flight 57502 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57502/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect
test-amd64-amd64-pair
Hi all,
We found that qemu started up failed. This problem was triggered many times in
a continuous period of time. Any ideas?
Qemu log:
char device redirected to /dev/pts/13
device model pid = 5234
xen: shared page at pfn feffd
xen: buffered io page at pfn feffb
bind interdomain ioctl error 22
q
В Fri, 29 May 2015 22:58:43 +0200
Daniel Kiper пишет:
> Another questions is why grub_relocator_alloc_chunk_addr() does not consult
> EFI
> memory map if grub_relocator_alloc_chunk_align() does. Should not we fix it?
My best guess is that grub_relocator_alloc_chunk_addr() gets target
from elsew
flight 57517 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57517/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 11 guest-start fail REGR. vs. 53854
test-amd64-amd64-libvirt
On Sat, May 30, 2015 at 10:08:21AM +0800, Chen Baozi wrote:
> Hi Julien,
>
> On Fri, May 29, 2015 at 05:08:08PM +0100, Julien Grall wrote:
> > On 29/05/15 16:55, Ian Campbell wrote:
> > > On Fri, 2015-05-29 at 16:44 +0100, Julien Grall wrote:
> > >
> > >>> +name = GCSPRINTF("cpu@%lx", mpi
On Fri, May 29, 2015 at 04:49:42PM +0100, Julien Grall wrote:
> Hi Chen,
>
> On 28/05/15 11:15, Chen Baozi wrote:
> > From: Chen Baozi
> >
> > According to ARM CPUs bindings, the reg field should match the MPIDR's
> > affinity bits. We will use AFF0 and AFF1 when constructing the reg value
> > o
Hi Julien,
On Fri, May 29, 2015 at 05:08:08PM +0100, Julien Grall wrote:
> On 29/05/15 16:55, Ian Campbell wrote:
> > On Fri, 2015-05-29 at 16:44 +0100, Julien Grall wrote:
> >
> >>> +name = GCSPRINTF("cpu@%lx", mpidr_aff);
> >>
> >> It's not necessary to change the cpu@.
> >
> > AIUI it
flight 57498 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57498/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 56492
test-amd64-i386-xl-qemuu-win
flight 57490 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57490/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail in 57378 REGR. vs. 57312
Tests which are faili
flight 57488 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57488/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 14 guest-saverestore.2fail REGR. vs. 57419
test-amd64-amd64-xl-
binutils 2.22 changed ld default from --copy-dt-needed-entries
to -no-copy-dt-needed-entries. This revealed that some objects
are linked implicitly with libtinfo and newer ld fails to build
relevant executables.
Below is short explanation why we should not do that...
http://fedoraproject.org/wiki
On Thu, 28 May 2015 16:28:37 -0400 Dan Streetman wrote:
> Change frontswap single pointer to a singly linked list of frontswap
> implementations. Update Xen tmem implementation as register no longer
> returns anything.
>
> Frontswap only keeps track of a single implementation; any implementatio
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
No changes since v5.
Signed-off-by: Elena Ufimtseva
Reviewed-by: Jan Beulich
---
xen/drivers/passthrough/vtd/d
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH mode.
New Xen command line option rmrr allows to specify
such devices and memory regions. These regions are a
From: Elena Ufimtseva
Signed-off-by: Elena Ufimtseva
---
xen/include/xen/pci.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h
index 3908146..414106a 100644
--- a/xen/include/xen/pci.h
+++ b/xen/include/xen/pci.h
@@ -33,6 +33,8 @@
#define PCI
From: Elena Ufimtseva
v6 of extra rmrr series with addressed comments from Jan Beulich.
Any suggestions are welcome.
Add Xen command line option rmrr to specify RMRR
regions for devices that are not defined in ACPI thus
causing IO Page Fault while booting dom0 in PVH mode.
