Can anyone have idea about how to boot window 2008 r2 smp guest in ovmf with
viridian flag is true?
Thanks!
发件人: Fanhenglong
发送时间: 2015年5月19日 23:22
收件人: xen-devel@lists.xen.org
抄送: 'k...@xen.org'; 'paul.durr...@citrix.com'; 'jbeul...@suse.com';
edk2-de...@lists.sourceforge.net; Hanweidong
On Tue, May 19, 2015 at 4:02 PM, Bjorn Helgaas bhelg...@google.com wrote:
[-cc Venkatesh (bouncing)
On Tue, May 19, 2015 at 5:46 PM, Luis R. Rodriguez
mcg...@do-not-panic.com wrote:
On Tue, May 19, 2015 at 3:44 PM, Bjorn Helgaas bhelg...@google.com
wrote:
Acked-by: Bjorn Helgaas
Actually we always return 1 if pci device exists.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
xen/drivers/passthrough/pci.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/drivers/passthrough/pci.c b/xen/drivers/passthrough/pci.c
index 862e20f..6cb6e00 100644
---
flight 56745 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56745/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 56492
Dear all,
Could you please advise me whether XEN has a mechanism to merge/map same memory
pages of different VMs into a single physical page in the available physical
address space. If yes, is there a compilation flag to disable such feature?
Please note I am running hardware-assisted XEN
On 19.05.15 at 18:59, andrew.coop...@citrix.com wrote:
On 18/05/15 13:46, Jan Beulich wrote:
+unsigned long alloc_stub_page(unsigned int cpu, unsigned long *mfn)
+{
+unsigned long stub_va;
+struct page_info *pg;
+
+if ( *mfn )
+pg = mfn_to_page(*mfn);
+else
+
flight 56759 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56759/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 17 leak-check/check fail REGR. vs. 56375
Regressions which
On Wed, May 13, 2015 at 11:49:37AM +0200, Vitaly Kuznetsov wrote:
Use letter 'S' to indicate a domain in such state.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
tools/libxl/libxl.h | 7 +++
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_cmdimpl.c
move remus codes into libxl_remus.c
Signed-off-by: Yang Hongyang yan...@cn.fujitsu.com
CC: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Wei Liu wei.l...@citrix.com
CC: Andrew Cooper andrew.coop...@citrix.com
---
tools/libxl/Makefile | 2 +-
This patchset mainly focus on libxl save, most of the patches are
simply move codes out of libxl_dom.c, no functional changes, may conflict
with Andrew Cooper's libxl work for migration v2, so CCed Andrew for
comments.
For convenience, my previous sent patch
[PATCH v1] libxl/save: Refactor
On 20/05/15 09:39, Mazen Ezzeddine (Student) wrote:
Dear all,
Hello,
I am using hardware assisted XEN on ARM cortex A-15, could you please
hint me on the below:
I want the stage two translation from IPA to PA through the stage two
translation to exclude a particular small contiguous
On 19.05.15 at 20:06, ma...@mhtx.net wrote:
I've been doing some testing of Xen 4.5 on Fedora 22 (due out within a week)
and I have an error that prevents the server from booting in the very early
boot process:
(XEN) Xen call trace:
(XEN)[82d08011d160]
On 2015/5/20 18:06, Jan Beulich wrote:
On 20.05.15 at 08:53, tiejun.c...@intel.com wrote:
--- a/xen/drivers/passthrough/pci.c
+++ b/xen/drivers/passthrough/pci.c
@@ -905,7 +905,7 @@ out:
}
/*
- * detect pci device, return 0 if it exists, or return 0
+ * detect pci device, return 1 if it
flight 56805 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56805/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 56492
build-amd64
Hello,
Please keep xen-devel CCed and avoid to top-post.
On 20/05/15 12:47, Mazen Ezzeddine (Student) wrote:
Thanks Jlien,
Mainly it belongs to a device. I can't see why it would be problematic for a
device and not for RAM or vice-versa? could you please hint me on what is the
Dear experts,
Does Xen-ARM support selective IRQ trapping i.e. configure some devices IRQ to
trap to hypervisor while the rest to be directly handled in the guest. Does ARM
virtualization extensions support such a use-case?
