>>> On 22.10.15 at 18:13, wrote:
> On 22/10/15 16:48, Jan Beulich wrote:
> On 22.10.15 at 17:43, wrote:
>>> @@ -477,7 +477,7 @@ p2m_pod_offline_or_broken_replace(struct page_info *p)
>>>
>>> free_domheap_page(p);
>>>
>>> -p = alloc_domheap_page(d, PAGE_ORDER_4K);
>>> +p = all
> -Original Message-
> From: Hu, Robert
> Sent: Thursday, October 22, 2015 10:33 AM
> To: 'Ian Jackson' ;
> 'xen-de...@lists.xenproject.org'
> Cc: 'Ian Campbell'
> Subject: RE: [OSSTEST PATCH 26/26] ts-xen-install: networking: Rename
> `nodhcp' to `ensurebridge'
>
> > -Original Messa
Hi all,
I am interested in the project Refactor Linux hotplug scripts for
Outreachy(Round 11). I am more of an intermediate-beginner in c. Please can
anyone provide some pointers and helper about the things I need to do to join
this project.
Thanks,
Nadya Ampilogova
__
flight 63209 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63209/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf a7e173b07a1ef336fc8d753cf85ae8473e92365a
baseline version:
ovmf 0f34a051104e2b1b9123d56d48673de4b21
On 10/22/2015 07:14 PM, Dario Faggioli wrote:
In fact, right now, failing at destroying a cpupool is just
not reported to the user in any explicit way. Log an error,
as it is customary for xl in these cases.
While there, take the chance to turn a couple of xl exit
codes into EXIT_[SUCCESS|FAILUR
flight 63206 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63206/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 6 xen-boot fail REGR. vs. 60684
test-amd64
This run is configured for baseline tests only.
flight 38199 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38199/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-
flight 63207 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63207/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-raw 9 debian-di-installfail never pass
test-armhf-armhf-libvirt-qcow2 9 debian-di
Kindly ping ...
Thanks,
Feng
> -Original Message-
> From: Wu, Feng
> Sent: Monday, October 12, 2015 4:55 PM
> To: xen-devel@lists.xen.org
> Cc: Wu, Feng
> Subject: [PATCH v8 00/17] Add VT-d Posted-Interrupts support
>
> VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interru
2015-10-14 11:54 GMT-04:00 Dario Faggioli :
> As, curently, there is no reason for bothering having
> it and keeping it updated.
>
> In fact, it is only used for dumping and changing
> vCPUs parameters, but that can be achieved easily with
> for_each_vcpu.
>
> While there, take care of the case whe
This run is configured for baseline tests only.
flight 38198 xen-4.4-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38198/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 9 d
flight 63205 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63205/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-winxpsp3 16 guest-localmigrate/x10 fail in 63142
REGR. vs. 62380
Test
On Thu, Oct 22, 2015 at 03:19:19PM -0400, Boris Ostrovsky wrote:
> On 10/22/2015 01:12 PM, Haozhong Zhang wrote:
> >On Thu, Oct 22, 2015 at 11:55:00AM -0400, Boris Ostrovsky wrote:
> >>On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
> >>>If VMX TSC scaling is enabled and no TSC emulation is used,
> >
Should not allocate queues number more than online cpus.
Signed-off-by: Joe Jin
Cc: Boris Ostrovsky
Cc: Konrad Rzeszutek Wilk
Cc: David S. Miller
---
drivers/net/xen-netfront.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/net/xen-netfront.c b/drivers/net/x
On Thu, Oct 22, 2015 at 07:52:08AM -0600, Jan Beulich wrote:
> >>> On 28.09.15 at 09:13, wrote:
> > --- a/xen/arch/x86/hvm/hvm.c
> > +++ b/xen/arch/x86/hvm/hvm.c
> > @@ -297,6 +297,59 @@ int hvm_set_guest_pat(struct vcpu *v, u64 guest_pat)
> > return 1;
> > }
> >
> > +/*
> > + * Multiply t
flight 63203 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63203/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 62277
test-amd64-amd64-xl-qem
Ian Campbell, le Wed 21 Oct 2015 16:24:14 +0100, a écrit :
> We intend to stabilise some parts of the libxenctrl interface by
> splitting out some functionality into separate stable libraries.
