flight 81983 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81983/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399
build-i386-rumpuserxen
flight 81975 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81975/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 6 xen-boot fail REGR. vs. 80121
Tests which did not succe
flight 81918 qemu-upstream-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81918/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 9 debian-hvm-install fail REGR. vs. 77834
test-am
On February 12, 2016 5:17:42 PM EST, Doug Goldstein wrote:
>On 2/12/16 11:19 AM, Konrad Rzeszutek Wilk wrote:
>> Hey,
>>
>> Fedora for the longest time seems to have two linkers - one normal
>for GNU
>> applications and then another - mingw64 - for building EFI
>applications.
>>
>> Which means t
On 2/12/16 11:19 AM, Konrad Rzeszutek Wilk wrote:
> Hey,
>
> Fedora for the longest time seems to have two linkers - one normal for GNU
> applications and then another - mingw64 - for building EFI applications.
>
> Which means that to compile ELF binaries on Fedora requires this patch
> (taken fr
flight 81888 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81888/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR.
vs. 81620
Regression
A mechanism is required to binarily patch the running hypervisor with new
opcodes that have come about due to primarily security updates.
This document describes the design of the API that would allow us to
upload to the hypervisor binary patches.
This document has been shaped by the input from:
> Konrad Rzeszutek Wilk (13):
> xsplice: Design document (v7).
Somehow this patch disappeared in this patchset posting!
To not spam everybody's mailbox I am just sending this simple sub-thread
which has the design document.
___
Xen-devel mailing
On Sat, Feb 06, 2016 at 09:15:13PM +0200, Michael S. Tsirkin wrote:
> From: Stefano Stabellini
>
> On Xen MSIs can be remapped into pirqs, which are a type of event
> channels. It's mostly for the benefit of PCI passthrough devices, to
> avoid the overhead of interacting with the emulated lapic.
On 12/02/16 13:05, Konrad Rzeszutek Wilk wrote:
The mechanism to get this is via the XENVER hypercall and
we add a new sub-command to retrieve the binary build-id
called XENVER_build_id. The sub-hypercall parameter
allows an arbitrary size (the buffer and len is provided
to the hypervisor). A NUL
Yes, you can put the 'Tested-by' from me, I'm perfectly fine with that.
Thank you for your help!
Br,
Tommi
On Fri, Feb 05, 2016 at 12:35:10AM +0100, Tommi Airikka wrote:
> Hi,
>
> I patched the deb8u2 source with all four patches and built a new deb.
.. snip..
>
> Next, I upgraded dom0 with the n
On 12/02/16 13:05, Konrad Rzeszutek Wilk wrote:
All of XENVER_* have now an XSM check for their sub-ops.
The subop for XENVER_commandline is now a priviliged operation.
To not break guests we still return an string - but it is
just '\0'.
The rest: XENVER_[version|extraversion|capabilities|
para
On Fri, Feb 05, 2016 at 12:35:10AM +0100, Tommi Airikka wrote:
> Hi,
>
> I patched the deb8u2 source with all four patches and built a new deb.
.. snip..
>
> Next, I upgraded dom0 with the new linux-image deb and rebooted the machine.
>
> dom0 "uname -a":
> Linux dom0 3.16.0-4-amd64 #1 SMP Debia
On Fri, Feb 05, 2016 at 08:49:35PM -0800, Luis R. Rodriguez wrote:
> The boot/bitops.h has guards against including the
> regular bitops (include/asm-generic/bitops.h), it only
> implements what we need at early boot. We'll be making
> use of BIT() later so add it.