Thank you so much.
___
On 20.05.15 at 14:03, roger@citrix.com wrote:
El 20/05/15 a les 13.46, Jan Beulich ha escrit:
On 20.05.15 at 12:11, roger@citrix.com wrote:
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -42,6 +42,7 @@
#include xsm/xsm.h
#include xen/trace.h
#include xen/tmem.h
On Wed, 2015-05-20 at 12:07 +, Mazen Ezzeddine (Student) wrote:
Does Xen-ARM support selective IRQ trapping i.e. configure some
devices IRQ to trap to hypervisor while the rest to be directly
handled in the guest. Does ARM virtualization extensions support such
a use-case?
Please take a
In tree, there is one single caller of XEN_DOMCTL_getpageframeinfo3
(xc_get_pfn_type_batch()), and no callers of the older variants.
getpageframeinfo3 and getpageframeinfo2 are compatible if the parameter
contents are considered to be unsigned long, and indeed, a compat guest
calling
Thanks so much.
I will ensure to keep xen-devel cced and avoid top-post. Sorry and thanks for
notifying me.
However, my use-case will involve a scenario where the the page frames excluded
from the second stage translation are to be allocated on the fly (through a
slightly modified second
On 20/05/15 09:41, Mazen Ezzeddine (Student) wrote:
Dear all,
Hello,
Could you please advise me whether XEN has a mechanism to merge/map same
memory pages of different VMs into a single physical page in the
available physical address space. If yes, is there a compilation flag
to disable
On 20.05.15 at 12:11, roger@citrix.com wrote:
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -42,6 +42,7 @@
#include xsm/xsm.h
#include xen/trace.h
#include xen/tmem.h
+#include asm/setup.h
This caused the ARM build to fail. Instead of once again reverting I
applied the
On 20.05.15 at 14:05, ian.campb...@citrix.com wrote:
On Wed, 2015-05-20 at 12:46 +0100, Jan Beulich wrote:
On 20.05.15 at 12:11, roger@citrix.com wrote:
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -42,6 +42,7 @@
#include xsm/xsm.h
#include xen/trace.h
#include
El 20/05/15 a les 14.07, Jan Beulich ha escrit:
On 20.05.15 at 14:03, roger@citrix.com wrote:
El 20/05/15 a les 13.46, Jan Beulich ha escrit:
On 20.05.15 at 12:11, roger@citrix.com wrote:
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -42,6 +42,7 @@
#include xsm/xsm.h
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports rangeset.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Jan Beulich jbeul...@suse.com
Cc:
This is needed so Xen can properly trap 4 byte accesses to 0xcf8 in order to
keep consistency with accesses to 0xcfc.
The access to RTC ports also needs to be trapped in order to keep
consistency, this includes RTC_PORT(0) and RTC_PORT(1) (0x70 and 0x71
respectively).
Signed-off-by: Roger Pau
The only change in this version is to allow the io bitmap of Dom0 to be
exchanged if a late hardware domain is used.
Thanks, Roger.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
This function should better return as bool_t and
remove that pointless comment.
Signed-off-by: Tiejun Chen tiejun.c...@intel.com
---
v2:
* Instead of correcting that comment directly, we make this function
return as bool_t.
xen/drivers/passthrough/pci.c | 7 ++-
On Wed, 2015-05-20 at 12:46 +0100, Jan Beulich wrote:
On 20.05.15 at 12:11, roger@citrix.com wrote:
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -42,6 +42,7 @@
#include xsm/xsm.h
#include xen/trace.h
#include xen/tmem.h
+#include asm/setup.h
This caused the ARM
El 20/05/15 a les 13.46, Jan Beulich ha escrit:
On 20.05.15 at 12:11, roger@citrix.com wrote:
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -42,6 +42,7 @@
#include xsm/xsm.h
#include xen/trace.h
#include xen/tmem.h
+#include asm/setup.h
This caused the ARM build to fail.
