1: mm: drop guest_{map,get_eff}_l1e() hooks
2: mm: make {cmpxchg,write}_guest_entry() hook shadow mode specific
3: shadow: remove a few 32-bit hypervisor leftovers
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://li
When intercepting (or emulating) L1 guest INVLPG, the nested P2M
pointer may be (is?) NULL, and hence there's no point in calling
p2m_flush(). In fact doing so would cause a dereference of that NULL
pointer at least in the ASSERT() right at the beginning of the
function.
While so far nothing suppo
in_protmode() implies !in_realmode(), so we don't need to check both.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -3972,7 +3972,6 @@ x86_emulate(
uint64_t msr_content;
struct segment_register cs, ss;
flight 80469 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80469/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 79947
build-amd64
flight 80399 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80399/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 65543
test-amd64-i386-
flight 80381 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80381/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 59254
build-i386-rumpuserxe
Hi Jayachandran,
On Fri, Jan 29, 2016 at 02:35:40PM +0530, Jayachandran C wrote:
> Add a simple ACPI based PCI host controller under config option
> ACPI_PCI_HOST_GENERIC. This is done by providing an implementation
> of pci_acpi_scan_root().
>
> The pci_mmcfg_list handling is done by the ACPI co
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: Friday, February 05, 2016 1:12 AM
>
> On 04/02/16 14:08, Jan Beulich wrote:
> On 04.02.16 at 14:33, wrote:
> >> Jan Beulich writes ("Re: [Xen-devel] [PATCH v3 3/3] tools: introduce
> >> parameter
> >> max_wp_ram_ranges."):
> >>
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Thursday, February 04, 2016 11:51 PM
>
> > -Original Message-
> > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> > Sent: 04 February 2016 15:06
> > To: Paul Durrant
> > Cc: Jan Beulich; Andrew Cooper; George Dunlap; Ian
> From: Lv, Zhiyuan
> Sent: Friday, February 05, 2016 10:01 AM
>
> Hi George,
>
> On Thu, Feb 04, 2016 at 11:06:33AM +, George Dunlap wrote:
> > On Thu, Feb 4, 2016 at 9:38 AM, Yu, Zhang
> > wrote:
> > > On 2/4/2016 5:28 PM, Paul Durrant wrote:
> > >> I assume this means that the emulator c
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, February 04, 2016 10:13 PM
>
> >>> On 04.02.16 at 14:47, wrote:
> >> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> >> Sent: 04 February 2016 13:34
> >> * Is it possible for libxl to somehow tell from the rest of the
> >>
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: Thursday, February 04, 2016 6:06 PM
>
> On Wed, 2016-02-03 at 17:41 +, George Dunlap wrote:
> > But of course, since they they aren't actually ranges but just gpfns,
> > they're scattered randomly throughout the guest physical addre
From: Shannon Zhao
Sometimes it needs to check if there is a node in FDT by full path.
Introduce this helper to get the specified name subnode if it exists.
Signed-off-by: Shannon Zhao
---
CC: Rob Herring
---
drivers/of/fdt.c | 25 +
include/linux/of_fdt.h | 2 +
From: Shannon Zhao
ACPI 6.0 introduces a new table STAO to list the devices which are used
by Xen and can't be used by Dom0. On Xen virtual platforms, the physical
UART is used by Xen. So here it hides UART from Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
CC: "Rafael
Hi Andy,
CC more people on Xen testing -- in case OSStest already (or plans to)
cover such test case.
On Tue, Feb 02, 2016 at 07:31:30PM -0800, Andy Lutomirski wrote:
> Hi all-
>
> Would it make sense to add some basic Xen PV testing to the kbuild bot?
Do you mean to run basic Xen testing on th
From: Shannon Zhao
Move xen_early_init() before efi_init(), then when calling efi_init()
could initialize Xen specific UEFI.
Check if it runs on Xen hypervisor through the flat dts.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/xen/enlighten.c | 56 +++
From: Shannon Zhao
Add a new function to parse DT parameters for Xen specific UEFI just
like the way for normal UEFI. Then it could reuse the existing codes.
If Xen supports EFI, initialize runtime services.
