>>> On 11.08.15 at 19:21, wrote:
> On 08/11/2015 05:19 AM, Jan Beulich wrote:
> On 24.07.15 at 19:54, wrote:
>>> On 07/23/2015 10:07 AM, Jan Beulich wrote:
Plus - is this in line with what the tools are doing? Aren't they
assuming !PV <=> native format context? I.e. don't you need
>
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: Tuesday, August 11, 2015 8:55 PM
> To: Ian Campbell
> Cc: Hu, Robert; wei.l...@citrix.com; xen-devel@lists.xen.org
> Subject: Re: OSSTEST -- nested test case development, RFC: ts-guest-destroy
> doesn't cal
Hi all,
Today's linux-next merge of the xen-tip tree got a conflict in:
arch/x86/xen/enlighten.c
between commit:
9261e050b686 ("x86/asm/tsc, x86/paravirt: Remove read_tsc() and read_tscp()
paravirt hooks")
from the tip tree and commit:
cd6f350a5460 ("xen/PMU: Initialization code for Xe
On 2015/8/12 4:43, Konrad Rzeszutek Wilk wrote:
> On Wed, Aug 05, 2015 at 09:03:06PM +0800, Shannon Zhao wrote:
>>
>>
>> On 2015/8/5 20:48, Julien Grall wrote:
>>> On 05/08/15 12:49, Shannon Zhao wrote:
>>> That's great!
>>> Keep in mind that many ARM platforms have non-PCI busses, so I t
Hi Julien,
On 2015/8/12 0:19, Julien Grall wrote:
> Hi Shannon,
>
> On 07/08/15 03:11, Shannon Zhao wrote:
>> 2. Create minimal DT to pass required information to Dom0
>> --
>> The minimal DT mainly passes Dom0 bootargs, address and size of
On Tue, Aug 11, 2015 at 11:24:24AM +0100, Andrew Cooper wrote:
> On 11/08/15 08:50, Shuai Ruan wrote:
> > On Fri, Aug 07, 2015 at 01:44:41PM +0100, Andrew Cooper wrote:
> >> On 07/08/15 09:00, Shuai Ruan wrote:
> > +goto skip;
> > +}
> > +
> > +
Enable VT-d Posted-Interrupts and add a command line
parameter for it.
Signed-off-by: Feng Wu
Reviewed-by: Kevin Tian
---
docs/misc/xen-command-line.markdown | 9 -
xen/drivers/passthrough/iommu.c | 3 +++
2 files changed, 11 insertions(+), 1 deletion(-)
diff --git a/docs/misc/xen-
Extend struct iremap_entry according to VT-d Posted-Interrupts Spec.
CC: Yang Zhang
CC: Kevin Tian
Signed-off-by: Feng Wu
Acked-by: Kevin Tian
---
v4:
- res_4 is not a bitfiled, correct it.
- Expose 'im' to remapped irte as well.
v3:
- Use u32 instead of u64 to define the bitfields in 'struct
This patch includes the following aspects:
- Add a global vector to wake up the blocked vCPU
when an interrupt is being posted to it (This
part was sugguested by Yang Zhang ).
- Adds a new per-vCPU tasklet to wakeup the blocked
vCPU. It can be used in the case vcpu_unblock
cannot be called
This patch adds the following arch hooks in scheduler:
- vmx_pre_ctx_switch_pi():
It is called before context switch, we update the posted
interrupt descriptor when the vCPU is preempted, go to sleep,
or is blocked.
- vmx_post_ctx_switch_pi()
It is called after context switch, we update the posted
When guest changes its interrupt configuration (such as, vector, etc.)
for direct-assigned devices, we need to update the associated IRTE
with the new guest vector, so external interrupts from the assigned
devices can be injected to guests without VM-Exit.
For lowest-priority interrupts, we use ve
This patch adds an API which is used to update the IRTE
for posted-interrupt when guest changes MSI/MSI-X information.