>
> This is the mini-os part of the first phase of that change.
>
> This mail is (or is intended to be)
This run is configured for baseline tests only.
flight 38196 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38196/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 0f34a051104e2b1b9123d56d48673de4b21bc533
baseline version:
ovm
On 10/22/2015 01:12 PM, Haozhong Zhang wrote:
On Thu, Oct 22, 2015 at 11:55:00AM -0400, Boris Ostrovsky wrote:
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
If VMX TSC scaling is enabled and no TSC emulation is used,
vmx_set_tsc_offset() will calculate the TSC offset by substracting the
scaled
On 10/22/2015 12:44 PM, Haozhong Zhang wrote:
On Thu, Oct 22, 2015 at 11:50:18AM -0400, Boris Ostrovsky wrote:
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
This patch makes the pvclock return the scaled host TSC and
corresponding scaling parameters to HVM domains if guest TSC is not
emulated a
flight 63202 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63202/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 63117
Regressions which a
flight 63218 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63218/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
flight 38197 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38197/
Perfect :-)
All tests in this flight passed
baseline version:
flight 38170
jobs:
build-amd64 pass
build-armhf
Hi,
On 22/10/15 16:42, Ian Campbell wrote:
> On Mon, 2015-10-12 at 16:39 +0100, Julien Grall wrote:
>
> Subject: support PSCI v1.0 for the host.
>
>> From Xen point of view, PSCI v0.2 and PSCI v1.0 are very similar. All
>Xen's
>
>> the PSCI calls used within Xen (PSCI_VERSION, CPU_ON, S
Hi Ian,
On 22/10/15 17:17, Ian Campbell wrote:
> On Mon, 2015-10-12 at 15:22 +0100, Julien Grall wrote:
>> [...]
>> /* Only migrate the vIRQ if the target vCPU has changed */
>> if ( new_target != old_target )
>> {
>> +unsigned int virq = rank->index * NR_INT
In fact, right now, failing at destroying a cpupool is just
not reported to the user in any explicit way. Log an error,
as it is customary for xl in these cases.
While there, take the chance to turn a couple of xl exit
codes into EXIT_[SUCCESS|FAILURE], as discussed and agreed
here:
http://lists
From: Elena Ufimtseva
Its being a while since the last v10. There are subtle changes and fewer
patches in the series and will be nice to move it out of my way.
Please review and comment.
Add Xen command line option rmrr to specify RMRR
regions for devices that are
From: Elena Ufimtseva
For sbdf's parsing in RMRR command line add __parse_pci with additional
parameter def_seg. __parse_pci will help to identify if segment was
found in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not affected.
Signed
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified in ACPI and thus will not
be mapped 1:1 in dom0. This causes IO Page Faults and prevents dom0 from booting
in PVH mode. New Xen command line option rmrr allows to specify such devices and
memory regions. These regions are a
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
Signed-off-by: Elena Ufimtseva
Reviewed-by: Konrad Rzeszutek Wilk
---
xen/drivers/passthr
On Thu, Oct 22, 2015 at 11:55:00AM -0400, Boris Ostrovsky wrote:
> On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
> >If VMX TSC scaling is enabled and no TSC emulation is used,
> >vmx_set_tsc_offset() will calculate the TSC offset by substracting the
> >scaled host TSC from the current guest TSC.
>
Stefano Stabellini writes ("Re: [PATCH] Config.mk: update OVMF changeset"):
> On Thu, 22 Oct 2015, Ian Campbell wrote:
> > This was discussed prior to Wei submitting this patch, but I can't remember
> > the reference. Hopefully either Wei or Stefano does.
