On 06/03/2015 02:31 AM, Andrew Cooper wrote:
> There appears to be no formal statement of what pv_irq_ops.save_fl() is
> supposed to return precisely. Native returns the full flags, while lguest and
> Xen only return the Interrupt Flag, and both have comments by the
> implementations stating that
flight 57842 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57842/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-winxpsp3 16 guest-stop fail REGR. vs. 53018
test-amd64-i386-x
On Wed, May 27, 2015 at 02:57:35PM -0700, Andrew Morton wrote:
> On Wed, 27 May 2015 21:15:30 +0200 Fabian Frederick wrote:
>
> > This reverts commit 9ef7db7f38d0
> > ("ufs: fix deadlocks introduced by sb mutex merge")
> > That patch tried to solve
> > Commit 0244756edc4b98c
> > ("ufs: sb
On 26/05/2015 22:16, Jan Beulich wrote
> >>> On 13.05.16 at 09:51, wrote:
> > --- a/xen/drivers/acpi/pmstat.c
> > +++ b/xen/drivers/acpi/pmstat.c
> > @@ -261,29 +272,47 @@ static int get_cpufreq_para(struct
> xen_sysctl_pm_op *op)
> > op->u.get_para.cpuinfo_max_freq = policy->cpuinfo.max_fre
On 03/06/2015 19:51, Jan Beulich wrote
> >>> On 03.06.15 at 10:07, wrote:
> > On 26/05/2015 22:02, Jan Beulich wrote
> >> >>> On 13.05.16 at 09:51, wrote:
> >> > --- a/xen/arch/x86/acpi/cpufreq/cpufreq.c
> >> > +++ b/xen/arch/x86/acpi/cpufreq/cpufreq.c
> >> > --- a/xen/arch/x86/acpi/cpufreq/intel
On 06/02/2015 06:11 PM, Andrew Cooper wrote:
On 02/06/15 10:26, Yang Hongyang wrote:
When we are under COLO, we will send dirty page bitmap info from
secondary to primary at every checkpoint. So we need to get/test
the dirty page bitmap. We just expose xc_bitops.h for libxl use.
NOTE:
Need
flight 57831 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57831/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-qemut-winxpsp3 16 guest-stop fail REGR. vs. 53768
Regressions which
On 03/06/2015 23:45, Chris (Christopher) Brand wrote:
Hi Julien,
Hi Chris,
When the property "clock-frequency" is present in the DT timer node, it means
that the bootloader/firmware didn't correctly configured the
CNTFRQ/CNTFRQ_EL0 on each processor.
I will test this patch, but it doesn't
flight 57828 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57828/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 56583
test-amd64-i386-
flight 57826 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57826/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 55882
Regress
flight 57825 qemu-upstream-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57825/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-libvirt 11 guest-start fail like 56377
test-amd64-amd64
flight 57815 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57815/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 11 guest-start fail like 56784
test-amd64-i386-libvirt
On 05/22/2015 04:50 PM, Don Slutz wrote:
> This adds synchronization of the 6 vcpu registers (only 32bits of
> them) that vmport.c needs between Xen and QEMU.
>
> This is to avoid a 2nd and 3rd exchange between QEMU and Xen to
> fetch and put these 6 vcpu registers used by the code in vmport.c
> a
On 02 Jun 2015, at 16:53, Wei Liu wrote:
> On Fri, May 22, 2015 at 10:24:39AM +, Joao Martins wrote:
>>
>> On 19 May 2015, at 17:23, Wei Liu wrote:
>>> On Tue, May 12, 2015 at 07:18:27PM +0200, Joao Martins wrote:
Introduces persistent grants for TX path which follows similar code pat
On 02 Jun 2015, at 17:07, Wei Liu wrote:
> On Fri, May 22, 2015 at 10:25:10AM +, Joao Martins wrote:
>>
>> On 19 May 2015, at 17:32, Wei Liu wrote:
>>
>>> On Tue, May 12, 2015 at 07:18:28PM +0200, Joao Martins wrote:
It starts by doing a lookup in the tree for a gref. If no persisten
On 05/22/2015 04:50 PM, Don Slutz wrote:
> This new libxl_domain_create_info field is used to set
> XEN_DOMCTL_CONFIG_VMWARE_PORT_MASK in the xc_domain_configuration_t
> for x86.