These additional regi
From: Elena Ufimtseva
For sbdf'si parsing in rmrr command line add __parse_pci with addtional
parameter def_seg. __parse_pci will help to identify if segment was
found
in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not affected.
Signed
From: Elena Ufimtseva
Release memory allocated for scope.devices when disabling
dmar units. Also set device count after memory allocation when
device scope parsing.
Changes in v2:
- release memory for devices scope on error paths in acpi_parse_one_drhd
and acpi_parse_one_atsr and set the count
Hey,
Sorry for late reply but I was busy with our internal EFI stuff. We did
more tests and some fixes and it seems that everything is going in right
direction. Well, I hope... :-))) Right now I am going to continue my work
on upstream EFI + GRUB2 + Xen stuff. I think that I will be able to releas
On Thu, May 28, 2015 at 10:57 PM, Tomi Valkeinen wrote:
>
>
> On 29/05/15 03:36, Luis R. Rodriguez wrote:
>> On Wed, May 27, 2015 at 1:04 PM, Luis R. Rodriguez wrote:
>>> On Tue, May 26, 2015 at 12:40:08PM -0500, Bjorn Helgaas wrote:
On Fri, May 22, 2015 at 02:23:41AM +0200, Luis R. Rodrigue
On 05/29/15 10:49, Ian Campbell wrote:
> On Fri, 2015-05-29 at 15:40 +0100, Jan Beulich wrote:
>>> I've mentioned it at least twice now but nobody seems to think it is of
>>> note that even with the current settings it does the right thing about 1
>>> time in 10? Is Win7 really expected to behave s
flight 57474 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57474/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-multivcpu 3 host-install(3) broken pass in 57411
test-armhf-armhf-xl-credit2 3
Add support for handling PMU interrupts for PV(H) guests.
VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush
hypercall. This allows the guest to access PMU MSR values that are stored in
VPMU context which is shared between hypervisor and domain, thus avoiding
traps to hy
Since PMU is now not HVM specific we can move VPMU-related files up from
arch/x86/hvm/ directory.
Specifically:
arch/x86/hvm/vpmu.c -> arch/x86/cpu/vpmu.c
arch/x86/hvm/svm/vpmu.c -> arch/x86/cpu/vpmu_amd.c
arch/x86/hvm/vmx/vpmu_core2.c -> arch/x86/cpu/vpmu_intel.c
include/asm-x86/h
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops
for VCPU are not initialized (which is the case, for example, for PV guests that
are not "VPMU-enlightened") access to MSRs will return failure.
Dump VPMU state for all domains (HVM and PV) when requested.
Signed-off-by:
No need to compute those masks on every MSR access.
Also, when checking MSR_P6_EVNTSELx registers make sure that bit 21
is not set.
Signed-off-by: Boris Ostrovsky
---
Changes in v23:
* Mention new test for bit MSR_P6_EVNTSELx[21] in commit message
xen/arch/x86/hvm/vmx/vpmu_core2.c | 28 ++
Move some VPMU initilization operations into __initcalls to avoid performing
same tests and calculations for each vcpu.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
xen/arch/x86/hvm/svm/vpmu.c | 106 --
xen/arch/x86/hvm/vmx/vpmu_core2.c | 151 ++
Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged
domain (dom0) profile both itself (and the hypervisor) and the guests. While
this mode is on profiling in guests is disabled.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
xen/arch/x86/hvm/vpmu.c | 40
The two routines share most of their logic.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Dietmar Hahn
---
xen/arch/x86/hvm/vpmu.c| 75 --
xen/include/asm-x86/hvm/vpmu.h | 14 ++--
2 files changed, 41 insertions(+), 48 deletions(-)
diff --git a
A number of fields of PMU control MSRs are defined as Reserved. AMD
documentation requires that such fields are preserved when the register
is written by software.
Add checks to amd_vpmu_do_wrmsr() to make sure that guests don't attempt
to modify those bits.
