Konrad,
I thought I'd remind you of the "some progress per release" criteria
to avoid it becoming subject to removal. The most recent changes
date back to spring 2014 afaics...
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.or
On 08/21/2015 02:05 AM, Ian Campbell wrote:
On Wed, 2015-08-19 at 00:18 +, osstest service owner wrote:
flight 60719 osstest real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60719/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
[...]
test-
On 8/27/2015 12:19 AM, Malcolm Crossley wrote:
On 25/08/15 15:43, Konrad Rzeszutek Wilk wrote:
On Tue, Aug 25, 2015 at 02:55:31PM +0800, Chen, Tiejun wrote:
On 8/25/2015 8:19 AM, Tamas K Lengyel wrote:
Hi everyone,
I saw some people passingly mention this on the list before but just in
case i
On 8/25/2015 10:43 PM, Konrad Rzeszutek Wilk wrote:
On Tue, Aug 25, 2015 at 02:55:31PM +0800, Chen, Tiejun wrote:
On 8/25/2015 8:19 AM, Tamas K Lengyel wrote:
>Hi everyone,
>I saw some people passingly mention this on the list before but just in
>case it has been missed, my serial is also being
This kind of issue is already gone.
https://www.mail-archive.com/xen-devel@lists.xen.org/msg32464.html
Thanks
Tiejun
On 8/26/2015 11:49 PM, Malcolm Crossley wrote:
Add RMRR 1:1 IOMMU mappings to IOMMU page tables if EPT page table are not being
shared with the IOMMU.
This is a regression in b
On 08/25/2015 04:40 AM, Andrew Cooper wrote:
An issue which Xen has is an uncertain support statement for features.
Given the success seen with docs/misc/xen-command-line.markdown, and in
particular keeping it up to date, introduce a similar system for
features.
Patch 1 introduces a proposed tem
On 08/25/2015 04:40 AM, Andrew Cooper wrote:
Signed-off-by: Andrew Cooper
---
v2:
* %Revision and #History, following template review
* Grammar fixes
---
docs/features/migration.pandoc | 100
1 file changed, 100 insertions(+)
create mode 100644
flight 60869 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60869/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf ba1806251ff8ff695175b92ab5732eadbcd2f72e
baseline version:
ovmf b199d9418820b873d0e05190fe5dc947a6f
Hi Chris,
On 21/08/2015 14:30, Chris Brand wrote:
setup_frametable_mappings() rounds frametable_size up to a multiple
of 32MB. This is wasteful on systems with less than 4GB of RAM,
although it does allow the "contig" bit to be set in the PTEs.
Where the frametable is less than 32MB in size, in
Hi,
Sorry for the late answer.
On 20/08/2015 19:25, Shannon Zhao wrote:
On 2015/8/20 22:06, Jan Beulich wrote:
On 20.08.15 at 14:56, wrote:
On 2015/8/20 17:30, Jan Beulich wrote:
On 20.08.15 at 05:41, wrote:
On 2015/8/19 22:05, Jan Beulich wrote:
On 19.08.15 at 14:13, wrote:
1. Crea
Hi Vijay,
On 26/08/2015 05:40, Vijay Kilari wrote:
+{
+fdt32_t phandle = gic_get_msi_handle();
+DPRINT(" Set msi-parent(ITS) phandle 0x%x\n",phandle);
+fdt_property(kinfo->fdt, prop->name, (void *)&phandle,
+ sizeof(phandle));
+
Benjamin Beier wrote:
> On 08/12/2015 01:28 PM, Ian Campbell wrote:
>> On Wed, 2015-08-12 at 13:03 +0200, Benjamin Beier wrote:
>>> Since xen version 4.5.1 there is a bug with the xl cpupool-create
>>> command.
>>> It always throws a segmentation fault when used with a config file as
>>> parameter.
