The function does not return any values at all. Convert the
internal libxl errors (ERROR_FAIL, ..., etc) to 1.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxl/xl_cmdimpl.c | 17 +
1 file changed, 9
And use that for all of its callers in the tree.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxl/libxl.c | 19 +++
tools/libxl/libxl.h | 9 -
tools/libxl/libxl_types.idl | 1
without any
warnings when they are running an overcommitted guest.
Also fix the extra space in the message.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
[v2: Remove crud code as spotted by Boris]
[v3: Moved crud code removal
Instead of just printing an generic error.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
tools/libxl/xl_cmdimpl.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl
On Fri, Apr 03, 2015 at 11:12:15PM +0100, Ian Murray wrote:
On 03/04/15 21:02, Konrad Rzeszutek Wilk wrote:
If we cannot find the domain - log an error (and still
continue returning an error).
Forgive me if I am misunderstanding the effect of this patch (I tried to
find the original
On Sat, Apr 04, 2015 at 04:14:41AM +0200, Dario Faggioli wrote:
This allows for a new item to be passed as part of the psr=
boot option: percpu_cmt. If that is specified, Xen tries,
at boot time, to associate an RMID to each core.
XXX This all looks rather straightforward, if it weren't
On Sat, Apr 04, 2015 at 04:14:24AM +0200, Dario Faggioli wrote:
From: Chao Peng chao.p.p...@linux.intel.com
Switching RMID from previous vcpu to next vcpu only needs to write
MSR_IA32_PSR_ASSOC once. Write it with the value of next vcpu is enough,
no need to write '0' first. Idle domain has
On Fri, Apr 03, 2015 at 03:52:30PM -0700, Andy Lutomirski wrote:
[cc: Boris and Konrad. Whoops]
On Fri, Apr 3, 2015 at 3:51 PM, Andy Lutomirski l...@kernel.org wrote:
We don't use irq_enable_sysexit on 64-bit kernels any more. Remove
Is there an commit (or name of patch) that explains why
On Sat, Apr 04, 2015 at 04:14:33AM +0200, Dario Faggioli wrote:
Just print it.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
---
xen/arch/x86/psr.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c
index
++
5 files changed, 289 insertions(+), 31 deletions(-)
George Dunlap (1):
libxc/xentrace: Use xc_cpumap_t for xc_tbuf_set_cpu_mask
Konrad Rzeszutek Wilk (2):
libxl/cpumap: Add xc_cpumap_[setcpu, clearcpu, testcpu] to complement
xc_cpumap_alloc
.
To make the old behavior and the new function work, we check
to see if the arguments have '0x' in them. If they do
we use the old style parsing (limited to 32 CPUs). If that
does not exist we use the new parsing.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
[v4: Fix per George's
From: George Dunlap george.dun...@eu.citrix.com
xentrace is the only caller at the moment. Split the cpu and event
mask setting out into seperate functions, but leave the current limit
of 32 bits for masks passed in from the command-line.
Based on a patch from Konrad Rzeszutek Wilk konrad.w
We export the xc_cpumap_alloc but not the bit operations.
One could include 'xc_bitops.h' but that is naughty - so instead
we just export the proper functions to do it on the xc_cpumap_t
typedef.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
v2: Use our own macro to make sure
It is unhealthy. If the device is not doing any DMA operations
it would work - but if you are saving and there are DMA operations
happening the chance of corruption (outstanding DMAs) increase.
As such re-use the check migration used.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
On Wed, Apr 08, 2015 at 09:09:23AM +0200, Olaf Hering wrote:
On Tue, Apr 07, Konrad Rzeszutek Wilk wrote:
You might also want to use 'sync_console'.
This does not give any extra info in the case of the reported hang.
No, but are you able to at least dump the status of the registers
On Wed, Apr 08, 2015 at 11:46:44AM +0100, David Vrabel wrote:
On 03/04/15 07:45, Bob Liu wrote:
Remove the 'DEPRECATED' and next patch will follow the protocol defined
here to
support multi-page ring.