>
> Users of boot/boot.h must in
On 12/02/16 20:40, Konrad Rzeszutek Wilk wrote:
>>> diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
>>> index 96680eb..d549e7a 100644
>>> --- a/xen/include/public/sysctl.h
>>> +++ b/xen/include/public/sysctl.h
>>> @@ -766,6 +766,160 @@ struct xen_sysctl_tmem_op {
>>> typedef
On 12/02/16 20:47, Konrad Rzeszutek Wilk wrote:
>>> +struct xsplice_elf_sec *xsplice_elf_sec_by_name(const struct xsplice_elf
>>> *elf,
>>> +const char *name)
>>> +{
>>> +unsigned int i;
>>> +
>>> +for ( i = 0; i < elf->hdr->e_shnum; i++ )
>>
On 12/02/16 18:05, Konrad Rzeszutek Wilk wrote:
I will refrain from repeating the same review from previous patches.
> +int xsplice_verify_elf(struct xsplice_elf *elf, uint8_t *data)
> +{
> +
> +Elf_Ehdr *hdr = (Elf_Ehdr *)data;
> +
> +if ( elf->len < (sizeof *hdr) ||
> + !IS_ELF(
> > +struct xsplice_elf_sec *xsplice_elf_sec_by_name(const struct xsplice_elf
> > *elf,
> > +const char *name)
> > +{
> > +unsigned int i;
> > +
> > +for ( i = 0; i < elf->hdr->e_shnum; i++ )
> > +{
> > +if ( !strcmp(name, elf->se
> > diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
> > index 96680eb..d549e7a 100644
> > --- a/xen/include/public/sysctl.h
> > +++ b/xen/include/public/sysctl.h
> > @@ -766,6 +766,160 @@ struct xen_sysctl_tmem_op {
> > typedef struct xen_sysctl_tmem_op xen_sysctl_tmem_op_t;
On Fri, Feb 12, 2016 at 6:39 PM, Dario Faggioli
wrote:
> On Fri, 2016-02-12 at 12:31 +, Wei Liu wrote:
>> On Fri, Feb 12, 2016 at 05:00:40PM +0530, Harmandeep Kaur wrote:
>> >
>> > +info->xen_version_major = r >> 16;
>> > +info->xen_version_minor = r & 0xFF;
>> >
>> > -xc_version(c
Check the return value of xc_version() and return NULL if it
fails. libxl_get_version_info() can also return NULL now.
Callers of the function libxl_get_version_info() are already
prepared to deal with returning NULL on failure of xc_version().
Group all calls to xc_version() , so that data copies
flight 82185 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/82185/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 12/02/16 18:05, Konrad Rzeszutek Wilk wrote:
> From: Ross Lagerwall
>
> Add Elf routines and data structures in preparation for loading an
> xSplice payload.
>
> We also add an macro that will print where we failed during
> the ELF parsing - which is only available during debug builds.
> In pro
On 12/02/16 18:05, Konrad Rzeszutek Wilk wrote:
> From: Ross Lagerwall
>
> Signed-off-by: Ross Lagerwall
> Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
(this patch looks like it can be fast-tracked in the series?)
> ---
> v2: Slim the list as we do not use all of them.
> -
On 12/02/16 18:05, Konrad Rzeszutek Wilk wrote:
> diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> index 6f404b4..619aa9e 100644
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -152,4 +152,14 @@ config SCHED_DEFAULT
>
> endmenu
>
> +# Enable/Disable xsplice support
> +config X
On Fri, Feb 12, 2016 at 07:12:52PM +, Vladimir 'phcoder' Serbinenko wrote:
> Le ven. 12 févr. 2016 20:01, Daniel Kiper a
> écrit :
>
> > On Fri, Feb 12, 2016 at 03:57:59PM +0100, Vladimir 'φ-coder/phcoder'
> > Serbinenko wrote:
> > > Applied, thanks
> >
> > Thanks but here
> > http://lists.gnu
flight 81831 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81831/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 9 redhat-installfail REGR. vs. 80694
test-amd64
c/s de0f8c7c changed the use of zlib-options, and moved it from being locally
generated to coming from ./configure.
