On Tue, Nov 24, 2015 at 03:34:45AM -0700, Jan Beulich wrote:
> >>> On 23.11.15 at 17:36, wrote:
> > I instrumented detect_extended_topology() and ran again with 4 CPUs.
> >[...]
> > (XEN) smp_store_cpu_info id=3
> > (XEN) detect_extended_topology cpuid_count op=0xb count=0 eax=0x0 ebx=0x1
> > ecx
From: Shuai Ruan
This patch exposes xsaves/xgetbv1/xsavec to hvm guest.
The reserved bits of eax/ebx/ecx/edx must be cleaned up
when call cpuid(0dh) with leaf 1 or 2..63.
According to the spec the following bits must be reserved:
For leaf 1, bits 03-04/08-31 of ecx is reserved. Edx is reserved.
From: Shuai Ruan
This is pre-req patch for latter xsaves patch. This patch introduce
a macro to handle restor fixup, also use named opreand instead of
numbered operand in restor fixup code.
Signed-off-by: Shuai Ruan
---
xen/arch/x86/xstate.c | 43 +++
1
From: Shuai Ruan
Changes in v12:
* Address comments from Jan:
* Add a seperate, pre-req patch to change from using numbered operand to
named operand in xrstor.
* Using alterive_io in xrstor side.
Changes in v11:
* Address comments from Jan:
* Using alternative asm on xrstor side.
For xsave
This patch uses xsaves/xrstors/xsavec instead of xsaveopt/xrstor
to perform the xsave_area switching so that xen itself
can benefit from them when available.
For xsaves/xrstors/xsavec only use compact format. Add format conversion
support when perform guest os migration. Also, pv guest will not su
This patch enables xsaves for hvm guest, includes:
1.handle xsaves vmcs init and vmexit.
2.add logic to write/read the XSS msr.
Add IA32_XSS_MSR save/rstore support.
Signed-off-by: Shuai Ruan
Reviewed-by: Jan Beulich
---
xen/arch/x86/hvm/hvm.c | 27 +++
xen/
flight 65085 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65085/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 3164361121526318f278a7c1b84bdcc475d4ad95
baseline version:
ovmf 63a9e0d6f98d65b93f2a4cfc1977b1c0c50
I write a program to intercept all hypercalls happend on a xen hypervisor.
How can I know which domain called the hypercall? Is it possible to obtain
it from the registers?
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Commit "c7628bf vnc: only alloc server surface with clients connected"
missed one rarely used codepath (cirrus with guest drivers using 2d
accel) where we have to check for the server surface being present,
to avoid qemu crashing with a NULL pointer dereference. Add the check.
Reported-by: Anthon
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: Monday, November 23, 2015 6:49 PM
> To: ian.jack...@eu.citrix.com; xen-devel@lists.xen.org
> Cc: Ian Campbell ; Hu, Robert
>
> Subject: [PATCH OSSTEST] make-flight: Run separate nested jobs on AMD and
> Int
Thanks for taking the time to consider my comments and respond.
On Tue, Nov 24, 2015 at 9:44 AM, Wei Liu wrote:
> Another chunk of work is teaching QEMU to not initialised some
> component or take a different path when initialising some
> components. This is the same as Linux-based stubdom.
>
W
Juergen Gross writes:
> Ping?
Acked-by: Rusty Russell
Cheers,
Rusty.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 11/24/2015 at 10:40 PM, in message
<1448376011-20217-1-git-send-email-george.dun...@eu.citrix.com>, George Dunlap
wrote:
> We have several outstanding patch series which add devices that have
> two levels: a controller and individual devices attached to that
> controller.