>
> 1444832748.23192.213.ca...@citrix.com
On Thu, 2015-10-22 at 17:13 +0100, Julien Grall wrote:
> On 22/10/15 16:48, Jan Beulich wrote:
> > > > > On 22.10.15 at 17:43, wrote:
> > > @@ -477,7 +477,7 @@ p2m_pod_offline_or_broken_replace(struct
> > > page_info *p)
> > >
> > > free_domheap_page(p);
> > >
> > > -p = alloc_domheap
On 22/10/15 17:07, Ian Campbell wrote:
>> diff --git a/xen/arch/arm/vgic-v2.c b/xen/arch/arm/vgic-v2.c
>> index 665afeb..6b7eab3 100644
>> --- a/xen/arch/arm/vgic-v2.c
>> +++ b/xen/arch/arm/vgic-v2.c
>> @@ -50,6 +50,94 @@ void vgic_v2_setup_hw(paddr_t dbase, paddr_t cbase,
>> paddr_t vbase)
>>
On Wed, 21 Oct 2015, Ian Campbell wrote:
> All of the work in con_disconnect applies to the primary console case
> (when xendev->dev is NULL). Therefore remove the early check and bail
> and allow it to fall through. All of the existing code is correctly
> conditional already.
>
> The ->dev and ->
On Thu, Oct 22, 2015 at 11:50:18AM -0400, Boris Ostrovsky wrote:
> On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
> >This patch makes the pvclock return the scaled host TSC and
> >corresponding scaling parameters to HVM domains if guest TSC is not
> >emulated and TSC scaling is enabled.
> >
> >Signe
On Mon, 2015-10-19 at 12:39 +0200, Juergen Gross wrote:
> On 10/09/2015 09:08 PM, Konrad Rzeszutek Wilk wrote:
> > On Fri, Oct 09, 2015 at 04:12:12PM +0100, Ian Campbell wrote:
> > > On Thu, 2015-10-08 at 17:23 +0200, Juergen Gross wrote:
> > > > The pv domain builder currently supports the additio
On Thu, Oct 22, 2015 at 10:05:39AM -0600, Jan Beulich wrote:
> >>> On 22.10.15 at 17:55, wrote:
> > On Thu, Oct 22, 2015 at 07:13:07AM -0600, Jan Beulich wrote:
> >> >>> On 28.09.15 at 09:13, wrote:
> >> > +{
> >> > +printk(XENLOG_WARNING
> >> > + "Invalid TSC scaling ra
Hi Ian,
On 22/10/15 16:53, Ian Campbell wrote:
> On Mon, 2015-10-12 at 15:22 +0100, Julien Grall wrote:
>
> Subject: "correctly handle" and "writes"
>
>> During a store, the byte is always in the low part of the register (i.e
>> [0:7]).
>>
>> Although, we are masking the register by using a shif
On Wed, 2015-10-21 at 15:15 +0100, Wei Liu wrote:
> That directory is used to store guest memory dump which contains
> sensitive information.
>
> Signed-off-by: Wei Liu
Acked-by: Ian Campbell
Have you audited all the paths we create and determined that this is the
only one which needs adjustin
On Wed, 2015-10-21 at 14:07 +0100, Wei Liu wrote:
> The xenstore path to look at when stubdom is in used is different. Libxl
> should look at stubdom path instead.
It took me a while to work this out, so please mention that the VNC in
question is the backend corresponding to the stubdom's PVFB (in
On Thu, 2015-10-22 at 16:58 +0100, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH] Config.mk: update OVMF changeset"):
> > On Wed, 2015-10-14 at 12:41 +0100, Wei Liu wrote:
> > > Signed-off-by: Wei Liu
> >
> > Acked + applied.
> >
> > Ian, I beleive Stefano would like to see this in 4.6 a
On Thu, Oct 22, 2015 at 11:44:52AM -0400, Boris Ostrovsky wrote:
> On 10/22/2015 10:17 AM, Jan Beulich wrote:
> On 28.09.15 at 09:13, wrote:
> >>The existing hvm_set_guest_tsc_fixed() and hvm_get_guest_tsc_fixed()
> >>calculate the guest TSC by adding the TSC offset to the host TSC. When
> >>t
On Thu, 2015-10-22 at 16:39 +0100, Ian Jackson wrote:
> assert is not async-signal-safe.