However, it neglected to modify the users of zlib-options. The curious use of
$(call ...) was to select either the -D or -l options as appropriate, but c/s
de0f8c7c broke this by lo
Le ven. 12 févr. 2016 20:01, Daniel Kiper a
écrit :
> On Fri, Feb 12, 2016 at 03:57:59PM +0100, Vladimir 'φ-coder/phcoder'
> Serbinenko wrote:
> > Applied, thanks
>
> Thanks but here
> http://lists.gnu.org/archive/html/grub-devel/2015-07/msg00100.html
> Andrei and later here
> http://lists.gnu.or
# Background
To configure virtfs, there is two methods in QEMU command line:
1. Use -fsdev and -device virtio-9p-pci,XXX directives
2. Use -virtfs directive
The second method is actually shorthand for the first method. It
constructs fsdev and device options behind the scene. In the end,
there wi
On Wed, Feb 03, 2016 at 06:03:50PM +0100, Daniel Kiper wrote:
> On Wed, Feb 03, 2016 at 05:08:44PM +0100, Daniel Kiper wrote:
> > On Tue, Feb 02, 2016 at 03:50:17PM -0600, Doug Goldstein wrote:
> > > On 2/2/16 3:20 PM, Daniel Kiper wrote:
> > > > On Tue, Feb 02, 2016 at 01:02:56PM -0800, PGNet Dev
1) EXIT_REASON_EXCEPTION_NMI is 0, and Clang complains:
xenalyze.c:513:33: error: initializer overrides prior initialization of this
subobject [-Werror,-Winitializer-overrides]
[EXIT_REASON_EXCEPTION_NMI]="EXCEPTION_NMI",
^~~
xenalyze.c:512:11: note
On Fri, Feb 12, 2016 at 03:57:59PM +0100, Vladimir 'φ-coder/phcoder' Serbinenko
wrote:
> Applied, thanks
Thanks but here
http://lists.gnu.org/archive/html/grub-devel/2015-07/msg00100.html
Andrei and later here
http://lists.gnu.org/archive/html/grub-devel/2015-11/msg00110.html
you expressed conc
On 12 February 2016 at 17:30, Stefano Stabellini
wrote:
> The following changes since commit f075c89f0a9cb31daf38892371d2822177505706:
>
> Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request'
> into staging (2016-02-09 17:56:46 +)
>
> are available in the git repository a
On Fri, Feb 12, Wei Liu wrote:
> On Thu, Feb 11, 2016 at 03:43:31PM +, Olaf Hering wrote:
> > Just to make them public, not meant for merging:
>
> I might be mistaken, but if you don't provide a hotplug script or some
> sort for Xen how do you expect user to make use vscsi?
The xenlinux back
On Fri, Feb 12, Wei Liu wrote:
> There seems to be a lot of places in this patch where the lines are
> longer than 80 characters. I'm not going to point them out one by one.
> Can you fix as many of those as you can where sensible?
Many lines are slightly longer than 80 chars already, as can be s
From: Ross Lagerwall
Add support for handling bug frames contained with xsplice modules. If a
trap occurs search either the kernel bug table or an applied payload's
bug table depending on the instruction pointer.
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
---
v2:- s/mod
From: Ross Lagerwall
If in the payload we do not have the old_addr we can resolve
the virtual address based on the UNDEFined symbols.
Signed-off-by: Konrad Rzeszutek Wilk
Signed-off-by: Ross Lagerwall
---
v1: Ross original version.
v2: Include test-case and document update.
---
docs/misc/xspl
From: Ross Lagerwall
Add support for loading xsplice payloads. This is somewhat similar to
the Linux kernel module loader, implementing the following steps:
- Verify the elf file.
- Parse the elf file.
- Allocate a region of memory mapped within a free area of
[xen_virt_end, XEN_VIRT_END].
- Co
We now expect that the ELF payloads be built with the
--build-id.
Also the .xsplice.deps section has to have the contents
of the hypervisor (or a preceding payload) build-id.
We already have the code to verify the Elf_Note build-id
so export parts of it.