Signed-off-by: Boris Ostrovsky
---
N
Add runtime interface for setting PMU mode and flags. Three main modes are
provided:
* XENPMU_MODE_OFF: PMU is not virtualized
* XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts.
* XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0
can profile itself
Export Xen's symbols as {} triplet via new XENPF_get_symbol
hypercall
Signed-off-by: Boris Ostrovsky
Acked-by: Daniel De Graaf
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/arch/x86/platform_hypercall.c | 28 +++
xen/common/sym
Changes in v23:
* In patch 2, replaced LVTPC and xen_pmu__ctxt unions in struct
xen_pmu_arch with pad placeholders. They become actual memobers (as
before) in patch 12, when they are first used.
* Added dummy struct member to ARM's struct xen_pmu_data definition
(patch 2)
* Clarified changes
Save VPMU state during context switch for both HVM and PV(H) guests.
A subsequent patch ("x86/VPMU: NMI-based VPMU support") will make it possible
for vpmu_switch_to() to call vmx_vmcs_try_enter()->vcpu_pause() which needs
is_running to be correctly set/cleared. To prepare for that, call
context_
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an
error was encountered during MSR processing (instead of stating that the access
was to a VPMU register).
As part of this patch we also check for validity of certain MSR accesses right
when we determine which register i
Code for initializing/tearing down PMU for PV guests
Signed-off-by: Boris Ostrovsky
Acked-by: Daniel De Graaf
Acked-by: Jan Beulich
---
tools/flask/policy/policy/modules/xen/xen.te | 4 +
xen/arch/x86/domain.c| 2 +
xen/arch/x86/hvm/hvm.c | 1
Add pmu.h header files, move various macros and structures that will be
shared between hypervisor and PV guests to it.
Move MSR banks out of architectural PMU structures to allow for larger sizes
in the future. The banks are allocated immediately after the context and
PMU structures store offsets
vpmu structure will be used for both HVM and PV guests. Move it from
hvm_vcpu to arch_vcpu.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
Reviewed-by: Kevin Tian
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/include/asm-x86/domain.h | 2 ++
xen/include/asm-x86/hvm/vcpu.h
Memory management is hard[citation needed]. Furthermore, it isn't helped by
the inconsistent use of terms through the code, or that some terms have
changed meaning over time.
Describe the currently-used terms in a more practical fashon, so new code has
a concrete reference.
Signed-off-by: Andrew
On 29/05/15 12:17, M A Young wrote:
>
>>> I did a bit of testing - xen-4.5.1-rc1 built on Fedora 22 (gcc5) doesn't
>>> boot for me, but if I replace xen.gz with one from the same code built on
>>> Fedora 21 (gcc4) then it does boot. There are rpms and build logs
>>> available via
>>> http://cop
On Thu, May 28, 2015 at 10:00:09PM -0700, Christoph Hellwig wrote:
> On Fri, May 29, 2015 at 01:10:44AM +0200, Luis R. Rodriguez wrote:
> > Great, thanks. This seems to be in alignment with those who have all along
> > said
> > they've used EXPORT_SYMBOL() to mean what EXPORT_SYMBOL_GPL() users no
On Fri, May 29, 2015 at 05:24:53PM +0100, Ian Campbell wrote:
[...]