CC: Yang Zhang
CC: Kevin Tian
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Feng Wu
Acked-by: Kevin Tian
---
v5:
- Make some function parameters const
-
Add the utility to dump the posted format IRTE.
CC: Yang Zhang
CC: Kevin Tian
Signed-off-by: Feng Wu
---
v4:
- Newly added
xen/drivers/passthrough/vtd/utils.c | 41 -
1 file changed, 40 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/passthrough/vtd/
When a vCPU is running in Root mode and a notification event
has been injected to it. we need to set VCPU_KICK_SOFTIRQ for
the current cpu, so the pending interrupt in PIRR will be
synced to vIRR before VM-Exit in time.
CC: Kevin Tian
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-of
On 2015/8/11 23:52, Boris Ostrovsky wrote:
> On 08/11/2015 11:35 AM, Ian Campbell wrote:
>> On Tue, 2015-08-11 at 11:29 -0400, Boris Ostrovsky wrote:
>>> On 08/11/2015 10:21 AM, Ian Campbell wrote:
On Tue, 2015-08-11 at 15:19 +0100, Ian Campbell wrote:
> On Fri, 2015-08-07 at 10:11 +0800
This patch adds some helper functions to manipulate the
Posted-Interrupts Descriptor.
CC: Kevin Tian
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Feng Wu
---
v4:
- Newly added
xen/include/asm-x86/hvm/vmx/vmx.h | 21 +
1 file changed, 21 insertions(+)
This patch initializes the VT-d Posted-interrupt Descriptor.
CC: Kevin Tian
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Feng Wu
Acked-by: Kevin Tian
---
v3:
- Move pi_desc_init() to xen/arch/x86/hvm/vmx/vmcs.c
- Remove the 'inline' flag of pi_desc_init()
xen/arch/x86/h
Remove pointless casts.
Signed-off-by: Feng Wu
---
v5:
- Newly added.
xen/drivers/passthrough/vtd/utils.c | 16 +++-
1 file changed, 7 insertions(+), 9 deletions(-)
diff --git a/xen/drivers/passthrough/vtd/utils.c
b/xen/drivers/passthrough/vtd/utils.c
index 44c4ef5..162b764 100644
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt.
With VT-d Posted-Interrupts enabled, external interrupts from
direct-assigned devices can be delivered to guests without VMM
intervention when guest is running in non-root mode.
CC: Yang Zhang
CC: Kevin Tian
Signed-off-by: Fe
Extend struct pi_desc according to VT-d Posted-Interrupts Spec.
CC: Kevin Tian
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Feng Wu
Reviewed-by: Andrew Cooper
Acked-by: Kevin Tian
---
v3:
- Use u32 instead of u64 for the bitfield in 'struct pi_desc'
xen/include/asm-x86
Add the design doc for VT-d PI.
CC: Kevin Tian
CC: Yang Zhang
CC: Jan Beulich
CC: Keir Fraser
CC: Andrew Cooper
CC: George Dunlap
Signed-off-by: Feng Wu
Reviewed-by: Kevin Tian
---
docs/misc/vtd-pi.txt | 333 +++
1 file changed, 333 insertio
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt.
With VT-d Posted-Interrupts enabled, external interrupts from
direct-assigned devices can be delivered to guests without VMM
intervention when guest is running in non-root mode.
This patch adds variable 'iommu_intpost' to contr
This patch adds cmpxchg16b support for x86-64, so software
can perform 128-bit atomic write/read.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Feng Wu
---
v5:
- Change back the parameters of __cmpxchg16b() to __uint128_t *
- Remove pointless cast for 'ptr'
- Remove pointles
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt.
With VT-d Posted-Interrupts enabled, external interrupts from
direct-assigned devices can be delivered to guests without VMM
intervention when guest is running in non-root mode.
You can find the VT-d Posted-Interrtups Spec. in
Currently, we don't support urgent interrupt, all interrupts
are recognized as non-urgent interrupt, so we cannot send
posted-interrupt when 'SN' is set.