This dependency means the hypervisor MUST
From: Ross Lagerwall
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
---
v2: Slim the list as we do not use all of them.
---
xen/include/xen/elfstructs.h | 8
1 file changed, 8 insertions(+)
diff --git a/xen/include/xen/elfstructs.h b/xen/include/xen/elfstructs.h
i
From: Ross Lagerwall
Add support for exception tables contained within xSplice payloads. If an
exception occurs search either the main exception table or a particular
active payload's exception table depending on the instruction pointer.
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzesz
From: Ross Lagerwall
Implement support for the apply, revert and replace actions.
To perform and action on a payload, the hypercall sets up a data
structure to schedule the work. A hook is added in all the
return-to-guest paths to check for work to do and execute it if needed.
In this way, patc
From: Ross Lagerwall
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/arch/x86/traps.c | 6 +++---
xen/common/vsprintf.c | 18 ++--
xen/common/xsplice.c | 52 +++
xen/include/xen/xsplice.h | 11 +++
As it should be an useful debug mechanism.
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/common/xsplice.c | 18 +-
1 file changed, 17 insertions(+), 1 deletion(-)
diff --git a/xen/common/xsplice.c b/xen/common/xsplice.c
index 65b1f11..34719fc 100644
--- a/xen/common/xsplice.c
+++
Hey!
Changelog:
v2: http://lists.xen.org/archives/html/xen-devel/2016-01/msg01597.html
- Updated code/docs/design with review comments.
- Make xen also have an PT_NOTE
- Added more of Ross's patches
- Combined build-id patchset with this.
(since the RFC and the Seattle Xen presentation)
- Fin
From: Ross Lagerwall
Add support for applying alternative sections within xsplice modules. At
module load time, apply an alternative sections that are found.
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/arch/x86/Makefile | 2 +-
xen/arch/x86/alternat
The implementation does not actually do any patching.
It just adds the framework for doing the hypercalls,
keeping track of ELF payloads, and the basic operations:
- query which payloads exist,
- query for specific payloads,
- check*1, apply*1, replace*1, and unload payloads.
*1: Which of cour
All of XENVER_* have now an XSM check for their sub-ops.
The subop for XENVER_commandline is now a priviliged operation.
To not break guests we still return an string - but it is
just '\0'.
The rest: XENVER_[version|extraversion|capabilities|
parameters|get_features|page_size|guest_handle|changes
From: Ross Lagerwall
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/common/xsplice.c | 17 +
1 file changed, 17 insertions(+)
diff --git a/xen/common/xsplice.c b/xen/common/xsplice.c
index 8c5557e..3f1da13 100644
--- a/xen/common/xsplice.c
+++ b/xen
The underlaying toolstack code to do the basic
operations when using the XEN_XSPLICE_op syscalls:
- upload the payload,
- get status of an payload,
- list all the payloads,
- apply, check, replace, and revert the payload.
Signed-off-by: Konrad Rzeszutek Wilk
Signed-off-by: Ross Lagerwall
---
The mechanism to get this is via the XENVER hypercall and
we add a new sub-command to retrieve the binary build-id
called XENVER_build_id. The sub-hypercall parameter
allows an arbitrary size (the buffer and len is provided
to the hypervisor). A NULL parameter will probe the hypervisor
for the leng
This change demonstrates how to generate an xSplice ELF payload.
The idea here is that we want to patch in the hypervisor
the 'xen_version_extra' function with an function that will
return 'Hello World'. The 'xl info | grep extraversion'
will reflect the new value after the patching.
To generate
From: Ross Lagerwall
Shadow variables are a piece of infrastructure to be used by xsplice
modules. They are used to attach a new piece of data to an existing
structure in memory.
Signed-off-by: Ross Lagerwall
---
xen/common/Makefile | 1 +
xen/common/xsplice_shadow.c | 105 ++
A simple tool that allows an system admin to perform
basic xsplice operations:
- Upload a xsplice file (with an unique name)
- List all the xsplice payloads loaded.