>
> In xen it is is_vmware_port_enabled.
>
> If is_vmware_port_enabled then
> enable a limited support of VMware's h
On Wed, 2015-06-03 at 17:55 +0100, Julien Grall wrote:
> rx->status is an int16_t, print it using %d rather than %u in order to
> have a meaningful value when the field is negative.
[]
> diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c
[]
> @@ -733,7 +733,7 @@ static int xennet_
On 06/03/2015 05:40 PM, Andrew Cooper wrote:
> On 03/06/15 17:23, George Dunlap wrote:
>> On 06/03/2015 04:58 PM, Andrew Cooper wrote:
>>> On 03/06/15 16:26, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
> Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
On 06/03/2015 05:41 PM, Don Slutz wrote:
> On 06/03/15 12:23, George Dunlap wrote:
>> On 06/03/2015 04:58 PM, Andrew Cooper wrote:
>>> On 03/06/15 16:26, George Dunlap wrote:
On 05/22/2015 04:50 PM, Don Slutz wrote:
> Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
The variables old_req_cons and ring_slots_used are assigned but never
used since commit 1650d5455bd2dc6b5ee134bd6fc1a3236c266b5b "xen-netback:
always fully coalesce guest Rx packets".
Signed-off-by: Julien Grall
Acked-by: Wei Liu
Cc: Ian Campbell
Cc: net...@vger.kernel.org
---
Changes in v
Hi,
Those 2 patches was originally part of the Xen 64KB series [1]. They are
already acked/reviewed and can go in Linux via the net tree now
without waiting the rest of the series.
Sincerely yours,
Cc: Wei Liu
Cc: Ian Campbell
Cc: David Vrabel
Cc: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
rx->status is an int16_t, print it using %d rather than %u in order to
have a meaningful value when the field is negative.
Signed-off-by: Julien Grall
Reviewed-by: David Vrabel
Cc: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
Cc: net...@vger.kernel.org
---
Changes in v2:
- Add David'
On 06/03/2015 05:36 PM, Don Slutz wrote:
> On 06/03/15 11:58, Andrew Cooper wrote:
>> On 03/06/15 16:26, George Dunlap wrote:
>>> On 05/22/2015 04:50 PM, Don Slutz wrote:
Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
to port 0x5658 specially. Note: since many operat
On 03/06/15 17:23, George Dunlap wrote:
> On 06/03/2015 04:58 PM, Andrew Cooper wrote:
>> On 03/06/15 16:26, George Dunlap wrote:
>>> On 05/22/2015 04:50 PM, Don Slutz wrote:
Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
to port 0x5658 specially. Note: since many op
On 06/03/15 11:58, Andrew Cooper wrote:
> On 03/06/15 16:26, George Dunlap wrote:
>> On 05/22/2015 04:50 PM, Don Slutz wrote:
>>> Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
>>> to port 0x5658 specially. Note: since many operations return data
>>> in EAX, "in (%dx),%eax" is
On 06/03/2015 04:58 PM, Andrew Cooper wrote:
> On 03/06/15 16:26, George Dunlap wrote:
>> On 05/22/2015 04:50 PM, Don Slutz wrote:
>>> Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
>>> to port 0x5658 specially. Note: since many operations return data
>>> in EAX, "in (%dx),%ea
On 06/03/15 09:53, George Dunlap wrote:
> On 06/03/2015 02:32 PM, Andrew Cooper wrote:
>> On 03/06/15 14:22, George Dunlap wrote:
>>> On Tue, Jun 2, 2015 at 3:05 PM, Wei Liu wrote:
Previous discussion at [0].