branch xen-unstable
xen branch xen-unstable
job test-amd64-i386-xl-qcow2
test guest-saverestore
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-
On Wed, Aug 26, 2015 at 01:37:12PM -0400, Konrad Rzeszutek Wilk wrote:
> On Wed, Aug 26, 2015 at 01:32:54AM -0600, Jan Beulich wrote:
> > >>> On 25.08.15 at 21:54, wrote:
> > > On Tue, Aug 25, 2015 at 03:52:15PM -0400, Konrad Rzeszutek Wilk wrote:
> > >> On Tue, Aug 25, 2015 at 06:41:06PM +0100, A
On 26/08/15 18:28, Konrad Rzeszutek Wilk wrote:
> On Wed, Aug 26, 2015 at 06:20:34PM +0100, Andrew Cooper wrote:
>> On 26/08/15 18:15, Konrad Rzeszutek Wilk wrote:
>>> On Wed, Aug 26, 2015 at 05:19:39PM +0100, Malcolm Crossley wrote:
On 25/08/15 15:43, Konrad Rzeszutek Wilk wrote:
> On Tue
On Wed, Aug 26, 2015 at 01:32:54AM -0600, Jan Beulich wrote:
> >>> On 25.08.15 at 21:54, wrote:
> > On Tue, Aug 25, 2015 at 03:52:15PM -0400, Konrad Rzeszutek Wilk wrote:
> >> On Tue, Aug 25, 2015 at 06:41:06PM +0100, Andrew Cooper wrote:
> >> > On 25/08/15 18:09, Konrad Rzeszutek Wilk wrote:
> >>
On Wed, Aug 26, 2015 at 06:20:34PM +0100, Andrew Cooper wrote:
> On 26/08/15 18:15, Konrad Rzeszutek Wilk wrote:
> > On Wed, Aug 26, 2015 at 05:19:39PM +0100, Malcolm Crossley wrote:
> >> On 25/08/15 15:43, Konrad Rzeszutek Wilk wrote:
> >>> On Tue, Aug 25, 2015 at 02:55:31PM +0800, Chen, Tiejun wr
On 26/08/15 18:15, Konrad Rzeszutek Wilk wrote:
> On Wed, Aug 26, 2015 at 05:19:39PM +0100, Malcolm Crossley wrote:
>> On 25/08/15 15:43, Konrad Rzeszutek Wilk wrote:
>>> On Tue, Aug 25, 2015 at 02:55:31PM +0800, Chen, Tiejun wrote:
On 8/25/2015 8:19 AM, Tamas K Lengyel wrote:
> Hi everyon
On Wed, Aug 26, 2015 at 05:19:39PM +0100, Malcolm Crossley wrote:
> On 25/08/15 15:43, Konrad Rzeszutek Wilk wrote:
> > On Tue, Aug 25, 2015 at 02:55:31PM +0800, Chen, Tiejun wrote:
> >> On 8/25/2015 8:19 AM, Tamas K Lengyel wrote:
> >>> Hi everyone,
> >>> I saw some people passingly mention this o
On 25/08/15 15:43, Konrad Rzeszutek Wilk wrote:
> On Tue, Aug 25, 2015 at 02:55:31PM +0800, Chen, Tiejun wrote:
>> On 8/25/2015 8:19 AM, Tamas K Lengyel wrote:
>>> Hi everyone,
>>> I saw some people passingly mention this on the list before but just in
>>> case it has been missed, my serial is also
Add RMRR 1:1 IOMMU mappings to IOMMU page tables if EPT page table are not being
shared with the IOMMU.
This is a regression in behaviour versus Xen 4.5.
Signed-off-by: Malcolm Crossley
---
xen/drivers/passthrough/vtd/iommu.c | 23 ---
1 file changed, 20 insertions(+), 3 del
flight 60861 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60861/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 19 guest-start/debianhvm.repeat
fail REGR. vs. 60761
Regr
El 26/08/15 a les 14.18, Andrew Cooper ha escrit:
> On 26/08/15 12:48, Roger Pau Monné wrote:
>> ELFNOTE(Xen, XEN_ELFNOTE_FEATURES, .asciz,
>> "writable_descriptor_tables|auto_translated_physmap|supervisor_mode_kernel")
>> ELFNOTE(Xen, XEN_ELFNOTE_SUPPORTED_FEATURES,.long ((1 <<
On Wed, Aug 26, 2015 at 10:09:46AM +0100, Andrew Cooper wrote:
> After this series, I don't believe there are any docs remaining out of
> the docs/ subtree.
>
> The three manpages moved have been converted from ?roff to POD to match
> all our other manpages
>
> Andrew Cooper (5):
> docs: Move m
El 26/08/15 a les 14.12, Andrew Cooper ha escrit:
> On 26/08/15 13:00, Jan Beulich wrote:
>>> This structure is guaranteed to always be placed in memory after the
>> DYM "These structures are ..."?
>>
>>> loaded kernel and modules.
>
> There is no requirement for the command line/module informatio
On Wed, Aug 26, 2015 at 07:50:24AM -0600, Jan Beulich wrote:
> 'M' debug key output looks confusing without this adjustment.
>
> Signed-off-by: Jan Beulich
>
Release-acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.x
On 26/08/15 14:50, Jan Beulich wrote:
> 'M' debug key output looks confusing without this adjustment.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper , with Konrads
suggestion fixed.