Why are you un-deprecating this instead of using max-ring-page-order?
Are you
is changed a bit to provide a wrapper for
unlocking, destroying, and locking the domain. Existing
libxl_domain_destroy callers are changed to use the wrapper.
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Tested-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Jim Fehlig (3
Hey Jim, Andrew, and Ian,
This is libvirt v1.2.14 + three patches:
c82a59b libxl: drop virDomainObj lock when destroying a domain
a1c9d30 libxl: acquire a job when destroying a domain
5bd5406 libxl: Move job acquisition in libxlDomainStart to callers
For fun I've set up an guest with PCI
Rzeszutek Wilk (2):
xen/pciback: Don't disable PCI_COMMAND on PCI device reset.
xen/pciback: Remove is_busmaster=0 as pci_disable_device does it already
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
There is no need for this.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
drivers/xen/xen-pciback/pciback_ops.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/drivers/xen/xen-pciback/pciback_ops.c
b/drivers/xen/xen-pciback/pciback_ops.c
index 26e6513..a131733 100644
, including the security issues which XSA-120 sought
to address.
CC: sta...@vger.kernel.org
Reported-by: Jan Beulich jbeul...@suse.com
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
drivers/xen/xen-pciback/pciback_ops.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/drivers/xen/xen
()
* eliminate trailing whitespace
* Xen style corrections
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
xen/arch/x86/domctl.c | 276
On Wed, Apr 01, 2015 at 04:31:03PM +0100, Andrew Cooper wrote:
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
xen/arch/x86/domctl.c | 12
1
On Fri, Apr 03, 2015 at 02:00:24AM +, Wu, Feng wrote:
-Original Message-
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: Friday, April 03, 2015 3:15 AM
To: Tian, Kevin
Cc: Wu, Feng; Zhang, Yang Z; xen-devel@lists.xen.org; k...@xen.org;
jbeul
On Tue, Mar 31, 2015 at 04:57:51PM +0100, Ian Campbell wrote:
On Mon, 2015-03-30 at 11:26 -0400, Konrad Rzeszutek Wilk wrote:
There is no sense in trying to online (or offline) CPUs when the size of
cpumap is greater than the maximum number of VCPUs the guest can go to.
As such fail
On Thu, Jun 04, 2015 at 10:27:06PM +0800, yunfang tai wrote:
Hi all,
Hey!
Recently, I am testing the TMEM support on Xen. I discovered that when
enabled TMEM in ubuntu 14.10 as guest on Xen 4.1 Xen 4.3, xm save xm
restore“ failed after there are more than 1000 pages put in persistent
On Wed, May 20, 2015 at 08:16:24AM -0500, Bjorn Helgaas wrote:
On Tue, May 19, 2015 at 1:08 AM, Tina Ruchandani
ruchandani.t...@gmail.com wrote:
struct timeval uses a 32-bit field for representing seconds,
which will overflow in the year 2038 and beyond. This patch replaces
struct timeval
On Tue, Jun 02, 2015 at 02:58:17PM +, Simon Waterman wrote:
Hi,
We're hitting the kernel BUG below in one of our VMs running on Xen 4.4 and
Linux kernel 3.13.0. We use the xl toolstack and are using PCI pass-through
to pass network cards and a disk controller. It happens on a variety
On Fri, Jun 05, 2015 at 04:16:59PM +0100, Jan Beulich wrote:
On 05.06.15 at 16:49, konrad.w...@oracle.com wrote:
On Mon, May 18, 2015 at 01:41:34PM +0100, Jan Beulich wrote:
On 15.05.15 at 21:44, konrad.w...@oracle.com wrote:
As such having the payload in an ELF file is the sensible way.
