>>> On 28.09.15 at 20:46, wrote:
>> > +if ( rsp.flags & VM_EVENT_FLAG_SET_REGISTERS )
>> >> +vm_event_set_registers(v, &rsp);
>> >> +
>> >> if ( rsp.flags & VM_EVENT_FLAG_TOGGLE_SINGLESTEP )
>> >> vm_event_toggle_singlestep(d, v);
>> >
>> >
On Mon, Sep 28, 2015 at 05:42:25PM +0200, Dario Faggioli wrote:
> On Mon, 2015-09-28 at 15:16 +0100, Wei Liu wrote:
> > On Mon, Sep 28, 2015 at 07:54:48PM +0800, Chao Peng wrote:
> > > The patch basically contains several PSR fixes in libxl.
> > > patch1-3: fix the socket display error in certain h
On Mon, Sep 28, 2015 at 04:46:17PM +0100, Wei Liu wrote:
> On Mon, Sep 28, 2015 at 05:35:56PM +0200, Dario Faggioli wrote:
> > On Mon, 2015-09-28 at 15:13 +0100, Wei Liu wrote:
> > > On Mon, Sep 28, 2015 at 07:54:51PM +0800, Chao Peng wrote:
> >
> > > > diff --git a/tools/libxl/libxl_psr.c b/tools
On 09/27/2015 02:35 AM, osstest service owner wrote:
flight 62376 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62376/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-build
On Mon, Sep 28, 2015 at 04:36:54PM +0100, Wei Liu wrote:
> On Mon, Sep 28, 2015 at 05:06:31PM +0200, Dario Faggioli wrote:
> > On Mon, 2015-09-28 at 19:54 +0800, Chao Peng wrote:
> >
> > > diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
> > > index 2706759..c72d3df 100644
> >
> >
On Mon, Sep 28, 2015 at 03:12:27PM +0100, Wei Liu wrote:
> On Mon, Sep 28, 2015 at 07:54:49PM +0800, Chao Peng wrote:
> > It sets the bit on the given bitmap if the corresponding socket is
> > available and clears the bit when the corresponding socket is not
> > available.
> >
> > Signed-off-by: C
>>> Monday, September 28, 2015 2:47 PM, wrote:
> >>> On 28.09.15 at 05:08, wrote:
> Thursday, September 24, 2015 12:27 AM, Tim Deegan wrote:
> It would be a guest kernel bug, but all _we_ care about is that such a guest
> kernel
> bug won't affect the hypervisor or other guests.
It won't a
On Mon, Sep 28, 2015 at 04:53:58PM +0200, Dario Faggioli wrote:
> On Mon, 2015-09-28 at 15:12 +0100, Wei Liu wrote:
> > On Mon, Sep 28, 2015 at 07:54:49PM +0800, Chao Peng wrote:
>
> > > diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
> > > index 5f9047c..5a91687 100644
> > > --- a/tools/li
This run is configured for baseline tests only.
flight 38086 linux-3.14 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38086/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-rumpuserxen-amd64 13 rumpuserxen-demo-xenstore
Hi,
I keep getting this error about not being able to get domain type when I
try to create a domU.
Xen-4.7, Ubuntu 12.04
$xl info
release: 3.13.0-32-generic
version: #57~-Ubuntu SMP Tue Jul 15 03:51:20 UTC 2014
machine: x86_64
nr_cpus
flight 62441 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62441/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 7a0ce8c572dff07cef82d7699da39ef52adbf523
baseline version:
ovmf 28f27af6f007c3794fcc9d098ef91713160
flight 62424 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62424/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 19 guest-start/debianhvm.repeat fail
REGR. vs. 62339
te
flight 62435 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62435/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-vhd 9 debian-di-installfail never pass
test-armhf-armhf-libvirt-raw 9 debian-di-i
On Mon, Sep 28, 2015 at 12:02:08PM -0400, Boris Ostrovsky wrote:
> On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
> >This patch adds a new call-back setup_tsc_scaling in struct
> >hvm_function_table to apply the TSC scaling ratio to hardware. For VMX,
> >it writes the TSC scaling ratio to VMCS field
On Mon, Sep 28, 2015 at 03:19:25PM +0100, Wei Liu wrote:
> On Mon, Sep 28, 2015 at 03:13:58PM +0800, Haozhong Zhang wrote:
> > This patch adds an option 'vtsc_khz' to allow users to set vcpu's TSC
> > rate in KHz. In the case that tsc_mode = 'default', the default value of
> > 'vtsc_khz' option is
On Mon, Sep 28, 2015 at 12:36:51PM -0400, Boris Ostrovsky wrote:
> On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
> >This patch makes the pvclock return the scaled host TSC and
> >corresponding scaling parameters to HVM domains if guest TSC is not
> >emulated and TSC scaling is enabled.