- Apply, revert, replace, unload, or check the payload using the
unique name.
- Do all three - upload, check, and apply the
Add hook functions which run during patch apply and patch revert. Hook
functions are used by xsplice modules to manipulate data structures
during patching, etc.
Also add macros to be used by modules for excluding functions or
sections from being included in a patch.
Signed-off-by: Ross Lagerwall
If the hypervisor is built with we will display it.
Signed-off-by: Konrad Rzeszutek Wilk
---
v2: Include HAVE_*, use libxl_zalloc, s/rc/ret/
v3: Retry with different size if 1020 is not enough.
---
tools/libxl/libxl.c | 45 +
tools/libxl/libxl.
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/arch/x86/test/xen_hello_world.c | 15 +++
1 file changed, 15 insertions(+)
diff --git a/xen/arch/x86/test/xen_hello_world.c
b/xen/arch/x86/test/xen_hello_world.c
index 6200fbe..b6fa05e 100644
--- a/xen/arch/x86/test/xen_hello_world.c
+++
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/common/xsplice.c | 36
1 file changed, 28 insertions(+), 8 deletions(-)
diff --git a/xen/common/xsplice.c b/xen/common/xsplice.c
index 2ba5bb5..8c5557e 100644
--- a/xen/common/xsplice.c
+++ b/xen/common/xsplice.c
@
From: Ross Lagerwall
Add Elf routines and data structures in preparation for loading an
xSplice payload.
We also add an macro that will print where we failed during
the ELF parsing - which is only available during debug builds.
In production (debug=n) we only return the error value.
Signed-off-
Konrad Rzeszutek Wilk writes ("Two linkers - EFI one (mingw64) and normal GNU
one [Fedora]"):
> Would it be OK if the configure.ac jammed an config.h in 'xen'
> directory? But then somehow the Config.mk has to read this and
> figure this out? Which is kind of hackish.
Until now, hypervisor develo
On Fri, Feb 12, 2016 at 03:57:25PM +, Stefano Stabellini wrote:
> On Fri, 12 Feb 2016, Konrad Rzeszutek Wilk wrote:
> > On Fri, Feb 12, 2016 at 03:26:14PM +, Stefano Stabellini wrote:
> > > On Fri, 12 Feb 2016, Jan Beulich wrote:
> > > > >>> On 12.02.16 at 15:17, wrote:
> > > > > --- a/xen
On 12/02/16 17:05, Jan Beulich wrote:
On 05.02.16 at 14:42, wrote:
>> Use attributes to specify whether a feature is applicable to be exposed to:
>> 1) All guests
>> 2) HVM guests
>> 3) HVM HAP guests
> No provisions for PV-only or shadow-only features?
No. There are not currently any, a
From: Ian Campbell
The xc version is now always present.
Signed-off-by: Ian Campbell
Reviewed-by: Stefano Stabellini
Signed-off-by: Stefano Stabellini
---
include/hw/xen/xen_common.h |6 --
xen-hvm.c |2 +-
2 files changed, 1 insertion(+), 7 deletions(-)
diff -
From: Ian Campbell
Now that 4.2 and earlier are no longer supported "xc_interface *" is
always the right type for the xc interface handle.
With this we can also simplify the handling of the xenforeignmemory
compatibility wrapper by making xenforeignmemory_handle ==
xc_interface, instead of an xc
From: Ian Campbell
Now that we no longer support Xen 4.2 and earlier only the <470 case
needs this so it can live with all the others.
Signed-off-by: Ian Campbell
Reviewed-by: Stefano Stabellini
Signed-off-by: Stefano Stabellini
---
include/hw/xen/xen_common.h | 34 ++--
From: Ian Campbell
We assume (and check for in configure) 4.2 or later now. In reality
all of the removed checks are for far older versions.
FMT_ioreq_size is no longer needed.