El 19/05/15 a les 17.07, Roger Pau Monné ha escrit:
El 19/05/15 a les 12.29, Jan Beulich ha escrit:
On 19.05.15 at 12:20, t...@xen.org wrote:
At 12:19 +0100 on 18 May (1431951570), Jan Beulich wrote:
On 18.05.15 at 12:50, roger@citrix.com wrote:
El 18/05/15 a les 12.17, Tim Deegan ha
On 20/05/15 02:45, Luis R. Rodriguez wrote:
On Tue, May 19, 2015 at 4:29 PM, David Airlie airl...@redhat.com wrote:
On Tue, May 19, 2015 at 4:02 PM, Bjorn Helgaas bhelg...@google.com wrote:
[-cc Venkatesh (bouncing)
On Tue, May 19, 2015 at 5:46 PM, Luis R. Rodriguez
On Wed, 2015-05-20 at 10:04 +0100, Wei Liu wrote:
On Mon, May 18, 2015 at 09:20:43PM -0600, Chun Yan Liu wrote:
[...]
+for (;;) {
+rc = libxl__xs_transaction_start(gc, t);
+if (rc) goto out;
+
+rc = libxl__device_exists(gc, t, device);
On 20.05.15 at 10:58, roger@citrix.com wrote:
After looking into this a little bit more, I'm afraid I don't see a
straight forward way to check for the permissions of all paging levels.
Here are the options I've found in order to deal with this:
- Use guest_get_eff_l1e and only check
On 19.05.15 at 20:53, andrew.coop...@citrix.com wrote:
On 18/05/15 13:47, Jan Beulich wrote:
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@ -895,6 +895,33 @@ void __init subarch_init_memory(void)
share_xen_page_with_privileged_guests(page, XENSHARE_readonly);
On Tue, May 19, 2015 at 11:56:39PM +0100, Julien Grall wrote:
diff --git a/drivers/net/xen-netback/common.h
b/drivers/net/xen-netback/common.h
index 0eda6e9..c2a5402 100644
--- a/drivers/net/xen-netback/common.h
+++ b/drivers/net/xen-netback/common.h
@@ -204,7 +204,7 @@ struct
On Wed, 2015-05-20 at 02:42 +, Han, Huaitong wrote:
On Tue, 2015-05-19 at 10:01 +0100, Jan Beulich wrote:
On 14.05.15 at 07:23, huaitong@intel.com wrote:
@@ -1172,7 +1196,10 @@ int pmstat_get_cx_stat(uint32_t cpuid, struct
pm_cx_stat *stat)
{
struct
On Wed, May 20, 2015 at 01:27:56PM +0800, Chen, Tiejun wrote:
[...]
We have this definition,
+libxl_rdm_reserve_type = Enumeration(rdm_reserve_type, [
+(0, none),
+(1, host),
+])
If we set 'type=none', this means we would do nothing actually since we
don't expose any rdms to
Hi,
Several of us at Citrix are currently working on rewriting xenopsd -
the component of the Xapi toolstack which handles domain creation,
destruction, device attachment and so on - to use libxl instead of libxc.
One of the problems we have run into is that error reporting in libxl
is not
On 20.05.15 at 05:13, chao.p.p...@linux.intel.com wrote:
I do have a problem when coming up with the final codes, there are two
possible ways:
1) Make both num_processors and disabled_cpus public so that they can
be used when calculating nr_sockets.
2) Add another public function
On 20.05.15 at 05:21, chao.p.p...@linux.intel.com wrote:
On Tue, May 19, 2015 at 11:22:54AM +0100, Jan Beulich wrote:
On 19.05.15 at 11:33, chao.p.p...@linux.intel.com wrote:
On Tue, May 19, 2015 at 09:42:07AM +0100, Jan Beulich wrote:
On 19.05.15 at 09:40, chao.p.p...@linux.intel.com
On Wed, May 20, 2015 at 10:06:32AM +0100, Jan Beulich wrote:
On 20.05.15 at 05:21, chao.p.p...@linux.intel.com wrote:
On Tue, May 19, 2015 at 11:22:54AM +0100, Jan Beulich wrote:
On 19.05.15 at 11:33, chao.p.p...@linux.intel.com wrote:
On Tue, May 19, 2015 at 09:42:07AM +0100, Jan
On 5/20/2015 at 05:04 PM, in message
20150520090407.gw26...@zion.uk.xensource.com, Wei Liu wei.l...@citrix.com
wrote:
On Mon, May 18, 2015 at 09:20:43PM -0600, Chun Yan Liu wrote:
[...]