Signed-off-by: Shannon Zhao
Reviewed-by: Matt Fleming
Reviewed-by: Stefano Stabellini
From: Shannon Zhao
Use xen_xlate_map_ballooned_pages to setup grant table. Then it doesn't
rely on DT or ACPI to pass the start address and size of grant table.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
arch/arm/xen/enlighten.c | 13 -
1 file changed, 4 insertio
From: Shannon Zhao
When booting with ACPI, it could get the event-channel irq through
HVM_PARAM_CALLBACK_IRQ.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/xen/enlighten.c | 36 +++-
1 file changed, 35 insertions(+), 1 deletion(-)
di
From: Shannon Zhao
Add a bus_notifier for platform bus device in order to map the device
mmio regions when DOM0 booting with ACPI.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
drivers/xen/Makefile | 1 +
drivers/xen/arm-device.c | 141
From: Shannon Zhao
Add a bus_notifier for AMBA bus device in order to map the device
mmio regions when DOM0 booting with ACPI.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
drivers/xen/arm-device.c | 43 +++
1 file changed, 43 insertio
From: Shannon Zhao
Add a "uefi" node under /hypervisor node in FDT, then Linux kernel could
scan this to get the UEFI information.
Signed-off-by: Shannon Zhao
Acked-by: Rob Herring
---
CC: Rob Herring
---
Documentation/devicetree/bindings/arm/xen.txt | 33 +++
1 file
From: Shannon Zhao
Add a new delivery type:
val[63:56] == 3: val[15:8] is flag: val[7:0] is a PPI.
To the flag, bit 0 stands the interrupt mode is edge(1) or level(0) and
bit 1 stands the interrupt polarity is active low(1) or high(0).
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
-
From: Shannon Zhao
When running on Xen hypervisor, runtime services are supported through
hypercall. Add a Xen specific function to initialize runtime services.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/include/asm/xen/xen-ops.h | 6 ++
arch/arm/xen/Makef
From: Shannon Zhao
Sync the changes of HVM_PARAM_CALLBACK_VIA ABI introduced by
Xen commit (public/hvm: export the HVM_PARAM_CALLBACK_VIA
ABI in the API).
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
include/xen/interface/hvm/params.h | 27 +--
1 file
From: Shannon Zhao
This patch set adds ACPI support for Xen Dom0 on ARM64. The relevant Xen
ACPI on ARM64 design document could be found from [1].
This patch set adds a new FDT node "uefi" under /hypervisor to pass UEFI
information. Introduce a bus notifier of AMBA and Platform bus to map
the ne
From: Shannon Zhao
When it's a Xen domain0 booting with ACPI, it will supply a /chosen and
a /hypervisor node in DT. So check if it needs to enable ACPI.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
Acked-by: Hanjun Guo
---
CC: Hanjun Guo
---
arch/arm64/kernel/acpi.c | 12 +++
From: Shannon Zhao
Move xlated_setup_gnttab_pages to common place, so it can be reused by
ARM to setup grant table.
Rename it to xen_xlate_map_ballooned_pages.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/x86/xen/grant-table.c | 57 +---
From: Shannon Zhao
Add a new type of Xen map space for Dom0 to map device's MMIO region.