For the benefit of discussion, we refer to max_memkb inside hypervisor
>>>
On 03/06/15 16:26, George Dunlap wrote:
> On 05/22/2015 04:50 PM, Don Slutz wrote:
>> Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
>> to port 0x5658 specially. Note: since many operations return data
>> in EAX, "in (%dx),%eax" is the one to use. The other lengths like
>> "i
The next Xen technical call will be at:
Wed 10 Jun 17:00:00 BST 2015
`date -d @1433952000`
See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
for more information on the call.
Please let me know (CC-ing the list) any topics which you would like to
discuss. It might be
On 05/22/2015 04:50 PM, Don Slutz wrote:
> Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
> to port 0x5658 specially. Note: since many operations return data
> in EAX, "in (%dx),%eax" is the one to use. The other lengths like
> "in (%dx),%al" will still do things, only AL par
On 06/03/2015 09:11 AM, Stefano Stabellini wrote:
Also it would be nice if any discussions at the hackathon, or anywhere
else, were written down and sent to the list. Otherwise people like
me, that didn't attend, will just think of them as rumors.
Here is the closest that I could find. This
On 05/22/2015 04:50 PM, Don Slutz wrote:
> This is used to set xen_arch_domainconfig vmware_hw. It is set to
> the emulated VMware virtual hardware version.
>
> Currently 0, 3-4, 6-11 are good values. However the code only
> checks for == 0, != 0, or < 7.
>
> Signed-off-by: Don Slutz
Ian,
It
When the property "clock-frequency" is present in the DT timer node, it
means that the bootloader/firmware didn't correctly configured the
CNTFRQ/CNTFRQ_EL0 on each processor.
The best solution would be to fix the offending firmware/bootloader,
although it may not always be possible to modify and
On 06/03/2015 05:19 PM, Lengyel, Tamas wrote:
>
>
> On Wed, Jun 3, 2015 at 3:48 PM, Razvan Cojocaru
> mailto:rcojoc...@bitdefender.com>> wrote:
>
> On 06/03/2015 04:29 PM, Lengyel, Tamas wrote:
> >
> >
> >
> > diff --git a/xen/include/asm-x86/domain.h
> b/xen/include/asm
On Wed, Jun 3, 2015 at 3:48 PM, Razvan Cojocaru
wrote:
> On 06/03/2015 04:29 PM, Lengyel, Tamas wrote:
> >
> >
> >
> > diff --git a/xen/include/asm-x86/domain.h
> b/xen/include/asm-x86/domain.h
> > index 45b5283..a3c117f 100644
> > --- a/xen/include/asm-x86/domain.h
> > +++ b/xen/
On 06/03/2015 02:32 PM, Andrew Cooper wrote:
> On 03/06/15 14:22, George Dunlap wrote:
>> On Tue, Jun 2, 2015 at 3:05 PM, Wei Liu wrote:
>>> Previous discussion at [0].
>>>
>>> For the benefit of discussion, we refer to max_memkb inside hypervisor
>>> as hv_max_memkb (name subject to improvement).
On 06/03/2015 04:29 PM, Lengyel, Tamas wrote:
>
>
>
> diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h
> index 45b5283..a3c117f 100644
> --- a/xen/include/asm-x86/domain.h
> +++ b/xen/include/asm-x86/domain.h
> @@ -341,15 +341,9 @@ struct arch_domain
>
Reset event channels, replace grant pages with empty ones, unmount
previously mounted vcpu_info.
Signed-off-by: Vitaly Kuznetsov
---
xen/common/domain.c| 37 +
xen/common/schedule.c | 4
xen/include/public/sched.h | 7 +++
xen/include/x
On 06/03/2015 05:03 AM, Ian Campbell wrote:
On Tue, 2015-06-02 at 13:12 -0400, Boris Ostrovsky wrote:
On 06/02/2015 12:51 PM, Stefano Stabellini wrote:
On Tue, 2 Jun 2015, Jan Beulich wrote:
On 02.06.15 at 17:11, wrote:
Hello,
The document describing the PVH interface was committed 9 months
When soft reset is being performed we need to replace all actively
granted pages with empty pages to prevent possible future memory
corruption as the newly started kernel won't be aware of these
granted pages.
