On Tue, Jan 06, 2015 at 09:14:22PM +0200, Pasi Kärkkäinen wrote:
On Tue, Jan 06, 2015 at 01:21:58PM -0500, Konrad Rzeszutek Wilk wrote:
On Tue, Jan 06, 2015 at 06:06:23PM +, Ian Jackson wrote:
Konrad Rzeszutek Wilk writes ([Xen-devel] [PATCH] README, xen/Makefile:
Update to Xen 4.5.0
On Wed, Jan 07, 2015 at 03:32:15PM +, Ian Campbell wrote:
The first Xen technical call will be at:
Wed 14 Jan 17:00:00 GMT 201
`date -d @1421254800`
See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
for more information on the call.
Please let me know
-Acked-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, Jan 07, 2015 at 03:27:15PM +, Ian Jackson wrote:
Olaf Hering writes (Re: [PATCH 7/7] tools/hotplug: add wrapper to start
xenstored):
If I recall correctly the point of the current 'sh -c exec ...' stunt
was to expand the XENSTORE variable from the sysconfig file. But this
On Tue, Jan 06, 2015 at 06:57:27PM +, David Vrabel wrote:
From: Jenny Herbert jennifer.herb...@citrix.com
The foreign page flag will be used by Xen guests to mark pages that
have grant mappings of frames from other (foreign) guests.
The foreign flag is an aliases the existing
Expand the README file to give a brief view of what went in
Xen 4.5.0. Also change the Makefile to not use the '-rc'
postfix.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
README | 40 +++-
xen/Makefile | 2 +-
2 files changed, 28
I am proposing to put this in the 'staging-4.5' tree but would
appreciate an English speaker to take a look and make sure it
sounds good.
Thank you.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, Jan 06, 2015 at 03:31:14PM +, Ian Jackson wrote:
Konrad Rzeszutek Wilk writes (Re: Xen 4.5 Development Update (GA slip by a
week)):
On Tue, Jan 06, 2015 at 02:40:31PM +, Ian Jackson wrote:
There are two remaining dates left unspecified in your mail:
* When do we
On Tue, Jan 06, 2015 at 06:54:40PM +0100, Sander Eikelenboom wrote:
Tuesday, January 6, 2015, 6:17:12 PM, you wrote:
Expand the README file to give a brief view of what went in
Xen 4.5.0. Also change the Makefile to not use the '-rc'
postfix.
Signed-off-by: Konrad Rzeszutek Wilk
On Tue, Jan 06, 2015 at 05:24:19PM +, Lars Kurth wrote:
(Reduced CC list)
Hi all, updating http://wiki.xenproject.org/wiki/Xen_Project_Release_Features
there appear to be a few features where it may be worth to upgrade a feature
for 4.5. The following ones spring to mind
* Credit 2
On Tue, Jan 06, 2015 at 06:06:23PM +, Ian Jackson wrote:
Konrad Rzeszutek Wilk writes ([Xen-devel] [PATCH] README, xen/Makefile:
Update to Xen 4.5.0):
-The 4.3 release offers a number of improvements, including NUMA
-scheduling affinity, openvswitch integration, and defaulting
Hello,
Per http://wiki.xenproject.org/wiki/Xen_Project_Maintenance_Releases:
Each stable branch has a maintainer who is nominated/volunteers according to
the Maintainer Election
process described in the project governance document
[http://www.xenproject.org/governance.html].
