flight 65156 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65156/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 6 xen-boot fail REGR. vs. 59254
test-amd64-amd64-xl-p
flight 65155 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65155/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-freebsd10-amd64 6 xen-bootfail like 65132
test-amd64-amd64-xl 6
2015-11-27 14:50 GMT-05:00 Yu-An(Victor) Chen :
> Hi Dario & Meng,
>
> Thanks for your analysis!
>
> VM1 and VM2 both are given 8 vCPUs and sharing physical CPU 0-7. So in
> theory,"VM1 can get the services of 400%"
> And yes, Dario, your explanation about the task utilization is correct.
>
> So th
Am 24.11.15 um 11:43 schrieb Jan Beulich:
Taking a random object out of that log, I can't see any non-standard
option passed to the compiler, so I have to assume this is its default
behavior (i.e. determined at build time, or established by extra
patches). Did you check the result of a random, no
x86 is the only architecture which uses __devinit, and also has CONFIG_HOTPLUG
enabled, making the annotation empty.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/apic.c | 6 +++---
xen/arch/x86/cpu/amd.c | 6 +++---
xen/arch/x86/cpu/intel.c| 10 +-
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/crypto/vmac.c| 3 ---
xen/include/xen/config.h | 1 -
2 files changed, 4 deletions(-)
diff --git a/xen/crypto/vmac.c b/xen/crypto/vmac.c
index 8f2f372..f3f2743 100644
--- a/xen/crypto/vmac.c
+++ b/xen/crypto/vmac.c
@@ -173,15 +173
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpu/amd.c | 2 +-
xen/arch/x86/cpu/common.c | 4 ++--
xen/arch/x86/cpu/intel_cacheinfo.c | 2 +-
xen/arch/x86/numa.c | 2 +-
xen/arch/x86/x86_64/mmconf-fam10h.c | 4 ++--
xen/include/xen/con
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Ian Campbell
CC: Stefano Stabellini
---
xen/arch/arm/cpu.c | 2 +-
xen/arch/arm/gic-hip04.c| 6 +++---
xen/arch/arm/gic-v2.c | 6 +++---
xen/arch/arm/gic-v3.c | 6 +++---
xen/arch/
No resulting change on any architecture.
Andrew Cooper (6):
xen: Drop unused fastcall annotation
xen: Drop empty __cpuinitdata annotation
xen: Drop empty __cpuinit annotation
xen: Drop empty __devinitdata annotation
xen: Drop empty __devinit annotation, and aliased __pminit
xen: Drop u
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/include/asm-x86/config.h | 1 -
xen/include/xen/init.h | 8
2 files changed, 9 deletions(-)
diff --git a/xen/include/asm-x86/config.h b/xen/include/asm-x86/config.h
index 52f7ca8..fee24c5 100644
--- a/xen/include/asm-x86/co
x86 is the only architecture which uses __devinitdata, and also has
CONFIG_HOTPLUG enabled, making the annotation empty.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpu/common.c | 12 ++--
xen/arch/x86/mpparse.c| 2 +-
xen/arch/x86/numa.c | 4 ++--
xen/
flight 65147 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65147/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs.
64579
test-amd64-i38
Hi Dario & Meng,
Thanks for your analysis!
VM1 and VM2 both are given 8 vCPUs and sharing physical CPU 0-7. So in
theory,"VM1 can get the services of 400%"
And yes, Dario, your explanation about the task utilization is correct.
So the resource configuration as I mentioned before is:
for xen-cre
flight 65151 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65151/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 63340
test-amd64-amd64-libvirt-
On 27/11/15 17:18, Ian Campbell wrote:
> On Fri, 2015-11-13 at 15:27 +, Ian Jackson wrote:
>> Ian Campbell writes ("Re: [PATCH XEN v5 13/23] tools: Refactor foreign
>> memory mapping into libxenforeignmemory"):
>>> On Wed, 2015-11-11 at 15:13 +, Ian Jackson wrote:
>>> Are you suggesting:
>>
2015-11-27 12:23 GMT-05:00 Dario Faggioli :
> On Fri, 2015-11-27 at 08:36 -0800, Yu-An(Victor) Chen wrote:
>> Hi Dario,
>>
> Hi,
>
>> Thanks for the reply!