>
> --- a/xen/arch/x86/msi.c
> +++ b/xen/arch/x86/msi.c
> @@ -716,8 +716,8 @@ static int msi_capability
>>> On 26.08.15 at 15:57, wrote:
> On Wed, Aug 26, 2015 at 07:50:24AM -0600, Jan Beulich wrote:
>> 'M' debug key output looks confusing without this adjustment.
>>
>> Signed-off-by: Jan Beulich
>>
>> --- a/xen/arch/x86/msi.c
>> +++ b/xen/arch/x86/msi.c
>> @@ -716,8 +716,8 @@ static int msi_capa
On Wed, Aug 26, 2015 at 07:50:24AM -0600, Jan Beulich wrote:
> 'M' debug key output looks confusing without this adjustment.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/msi.c
> +++ b/xen/arch/x86/msi.c
> @@ -716,8 +716,8 @@ static int msi_capability_init(struct pc
> entry[i].m
'M' debug key output looks confusing without this adjustment.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/msi.c
+++ b/xen/arch/x86/msi.c
@@ -716,8 +716,8 @@ static int msi_capability_init(struct pc
entry[i].msi_attrib.type = PCI_CAP_ID_MSI;
entry[i].msi_attrib.is_64 = is_64bi
Hi Julien,
Thanks for your reply. :)
On 2015/8/26 11:24, Julien Grall wrote:
On 19/08/2015 23:27, Shannon Zhao wrote:
Hi Julien,
Hi Shannon,
Sorry for the late answer I was on holiday. In general it's better to CC
multiple person and the mailing list as we may not be able to answer in
sho
>>> On 25.08.15 at 12:54, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4540,6 +4540,33 @@ void hvm_cpuid(unsigned int input, unsigned int *eax,
> unsigned int *ebx,
> *ebx = _eax + _ebx;
> }
> }
> +if ( count == 1 )
>>> On 25.08.15 at 12:54, wrote:
> @@ -896,9 +897,28 @@ long arch_do_domctl(
> ret = -EFAULT;
>
> offset += sizeof(v->arch.xcr0_accum);
> -if ( !ret && copy_to_guest_offset(evc->buffer, offset,
> - (void *)v->
On Wed, Aug 26, 2015 at 06:40:22AM -0600, Jan Beulich wrote:
> >>> On 26.08.15 at 14:33, wrote:
> > Do you suggest that I should put this functionality (PE with multiboot
> > headers) on top of this patch series? Well, it is possible but this
> > series is big and I would like to avoid to make it
>>> On 25.08.15 at 12:54, wrote:
> +void save_xsave_states(struct vcpu *v, void *dest ,unsigned int size)
> +{
> +struct xsave_struct *xsave = v->arch.xsave_area;
> +u64 xstate_bv = xsave->xsave_hdr.xstate_bv;
> +u64 valid;
> +
> +/*
> + * Copy legacy XSAVE area, to avoid compl
>>> On 26.08.15 at 13:41, wrote:
On 26.08.15 at 11:47, wrote:
>> On 25/08/2015 11:54, Shuai Ruan wrote:
>>> --- a/xen/include/asm-x86/cpufeature.h
>>> +++ b/xen/include/asm-x86/cpufeature.h
>>> @@ -153,6 +153,10 @@
>>> #define X86_FEATURE_RDSEED (7*32+18) /* RDSEED instruction */
>>> #defi
On Tue, Aug 18, 2015 at 1:11 AM, Julien Grall wrote:
>
>
> On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Parse host dt and generate ITS node for Dom0.
>> ITS node resides inside GIC node so when GIC node
>> is encountered look for ITS node.
>>
>> Signed-off-b
>>> On 26.08.15 at 14:33, wrote:
> Do you suggest that I should put this functionality (PE with multiboot
> headers) on top of this patch series? Well, it is possible but this
> series is big and I would like to avoid to make it bigger. I prefer to
> get current patches into Xen tree and then work
>>> On 26.08.15 at 14:05, wrote:
> On 26/08/15 12:50, Jan Beulich wrote:
> On 26.08.15 at 12:12, wrote:
>>> On 25/08/15 11:54, Shuai Ruan wrote:
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -936,9 +936,10 @@ void pv_cpuid(struct cpu_user_regs *regs)
if
On Wed, Aug 26, 2015 at 12:46:22AM -0600, Jan Beulich wrote:
> >>> On 25.08.15 at 18:31, wrote:
> > On Tue, Aug 25, 2015 at 06:09:09AM -0600, Jan Beulich wrote:
> >> >>> On 24.08.15 at 22:54, wrote:
[...]