This will
On Wed, Jan 07, 2015 at 11:37:52PM +0800, Jiang Liu wrote:
On 2015/1/7 22:50, Konrad Rzeszutek Wilk wrote:
On Wed, Jan 07, 2015 at 02:13:49PM +0800, Jiang Liu wrote:
Commit b81975eade8c (x86, irq: Clean up irqdomain transition code)
breaks xen IRQ allocation because xen_smp_prepare_cpus
On Wed, Mar 18, 2015 at 01:06:18PM +, Ian Campbell wrote:
On Fri, 2015-03-13 at 16:26 -0400, Konrad Rzeszutek Wilk wrote:
The function does not return any values at all. Convert the
internal libxl ones (ERROR_FAIL, ..., etc) to positive values
and for the other cases just return
On Wed, Mar 18, 2015 at 02:09:09PM +, Dario Faggioli wrote:
On Wed, 2015-03-18 at 13:08 +, Ian Campbell wrote:
On Wed, 2015-03-18 at 13:06 +, Ian Campbell wrote:
On Fri, 2015-03-13 at 16:26 -0400, Konrad Rzeszutek Wilk wrote:
The function does not return any values at all
On Wed, Mar 18, 2015 at 07:38:12AM +, Jan Beulich wrote:
On 17.03.15 at 18:15, konrad.w...@oracle.com wrote:
On Tue, Mar 17, 2015 at 04:06:14PM +, Jan Beulich wrote:
On 17.03.15 at 16:38, konrad.w...@oracle.com wrote:
--- a/xen/drivers/passthrough/io.c
+++
On Wed, Mar 18, 2015 at 07:41:55AM +, Jan Beulich wrote:
On 17.03.15 at 18:44, konrad.w...@oracle.com wrote:
As you can see to preserve the existing functionality such as
being able to schedule N amount of interrupt injections
for the N interrupts we might get - I modified '-masked'
On Wed, Mar 18, 2015 at 12:44:21PM +, Wu, Feng wrote:
VT-d Posted-interrupt (PI) design for XEN
Background
==
With the development of virtualization, there are more and more device
assignment requirements. However, today when a VM is running with
assigned devices (such as,
On Wed, Mar 18, 2015 at 04:43:40PM +, Jan Beulich wrote:
On 18.03.15 at 15:06, konrad.w...@oracle.com wrote:
On Wed, Mar 18, 2015 at 07:41:55AM +, Jan Beulich wrote:
On 17.03.15 at 18:44, konrad.w...@oracle.com wrote:
As you can see to preserve the existing functionality such as
On Wed, Mar 18, 2015 at 04:06:37PM +, Jan Beulich wrote:
On 18.03.15 at 14:58, konrad.w...@oracle.com wrote:
On Wed, Mar 18, 2015 at 07:38:12AM +, Jan Beulich wrote:
On 17.03.15 at 18:15, konrad.w...@oracle.com wrote:
The latest one (please see attached) would cause an dead-lock
On Wed, Mar 18, 2015 at 04:21:52PM +, Ian Campbell wrote:
On Mon, 2015-03-16 at 11:39 -0400, Konrad Rzeszutek Wilk wrote:
The users of these (qemu) check for a negative value
so we are safe in regards to that. However they
also use the return value to inform the user of the
error
On Wed, Mar 18, 2015 at 04:26:37PM +, Ian Campbell wrote:
On Mon, 2015-03-16 at 11:39 -0400, Konrad Rzeszutek Wilk wrote:
The API returns now negative values on error and stashes
the error in errno. Fix the user of this API.
The 'xc_hypercall_bounce_pre' can fail - and if so
On Wed, Mar 18, 2015 at 04:43:07PM +, Ian Campbell wrote:
On Mon, 2015-03-16 at 11:39 -0400, Konrad Rzeszutek Wilk wrote:
Hey,
Please see the following set of patches which fix the various
usage of return -Exx instead of return -1 for errors (and
stashing the error value in errno
On Wed, Mar 18, 2015 at 04:36:40PM +, Ian Campbell wrote:
On Mon, 2015-03-16 at 11:39 -0400, Konrad Rzeszutek Wilk wrote:
If there is a negative return value - check for that and
also use errno for the proper error value.