Signed-off-by: Shannon Zhao
---
include/xen/interface/memory.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/include/xen/interface/memory.h b/include/xen/interface/memory.h
index 2ecfe4f..9aa8988 100
From: Shannon Zhao
Make xen_xlate_map_ballooned_pages work with 64K pages. In that case
Kernel pages are 64K in size but Xen pages remain 4K in size. Xen pfns
refer to 4K pages.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
drivers/xen/xlate_mmu.c | 26 --
From: Shannon Zhao
Move x86 specific codes to architecture directory and export those EFI
runtime service functions. This will be useful for initializing runtime
service on ARM later.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/x86/xen/efi.c| 112 +
Hi George,
On Thu, Feb 04, 2016 at 11:06:33AM +, George Dunlap wrote:
> On Thu, Feb 4, 2016 at 9:38 AM, Yu, Zhang wrote:
> > On 2/4/2016 5:28 PM, Paul Durrant wrote:
> >> I assume this means that the emulator can 'unshadow' GTTs (I guess on an
> >> LRU basis) so that it can shadow new ones wh
On Thu, Feb 4, 2016 at 2:04 PM, hanji unit wrote:
> Hello, does Xen support sharing memory pages between multiple domains
> (such as as Dom0, DomU1, DomU2)? The Grant Table hypercalls seem
> limited to:
>
> IOCTL_GNTALLOC_ALLOC_GREF
> IOCTL_GNTALLOC_DEALLOC_GREF
> IOCTL_GNTALLOC_SET_UNMAP_NOTIFY
Hi Andrew,
The Windows 2008 .cfg was built up using guidance from
http://www.virtuatopia.com/index.php/Virtualizing_Windows_Server_2008_with_X
en
If shadow_memory is not required - easy enough remove and retest. (which
after removing this line, the guest started without issue)
The physical serve
On 04/02/2016 23:14, Steven Haigh wrote:
> On 2016-02-05 09:22, Andrew Cooper wrote:
>> On 04/02/2016 22:06, Alex Braunegg wrote:
>>> root 30511 46.4 0.1 398728 1860 ?RLsl 08:47 0:27
>>> /usr/lib/xen/bin/qemu-system-i386 -xen-domid 6 -chardev
>>> socket,id=libxl-cmd,path=/var/run/xe
On 04/02/2016 23:44, Alex Braunegg wrote:
> Hi Andrew,
>
> I don't know enough on the internals of xen / qemu here - however, based on
> what you said, an x86_64 OS with >4Gb memory should boot via xl - however in
> my case here it fails to start up:
>
>
flight 80380 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80380/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 60684
test-amd64
Hi Andrew,
I don't know enough on the internals of xen / qemu here - however, based on
what you said, an x86_64 OS with >4Gb memory should boot via xl - however in
my case here it fails to start up:
-
[root@mynas-s5000xvn ~]# xl - c
Hi,
I patched the deb8u2 source with all four patches and built a new deb.
As two of the patches make some changes on the pcifront, I thought it could
be a good idea to first upgrade the domU 'bug' with the new linux-image.
domU 'bug' "uname -a":
Linux bug 3.16.0-4-amd64 #1 SMP Debian 3.16.7-ckt
On 2016-02-05 09:22, Andrew Cooper wrote:
On 04/02/2016 22:06, Alex Braunegg wrote:
root 30511 46.4 0.1 398728 1860 ?RLsl 08:47 0:27
/usr/lib/xen/bin/qemu-system-i386 -xen-domid 6 -chardev
socket,id=libxl-cmd,path=/var/run/xen/qmp-libxl-6,server,n
owait -no-shutdown -mon chardev=
On Thu, Feb 04, 2016 at 12:51:38AM +, Andrew Cooper wrote:
> On 03/02/2016 23:59, Luis R. Rodriguez wrote:
> > On Wed, Feb 03, 2016 at 08:52:50PM +, Andrew Cooper wrote:
> >> On 03/02/16 18:55, Luis R. Rodriguez wrote:
> >>> We add new hypervisor type to close the semantic gap for hyperviso
Hi Ian,
Below is the output requested:
Guest Configuration:
-
builder='hvm'
memory = 2048
shadow_memory = 8
uuid = '27f4787c-89b2-46ab-a797-96ea6e84c511'
name = 'Windows_2008_R2'
vif = [ 'bridge=br0, mac=00:16:3e:96:49:10' ]
disk = [
Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
to independently get and set the scheduling parameters of each
vCPU of a domain
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v4:
1) Add uint32_t vcpu_index to struct xen_domctl_schedule
On Wed, Jan 20, 2016 at 11:32 AM, Konrad Rzeszutek Wilk
wrote:
> On Tue, Dec 15, 2015 at 02:16:30PM -0800, Luis R. Rodriguez wrote:
>> From: "Luis R. Rodriguez"
>
> Hey Luis,
>
> Sorry for the long time to respond..
>>
>> paravirt_enabled conveys the idea that if this is set or if
>> paravirt_ena
Add libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
functions to support per-VCPU settings.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v4:
1) Coding style changes
Changes on PATCH v3:
1) Add sanity check on vcpuid
2) Add comments on
Add xc_sched_rtds_vcpu_get/set functions to interact with
Xen to get/set a domain's per-VCPU parameters.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v4:
1) Minor modifications on the function parameters.
Changes on PATCH v2:
1) Minor modification
Change main_sched_rtds and related output functions to support
per-VCPU settings.
