domid) NR_IRQS
FWIW gic_number_lines() is the ARM equivalent of getting the number of
GSIs.
*BUT* we don't actually use
On 05.12.14 at 15:48, david.vra...@citrix.com wrote:
On 05/12/14 13:51, Jan Beulich wrote:
+d-nr_pirqs = extra_hwdom_irqs ? nr_static_irqs +
extra_hwdom_irqs
+ : arch_hwdom_irqs(domid);
This means if the user asks for 0 extra (by the
On 05.12.14 at 15:51, daniel.ki...@oracle.com wrote:
On Thu, Dec 04, 2014 at 09:35:01AM +, Jan Beulich wrote:
On 03.12.14 at 22:02, daniel.ki...@oracle.com wrote:
3) Should not we change xen/arch/*/efi/efi-boot.h to
xen/arch/*/efi/efi-boot.c? efi-boot.h contains more
code than
Olaf Hering writes (Re: [PATCH 1/5] tools/hotplug: move XENSTORED_MOUNT_CTX to
sysconfig.xencommons):
On Fri, Dec 05, Ian Jackson wrote:
I confess I don't know very much about selinux, but shouldn't we be
providing a reasonable default policy, rather than leaving it to the
distro or user
Konrad,
having been surprised to find your cpio scanning code to not work I
had to realize that this can't possibly work when the initrd is
compressed. Considering that you found this useful nevertheless -
am I to imply that you're running with (and only considering) non-
compressed initrd? Are
flight 32089 xen-4.3-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32089/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 31811
Tests which did
On 05.12.14 at 16:01, andrew.coop...@citrix.com wrote:
On 05/12/14 14:47, Jan Beulich wrote:
On 05.12.14 at 15:36, andrew.coop...@citrix.com wrote:
On 05/12/14 11:31, Jan Beulich wrote:
Andrew validly points out that even if these masks aren't a formal part
of the hypercall interface, we
On 05/12/14 14:42, Ian Campbell wrote:
On Fri, 2014-12-05 at 14:36 +, Julien Grall wrote:
Hi,
On 05/12/14 14:27, Ian Campbell wrote:
On Fri, 2014-12-05 at 13:51 +, Jan Beulich wrote:
#define nr_static_irqs NR_IRQS
+#define arch_hwdom_irqs(domid) NR_IRQS
FWIW gic_number_lines() is
xen.org writes ([xen-4.4-testing test] 31991: regressions - FAIL):
flight 31991 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31991/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair
On Fri, 2014-12-05 at 14:55 +, Ian Campbell wrote:
Required by latest libvirt, to build docs.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Ian acked this on IRC and I have pushed it along with some other bits
and bobs floating around already acked. Specifically I have pushed to
In general initial conring size is sufficient. However, if log
level is increased on platforms which have e.g. huge number
of memory regions (I have an IBM System x3550 M2 with 8 GiB RAM
which has more than 200 entries in EFI memory map) then some
of earlier messages in console ring are
On 05.12.14 at 16:55, jbeul...@suse.com wrote:
On 02.12.14 at 22:34, boris.ostrov...@oracle.com wrote:
+struct xen_sysctl_iotopo {
+uint16_t seg;
+uint8_t bus;
+uint8_t devfn;
+uint32_t node;
+};
This is PCI-centric without expressing in the name or layout. Perhaps
the
On 05/12/14 15:42, Jan Beulich wrote:
On 05.12.14 at 16:25, julien.gr...@linaro.org wrote:
- XEN_DOMCTL_irq_permission = I don't really understand this bits.
AFAIU the pirq number is different on each domain. But we use it to
check permission on both domain. Shouldn't we translate the
I have to admit I'm confused by the back and forth discussion. It's hard
to justify the design of new API without knowing what the constraints
and requirements are from your PoV.
Here are my two cents, not about details, but about general constraints.
There are two layers, one is user of libxl
On Fri, 2014-12-05 at 16:06 +, Wei Liu wrote:
Regarding JSON API, as Ian said, feel free to hook it up to libxlu.