> >> And you realize that we use a "special method" for building the
> >> current "flat" E
On 26/08/15 12:48, Roger Pau Monné wrote:
> Hello,
>
> The discussion in [1] lead to an agreement of the missing pieces in PVH
> (or HVM without a device-model) in order to progress with it's
> implementation.
>
> One of the missing pieces is a new boot ABI, that replaces the PV boot
> ABI. The aim
On 26/08/15 13:00, Jan Beulich wrote:
>
>> struct hvm_start_info {
>> #define HVM_START_MAGIC_VALUE 0x336ec578
>> uint32_t magic; /* Contains the magic value 0x336ec578
>> */
>> /* ("xEn3" with the 0x80 bit of the "E"
>> set).*/
>> uint32_
On 26/08/15 12:50, Jan Beulich wrote:
On 26.08.15 at 12:12, wrote:
>> On 25/08/15 11:54, Shuai Ruan wrote:
>>> --- a/xen/arch/x86/hvm/hvm.c
>>> +++ b/xen/arch/x86/hvm/hvm.c
>>> @@ -2148,8 +2148,12 @@ static int hvm_save_cpu_xsave_states(struct domain
>>> *d, hvm_domain_context_t *h)
>>>
>>> On 26.08.15 at 12:43, wrote:
> On 25/08/15 11:54, Shuai Ruan wrote:
>> @@ -246,8 +249,9 @@ static void xc_cpuid_config_xsave(
>> regs[1] = 512 + 64; /* FP/SSE + XSAVE.HEADER */
>> break;
>> case 1: /* leaf 1 */
>> -regs[0] &= XSAVEOPT;
>> -regs[1] = regs[
>>> On 26.08.15 at 13:48, wrote:
> * tr: must be a 32-bit TSS (active) with a base of '0' and a limit of '0xFF'.
Why 0xFF instead of 0x67?
> struct hvm_start_info {
> #define HVM_START_MAGIC_VALUE 0x336ec578
> uint32_t magic; /* Contains the magic value 0x336ec578
> */
>
>>> On 26.08.15 at 12:12, wrote:
> On 25/08/15 11:54, Shuai Ruan wrote:
>> --- a/xen/arch/x86/hvm/hvm.c
>> +++ b/xen/arch/x86/hvm/hvm.c
>> @@ -2148,8 +2148,12 @@ static int hvm_save_cpu_xsave_states(struct domain
>> *d, hvm_domain_context_t *h)
>> ctxt->xfeature_mask = xfeature_mask;
>>
Hello,
The discussion in [1] lead to an agreement of the missing pieces in PVH
(or HVM without a device-model) in order to progress with it's
implementation.
One of the missing pieces is a new boot ABI, that replaces the PV boot
ABI. The aim of this new boot ABI is to remove the limitations of th
>>> On 26.08.15 at 11:47, wrote:
> On 25/08/2015 11:54, Shuai Ruan wrote:
>> --- a/xen/include/asm-x86/cpufeature.h
>> +++ b/xen/include/asm-x86/cpufeature.h
>> @@ -153,6 +153,10 @@
>> #define X86_FEATURE_RDSEED (7*32+18) /* RDSEED instruction */
>> #define X86_FEATURE_ADX (7*32+19)
flight 60853 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60853/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 60684
Regression
On 25/08/15 11:54, Shuai Ruan wrote:
> This patch exposes xsaves/xgetbv1/xsavec to hvm guest.
> The reserved bits of eax/ebx/ecx/edx must be cleaned up
> when call cpuid(0dh) with leaf 1 or 2..63.
>
> According to the spec the following bits must be reserved:
> For leaf 1, bits 03-04/08-31 of ecx i
On 25/08/15 11:54, Shuai Ruan wrote:
> This patch enables xsaves for hvm guest, includes:
> 1.handle xsaves vmcs init and vmexit.
> 2.add logic to write/read the XSS msr.
>
> Signed-off-by: Shuai Ruan
Reviewed-by: Andrew Cooper , given two
corrections...
> ---
> xen/arch/x86/hvm/hvm.c
On 25/08/15 11:54, Shuai Ruan wrote:
> This patch uses xsaves/xrstors instead of xsaveopt/xrstor
> to perform the xsave_area switching so that xen itself
> can benefit from them when available.
>
> For xsaves/xrstors only use compact format. Add format conversion
> support when perform guest os mig
On 25/08/2015 11:54, Shuai Ruan wrote:
> This patch add basic definitions/helpers which will be used in
> later patches.