> >
> >Signe
flight 62420 linux-3.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62420/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qcow2 13 guest-saverestore fail REGR. vs. 60666
test-amd64-i386-xl-vhd
Hi,
In an environment with read-only image files being shared across domains, the
block script becomes exponentially slower with every block attached. While
this is irritating with a few domains, it becomes very problematic with
hundreds of domains.
Part of the issue was mentioned in a udev ti
branch xen-unstable
xen branch xen-unstable
job build-amd64-libvirt
test libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upst
This run is configured for baseline tests only.
flight 38085 qemu-upstream-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38085/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd
flight 62505 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62505/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Mon, Sep 14, 2015 at 5:20 PM, Ian Campbell
wrote:
> On Mon, 2015-09-14 at 14:40 +0200, Christoffer Dall wrote:
> > On Fri, Jul 31, 2015 at 03:17:56PM +0200, Christoffer Dall wrote:
> > > On Fri, Jul 31, 2015 at 12:28 PM, David Vrabel <
> david.vra...@citrix.com
> > > >
> > > wrote:
> > >
> > >
On 28/09/15 21:31, Julien Grall wrote:
> This small series aims to fix the issue discovered by Shameerali when booting
> Xen on his platform.
I forgot to mention that this patch series will clash with other series
I recently sent ([1] and [2]).
I would prefer to see this patch series in staging f
Hi,
This small series aims to fix the issue discovered by Shameerali when booting
Xen on his platform.
Note the last patch is just a clean-up because I was bothered with the really
long name in the I/O emulation. It has been placed at the end so we can
backport easily the first 2 patches in Xen 4
When the guest is accessing the re-distributor, Xen retrieves the base
of the re-distributor using a mask based on the stride.
Although, when the stride contains multiple set, the corresponding mask
will be computed incorrectly [1] and therefore giving invalid vCPU and
offset:
(XEN) d0v0: vGICR:
The field names in the IO emulation are really long and use repeatedly
the term handler which make some line cumbersome to read:
mmio_handler->mmio_handler_ops->write_handler
Also take the opportunity to do some clean up:
- Avoid "handler" vs "handle" in register_mmio_handler
- Use a loca
Some handlers may require to use private data in order to get quickly
information related to the region emulated.
Signed-off-by: Julien Grall
---
Cc: shameerali.kolothum.th...@huawei.com
This will be necessary in the follow-up in order to fix bug in the
GICR emulation.
---
xen/arch/ar
On Mon, Sep 28, 2015 at 01:04:48AM -0600, Jan Beulich wrote:
> >>> On 25.09.15 at 22:59, wrote:
> > From: Elena Ufimtseva
> >
> > This patch addresses a regression introduced by commit
> > 5ae03990c120a7b3067a52d9784c9aa72c0705a6 in new set_identity_p2m_entry.
> > RMRRs are not being mapped in
A clarification:
I also want to COPY the contents of the frames, so there will be no memory
corruption. In essence, only the frame numbers will be changed.
My other question, which is sort of a follow up to this, may be relevant:
"Given two GMFN in shadow paging (HVM) is there a way to swap their
>> +if ( rsp.flags & VM_EVENT_FLAG_SET_REGISTERS )
> >> +vm_event_set_registers(v, &rsp);
> >> +
> >> if ( rsp.flags & VM_EVENT_FLAG_TOGGLE_SINGLESTEP )
> >> vm_event_toggle_singlestep(d, v);
> >
> > What meaning has setting both flags and E
On Mon, Sep 28, 2015 at 10:06 AM, Jan Beulich wrote:
> >>> On 28.09.15 at 17:57, wrote:
> > On 28/09/15 16:25, Jan Beulich wrote:
> > On 28.09.15 at 12:16, wrote:
> >>> +void vm_event_set_registers(struct vcpu *v, vm_event_response_t *rsp)
> >>> +{
> >>> +v->arch.user_regs.eax = rsp->da
flight 62496 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62496/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 15 guest-start.2 fail REGR. vs. 62363
Tests which di
On 25/09/15 17:44, Ian Campbell wrote:
> On Fri, 2015-09-25 at 15:51 +0100, Julien Grall wrote:
> I think you meant s/bit sign/sign bit/ but more correct would be "Sign
> extend if required".