Signed-off-by: Chong Li
Signed-off-by: Meng Xu
Signed-off-by: Sisu Xi
---
Changes on PATCH v4:
1) Coding style changes
Changes on PATCH v3:
1) Support commands, e.g., "xl sched-rtds -d vm1" to output the
default
[Goal]
The current xl sched-rtds tool can only set the VCPUs of a domain
to the same parameter although the scheduler supports VCPUs with
different parameters. This patchset is to enable xl sched-rtds
tool to configure the VCPUs of a domain with different parameters.
This per-VCPU settings can
Andrew Cooper, on Thu 04 Feb 2016 22:25:47 +, wrote:
> On 04/02/2016 22:21, Samuel Thibault wrote:
> > Boris Ostrovsky, on Thu 04 Feb 2016 14:18:46 -0500, wrote:
> >> On 02/04/2016 02:09 PM, Samuel Thibault wrote:
> >>> Roger Pau Monné, on Thu 04 Feb 2016 18:48:14 +0100, wrote:
> struc
On 02/04/2016 05:01 PM, PGNet Dev wrote:
On Mon, Feb 1, 2016 at 11:58 AM, Boris Ostrovsky
Current PVH implementation has never been described as
production-ready. What is happening now with HVMlite is
essentially bringing PVH to production-quality level.
So should I s/PVH/HVMlite/g?
On 02/04/2016 03:57 PM, Luis R. Rodriguez wrote:
Ah, well here lies the issue. As per hpa subarch was not designed for defining
a hypervisor, but rather at least subarch PC (0) [should be used if the
hardware is] "enumerable using standard PC mechanisms (PCI, ACPI) and doesn't
need a special boo
On 04/02/2016 22:21, Samuel Thibault wrote:
> Boris Ostrovsky, on Thu 04 Feb 2016 14:18:46 -0500, wrote:
>> On 02/04/2016 02:09 PM, Samuel Thibault wrote:
>>> Roger Pau Monné, on Thu 04 Feb 2016 18:48:14 +0100, wrote:
struct hvm_start_info {
#define HVM_START_MAGIC_VALUE 0x336ec57
Roger Pau Monné, on Thu 04 Feb 2016 20:21:24 +0100, wrote:
> > +1
> > We need that to pass parameters to gnumach modules.
>
> Hm, parameters as in a string that's paired with a module,
That, yes. Just like the kernel command line. One per module.
> I see that multiboot provides a string associat
On 04/02/2016 22:06, Alex Braunegg wrote:
> root 30511 46.4 0.1 398728 1860 ?RLsl 08:47 0:27
> /usr/lib/xen/bin/qemu-system-i386 -xen-domid 6 -chardev
> socket,id=libxl-cmd,path=/var/run/xen/qmp-libxl-6,server,n
> owait -no-shutdown -mon chardev=libxl-cmd,mode=control -chardev
> soc
Boris Ostrovsky, on Thu 04 Feb 2016 14:18:46 -0500, wrote:
> On 02/04/2016 02:09 PM, Samuel Thibault wrote:
> >Roger Pau Monné, on Thu 04 Feb 2016 18:48:14 +0100, wrote:
> >> struct hvm_start_info {
> >> #define HVM_START_MAGIC_VALUE 0x336ec578
> >> uint32_t magic; /* Co
Hi all,
Following on from Steven's question
(http://lists.xen.org/archives/html/xen-devel/2016-02/msg00801.html) - I
have a question around xl's usage of the 'qemu-system-i386' binary
When I was testing the changes required for enabling websockets, I was
testing qemu by itself (to validate that v
On Mon, Feb 1, 2016 at 11:58 AM, Boris Ostrovsky
Current PVH implementation has never been described as
production-ready. What is happening now with HVMlite is
essentially bringing PVH to production-quality level.
So should I s/PVH/HVMlite/g?
From user perspective that will be alm
From: Stefano Stabellini
On Xen MSIs can be remapped into pirqs, which are a type of event
channels. It's mostly for the benefit of PCI passthrough devices, to
avoid the overhead of interacting with the emulated lapic.
However remapping interrupts and MSIs is also supported for emulated
devices,
Hi all,
Looking specifically at 4.6.0.