> if (be->vif != NULL)
> return 0;
> @@ -417,12 +409,23 @@ static int backend_create_xenvif(struct backend_info
> *be)
> return (err < 0) ? err : -EINVAL;
> }
>
> + script = xenbus_rea
flight 57470 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57470/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
53018
test-amd64-i
On 29/05/15 17:45, Julien Grall wrote:
> On 29/05/15 17:41, Andrew Cooper wrote:
>> On 29/05/15 17:20, Julien Grall wrote:
>>> On 29/05/15 16:51, Julien Grall wrote:
> diff --git a/xen/include/asm-arm/config.h b/xen/include/asm-arm/config.h
> index 3b23e05..817c216 100644
> --- a/xen/in
On Fri, May 29, 2015 at 8:51 AM, Dario Faggioli
wrote:
> On Mon, 2015-05-25 at 19:05 -0500, Chong Li wrote:
>
>> diff --git a/xen/common/domctl.c b/xen/common/domctl.c
>> index 28aea55..8143c44 100644
>> --- a/xen/common/domctl.c
>> +++ b/xen/common/domctl.c
>
> /* Set or get info? */
> #define X
On 29/05/15 17:41, Andrew Cooper wrote:
> On 29/05/15 17:20, Julien Grall wrote:
>> On 29/05/15 16:51, Julien Grall wrote:
diff --git a/xen/include/asm-arm/config.h b/xen/include/asm-arm/config.h
index 3b23e05..817c216 100644
--- a/xen/include/asm-arm/config.h
+++ b/xen/include/
On 29/05/15 17:20, Julien Grall wrote:
> On 29/05/15 16:51, Julien Grall wrote:
>>> diff --git a/xen/include/asm-arm/config.h b/xen/include/asm-arm/config.h
>>> index 3b23e05..817c216 100644
>>> --- a/xen/include/asm-arm/config.h
>>> +++ b/xen/include/asm-arm/config.h
>>> @@ -47,7 +47,11 @@
>>> #d
On Wed, 2015-05-27 at 17:04 +0100, Ian Campbell wrote:
> Looking at the netback side though it seems like netback_remove is
> switching to state=Closed _before_ it calls kobject_uevent(...,
> KOBJ_OFFLINE) and it is this which generates the call to netback_uevent
> which tries and fails to read scr
When we come to tear things down in netback_remove() and generate the
uevent it is possible that the xenstore directory has already been
removed (details below).
In such cases netback_uevent() won't be able to read the hotplug
script and will write a xenstore error node.
A recent change to the hy
drivers/net/xen-netback/netback.c: In function ‘xenvif_tx_build_gops’:
drivers/net/xen-netback/netback.c:1253:8: warning: format ‘%lu’ expects
argument of type ‘long unsigned int’, but argument 5 has type ‘int’ [-Wformat=]
(txreq.offset&~PAGE_MASK) + txreq.size);
^
txreq.offset an
On 29/05/15 16:51, Julien Grall wrote:
>> diff --git a/xen/include/asm-arm/config.h b/xen/include/asm-arm/config.h
>> index 3b23e05..817c216 100644
>> --- a/xen/include/asm-arm/config.h
>> +++ b/xen/include/asm-arm/config.h
>> @@ -47,7 +47,11 @@
>> #define NR_CPUS 128
>> #endif
>>
>> +#ifdef CO
On 29/05/15 17:24, Ian Campbell wrote:
> --- a/drivers/net/xen-netback/xenbus.c
> +++ b/drivers/net/xen-netback/xenbus.c
> @@ -235,6 +235,7 @@ static int netback_remove(struct xenbus_device *dev)
> kobject_uevent(&dev->dev.kobj, KOBJ_OFFLINE);
> xen_unregister_watchers(b
Hi Chen,
On 28/05/15 11:15, Chen Baozi wrote:
> From: Chen Baozi
>
> When a guest uses vGICv2, the maximum number of vCPU it can support
> should not be as many as MAX_VIRT_CPUS, which is 128 at the moment.
> So the domain_max_vcpus should return the value according to the vGIC
> version the dom
On Fri, May 29, 2015 at 05:22:04PM +0100, Ian Campbell wrote:
> drivers/net/xen-netback/netback.c: In function ‘xenvif_tx_build_gops’:
> drivers/net/xen-netback/netback.c:1253:8: warning: format ‘%lu’ expects
> argument of type ‘long unsigned int’, but argument 5 has type ‘int’
> [-Wformat=]
>
On 05/29/2015 12:00 PM, Paul Durrant wrote:
-Original Message-
From: Ross Philipson [mailto:ross.philip...@gmail.com]
Sent: 29 May 2015 16:35
To: Ian Campbell; Paul Durrant
Cc: Andrew Cooper; xen-devel; Jan Beulich; Ian Jackson
Subject: Re: [Xen-devel] ACPI shutdown unreliable with win7?