...@ts.fujitsu.com
Signed-off-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
Changed since v1:
(after talking to Dietmar, he's away from his email for a while)
* removed non existent model number 0x27 as suggested by Jan Beulich
* included
On Sat, Jun 06, 2015 at 11:57:31AM +0200, Roger Pau Monné wrote:
El 05/06/15 a les 23.52, Tim Deegan ha escrit:
At 18:21 +0100 on 05 Jun (1433528517), Andrew Cooper wrote:
On 05/06/15 18:16, Stefano Stabellini wrote:
On Fri, 5 Jun 2015, Andrew Cooper wrote:
On 05/06/15 17:43, Boris
On Mon, Jun 08, 2015 at 10:27:32AM +0100, Ian Campbell wrote:
On Mon, 2015-06-08 at 10:15 +0100, Jan Beulich wrote:
On 08.06.15 at 10:53, ian.campb...@citrix.com wrote:
That's 6/14 (43%) failure rate on fiano0 and 2/10 (20%) on fiano1. Which
differs form the apparent xen-unstable failure
On Mon, Jun 08, 2015 at 03:47:22PM +0100, Ian Jackson wrote:
Konrad Rzeszutek Wilk writes (Re: [Xen-devel] [xen-unstable test] 57852:
regressions - FAIL):
Could it be an missing microcode update? I don't know if the OSSTest does
the ucode=scan or updates the microcode later?
I think
On Mon, Jun 08, 2015 at 04:20:48PM +0100, George Dunlap wrote:
On 06/08/2015 03:53 PM, Konrad Rzeszutek Wilk wrote:
On Mon, Jun 08, 2015 at 01:11:38PM +0100, Ian Campbell wrote:
On Mon, 2015-06-08 at 12:40 +0100, Stefano Stabellini wrote:
I disagree that libxl should be the arbitrator
On Mon, Jun 08, 2015 at 01:11:38PM +0100, Ian Campbell wrote:
On Mon, 2015-06-08 at 12:40 +0100, Stefano Stabellini wrote:
I disagree that libxl should be the arbitrator of a property that is
stored, maintained and enforced by Xen. Xen should be the arbitrator.
That's not what
On Tue, Jun 09, 2015 at 02:49:45PM +0100, Jan Beulich wrote:
1: x86/EFI: fix EFI_MEMORY_WP handling
2: EFI/early: add /mapbs to map EfiBootServices{Code,Data}
3: EFI: support default attributes to map Runtime service areas with none
given
4: x86/EFI: adjust EFI_MEMORY_WP handling for spec
. ..snip..
@@ -1220,6 +1224,9 @@ void __init efi_init_memory(void)
prot |= _PAGE_PAT | MAP_SMALL_PAGES;
else if ( desc-Attribute (EFI_MEMORY_UC | EFI_MEMORY_UCE) )
prot |= _PAGE_PWT | _PAGE_PCD | MAP_SMALL_PAGES;
+else if ( efi_bs_revision =
in the commit that you are adding it in for
future use?
Added
Along with EFI_MEMORY_RO also add the two other new EFI_MEMORY_*
definitions, even if we don't need them right away.
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Jan
___
Xen
On Tue, Jun 09, 2015 at 10:08:56AM -0400, Konrad Rzeszutek Wilk wrote:
.. ..snip..