Signed-off-by: Ian Campbell
Reviewed-by: Stefano Stabellini
Signed-off-by: Stefano Stabellini
---
hw/display/xenfb
From: Ian Campbell
Xen 4.2 become unsupported upstream in 09/2015 (see
http://wiki.xen.org/wiki/Xen_Release_Features). However as far as the
interfaces provided by the toolstack libraries go 4.2 and 4.3 are
indistinguishable.
Therefore drop support for Xen 4.1 and earlier which removes a whole
p
The following changes since commit f075c89f0a9cb31daf38892371d2822177505706:
Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request' into
staging (2016-02-09 17:56:46 +)
are available in the git repository at:
git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xe
On Thu, Feb 11, 2016 at 03:43:28PM +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Acked-by: Ian Campbell
> Cc: Ian Campbell
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Keir Fraser
> Cc: Tim Deegan
Acked-by: Wei Liu
> ---
> docs/misc/xenstore-paths.markdown | 10 ++
> 1 fi
On Thu, Feb 11, 2016 at 03:43:27PM +, Olaf Hering wrote:
> The pvops kernel expects either "naa.WWN:LUN" or "h:c:t:l" in the p-dev
> property. Add the missing :LUN part to the comment.
>
> Signed-off-by: Olaf Hering
> Acked-by: Ian Campbell
> Cc: Ian Campbell
> Cc: Ian Jackson
> Cc: Jan Be
I notice you posted several enquiries in your previous patch, but I'm
not sure if any of them still requires answers because you seemed to
have posted answers to your own enquiries. I skip all of them and start
from this version.
There seems to be a lot of places in this patch where the lines are
On Thu, Feb 11, 2016 at 03:43:30PM +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Acked-by: Ian Campbell
> Cc: Ian Campbell
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Keir Fraser
> Cc: Tim Deegan
Acked-by: Wei Liu
___
Xen-devel mailing
On Thu, Feb 11, 2016 at 03:43:31PM +, Olaf Hering wrote:
> Just to make them public, not meant for merging:
I might be mistaken, but if you don't provide a hotplug script or some
sort for Xen how do you expect user to make use vscsi?
Wei.
___
Xen-d
>>> On 12.02.16 at 17:50, wrote:
> On 12/02/16 16:47, Jan Beulich wrote:
> On 05.02.16 at 14:42, wrote:
>>> Awkwardly, some new feature bits mean "Feature $X no longer works".
>>> Store these inverted in a featureset.
>>>
>>> This permits safe zero-extending of a smaller featureset as part of
Hey,
Fedora for the longest time seems to have two linkers - one normal for GNU
applications and then another - mingw64 - for building EFI applications.
Which means that to compile ELF binaries on Fedora requires this patch
(taken from Fedora build):
>From 078f2d6155e940a91c1f668b86dcb9534d76b8b
>>> On 12.02.16 at 17:48, wrote:
> On 12/02/16 16:43, Jan Beulich wrote:
> On 05.02.16 at 14:42, wrote:
>>> --- /dev/null
>>> +++ b/xen/arch/x86/cpuid.c
>>> @@ -0,0 +1,19 @@
>>> +#include
>>> +#include
>>> +
>>> +const uint32_t known_features[] = INIT_KNOWN_FEATURES;
>>> +
>>> +static void
Doug Goldstein writes ("[PATCH v3] travis: add initial Travis CI script to do
builds"):
> This is just suppose to do a simple compile test on Travis CI. Currently
> due to linux86 (bcc/bin86/dev86) not being whitelisted the tools cannot
> be built.
>
> Signed-off-by: Doug Goldstein
Andrew Cooper
>>> On 05.02.16 at 14:42, wrote:
> Use attributes to specify whether a feature is applicable to be exposed to:
> 1) All guests
> 2) HVM guests
> 3) HVM HAP guests
No provisions for PV-only or shadow-only features?