We make the tot_pages < max_pages assumption here: previously granted pages
need to belo
Jan and Tim,
last week you expressed some concerns about if the toolstack-based
approach to PVHVM guest kexec is the best. Here you can see the 'reset
everything' approach to the same problem. It is the bare minimum of what
should be done to make it possible for the new kernel to boot. Despite
the
x86-specific hook cleans up the pirq-emuirq mappings and replaces the
shared_info frame with an empty page to support subsequent
XENMAPSPACE_shared_info call.
ARM-specific hook is a noop for now.
Signed-off-by: Vitaly Kuznetsov
---
xen/arch/arm/domain.c| 5
xen/arch/x86/domain.c|
We need to close all event channel so the domain performing soft reset
will be able to open them back. Interdomain channels are, however,
special. We need to keep track of who opened it as in (the most common)
case it was opened by the control domain we won't be able (and allowed) to
re-establish i
On 03/06/15 14:22, George Dunlap wrote:
> On Tue, Jun 2, 2015 at 3:05 PM, Wei Liu wrote:
>> Previous discussion at [0].
>>
>> For the benefit of discussion, we refer to max_memkb inside hypervisor
>> as hv_max_memkb (name subject to improvement). That's the maximum number
>> of memory a domain can
> diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h
> index 45b5283..a3c117f 100644
> --- a/xen/include/asm-x86/domain.h
> +++ b/xen/include/asm-x86/domain.h
> @@ -341,15 +341,9 @@ struct arch_domain
>
> /* Monitor options */
> struct {
> -uint16_t mov_to_cr
On 06/03/2015 02:09 AM, Jan Beulich wrote:
On 02.06.15 at 19:12, wrote:
- working with shadow code (which is what we use when migrating HVM
guests). But the nice side-benefit is that we can then run PVH on
machines without VMX or SVM support.
Without VMX/SVM? What's the H then in PVH? Or d
On Tue, Jun 2, 2015 at 3:05 PM, Wei Liu wrote:
> Previous discussion at [0].
>
> For the benefit of discussion, we refer to max_memkb inside hypervisor
> as hv_max_memkb (name subject to improvement). That's the maximum number
> of memory a domain can use.
Why don't we try to use "memory" for vir
On Wed, 3 Jun 2015, Jan Beulich wrote:
> >>> On 03.06.15 at 12:02, wrote:
> > On Tue, 2 Jun 2015, Andrew Cooper wrote:
> >> With my x86 maintainer hat on, the following is an absolute minimum set
> >> of prerequisite for PVH.
> >>
> >> * 32bit support
> >
> > Could you please explain why 32bit i
flight 57799 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57799/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect
test-amd64-amd64-pair
>>> On 03.06.15 at 13:44, wrote:
> --- a/xen/arch/x86/hvm/vmx/vpmu_core2.c
> +++ b/xen/arch/x86/hvm/vmx/vpmu_core2.c
> @@ -849,6 +849,7 @@ int vmx_vpmu_initialise(struct vcpu *v, unsigned int
> vpmu_flags)
> case 0x25: /* 32 nm nehalem, "Clarkdale", "Arrandale" */
> case 0x2c: /
>>> On 03.06.15 at 11:31, wrote:
> Hi,
> I am getting a vm stuck problem when booting a windows 7 guest on
> xen-4.6(latest version).
> My hvm guest: Windows 7 64bit (installed pvdriver inside, pvdriver is
> downloaded from
> 'http://wiki.univention.de/index.php?title=Installing-signed-GPLPV-dr
>>> On 03.06.15 at 12:02, wrote:
> On Tue, 2 Jun 2015, Andrew Cooper wrote:
>> With my x86 maintainer hat on, the following is an absolute minimum set
>> of prerequisite for PVH.