*If* it is useful to multiple toolstacks but not suitable for libxl then
libxlu would be the right place.
As I understood things the need for JSON here was xl specific, and it
On Mon, Dec 01, 2014 at 05:24:35PM +0800, Tiejun Chen wrote:
Before we refine RMRR mechanism, USB RMRR may conflict with guest bios
region so we always ignore USB RMRR. Now this can be gone when we enable
pci_force to check/reserve RMRR.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
On Fri, Dec 05, 2014 at 09:28:44AM +0100, Olaf Hering wrote:
On Fri, Dec 05, Olaf Hering wrote:
So looking again at
tools/hotplug/Linux/systemd/var-lib-xenstored.mount.in it seems that it
happens to work for me because XENSTORED_MOUNT_CTX is set within that
file. So if something happens
On Wed, Dec 03, 2014 at 08:39:47PM +0100, Luis R. Rodriguez wrote:
On Wed, Dec 03, 2014 at 05:37:51AM +0100, Juergen Gross wrote:
On 12/03/2014 03:28 AM, Luis R. Rodriguez wrote:
On Tue, Dec 02, 2014 at 11:11:18AM +, David Vrabel wrote:
On 01/12/14 22:36, Luis R. Rodriguez wrote:
On 05.12.14 at 16:50, daniel.ki...@oracle.com wrote:
This bug (or lack of feature if you prefer) should be fixed, as it
was pointed out by Jan Beulich and Olaf Hering, by allocating conring
earlier. I though about that before posting this patch (I did not
know beforehand about Olaf's work
On Fri, Dec 05, 2014 at 04:11:48PM +, Ian Campbell wrote:
On Fri, 2014-12-05 at 16:06 +, Wei Liu wrote:
Regarding JSON API, as Ian said, feel free to hook it up to libxlu.
*If* it is useful to multiple toolstacks but not suitable for libxl then
libxlu would be the right place.
As
On 05.12.14 at 17:05, julien.gr...@linaro.org wrote:
On 05/12/14 15:42, Jan Beulich wrote:
On 05.12.14 at 16:25, julien.gr...@linaro.org wrote:
- XEN_DOMCTL_irq_permission = I don't really understand this bits.
AFAIU the pirq number is different on each domain. But we use it to
check
On Fri, Dec 05, 2014 at 10:42:27AM +, Andrew Cooper wrote:
On 05/12/14 09:54, Ian Campbell wrote:
On Fri, 2014-12-05 at 10:49 +0100, Tim Deegan wrote:
At 09:20 + on 05 Dec (1417767654), Jan Beulich wrote:
On 04.12.14 at 18:25, t...@xen.org wrote:
Potential feature flags, based on
The path to the pty of a Xen PV console is set only in
virDomainOpenConsole. But this is done too late. A call to
virDomainGetXMLDesc done before OpenConsole will not have the path to
the pty, but a call after OpenConsole will.
e.g. of the current issue.
Starting a domain with 'console type=pty/'
On Fri, Dec 05, 2014 at 03:00:14PM +, Jan Beulich wrote:
On 05.12.14 at 15:51, daniel.ki...@oracle.com wrote:
On Thu, Dec 04, 2014 at 09:35:01AM +, Jan Beulich wrote:
On 03.12.14 at 22:02, daniel.ki...@oracle.com wrote:
3) Should not we change xen/arch/*/efi/efi-boot.h to
On Fri, Dec 05, 2014 at 04:21:35PM +, Jan Beulich wrote:
On 05.12.14 at 16:50, daniel.ki...@oracle.com wrote:
This bug (or lack of feature if you prefer) should be fixed, as it
was pointed out by Jan Beulich and Olaf Hering, by allocating conring
earlier. I though about that before
... when conring_size= was specified on the command line. We can't
really do this as early as we would want to when the option was not
specified, as the default depends on knowing the system CPU count. Yet
the parsing of the ACPI tables is one of the things that generates a
lot of output
On 12/05/2014 10:53 AM, Jan Beulich wrote:
--- a/xen/include/xen/pci.h
+++ b/xen/include/xen/pci.h
@@ -56,6 +56,8 @@ struct pci_dev {
u8 phantom_stride;
+int node; /* NUMA node */
I don't think we currently support node IDs wider than 8 bits.