>
>> + * Note that we expect the read handler to have zeroed the bit
>> + * unused in the register
On 25/09/15 17:26, Ian Campbell wrote:
> On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
>> +gicv2.map_cbase = ioremap_nocache(cbase, csize);
>> +if ( !gicv2.map_cbase )
>> panic("GICv2: Failed to ioremap for GIC CPU interface\n");
>
> s/for/the/ or just s/for //.
That's n
On 25/09/15 17:10, Ian Campbell wrote:
> I wonder if it would be worth printing the compatible strings of the node
> we are clobbering? There's a good chance they will be e.g. "arm,psci-0.3"
> (with no backwards compat) or something and knowing that might be useful.
> But maybe it's too much code t
flight 62416 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62416/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-cubietruck 16 guest-start/debian.repeat fail REGR. vs.
62322
Regressions which
Given two GMFN in shadow paging (HVM) is there a way to swap their
contents? Let's say I have GMFN x and GMFN y, I want to put the contents of
x in y and the contents of y in x.
Thanks.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.
Hi,
On Mon, Sep 28, 2015 at 11:01:11AM +0100, Stefano Stabellini wrote:
> No, unfortunately it is not possible at this stage of the release cycle.
> But users can still use QEMU 2.5 (as soon as it is released, which
> should be in a couple of months) with Xen 4.6 as there is not a strong
> tie bet
Hi Ian,
On 28/09/15 11:50, Ian Campbell wrote:
>> diff --git a/xen/arch/arm/vgic-v3.c b/xen/arch/arm/vgic-v3.c
>> index c013200..2787507 100644
>> --- a/xen/arch/arm/vgic-v3.c
>> +++ b/xen/arch/arm/vgic-v3.c
>> @@ -430,18 +430,26 @@ static int __vgic_v3_distr_common_mmio_write(const
>> char *name
On 28/09/15 11:36, Malcolm Crossley wrote:
> Sanitizing the e820 map may produce extra E820 entries which would result in
> the topmost E820 entries being removed. The removed entries would typically
> include the top E820 usable RAM region and thus result in the domain having
> signicantly less RA
On 09/28/2015 06:36 AM, Malcolm Crossley wrote:
Sanitizing the e820 map may produce extra E820 entries which would result in
the topmost E820 entries being removed. The removed entries would typically
include the top E820 usable RAM region and thus result in the domain having
signicantly less RAM
El 21/09/15 a les 17.53, Jan Beulich ha escrit:
On 04.09.15 at 14:09, wrote:
>
> First of all - I suppose it is intentional for this to not consider the Dom0
> side (yet)?
Yes, let's leave Dom0 for a later patch series please, this is already
big enough.
>> --- a/tools/libxc/xc_dom_x86.c
>
On 28/09/15 15:09, Jan Beulich wrote:
On 28.09.15 at 14:39, wrote:
>> --- a/xen/arch/x86/mm/p2m-ept.c
>> +++ b/xen/arch/x86/mm/p2m-ept.c
>> @@ -34,6 +34,8 @@
>>
>> #include "mm-locks.h"
>>
>> +static bool_t __read_mostly cpu_has_ept_ad;
>
> This should be
> #define cpu_has_ept_ad (vmx_e
Hi Ian,
On 25/09/15 17:36, Ian Campbell wrote:
> On Fri, 2015-09-25 at 15:51 +0100, Julien Grall wrote:
>> From: Julien Grall
>>
>> Rather than letting each handler to retrieve the register used by the
>> I/O access, add a new parameter to pass the register in parameter.
>>
>> This will help to i
On 25/09/15 17:44, Ian Campbell wrote:
>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>> index 32b2194..e1b03a2 100644
>> --- a/xen/arch/arm/io.c
>> +++ b/xen/arch/arm/io.c
>> @@ -23,6 +23,32 @@
>> #include
>> #include
>>
>> +static int handle_read(mmio_read_t read_cb, struct vcpu *v,
On 28/09/15 11:52, Ian Campbell wrote:
> On Fri, 2015-09-25 at 15:51 +0100, Julien Grall wrote:
>
>> rank = vgic_rank_offset(v, 8, reg - GICD_IPRIORITYR, DABT_WORD);
>> -if ( rank == NULL ) goto write_ignore;
>> +if ( rank == NULL) goto write_ignore;
>
> Accidental change
On 21/09/15 15:03, Jan Beulich wrote:
> Use unsigned and bool_t as appropriate.