>>> On 27.05.15 at 17:25, wrote:
> +static XSM_INLINE int xsm_soft_reset(XSM_DEFAULT_ARG struct domain *d1,
> + struct domain *d2)
Hard tabs used here ...
> +static inline int xsm_soft_reset (xsm_default_t def, struct domain *d1,
> +
On 05/29/2015 12:00 PM, Paul Durrant wrote:
-Original Message-
From: Ross Philipson [mailto:ross.philip...@gmail.com]
Sent: 29 May 2015 16:35
To: Ian Campbell; Paul Durrant
Cc: Andrew Cooper; xen-devel; Jan Beulich; Ian Jackson
Subject: Re: [Xen-devel] ACPI shutdown unreliable with win7?
On 29/05/15 16:55, Ian Campbell wrote:
> On Fri, 2015-05-29 at 16:44 +0100, Julien Grall wrote:
>
>>> +name = GCSPRINTF("cpu@%lx", mpidr_aff);
>>
>> It's not necessary to change the cpu@.
>
> AIUI it is conventional in DT for this to match the first reg entry.
Well, it's conventional whe
> -Original Message-
> From: Ross Philipson [mailto:ross.philip...@gmail.com]
> Sent: 29 May 2015 16:35
> To: Ian Campbell; Paul Durrant
> Cc: Andrew Cooper; xen-devel; Jan Beulich; Ian Jackson
> Subject: Re: [Xen-devel] ACPI shutdown unreliable with win7?
>
> On 05/29/2015 11:11 AM, Ian C
On Fri, 2015-05-29 at 16:44 +0100, Julien Grall wrote:
> > +name = GCSPRINTF("cpu@%lx", mpidr_aff);
>
> It's not necessary to change the cpu@.
AIUI it is conventional in DT for this to match the first reg entry.
Ian.
>
> Regards,
>
___
X
>>> On 29.05.15 at 17:34, wrote:
>> From: Paul Durrant
>> Sent: 29 May 2015 16:07
>> No, you'd see something. Perhaps our ACPI lid/power switch code is just
>> buggy then?
>
> I already said this to Ian, but for the record... From my reading of the
> ACPI spec (v 5.0, page 23 glossary entry) the
Hi Chen,
On 28/05/15 11:15, Chen Baozi wrote:
> From: Chen Baozi
>
> GIC-500 supports up to 128 cores in a single SoC. Increase MAX_VIRT_CPUS
> to 128 on arm64.
This should be the last patch. You still have to modify domain_max_vcpus
before being able to increase the number of vCPUS handled.
>
> -Original Message-
> From: Paul Durrant
> Sent: 29 May 2015 16:35
> To: Ian Campbell
> Cc: 'Jan Beulich'; Andrew Cooper; Ian Jackson; 'xen-devel'
> Subject: RE: [Xen-devel] ACPI shutdown unreliable with win7?
>
> > -Original Message-
> > From: Paul Durrant
> > Sent: 29 May 2015 1
Hi Chen,
On 28/05/15 11:15, Chen Baozi wrote:
> From: Chen Baozi
>
> According to ARM CPUs bindings, the reg field should match the MPIDR's
> affinity bits. We will use AFF0 and AFF1 when constructing the reg value
> of the guest at the moment, for it is enough for the current max vcpu
> number.
On 05/29/2015 07:37 AM, Wei Liu wrote:
This patch does two thing:
The original code erroneously fills in xc_hvm_build_args before
generating vmemranges. The effect is that guest memory is populated
without vNUMA information. Move the hunk to right place to fix this.