@@ -1220,6 +1224,9 @@ void __init efi_init_memory(void)
prot |= _PAGE_PAT | MAP_SMALL_PAGES;
else if ( desc-Attribute (EFI_MEMORY_UC | EFI_MEMORY_UCE) )
prot |= _PAGE_PWT
On Tue, Jun 09, 2015 at 04:07:33PM +0200, Roger Pau Monné wrote:
El 09/06/15 a les 15.39, Konrad Rzeszutek Wilk ha escrit:
On Tue, Jun 09, 2015 at 08:52:53AM +, Paul Durrant wrote:
-Original Message-
From: Bob Liu [mailto:bob@oracle.com]
Sent: 09 June 2015 09:50
To: Bob
On June 10, 2015 8:02:52 AM EDT, Jan Beulich jbeul...@suse.com wrote:
On 10.06.15 at 13:13, stefano.stabell...@eu.citrix.com wrote:
On Wed, 10 Jun 2015, Jan Beulich wrote:
On 10.06.15 at 03:02, konrad.w...@oracle.com wrote:
The problem is that the XSA120-addendm patch (which does not clear
On Wed, Apr 15, 2015 at 11:14:04PM +0200, Sander Eikelenboom wrote:
Wednesday, April 15, 2015, 10:58:50 PM, you wrote:
Hi Konrad,
xen version is at last changeset 3a28f760508fb35c430edac17a9efde5aff6d1d5
(previous unstable master before the force push which includes
On Mon, Jun 08, 2015 at 04:35:35PM -0700, Luis R. Rodriguez wrote:
On Thu, May 28, 2015 at 2:50 PM, Luis R. Rodriguez
mcg...@do-not-panic.com wrote:
On Thu, May 21, 2015 at 11:32 AM, Luis R. Rodriguez mcg...@suse.com wrote:
On Thu, May 21, 2015 at 04:20:27PM +0800, Michal Marek wrote:
Dne
On Tue, Jun 09, 2015 at 08:52:53AM +, Paul Durrant wrote:
-Original Message-
From: Bob Liu [mailto:bob@oracle.com]
Sent: 09 June 2015 09:50
To: Bob Liu
Cc: xen-devel@lists.xen.org; David Vrabel; just...@spectralogic.com;
konrad.w...@oracle.com; Roger Pau Monne; Paul
On Mon, May 18, 2015 at 08:54:22PM +0800, Liuqiming (John) wrote:
Hi Konrad,
Will this design include hotpatch build tools chain?
Yes, that is certainly the idea.
Such as how these .xplice_ section are created? How to handle xen symbols
when creating hotpatch elf file?
Right now I am
On Mon, May 18, 2015 at 01:41:34PM +0100, Jan Beulich wrote:
On 15.05.15 at 21:44, konrad.w...@oracle.com wrote:
As such having the payload in an ELF file is the sensible way. We would be
carrying the various set of structures (and data) in the ELF sections under
different names and with
On 15.05.2015 21:44, Konrad Rzeszutek Wilk wrote:
Hey!
During the Xen Hacka^H^H^H^HProject Summit? we chatted about live-patching
the hypervisor. We sketched out how it could be done, and brainstormed
some of the problems.
I took that and wrote an design - which is very much RFC
On Mon, Jun 22, 2015 at 12:37:37PM -0400, elena.ufimts...@oracle.com wrote:
From: Elena Ufimtseva elena.ufimts...@oracle.com
On AMD, MSR_AMD64_TSC_RATIO must be set for rdtsc instruction in guest
to properly read the cpu tsc. To that end, set tsc_khz in struct domain.
It looks like the
On Wed, Jun 17, 2015 at 03:35:02PM +0100, Stefano Stabellini wrote:
On Wed, 17 Jun 2015, Ian Campbell wrote:
On Wed, 2015-06-17 at 07:14 -0700, Manish Jaggi wrote:
On Wednesday 17 June 2015 06:43 AM, Ian Campbell wrote:
On Wed, 2015-06-17 at 13:58 +0100, Stefano Stabellini wrote:
Thank you for posting this!
Some comments below.
Design
==
`struct sysctl_physinfo.levelling_caps`
---
Xen shall gain a new physinfo field which reports the degree to which it can
influence `CPUID` executed by a PV guest. This is a bitmap
* Leaf 0x0007[ECX=0].EAX
* `mask_l7s0_ebx`
Those 'l' look like '1' in the PDF.
Can it be called something else?
If you can suggest a better name, yes. As for now, these are the
variable names used in-tree (top of xen/arch/x86/cpu/amd.c)
low?
* Leaf
On Tue, Jun 23, 2015 at 03:16:23PM +0100, Wei Liu wrote:
This reverts commit f5b43e95facdc17f925cb56a8963cd4531074034.
Could you include some detail of why the revert is needed?
