On 04/27/16 23:33, Tamas K Lengyel wrote:
> Since in-guest debug exceptions are now unconditionally trapped to Xen, adding
> a hook for vm_event subscribers to tap into this new always-on guest event. We
> rename along the way hvm_event_breakpoint_type to hvm_event_type to better
> match the
Hi all,
We are pleased to announce another update of Intel GVT-g for Xen.
Intel GVT-g is a full GPU virtualization solution with mediated pass-through,
starting from 4th generation Intel Core(TM) processors with Intel Graphics
processors. A virtual GPU instance is maintained for each VM, with
flight 92991 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92991/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
Regards,
Ray
>-Original Message-
>From: Laszlo Ersek [mailto:ler...@redhat.com]
>Sent: Wednesday, April 27, 2016 6:44 PM
>To: Ni, Ruiyu ; Gary Lin
>Cc: edk2-de...@lists.01.org ; Xen Devel
>; Kinney,
This run is configured for baseline tests only.
flight 44368 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44368/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 11 guest-start
flight 92997 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92997/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 3 host-install(3) broken REGR. vs.
On 4/27/2016 10:42 PM, Paul Durrant wrote:
-Original Message-
From: George Dunlap
Sent: 27 April 2016 15:13
To: Paul Durrant
Cc: Yu, Zhang; Jan Beulich; Kevin Tian; Wei Liu; Andrew Cooper; Tim
(Xen.org); xen-devel@lists.xen.org; Zhiyuan Lv; Jun Nakajima; Keir (Xen.org)
Subject: Re:
On 04/27/2016 04:22 PM, Andrew Cooper wrote:
> On 27/04/2016 22:58, Jim Fehlig wrote:
>> On 04/25/2016 05:26 AM, osstest service owner wrote:
>>> flight 92667 libvirt real [real]
>>> http://logs.test-lab.xenproject.org/osstest/logs/92667/
>>>
>>> Regressions :-(
>>>
>>> Tests which did not succeed
Hi Julien,
On Wed, Apr 27, 2016 at 10:58:28AM +0100, Julien Grall wrote:
>Hello Peng,
>
>On 27/04/2016 03:02, Peng Fan wrote:
>>On Tue, Apr 26, 2016 at 04:30:03PM +0200, Edgar E. Iglesias wrote:
>>>On Tue, Apr 26, 2016 at 09:56:33PM +0800, Peng Fan wrote:
You mean the PNU bit(Privileged Not
There is a #VE exception defined in p2086 of Intel Software Development
Manual, however, no definition of exception handler is availble in Xen 4.6.
Hi Julien,
On 27 April 2016 at 17:40, Julien Grall wrote:
>
>
> On 27/04/2016 07:05, Wei Chen wrote:
>>
>> Hi Julien,
>
>
> Hi Wei,
>
>> On 26 April 2016 at 18:49, Julien Grall wrote:
>>>
>>> On 25/04/2016 10:39, Wei Chen wrote:
+
On April 27, 2016 11:03 PM, Jan Beulich wrote:
> >>> On 27.04.16 at 16:26, wrote:
> > On April 25, 2016 5:27 PM, Jan Beulich wrote:
> >> >>> On 18.04.16 at 16:00, wrote:
> I.e. I continue to think that
>
> if (
On April 27, 2016 11:48 PM, George Dunlap wrote:
> On 18/04/16 15:00, Quan Xu wrote:
> > If IOMMU mapping and unmapping failed, the domain (with the exception
> > of the hardware domain) is crashed, treated as a fatal error. Rollback
> > can be lighter weight.
> >
> >
flight 93020 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93020/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Tue, Apr 26, 2016 at 3:31 AM, Julien Grall wrote:
> (CC the author of the Odroid support in Xen)
>
> On 25/04/2016 11:01, Ivan Pavić2 wrote:
>
>> Hello,
>>
>
> Hello,
>
> I have CCed Suriyan who added the support of Odroid in Xen. He might be
> able to help you here.