Was xc_sharing_freed_pages fixed earlier in the series (which
On Sat, Mar 14, 2015 at 07:55:39AM +, Ian Campbell wrote:
On Fri, 2015-03-13 at 15:40 -0400, Konrad Rzeszutek Wilk wrote:
On Fri, Mar 13, 2015 at 03:31:12PM -0400, Konrad Rzeszutek Wilk wrote:
Instead put the -Exx in errno.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w
On Mon, Mar 16, 2015 at 02:23:22PM +, Ian Campbell wrote:
On Mon, 2015-03-16 at 10:11 -0400, Konrad Rzeszutek Wilk wrote:
static void hypercall_buffer_cache_lock(xc_interface *xch)
{
+int saved_errno;
if ( xch-flags XC_OPENFLAG_NON_REENTRANT )
return
On Mon, Mar 16, 2015 at 10:13:50AM +, Stefano Stabellini wrote:
On Fri, 13 Mar 2015, Konrad Rzeszutek Wilk wrote:
As the libxc library follows (mostly) the return negative
for failure and stashes the error value in errno.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Instead of assuming everything is always OK.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_core_arm.c| 14 +++---
tools/libxc/xc_core_x86.c| 21 +
tools/libxc/xc_domain_save.c | 8 +++-
3 files changed, 35 insertions(+), 8
We should be using the errno that the hypercall left
instead of overwritting it with the return value.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxl/libxl_x86.c | 9 +++--
1 file changed, 3 insertions(+), 6 deletions(-)
diff --git a/tools/libxl/libxl_x86.c b
the 'errno' from
pthread/munmap/madvise as an extra parameter to be analyzed
later. However the call-sites above us do not care about it.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_freebsd_osdep.c | 3 +++
tools/libxc/xc_hcall_buf.c | 6 ++
tools/libxc
The users of these (qemu) check for a negative value
so we are safe in regards to that. However they
also use the return value to inform the user of the
error.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_physdev.c | 12
1 file changed, 8 insertions
The goto looks very wrong when the rest of the code
has spaces.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_cpupool.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/libxc/xc_cpupool.c b/tools/libxc/xc_cpupool.c
index 6393cfb
Instead of returning -Exx we now return -1 for error.
We could stash the -Exx values in errno values but why - the
underlaying functions we call all stash the proper errno
value. Hence we just propagate it up wherver it is needed.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
with proper value (ENOMEM) when reporting failures.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
[v1: errno before using PERROR]
---
tools/libxc/xc_core_arm.c | 1 +
tools/libxc/xc_core_x86.c | 1 +
2 files changed, 2 insertions(+)
diff --git a/tools/libxc/xc_core_arm.c b
Oddly enough the user of this API did the right thing -
check for return being negative and used 'errno' for the
real error.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_pm.c | 54 +++--
1 file changed, 36
Hey,
Please see the following set of patches which fix the various
usage of return -Exx instead of return -1 for errors (and
stashing the error value in errno).
It also cleans up some of the invalid usage of errno (as the
underlaying calls already stash errno values) - and we just
need to bubble
Instead of assuming everything is always OK.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xg_save_restore.h | 3 +++
tools/misc/xen-mfndump.c | 2 +-
2 files changed, 4 insertions(+), 1 deletion(-)
diff --git a/tools/libxc/xg_save_restore.h b/tools/libxc
xc_maximum_ram_page for negative return values.
libxl: Check xc_domain_maximum_gpfn for negative return values
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_private.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxc/xc_private.c b/tools
If there is a negative return value - check for that and
also use errno for the proper error value.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxl/libxl.c | 4 ++--
tools/tests/mem-sharing/memshrtool.c | 12 ++--
2 files changed, 12
The API returns now negative values on error and stashes
the error in errno. Fix the user of this API.
The 'xc_hypercall_bounce_pre' can fail - and if so it will
stash its errno values - no need to over-write it.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc
Instead of just the return value.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_dom_x86.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
index bf06fe4..20e379c 100644
--- a/tools
We don't need to put fill errno because xc_hypercall_buffer_alloc
fills the errno with the appropiate errno values and we just
need to pass them up the stack.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_domain.c | 2 +-
1 file changed, 1 insertion(+), 1
If we do explicitly we run risk of dead-lock. See below of an draft
(not even compiled tested) of what I think you mean.