+for (;;) {
+rc = libxl__xs_transaction_start(gc, t);
+if (rc)
On 20.05.15 at 10:36, huaitong@intel.com wrote:
On Wed, 2015-05-20 at 02:42 +, Han, Huaitong wrote:
On Tue, 2015-05-19 at 10:01 +0100, Jan Beulich wrote:
On 14.05.15 at 07:23, huaitong@intel.com wrote:
@@ -1172,7 +1196,10 @@ int pmstat_get_cx_stat(uint32_t cpuid, struct
Hi,
On 19/05/2015 21:02, Andrew Cooper wrote:
diff --git a/xen/include/public/arch-x86/xen.h
b/xen/include/public/arch-x86/xen.h
index cea3fe7..5a5bad6 100644
--- a/xen/include/public/arch-x86/xen.h
+++ b/xen/include/public/arch-x86/xen.h
@@ -263,7 +263,7 @@ struct arch_shared_info {
typedef
On 2015/5/20 16:36, Wei Liu wrote:
On Wed, May 20, 2015 at 01:27:56PM +0800, Chen, Tiejun wrote:
[...]
We have this definition,
+libxl_rdm_reserve_type = Enumeration(rdm_reserve_type, [
+(0, none),
+(1, host),
+])
If we set 'type=none', this means we would do nothing actually
On 19.05.15 at 19:33, andrew.coop...@citrix.com wrote:
On 18/05/15 13:46, Jan Beulich wrote:
@@ -17,8 +18,22 @@
/* Avoid namespace pollution. */
#undef cmpxchg
#undef cpuid
+#undef wbinvd
#define cpu_has_amd_erratum(nr) \
cpu_has_amd_erratum(current_cpu_data,
Dear all,
I am using hardware assisted XEN on ARM cortex A-15, could you please hint me
on the below:
I want the stage two translation from IPA to PA through the stage two
translation to exclude a particular small contiguous region (some physical
frames) of the physical memory ? is this
On Tue, 2015-05-19 at 13:02 -0400, Daniel De Graaf wrote:
On 05/19/2015 09:44 AM, Ian Campbell wrote:
From: Daniel De Graaf dgde...@tycho.nsa.gov
Acked-by: Ian Campbell ian.campb...@citrix.com
---
Daniel -- this is from your example patch in
2b0e.8050...@tycho.nsa.gov and so needs
On Wed, May 20, 2015 at 04:51:44PM +0800, Chen, Tiejun wrote:
On 2015/5/20 16:36, Wei Liu wrote:
On Wed, May 20, 2015 at 01:27:56PM +0800, Chen, Tiejun wrote:
[...]
We have this definition,
+libxl_rdm_reserve_type = Enumeration(rdm_reserve_type, [
+(0, none),
+(1, host),
+])
On 20.05.15 at 08:53, tiejun.c...@intel.com wrote:
--- a/xen/drivers/passthrough/pci.c
+++ b/xen/drivers/passthrough/pci.c
@@ -905,7 +905,7 @@ out:
}
/*
- * detect pci device, return 0 if it exists, or return 0
+ * detect pci device, return 1 if it exists, or return 0
*/
int
El 15/05/15 a les 14.06, Bob Liu ha escrit:
On 05/15/2015 07:13 PM, Roger Pau Monné wrote:
El 12/05/15 a les 13.01, Bob Liu ha escrit:
Extend xen/block to support multi-page ring, so that more requests can be
issued
by using more than one pages as the request ring between blkfront and
Introduce helper function irq_data_get_affinity_mask() and
irq_get_affinity_mask() to hide implementation details,
so we could move field 'affinity' from struct irq_data into
struct irq_common_data later.
Signed-off-by: Jiang Liu jiang@linux.intel.com
---
arch/alpha/kernel/irq.c
At 10:12 +0100 on 20 May (1432116766), Jan Beulich wrote:
On 20.05.15 at 10:58, roger@citrix.com wrote:
After looking into this a little bit more, I'm afraid I don't see a
straight forward way to check for the permissions of all paging levels.