>>
> You're welcome. :-)
>
> I'm adding Meng to Cc...
>
Thanks! :-)
>> My goal for the experiment is to show that xen rtds scheduler is
>> be
On Fri, 2015-11-27 at 08:36 -0800, Yu-An(Victor) Chen wrote:
> Hi Dario,
>
Hi,
> Thanks for the reply!
>
You're welcome. :-)
I'm adding Meng to Cc...
> My goal for the experiment is to show that xen rtds scheduler is
> better than credit scheduler when it comes to real time tasks.
> so my set
On Fri, 2015-11-27 at 17:16 +, Ian Jackson wrote:
>
> > Maybe you should remove the ts-guest-stop right at the start of this fn
> > too?
>
> It's probably better to swap the order of things in the repeat, and
> move the extra start to below the repeat.
>
> That way if guest-stop fails utterl
On Fri, 2015-11-13 at 15:27 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH XEN v5 13/23] tools: Refactor foreign
> memory mapping into libxenforeignmemory"):
> > On Wed, 2015-11-11 at 15:13 +, Ian Jackson wrote:
> > Are you suggesting:
> >
> > void *xenforeignmemory_map(xenforeig
On 27/11/15 17:10, Jan Beulich wrote:
On 27.11.15 at 17:00, wrote:
>> It is also odd to see it added to HVM guests but not PV.
> But that's a result of PV using white listing on leaf 7, as opposed to
> HVM's black listing.
>
> But yes, if you CPUID series is about to arrive, these two patches
On 27/11/15 15:53, Juergen Gross wrote:
> On 27/11/15 16:33, Wei Liu wrote:
>> On Fri, Nov 27, 2015 at 03:50:53PM +0100, Juergen Gross wrote:
>>> For migration the last used pfn of a guest is needed to size the
>>> logdirty bitmap and as an upper bound of the page loop. Unfortunately
>>> there are
Add IOCTL_GNTDEV_GRANT_COPY to allow applications to copy between user
space buffers and grant references.
This interface is similar to the GNTTABOP_copy hypercall ABI except
the local buffers are provided using a virtual address (instead of a
GFN and offset). To avoid userspace from having to pa
Ian Campbell writes ("Re: [OSSTEST PATCH] sg-run-job: Coalesce a couple of
repetitions"):
> On Fri, 2015-11-27 at 16:54 +, Ian Jackson wrote:
> > The resulting testid `guest-localmigrate/x10' becomes a bit misleading
> > in that it now does 11 repetitions. But we don't want to change the
> >
>>> On 27.11.15 at 17:00, wrote:
> It is also odd to see it added to HVM guests but not PV.
But that's a result of PV using white listing on leaf 7, as opposed to
HVM's black listing.
But yes, if you CPUID series is about to arrive, these two patches
may not be worthwhile to commit. I've put the
On 11/27/2015 04:28 PM, Martin Pohlack wrote:
On 03.11.2015 19:16, Ross Lagerwall wrote:
+#ifdef CONFIG_X86
+unsigned long search_module_extables(unsigned long addr)
+{
+struct payload *data;
+unsigned long ret;
+
+/* No locking since this list is only ever changed during apply or re
>>> On 27.11.15 at 14:49, wrote:
> On 27/11/15 11:54, Jan Beulich wrote:
>> switch ( __builtin_expect(ptr->fpu_sse.x[FPU_WORD_SIZE_OFFSET], 8) )
>> {
>> +#define XRSTOR(pfx) \
>> +alternative_io("1: .byte " pfx "0x0f,0xae,0x2f\n" \
>> + " .section .fixup,\
flight 65150 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65150/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 60684
build-i386
On Fri, 2015-11-27 at 16:54 +, Ian Jackson wrote:
> Fold `guest-localmigrate.2' into `guest-localmigrate/x10' and
> `guest-start.2' into `guest-start.repeat'. In each case increase the
> iteration count of the 2nd test by one so that the total number of
> reps remains constant.