>
> Signed-off-by: Jan Beulich
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 21/09/15 15:03, Jan Beulich wrote:
> ... instead of recalculating them.
>
> At once clean up formatting of the touched code and drop a stray loop
> local variable shadowing a function scope one.
>
> Signed-off-by: Jan Beulich
Reviewed-by: George Dunlap
On 28/09/15 17:32, George Dunlap wrote:
> On 21/09/15 15:02, Jan Beulich wrote:
>> In the EPT case permission changes should also result in updates or
>> TLB flushes.
>>
>> In the NPT case the old MFN does not depend on the new entry being
>> valid (but solely on the old one), and the need to updat
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
This patch makes the pvclock return the scaled host TSC and
corresponding scaling parameters to HVM domains if guest TSC is not
emulated and TSC scaling is enabled.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/time.c | 15 ---
1 fil
On 21/09/15 15:02, Jan Beulich wrote:
> In the EPT case permission changes should also result in updates or
> TLB flushes.
>
> In the NPT case the old MFN does not depend on the new entry being
> valid (but solely on the old one), and the need to update or TLB-flush
> again also depends on permiss
Hi Ian,
On 25/09/15 17:19, Ian Campbell wrote:
> On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
>> The size of the CPU interface will used in a follow-up patch to map the
>> region in Xen memory.
>>
>> Based on GICv2 spec, the CPU interface should at least be 8KB, although
>> most of the p
This run is configured for baseline tests only.
flight 38082 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38082/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-rumpuserxen-amd64 13 rumpuserxen-demo-x
On Mon, 2015-09-28 at 12:40 +0100, Julien Grall wrote:
> We don't seem to have many small task on bugs.xenproject.org/xen, so
> I've CCed a few people who may know if we have small coverity issue to
> fix.
I had a quick glance at coverity and found:
CID1055958: use of mkstemp in libxl_vncviewer_
El 21/09/15 a les 17.44, Jan Beulich ha escrit:
On 04.09.15 at 14:09, wrote:
>> Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
>> VCPUOP_is_up hypercalls from HVM guests.
>>
>> This patch introduces a new structure (vcpu_hvm_context) that should be used
>> in conjuction
>>> On 28.09.15 at 17:57, wrote:
> On 28/09/15 16:25, Jan Beulich wrote:
> On 28.09.15 at 12:16, wrote:
>>> +void vm_event_set_registers(struct vcpu *v, vm_event_response_t *rsp)
>>> +{
>>> +v->arch.user_regs.eax = rsp->data.regs.x86.rax;
>>> +v->arch.user_regs.ebx = rsp->data.regs.x8
On 28/09/15 16:55, Ian Campbell wrote:
> On Mon, 2015-09-28 at 16:44 +0100, Julien Grall wrote:
>>> And that case does indeed seem worth warning about but the commit
>>> message
>>> needs to be clearer about the circumstances of the logging.
>>
>> What about:
>>
>> "Xen is using unconditionally som
>>> On 21.09.15 at 13:33, wrote:
> This patch uses xsaves/xrstors instead of xsaveopt/xrstor
> to perform the xsave_area switching so that xen itself
> can benefit from them when available.
>
> For xsaves/xrstors only use compact format. Add format conversion
> support when perform guest os migra
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
This patch adds a new call-back setup_tsc_scaling in struct
hvm_function_table to apply the TSC scaling ratio to hardware. For VMX,
it writes the TSC scaling ratio to VMCS field TSC_MULTIPLIER.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/hvm/hv
On 28/09/15 15:32, Jan Beulich wrote:
> GFN zero is a valid address, and hence may need invalidation done for
> it just like for any other GFN.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.or
On 28/09/15 16:25, Jan Beulich wrote:
On 28.09.15 at 12:16, wrote:
>> +void vm_event_set_registers(struct vcpu *v, vm_event_response_t *rsp)
>> +{
>> +v->arch.user_regs.eax = rsp->data.regs.x86.rax;
>> +v->arch.user_regs.ebx = rsp->data.regs.x86.rbx;
>> +v->arch.user_regs.ecx = rs
Signed-off-by: Anthony PERARD
---
Change in V3:
- Switch to "track" Nova tree instead of devstack.