Thanks.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
tools/libxc/include/xenctrl.h | 2 +-
On Tue, Jun 23, 2015 at 09:44:31AM +0100, Ian Campbell wrote:
On Mon, 2015-06-22 at 14:33 -0400, Konrad Rzeszutek Wilk wrote:
On Wed, Jun 17, 2015 at 03:35:02PM +0100, Stefano Stabellini wrote:
On Wed, 17 Jun 2015, Ian Campbell wrote:
On Wed, 2015-06-17 at 07:14 -0700, Manish Jaggi wrote
On June 23, 2015 2:23:59 AM EDT, Jan Beulich jbeul...@suse.com wrote:
On 22.06.15 at 15:56, konrad.w...@oracle.com wrote:
--- a/drivers/block/xen-blkfront.c
+++ b/drivers/block/xen-blkfront.c
@@ -1951,6 +1951,8 @@ static void blkback_changed(struct
xenbus_device *dev,
switch
On Tue, Jun 09, 2015 at 10:21:27AM -0400, Konrad Rzeszutek Wilk wrote:
On Tue, Jun 09, 2015 at 04:07:33PM +0200, Roger Pau Monn? wrote:
El 09/06/15 a les 15.39, Konrad Rzeszutek Wilk ha escrit:
On Tue, Jun 09, 2015 at 08:52:53AM +, Paul Durrant wrote:
-Original Message
On Thu, Jun 25, 2015 at 01:21:28PM +0100, Ian Campbell wrote:
On Thu, 2015-06-25 at 17:29 +0530, Manish Jaggi wrote:
On Thursday 25 June 2015 02:41 PM, Ian Campbell wrote:
On Thu, 2015-06-25 at 13:14 +0530, Manish Jaggi wrote:
On Wednesday 17 June 2015 07:59 PM, Ian Campbell wrote:
On Thu, Jun 25, 2015 at 08:34:45AM +0100, Jan Beulich wrote:
On 24.06.15 at 17:59, konrad.w...@oracle.com wrote:
While digging in this I realized that some shortcuts and assumptions
had been taken (I think I am restating what you two have already
realized).
1) The dev.config is (by
On Thu, Jun 25, 2015 at 01:36:29PM +0100, Ian Jackson wrote:
Ian Campbell writes (Re: [PATCH OSSTEST v3 21/22] Debian: Arrange to be able
to chainload a xen.efi from grub2):
On Thu, 2015-06-25 at 11:33 +0100, Ian Jackson wrote:
Is there some upstream-friendly way of achieving the same
On Wed, Jun 24, 2015 at 02:06:02PM +0200, Juergen Gross wrote:
Hi,
my qemu integrated pvUSB backend is now running stable enough to do
some basic performance measurements. I've passed a memory-stick with
about 90MB of data on it to a pv-domU. Then I read all the data on
it with tar and
On Tue, Jun 16, 2015 at 08:33:32AM +0100, Jan Beulich wrote:
On 15.06.15 at 18:19, stefano.stabell...@eu.citrix.com wrote:
On Thu, 11 Jun 2015, Jan Beulich wrote:
On 10.06.15 at 22:53, kon...@kernel.org wrote:
--- a/hw/xen/xen_pt.c
+++ b/hw/xen/xen_pt.c
@@ -785,7 +785,9 @@ out:
On Wed, Jun 24, 2015 at 02:04:45PM +0200, Roger Pau Monné wrote:
El 24/06/15 a les 13.52, Boris Ostrovsky ha escrit:
On 06/24/2015 06:14 AM, Roger Pau Monné wrote:
El 24/06/15 a les 12.05, Jan Beulich ha escrit:
On 24.06.15 at 11:47, roger@citrix.com wrote:
What needs to be done
On Thu, Jun 18, 2015 at 10:35:37AM +0100, Jan Beulich wrote:
On 18.06.15 at 11:18, yang.z.zh...@intel.com wrote:
Jan Beulich wrote on 2015-06-18:
On 18.06.15 at 10:53, yang.z.zh...@intel.com wrote:
Jan Beulich wrote on 2015-06-18:
On 18.06.15 at 10:20, jbeul...@suse.com wrote:
Apart
On Wed, Jun 17, 2015 at 03:26:10PM +0100, Ian Campbell wrote:
On Wed, 2015-06-17 at 15:18 +0100, Stefano Stabellini wrote:
On Wed, 17 Jun 2015, Ian Campbell wrote:
On Wed, 2015-06-17 at 14:40 +0100, Stefano Stabellini wrote:
On Wed, 17 Jun 2015, Ian Campbell wrote:
On Wed,
-static bool_t pci_cfg_ok(struct domain *currd, bool_t write,
- unsigned int start, unsigned int size)