I don't doubt you, but I'm curious regarding a reference.
http://pubs.opengroup.org/onlinepubs/9699919799/functions/assert.html doesn
't appear to be it, unless it is too subtle for me.
> In practice the eff
On Thu, 22 Oct 2015, Boris Ostrovsky wrote:
> On 10/22/2015 12:13 PM, Stefano Stabellini wrote:
> > On Wed, 21 Oct 2015, Stefano Stabellini wrote:
> > > On Wed, 21 Oct 2015, Boris Ostrovsky wrote:
> > > > On 10/21/2015 09:00 AM, Stefano Stabellini wrote:
> > > > > > diff --git a/arch/x86/include/as
On Thu, 22 Oct 2015, George Dunlap wrote:
> On Wed, Oct 21, 2015 at 4:02 PM, Stefano Stabellini
> wrote:
> >> ! = Summary =
> >> !
> >> ! There seems to be a clear consensus against the current veto model. From
> >> ! the comments there was no clear case for a simple majority, but for a
> >> high
flight 63181 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63181/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 62983
Tests which did not succeed, but a
On Mon, 2015-10-12 at 15:22 +0100, Julien Grall wrote:
> [...]
> /* Only migrate the vIRQ if the target vCPU has changed */
> if ( new_target != old_target )
> {
> +unsigned int virq = rank->index * NR_INTERRUPT_PER_RANK + offset;
FWIW this was the value of o
On 10/22/2015 12:13 PM, Stefano Stabellini wrote:
On Wed, 21 Oct 2015, Stefano Stabellini wrote:
On Wed, 21 Oct 2015, Boris Ostrovsky wrote:
On 10/21/2015 09:00 AM, Stefano Stabellini wrote:
diff --git a/arch/x86/include/asm/xen/hypervisor.h
b/arch/x86/include/asm/xen/hypervisor.h
index d86695
On 22/10/15 16:48, Jan Beulich wrote:
On 22.10.15 at 17:43, wrote:
>> @@ -477,7 +477,7 @@ p2m_pod_offline_or_broken_replace(struct page_info *p)
>>
>> free_domheap_page(p);
>>
>> -p = alloc_domheap_page(d, PAGE_ORDER_4K);
>> +p = alloc_domheap_page(d, 0);
>
> I realize that
On Wed, 21 Oct 2015, Stefano Stabellini wrote:
> On Wed, 21 Oct 2015, Boris Ostrovsky wrote:
> > On 10/21/2015 09:00 AM, Stefano Stabellini wrote:
> > > >
> > > > diff --git a/arch/x86/include/asm/xen/hypervisor.h
> > > > b/arch/x86/include/asm/xen/hypervisor.h
> > > > index d866959..8b2d4be 10064
On Thu, 22 Oct 2015, Ian Campbell wrote:
> On Thu, 2015-10-22 at 16:58 +0100, Ian Jackson wrote:
> > Ian Campbell writes ("Re: [PATCH] Config.mk: update OVMF changeset"):
> > > On Wed, 2015-10-14 at 12:41 +0100, Wei Liu wrote:
> > > > Signed-off-by: Wei Liu
> > >
> > > Acked + applied.