CC: Kevin Tian
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Feng Wu
---
v5:
- keep the vcpu_kick() at the end of vmx_de
On 2015/8/12 0:01, Julien Grall wrote:
> On 11/08/15 16:19, Ian Campbell wrote:
>>> IIRC we talked about it few months ago and you said that using balloon
>>> page will split in 4K the 1G/2M mapping done in the stage-2 p2m.
>>
>> Did I? Odd because I'm also of the opinion that alloc_ballooned_pag
>>> On 8/11/2015 at 07:26 PM, in message
<2015082655.ge7...@zion.uk.xensource.com>, Wei Liu
wrote:
> On Mon, Aug 10, 2015 at 06:35:23PM +0800, Chunyan Liu wrote:
> > Sysfs file has size=4096 but actual file content is less than that.
> > Current libxl_read_file_contents will treat it as e
>>> On 8/11/2015 at 07:27 PM, in message
<2015082702.gf7...@zion.uk.xensource.com>, Wei Liu
wrote:
> On Mon, Aug 10, 2015 at 06:35:24PM +0800, Chunyan Liu wrote:
> > Add pvusb APIs, including:
> > - attach/detach (create/destroy) virtual usb controller.
> > - attach/detach usb device
flight 60653 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60653/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Regressions which are
Wei Liu wrote:
> Virsh migrate expects an URI, not a host. We don't actually care what
> kind of transport it uses, the main objective is to test migration, so
> use xen+ssh for the time being.
>
> Signed-off-by: Wei Liu
> Cc: Ian Campbell
> Cc: Ian Jackson
> ---
> Cc: Jim Fehlig
>
> I once had
On Wed, Aug 05, 2015 at 09:03:06PM +0800, Shannon Zhao wrote:
>
>
> On 2015/8/5 20:48, Julien Grall wrote:
> >On 05/08/15 12:49, Shannon Zhao wrote:
> >That's great!
> >Keep in mind that many ARM platforms have non-PCI busses, so I think
> >we'll need an amba and a platform bus_notifi
On Tue, Aug 04, 2015 at 05:57:24PM +0530, Manish Jaggi wrote:
> -
> | PCI Pass-through in Xen ARM |
> -
> manish.ja...@caviumnetworks.com
> ---
>
>
Virsh migrate expects an URI, not a host. We don't actually care what
kind of transport it uses, the main objective is to test migration, so
use xen+ssh for the time being.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
Cc: Jim Fehlig
I once had email exchange with Jim and he sai
On Tue, Aug 11, 2015 at 06:21:18PM +0100, Andrew Cooper wrote:
> On 11/08/15 18:07, Wei Liu wrote:
> > On Tue, Aug 11, 2015 at 04:48:13PM +0100, Ian Campbell wrote:
> >> On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote:
> >>> It's the checkpoint file - i.e. the command line argument to xl
>
On Tue, Jul 28, 2015 at 03:28:16PM +0200, Vitaly Kuznetsov wrote:
> Use existing create/restore path to perform 'soft reset' for HVM
> domains. Tear everything down, e.g. destroy domain's device model,
> remove the domain from xenstore, save toolstack record and start
> over.
>
> Signed-off-by: Vi
On Tue, Jul 28, 2015 at 03:28:13PM +0200, Vitaly Kuznetsov wrote:
> x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq
> servers and and replaces the shared_info frame with an empty page to support
> subsequent XENMAPSPACE_shared_info call.
>
> ARM-specific hook is -ENOSYS fo
On Tue, Jul 28, 2015 at 03:28:11PM +0200, Vitaly Kuznetsov wrote:
> New domctl resets state for a domain allowing it to 'start over': register
> vcpu_info, switch to FIFO ABI for event channels. Still active grants are
> being logged to help debugging misbehaving backends.
>
> Signed-off-by: Vital
On Tue, Jul 28, 2015 at 03:28:07PM +0200, Vitaly Kuznetsov wrote:
> Use letter 'S' to indicate a domain in such state. Introduce new
> 'on_soft_reset' action and default it to 'restart' for now.