>>
>> * 32bit support
>
> Could you please explain why 32bit is important to get PVH out of tech
> preview? I don't s
On Wed, 3 Jun 2015, Sanjeev Pandita wrote:
> Hi Stefano,
>
> On Wed, Jun 3, 2015 at 3:45 PM, Stefano Stabellini
> wrote:
> On Wed, 3 Jun 2015, Sanjeev Pandita wrote:
> > On Tue, Jun 2, 2015 at 7:55 PM, Stefano Stabellini
> wrote:
> > On Tue, 2 Jun 2015, Sanjeev Pandita w
>>> On 03.06.15 at 10:07, wrote:
> On 26/05/2015 22:02, Jan Beulich wrote
>> >>> On 13.05.16 at 09:51, wrote:
>> > --- a/xen/arch/x86/acpi/cpufreq/cpufreq.c
>> > +++ b/xen/arch/x86/acpi/cpufreq/cpufreq.c
>> > --- a/xen/arch/x86/acpi/cpufreq/intel_pstate.c
>> > +++ b/xen/arch/x86/acpi/cpufreq/inte
All,
regardless of the still not understood seemingly qemu-upstream
related Windows migration issues (we're not intending to release
in this state), please test!
Thanks, Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-d
On Wed, 2015-06-03 at 14:35 +0300, Razvan Cojocaru wrote:
> As suggested by Andrew Cooper, this patch attempts to remove
> some redundancy and allow for an easier time when adding vm_events
> for new control registers in the future, by having a single
> VM_EVENT_REASON_WRITE_CTRLREG vm_event type,
Hi,
it seems somewhere the Intel processor
cpu family : 6
model : 47
model name : Intel(R) Xeon(R) CPU E7- 8837 @ 2.67GHz
got lost.
Dietmar.
Signed-off-by: Dietmar Hahn
diff --git a/xen/arch/x86/hvm/vmx/vpmu_core2.c
b/xen/arch/x86/hvm/vmx/vpmu_core2.c
index 8ad522a..bbe6
No functional change.
Signed-off-by: Andrew Cooper
CC: Keir Fraser
CC: Jan Beulich
CC: Tim Deegan
CC: Ian Campbell
CC: Stefano Stabellini
---
Compile tested on all architecutres, functionally tested on x86.
---
xen/arch/arm/mm.c |8 +---
xen/arch/x86/domain_page.c
Following c/s e758ed14 which describes the current terms used in Xens memory
management, introduce some infrastructure so that new code can be written
correctly.
This is the start of a long potential cleanup.
Andrew Cooper (2):
xen/mem: Expose typesafe mfns/gfns/pfns to common code
xen/vmap:
As the first step of memory management cleanup, introduce the common code to
mfn_t, gfn_t and pfn_t.
The typesafe construction moves to its own header file, while the declarations
and sentinal values are moved to being common.
No functional change.
Signed-off-by: Andrew Cooper
CC: Keir Fraser
As suggested by Andrew Cooper, this patch attempts to remove
some redundancy and allow for an easier time when adding vm_events
for new control registers in the future, by having a single
VM_EVENT_REASON_WRITE_CTRLREG vm_event type, meant to serve CR0,
CR3, CR4 and (newly introduced) XCR0. The actu
On Wed, 2015-06-03 at 12:21 +0100, George Dunlap wrote:
> On 06/03/2015 12:16 PM, George Dunlap wrote:
> > On 06/03/2015 11:59 AM, Ian Campbell wrote:
> >> On Wed, 2015-06-03 at 11:33 +0100, George Dunlap wrote:
> >>> On 06/03/2015 11:10 AM, Ian Campbell wrote:
> On Sat, 2015-05-23 at 08:24 +0
On 06/03/2015 12:16 PM, George Dunlap wrote:
> On 06/03/2015 11:59 AM, Ian Campbell wrote:
>> On Wed, 2015-06-03 at 11:33 +0100, George Dunlap wrote:
>>> On 06/03/2015 11:10 AM, Ian Campbell wrote:
On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
> Having xenalyze in the source tree m
On 06/03/2015 11:59 AM, Ian Campbell wrote:
> On Wed, 2015-06-03 at 11:33 +0100, George Dunlap wrote:
>> On 06/03/2015 11:10 AM, Ian Campbell wrote:
>>> On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
Having xenalyze in the source tree makes it much easier to keep private
debug code
Hi Stefano,
On Wed, Jun 3, 2015 at 3:45 PM, Stefano Stabellini <
stefano.stabell...@eu.citrix.com> wrote:
> On Wed, 3 Jun 2015, Sanjeev Pandita wrote:
> > On Tue, Jun 2, 2015 at 7:55 PM, Stefano Stabellini <
> stefano.stabell...@eu.citrix.com> wrote:
> > On Tue, 2 Jun 2015, Sanjeev Pandita
On Wed, Jun 03, 2015 at 11:35:50AM +0100, Ian Campbell wrote:
> On Tue, 2015-06-02 at 17:58 +0100, Wei Liu wrote:
> > On Tue, Jun 02, 2015 at 03:33:26PM +0200, Daniel Kiper wrote:
> > > binutils 2.22 changed ld default from --copy-dt-needed-entries
> > > to -no-copy-dt-needed-entries. This revealed
On Wed, Jun 03, 2015 at 11:57:33AM +0100, Ian Campbell wrote:
> On Wed, 2015-06-03 at 11:39 +0100, Wei Liu wrote:
> > On Wed, Jun 03, 2015 at 11:34:49AM +0100, Ian Campbell wrote:
> > > On Mon, 2015-06-01 at 16:18 -0400, Boris Ostrovsky wrote:
> > > > On 06/01/2015 06:19 AM, Wei Liu wrote:
> > > >
These files are leaked when using qemu-trad stubdom. They are
intermediate files created by libxc. Unfortunately they don't fit well
in our userdata scheme. Clean them up after we destroy all userdata,
we're sure they are not useful anymore at that point.
Signed-off-by: Wei Liu
---
v2: delete th
On Wed, 2015-06-03 at 11:33 +0100, George Dunlap wrote:
> On 06/03/2015 11:10 AM, Ian Campbell wrote:
> > On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
> >> Having xenalyze in the source tree makes it much easier to keep private
> >> debug code in hypervisor and xenalyze in sync. It helped
On Wed, 2015-06-03 at 11:39 +0100, Wei Liu wrote:
> On Wed, Jun 03, 2015 at 11:34:49AM +0100, Ian Campbell wrote:
> > On Mon, 2015-06-01 at 16:18 -0400, Boris Ostrovsky wrote:
> > > On 06/01/2015 06:19 AM, Wei Liu wrote:
> > > > Make the setup process similar to PV counterpart. That is, to allocate
On 03/06/15 09:01, Yang Hongyang wrote:
> This patchset mainly focus on libxl save, most of the patches are
> simply move codes out of libxl_dom.c, except a refactor patch.
>
> Please see individual patch for detail.