>
> In the
flight 65066 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65066/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 64035
Regressions which ar
On Mon, 2015-11-09 at 16:15 +, Wei Liu wrote:
> = Timeline =
>
> We now adopt a fixed cut-off date scheme. We will release twice a
> year. The upcoming 4.7 timeline are as followed:
>
> * Last posting date: March 18, 2016
> * Hard code freeze: April 1, 2016
> * RC1: TBD
> * Release: July 1, 2
flight 65069 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65069/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 60684
build-i386
flight 65090 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65090/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 2015/11/24 19:29, Jan Beulich wrote:
On 17.11.15 at 10:40, wrote:
>> From: Bob Moore
>>
>> ACPICA commit 72b0b6741990f619f6aaa915302836b7cbb41ac4
>>
>> One new 64-bit field at the end of the table.
>> FADT version is now 6.
>>
>> Link: https://github.com/acpica/acpica/commit/72b0b674
>
flight 65068 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65068/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 63340
Tests which did not succe
On Mon, 2015-11-23 at 07:42 -0800, Yu-An(Victor) Chen wrote:
> Hi all,
>
Hello,
> So I was doing some experiments to evaluate RTDS scheduler
> schedubility of real time tasks using 1vm with period of 1 and
> budget of 1. The experiment results turn out as expected(perform
> better than xe
This patch series fixes a minor bug with cpuid register usage for fixed PMC
counts, and implements two VPMU filter flags.
The VPMU feature of Xen is incredibly useful for performance analysis, however,
it is currently all counters or nothing. In secure environments, there can be
hesitation to enab
Fixes a register typo.
Signed-off-by: Brendan Gregg
---
xen/arch/x86/cpu/vpmu_intel.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/cpu/vpmu_intel.c b/xen/arch/x86/cpu/vpmu_intel.c
index 12f80ae..8d83a1a 100644
--- a/xen/arch/x86/cpu/vpmu_intel.c
+++ b/xe
This introduces a way to have a restricted VPMU, by specifying one of two
predefined groups of PMCs to make available. For secure environments, this
allows the VPMU to be used without needing to enable all PMCs.
Signed-off-by: Brendan Gregg
---
docs/misc/xen-command-line.markdown | 14 +-
This run is configured for baseline tests only.
flight 38337 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38337/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 63a9e0d6f98d65b93f2a4cfc1977b1c0c5052b5f
baseline version:
ovm
flight 65083 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65083/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 16 guest-start/debian.repeat fail REGR. vs. 65076
Tests which di
flight 65062 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65062/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 63449
test-amd64-amd64-
flight 65059 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65059/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 6 xen-boot fail REGR. vs. 59254
test-amd64-amd64-xl-p
flight 65064 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65064/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 63a9e0d6f98d65b93f2a4cfc1977b1c0c5052b5f
baseline version:
ovmf 8084b26e926ba3bf12b8110e7d49d3c928b
RFC. Boot tested on VMware Fusion, and on a 2-socket Xeon server.
diff --git a/xen/include/asm-x86/smp.h b/xen/include/asm-x86/smp.h
index ea07888..a41ce2d 100644
--- a/xen/include/asm-x86/smp.h
+++ b/xen/include/asm-x86/smp.h
@@ -67,7 +67,7 @@ extern unsigned int nr_sockets;
void set_nr_sockets(
The BSDs have always accessed privcmd via /dev/xen/privcmd while Linux
has used /proc/xen/privcmd but things are shifting to /dev/xen/privcmd
as well.
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Doug Goldstein
Acked-by: Ian Jackson
---
tools/include/xe
Prefer using the character device over the proc file if the character
device exists. This follows similar conversions of xenbus to avoid
issues with FMODE_ATOMIC_POS added in Linux 3.14 and newer.
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Doug Goldstein
Allow the init script to continue if either the character device or the
proc file is available.
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Doug Goldstein
Acked-by: Ian Jackson
---
tools/hotplug/Linux/xendomains.in | 2 +-
1 file changed, 1 insertion(+
On 11/24/15 1:19 PM, Doug Goldstein wrote:
> On 11/24/15 12:53 PM, Ian Jackson wrote:
>> Doug Goldstein writes ("[PATCH 3/4] gdbsx: prefer privcmd character device"):
>>> Prefer using the character device over the proc file if the character
>>> device exists.