>
> Signed-off-by: Vitaly Kuznetsov
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> Changes since v9:
> -
CPU numbers can't be negative. Fixing the microcode*
files to properly use unsigned type in this patch.
No functional change is introduced.
Signed-off-by: Aravind Gopalakrishnan
---
xen/arch/x86/microcode.c| 6 +++---
xen/arch/x86/microcode_amd.c| 12 +++-
xen/arch/x86/micr
Some of older[Fam10h] systems require that certain number of
applied microcode patch levels should not be overwritten by
the microcode loader. Otherwise, system hangs are known to occur.
The 'final_levels' of patch ids have been obtained empirically.
Refer bug https://bugzilla.suse.com/show_bug.cg
Patch 1: Cleans up integer types used for cpu numbers
per Jan's suggestion
Patch 2: Fix HW issue by skipping certain microcode levels
and aborting microcode update process as otherwise
system hangs are known to occur
Changes from V3 (per Jan)
- const-ify final_levels a
On Mon, Jul 20, 2015 at 04:35:54PM +0200, Daniel Kiper wrote:
> Do not pass memory maps to image if it asked for EFI boot services. Maps are
> usually invalid in that case and they can confuse potential user. Image should
> get memory map itself just before ExitBootServices() call.
Can we point to
On Mon, Jul 20, 2015 at 04:35:53PM +0200, Daniel Kiper wrote:
This parts needs a bit of details I think.
As in why can't the ELF note that is present in the binary
be satisfied. Or under what conditions would the existing code
not work?
> Signed-off-by: Daniel Kiper
> ---
> grub-core/loader/i3
On Mon, Jul 20, 2015 at 04:35:52PM +0200, Daniel Kiper wrote:
> Add tags used to pass ImageHandle to loaded image. It is used
s/loaded image/loaded image if requested./
> by at least ExitBootServices() function.
>
> Signed-off-by: Daniel Kiper
> ---
> grub-core/loader/multiboot_mbi2.c | 46
>
On 08/11/2015 01:19 PM, Andrew Cooper wrote:
On 11/08/15 18:05, Tim Deegan wrote:
* Under this model, PV exception handlers should copy themselves onto
the privileged execution stack.
* Currently, the IST handlers copy themselves onto the primary stack if
they interrupt guest context.
* AMD Tas
On Mon, 2015-08-10 at 09:47 -0700, Andy Lutomirski wrote:
> On Mon, Aug 10, 2015 at 3:12 AM, Ben Hutchings wrote:
> > 3.2.71-rc1 review patch. If anyone has any objections, please let me know.
> >
> > --
> >
> > From: Andy Lutomirski
> >
> > commit 37868fe113ff2ba814b3b4eb12df
Direct mapped domain has already the memory allocated 1:1, so we are
directly using the gfn as mfn to map the RAM in the guest.
While we are validating that the page associated to the first mfn belongs to
the domain, the subsequent MFN are not validated when the extent_order
is > 0.
This may resu
On 07/08/15 17:34, Julien Grall wrote:
> Hi all,
>
> This patch series aims to use the memory terminologies described in
> include/xen/mm.h [1] for Linux xen code.
Applied to for-linus-4.3, thanks.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.
On 08/11/2015 03:45 AM, Rafal Mielniczuk wrote:
On 11/08/15 07:08, Bob Liu wrote:
On 08/10/2015 11:52 PM, Jens Axboe wrote:
On 08/10/2015 05:03 AM, Rafal Mielniczuk wrote:
On 01/07/15 04:03, Jens Axboe wrote:
On 06/30/2015 08:21 AM, Marcus Granado wrote:
Hi,
Our measurements for the multiqu
On 08/11/2015 05:19 AM, Jan Beulich wrote:
On 24.07.15 at 19:54, wrote:
On 07/23/2015 10:07 AM, Jan Beulich wrote:
Plus - is this in line with what the tools are doing? Aren't they
assuming !PV <=> native format context? I.e. don't you need
to treat differently v->domain == current->domain and
On 11/08/15 18:07, Wei Liu wrote:
> On Tue, Aug 11, 2015 at 04:48:13PM +0100, Ian Campbell wrote:
>> On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote:
>>> It's the checkpoint file - i.e. the command line argument to xl
>>> restore - that is being leaked.