Move the subtraction of vide
Hi Chen,
On 28/05/15 11:15, Chen Baozi wrote:
> From: Chen Baozi
>
> According to ARM CPUs bindings, the reg field should match the MPIDR's
> affinity bits. We will use AFF0 and AFF1 when constructing the reg value
> of the guest at the moment, for it is enough for the current max vcpu
> number.
On Fri, May 29, 2015 at 11:02:16AM -0400, Boris Ostrovsky wrote:
> On 05/29/2015 07:37 AM, Wei Liu wrote:
> >Make the setup process similar to PV counterpart. That is, to allocate a
> >P2M array that covers the whole memory range and start from there. This
> >is clearer than using an array with no
On 05/29/2015 11:11 AM, Ian Campbell wrote:
On Fri, 2015-05-29 at 16:06 +0100, Paul Durrant wrote:
FWIW We appear to wait 200s, if we were seeing failures due to windows
update then I'd be inclined to extend that, but I think right now that
would be premature, unless WU happens with no status on
> -Original Message-
> From: Paul Durrant
> Sent: 29 May 2015 16:07
> To: Ian Campbell
> Cc: Jan Beulich; Andrew Cooper; Ian Jackson; xen-devel
> Subject: RE: [Xen-devel] ACPI shutdown unreliable with win7?
>
> > -Original Message-
> > From: Ian Campbell [mailto:ian.campb...@citrix
Hi Takashi,
On Fri, 29 May 2015 14:43:14 +0200 Takashi Iwai wrote:
>
> For the sound bits,
> Acked-by: Takashi Iwai
Thanks, noted.
--
Cheers,
Stephen Rothwells...@canb.auug.org.au
pgp1PQXudZGcP.pgp
Description: OpenPGP digital signature
Hi Chen,
On 28/05/15 11:15, Chen Baozi wrote:
> From: Chen Baozi
>
> Use cpumask_t instead of unsigned long which can only express 64 cpus at
> the most. Add the {gicv2|gicv3}_sgir_to_cpumask in corresponding vGICs
> to translate GICD_SGIR/ICC_SGI1R_EL1 to vcpu_mask for vgic_to_sgi.
This patch
On Fri, 2015-05-29 at 16:06 +0100, Paul Durrant wrote:
> > FWIW We appear to wait 200s, if we were seeing failures due to windows
> > update then I'd be inclined to extend that, but I think right now that
> > would be premature, unless WU happens with no status on the screen.
> >
>
> No, you'd se
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: 29 May 2015 15:36
> To: Paul Durrant
> Cc: Jan Beulich; Andrew Cooper; Ian Jackson; xen-devel
> Subject: Re: [Xen-devel] ACPI shutdown unreliable with win7?
>
> On Fri, 2015-05-29 at 15:25 +0100, Paul Durran
On 05/29/2015 07:37 AM, Wei Liu wrote:
Make the setup process similar to PV counterpart. That is, to allocate a
P2M array that covers the whole memory range and start from there. This
is clearer than using an array with no holes in it.
Also the dummy layout should take MMIO hole into considerati
On Fri, 2015-05-29 at 15:40 +0100, Jan Beulich wrote:
> > I've mentioned it at least twice now but nobody seems to think it is of
> > note that even with the current settings it does the right thing about 1
> > time in 10? Is Win7 really expected to behave so randomly here?
>
> Perhaps not expect
On Fri, 2015-05-29 at 14:47 +0100, Stefano Stabellini wrote:
> Try to use "xen-qemudepriv-$domname" first, then "xen-qemudepriv-base" +
> domid, finally "xen-qemudepriv-shared" and root if everything else fails.