I used an int because
The example XSM policy was missing permission for dom0_t to migrate
domains; add these permissions.
Reported-by: Wei Liu wei.l...@citrix.com
Signed-off-by: Daniel De Graaf dgde...@tycho.nsa.gov
---
This has been tested with xl save/restore on a PV domain, which now
succeeds without producing AVC
On Fri, Dec 05, 2014 at 10:30:01AM +, David Vrabel wrote:
On 04/12/14 15:39, Alex Williamson wrote:
I don't know what workaround you're talking about. As devices are
released from the user, vfio-pci attempts to reset them. If
pci_reset_function() returns success we mark the device
On Fri, Dec 05, 2014 at 04:55:24PM +, Jan Beulich wrote:
... when conring_size= was specified on the command line. We can't
really do this as early as we would want to when the option was not
specified, as the default depends on knowing the system CPU count. Yet
the parsing of the ACPI
On Tue, Dec 02, Olaf Hering wrote:
On Tue, Dec 02, Ian Campbell wrote:
On Mon, 2014-12-01 at 23:41 +, Mark Pryor wrote:
list,
Thanks. If you've identified a buggy changeset then it is fine to post
to the devel lists. I've added a CC. I've also CCd everyone listed in
the
andrew.coop...@citrix.com said:
I think this is a very good idea, and I am completely in favour of it.
There are already-identified issues such as MiniOS leaking things like
ARRAY_SIZE() into linked namespaces, which I havn't yet had enough tuits
to fix.
I think splitting things like the
On Fri, Dec 05, 2014 at 02:07:59PM +, David Vrabel wrote:
On systems where DMA addresses and physical addresses are not 1:1
(such as Xen PV guests), the generic dma_get_required_mask() will not
return the correct mask (since it uses max_pfn).
Some device drivers (such as mptsas, mpt2sas)
flight 32095 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32095/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 31781
Tests which are
On Fri, Dec 05, 2014 at 02:08:00PM +, David Vrabel wrote:
A generic dma_get_required_mask() is useful even for architectures (such
as ia64) that define ARCH_HAS_GET_REQUIRED_MASK.
Signed-off-by: David Vrabel david.vra...@citrix.com
Reviewed-by: Stefano Stabellini
Hi,
I am trying to find a tutorial to jumpstart installing XenServer / XCP
on an ARM 64bit platform.
Could the mailing list help.
-Regards
Manish
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
While I am not a developer myself (I always sucked hard when it comes to read
and write code), there are several capabilities of Xen and its supporting
Software which I'm always interesed in how they progress, more out of curiosity
than anything else. However, usually, documentation seems to
flight 32096 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32096/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 32029
Tests which did not
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
On pl011.c when TX interrupt is received and
TX buffer is empty, TX interrupt is not disabled and
hence UART interrupt routine see TX interrupt always
in MIS register and cpu loops infinitly.
With this patch, mask and umask TX interrupt
when
On Fri, 05 Dec 2014 14:06:53 +
Jan Beulich jbeul...@suse.com wrote:
PVH guests are not supposed to access I/O ports they weren't given
access to (there's nothing to handle emulation of such accesses).
Reported-by: Roger Pau Monnéroger@citrix.com
Signed-off-by: Jan Beulich
From: Yu Zhang yu.c.zh...@intel.com
A new p2m type, p2m_mmio_write_dm, is added to trap and emulate
the write operations on GPU's page tables. Handling of this new
p2m type are similar with existing p2m_ram_ro in most condition
checks, with only difference on final policy of emulation vs. drop.
92 matches
Mail list logo