+static bool_t pci_cfg_ok(struct domain *currd, unsigned int start,
+ unsigned int size, uint32_t *write)
{
uint32_t machine_bdf;
On Wed, Jun 17, 2015 at 09:42:11PM +0200, Marek Marczykowski-Górecki wrote:
On Thu, May 28, 2015 at 01:45:08AM +0200, Marek Marczykowski-Górecki wrote:
On Thu, Apr 30, 2015 at 04:47:44PM +0200, Marek Marczykowski-Górecki wrote:
Hi,
What is the proper way to handle shared pages (either
On Mon, Jun 22, 2015 at 06:55:12PM +0100, Stefano Stabellini wrote:
Hi Roger,
given that this patch series is actually using the Xen hvm builder, I
take that all the PVH code paths in Xen or the guest kernel are not
actually used, correct? This is more like PV on HVM without QEMU, right?
On Mon, Jun 22, 2015 at 08:13:35PM +0200, Marek Marczykowski-Górecki wrote:
On Mon, Jun 22, 2015 at 01:46:27PM -0400, Konrad Rzeszutek Wilk wrote:
On Wed, Jun 17, 2015 at 09:42:11PM +0200, Marek Marczykowski-Górecki wrote:
On Thu, May 28, 2015 at 01:45:08AM +0200, Marek Marczykowski-Górecki
On Mon, Jun 22, 2015 at 09:56:00AM -0400, Konrad Rzeszutek Wilk wrote:
From: Bob Liu bob@oracle.com
Patch 69b91ede5cab843dcf345c28bd1f4b5a99dacd9b
drivers: xen-blkback: delay pending_req allocation to connect_ring
exposed an problem that Xen blkfront has. There is a race
with XenStored
On Mon, Jun 22, 2015 at 09:20:04AM +0800, Bob Liu wrote:
On 06/09/2015 10:07 PM, Roger Pau Monné wrote:
El 09/06/15 a les 15.39, Konrad Rzeszutek Wilk ha escrit:
...
Roger, I put them (patches) on devel/for-jens-4.2 on
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
I
@oracle.com
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
drivers/block/xen-blkfront.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/block/xen-blkfront.c b/drivers/block/xen-blkfront.c
index d3c1a95..fc770b7 100644
--- a/drivers/block/xen-blkfront.c
+++ b/drivers
On June 23, 2015 3:21:17 AM EDT, Jan Beulich jbeul...@suse.com wrote:
On 22.06.15 at 21:31, konrad.w...@oracle.com wrote:
@@ -1804,8 +1804,12 @@ static bool_t pci_cfg_ok(struct domain *
start |= CF8_ADDR_HI(currd-arch.pci_cf8);
}
-return
On Fri, Jun 26, 2015 at 04:04:30PM +0100, Jan Beulich wrote:
(re-adding xen-devel)
On 26.06.15 at 15:38, li...@eikelenboom.it wrote:
On 2015-06-26 14:41, Jan Beulich wrote:
On 26.06.15 at 13:02, li...@eikelenboom.it wrote:
Strange, i don't see *any* of your printk's being hit ... (xl
On Fri, Jun 26, 2015 at 02:47:38PM +0100, Ian Campbell wrote:
On Fri, 2015-06-26 at 09:28 -0400, Konrad Rzeszutek Wilk wrote:
I would advocate a more dynamic idea of GUEST_MMIO_* so that the toolstack
can allocate those with headroom. Perhaps stash it at the far far end
of the guest
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git stable/for-jens-4.2
in your 'for-4.2/drivers' branch. It is late - for which I am terrible
sorry! The patches have been sitting in my branch for two weeks - except
the last patch which
On Tue, Jun 02, 2015 at 04:48:25PM +0100, Malcolm Crossley wrote:
On 02/06/15 15:34, Konrad Rzeszutek Wilk wrote:
On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote:
On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley
On Wed, Jun 10, 2015 at 02:34:00PM +0200, Roger Pau Monné wrote:
Hello,
The discussion in [1] lead to an agreement of the missing pieces in PVH
(or HVM without a device-model) in order to progress with it's
implementation.