>>
>> I think this common logic (which
On 16/11/15 08:08, Ian Campbell wrote:
On Thu, 2015-11-12 at 17:46 +, Stefano Stabellini wrote:
Call update_domain_wallclock_time at domain initialization.
Set time_offset_seconds to the number of seconds between physical boot
and domain initialization: it is going to be used to get/set the
Hello,
http://xenbits.xen.org/gitweb/?p=qemu-xen.git;a=summary
looking at the tags for the 2 stable branches which are involved in the recent
patch to xen.gitunifying the qemu trees.
tags:
qemu-xen-4.6.0qemu-xen-4.5.2
The revisions pointed to in the above tags are not unique and cause wrong
resu
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-rumpuserxen-i386
testid guest-start
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenb
On 11/24/15 12:53 PM, Ian Jackson wrote:
> Doug Goldstein writes ("[PATCH 3/4] gdbsx: prefer privcmd character device"):
>> Prefer using the character device over the proc file if the character
>> device exists.
>
> I think this common logic (which also appears in your 1/4 patch)
> should be facto
This run is configured for baseline tests only.
flight 38334 qemu-upstream-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38334/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-b
flight 65076 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65076/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Doug Goldstein writes ("[PATCH 3/4] gdbsx: prefer privcmd character device"):
> Prefer using the character device over the proc file if the character
> device exists.
I think this common logic (which also appears in your 1/4 patch)
should be factored out.
Could gdbsx not use a libxc handle ?
Ian
Doug Goldstein writes ("[PATCH 4/4] xendomains initscript: test for privcmd
char device"):
> Allow the init script to continue if either the character device or the
> proc file is available.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@l
Doug Goldstein writes ("[PATCH 1/4] libxc: prefer using privcmd character
device"):
> Prefer using the character device over the proc file if the character
> device exists. This follows similar conversions of xenbus to avoid
> issues with FMODE_ATOMIC_POS added in Linux 3.14 and newer.
This is a
Doug Goldstein writes ("[PATCH 2/4] update outdated header comment on
privcmd.h"):
> The BSDs have always accessed privcmd via /dev/xen/privcmd while Linux
> has used /proc/xen/privcmd but things are shifting to /dev/xen/privcmd
> as well.
Acked-by: Ian Jackson
_
Prefer using the character device over the proc file if the character
device exists.
CC: Mukesh Rathor
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Doug Goldstein
---
tools/debugger/gdbsx/xg/xg_main.c | 8 +---
1 file changed, 5 insertions(+), 3 del
The BSDs have always accessed privcmd via /dev/xen/privcmd while Linux
has used /proc/xen/privcmd but things are shifting to /dev/xen/privcmd
as well.
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Doug Goldstein
---
tools/include/xen-sys/FreeBSD/privcmd.h
Prefer using the character device over the proc file if the character
device exists. This follows similar conversions of xenbus to avoid
issues with FMODE_ATOMIC_POS added in Linux 3.14 and newer.
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Doug Goldstein
Allow the init script to continue if either the character device or the
proc file is available.
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Doug Goldstein
---
tools/hotplug/Linux/xendomains.in | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
On 24/11/15 18:16, George Dunlap wrote:
> On 20/11/15 16:03, Malcolm Crossley wrote:
>> This patch series adds per-cpu reader-writer locks as a generic lock
>> implementation and then converts the grant table and p2m rwlocks to
>> use the percpu rwlocks, in order to improve multi-socket host perfor
On 24/11/15 18:16, George Dunlap wrote:
> On 20/11/15 16:03, Malcolm Crossley wrote:
>> This patch series adds per-cpu reader-writer locks as a generic lock
>> implementation and then converts the grant table and p2m rwlocks to
>> use the percpu rwlocks, in order to improve multi-socket host perfor
> On Nov 24, 2015, at 11:30 AM, Jan Beulich wrote:
>
On 24.11.15 at 18:22, wrote:
>
>>> On Nov 24, 2015, at 11:16 AM, Jonathan Creekmore
>> wrote:
On Nov 24, 2015, at 11:07 AM, Jan Beulich wrote:
>>> On 24.11.15 at 17:56, wrote:
> --- a/xen/Makefile
> +++ b/xen/Makefi
On 20/11/15 16:03, Malcolm Crossley wrote:
> This patch series adds per-cpu reader-writer locks as a generic lock
> implementation and then converts the grant table and p2m rwlocks to
> use the percpu rwlocks, in order to improve multi-socket host performance.