It seems that the Makefile for qemuu uses the following:
$$source/configure --enable-xen --target-list=i386-softmmu \
$(QEMU_XEN_ENABLE_DEBUG) \
--prefix=$(LIBEXEC) \
--libdir=$(LIBEXEC_LIB) \
Hello, does Xen support sharing memory pages between multiple domains
(such as as Dom0, DomU1, DomU2)? The Grant Table hypercalls seem
limited to:
IOCTL_GNTALLOC_ALLOC_GREF
IOCTL_GNTALLOC_DEALLOC_GREF
IOCTL_GNTALLOC_SET_UNMAP_NOTIFY
Is there any mechanism to not allocate, but only share existing
On Thu, Feb 04, 2016 at 02:54:15PM -0500, Boris Ostrovsky wrote:
> On 02/03/2016 06:40 PM, Luis R. Rodriguez wrote:
> >On Wed, Feb 03, 2016 at 03:11:56PM -0500, Boris Ostrovsky wrote:
> >>On 02/03/2016 01:55 PM, Luis R. Rodriguez wrote:
> >>>I saw no considerations for the recommendations I had mad
On 04/02/16 20:29, Konrad Rzeszutek Wilk wrote:
> If there is more than one module, how is the guest expected to sort out
> which module is what?
>>> In general I was expecting this would be done by position, or if that's
>>> not enough an additional module (at either position 0 or n) shoul
> >>>If there is more than one module, how is the guest expected to sort out
> >>>which module is what?
> >In general I was expecting this would be done by position, or if that's
> >not enough an additional module (at either position 0 or n) should be
> >passed to contain that information.
>
> The
On 02/04/2016 02:33 PM, Roger Pau Monné wrote:
So we should provide a lapic/ioapic set of options to xl configuration
files?
We already have 'apic' option. We can also use 'acpi=false' since then
that will mean no MADT and thus no APIC/IOAPIC.
-boris
__
On 02/04/2016 02:21 PM, Roger Pau Monné wrote:
El 4/2/16 a les 19:51, Samuel Thibault ha escrit:
Boris Ostrovsky, on Thu 04 Feb 2016 13:38:02 -0500, wrote:
On 02/04/2016 12:48 PM, Roger Pau Monné wrote:
The format of the boot start info structure is the following (pointed to
be %ebx):
st
On 02/03/2016 06:40 PM, Luis R. Rodriguez wrote:
On Wed, Feb 03, 2016 at 03:11:56PM -0500, Boris Ostrovsky wrote:
On 02/03/2016 01:55 PM, Luis R. Rodriguez wrote:
I saw no considerations for the recommendations I had made last on your v1:
https://lkml.kernel.org/r/CAB=NE6XPA0YzbnM8=rspkkai6d3g
El 4/2/16 a les 19:22, Andrew Cooper ha escrit:
> On 04/02/16 17:48, Roger Pau Monné wrote:
>> Hello,
>>
>> I've Cced a bunch of people who have expressed interest in the HVMlite
>> design/implementation, both from a Xen or OS point of view. If you
>> would like to be removed, please say so and I
flight 80370 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80370/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399
build-i386-rumpuserxen
El 4/2/16 a les 19:51, Samuel Thibault ha escrit:
> Boris Ostrovsky, on Thu 04 Feb 2016 13:38:02 -0500, wrote:
>> On 02/04/2016 12:48 PM, Roger Pau Monné wrote:
>>> The format of the boot start info structure is the following (pointed to
>>> be %ebx):
>>>
>>> struct hvm_start_info {
>>> #de
On 02/03/2016 12:36 PM, Joao Martins wrote:
>
> On 02/02/2016 11:41 PM, Jim Fehlig wrote:
>> Also, if the connection dies, how are we informed about that?
>> Would that be done via the connect close callback that was removed in this
>> version? It is not clear to me how errors on the dconn connecti
On 02/04/2016 02:09 PM, Samuel Thibault wrote:
Roger Pau Monné, on Thu 04 Feb 2016 18:48:14 +0100, wrote:
struct hvm_start_info {
#define HVM_START_MAGIC_VALUE 0x336ec578
uint32_t magic; /* Contains the magic value 0x336ec578
*/
Hi Ian,
As per http://xenbits.xen.org/docs/4.6-testing/misc/xl-disk-configuration.txt
the disk specification conforms to:
disk = [ '/dev/vg/guest-volume,,hda', '/root/image.iso,,hdc,cdrom' ]
Is there any additional information you need to replicate this issue?