>
On 27/04/2016 22:58, Jim Fehlig wrote:
> On 04/25/2016 05:26 AM, osstest service owner wrote:
>> flight 92667 libvirt real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/92667/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> including tests which could not
flight 93010 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93010/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 9 debian-installfail REGR. vs. 92992
Tests which
On 04/25/2016 05:26 AM, osstest service owner wrote:
> flight 92667 libvirt real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/92667/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-libvirt 14
Since in-guest debug exceptions are now unconditionally trapped to Xen, adding
a hook for vm_event subscribers to tap into this new always-on guest event. We
rename along the way hvm_event_breakpoint_type to hvm_event_type to better
match the various events that can be passed with it. We also
On Wed, Apr 27, 2016 at 8:27 AM, Dario Faggioli
wrote:
> On Tue, 2016-04-26 at 21:16 -0400, Meng Xu wrote:
>> > It's indeed not a must for real-time schedulers. In fact, it's only
>> > important if one wants the system to be overall usable, when using
>> > a
>> >
Hello.
I have problem with multiple ioreq_servers
server 1 (emulates VGA) and server 2 (qemu).
Emulation VGA server maps VGA PIO registers (3c0-3cf, 3b4-3b5 ...)
Qemu maps "all" PIO space (0-)
(ref:
This change demonstrates how to generate an xSplice ELF payload.
The idea here is that we want to patch in the hypervisor
the 'xen_version_extra' function with an function that will
return 'Hello World'. The 'xl info | grep extraversion'
will reflect the new value after the patching.
To generate
Hey!
Changelog:
Since v9: [http://lists.xen.org/archives/html/xen-devel/2016-04/msg03052.html]
- Worked on Ross's and Jan's comments.
v8.1: http://lists.xen.org/archives/html/xen-devel/2016-04/msg01903.html
- Worked on Jan's comments.
v8: since
From: Ross Lagerwall
If in the payload we do not have the old_addr we can resolve
the virtual address based on the UNDEFined symbols.
We also use an boolean flag: new_symbol to track symbols. The usual
case this is used is by:
* A payload may introduce a new symbol
*
The current mechanism is geared towards fast virtual address ->
symbol names lookup. This is fine for the normal use cases
(BUG_ON, WARN_ON, etc), but for xSplice - where we need to find
hypervisor symbols - it is slow.
To understand this patch, a description of the existing
method is explained
A simple tool that allows an system admin to perform
basic xsplice operations:
- Upload a xsplice file (with an unique name)
- List all the xsplice payloads loaded.
- Apply, revert, replace, or unload the payload using the
unique name.
- Do all two - upload, and apply the payload in one go
The implementation does not actually do any patching.
It just adds the framework for doing the hypercalls,
keeping track of ELF payloads, and the basic operations:
- query which payloads exist,
- query for specific payloads,
- check*1, apply*1, replace*1, and unload payloads.
*1: Which of
From: Ross Lagerwall
Add support for loading xsplice payloads. This is somewhat similar to
the Linux kernel module loader, implementing the following steps:
- Verify the elf file.
- Parse the elf file.
- Allocate a region of memory mapped within a free area of
This patch enables the Elf to be built with the build-id
and provide in the Xen hypervisor the code to extract it.
The man-page for ld --build-id says it is:
"Request the creation of a ".note.gnu.build-id" ELF note
section or a ".build-id" COFF section. The contents of the
note are unique bits
From: Ross Lagerwall
Add support for exception tables contained within xSplice payloads. If an
exception occurs search either the main exception table or a particular
active payload's exception table depending on the instruction pointer.
Also we add an test-case to
With this third payload one can do:
-bash-4.1# xen-xsplice load xen_hello_world.xsplice
Uploading xen_hello_world.xsplice (10148 bytes)
Performing check: completed
Performing apply:. completed
[xen_hello_world depends on hypervisor build-id]
-bash-4.1# xen-xsplice load xen_bye_world.xsplice
For those users who want to use the virtual addresses that
are in the hypervisor's code/data region address space -
these three new functions allow that.
Implementation wise the vmap API keeps track of two virtual
address regions now:
a) VMAP_VIRT_START
b) Any provided virtual address space
From: Ross Lagerwall
Add Elf routines and data structures in preparation for loading an
xSplice payload.
We make an assumption that the max number of sections an ELF payload
can have is 64. We can in future make this be dependent on the
names of the sections and
From: Ross Lagerwall
Add support for handling bug frames contained with xsplice modules. If a
trap occurs search either the kernel bug table or an applied payload's
bug table depending on the instruction pointer.
Signed-off-by: Ross Lagerwall
From: Ross Lagerwall
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
Cc: Ian Jackson
From: Ross Lagerwall
Add support for applying alternative sections within xsplice payload.
At payload load time, apply an alternative sections that are found.