>
> This will
Fold `guest-localmigrate.2' into `guest-localmigrate/x10' and
`guest-start.2' into `guest-start.repeat'. In each case increase the
iteration count of the 2nd test by one so that the total number of
reps remains constant.
This will allow the heisenbug compensator to see more of these
failures as t
On 27/11/15 17:42, Andrew Cooper wrote:
> On 27/11/15 14:50, Juergen Gross wrote:
>> For migration the last used pfn of a guest is needed to size the
>> logdirty bitmap and as an upper bound of the page loop. Unfortunately
>> there are pv-kernels advertising a much higher maximum pfn as they
>> are
On 27/11/15 14:50, Juergen Gross wrote:
> For migration the last used pfn of a guest is needed to size the
> logdirty bitmap and as an upper bound of the page loop. Unfortunately
> there are pv-kernels advertising a much higher maximum pfn as they
> are really using in order to support memory hotpl
Hi Dario,
Thanks for the reply!
My goal for the experiment is to show that xen rtds scheduler is better
than credit scheduler when it comes to real time tasks.
so my set up is:
for xen-credit : 2vms sharing 8 cores (cpu 0-7) using credit scheduler(both
with weight of 800 and capacity of 400)
for
On 27/11/15 16:22, Han, Huaitong wrote:
> On Fri, 2015-11-27 at 12:59 +, Andrew Cooper wrote:
>> Just for my own understand, do you have a sample use-case for
>> protection
>> keys?
>>
>> As everything can WRPKRU, I cant see how it would actually be useful.
>> Clearly there is a usecase or you
On 03.11.2015 19:16, Ross Lagerwall wrote:
> +#ifdef CONFIG_X86
> +unsigned long search_module_extables(unsigned long addr)
> +{
> +struct payload *data;
> +unsigned long ret;
> +
> +/* No locking since this list is only ever changed during apply or revert
> + * context. */
How do
On Fri, 2015-11-27 at 12:59 +, Andrew Cooper wrote:
> Just for my own understand, do you have a sample use-case for
> protection
> keys?
>
> As everything can WRPKRU, I cant see how it would actually be useful.
> Clearly there is a usecase or you (Intel) wouldn't have gone to the
> effort of p
On Fri, 27 Nov 2015, Stefano Stabellini wrote:
> On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> > From: Parth Dixit
> >
> > Interrupt information is described in DSDT and is not available at
> > the time of booting. Configure the interrupts dynamically when requested
> > by Dom0
Actually
El 26/11/15 a les 15.32, Jan Beulich ha escrit:
On 25.11.15 at 16:18, wrote:
>> --- a/xen/arch/x86/hvm/hvm.c
>> +++ b/xen/arch/x86/hvm/hvm.c
>> @@ -2085,16 +2091,17 @@ static int hvm_load_cpu_ctxt(struct domain *d,
>> hvm_domain_context_t *h)
>> seg.attr.bytes = ctxt.ldtr_arbytes;
>>
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Parth Dixit
>
> Interrupt information is described in DSDT and is not available at
> the time of booting. Configure the interrupts dynamically when requested
> by Dom0
>
> Signed-off-by: Parth Dixit
> Signed-off-by: Shannon Zhao
> ---
On 27/11/15 11:07, Jan Beulich wrote:
> ... or when the guest has the XSAVE feature hidden by CPUID policy.
> Not doing so is at best confusing to guests.
>
> Signed-off-by: Jan Beulich
> ---
> One question is whether we shouldn't switch leaf 7 to white listing,
> just like done for PV guests.
Th
On Wed, 2015-11-11 at 15:14 +, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH XEN v5 14/23] tools: foreignmemory: provide
> xenforeignmemory_unmap."):
> > And require it be used instead of direct munmap.