>
> CPU profiling has revealed the rw
On 24/11/15 09:42, Jan Beulich wrote:
Now that we intercept them all, there's no reason not to also uniformly
hand them to XSM. Reads (which are expected to be of less interest) get
handled as before (MMCFG accesses un-audited).
Signed-off-by: Jan Beulich
Acked-by: Daniel De Graaf
__
Use the Kconfig generated CONFIG_HAS_ACPI defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/Rules.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk|
Use the Kconfig generated CONFIG_UART_EXYNOS4210 defines in the code base.
CC: Ian Campbell
CC: Ian Jackson
CC: Jan Beulich
CC: Keir Fraser
CC: Tim Deegan
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
config/arm32.mk | 1 -
xen/arc
Use the Kconfig generated CONFIG_UART_OMAP defines in the code base.
CC: Ian Campbell
CC: Ian Jackson
CC: Jan Beulich
CC: Keir Fraser
CC: Tim Deegan
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
config/arm32.mk | 1 -
xen/arch/arm/
Use the Kconfig generated CONFIG_COMPAT defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/arch/x86/Kconfig | 7 +++
1 file changed, 7 insertions(+)
diff --git a/xen/arch/x86
Use the Kconfig generated CONFIG_HAS_CADENCE_UART defines in the code base.
CC: Ian Campbell
CC: Ian Jackson
CC: Jan Beulich
CC: Keir Fraser
CC: Tim Deegan
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
config/arm64.mk | 1 -
xen/ar
Use the Kconfig generated CONFIG_HAS_VIDEO defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/arch/arm/Kconfig | 1 +
xen/arch/arm
Use the Kconfig generated CONFIG_HAS_GICV3 defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
config/arm64.mk | 1 -
xen/arch/arm/Kconfig | 5 +
xen/arch/arm/Makefile
Use the Kconfig generated CONFIG_HAS_ARM_HDLCD defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/arch/arm/Kconfig | 1 +
xen/arch/arm/Rules.mk | 2 --
xen/drivers/video/Makefile
Use the Kconfig generated CONFIG_HAS_MEM_PAGING defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Razvan Cojocaru
CC: Tamas K Lengyel
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
Acked-by: Razvan Cojocaru
Acked-by: Daniel De Graaf
Acked-by: Andrew Cooper
Use the Kconfig generated CONFIG_UART_SCIF defines in the code base.
CC: Ian Campbell
CC: Ian Jackson
CC: Jan Beulich
CC: Keir Fraser
CC: Tim Deegan
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
config/arm32.mk | 1 -
xen/drivers/char/Kconfig
Use the Kconfig generated CONFIG_HAS_NS16550 defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
config/arm32.mk | 1 -
config/arm64.mk | 1 -
Use the Kconfig generated CONFIG_HAS_DEVICE_TREE defines in the code
base.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Jan Beulich
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
Acked-by: Daniel De Graaf
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/Rules.mk
Use the Kconfig generated CONFIG_UART_PL011 defines in the code base.
The prefix HAS_ does not make sense in this case because these are
intended to be user selected options while HAS_ just states that the
hardware has this support and is controlled by Xen maintainers.