Also we add an test-case exercising a rather useless alternative
(patching a NOP with a NOP) - but it does
If the hypervisor is built with we will display it.
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
v2: Include HAVE_*, use libxl_zalloc, s/rc/ret/
v3: Retry
As it should be an useful debug mechanism.
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
Reviewed-by: Andrew Cooper
--
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir
A mechanism is required to binarily patch the running hypervisor with new
opcodes that have come about due to primarily security updates.
This document describes the design of the API that would allow us to
upload to the hypervisor binary patches.
This document has been shaped by the input from:
From: Ross Lagerwall
Naturally the backtrace is presented when an instruction
hits an bug_frame or %p is used.
The payloads do not support bug_frames yet - however the functions
the payloads call could hit an BUG() or WARN().
The traps.c has logic to scan for it this
During execution of the hypervisor we have two regions of
executable code - stext -> _etext, and _sinittext -> _einitext.
The later is not needed after bootup.
We also have various built-in macros and functions to search
in between those two swaths depending on the state of the system.
That is
The underlaying toolstack code to do the basic
operations when using the XEN_XSPLICE_op syscalls:
- upload the payload,
- get status of an payload,
- list all the payloads,
- apply, check, replace, and revert the payload.
Signed-off-by: Konrad Rzeszutek Wilk
We now expect that the ELF payloads be built with the
--build-id.
Also the .xsplice.deps section has to have the contents
of the hypervisor (or a preceding payload) build-id.
We already have the code to verify the Elf_Note build-id
so export parts of it.
This dependency means the hypervisor
From: Ross Lagerwall
Implement support for the apply, revert and replace actions.
To perform and action on a payload, the hypercall sets up a data
structure to schedule the work. A hook is added in the reset_stack_and_jump
to check for work and execute it if needed
If the hypervisor was built with build-ids we can expose the
build-id value to the toolstack (if it is not built with
it will just return -ENODATA). This is a priviligied operation
so only the controlling stack is able to request this.
Signed-off-by: Konrad Rzeszutek Wilk
If you have a patch for xSplice send it our way!
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
---
Cc: Ian Jackson
Cc: Jan Beulich
flight 92992 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92992/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 4/27/16 12:01 PM, Andrew Cooper wrote:
> Clang points out that this is tautological.
>
> src/xenstat.c:325:8: warning: comparison of 0 <= unsigned expression is
> always true [-Wtautological-compare]
> if (0 <= index && index < node->num_domains)
> ~ ^ ~
>
>
On 4/27/16 12:01 PM, Andrew Cooper wrote:
> Like c/s 4d98d3ebf - there is a second instance.
>
> Signed-off-by: Andrew Cooper
> ---
Reviewed-by: Doug Goldstein
--
Doug Goldstein
signature.asc
Description: OpenPGP digital signature
On 4/27/16 12:01 PM, Andrew Cooper wrote:
> Clang points out:
>
> tapdisk-disktype.c:117:2: error: initializer overrides prior initialization
> of this subobject [-Werror,-Winitializer-overrides]
> 0,
> ^
> tapdisk-disktype.c:115:23: note: previous initialization is here
On 4/27/16 12:01 PM, Andrew Cooper wrote:
> Clang points out:
>
> tap-ctl-list.c:457:28: error: variable 'entry' is uninitialized when
> used here [-Werror,-Wuninitialized]
> for (; *_entry != NULL; ++entry) {
> ^
>
> The content of that loop
On 4/27/16 12:01 PM, Andrew Cooper wrote:
> Clang warns:
>
> kdd.c:1031:9: error: variable 'fd' is used uninitialized whenever '||'
> condition is true [-Werror,-Wsometimes-uninitialized]
> if (argc != 4
> ^
> kdd.c:1040:20: note: uninitialized use occurs here
>
On 4/27/16 12:01 PM, Andrew Cooper wrote:
> tools now build under clang, so let them be tested.
>
> Signed-off-by: Andrew Cooper
> ---
Acked-by: Doug Goldstein
--
Doug Goldstein
signature.asc
Description: OpenPGP digital signature
On 4/27/16 12:01 PM, Andrew Cooper wrote:
> The package appears to have been renamed in Ubuntu. The only reason this test
> is currently passing is because the hypervisor build falls back to clang, at
> version 3.5
>
> Add an explicit test in the build script that out desired compiler is
>
> > v10:
> > - Change the check against 64 to be against SHN_LORESERVE
>
> So we're moving between the extremes, and (as said in reply to v9)
> I think we really want to be somewhere in the middle.