That's no different from the code you proposed before, just that
the live-lock is better hidden there: By re-raising a softirq from a
softirq handler, you arrange for
On Tue, Mar 10, 2015 at 12:03:13PM +, Bob Ball wrote:
For the last few weeks Anthony and I have been working on creating a CI
environment to run against all OpenStack jobs. We're now in a position where
we can share the current status, overview of how it works and next steps. We
handler - and use that.
We could also xor it against the current to catch any
non-duplicate bits being set that we should deal with).
Here is the compile, but not run-time tested patch.
From e7d8bcd7c5d32c520554a4ad69c4716246036002 Mon Sep 17 00:00:00 2001
From: Konrad Rzeszutek Wilk
for the
exact dpci we are in process of executing.
Jan
From 6b32dccfbe00518d3ca9cd94d19a6e007b2645d9 Mon Sep 17 00:00:00 2001
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Tue, 17 Mar 2015 09:46:09 -0400
Subject: [PATCH] dpci: when scheduling spin until STATE_RUN or STATE_SCHED has
been
On Mon, Mar 16, 2015 at 11:08:50PM +, Ian Murray wrote:
On 16/03/15 14:12, Konrad Rzeszutek Wilk wrote:
On Sun, Mar 15, 2015 at 09:34:16PM +, Ian Murray wrote:
Hi,
I have a domU guest that booted fine under Xen 4.4.1 with pvh=1 but now
fails to boot with it under Xen 4.5.0
On Tue, Mar 17, 2015 at 10:56:48AM +0530, Manish Jaggi wrote:
On Friday 27 February 2015 10:20 PM, Ian Campbell wrote:
On Fri, 2015-02-27 at 16:35 +, Jan Beulich wrote:
On 27.02.15 at 16:24, ian.campb...@citrix.com wrote:
On Fri, 2015-02-27 at 14:54 +, Stefano Stabellini wrote:
On Tue, Mar 17, 2015 at 04:11:33PM +0800, Chao Peng wrote:
On Fri, Mar 13, 2015 at 09:40:13AM -0400, Konrad Rzeszutek Wilk wrote:
On Fri, Mar 13, 2015 at 06:13:20PM +0800, Chao Peng wrote:
Detect Intel Cache Allocation Technology(CAT) feature and store the
cpuid information for later use
On Wed, Mar 18, 2015 at 09:33:58PM +, Wei Liu wrote:
There is already a typedef in libxlutil.h. Remove the one in
libxlu_internal.h.
Signed-off-by: Wei Liu wei.l...@citrix.com
Missing the 'Reported-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com'
---
tools/libxl/libxlu_internal.h | 4
Instead of assuming everything is always OK. As such
we return now the return value (or zero for success).
The max_mfn is now passed in as the parameter.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/include/xenctrl.h | 2 +-
tools/libxc/xc_offline_page.c | 6
The users of these (qemu) check for a negative value
so we are safe in regards to that. However they
also use the return value to inform the user of the
error.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxc/xc_physdev.c
We should be using the errno that the hypercall left
instead of overwriting it with the return value.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxl/libxl_x86.c | 9 +++--
1 file changed, 3 insertions(+), 6 deletions
Instead of returning -Exx we now return -1 for error.
We could stash the -Exx values in errno values but why - the
underlaying functions we call all stash the proper errno
value. Hence we just propagate it up wherver it is needed.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked
If there is a negative return value - check for that and
also use errno for the proper error value.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxl/libxl.c | 4 ++--
tools/tests/mem-sharing/memshrtool.c | 12 ++--
2 files changed, 12
The API returns now negative values on error and stashes
the error in errno. Fix the user of this API.