Nova is the service we care about from a Xen point of view.
Also it is updated much more often than devstack.
- Use TREE_OPENSTACK_ as prefix for all trees variables.
- Change the filter, ke
This script runs the OpenStack integration test suite, Tempest.
Signed-off-by: Anthony PERARD
---
Change in V3:
- Use host as argument of the script.
- Use selecthost() and get rid of $gho.
- Use target_jobdir() instead of builddirsprops().
- Put the ignored Tempest tests into a var and try to e
Hi,
I have looked into getting OpenStack been tested on the latest Xen via
osstest.
The ts-openstack-deploy script does prepare a bit more the host, clone
devstack and other OpenStack trees, then run ./stack.sh, which is a bit
like raisin and deploy OpenStack on the host. Once the machine is read
This script installs any necessary packages and clones all of the OpenStack
trees which are used by devstack to deploy OpenStack.
Signed-off-by: Anthony PERARD
---
Change in V3:
- Use host as argument to run the job.
- Use selectjob() and get rid of the unused $gho.
- Use target_jobdir() instead
On Mon, 2015-09-28 at 16:44 +0100, Julien Grall wrote:
> > And that case does indeed seem worth warning about but the commit
> > message
> > needs to be clearer about the circumstances of the logging.
>
> What about:
>
> "Xen is using unconditionally some device tree path to create DOM0
"uncondi
On 09/28/2015 06:25 PM, Jan Beulich wrote:
On 28.09.15 at 12:16, wrote:
>> +void vm_event_set_registers(struct vcpu *v, vm_event_response_t *rsp)
>> +{
>> +v->arch.user_regs.eax = rsp->data.regs.x86.rax;
>> +v->arch.user_regs.ebx = rsp->data.regs.x86.rbx;
>> +v->arch.user_regs.ecx
On Mon, Sep 28, 2015 at 05:35:56PM +0200, Dario Faggioli wrote:
> On Mon, 2015-09-28 at 15:13 +0100, Wei Liu wrote:
> > On Mon, Sep 28, 2015 at 07:54:51PM +0800, Chao Peng wrote:
>
> > > diff --git a/tools/libxl/libxl_psr.c b/tools/libxl/libxl_psr.c
> > > index 3378239..10e1113 100644
>
> > > @@
Hi Ian,
On 25/09/15 17:10, Ian Campbell wrote:
> On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
>> Xen is using unconditionnally some device tree path to create DOM0
>
> "unconditionally"
>
>> specific node (for instance /psci, /memory and /hypervisor).
>>
>> Rather than blindly add new
On Mon, 2015-09-28 at 15:16 +0100, Wei Liu wrote:
> On Mon, Sep 28, 2015 at 07:54:48PM +0800, Chao Peng wrote:
> > The patch basically contains several PSR fixes in libxl.
> > patch1-3: fix the socket display error in certain hotplug case.
> > patch4: fix a minor range check.
> > patch5: improv
On Fri, 2015-09-25 at 13:26 +0100, Ian Campbell wrote:
> On Mon, 2015-09-21 at 12:54 +0100, Ian Campbell wrote:
> > On Fri, 2015-09-18 at 11:30 +0100, Wei Liu wrote:
> >
> > > > > H I forgot my Signed-off-by :(.
> > > > >
> > > > > Signed-off-by: Julien Grall
> > > >
> > > > Acked-by: Ian C
On Mon, Sep 28, 2015 at 05:06:31PM +0200, Dario Faggioli wrote:
> On Mon, 2015-09-28 at 19:54 +0800, Chao Peng wrote:
>
> > diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
> > index 2706759..c72d3df 100644
>
> > @@ -8228,9 +8228,9 @@ static void
> > psr_cmt_print_domain_info(libx
On Mon, 2015-09-28 at 15:13 +0100, Wei Liu wrote:
> On Mon, Sep 28, 2015 at 07:54:51PM +0800, Chao Peng wrote:
> > diff --git a/tools/libxl/libxl_psr.c b/tools/libxl/libxl_psr.c
> > index 3378239..10e1113 100644
> > @@ -339,7 +339,8 @@ int libxl_psr_cat_get_l3_info(libxl_ctx *ctx,
> > libxl_psr_c
Committers,
RC4 is tagged. You can now commit rest of your 4.6 queue to staging-4.6.