>
> Andrew? Ross?
I stuck 1024 in there with a comment saying it is arbitrary.
Andrew was ok
On Wed, Apr 27, 2016 at 10:14:20AM -0600, Jan Beulich wrote:
> >>> On 27.04.16 at 17:48, wrote:
> > +int xsplice_elf_resolve_symbols(struct xsplice_elf *elf)
> > +{
> > +unsigned int i;
> > +int rc = 0;
> > +
> > +ASSERT(elf->sym);
> > +
> > +for ( i = 1; i <
flight 92925 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92925/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 15 guest-start/debian.repeat fail REGR. vs. 92791
build-i386-rumpuserxen
On Wed, 27 Apr 2016, Fabio Fantoni wrote:
Il 27/04/2016 13:26, George Dunlap ha scritto:
On 27/04/16 12:02, Fabio Fantoni wrote:
Hi, I took a look at the new pvusb hotplug code in libxl to try to add
also hotplug (with qmp) usbredir tcp channels.
Adding usbredir tcp channels at domU start
On Wed, Apr 27, 2016 at 06:01:19PM +0100, Andrew Cooper wrote:
> With these fixes, tools/ can be built with clang, so enable it in the travis
> configurion.
>
> The travis results can be viewed here:
> https://travis-ci.org/andyhhp/xen/builds/126153860
>
> Andrew Cooper (7):
> tools/xenstat:
On Wed, Apr 27, 2016 at 06:01:25PM +0100, Andrew Cooper wrote:
> The package appears to have been renamed in Ubuntu. The only reason this test
> is currently passing is because the hypervisor build falls back to clang, at
> version 3.5
>
> Add an explicit test in the build script that out
On Wed, Apr 27, 2016 at 06:01:26PM +0100, Andrew Cooper wrote:
> tools now build under clang, so let them be tested.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
> ---
> CC: Ian Jackson
> CC: Wei Liu
On Wed, Apr 27, 2016 at 06:01:24PM +0100, Andrew Cooper wrote:
> Clang warns:
>
> kdd.c:1031:9: error: variable 'fd' is used uninitialized whenever '||'
> condition is true [-Werror,-Wsometimes-uninitialized]
> if (argc != 4
> ^
> kdd.c:1040:20: note: uninitialized
On Wed, Apr 27, 2016 at 06:01:21PM +0100, Andrew Cooper wrote:
> Like c/s 4d98d3ebf - there is a second instance.
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
Xen-devel mailing list
On Wed, Apr 27, 2016 at 06:01:20PM +0100, Andrew Cooper wrote:
> Clang points out that this is tautological.
>
> src/xenstat.c:325:8: warning: comparison of 0 <= unsigned expression is
> always true [-Wtautological-compare]
> if (0 <= index && index < node->num_domains)
>
On Wed, Apr 27, 2016 at 06:01:23PM +0100, Andrew Cooper wrote:
> Clang points out:
>
> tap-ctl-list.c:457:28: error: variable 'entry' is uninitialized when
> used here [-Werror,-Wuninitialized]
> for (; *_entry != NULL; ++entry) {
> ^
>
> The
On Wed, Apr 27, 2016 at 06:01:22PM +0100, Andrew Cooper wrote:
> Clang points out:
>
> tapdisk-disktype.c:117:2: error: initializer overrides prior initialization
> of this subobject [-Werror,-Winitializer-overrides]
> 0,
> ^
> tapdisk-disktype.c:115:23: note: previous
flight 92953 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92953/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REGR. vs.
yeah, I do familiar with nested virtualization. but using xen in xen has less
performance vs using xen in vmware, so i decided using vmware.
but let me ask you, what do you do typically as a developer, in case of a
development causes system failure or in my case kernel panic for example? DO
On 26/04/16 14:44, Wei Liu wrote:
> Hi all
>
> I spent some time this morning to work out the details of xen.git build
> system.
>
> * How build system works at the moment?
> 1. Stubdom.mk.in and Tools.mk.in define FETCHER variable.
> 2. m4/fetcher.m4 checks for wget or ftp, which becomes
Clang points out:
tap-ctl-list.c:457:28: error: variable 'entry' is uninitialized when
used here [-Werror,-Wuninitialized]
for (; *_entry != NULL; ++entry) {
^
The content of that loop clearly was meant to iterate over _entry rather than
Like c/s 4d98d3ebf - there is a second instance.