> > >
> >
On Mon, 2015-10-12 at 15:22 +0100, Julien Grall wrote:
> The current implementation ignores the whole write if one of the field is
> 0. Although, based on the spec (4.3.12 IHI 0048B.b), 0 is a valid value
> when:
> - The interrupt is not wired in the distributor. From the Xen
> point of vie
>>> On 22.10.15 at 17:55, wrote:
> On Thu, Oct 22, 2015 at 07:13:07AM -0600, Jan Beulich wrote:
>> >>> On 28.09.15 at 09:13, wrote:
>> > +{
>> > +printk(XENLOG_WARNING
>> > + "Invalid TSC scaling ratio - virtual tsc khz=%lu\n",
>> > + khz);
>>
>> Who can i
On Thu, Oct 22, 2015 at 08:17:29AM -0600, Jan Beulich wrote:
> >>> On 28.09.15 at 09:13, wrote:
> > The existing hvm_set_guest_tsc_fixed() and hvm_get_guest_tsc_fixed()
> > calculate the guest TSC by adding the TSC offset to the host TSC. When
> > the TSC scaling is enabled, the host TSC should be
On Thu, Oct 22, 2015 at 04:58:52PM +0100, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH] Config.mk: update OVMF changeset"):
> > On Wed, 2015-10-14 at 12:41 +0100, Wei Liu wrote:
> > > Signed-off-by: Wei Liu
> >
> > Acked + applied.
> >
> > Ian, I beleive Stefano would like to see this i
Ian Campbell writes ("Re: [PATCH] Config.mk: update OVMF changeset"):
> On Wed, 2015-10-14 at 12:41 +0100, Wei Liu wrote:
> > Signed-off-by: Wei Liu
>
> Acked + applied.
>
> Ian, I beleive Stefano would like to see this in 4.6 at some point.
...
> To ssh://xenbits.xen.org/home/xen/git/ovmf.git
>
On Thu, Oct 22, 2015 at 08:51:13AM -0600, Jan Beulich wrote:
> >>> On 22.10.15 at 16:40, wrote:
> > On Thu, Oct 22, 2015 at 06:53:27AM -0600, Jan Beulich wrote:
> >> >>> On 28.09.15 at 09:13, wrote:
> >> > --- a/xen/include/asm-x86/hvm/svm/svm.h
> >> > +++ b/xen/include/asm-x86/hvm/svm/svm.h
> >>
On Mon, 2015-10-19 at 10:38 +0100, Wei Liu wrote:
> On Mon, Oct 19, 2015 at 03:31:55PM +0800, He Chen wrote:
> > This is the xl/xc changes to support Intel Code/Data Prioritization.
> > CAT xl commands to set/get CBMs are extended to support CDP.
> > Add new CDP options with CAT commands in xl inte
On Mon, 2015-10-19 at 13:58 +0100, Julien Grall wrote:
> With the current log is not possible for the user to understand
> properly the error:
>
> (XEN) Grant table range: 0x007fc0-0x007fc72000
> (XEN) DT: no ranges; cannot enumerate
> (XEN) Device tree generation failed (-22).
> (XEN)
On Thu, Oct 22, 2015 at 07:13:07AM -0600, Jan Beulich wrote:
> >>> On 28.09.15 at 09:13, wrote:
> > This patch adds a field tsc_scaling_ratio in struct arch_vcpu to
>
> Why not in struct hvm_vcpu? Are you intending any use for PV guests?
>
No, I'll move tsc_scaling_ratio to struct hvm_cpu.
> >
On Wed, 2015-10-14 at 12:41 +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
Acked + applied.
Ian, I beleive Stefano would like to see this in 4.6 at some point.
> ---
> Please pull from
>
> git://xenbits.xen.org/osstest/ovmf.git xen-tested-master
>
> and push the aforementioned commit to
>
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
If VMX TSC scaling is enabled and no TSC emulation is used,
vmx_set_tsc_offset() will calculate the TSC offset by substracting the
scaled host TSC from the current guest TSC.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/hvm/vmx/vmx.c | 15 ++
On Fri, 2015-10-16 at 15:01 +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[PATCH] libxl: No emulated disk driver for xvdX
> disk"):
> > When a guest configuration list xvdX for its disks, there is no need to
> > provide an emulated driver for the same target.