>
> Can get the whole patchset from:
> https://github.com/macrosheep/xen/tree/
On 06/03/2015 11:35 AM, Julien Grall wrote:
> On 03/06/2015 11:10, Ian Campbell wrote:
>> On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
>>> Having xenalyze in the source tree makes it much easier to keep private
>>> debug code in hypervisor and xenalyze in sync. It helped alot while
>>> deb
On 06/03/2015 11:41 AM, Andrew Cooper wrote:
> On 03/06/15 11:38, George Dunlap wrote:
>> On 06/03/2015 11:38 AM, Andrew Cooper wrote:
>>> On 03/06/15 11:35, Julien Grall wrote:
On 03/06/2015 11:10, Ian Campbell wrote:
> On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
>> Having x
On 03/06/15 11:38, George Dunlap wrote:
> On 06/03/2015 11:38 AM, Andrew Cooper wrote:
>> On 03/06/15 11:35, Julien Grall wrote:
>>> On 03/06/2015 11:10, Ian Campbell wrote:
On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
> Having xenalyze in the source tree makes it much easier to k
On 06/03/2015 11:38 AM, Andrew Cooper wrote:
> On 03/06/15 11:35, Julien Grall wrote:
>> On 03/06/2015 11:10, Ian Campbell wrote:
>>> On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
Having xenalyze in the source tree makes it much easier to keep private
debug code in hypervisor and
On 03/06/15 11:35, Julien Grall wrote:
> On 03/06/2015 11:10, Ian Campbell wrote:
>> On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
>>> Having xenalyze in the source tree makes it much easier to keep private
>>> debug code in hypervisor and xenalyze in sync. It helped alot while
>>> debuggin
On Wed, Jun 03, 2015 at 11:34:49AM +0100, Ian Campbell wrote:
> On Mon, 2015-06-01 at 16:18 -0400, Boris Ostrovsky wrote:
> > On 06/01/2015 06:19 AM, Wei Liu wrote:
> > > Make the setup process similar to PV counterpart. That is, to allocate a
> > > P2M array that covers the whole memory range and
On 03/06/2015 11:34, Ian Campbell wrote:
On Thu, 2015-05-28 at 10:10 +0100, Julien Grall wrote:
This is useful for debugging low level kernel before the guest as setup
the vector table.
Note that the value of the IPA is only here for reference and may not
always be valid if the error came fro
On Mon, 2015-06-01 at 12:25 +0100, Zoltan Kiss wrote:
> Reviewed-by: Zoltan Kiss
> Tested-by: Shameerali Kolothum Thodi
Acked + applied, thanks.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 03/06/2015 11:10, Ian Campbell wrote:
On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
Having xenalyze in the source tree makes it much easier to keep private
debug code in hypervisor and xenalyze in sync. It helped alot while
debugging the root cause for commit 607e8494c42397fb249191904
On Mon, 2015-06-01 at 18:24 +0100, Wei Liu wrote:
> The snippet to destroy stubdom and the callback were added in 1fc3aeb3
> ("libxl: use new QEMU xenstore protocol"). The intention was to destroy
> stubdom when it is not responsive. That approach is problematic because
> rc is not propagate back t
On Tue, 2015-06-02 at 17:58 +0100, Wei Liu wrote:
> On Tue, Jun 02, 2015 at 03:33:26PM +0200, Daniel Kiper wrote:
> > binutils 2.22 changed ld default from --copy-dt-needed-entries
> > to -no-copy-dt-needed-entries. This revealed that some objects
> > are linked implicitly with libtinfo and newer l
On Mon, 2015-06-01 at 16:18 -0400, Boris Ostrovsky wrote:
> On 06/01/2015 06:19 AM, Wei Liu wrote:
> > Make the setup process similar to PV counterpart. That is, to allocate a
> > P2M array that covers the whole memory range and start from there. This
> > is clearer than using an array with no hole
On 06/03/2015 11:10 AM, Ian Campbell wrote:
> On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
>> Having xenalyze in the source tree makes it much easier to keep private
>> debug code in hypervisor and xenalyze in sync. It helped alot while
>> debugging the root cause for commit 607e8494c42397
On Thu, 2015-05-28 at 10:10 +0100, Julien Grall wrote:
> This is useful for debugging low level kernel before the guest as setup
> the vector table.
>
> Note that the value of the IPA is only here for reference and may not
> always be valid if the error came from a stage 1 table translation walk.
On Wed, 2015-05-27 at 09:13 +0100, Ian Campbell wrote:
> On Tue, 2015-05-26 at 14:13 -0400, Daniel De Graaf wrote:
> > Migration and HVM domain creation both trigger AVC denials that should
> > be allowed in the default policy; add these rules.
> >
> > Guest console writes need to be either allowe
On Tue, 2015-06-02 at 18:16 +0100, George Dunlap wrote:
> On 05/23/2015 09:24 AM, Olaf Hering wrote:
> > Having xenalyze in the source tree makes it much easier to keep private
> > debug code in hypervisor and xenalyze in sync. It helped alot while
> > debugging the root cause for commit
> > 607e8
Hi,
I am getting a vm stuck problem when booting a windows 7 guest on
xen-4.6(latest version).