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
---
tools/blktap2/drivers/block-vhd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git
tools now build under clang, so let them be tested.
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
CC: Doug Goldstein
---
scripts/travis-build | 6 --
1 file changed, 6
The package appears to have been renamed in Ubuntu. The only reason this test
is currently passing is because the hypervisor build falls back to clang, at
version 3.5
Add an explicit test in the build script that out desired compiler is
available. Note that travis already performs this step,
With these fixes, tools/ can be built with clang, so enable it in the travis
configurion.
The travis results can be viewed here:
https://travis-ci.org/andyhhp/xen/builds/126153860
Andrew Cooper (7):
tools/xenstat: Avoid comparing '0 <= unsigned integer'
tools/blktap2: Use abort() instead
Clang points out:
tapdisk-disktype.c:117:2: error: initializer overrides prior initialization
of this subobject [-Werror,-Winitializer-overrides]
0,
^
tapdisk-disktype.c:115:23: note: previous initialization is here
[DISK_TYPE_VINDEX] = _index_disk,
Clang points out that this is tautological.
src/xenstat.c:325:8: warning: comparison of 0 <= unsigned expression is
always true [-Wtautological-compare]
if (0 <= index && index < node->num_domains)
~ ^ ~
Signed-off-by: Andrew Cooper
Clang warns:
kdd.c:1031:9: error: variable 'fd' is used uninitialized whenever '||'
condition is true [-Werror,-Wsometimes-uninitialized]
if (argc != 4
^
kdd.c:1040:20: note: uninitialized use occurs here
if (select(fd + 1, , NULL, NULL, NULL) > 0)
On Wed, Apr 27, 2016 at 06:53:35PM +0200, Dario Faggioli wrote:
> On Wed, 2016-04-27 at 15:31 +0100, Wei Liu wrote:
> > On Wed, Apr 20, 2016 at 11:04:06PM +0200, Olaf Hering wrote:
> > >
> > > On Wed, Apr 20, Paulina Szubarczyk wrote:
> > >
> > > >
> > > > In accordance with CODING_SYTLE:
> > >
On Wed, 2016-04-27 at 15:31 +0100, Wei Liu wrote:
> On Wed, Apr 20, 2016 at 11:04:06PM +0200, Olaf Hering wrote:
> >
> > On Wed, Apr 20, Paulina Szubarczyk wrote:
> >
> > >
> > > In accordance with CODING_SYTLE:
> > > - Use 'r' for return values to functions whose return values are
> > > a
> >
flight 92966 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92966/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Wed, Apr 27, 2016 at 03:27:27AM -0600, Jan Beulich wrote:
> >>> On 25.04.16 at 17:35, wrote:
> > @@ -25,7 +28,7 @@ clean::
> > .PHONY: config.h
> > config.h: OLD_CODE_SZ=$(call CODE_SZ,$(BASEDIR)/xen-syms,xen_extra_version)
> > config.h: NEW_CODE_SZ=$(call
flight 92933 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92933/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
On 04/27/2016 01:38 AM, Roger Pau Monné wrote:
> On Tue, Apr 26, 2016 at 10:35:31PM -0600, Jim Fehlig wrote:
>> qemu commit 91a097e7 forbids specifying the cache mode for empty
>> drives. Attempting to create a domain with an empty qdisk cdrom
>> results in
>>
>> qemu-system-x86_64: -drive
>>> On 27.04.16 at 17:48, wrote:
> +int xsplice_elf_resolve_symbols(struct xsplice_elf *elf)
> +{
> +unsigned int i;
> +int rc = 0;
> +
> +ASSERT(elf->sym);
> +
> +for ( i = 1; i < elf->nsym; i++ )
> +{
> +unsigned int idx =
>>> On 27.04.16 at 17:48, wrote:
> Here is the inline patch:
At first I'll reply on just the particular issue in move_payload(); I'll
then go through the entire patch to see if anything else needs
commenting.
> +static int move_payload(struct payload *payload, struct
Hi all,
just a quick reminder that the CfP for the Xen Project Developer Summit which
is held in Toronto from May 25-26th closes on May the 6th, 2016 at 11:59 pm
PST, which is less than two weeks from now.
For the CfP submission link, follow
On Wed, Apr 27, 2016 at 02:28:09AM -0600, Jan Beulich wrote:
> >>> On 27.04.16 at 05:28, wrote:
> >> > +static int move_payload(struct payload *payload, struct xsplice_elf
> >> > *elf)
> >> > +{
> > ..snip..