One of the missing pieces is a new boot ABI, that replaces the
implementations and mandating
op-err to use XEN_PCI_ERR_* and stick in op-result -EXX if the
opcode wants it is the step in the right direction.
Signed-off-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
---
v2: Update the commit with the discovery.
---
xen/include/public/io/pciif.h | 6 --
1 file
On Fri, Jun 12, 2015 at 07:31:25PM +0200, Martin Pohlack wrote:
On 12.06.2015 16:43, Jan Beulich wrote:
On 12.06.15 at 16:31, mpohl...@amazon.com wrote:
The 1ms is just a random number. I would actually suggest to allow a
sysadmin or hotpatch management tooling to specify how long one is
On Fri, Jun 12, 2015 at 08:36:29PM +0200, Martin Pohlack wrote:
On 12.06.2015 18:39, Konrad Rzeszutek Wilk wrote:
On Fri, Jun 12, 2015 at 05:17:13PM +0100, Andrew Cooper wrote:
On 12/06/15 17:09, Konrad Rzeszutek Wilk wrote:
The _GET_STATUS does not enforce this and can take longer giving
On Fri, Jun 12, 2015 at 01:51:08PM +0200, Martin Pohlack wrote:
On 08.06.2015 17:19, Konrad Rzeszutek Wilk wrote:q
Heh - :q, well now I know what editor camp you are in :-)
[...]
There is a nice part of the old code check - you
can check (and deal with) patching an already patched code
On Fri, Jun 12, 2015 at 04:31:12PM +0200, Martin Pohlack wrote:
On 12.06.2015 16:03, Konrad Rzeszutek Wilk wrote:
On Fri, Jun 12, 2015 at 01:39:05PM +0200, Martin Pohlack wrote:
On 15.05.2015 21:44, Konrad Rzeszutek Wilk wrote:
[...]
## Hypercalls
We will employ the sub operations
On Fri, Jun 12, 2015 at 05:17:13PM +0100, Andrew Cooper wrote:
On 12/06/15 17:09, Konrad Rzeszutek Wilk wrote:
The _GET_STATUS does not enforce this and can take longer giving us
more breathing room - and also unbounded time - which means if
we were to try to cancel it (say it had run
On Thu, Jun 11, 2015 at 10:43:08AM +0200, Roger Pau Monné wrote:
El 10/06/15 a les 20.55, Konrad Rzeszutek Wilk ha escrit:
On Wed, Jun 10, 2015 at 02:34:00PM +0200, Roger Pau Monné wrote:
Hello,
The discussion in [1] lead to an agreement of the missing pieces in PVH
(or HVM without
On Fri, Jun 12, 2015 at 02:51:02PM +0100, Jan Beulich wrote:
On 12.06.15 at 15:21, konrad.w...@oracle.com wrote:
On Thu, Jun 11, 2015 at 09:35:51AM +0100, Jan Beulich wrote:
On 05.06.15 at 13:28, jbeul...@suse.com wrote:
Qemu shouldn't be fiddling with this bit directly, as the
On Sat, Jun 13, 2015 at 12:43:14AM +0800, Ting-Wei Lan wrote:
When using Linux = 3.19 as the dom0 kernel, characters on the screen become
broken after the graphic driver is loaded. The commit that breaks it is
(found by git bisect):
On June 15, 2015 5:45:09 AM EDT, Jan Beulich jbeul...@suse.com wrote:
On 12.06.15 at 22:57, konrad.w...@oracle.com wrote:
The earlier comment says that errno values go in op-err.