The 'xc_hypercall_bounce_pre' can fail - and if so it will
stash its errno values - no need to over-write it.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc
Instead of just the return value.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by Ian Campbell ian.campb...@citrix.com
---
tools/libxc/xc_dom_x86.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
The goto looks very wrong when the rest of the code
has spaces.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxc/xc_cpupool.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/libxc/xc_cpupool.c
Oddly enough the user of this API did the right thing -
check for return being negative and used 'errno' for the
real error.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxc/xc_pm.c | 54
We don't need to put fill errno because xc_hypercall_buffer_alloc
fills the errno with the appropriate errno values and we just
need to pass them up the stack.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxc/xc_domain.c
Instead of assuming everything is always OK. We stash
the gpfns value as an parameter.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_core_arm.c| 17 ++---
tools/libxc/xc_core_x86.c| 24
tools/libxc/xc_domain_save.c
xc_domain_maximum_gpfn for negative return values
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_private.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxc/xc_private.c b/tools/libxc/xc_private.c
index f4f2748..2eb44b6 100644
--- a/tools/libxc
the 'errno' from
pthread/munmap/madvise as an extra parameter to be analyzed
later. However the call-sites above us do not care about it.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxc/xc_freebsd_osdep.c | 3 +++
tools/libxc
Hey
Please see the following patches which fix an subset of
some of the various usages of return -Exx instead of
using -1 (and stashing in errno the error value).
We also clean up some cases where the errno is over-writen
- we want to bubble up the errnor that the underlaying
hypercall had done.
00:00:00 2001
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Fri, 13 Mar 2015 14:57:44 -0400
Subject: [PATCH v3] libxc: Check xc_domain_maximum_gpfn for negative return
values
Instead of assuming everything is always OK. We stash
the gpfns value as an parameter. Since we use
On Thu, Mar 19, 2015 at 05:54:03PM -0400, Boris Ostrovsky wrote:
xc_numainfo() is not expected to be used on a hot path and therefore
hypercall buffer management can be pushed into libxc. This will simplify
life for callers.
Also update error logging macros.
Signed-off-by: Boris Ostrovsky
On Thu, Mar 19, 2015 at 05:54:01PM -0400, Boris Ostrovsky wrote:
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
Changes in v5:
* Increment ti-first_dev in the loop
* Make node in xen_sysctl_pcitopoinfo a uint32
.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
Changes in v5:
* XEN_SYSCTL_numainfo knows about NUMA_NO_DISTANCE
* Cleaner changes in __node_distance()
xen/arch/x86/srat.c| 13 ++---
xen
On Fri, Mar 20, 2015 at 09:48:08AM +, Ian Campbell wrote:
On Thu, 2015-03-19 at 14:54 -0400, Konrad Rzeszutek Wilk wrote:
On Thu, Mar 19, 2015 at 04:47:58PM +, Ian Campbell wrote:
On Wed, 2015-03-18 at 20:24 -0400, Konrad Rzeszutek Wilk wrote:
Instead of assuming everything
...@oracle.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
Changes in v5:
* Replace u8 with nodeid_t
xen/arch/x86/physdev.c| 23 ---
xen/drivers/passthrough/pci.c | 13 +
xen/include/public/physdev.h |6 ++
xen/include/xen/pci.h
://xenbits.xen.org/people/konradwilk/xen.git xc_cleanup.v4.1
From 45bd7cd377b0b8364757cc2bc0bd8d6a13523a97 Mon Sep 17 00:00:00 2001
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Fri, 13 Mar 2015 14:57:44 -0400
Subject: [PATCH] libxc: Check xc_domain_maximum_gpfn for negative return
values
On Fri, Mar 20, 2015 at 10:34:34AM -0400, Konrad Rzeszutek Wilk wrote:
On Fri, Mar 20, 2015 at 09:48:08AM +, Ian Campbell wrote:
On Thu, 2015-03-19 at 14:54 -0400, Konrad Rzeszutek Wilk wrote:
On Thu, Mar 19, 2015 at 04:47:58PM +, Ian Campbell wrote:
On Wed, 2015-03-18 at 20:24
On Thu, Mar 19, 2015 at 04:47:58PM +, Ian Campbell wrote:
On Wed, 2015-03-18 at 20:24 -0400, Konrad Rzeszutek Wilk wrote:
Instead of assuming everything is always OK. We stash
the gpfns value as an parameter.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools
On Thu, Mar 19, 2015 at 04:47:58PM +, Ian Campbell wrote:
On Wed, 2015-03-18 at 20:24 -0400, Konrad Rzeszutek Wilk wrote:
Instead of assuming everything is always OK. We stash
the gpfns value as an parameter.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools
On Thu, Mar 19, 2015 at 03:03:55AM +, Wu, Feng wrote:
Thanks for the comments!