> >> > +for ( i = 1; i < elf->hdr->e_shnum; i++ )
> >> > +
Don't propagate altp2m changes from ept_set_entry for memshare as memshare
already has the lock. We call altp2m propagate changes once memshare
successfully finishes. Allow the hostp2m entries to be of type
p2m_ram_shared when applying mem_access. Also, do not trigger PoD for hostp2m
when setting
On 18/04/16 15:00, Quan Xu wrote:
> If IOMMU mapping and unmapping failed, the domain (with the exception of
> the hardware domain) is crashed, treated as a fatal error. Rollback can
> be lighter weight.
>
> For the hardware domain, we do things on a best effort basis. When rollback
> is not
On Tue, Apr 26, 2016 at 12:48:41PM +0100, Lars Kurth wrote:
[...]
> Any views?
>
The modification Looks reasonable to me.
Wei.
> Best Regards
> Lars
>
>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 27/04/16 16:37, Tamas K Lengyel wrote:
> On Wed, Apr 27, 2016 at 9:31 AM, George Dunlap
> wrote:
>
>> On 27/04/16 16:18, Tamas K Lengyel wrote:
>>> On Wed, Apr 27, 2016 at 9:01 AM, George Dunlap >>
>>> wrote:
>>>
On 21/04/16 18:10,
On Wed, Apr 27, 2016 at 9:31 AM, George Dunlap
wrote:
> On 27/04/16 16:18, Tamas K Lengyel wrote:
> > On Wed, Apr 27, 2016 at 9:01 AM, George Dunlap >
> > wrote:
> >
> >> On 21/04/16 18:10, Tamas K Lengyel wrote:
> >>> Don't propagate altp2m
On Wed, 27 Apr 2016, Julien Grall wrote:
> UP guest may use TLB instructions to flush only on the local CPU.
> Therefore, TLB flush will not be broadcasted across all the CPUs within
> the same innershareable domain.
>
> When the vCPU is migrated between different CPUs, it may be rescheduled
> to
Il 27/04/2016 13:26, George Dunlap ha scritto:
On 27/04/16 12:02, Fabio Fantoni wrote:
Hi, I took a look at the new pvusb hotplug code in libxl to try to add
also hotplug (with qmp) usbredir tcp channels.
Adding usbredir tcp channels at domU start requires for example adding
qemu parameters
On 27/04/16 16:18, Tamas K Lengyel wrote:
> On Wed, Apr 27, 2016 at 9:01 AM, George Dunlap
> wrote:
>
>> On 21/04/16 18:10, Tamas K Lengyel wrote:
>>> Don't propagate altp2m changes from ept_set_entry for memshare as
>> memshare
>>> already has the lock. We call altp2m
On Wed, 2016-04-27 at 14:58 +, tutu sky wrote:
> Thanks Dario,
> and then, i don't understand what is your meaning by:
>
> "That's a valid use case, and there are people doing it a log, and
> you
> don't even need VMWare to do that."
>
> Do you mean that for developing/debugging three is no
On Wed, Apr 27, 2016 at 04:42:27PM +0200, Roger Pau Monne wrote:
> The current test performed in order to check if the assembler supports
> certain instructions doesn't take into account the value of AFLAGS, which
> when using clang contains the option that disables the integrated assembler
> due
On Wed, Apr 27, 2016 at 9:01 AM, George Dunlap
wrote:
> On 21/04/16 18:10, Tamas K Lengyel wrote:
> > Don't propagate altp2m changes from ept_set_entry for memshare as
> memshare
> > already has the lock. We call altp2m propagate changes once memshare
> > successfully
>>> On 27.04.16 at 16:26, wrote:
> On April 25, 2016 5:27 PM, Jan Beulich wrote:
>> >>> On 18.04.16 at 16:00, wrote:
>> > --- a/xen/drivers/passthrough/iommu.c
>> > +++ b/xen/drivers/passthrough/iommu.c
>> > @@ -243,21 +243,33 @@ int
On 21/04/16 18:10, Tamas K Lengyel wrote:
> Don't propagate altp2m changes from ept_set_entry for memshare as memshare
> already has the lock. We call altp2m propagate changes once memshare
> successfully finishes. Also, allow the hostp2m entries to be of type
> p2m_ram_shared.
>
> Signed-off-by:
1 - 100 of 209 matches
Mail list logo