> >
> > This will allow e.g. Valgrind hooks to help track incorrect use of
> > foreign
osstest service owner writes ("[xen-unstable test] 65141: regressions - FAIL"):
> flight 65141 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/65141/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test
On 27/11/15 16:33, Wei Liu wrote:
> On Fri, Nov 27, 2015 at 03:50:53PM +0100, Juergen Gross wrote:
>> For migration the last used pfn of a guest is needed to size the
>> logdirty bitmap and as an upper bound of the page loop. Unfortunately
>> there are pv-kernels advertising a much higher maximum p
On 27/11/15 16:22, Ian Jackson wrote:
> Juergen Gross writes ("Re: [Xen-devel] [PATCH] libxc: try to find last used
> pfn when migrating"):
>> xl migrate will use much less resources for a domain with a 3.x kernel
>> started with max_mem being much larger than mem. E.g. in case you start
>> a doma
On Fri, 2015-11-27 at 15:38 +, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
> CC: Jan Beulich
Acked-by: Ian Campbell
> ---
> README.email | 51 +++
> 1 file changed, 51 insertions(+)
>
> diff --git a/README.email b/README.email
> index
On Wed, 2015-11-11 at 15:13 +, Ian Jackson wrote:
> > +/*
> > + * Maps a range within one domain to a local address range. Mappings
> > + * should be unmapped with munmap and should follow the same rules as
> > mmap
> > + * regarding page alignment.
> > + *
> > + * prot is as for mmap(2).
> >
flight 65141 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65141/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail REGR. vs.
65114
Regressions w
Signed-off-by: Ian Jackson
CC: Jan Beulich
---
README.email | 51 +++
1 file changed, 51 insertions(+)
diff --git a/README.email b/README.email
index 5de63dd..e14a816 100644
--- a/README.email
+++ b/README.email
@@ -89,6 +89,9 @@ history. Here
On Fri, Nov 27, 2015 at 03:50:53PM +0100, Juergen Gross wrote:
> For migration the last used pfn of a guest is needed to size the
> logdirty bitmap and as an upper bound of the page loop. Unfortunately
> there are pv-kernels advertising a much higher maximum pfn as they
> are really using in order
Juergen Gross writes ("Re: [Xen-devel] [PATCH] libxc: try to find last used pfn
when migrating"):
> xl migrate will use much less resources for a domain with a 3.x kernel
> started with max_mem being much larger than mem. E.g. in case you start
> a domain on a small stand-by system and migrate it
On 27/11/15 15:11, Juergen Gross wrote:
> On 27/11/15 16:01, David Vrabel wrote:
>> On 27/11/15 14:50, Juergen Gross wrote:
>>> For migration the last used pfn of a guest is needed to size the
>>> logdirty bitmap and as an upper bound of the page loop. Unfortunately
>>> there are pv-kernels adverti
On Fri, 2015-11-27 at 16:11 +0100, Juergen Gross wrote:
> On 27/11/15 16:01, David Vrabel wrote:
> > On 27/11/15 14:50, Juergen Gross wrote:
> > > For migration the last used pfn of a guest is needed to size the
> > > logdirty bitmap and as an upper bound of the page loop. Unfortunately
> > > there
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Naresh Bhat
>
> Add ACPI support on arm64 xen hypervisor. Enable EFI support on ARM.
>
> Signed-off-by: Naresh Bhat
> Signed-off-by: Shannon Zhao
> ---
> config/arm64.mk | 1 +
> xen/common/efi/runtime.c | 2 +-
> xe
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> When booting with ACPI, store the event-channel interrupt number and
> flag in HVM parameter HVM_PARAM_CALLBACK_IRQ. Then Dom0 could get it
> through hypercall HVMOP_get_param.
>
> Signed-off-by: Shannon Zhao
> ---
>
On Fri, Nov 27, 2015 at 02:43:05PM +0100, Roger Pau Monne wrote:
[...]
> diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
> index 7e8054a..d6cb63d 100644
> --- a/tools/libxl/libxl_internal.h
> +++ b/tools/libxl/libxl_internal.h
> @@ -3036,6 +3036,9 @@ struct libxl__stream_wr
On 27/11/15 16:01, David Vrabel wrote:
> On 27/11/15 14:50, Juergen Gross wrote:
>> For migration the last used pfn of a guest is needed to size the
>> logdirty bitmap and as an upper bound of the page loop. Unfortunately
>> there are pv-kernels advertising a much higher maximum pfn as they
>> are
On 27/11/15 11:05, Jan Beulich wrote:
> ... or when the guest has the XSAVE feature hidden by CPUID policy.
> Not doing so is at best confusing to guests.
>
> Signed-off-by: Jan Beulich
These changes here are an improvement (so I don't object to taking them
ahead of my fullblown levelling series)
El 27/11/15 a les 14.55, Andrew Cooper ha escrit:
> On 27/11/15 13:43, Roger Pau Monne wrote:
>> diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
>> index 7e8054a..d6cb63d 100644
>> --- a/tools/libxl/libxl_internal.h
>> +++ b/tools/libxl/libxl_internal.h
>> @@ -3036,6 +3036,
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Route all SPIs to Dom0 except the interrupts that Xen uses. Since Xen
> already uses the uart interrupt, the desc->action will not be NULL, so
> it will skip it.
>
> Signed-off-by: Shannon Zhao
> ---
> xen/arch/arm/d
On 27/11/15 14:50, Juergen Gross wrote:
> For migration the last used pfn of a guest is needed to size the
> logdirty bitmap and as an upper bound of the page loop. Unfortunately
> there are pv-kernels advertising a much higher maximum pfn as they
> are really using in order to support memory hotpl
Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On Fri, 2015-11-27 at 13:24 +, Ian Jackson wrote:
> > But it might not be true that it was blocked.
>
> Can't sg-run-job tell if it was blocked vs something else though?
(You meant sg-execute-flight.)
For migration the last used pfn of a guest is needed to size the
logdirty bitmap and as an upper bound of the page loop. Unfortunately
there are pv-kernels advertising a much higher maximum pfn as they
are really using in order to support memory hotplug. This will lead
to allocation of much more me
On Tue, 17 Nov 2015, Shannon Zhao wrote:
> On 2015/11/17 20:04, Julien Grall wrote:
> > On 17/11/15 09:40, shannon.z...@linaro.org wrote:
> >> From: Shannon Zhao
> >>
> >> Firstly it permits full MMIO capabilities for Dom0. Then deny MMIO
> >> access of UART device.
> >
> > I'm nearly sure we wan
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Create a DT for Dom0 for ACPI-case only. DT contains minimal required
> informations such as Dom0 bootargs, initrd, efi description table and
> address of uefi memory table.
>
> Signed-off-by: Naresh Bhat
> Signed-off-
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Here we map these new created EFI and ACPI tables to the non-RAM space
> of Dom0. Then Dom0 could visit them.
"Map the UEFI and ACPI tables which we created to non-RAM space in
Dom0."
> Signed-off-by: Shannon Zhao
>
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Create a few EFI memory descriptors to tell Dom0 the RAM region
> information, ACPI table regions and EFI tables reserved resions.