-Original Message-
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: Thursday, March 19, 2015 12:10 AM
To: Wu, Feng
Cc: xen-devel@lists.xen.org; Zhang, Yang Z; Tian, Kevin; Keir
-and-Tested-by: Malcolm Crossley malcolm.cross...@citrix.com
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
So I now agree that in the state we're in this is the most reasonable
fix. My reservations against the extra logic introduced earlier (and
Thank you.
Are you OK with me
On Thu, Mar 19, 2015 at 04:39:49PM +, Ian Campbell wrote:
On Wed, 2015-03-18 at 20:24 -0400, Konrad Rzeszutek Wilk wrote:
The API returns now negative values on error and stashes
the error in errno. Fix the user of this API.
The 'xc_hypercall_bounce_pre' can fail - and if so
6b32dccfbe00518d3ca9cd94d19a6e007b2645d9 Mon Sep 17 00:00:00 2001
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Tue, 17 Mar 2015 09:46:09 -0400
Subject: [PATCH] dpci: when scheduling spin until STATE_RUN or STATE_SCHED has
been cleared.
There is race when we clear the STATE_SCHED in the softirq
- which allows
Eikelenboom li...@eikelenboom.it
Reported-and-Tested-by: Malcolm Crossley malcolm.cross...@citrix.com
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
xen/drivers/passthrough/io.c | 12 +++-
1 file changed, 11 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/passthrough
On Tue, Mar 17, 2015 at 01:52:27PM +, George Dunlap wrote:
On 03/13/2015 08:37 PM, Konrad Rzeszutek Wilk wrote:
+static int parse_cpumask(const char *arg)
+{
+xc_cpumap_t map;
+uint32_t v, i;
+int bits = 0;
+
+map = malloc(sizeof(uint32_t));
+if ( !map
On Tue, Mar 17, 2015 at 04:01:49PM +, Jan Beulich wrote:
On 17.03.15 at 15:54, konrad.w...@oracle.com wrote:
On Tue, Mar 17, 2015 at 09:42:21AM +0100, Sander Eikelenboom wrote:
I'm still running with this first simple stopgap patch from Konrad,
and it has worked fine for me since.
elena.ufimts...@oracle.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
xen/drivers/passthrough/vtd/dmar.c | 122
+++-
xen/drivers/passthrough/vtd/dmar.h |1 +
2 files changed, 66 insertions(+), 57 deletions(-)
diff --git a/xen/drivers
On Mon, Mar 09, 2015 at 10:42:57AM -0400, elena.ufimts...@oracle.com wrote:
From: Elena Ufimtseva elena.ufimts...@oracle.com
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH
ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
CC: Konrad Wilk konrad.w...@oracle.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_dom_x86.c | 15 ++-
1 file changed, 10 insertions(+), 5 deletions(-)
diff --git a/tools/libxc
On Mon, Mar 09, 2015 at 03:31:30PM +, David Vrabel wrote:
On 09/03/15 15:25, Boris Ostrovsky wrote:
On 03/09/2015 11:13 AM, David Vrabel wrote:
On 09/03/15 15:09, Boris Ostrovsky wrote:
On 03/09/2015 10:10 AM, David Vrabel wrote:
Memory hotplug doesn't work with PV guests because:
will of course be
acceptable.
You might just use this patch (that I had forgotten to post) - and which
needs testing since the last posting.:
From 891f6df52dd9586a43cd76b1052a0caee35ee3e5 Mon Sep 17 00:00:00 2001
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Tue, 3 Feb 2015 11:18:04 -0500
Subject
).