Here are the options I've found in order
El 20/05/15 a les 11.43, Tim Deegan ha escrit:
At 10:12 +0100 on 20 May (1432116766), Jan Beulich wrote:
On 20.05.15 at 10:58, roger@citrix.com wrote:
After looking into this a little bit more, I'm afraid I don't see a
straight forward way to check for the permissions of all paging levels.
On Wed, 2015-05-20 at 09:34 +, osstest service user wrote:
flight 56759 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56759/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
move toolstack code into libxl_toolstack.c
Signed-off-by: Yang Hongyang yan...@cn.fujitsu.com
CC: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Wei Liu wei.l...@citrix.com
CC: Andrew Cooper andrew.coop...@citrix.com
---
tools/libxl/Makefile | 2 +-
move domain suspend codes into a separate file libxl_dom_suspend.c
Signed-off-by: Yang Hongyang yan...@cn.fujitsu.com
CC: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Wei Liu wei.l...@citrix.com
CC: Andrew Cooper andrew.coop...@citrix.com
---
move domain save codes into libxl_dom_save.c
Signed-off-by: Yang Hongyang yan...@cn.fujitsu.com
CC: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Wei Liu wei.l...@citrix.com
CC: Andrew Cooper andrew.coop...@citrix.com
---
tools/libxl/Makefile | 2 +-
Currently struct libxl__domain_suspend_state contains 2 type of states,
one is save state, another is suspend state. This patch separate it out.
Also rename libxl__domain_suspend() to libxl__domain_save() since it
actually do the save domain work.
Signed-off-by: Yang Hongyang
On 20/05/15 13:05, Mazen Ezzeddine (Student) wrote:
Thanks so much.
I will ensure to keep xen-devel cced and avoid top-post. Sorry and thanks for
notifying me.
However, my use-case will involve a scenario where the the page frames
excluded from the second stage translation are to be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.1b-rc4-tag
xen: bug fixes for 4.1-rc4
- - Fix ARM build regression.
- - Fix VIRQ_CONSOLE related oops.
Thanks.
David
flight 56764 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56764/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect
test-amd64-amd64-pair
Hi,
new version of this patch below.
I have also pushed a new branch will all the series:
git://xenbits.xen.org/people/julieng/xen-unstable.git branch passthrough-v9.1
Regards,
From d4f0ea84f26649b61bc6afb550348069b71d41c5 Mon Sep 17 00:00:00 2001
From: Julien Grall julien.gr...@linaro.org
Hi Andrew,
On 20/05/15 14:10, Andrew Cooper wrote:
This structure is used by XEN_DOMCTL_createdomain, and is liable to be
modified going forwards. Explicitly state that it falls under the
XEN_DOMCTL_INTERFACE_VERSION.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser
Hi,
On 20/05/15 14:10, Bob Liu wrote:
---
drivers/block/xen-blkback/blkback.c | 12
drivers/block/xen-blkback/common.h | 3 +-
drivers/block/xen-blkback/xenbus.c | 85 +---
drivers/block/xen-blkfront.c| 110
++--
Thanks Ian.
I have already taken a look at Asking Developer Questions (upon registration)
and have reread after you email . But I can not see what's the issue? is
that my question not not understandable or ...?
Thank you so much and best regards.
The need_repro machinery deliberarely makes attempts to reproduce
various results.
This can cause the flail detector to trigger when not intended. In
particular, the bisector may have (for some reason[1]) restarted with
a new baseline, and the temporarally-stripy pass/fail requirement
would then
There are many other possible reasons for this, besides a bug in the
build version machinery.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
cs-bisection-step |5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/cs-bisection-step b/cs-bisection-step
index
When we make a fresh build job, rather than referring to an existing
job in another flight, pass to the rest of the machinery only the job
name, not flight.job.
This means that the generated flight refers to its own jobs without
specifying the flight name. This allows the flail detector to
When looking for identical previously flights, consider only ones
which have the same blessing as our prospective flight will have.
There are good reasons why apparently identical flights might appear
with other in-scope blessings: notably, a single-test-job main branch
might produce many
If the bisector is allowed to consider its own output flights as
candidates for the basis pass, then it will (generally) restart with a
new basis each time it finds a pass.