>> Thanks.
>>
>> [...]
>>> So the che
On 11/08/15 18:05, Tim Deegan wrote:
>
* Under this model, PV exception handlers should copy themselves onto
the privileged execution stack.
* Currently, the IST handlers copy themselves onto the primary stack if
they interrupt guest context.
* AMD Task Register on vmexit.
flight 60652 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60652/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 60609
Tests which did not succeed, but a
On Tue, Aug 11, 2015 at 04:48:13PM +0100, Ian Campbell wrote:
> On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote:
> > It's the checkpoint file - i.e. the command line argument to xl
> > restore - that is being leaked.
>
> Thanks.
>
> [...]
> > So the checkpoint file is clearly being leaked
Hi,
At 17:51 +0100 on 11 Aug (1439315508), Ben Catterall wrote:
> On 11/08/15 10:55, Tim Deegan wrote:
> > At 11:14 +0100 on 10 Aug (1439205273), Andrew Cooper wrote:
> >> On 10/08/15 10:49, Tim Deegan wrote:
> >>> Hi,
> >>>
> >>> At 17:45 +0100 on 06 Aug (1438883118), Ben Catterall wrote:
>
On Mon, Jul 20, 2015 at 04:35:51PM +0200, Daniel Kiper wrote:
> Add grub_relocator64_efi relocator. It will be used on EFI 64-bit platforms
> when multiboot2 compatible image requests MULTIBOOT_TAG_TYPE_EFI_BS. Relocator
> will set lower parts of %rax and %rbx accordingly to multiboot2 specificatio
On Mon, Jul 20, 2015 at 04:35:49PM +0200, Daniel Kiper wrote:
> Signed-off-by: Daniel Kiper
Reviewed-by: Konrad Rzeszutek Wilk
but really - this is quite easy to review :-)
> ---
> .gitignore |3 +++
> 1 file changed, 3 insertions(+)
>
> diff --git a/.gitignore b/.gitignore
> index 18ab8
Ian Campbell writes ("[PATCH OSSTEST v4] Arrange to test migration from the
previous Xen version"):
> It would be nice to try and reuse the builds from the last flight
> which tested the $prevxenbranch baseline. I've not dont that here.
Acked-by: Ian Jackson
On Mon, Jul 20, 2015 at 04:29:18PM +0200, Daniel Kiper wrote:
> Add multiboot2 protocol support for relocatable images. Only GRUB2
> with relevant patches understands that feature. Older multiboot
You may want to enumerate what those 'relevant' patches are.
> protocol (regardless of version) comp
On 11/08/15 10:55, Tim Deegan wrote:
At 11:14 +0100 on 10 Aug (1439205273), Andrew Cooper wrote:
On 10/08/15 10:49, Tim Deegan wrote:
Hi,
At 17:45 +0100 on 06 Aug (1438883118), Ben Catterall wrote:
The process to switch into and out of deprivileged mode can be likened to
setjmp/longjmp.
To
On Mon, Jul 20, 2015 at 04:29:17PM +0200, Daniel Kiper wrote:
> Every multiboot protocol (regardless of version) compatible image must
> specify its load address (in ELF or multiboot header). Multiboot protocol
> compatible loader have to load image at specified address. However, there
> is no guar
There are several steps to this:
- Identify $prevxenbranch, that is the branch which precedes
$xenbranch.
- Create appropriate build jobs.