Signed-off-by: Ross Lagerwall ross.lagerw...@citrix.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
xen/arch/x86/shutdown.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/xen/arch/x86/shutdown.c b/xen/arch/x86/shutdown.c
index 21f6cf5..236b4a1 100644
--- a/xen
means it may need to be duplicated in the case
BOOT_EFI: code).
nods
From da22ca80c2c1570636b5c8f2382e053b63c14a0e Mon Sep 17 00:00:00 2001
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Tue, 3 Feb 2015 11:18:04 -0500
Subject: [PATCH] efi: Allow reboot= overrides when running under EFI
. snip..
Format: { int,force,int,int} is suitable I think.
And fixing force is follow the code design previously in
setup_io_tlb_npages.
It is a bug. It should have been smart enough to deal with the 'force' being
in any order.
If you are willing to make a patch to fix this - either folded
On Fri, Mar 06, 2015 at 05:08:21PM +0800, Tiejun Chen wrote:
When we're working to support IGD GFX passthrough with qemu
upstream, instead of -gfx_passthru we'd like to make that
Could you also include in the cover letter an URL link to the latest
discussion on this?
Thank you.
a machine
On Wed, Mar 04, 2015 at 05:47:03PM -0800, Luis R. Rodriguez wrote:
On Wed, Mar 4, 2015 at 6:36 AM, Andrey Ryabinin a.ryabi...@samsung.com
wrote:
On 03/03/2015 07:02 PM, Konrad Rzeszutek Wilk wrote:
If it is like that - then just using what had to be implemented
for the stack protection
calls
instead of the more complicated nested if statements in the original
code. Let's preserve the error codes as well.
Signed-off-by: Dan Carpenter dan.carpen...@oracle.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
David, you want me to stash in devel for 4.1?
diff --git
...@suse.com wrote:
On Fri, Feb 27, 2015 at 10:27 AM, Konrad Rzeszutek Wilk
konrad.w...@oracle.com wrote:
There was another reason. Some distros remove the CONFIG_XEN_DOM0
altogether
even thought they do enable the rest of the pieces (backends, frontends,
etc).
Interesting, what
On March 12, 2015 7:44:58 AM EDT, Jan Beulich jbeul...@suse.com wrote:
On 11.03.15 at 19:49, konrad.w...@oracle.com wrote:
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Tue, 3 Feb 2015 11:18:04 -0500
Subject: [PATCH] efi: Allow reboot= overrides when running under EFI
By default
* vsyscall in Linux (fair)
- Konrad Rzeszutek Wilk
Not done. Still in 'git stash'.
* Convert tasklet to per-cpu tasklets (fair)
RFC posted
- Konrad Rzeszutek Wilk
Pff.. I've the patches but would need to post them and
redo them. Too busy right now.
Might as well move them
tasklets (fair)
RFC posted
- Konrad Rzeszutek Wilk
Is this still a valid item? I think we went another route, albeit that
work is still incomplete iirc. Konrad?
Right. I want to finish up the another route before I go back to this.
I think it is still valid - as it can help
On Fri, Mar 13, 2015 at 06:05:15PM +, Andrew Cooper wrote:
On 13/03/15 18:02, Konrad Rzeszutek Wilk wrote:
* vsyscall in Linux (fair)
- Konrad Rzeszutek Wilk
Not done. Still in 'git stash'.
* Convert tasklet to per-cpu tasklets (fair)
RFC posted
- Konrad Rzeszutek
with proper value (ENOMEM) when reporting failures.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_core_arm.c | 1 +
tools/libxc/xc_core_x86.c | 1 +
2 files changed, 2 insertions(+)
diff --git a/tools/libxc/xc_core_arm.c b/tools/libxc/xc_core_arm.c
index 16508e7
If there is a negative return value - check for that and
also use errno for the proper error value.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxl/libxl.c | 4 ++--
tools/tests/mem-sharing/memshrtool.c | 12 ++--
2 files changed, 12
And also fix the user of it to print the proper error value.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
tools/libxc/xc_offline_page.c | 42 --
tools/libxc/xc_private.c | 3 ++-
tools/misc/xen-hptool.c | 6 +++---
3 files
301 - 400 of 3573 matches
Mail list logo