This is very slow and wasteful.
There is not much explanation in 01edca47 of the change I am now
reverting, but I think I
This series seems to me to fix some problems with the bisector that
Ian C observed and which he and I have discussed in person.
I have done various ad-hoc tests in the Cambridge instance, but the
bisector itself is not tested by the osstest self-push-gate, and it is
of course difficult to foresee
This safety catch is unnecessary and unhelpful.
It is unnecessary because 489773b4 Detect flailing will detect
attempts by the bisector to repeatedly run the same flight and hope
for different results.
It is unhelpful because it can happen for good reasons that a
particular revision has been
From: Julien Grall julien.gr...@linaro.org
libxl__arch_* should only be used internally by libxl.
Signed-off-by: Julien Grall julien.gr...@linaro.org
---
tools/libxl/libxl_arch.h | 6 ++
1 file changed, 6 insertions(+)
diff --git a/tools/libxl/libxl_arch.h b/tools/libxl/libxl_arch.h
index
On Wed, 2015-05-20 at 13:54 +0100, Ian Jackson wrote:
When looking for identical previously flights, consider only ones
which have the same blessing as our prospective flight will have.
There are good reasons why apparently identical flights might appear
with other in-scope blessings:
On Wed, 2015-05-20 at 13:54 +0100, Ian Jackson wrote:
The need_repro machinery deliberarely makes attempts to reproduce
various results.
This can cause the flail detector to trigger when not intended. In
particular, the bisector may have (for some reason[1]) restarted with
a new baseline,
This structure is used by XEN_DOMCTL_createdomain, and is liable to be
modified going forwards. Explicitly state that it falls under the
XEN_DOMCTL_INTERFACE_VERSION.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
CC: Ian
On Tuesday 19 May 2015 11:38:09 Tina Ruchandani wrote:
struct timeval uses a 32-bit field for representing seconds,
which will overflow in the year 2038 and beyond. This patch replaces
struct timeval with 64-bit ktime_t which is 2038 safe.
The patch is part of a larger effort to remove
Thanks for the feedback.
I will arrange to respect the community etiquette as I will write frequently
to the list in the upcoming period :).
Best wishes.
From: Ian Campbell ian.campb...@citrix.com
Sent: Wednesday, May 20, 2015 3:46 PM
To: Mazen
On 05/20/15 09:24, Fanhenglong wrote:
Can anyone have idea about how to boot window 2008 r2 smp guest in ovmf
with viridian flag is true?
I had to confirm first that viridian means Hyper-V,
http://en.wikipedia.org/wiki/Hyper-V:
Hyper-V, codenamed Viridian, ...
With that out of the way, I
On Wed, 2015-05-20 at 13:54 +0100, Ian Jackson wrote:
If the bisector is allowed to consider its own output flights as
candidates for the basis pass, then it will (generally) restart with a
new basis each time it finds a pass.
This is very slow and wasteful.
There is not much explanation
On Wed, 2015-05-13 at 11:36 +0800, longtao.pang wrote:
Apply overlay to guests as well as hosts by moving to preseed_base.
We do this because we want to be able to:
* Use '/etc/init.d/osstest-confirm-booted' for guests as
well as hosts (in particular when testing nestedhvm
On Wed, 2015-05-20 at 12:31 +, Mazen Ezzeddine (Student) wrote:
Thanks Ian.
I have already taken a look at Asking Developer Questions (upon
registration) and have reread after you email . But I can not see
what's the issue? is that my question not not understandable or ...?
You've
On Wed, 2015-05-20 at 13:54 +0100, Ian Jackson wrote:
There are many other possible reasons for this, besides a bug in the
build version machinery.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
On Wed, 2015-05-20 at 13:54 +0100, Ian Jackson wrote:
When we make a fresh build job, rather than referring to an existing
job in another flight, pass to the rest of the machinery only the job
name, not flight.job.
This means that the generated flight refers to its own jobs without
There was a missing [ in the aio check which lead to never check if aio
is present on the platform.
Signed-off-by: Julien Grall julien.gr...@citrix.com
---
tools/configure needs to be regenerate before pushing this patch.