My hvm guest: Windows 7 64bit (installed pvdriver inside, pvdriver is
downloaded from
'http://wiki.univention.de/index.php?title=Installing-signed-GPLPV-drivers')
My server's CPU model name : Intel(R)
On Wed, Jun 03, 2015 at 10:58:51AM +0100, Ian Campbell wrote:
> On Mon, 2015-06-01 at 18:24 +0100, Wei Liu wrote:
> > These files are leaked when using qemu-trad stubdom. They are
> > intermediate files created by libxc. Unfortunately they don't fit well
> > in our userdata scheme. Clean them up a
/etc/inittab of the guest contains:
1:2345:respawn:/sbin/getty 38400 hvc0
xc:2345:respawn:/sbin/getty 38400 hvc0
Which makes it impossible to login if you are using osstest to setup
your hosts.
I think target_kernkind_console_inittab is responsible, and it is a
fixup from Lenny/Squeeze which isn
On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
> Having xenalyze in the source tree makes it much easier to keep private
> debug code in hypervisor and xenalyze in sync. It helped alot while
> debugging the root cause for commit 607e8494c42397fb249191904066cace6ac9a880.
I'm afraid it doesn'
On Wed, 3 Jun 2015, Sanjeev Pandita wrote:
> On Tue, Jun 2, 2015 at 7:55 PM, Stefano Stabellini
> wrote:
> On Tue, 2 Jun 2015, Sanjeev Pandita wrote:
> > From: Stefan Bader [mailto:stefan.ba...@canonical.com]
> > Sent: Tuesday, June 02, 2015 1:52 PM
> > To: Sanjeev Pandita
On Wed, Jun 03, 2015 at 10:58:51AM +0100, Ian Campbell wrote:
> On Mon, 2015-06-01 at 18:24 +0100, Wei Liu wrote:
> > These files are leaked when using qemu-trad stubdom. They are
> > intermediate files created by libxc. Unfortunately they don't fit well
> > in our userdata scheme. Clean them up a
On Wed, 2015-06-03 at 11:10 +0100, Ian Campbell wrote:
> On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote:
> > Having xenalyze in the source tree makes it much easier to keep private
> > debug code in hypervisor and xenalyze in sync. It helped alot while
> > debugging the root cause for commit
flight 57845 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57845/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
On 06/03/2015 05:24 PM, Ian Campbell wrote:
On Wed, 2015-06-03 at 00:10 +0800, Yang Hongyang wrote:
On 06/02/2015 10:40 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
@@ -1762,16 +1762,18 @@ static void libxl__domain_suspend_callback(void *data)
{
l
On Tue, 2 Jun 2015, Andrew Cooper wrote:
> With my x86 maintainer hat on, the following is an absolute minimum set
> of prerequisite for PVH.
>
> * 32bit support
Could you please explain why 32bit is important to get PVH out of tech
preview? I don't see 32 bit OSes as an important use case. Maybe
On Monday, 4 May 2015 10:11 AM, Minalkumar Patel wrote:
Dear all, Xenmaintains an address mapping table. How it works? How to map
independent pfn tomachine dependent frame number (mfn) for each guest VM on
real platform?
if physical page is copied from one to second system a
On Mon, 2015-06-01 at 18:24 +0100, Wei Liu wrote:
> These files are leaked when using qemu-trad stubdom. They are
> intermediate files created by libxc. Unfortunately they don't fit well
> in our userdata scheme. Clean them up after we destroy guest, we're
> sure they are not useful anymore at tha
On 06/03/2015 05:24 PM, Ian Campbell wrote:
On Wed, 2015-06-03 at 00:10 +0800, Yang Hongyang wrote:
On 06/02/2015 10:40 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
@@ -1762,16 +1762,18 @@ static void libxl__domain_suspend_callback(void *data)
{
l
1 - 100 of 127 matches
Mail list logo