CC: Ian Campbell
CC: Ian Ja
Use the Kconfig generated HAS_PASSTHROUGH defines for the code base.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
Acked-by: Daniel De Graaf
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
Use the Kconfig generated CONFIG_HAS_VGA defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk | 1 -
xen/drivers/video/Makef
Replace kexec := y in Rules.mk with a Kconfig option called CONFIG_KEXEC
CC: Ian Campbell
CC: Ian Jackson
CC: Jan Beulich
CC: Keir Fraser
CC: Tim Deegan
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/Rules.mk | 6 --
xen/common/Kconfig |
Use the Kconfig generated CONFIG_HAS_MEM_SHARING defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Razvan Cojocaru
CC: Tamas K Lengyel
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
Acked-by: Razvan Cojocaru
Acked-by: Daniel De Graaf
Acked-by: Andrew Coope
Use the Kconfig generated CONFIG_HAS_CPUFREQ defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Liu Jinsong
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/arch/x86/Kconfig| 1 +
xen/arch/x86/Rules.mk | 1 -
Use the Kconfig generated CONFIG_UART_EHCI defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk | 1 -
xen/drivers/char/Kconfi
Wire in the Kconfig build and makefile rules to be able to generate
valid configuration files to be used by the build process but don't
actually use the output for affecting the Xen build.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by:
Use the Kconfig generated CONFIG_HAS_IOPORTS defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/Rules.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rule
Use the Kconfig generated CONFIG_HAS_PDX defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/Rules.mk | 1 -
xen/arch/arm/Kconfig
Use the Kconfig generated CONFIG_HAS_KEXEC defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/Rules.mk | 2 +-
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk | 1 -
x
Use the Kconfig generated CONFIG_HAS_GDBSX defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/Rules.mk | 1 -
xen/arch/x86/Rules.mk | 1 -
xen/common/Kconfig| 4
The following series is a follow on to the Kconfig conversion patch series.
There are still more components to convert however this is the bare minimal
to get everything working and get the options out of the existing makefiles.
The CONFIG_HAS_ variables are there to match the behavior of the Linu
Use the Kconfig generated CONFIG_HAS_MEM_ACCESS defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Razvan Cojocaru
CC: Tamas K Lengyel
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
Acked-by: Razvan Cojocaru
Acked-by
Switches the build system to rely on the options and flags generated by
Kconfig to control what gets built and how. Follow on patches will
convert items to be prefixed with CONFIG_. Additionally remove a #define
that resulted in a redefined variable when building for arm.
CC: Ian Campbell
CC: Ste
Use the Kconfig generated CONFIG_HAS_PCI defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
Acked-by: Daniel De Graaf
Acked-by: Andrew Cooper
Tested-by: Andrew Cooper
---
xen/Rules.mk | 1 -
xe
Paul Durrant writes ("RE: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir()
for ~/control/shutdown"):
> > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> > Well so then perhaps we should jsut change libxl__xs_mkdir to use
> > WRITE.
>
> I think the rename to libxl__xs_mknode() is warrant
flight 65054 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65054/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 64579
test-amd64-amd64-xl
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 24 November 2015 17:39
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Stefano Stabellini; Ian Campbell; Wei Liu
> Subject: RE: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir() for
> ~/control/sh
>>> On 24.11.15 at 18:17, wrote:
> --- a/xen/drivers/passthrough/vtd/quirks.c
> +++ b/xen/drivers/passthrough/vtd/quirks.c
> @@ -320,6 +320,20 @@ void __init platform_quirks_init(void)
> /* Tylersburg interrupt remap quirk */
> if ( iommu_intremap )
> tylersburg_intremap_quirk()
Paul Durrant writes ("RE: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir()
for ~/control/shutdown"):
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> > And even if the node did somehow end up with a nonempty value, nothing
> > would break because no-one would read it.
>
> Maybe. Person
Hi,
QEMU segfault while running a Xen guest, the guest is a WinXP.
To reproduce, I start the guest, I don't connect to vnc, and after
about 2min, QEMU segv. I think it's around the time it take for windows to
boot and reach the desktop.
The first commit where this happen is:
vnc: fix local state
This avoids cases where split messages (with other than the initial
part not carrying a log level; single line messages only of course)
issued on multiple CPUs interfere with each other, causing messages to
be issued which are supposed to be suppressed due to the log level
setting. E.g.