>
> Signed-off-by: Parth Dixit
> Signed-off-by: Shannon Zhao
> ---
> xen/arch/arm/dom
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Signed-off-by: Parth Dixit
> Signed-off-by: Shannon Zhao
> ---
> xen/arch/arm/domain_build.c | 2 ++
> xen/common/efi/boot.c | 64
> +
> xen/include/asm-arm/setup.h
On Fri, 2015-11-27 at 14:03 +, Ian Campbell wrote:
> On Fri, 2015-11-27 at 13:24 +, Ian Jackson wrote:
> > Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112:
> > regressions - FAIL"):
> > > On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
> > > > As explained below, in
On Fri, 2015-11-27 at 13:44 +, Ian Jackson wrote:
> Eg, consider these flights:
>
> 100 is now master A pass, B pass pushed
> 200 stagingA pass, B fail `B REGR. vs 100'
> 201 stagingA fail, B not run `B fail in 200 REGR. vs 100'
>
> In flight 201, the fai
On Fri, 2015-11-27 at 13:24 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112:
> regressions - FAIL"):
> > On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
> > > As explained below, in 65112 this step did not run because the
> > > earlier
> > > step
On 27/11/15 13:43, Roger Pau Monne wrote:
> diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
> index 7e8054a..d6cb63d 100644
> --- a/tools/libxl/libxl_internal.h
> +++ b/tools/libxl/libxl_internal.h
> @@ -3036,6 +3036,9 @@ struct libxl__stream_write_state {
> libxl__dat
On 03.11.2015 19:16, Ross Lagerwall wrote:
> Implement support for the apply, revert and replace actions.
>
> To perform and action on a payload, the hypercall sets up a data
> structure to schedule the work. A hook is added in all the
> return-to-guest paths to check for work to do and execute i
On 27/11/15 11:54, Jan Beulich wrote:
> All they differ by is the REX64 prefix. Create a single macro covering
> both, at once allowing to get rid of the disconnect between the current
> partial macro and its two use sites.
>
> No change in generated code.
>
> Signed-off-by: Jan Beulich
>
> --- a/
Jan Beulich writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On 27.11.15 at 13:02, wrote:
> > The fact that we have both `guest-localmigrate' and
> > `guest-localmigrate/x10' isn't ideal because it hides from the
> > heisenbug compensator that these are actually the
If certain devices (like the local or the io apic) are disabled some modes
of operation of the HVM event channel callback cannot be used. Make sure Xen
doesn't try to setup them.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v8:
- Callback injection methods
Only some minor libxl changes are needed in order to be able to migrate HVM
guests without a device model, no hypervisor changes are needed.
This change prevents sending the emulator context if the device model
version is set to none.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Ian Campb
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM
builder now uses the PV xc_dom_* set of functions this kernel will be parsed
and loaded inside the guest like on PV, but the container is a pure HVM
guest.
Also, if device_model_version is set to none or a device model fo
Introduce a new flag in xc_dom_image that turns on and off the emulated
devices. This prevents creating the VGA hole, the hvm_info page and the
ioreq server pages. libxl unconditionally sets it to true for all HVM
domains at the moment.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
Reviewed-b
Instead of choosing the interface to expose to guests based on the guest
type, do it based on whether the guest has an emulated local apic or not.
Signed-off-by: Roger Pau Monné
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v8:
- Don
This are the remaining patches of the HVMlite series. They have been
successfully tested on the following hardware:
- Intel Core i3-5010U.
- AMD Opteron 4184.
With both hap=0 and hap=1 in the configuration file. I've been able to boot
a SMP guest in this mode with a virtual hard drive and a vi
This structure contains the physical address of the command line, as well as
the physical address of the list of loaded modules. The physical address of
this structure is passed to the guest at boot time in the %ebx register.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: We
Only allow enabling or disabling all the emulated devices inside of Xen,
right now Xen doesn't support enabling specific emulated devices only.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v7:
- Rework if condition.
Changes sin
Allow xc_dom_elfloader to report a guest type as hvm-3.0-x86_32 if it's
running inside of a HVM container and has the PHYS32_ENTRY elfnote set.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
VCPUOP_is_up hypercalls from HVM guests.
This patch introduces a new structure (vcpu_hvm_context) that should be used
in conjuction with the VCPUOP_initialise hypercall in order to initialize
vCPUs for HVM guests.