- Add support in ts-xen-install for overriding {xen,}buildjob on a
per-ident basis
- Add a new receipt test-pair-oneway which only migrates from
src_host
Hi Shannon,
On 07/08/15 03:11, Shannon Zhao wrote:
> 2. Create minimal DT to pass required information to Dom0
> --
> The minimal DT mainly passes Dom0 bootargs, address and size of initrd
> (if available), address and size of uefi system tab
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 11 August 2015 17:03
> To: Paul Durrant
> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
> Subject: RE: [PATCH] x86/hvm: don't rely on shared ioreq state for
> completion handling
>
> >>> On 11.0
flight 60650 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60650/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-vhd 9 debian-di-installfail never pass
test-armhf-armhf-libvirt-qcow2 9 debian-di
On Tue, 2015-08-11 at 12:30 +0100, Ian Campbell wrote:
> On Mon, 2015-08-03 at 17:01 +0100, Ian Campbell wrote:
> > On Fri, 2015-07-24 at 17:28 +0100, Ian Campbell wrote:
> > > @@ -191,6 +208,27 @@ create_build_jobs () {
> > > revision_ovmf=$REVISION_OVMF
> > > done
> > >
>
>>> On 11.08.15 at 17:49, wrote:
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 11 August 2015 16:46
>> To: Paul Durrant
>> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
>> Subject: RE: [PATCH] x86/hvm: don't rely on shared ioreq state f
On 11/08/15 16:19, Ian Campbell wrote:
>> IIRC we talked about it few months ago and you said that using balloon
>> page will split in 4K the 1G/2M mapping done in the stage-2 p2m.
>
> Did I? Odd because I'm also of the opinion that alloc_ballooned_pages
> should operate in chunks of 2M at the hyp
>>> On 11.08.15 at 17:45, wrote:
> At 09:37 -0600 on 11 Aug (1439285833), Jan Beulich wrote:
>> >>> On 11.08.15 at 16:34, wrote:
>> > At 07:51 -0600 on 11 Aug (1439279513), Jan Beulich wrote:
>> >> >>> On 27.07.15 at 13:09, wrote:
>> >> > At 13:02 +0100 on 24 Jul (1437742964), Andrew Cooper wrot
On Wed, 2015-08-05 at 11:50 +0100, Ian Campbell wrote:
> On Fri, 2015-07-31 at 16:39 +0100, Ian Campbell wrote:
> > On Fri, 2015-07-31 at 16:31 +0100, Ian Jackson wrote:
> > > Ian Campbell writes ("[PATCH OSSTEST] get_hostflags: return an empty
> > > list
> > > when there is no flight/job."):
> >
>>> On 11.08.15 at 17:43, wrote:
> On 8/11/2015 10:32 AM, Jan Beulich wrote:
>>> +static bool_t check_final_patch_levels(int cpu)
>> unsigned int
>>
> I can change this too, but- Any specific reason for this?
> The other sanity checker or verification functions like
> verif
>>> On 05.08.15 at 11:58, wrote:
> Perhaps there should be a patch to MAINTAINERS to add arch/x86/mm.c to the
> relevant subsection? (Or maybe the file is just horribly named?)
Yeah, the file, while mostly about (PV) memory management, holds
more than just that; mm/ otoh is pretty properly limite
osstest service owner writes ("[xen-unstable test] 60660: trouble:
pass/preparing/queued"):
> flight 60660 xen-unstable running [real]
> http://logs.test-lab.xenproject.org/osstest/logs/60660/
>
> Failures and problems with tests :-(
>
> Tests which did not succeed and are blocking,
> including
On 11/08/15 16:48, Ian Campbell wrote:
> On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote:
>> It's the checkpoint file - i.e. the command line argument to xl
>> restore - that is being leaked.
> Thanks.
>
> [...]
>> So the checkpoint file is clearly being leaked.
> Indeed. I confirmed this e
On 08/11/2015 11:35 AM, Ian Campbell wrote:
On Tue, 2015-08-11 at 11:29 -0400, Boris Ostrovsky wrote:
On 08/11/2015 10:21 AM, Ian Campbell wrote:
On Tue, 2015-08-11 at 15:19 +0100, Ian Campbell wrote:
On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
This document is going to explain the
>>> On 04.08.15 at 15:59, wrote:
> On Tue, 2015-08-04 at 10:34 +0100, Wei Liu wrote:
>> On Mon, Aug 03, 2015 at 06:05:43PM +0100, Andrew Cooper wrote:
>> > It is not used, and can cause a spurious failure of the set_gdt()
>> > hypercall in
>> > low memory situations.