Note that we expect to release in about two weeks (Oct 12). Preferably
all patches should be applied within this week so that we can sort out
any problem within next week.
Wei.
_
On 28/09/15 16:19, Ian Campbell wrote:
> On Mon, 2015-09-28 at 15:59 +0100, Julien Grall wrote:
>> Hi Ian,
>>
>> On 25/09/15 17:01, Ian Campbell wrote:
>>> On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
The function dt_n_*_cells will retrieve the number of cells for a
given
n
>>> On 28.09.15 at 12:16, wrote:
> +void vm_event_set_registers(struct vcpu *v, vm_event_response_t *rsp)
> +{
> +v->arch.user_regs.eax = rsp->data.regs.x86.rax;
> +v->arch.user_regs.ebx = rsp->data.regs.x86.rbx;
> +v->arch.user_regs.ecx = rsp->data.regs.x86.rcx;
> +v->arch.user_re
Hi all
Xen 4.6 RC4 has been tagged. You can check out the tag 4.6.0-rc4 in xen.git.
The tarball can be downloaded from:
http://bits.xensource.com/oss-xen/release/4.6.0-rc4/xen-4.6.0-rc4.tar.gz
Signature for tarball:
http://bits.xensource.com/oss-xen/release/4.6.0-rc4/xen-4.6.0-rc4.tar.gz.sig
On Mon, 2015-09-28 at 15:59 +0100, Julien Grall wrote:
> Hi Ian,
>
> On 25/09/15 17:01, Ian Campbell wrote:
> > On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
> > > The function dt_n_*_cells will retrieve the number of cells for a
> > > given
> > > node. Those numbers may not be correct to
On Mon, 2015-09-28 at 15:14 +0100, Wei Liu wrote:
> On Mon, Sep 28, 2015 at 07:54:52PM +0800, Chao Peng wrote:
> > The 'end' should be inclusive.
> >
> > Signed-off-by: Chao Peng
>
> Acked-by: Wei Liu
>
Reviewed-by: Dario Faggioli
Regards,
Dario
--
<> (Raistlin Majere)
-
On Mon, 2015-09-28 at 19:54 +0800, Chao Peng wrote:
> Make the chapter name and reference url more precise.
>
This is pretty much the title of the changeset already, so I don't
think it's worth repeating it here. I think you can well kill it, and
just start with "Drop the chapter number as it can.
>>> On 28.09.15 at 11:06, wrote:
On 28.09.15 at 10:55, wrote:
>> Acked-by: Kevin Tian
>
> Thanks, but quite a bit more important would have been a reply
> to this
>
>>>In addition to the fixes here it looks to me as if both EPT and
>>>NPT/shadow code lack invalidation of IOMMU side paging
On Mon, 2015-09-28 at 19:54 +0800, Chao Peng wrote:
> diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
> index 2706759..c72d3df 100644
> @@ -8228,9 +8228,9 @@ static void
> psr_cmt_print_domain_info(libxl_dominfo *dominfo,
>
> static int psr_cmt_show(libxl_psr_cmt_type type, ui
On Mon, Sep 28, 2015 at 3:42 PM, Jan Beulich wrote:
> There's no point in enabling the extra feature for every domain when
> we're not meaning to use it (yet). Just setting the flag should be
> sufficient - the domain is required to be paused for PML enabling
> anyway, i.e. hardware will pick up t
Hi Ian,
On 25/09/15 17:01, Ian Campbell wrote:
> On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
>> The function dt_n_*_cells will retrieve the number of cells for a given
>> node. Those numbers may not be correct to use for the child "reg"
>> property if the parent is passed.
>
> I think
On Mon, Sep 28, 2015 at 04:53:58PM +0200, Dario Faggioli wrote:
> On Mon, 2015-09-28 at 15:12 +0100, Wei Liu wrote:
> > On Mon, Sep 28, 2015 at 07:54:49PM +0800, Chao Peng wrote:
>
> > > diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
> > > index 5f9047c..5a91687 100644
> > > --- a/tools/li
Hi Ian,
On 25/09/15 16:48, Ian Campbell wrote:
> On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
>
> "Make it clear..." in the subject.
>
>> The callback make_hwdom_dt_node already have the gic node in parameter.
>
> "...already has the..." or "...already takes the..."