> >
> > Such configuration can w
On Fri, 2015-10-16 at 12:46 +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH] tools: libxl: CODING_STYLE: GC* cannot be
> used with NOGC"):
> > On Fri, Oct 16, 2015 at 12:14:05PM +0100, Ian Campbell wrote:
> > > On Fri, 2015-10-16 at 11:39 +0100, Wei Liu wrote:
> > > > There is no libxl__all
On Thu, 2015-07-30 at 12:03 +0100, Wei Liu wrote:
> On Wed, Jul 15, 2015 at 11:21:17AM +0100, Ian Campbell wrote:
> > This is the result of
> > $ find -name \*.l -exec touch {} \;
> > $ find -name \*.y -exec touch {} \;
> >
> > and then rebuilding.
> >
> > This avoids churn on the machine I u
On Mon, 2015-10-12 at 15:22 +0100, Julien Grall wrote:
Subject: "correctly handle" and "writes"
> During a store, the byte is always in the low part of the register (i.e
> [0:7]).
>
> Although, we are masking the register by using a shift of the
> byte offset in the ITARGETSR. This will result t
On 19/10/15 11:36, Juergen Gross wrote:
> On 10/06/2015 03:17 PM, Ian Campbell wrote:
>> On Tue, 2015-10-06 at 14:06 +0100, Andrew Cooper wrote:
>>> On 06/10/15 13:58, Wei Liu wrote:
On Tue, Oct 06, 2015 at 01:52:16PM +0100, Andrew Cooper wrote:
> On 06/10/15 12:35, Juergen Gross wrote:
>>
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
This patch makes the pvclock return the scaled host TSC and
corresponding scaling parameters to HVM domains if guest TSC is not
emulated and TSC scaling is enabled.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/time.c | 15 ---
1 fil
>>> On 22.10.15 at 17:43, wrote:
> @@ -477,7 +477,7 @@ p2m_pod_offline_or_broken_replace(struct page_info *p)
>
> free_domheap_page(p);
>
> -p = alloc_domheap_page(d, PAGE_ORDER_4K);
> +p = alloc_domheap_page(d, 0);
I realize that this is the easiest fix, but I think here we inst
On 10/22/2015 10:17 AM, Jan Beulich wrote:
On 28.09.15 at 09:13, wrote:
The existing hvm_set_guest_tsc_fixed() and hvm_get_guest_tsc_fixed()
calculate the guest TSC by adding the TSC offset to the host TSC. When
the TSC scaling is enabled, the host TSC should be scaled first. This
patch adds th
The last parameter of alloc_domheap_page{s,} contain the memory flags and
not the order of the allocation.
Use 0 as it was before 1069d63c5ef2510d08b83b2171af660e5bb18c63
"x86/mm/p2m: use defines for page sizes".
Note that PAGE_ORDER_4K is also equal to 0 so the behavior stays the
same.
Signed-o
On Mon, 2015-10-12 at 16:39 +0100, Julien Grall wrote:
Subject: support PSCI v1.0 for the host.
> From Xen point of view, PSCI v0.2 and PSCI v1.0 are very similar. All
Xen's
> the PSCI calls used within Xen (PSCI_VERSION, CPU_ON, SYSTEM_OFF and
> SYSTEM_RESET) behaves exactly the same.
assert is not async-signal-safe.
In practice the effect of calling assert there is that if the
assertion fails we might get a secondary crash, or other undesirable
behaviour from stdio (which is how assert usually reports failures).
Mention in a comment in libxl__self_pipe_wakeup that it has to b
On Thu, 2015-10-22 at 16:22 +0100, Ian Jackson wrote:
> Juergen Gross writes ("Re: [Xen-devel] [PATCH] libxc: remove most of
> tools/libxc/xc_dom_compat_linux.c"):
> > On 10/06/2015 03:17 PM, Ian Campbell wrote:
> > > xc_dom_linux_build is implemented in terms of the non-compat xc_dom_*
> > > funct
On 22/10/15 16:07, Ferger, Max wrote:
> Hello,
Hi,
> 2) Dom0 kernel is coming up and showing messages:
>
>> From: Julien Grall [mailto:julien.gr...@citrix.com]
>> Sent: Wednesday, October 21, 2015 8:02 PM
>>
>> To be sure, even the patch I attached on the previous mail doesn't help
>> you to get
On 22/10/15 16:04, Julien Grall wrote:
> Hi,
>
> I was looking to the pod code (arch/x86/mm/p2m-pod.c) and noticed that
> the calls to alloc_domheap_page{s,} seems to take wrong parameter:
>
> page = alloc_domheap_pages(d, order, PAGE_ORDER_4K);
>
> p = alloc_domheap_page(d, PAGE_ORDER_4K);
>
> AFA
On Mon, 2015-10-19 at 08:48 -0600, Jan Beulich wrote:
> It's wired up on x86 only.