>
> The uids need to be manually created by the user or, more likely, by the
> xen pac
On Fri, 2015-05-29 at 15:31 +0100, Andrew Cooper wrote:
> On 29/05/15 15:00, Ian Campbell wrote:
> > On Fri, 2015-05-29 at 14:28 +0100, Jan Beulich wrote:
> > On 29.05.15 at 15:14, wrote:
> >>> On 29/05/15 14:04, Jan Beulich wrote:
> >>> On 29.05.15 at 14:54, wrote:
> > On Fri, 2015-0
On 29 May 2015, at 08:53, Yuzhou (C) wrote:
> Hi,
>
> About rx zerocopy, I have a question:
>
> If some application make a socket, then listen and accept, the client
> sends packets to it, but it doesn't recv from this socket right now, all
> persistent grant page would be in used
improve readability.
Patch was compile tested with x86_64_defconfig +
CONFIG_HYPERVISOR_GUEST=y,CONFIG_PARAVIRT=y,CONFIG_XEN=y:
Patch is against 4.1-rc5 (localversion-next is -next-20150529)
Signed-off-by: Nicholas Mc Guire
Reviewed-by: Boris Ostrovsky < boris.ostrov...@oracle.com>
---
ar
>>> On 29.05.15 at 16:00, wrote:
> On Fri, 2015-05-29 at 14:28 +0100, Jan Beulich wrote:
>> >>> On 29.05.15 at 15:14, wrote:
>> > On 29/05/15 14:04, Jan Beulich wrote:
>> > On 29.05.15 at 14:54, wrote:
>> >>> On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
>> If win7 doesn't shut
2015-05-29 4:15 GMT-07:00 Dario Faggioli :
> On Tue, 2015-05-26 at 09:59 +0100, Ian Campbell wrote:
> > On Mon, 2015-05-25 at 18:59 -0500, Chong Li wrote:
> >
> > This series arrived in my mailbox as 5 distinct mails.
> >
> > Please use git send-email such that the mails arrive as a single email
>
On Fri, 2015-05-29 at 15:25 +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Ian Campbell [mailto:ian.campb...@citrix.com]
> > Sent: 29 May 2015 14:14
> > To: Jan Beulich
> > Cc: Andrew Cooper; Paul Durrant; Ian Jackson; xen-devel
> > Subject: Re: [Xen-devel] ACPI shutdown unreli
Hi Chen,
On 28/05/15 11:15, Chen Baozi wrote:
> From: Chen Baozi
>
> There are 3 places to change:
>
> * Initialise vMPIDR value in vcpu_initialise()
> * Find the vCPU from vMPIDR affinity information when accessing GICD
> registers in vGIC
> * Find the vCPU from vMPIDR affinity information w
>>> On 29.05.15 at 16:25, wrote:
>> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> How long is the test waiting for the OS to shut down though? If you get
> unlucky, Windows will wander off to Windows Update, download a bazillion
> patches and take more than an hour to shut down. If you’r
On 29/05/15 15:00, Ian Campbell wrote:
> On Fri, 2015-05-29 at 14:28 +0100, Jan Beulich wrote:
> On 29.05.15 at 15:14, wrote:
>>> On 29/05/15 14:04, Jan Beulich wrote:
>>> On 29.05.15 at 14:54, wrote:
> On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
>> If win7 doesn't shut
Hi Chen,
On 28/05/15 11:15, Chen Baozi wrote:
> From: Chen Baozi
>
> GICv3 restricts that the maximum number of CPUs in affinity 0 (one
> cluster) is 16. That is to say the upper 4 bits of affinity 0 is unused.
> Current implementation considers that AFF0 is equal to vCPUID, which
> makes all vC
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: 29 May 2015 14:14
> To: Jan Beulich
> Cc: Andrew Cooper; Paul Durrant; Ian Jackson; xen-devel
> Subject: Re: [Xen-devel] ACPI shutdown unreliable with win7?