Signed-off-by:
Jan Beulich writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On 27.11.15 at 13:28, wrote:
> >> --- a/README.email
> >> +++ b/README.email
> >> @@ -71,6 +71,24 @@ history. Here are some examples:
> >>detect regressions of this test. Perhaps the test has been
Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
> > As explained below, in 65112 this step did not run because the earlier
> > step `guest-localmigrate' failed:
> > http://logs.test-lab.xenproject.o
On 27/11/15 11:01, Jan Beulich wrote:
> VMX doesn't need a software CPL check on the XSETBV intercept, and
> SVM can do that check without resorting to hvm_get_segment_register().
>
> Clean up what is left of hvm_handle_xsetbv(), namely make it return a
> proper error code.
>
> Signed-off-by: Jan B
On 27/11/15 11:52, Jan Beulich wrote:
> We don't need the claimed API compatibility. No change in generated
> code.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-d
This run is configured for baseline tests only.
flight 38364 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38364/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-ovmf-amd64 5 xen-install fail bl
On 27/11/15 09:51, Huaitong Han wrote:
> Changes in v2:
> *Rebase all patches in staging branch
> *Disable X86_CR4_PKE on hypervisor, and delete pkru_read/write functions, and
> use xsave state read to get pkru value.
> *Delete the patch that adds pkeys support for do_page_fault.
> *Add pkeys suppo
>>> On 27.11.15 at 13:02, wrote:
>> > > build-i386 5 xen-build fail in 65062 REGR. vs. 63449
>
> This is completely explained below, I think.
I can't see the connection to any other (failed) test here (also not
in flight 65136's results, which have just come in). There were many
blocked tests i
On 03.11.2015 19:15, Ross Lagerwall wrote:
[...]
> +struct xen_sysctl_xsplice_summary {
> +xen_xsplice_id_tid; /* IN, the name of the payload. */
I still feel a bit confused about the ID vs. name thingy. IMHO, each
payload should have a name (easily readable by a human, like
"
>>> On 27.11.15 at 13:28, wrote:
> On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
>> As explained below, in 65112 this step did not run because the earlier
>> step `guest-localmigrate' failed:
>> http://logs.test-lab.xenproject.org/osstest/logs/65112/test-amd64-
>> amd64-xl-qemut-stubdom
On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112:
> regressions - FAIL"):
> > On Fri, 2015-11-27 at 01:18 -0700, Jan Beulich wrote:
> > > Neither of these failed in this flight, and there's nothing else
> > > blocking
> > > t
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Map other reused tables for Dom0.
"Map all other tables to Dom0 using 1:1 mappings."
> Signed-off-by: Shannon Zhao
> ---
> xen/arch/arm/domain_build.c | 25 +
> 1 file changed, 25 insertions(
flight 65136 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65136/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 16
guest-localmigrate/x10 fail REGR. vs. 6
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Copy RSDP table and replace rsdp->xsdt_physical_address with new address
> of XSDT table, so it can point to the right XSDT table.
>
> Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
> xen/arch/arm/domain
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Parth Dixit
>
> Create a helper function for mapping with cached attributes.
>
> Signed-off-by: Parth Dixit
> Signed-off-by: Shannon Zhao
You might be able to use the existing guest_physmap_add_entry and
guest_physmap_remove_page for
On 27/11/15 11:11, Jan Beulich wrote:
On 27.11.15 at 11:57, wrote:
>> On 27/11/15 08:28, Jan Beulich wrote:
>> On 26.11.15 at 17:59, wrote:
Before c/s 44e24f8567 "x86: don't call generic_identify() redundantly", the
commandline-provided masks would take effect in Xen's view of
Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On Fri, 2015-11-27 at 01:18 -0700, Jan Beulich wrote:
> > Neither of these failed in this flight, and there's nothing else blocking
> > the push. Why did this not result in a push then? Or in other words
>
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Copy and modify XSDT table before passing it to Dom0. Repalce the entry
> value of the copied table. Add a new entry for STAO table as well. And
> keep entry value of other reused tables unchanged.
>
> Signed-off-by: Sh
1 - 100 of 140 matches
Mail list logo