>
> Signed-off-by: Shuai Ruan
Thankyou - this series is looking far better now.
> ---
> xen/arch/x86/xstate.c| 137
> +++
> x
And transform to POD to match our other manpages.
The content is identical (other than one correction), although the
layout differs slightly with certain indentation.
As a correction, remove the reference to xentrace_cpusplit(1) which was
removed in c/s 9b9ca98b6ab16, more than 10 years ago!
Sig
And transform to POD to match our other manpages.
The content is identical, although the layout differs slightly with
certain indentation.
In addition, adjust the MAN{1,5}SRC-y `find` runes to be more general.
Signed-off-by: Andrew Cooper
---
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
---
After this series, I don't believe there are any docs remaining out of
the docs/ subtree.
The three manpages moved have been converted from ?roff to POD to match
all our other manpages
Andrew Cooper (5):
docs: Move misc README's into docs/misc/
docs: Move xentop.1 to docs/man/xentop.pod.1
d
The manpage rules are very repetative, because of the section number being
present in the filenames.
Instead of adding another set of 3 rules, switch to using a metarule to
automate the repetative action. New rules for different manpage sections can
be added simply by extending the $(foreach)
Si
To live with the other documentation.
Signed-off-by: Andrew Cooper
---
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
---
stubdom/README => docs/misc/stubdom.txt |0
tools/xenmon/README => docs/misc/xenmon.txt |0
stubdom/Makefile|6 +-
tools/xenm
And transform to POD to match our other manpages.
The content is identical, although the formatting was altered slightly
to conform to more usual manpage layout.
Signed-off-by: Andrew Cooper
---
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
---
.../xentrace/xentrace.8 => docs/man/xentrace.pod
On 26/08/15 08:41, Jan Beulich wrote:
> PDX-es are 64 bits wide in that case, and hence no limit needs to be
> enforced.
>
> Reported-by: Andrew Cooper
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists
As suggested by Jan Beulich, moved struct monitor_write_data from
struct arch_domain to struct arch_vcpu, as well as moving all
vm_event-related data from asm-x86/domain.h to struct vm_event,
and allocating it dynamically only when needed.
Signed-off-by: Razvan Cojocaru
Acked-by: Tamas K Lengyel
flight 37843 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/37843/
Perfect :-)
All tests in this flight passed
baseline version:
flight 37838
jobs:
build-amd64 pass
build-armhf
flight 60851 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60851/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Tests which are failin
PDX-es are 64 bits wide in that case, and hence no limit needs to be
enforced.
Reported-by: Andrew Cooper
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -204,6 +204,7 @@ smap_check_policy_t smap_policy_change(s
return old_policy;
}
+#ifndef CONFIG_
>>> On 25.08.15 at 19:41, wrote:
> On 25/08/15 18:09, Konrad Rzeszutek Wilk wrote:
>> On Tue, Aug 25, 2015 at 05:48:58PM +0100, Andrew Cooper wrote:
>>> On 25/08/15 17:43, Konrad Rzeszutek Wilk wrote:
I am troubleshooting an locking issue and figured I would enable extra
> options.
>>> On 25.08.15 at 21:54, wrote:
> On Tue, Aug 25, 2015 at 03:52:15PM -0400, Konrad Rzeszutek Wilk wrote:
>> On Tue, Aug 25, 2015 at 06:41:06PM +0100, Andrew Cooper wrote:
>> > On 25/08/15 18:09, Konrad Rzeszutek Wilk wrote:
>> > > --- a/xen/arch/x86/domain.c
>> > > +++ b/xen/arch/x86/domain.c
>>
>>> On 25.08.15 at 19:41, wrote:
> Jan: While reading the code, I note that the bits restriction is not
> required if CONFIG_BIGMEM, and should probably become conditional.
Indeed - patch about to be sent (but probably not qualifying for 4.6).
Jan
__
>>> On 25.08.15 at 23:47, wrote:
> On 15/08/15 07:23, Razvan Cojocaru wrote:
>> As suggested by Jan Beulich, moved struct monitor_write_data from
>> struct arch_domain to struct arch_vcpu, as well as moving all
>> vm_event-related data from asm-x86/domain.h to struct vm_event,
>> and allocating it
>>> On 26.08.15 at 05:24, wrote:
> On 19/08/2015 23:27, Shannon Zhao wrote:
>> In addition, if you know this, does it support runtime service for Xen
>> on x86?
>
> There is some on-going work for EFI runtime on x86. I'm not sure if it
> has been upstream (CCed Daniel for this).
Daniel is worki
69 matches
Mail list logo