>
> On Fri, 2015-05-29 at 14:04 +0100, Jan Beulich
> -Original Message-
> From: Don Slutz [mailto:don.sl...@gmail.com]
> Sent: 29 May 2015 14:23
> To: Michael S. Tsirkin; Paul Durrant
> Cc: Don Slutz; qemu-de...@nongnu.org; Stefano Stabellini; xen-devel
> Subject: Re: [Qemu-devel] [PATCH 1/1] Fix device listener interface for PCI to
> PCI b
Hi Vijay,
On 27/05/15 17:44, Vijay Kilari wrote:
>> ## Command Translation
>>
>> Of the existing GICv3 ITS commands, `MAPC`, `MAPD`, `MAPVI`/`MAPI` are
>> potentially time consuming commands as these commands creates entry in
>> the Xen ITS structures, which are used to validate other ITS commands
Try to use "xen-qemudepriv-$domname" first, then "xen-qemudepriv-base" +
domid, finally "xen-qemudepriv-shared" and root if everything else fails.
The uids need to be manually created by the user or, more likely, by the
xen package maintainer.
To actually secure QEMU when running in Dom0, we need
On Fri, 2015-05-29 at 14:28 +0100, Jan Beulich wrote:
> >>> On 29.05.15 at 15:14, wrote:
> > On 29/05/15 14:04, Jan Beulich wrote:
> > On 29.05.15 at 14:54, wrote:
> >>> On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
> If win7 doesn't shutdown given a power button request I'd be
On 05/29/2015 12:12 PM, Jan Beulich wrote:
On 28.05.15 at 18:32, wrote:
>> the macro will probably go out the window (or the first parameter will
>> need to be changed to VM_EVENT_##what instead of VM_EVENT_X86_##what) as
>> soon as ARM control register write events will come into play.
>
>
On Mon, 2015-05-25 at 19:05 -0500, Chong Li wrote:
> diff --git a/xen/common/domctl.c b/xen/common/domctl.c
> index 28aea55..8143c44 100644
> --- a/xen/common/domctl.c
> +++ b/xen/common/domctl.c
> @@ -841,6 +841,11 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t)
> u_domctl)
> cop
>>> On 29.05.15 at 15:30, wrote:
> @@ -1053,14 +1053,23 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE
> *SystemTable)
> efi_arch_video_init(gop, info_size, mode_info);
> }
>
> -efi_bs->GetMemoryMap(&efi_memmap_size, NULL, &map_key,
> - &efi_
As suggested by Andrew Cooper, this patch attempts to remove
some redundancy and allow for an easier time when adding vm_events
for new control registers in the future, by having a single
VM_EVENT_REASON_WRITE_CTRLREG vm_event type, meant to serve CR0,
CR3, CR4 and (newly introduced) XCR0. The actu
Hi Ian,
NIT: You used my Linaro email which I think is de-activated now :).
On 27/05/2015 13:48, Ian Campbell wrote:
> Here follows draft C based on previous feedback.
>
> Also at:
>
> http://xenbits.xen.org/people/ianc/vits/draftC.{pdf,html}
>
> I think I've captured most of the previous discuss
If calling ExitBootServices() fails, the memory map size may increase.
Allocate an extra page the first time around so that we hopefully
shouldn't have to reallocate the memory map. Allocate a new memory map
if needed, although this only a fallback, because some arches may use
boot services to allo
>>> On 29.05.15 at 15:14, wrote:
> On 29/05/15 14:04, Jan Beulich wrote:
> On 29.05.15 at 14:54, wrote:
>>> On Fri, 2015-05-22 at 10:08 +0100, Ian Campbell wrote:
If win7 doesn't shutdown given a power button request I'd be more
inclined to remove the setting in osstest for those fl
flight 57518 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57518/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
On 05/28/15 17:05, Michael S. Tsirkin wrote:
> On Thu, May 28, 2015 at 11:03:07PM +0200, Michael S. Tsirkin wrote:
>> On Thu, May 28, 2015 at 03:09:48PM -0400, Don Slutz wrote:
>>> On 05/28/15 08:28, Michael S. Tsirkin wrote:
On Thu, May 28, 2015 at 07:25:50AM -0400, Don Slutz wrote:
> On
1 - 100 of 173 matches
Mail list logo