>> >
>> > Signed-off-by: And
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 11 August 2015 16:46
> To: Paul Durrant
> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
> Subject: RE: [PATCH] x86/hvm: don't rely on shared ioreq state for
> completion handling
>
> >>> On 11.0
On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote:
> It's the checkpoint file - i.e. the command line argument to xl
> restore - that is being leaked.
Thanks.
[...]
> So the checkpoint file is clearly being leaked.
Indeed. I confirmed this even with the current development version using ls
At 09:37 -0600 on 11 Aug (1439285833), Jan Beulich wrote:
> >>> On 11.08.15 at 16:34, wrote:
> > At 07:51 -0600 on 11 Aug (1439279513), Jan Beulich wrote:
> >> >>> On 27.07.15 at 13:09, wrote:
> >> > At 13:02 +0100 on 24 Jul (1437742964), Andrew Cooper wrote:
> >> >> On 24/07/15 10:41, Jan Beulic
>>> On 11.08.15 at 17:32, wrote:
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 11 August 2015 16:20
>> To: Paul Durrant
>> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
>> Subject: Re: [PATCH] x86/hvm: don't rely on shared ioreq state f
flight 60660 xen-unstable running [real]
http://logs.test-lab.xenproject.org/osstest/logs/60660/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-vhd queued
test-armhf-armhf-libvi
On 8/11/2015 10:32 AM, Jan Beulich wrote:
+static bool_t check_final_patch_levels(int cpu)
unsigned int
I can change this too, but- Any specific reason for this?
The other sanity checker or verification functions like
verify_patch_size() or microcode_fits() return a bool_t too..
"int cpu" is
>>> On 11.08.15 at 16:34, wrote:
> At 07:51 -0600 on 11 Aug (1439279513), Jan Beulich wrote:
>> >>> On 27.07.15 at 13:09, wrote:
>> > At 13:02 +0100 on 24 Jul (1437742964), Andrew Cooper wrote:
>> >> On 24/07/15 10:41, Jan Beulich wrote:
>> >> > Beyond that log-dirty handling in _hvm_map_guest_fr
On Tue, 2015-08-11 at 11:29 -0400, Boris Ostrovsky wrote:
> On 08/11/2015 10:21 AM, Ian Campbell wrote:
> > On Tue, 2015-08-11 at 15:19 +0100, Ian Campbell wrote:
> > > On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
> > > > This document is going to explain the design details of Xen booting
flight 60651 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60651/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 5c02fc49aea514609bdb6ee21d6375fc66f0d4d6
baseline version:
ovmf 21d0e75065eabe7a6bd9e4b92af54f07025
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 11 August 2015 16:20
> To: Paul Durrant
> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
> Subject: Re: [PATCH] x86/hvm: don't rely on shared ioreq state for
> completion handling
>
> >>> On 31.0
>>> On 11.08.15 at 17:28, wrote:
> On 8/11/2015 10:17 AM, Andrew Cooper wrote:
>>>
> +0x0198,
> +0x019f,
> +0x01af
> +};
> +
> +static bool_t check_final_patch_levels(int cpu)
unsigned int
>>> I can change this too, but- Any specific reason
On 08/11/2015 10:21 AM, Ian Campbell wrote:
On Tue, 2015-08-11 at 15:19 +0100, Ian Campbell wrote:
On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
This document is going to explain the design details of Xen booting
with
ACPI on ARM. Maybe parts of it may not be appropriate. Any comments
>>> On 11.08.15 at 17:17, wrote:
> On 11/08/15 16:14, Aravind Gopalakrishnan wrote:
>> On 8/11/2015 9:53 AM, Jan Beulich wrote:
>> On 03.08.15 at 21:34, wrote:
+static bool_t check_final_patch_levels(int cpu)
>>> unsigned int
>>>
>>
>> I can change this too, but- Any specific reason for
On 8/11/2015 10:17 AM, Andrew Cooper wrote:
+0x0198,
+0x019f,
+0x01af
+};
+
+static bool_t check_final_patch_levels(int cpu)
unsigned int
I can change this too, but- Any specific reason for this?