>
> Signed-off-by: Jan Beulich
Acked-by: Ian Campbell
(ARM + REST hats)
I tried to apply but it didn't for some reason. I didn't investigate, I
guess you will push yourself.
> --- a/xen/arch/x86/Rules.mk
> +++
Juergen Gross writes ("Re: [Xen-devel] [PATCH] libxc: remove most of
tools/libxc/xc_dom_compat_linux.c"):
> On 10/06/2015 03:17 PM, Ian Campbell wrote:
> > xc_dom_linux_build is implemented in terms of the non-compat xc_dom_*
> > functions, so it should be possible to do what you want with out usi
On Wed, Oct 21, 2015 at 4:02 PM, Stefano Stabellini
wrote:
>> ! = Summary =
>> !
>> ! There seems to be a clear consensus against the current veto model. From
>> ! the comments there was no clear case for a simple majority, but for a
>> higher
>> ! bar of consensus (2/3, 75% or <20% objections) d
On Tue, Oct 06, 2015 at 02:17:41PM +0100, Ian Campbell wrote:
> On Tue, 2015-10-06 at 14:06 +0100, Andrew Cooper wrote:
> > On 06/10/15 13:58, Wei Liu wrote:
> > > On Tue, Oct 06, 2015 at 01:52:16PM +0100, Andrew Cooper wrote:
> > > > On 06/10/15 12:35, Juergen Gross wrote:
> > > > > In tools/libxc
Ian Campbell writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions -
FAIL"):
> FWIW I believe the source dom0's ARP entry will be dropped when the VIF
> device is destroyed.
...
> For Linux bridging I believe it happens at the latest when the vif device
> is deleted, or possibly when it is
On 22/10/15 16:10, Andrew Cooper wrote:
> On 22/10/15 16:04, Julien Grall wrote:
>> Hi,
>>
>> I was looking to the pod code (arch/x86/mm/p2m-pod.c) and noticed that
>> the calls to alloc_domheap_page{s,} seems to take wrong parameter:
>>
>> page = alloc_domheap_pages(d, order, PAGE_ORDER_4K);
>>
>>
flight 63162 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63162/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate
fail REGR. vs. 62677
Hi,
I was looking to the pod code (arch/x86/mm/p2m-pod.c) and noticed that
the calls to alloc_domheap_page{s,} seems to take wrong parameter:
page = alloc_domheap_pages(d, order, PAGE_ORDER_4K);
p = alloc_domheap_page(d, PAGE_ORDER_4K);
AFAICT the last parameter is the memory flags and not the
Hello,
No further questions in this message, just a quick wrap-up:
1) Console is now configured.
2) Dom0 kernel is coming up and showing messages.
Very many thanks for all your help!
= Details =
This message should conclude the issue.
Therefore, it summarizes my findings and mistakes, and gets
On Thu, 2015-10-22 at 15:41 +0100, Ian Jackson wrote:
> Ian Campbell writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions
> - FAIL"):
> > On Thu, 2015-10-22 at 12:03 +0100, Wei Liu wrote:
> > > No, vif-bridge script has two runes for off-lining a vif
> > > brctl delif $bridge $vif
> > >
>>> On 22.10.15 at 16:40, wrote:
> On Thu, Oct 22, 2015 at 06:53:27AM -0600, Jan Beulich wrote:
>> >>> On 28.09.15 at 09:13, wrote:
>> > --- a/xen/include/asm-x86/hvm/svm/svm.h
>> > +++ b/xen/include/asm-x86/hvm/svm/svm.h
>> > @@ -96,6 +96,7 @@ extern u32 svm_feature_flags;
>> >
>> > /* TSC ra
>>> On 28.09.15 at 09:13, wrote:
> This patch uses hvm_funcs.tsc_scaling_supported instead of the
> architecture code to detect the TSC scaling support.