However all implementations (NetBSD, Linux) of the most
common operations use XEN_PCI_ERR_* instead of -EXX values.
On Thu, Jun 11, 2015 at 08:18:27AM +0100, Jan Beulich wrote:
On 10.06.15 at 20:55, konrad.w...@oracle.com wrote:
On Wed, Jun 10, 2015 at 02:34:00PM +0200, Roger Pau Monné wrote:
The first three notes contain information about the guest kernel and
the Xen hypercall ABI version. The
Author: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Fri Apr 3 16:02:29 2015 -0400
libxl: In libxl_set_vcpuonline check for maximum number of VCPUs
against the cpumap.
Now backported to staging-4.5. I fixed up the conflict, correctly I
think.
Yes, looks correctly.
Ian
On Fri, Jun 12, 2015 at 01:39:05PM +0200, Martin Pohlack wrote:
On 15.05.2015 21:44, Konrad Rzeszutek Wilk wrote:
[...]
## Hypercalls
We will employ the sub operations of the system management hypercall
(sysctl).
There are to be four sub-operations:
* upload the payloads
On Thu, Jun 11, 2015 at 09:35:51AM +0100, Jan Beulich wrote:
On 05.06.15 at 13:28, jbeul...@suse.com wrote:
Qemu shouldn't be fiddling with this bit directly, as the hypervisor
may (and now does) use it for its own purposes. Provide it with a
replacement interface, allowing the hypervisor
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to use it which
conflicts with QEMU.
How does it conflict?
This manifests itself such that the first
On Mon, Jun 01, 2015 at 04:43:53PM +0100, Ross Lagerwall wrote:
On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback
On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
On 01/06/15 16:43, Ross Lagerwall wrote:
On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
When doing passthrough of a PCI device for an HVM guest, don't
On Mon, Jun 01, 2015 at 10:36:25AM +0100, Lars Kurth wrote:
Hi,
in accordance with the project's governance, I would like to put the
following text changes to a committer vote (committers are on the TO list).
The discussion leading to the changes can be found at
On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote:
On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
On 01/06/15 16:43, Ross Lagerwall wrote:
On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
On Fri, May 29
On July 1, 2015 7:42:33 AM EDT, Xu, Quan quan...@intel.com wrote:
-Original Message-
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Konrad
Rzeszutek Wilk
Sent: Monday, March 30, 2015 11:27 PM
To: ian.campb...@citrix.com; ian.jack
On Sat, Jun 27, 2015 at 07:27:44PM -0400, Don Slutz wrote:
From: Don Slutz dsl...@verizon.com
This adds synchronization of the 6 vcpu registers (only 32bits of
them) that vmport.c needs between Xen and QEMU.
This is to avoid a 2nd and 3rd exchange between QEMU and Xen to
fetch and put
On Sat, Jun 27, 2015 at 11:47:49AM -0600, Jens Axboe wrote:
On 06/23/2015 06:33 PM, Konrad Rzeszutek Wilk wrote:
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.2
in your 'for-4.2/drivers' branch
:
On 06/15/2015 09:03 PM, Ting-Wei Lan wrote:
於 一,2015-06-15 於 14:55 -0400,Konrad Rzeszutek Wilk 提到:
On Sat, Jun 13, 2015 at 12:43:14AM +0800, Ting-Wei Lan
wrote:
When using Linux = 3.19 as the dom0 kernel, characters
on
the
screen become
On Fri, Jun 26, 2015 at 03:28:24AM +0200, Marek Marczykowski-Górecki wrote:
On Mon, Jun 22, 2015 at 03:14:16PM -0400, Daniel De Graaf wrote:
The reason that gntdev_release didn't have a lock is because there are not
supposed to be any references to the areas pointed to by priv-maps when it
601 - 700 of 3573 matches
Mail list logo