Best regards,
Alex
---
Roger Pau Monné, on Thu 04 Feb 2016 18:48:14 +0100, wrote:
> struct hvm_start_info {
> #define HVM_START_MAGIC_VALUE 0x336ec578
> uint32_t magic; /* Contains the magic value 0x336ec578
>*/
> /* ("xEn3" with the 0x80 bit of the
On 02/04/2016 07:58 AM, Doug Goldstein wrote:
On 2/2/16 10:58 AM, Boris Ostrovsky wrote:
On 02/02/2016 11:21 AM, David Vrabel wrote:
This needs some more description in the commit message.
--- a/arch/x86/xen/smp.c
+++ b/arch/x86/xen/smp.c
[...]
+hctxt->cpu_regs.x86_32.cs_base = 0;
+
flight 80508 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80508/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
flight 80382 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/80382/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 10 guest-start fail REGR. vs. 80121
test-amd64-i386-libvirt-p
Boris Ostrovsky, on Thu 04 Feb 2016 13:38:02 -0500, wrote:
> On 02/04/2016 12:48 PM, Roger Pau Monné wrote:
> >The format of the boot start info structure is the following (pointed to
> >be %ebx):
> >
> > struct hvm_start_info {
> > #define HVM_START_MAGIC_VALUE 0x336ec578
> > uint3
On 02/04/2016 12:48 PM, Roger Pau Monné wrote:
The format of the boot start info structure is the following (pointed to
be %ebx):
struct hvm_start_info {
#define HVM_START_MAGIC_VALUE 0x336ec578
uint32_t magic; /* Contains the magic value 0x336ec578
*/
On Wed, Feb 03, 2016 at 10:07:27AM -0500, Konrad Rzeszutek Wilk wrote:
> On Wed, Feb 03, 2016 at 02:34:47AM -0700, Jan Beulich wrote:
> > >>> On 02.02.16 at 23:05, wrote:
> > > This is getting more and more bizzare.
> > >
> > > I realized that this machine has VMCS shadowing so Xen does not trap
On 04/02/16 17:48, Roger Pau Monné wrote:
> Hello,
>
> I've Cced a bunch of people who have expressed interest in the HVMlite
> design/implementation, both from a Xen or OS point of view. If you
> would like to be removed, please say so and I will remove you in
> further iterations. The same app
On Thu, Feb 04, 2016 at 05:05:46PM +, Stefano Stabellini wrote:
> Hi Michael,
>
> do you have any comments on this?
I dislike how it spreads xen specific stuff around,
but I don't have a better idea at the moment, so
I applied this.
> On Wed, 13 Jan 2016, Stefano Stabellini wrote:
> > On Xen
On Wed, Feb 3, 2016 at 1:49 AM, David Vrabel wrote:
> On 03/02/16 05:46, Andy Lutomirski wrote:
>> Signed-off-by: Andy Lutomirski
>
> You forgot the previous Reviewed-by tags.
Whoops. If I send another version, they'll be there.
>
> David
--
Andy Lutomirski
AMA Capital Management, LLC
___
> The problem usually occurs over night while the machine is idle.
>
> The problem exclusively occurs on the machine running xen. None of
> the others are showing any issues whatsoever.
Try limiting the C states. Use the xenpm.
___
Xen-devel mailing l
Hello,
I've Cced a bunch of people who have expressed interest in the HVMlite
design/implementation, both from a Xen or OS point of view. If you
would like to be removed, please say so and I will remove you in
further iterations. The same applies if you want to be added to the Cc.
This is an i
On Sat, 30 Jan 2016, Shannon Zhao wrote:
> From: Graeme Gregory
>
> With the addition of ARM64 that does not have a traditional BIOS to
> scan, add a config option which is selected on x86 (ia64 doesn't need
> it either, it is EFI/UEFI based system) to do the traditional BIOS
> scanning for table
On Sat, 30 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> The first Mb handling is not necessary and the attribute of __vmap() is
> different for ARM. Factor the first Mb handling only for x86 and define
> a mapping attribute for each architecture.