CP
>>> On 24.11.15 at 18:22, wrote:
>> On Nov 24, 2015, at 11:16 AM, Jonathan Creekmore
> wrote:
>>> On Nov 24, 2015, at 11:07 AM, Jan Beulich wrote:
>> On 24.11.15 at 17:56, wrote:
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -88,7 +88,7 @@ _clean: delete-unfresh-files
$(
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 24 November 2015 17:24
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Stefano Stabellini; Ian Campbell; Wei Liu
> Subject: RE: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir() for
> ~/control/sh
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 24 November 2015 16:49
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Campbell; Wei Liu
> Subject: Re: [Xen-devel] [PATCH v2 2/3] libxl: check for underlying xenstore
> operation failure...
>
Paul Durrant writes ("RE: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir()
for ~/control/shutdown"):
> [Ian Jackson:]
> > I'm not sure I follow this argument. What did you think of my idea
> > of renaming libxl__xs_mkdir to libxl__xs_mknode ?
>
> The issue, as I said, is the initial state of
> On Nov 24, 2015, at 11:16 AM, Jonathan Creekmore
> wrote:
>
>>
>> On Nov 24, 2015, at 11:07 AM, Jan Beulich wrote:
>>
> On 24.11.15 at 17:56, wrote:
>>> --- a/xen/Makefile
>>> +++ b/xen/Makefile
>>> @@ -88,7 +88,7 @@ _clean: delete-unfresh-files
>>> $(MAKE) -f $(BASEDIR)/Rules.mk
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 24 November 2015 16:35
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Stefano Stabellini; Ian Campbell; Wei Liu
> Subject: RE: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir() for
> ~/control/sh
From: Anshul Makkar
Sandybridge or earlier processors don't have huge page support for
IOTLB which leads to fallback on 4k pages and causes performance issues.
Shared EPT will be disabled only if the user has not provided explicit
choice on the command line.
Signed-off-by: Anshul Makkar
---
v2
On Wed, 2015-11-18 at 17:27 +, Julien Grall wrote:
Subject: ... which do not exist in the ...
> The range of valid IROUTER are n = 32 - 1019 (see 8.9.13 in IHI 0069A)
> which correspond to the offset 0x6100-0x7FD8.
>
> Other offset are invalid and therefore should not be emulated.
"offsets"
> On Nov 24, 2015, at 11:07 AM, Jan Beulich wrote:
>
On 24.11.15 at 17:56, wrote:
>> --- a/xen/Makefile
>> +++ b/xen/Makefile
>> @@ -88,7 +88,7 @@ _clean: delete-unfresh-files
>> $(MAKE) -f $(BASEDIR)/Rules.mk -C xsm clean
>> $(MAKE) -f $(BASEDIR)/Rules.mk -C crypto clean
>>
On Wed, 2015-11-18 at 17:27 +, Julien Grall wrote:
> Each ITARGETSR register are 4-byte wide and the offset is in byte.
"is 4-bytes" ... "is in bytes".
>
> The current implementation is computing the offset of ICFGR1 and ICFG2
> wonrgly result to emulate only the first 2 byte of the ICFGR ra
On Tue, 2015-11-24 at 15:32 +, George Dunlap wrote:
> On 13/11/15 17:10, Dario Faggioli wrote:
> >
> > During suspend, the pCPUs are not removed from their
> > pools with the standard procedure (which would involve
> > schedule_cpu_switch(). During resume, they:
> > 1) are assigned to the def
On 11/24/15 11:07 AM, Jan Beulich wrote:
On 24.11.15 at 17:56, wrote:
>> --- a/xen/Makefile
>> +++ b/xen/Makefile
>> @@ -88,7 +88,7 @@ _clean: delete-unfresh-files
>> $(MAKE) -f $(BASEDIR)/Rules.mk -C xsm clean
>> $(MAKE) -f $(BASEDIR)/Rules.mk -C crypto clean
>> $(MAKE) -f $(B
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-163
virtual PMU is unsupported
ISSUE DESCRIPTION
=
The Virtual Performance Measurement Unit feature has been documented
as unsupported, so far only on Intel CPUs. F
1 - 100 of 225 matches
Mail list logo