>
>> Rather than
On 28/09/15 15:03, Jan Beulich wrote:
On 28.09.15 at 14:43, wrote:
>> At 13:39 +0100 on 28 Sep (1443447574), Ross Lagerwall wrote:
>>> @@ -1150,6 +1152,9 @@ int ept_p2m_init(struct p2m_domain *p2m)
>>> p2m->memory_type_changed = ept_memory_type_changed;
>>> p2m->audit_p2m = NULL;
>>
On Mon, 2015-09-28 at 15:12 +0100, Wei Liu wrote:
> On Mon, Sep 28, 2015 at 07:54:49PM +0800, Chao Peng wrote:
> > diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
> > index 5f9047c..5a91687 100644
> > --- a/tools/libxl/libxl.h
> > +++ b/tools/libxl/libxl.h
> >
> > /*
> > - * LIBXL_HAVE_S
>>> On 28.09.15 at 16:48, wrote:
> On 28/09/15 15:03, Jan Beulich wrote:
> On 28.09.15 at 14:43, wrote:
>>> At 13:39 +0100 on 28 Sep (1443447574), Ross Lagerwall wrote:
@@ -1150,6 +1152,9 @@ int ept_p2m_init(struct p2m_domain *p2m)
p2m->memory_type_changed = ept_memory_type_cha
On 28/09/15 15:35, Jan Beulich wrote:
> The function returns a boolean and its current and target level inputs
> are unsigned (which in turn allows simplifying the early-out check).
> Also convert a non-standard loop variable to an ordinary function scope
> one, at once making it unsigned too.
>
>
flight 62414 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62414/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-raw 6 xen-boot fail in 62151 pass in 62414
test-amd64-i386-xl-vh
There's no point in enabling the extra feature for every domain when
we're not meaning to use it (yet). Just setting the flag should be
sufficient - the domain is required to be paused for PML enabling
anyway, i.e. hardware will pick up the new setting the next time
each vCPU of the guest gets sche
On Sun, 2015-09-27 at 20:07 +, osstest service owner wrote:
> flight 62328 xen-4.6-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/62328/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-amd64-
The function returns a boolean and its current and target level inputs
are unsigned (which in turn allows simplifying the early-out check).
Also convert a non-standard loop variable to an ordinary function scope
one, at once making it unsigned too.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/m
GFN zero is a valid address, and hence may need invalidation done for
it just like for any other GFN.
Signed-off-by: Jan Beulich
---
The comment right before the respective dmar_writeq() confuses me: What
"first" TLB reg does it talk about? Is it simply stale (albeit it has
been there already in
Now that p2m->get_entry() always returns a valid order, utilize this
to accelerate some of the operations in PoD code. (There are two uses
of p2m->get_entry() left which don't easily lend themselves to this
optimization.)
Also adjust a few types as needed and remove stale comments from
p2m_pod_cac
On 28/09/15 15:02, Boris Ostrovsky wrote:
> On 09/28/2015 09:59 AM, Julien Grall wrote:
>> Hi David,
>>
>> On 28/09/15 14:52, David Vrabel wrote:
>>> On 28/09/15 14:30, Julien Grall wrote:
The PCI support for Xen doesn't compile on ARM/ARM64 when
CONFIG_PCI_MMCONFIG=y:
drivers/x
On 25/09/15 10:59, Vitaly Kuznetsov wrote:
> Currently there is a number of issues preventing PVHVM Xen guests from
> doing successful kexec/kdump:
> - Bound event channels.
> - Registered vcpu_info.
> - PIRQ/emuirq mappings.
> - shared_info frame after XENMAPSPACE_shared_info operation.
> - Active
On 28/09/15 15:02, Boris Ostrovsky wrote:
> On 09/28/2015 09:59 AM, Julien Grall wrote:
>> Hi David,
>>
>> On 28/09/15 14:52, David Vrabel wrote:
>>> On 28/09/15 14:30, Julien Grall wrote:
The PCI support for Xen doesn't compile on ARM/ARM64 when
CONFIG_PCI_MMCONFIG=y:
drivers/x
On 28/09/15 14:48, Stefano Stabellini wrote:
> On Mon, 28 Sep 2015, Julien Grall wrote:
>> The PCI support for Xen doesn't compile on ARM/ARM64 when
>> CONFIG_PCI_MMCONFIG=y:
>>
>> drivers/xen/pci.c:31:25: fatal error: asm/pci_x86.h: No such file or
>> directory
>> #include
>>
>> Although, Xen is
1 - 100 of 221 matches
Mail list logo