>
> Cc: Jan Beulich
> Signed-off-by: S
On 04/02/16 14:08, Jan Beulich wrote:
On 04.02.16 at 14:33, wrote:
>> Jan Beulich writes ("Re: [Xen-devel] [PATCH v3 3/3] tools: introduce
>> parameter
>> max_wp_ram_ranges."):
>>> On 04.02.16 at 10:38, wrote:
So another question is, if value of this limit really matters, will a
On 04.02.2016 18:00, Ian Campbell wrote:
On Thu, 2016-02-04 at 17:49 +0100, Dirk Behme wrote:
From: Dirk Behme
Starting in the wrong ELx mode I get the following debug output:
...
- Current EL 0004 -
- Xen must be entered in NS EL2 mode -
- Boot failed -
The output of "Please update the
Hi Michael,
do you have any comments on this?
On Wed, 13 Jan 2016, Stefano Stabellini wrote:
> On Xen MSIs can be remapped into pirqs, which are a type of event
> channels. It's mostly for the benefit of PCI passthrough devices, to
> avoid the overhead of interacting with the emulated lapic.
>
>
On Thu, 2016-02-04 at 17:49 +0100, Dirk Behme wrote:
> From: Dirk Behme
>
> Starting in the wrong ELx mode I get the following debug output:
>
> ...
> - Current EL 0004 -
> - Xen must be entered in NS EL2 mode -
> - Boot failed -
>
> The output of "Please update the bootloader" is missing h
While playing with CPU hotplug I noticed that if a guest fails to unplug
a VCPU the toolstack will mark VCPU's availability in xenstore as
"offline" even though that VCPU is still running in the guest.
It's easy to see this by doing 'xl vcpu-set 0', which is
presumably not a realistic scenari
From: Dirk Behme
Starting in the wrong ELx mode I get the following debug output:
...
- Current EL 0004 -
- Xen must be entered in NS EL2 mode -
- Boot failed -
The output of "Please update the bootloader" is missing here.
Make sure this is output, too. With this, we get
...
- Current EL
On Thu, 2016-02-04 at 14:36 +0100, Olaf Hering wrote:
> On Thu, Feb 04, Ian Campbell wrote:
>
> > Cc: Olaf Hering
>
> Also this builds on SLE11/12.
>
> Tested-by: Olaf Hering
Applied with this + Wei's ack, thanks.
Ian.
___
Xen-devel mailing list
X
On Wed, 2016-02-03 at 16:12 +, Ian Jackson wrote:
>
> Acked-by: Ian Jackson
Applied both, thanks.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, 2016-02-03 at 14:21 +0100, Roger Pau Monne wrote:
> From: Roger Pau Monne
I dropped this as discussed on IRC.
> Due to the HVMlite changes there's a chance that the value in rc is
> checked
> without being initialised. Fix this by initialising it to 0 prior to the
> while loop. Also add
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 04 February 2016 15:06
> To: Paul Durrant
> Cc: Jan Beulich; Andrew Cooper; George Dunlap; Ian Campbell; Stefano
> Stabellini; Wei Liu; Kevin Tian; zhiyuan...@intel.com; Zhang Yu; xen-
> de...@lists.xen.org;
Paul Durrant writes ("RE: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter
max_wp_ram_ranges."):
> There are patches in the XenGT xen repo which add extra parameters
> into the VM config to allow libxl to provision a gvt-g instance (of
> which there are a finite number per GPU) for a VM. The
On 04/02/16 02:53, Chun Yan Liu wrote:
>
>
On 2/3/2016 at 10:33 PM, in message <56b20fcc.3010...@citrix.com>, George
> Dunlap wrote:
>> On 02/02/16 18:11, Ian Jackson wrote:
>>> George Dunlap writes ("Re: [Xen-devel] [PATCH V13 3/5] libxl: add pvusb
>> API"):
There are effectively
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 04 February 2016 14:13
> To: Paul Durrant
> Cc: Andrew Cooper; George Dunlap; Ian Campbell; Ian Jackson; Stefano
> Stabellini; Wei Liu; Kevin Tian; zhiyuan...@intel.com; Zhang Yu; xen-
> de...@lists.xen.org; Keir (X
>>> On 04.02.16 at 14:47, wrote:
>> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
>> Sent: 04 February 2016 13:34
>> * Is it possible for libxl to somehow tell from the rest of the
>>configuration that this larger limit should be applied ?
>>
>>AFAICT there is nothing in libxl dir
1 - 100 of 157 matches
Mail list logo