>
> Signed-off-by: Haozhong Zhang
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@li
>>> On 28.09.15 at 09:13, wrote:
> Both VMX and SVM saves/loads vcpu's TSC when saving/loading vcpu's
> context, so this patch moves saving/loading vcpu's TSC to the common
> function hvm_save_cpu_ctxt()/hvm_load_cpu_ctxt().
>
> Signed-off-by: Haozhong Zhang
Acked-by: Jan Beulich
___
>>> On 22.10.15 at 16:26, wrote:
> On 22/10/15 15:20, Jan Beulich wrote:
> On 20.10.15 at 10:21, wrote:
>>> @@ -4784,6 +4804,13 @@ int hvm_msr_write_intercept(unsigned int msr,
>>> uint64_t
> msr_content,
>>> return X86EMUL_EXCEPTION;
>>> break;
>>>
>>> +case MSR_
Ian Campbell writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions -
FAIL"):
> On Thu, 2015-10-22 at 12:03 +0100, Wei Liu wrote:
> > No, vif-bridge script has two runes for off-lining a vif
> > brctl delif $bridge $vif
> > ifconfig $vif down
> >
> > Neither of these causes cache entry
On Thu, Oct 22, 2015 at 06:53:27AM -0600, Jan Beulich wrote:
> >>> On 28.09.15 at 09:13, wrote:
> > Both VMX TSC scaling and SVM TSC ratio use the 64-bit TSC scaling ratio,
> > but the number of fractional bits of the ratio is different between VMX
> > and SVM. This patch makes the architecture co
On 22/10/15 15:20, Jan Beulich wrote:
On 20.10.15 at 10:21, wrote:
>> @@ -4784,6 +4804,13 @@ int hvm_msr_write_intercept(unsigned int msr,
>> uint64_t msr_content,
>> return X86EMUL_EXCEPTION;
>> break;
>>
>> +case MSR_IA32_XSS:
>> +/* No XSS features curre
>>> On 28.09.15 at 09:13, wrote:
> The existing hvm_set_guest_tsc_fixed() and hvm_get_guest_tsc_fixed()
> calculate the guest TSC by adding the TSC offset to the host TSC. When
> the TSC scaling is enabled, the host TSC should be scaled first. This
> patch adds the scaling logic to those two funct
>>> On 20.10.15 at 10:21, wrote:
> @@ -4784,6 +4804,13 @@ int hvm_msr_write_intercept(unsigned int msr, uint64_t
> msr_content,
> return X86EMUL_EXCEPTION;
> break;
>
> +case MSR_IA32_XSS:
> +/* No XSS features currently supported for guests. */
> +if (
From: Paul Durrant
Date: Wed, 21 Oct 2015 11:36:17 +0100
> This series adds xen-netback support for hash negotiation with a frontend
> driver, and an implementation of toeplitz hashing as the initial negotiable
> algorithm.
I'd definitely like to see some XEN networking experts review this
befor
>>> On 28.09.15 at 09:13, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -297,6 +297,59 @@ int hvm_set_guest_pat(struct vcpu *v, u64 guest_pat)
> return 1;
> }
>
> +/*
> + * Multiply tsc by a fixed point number represented by ratio.
> + *
> + * The most significa
flight 63159 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63159/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-winxpsp3 15 guest-localmigrate.2 fail in 63097 pass
in 63159
test-amd64-amd64-xl-qe
flight 63155 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63155/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-migrupgrade 7 xen-install/src_host fail REGR. vs. 63099
test-armhf-armhf-
1 - 100 of 130 matches
Mail list logo