The other sanity checker or verification functions like
verify_patch_siz
>>> On 31.07.15 at 17:36, wrote:
> On 31/07/15 16:30, Razvan Cojocaru wrote:
>> On 07/31/2015 06:13 PM, Andrew Cooper wrote:
>>> Are you certain that the guest is actually setting it? If the guest
>>> never sets it in the first place, 0 will be the expected value.
>> That might be it, I'll need t
On 11/08/15 16:19, Ian Campbell wrote:
> On Tue, 2015-08-11 at 16:11 +0100, Julien Grall wrote:
>> On 11/08/15 15:59, Ian Campbell wrote:
>>> On Tue, 2015-08-11 at 15:51 +0100, David Vrabel wrote:
On 11/08/15 15:12, Ian Campbell wrote:
> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrot
> +run_bs:
> +push%rax
> +push%rdi
> +
> +/* Initialize BSS (no nasty surprises!). */
> +lea __bss_start(%rip),%rdi
> +lea __bss_end(%rip),%rcx
> +sub %rdi,%rcx
> +shr $3,%rcx
> +xor %eax,%eax
> +rep
>>> On 31.07.15 at 17:34, wrote:
> Both hvm_io_pending() and hvm_wait_for_io() use the shared (with emulator)
> ioreq structure to determined whether there is a pending I/O. The latter
> will
> misbehave if the shared state is driven to STATE_IOREQ_NONE by the emulator,
> or when the shared ioreq
On 11/08/15 16:14, Aravind Gopalakrishnan wrote:
> On 8/11/2015 9:53 AM, Jan Beulich wrote:
> On 03.08.15 at 21:34, wrote:
>>> --- a/xen/arch/x86/microcode_amd.c
>>> +++ b/xen/arch/x86/microcode_amd.c
>>> @@ -347,6 +347,43 @@ static int container_fast_forward(const void
>>> *data, size_t size_
On Tue, 2015-08-11 at 16:11 +0100, Julien Grall wrote:
> On 11/08/15 15:59, Ian Campbell wrote:
> > On Tue, 2015-08-11 at 15:51 +0100, David Vrabel wrote:
> > > On 11/08/15 15:12, Ian Campbell wrote:
> > > > On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
> > > > >
> > > > [...]
> > > > > 3
On 8/11/2015 9:53 AM, Jan Beulich wrote:
On 03.08.15 at 21:34, wrote:
--- a/xen/arch/x86/microcode_amd.c
+++ b/xen/arch/x86/microcode_amd.c
@@ -347,6 +347,43 @@ static int container_fast_forward(const void *data, size_t
size_left, size_t *of
return 0;
}
+/*
+ * The 'final_levels' o
On 11/08/15 15:59, Ian Campbell wrote:
> On Tue, 2015-08-11 at 15:51 +0100, David Vrabel wrote:
>> On 11/08/15 15:12, Ian Campbell wrote:
>>> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
>>> [...]
3. Dom0 gets grant table and event channel irq information
--
>>> On 03.08.15 at 13:29, wrote:
> From: David Vrabel
>
> Instead of cpu_relax() while spinning and observing the ticket head,
> introduce arch_lock_relax() which executes a WFE instruction. After
> the ticket head is changed call arch_lock_signal() to execute an SEV
> instruction (with the req
On 11/08/15 15:59, Ian Campbell wrote:
> On Tue, 2015-08-11 at 15:51 +0100, David Vrabel wrote:
>> On 11/08/15 15:12, Ian Campbell wrote:
>>> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
>>> [...]
3. Dom0 gets grant table and event channel irq information
--
1 - 100 of 213 matches
Mail list logo