---
tools/configure.ac | 2 +-
1 file changed, 1 insertion(+), 1
Extend xen/block to support multi-page ring, so that more requests can be issued
by using more than one pages as the request ring between blkfront and backend.
As a result, the performance can get improved significantly.
We got some impressive improvements on our highend iscsi storage cluster
The major responsibility of talk_to_blkback() is allocate and initialize the
request ring and writes the ring info stuff out.
But this work should be done after backend entered 'XenbusStateInitWait' as
defined in the protocol file.
See xen/include/public/io/blkif.h in XEN git tree:
Front
On Tue, May 19, 2015 at 1:08 AM, Tina Ruchandani
ruchandani.t...@gmail.com wrote:
struct timeval uses a 32-bit field for representing seconds,
which will overflow in the year 2038 and beyond. This patch replaces
struct timeval with 64-bit ktime_t which is 2038 safe.
The patch is part of a
On 19.05.15 at 18:59, andrew.coop...@citrix.com wrote:
On 18/05/15 13:46, Jan Beulich wrote:
@@ -616,6 +653,24 @@ static void cpu_smpboot_free(unsigned in
free_cpumask_var(per_cpu(cpu_sibling_mask, cpu));
free_cpumask_var(per_cpu(cpu_core_mask, cpu));
+if (
On 19.05.15 at 19:48, andrew.coop...@citrix.com wrote:
On 18/05/15 13:47, Jan Beulich wrote:
@@ -2212,7 +2215,7 @@ static int emulate_privileged_op(struct
io_emul_stub[15] = 0xc3;
/* Handy function-typed pointer to the stub. */
-io_emul = (void *)io_emul_stub;
+io_emul
On 05/20/15 09:10, Andrew Cooper wrote:
This structure is used by XEN_DOMCTL_createdomain, and is liable to be
modified going forwards. Explicitly state that it falls under the
XEN_DOMCTL_INTERFACE_VERSION.
Looks good to me.
Reviewed-by: Don Slutz dsl...@verizon.com
-Don Slutz
On 20/05/15 14:40, Edgar E. Iglesias wrote:
Thanks for the pointers,
I agree that fundamental differences like these beteween v7 and v8 wouldn't
be good.
I didn't find any fundamental differences for device memory behavior in
the spec.
Possible unpredictable behaviour is worrysome...
I'm
On Mon, Apr 20, 2015 at 9:12 AM, Juergen Gross jgr...@suse.com wrote:
On 04/19/2015 05:50 AM, Chunyan Liu wrote:
Add pvusb commands: usb-ctrl-attach, usb-ctrl-detach, usb-list,
usb-attach and usb-detach.
To attach a usb device to guest through pvusb, one could follow
following example:
On Tue, May 19, 2015 at 10:23:05AM +0100, Julien Grall wrote:
On 19/05/2015 10:09, Ian Campbell wrote:
On Tue, 2015-05-19 at 15:16 +1000, Edgar E. Iglesias wrote:
Hi,
Hi,
The rules for combining the memory attributes from S1 and S2 translations
suggest that mapping things at S2 with
flight 56776 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56776/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 15
rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR.
On Wed, 2015-05-13 at 11:36 +0800, longtao.pang wrote:
@@ -59,7 +59,7 @@ d-i partman-auto/expert_recipe string \\
use_filesystem{ } filesystem{ vfat } \\
mountpoint{ /boot/efi } \\
. \\
-5000 50 5000 ext4 \\
+
On 20/05/15 14:37, Jan Beulich wrote:
On 19.05.15 at 18:59, andrew.coop...@citrix.com wrote:
On 18/05/15 13:46, Jan Beulich wrote:
@@ -616,6 +653,24 @@ static void cpu_smpboot_free(unsigned in
free_cpumask_var(per_cpu(cpu_sibling_mask, cpu));
free_cpumask_var(per_cpu(cpu_core_mask,
This makes it more succinct and easier to read.
Before:
(XEN) Sysenter RSP= CS:RIP=:
(XEN) CS: sel=0x0008, attr=0x0c09b, limit=0x, base=0x
(XEN) DS: sel=0x0010, attr=0x0c093, limit=0x, base=0x
(XEN) SS:
1 - 100 of 229 matches
Mail list logo