> +#define X86_FEATURE_MTRR ( 0*32+12) /*S Memory Type Range
> Regis
> -Original Message-
> From: David Miller [mailto:da...@davemloft.net]
> Sent: 12 February 2016 16:42
> To: Paul Durrant
> Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org
> Subject: Re: [PATCH net-next v1 0/8] xen-netback: support toeplitz hashing
>
> From: Paul Durrant
> Date:
On Fri, Feb 12, 2016 at 03:53:06PM +0100, Olaf Hering wrote:
> On Fri, Feb 12, Wei Liu wrote:
>
> > CC'ing other tools maintainer.
> >
> > On Thu, Feb 11, 2016 at 11:37:49AM +0100, Olaf Hering wrote:
> > > How should libxl__initiate_device_generic_remove deal with devices which
> >
> > I think y
On 12/02/16 16:47, Jan Beulich wrote:
On 05.02.16 at 14:42, wrote:
>> Awkwardly, some new feature bits mean "Feature $X no longer works".
>> Store these inverted in a featureset.
>>
>> This permits safe zero-extending of a smaller featureset as part of a
>> comparison, and safe reasoning (sub
On 12/02/16 16:43, Jan Beulich wrote:
On 05.02.16 at 14:42, wrote:
>> --- /dev/null
>> +++ b/xen/arch/x86/cpuid.c
>> @@ -0,0 +1,19 @@
>> +#include
>> +#include
>> +
>> +const uint32_t known_features[] = INIT_KNOWN_FEATURES;
>> +
>> +static void __maybe_unused build_assertions(void)
>> +{
>>
>>> On 05.02.16 at 14:42, wrote:
> Awkwardly, some new feature bits mean "Feature $X no longer works".
> Store these inverted in a featureset.
>
> This permits safe zero-extending of a smaller featureset as part of a
> comparison, and safe reasoning (subset?, superset?, compatible? etc.)
> withou
>>> On 05.02.16 at 14:42, wrote:
> --- /dev/null
> +++ b/xen/arch/x86/cpuid.c
> @@ -0,0 +1,19 @@
> +#include
> +#include
> +
> +const uint32_t known_features[] = INIT_KNOWN_FEATURES;
> +
> +static void __maybe_unused build_assertions(void)
> +{
> +BUILD_BUG_ON(ARRAY_SIZE(known_features) != F
On 12/02/16 16:36, Jan Beulich wrote:
On 05.02.16 at 14:41, wrote:
>> This script consumes include/public/arch-x86/cpufeatureset.h and generates a
>> single include/asm-x86/cpuid-autogen.h containing all the processed
>> information.
>>
>> Signed-off-by: Andrew Cooper
> Acked-by: Jan Beulich
From: Paul Durrant
Date: Fri, 12 Feb 2016 11:07:50 +
> Windows *requires* use of Teoplitz so your position completely rules
> out being able to support receive side scaling in Windows PV
> frontends on Linux kernel backends, not only for Xen but for any
> other hypervisor, which I think is to
flight 81861 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81861/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 65543
version targeted
>>> On 05.02.16 at 14:42, wrote:
> New words are:
> * 0x8007.edx - Contains Invarient TSC
> * 0x8008.ebx - Newly used for AMD Zen processors
>
> In addition, replace some open-coded ITSC and EFRO manipulation.
>
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
>>> On 05.02.16 at 14:41, wrote:
> This script consumes include/public/arch-x86/cpufeatureset.h and generates a
> single include/asm-x86/cpuid-autogen.h containing all the processed
> information.
>
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
albeit ...
> --- /dev/null
> +++ b/xen/to
Moving a vCPU to a different pCPU means offlining it and
then waking it up, on the new pCPU. Credit1 grants BOOST
priority to vCPUs that wakes up, with the aim of improving
I/O latency. The net effect of this all is that vCPUs get
boosted when migrating, which shouldn't happen.
For instance, this
Add tracepoints and a performance counter for
boosting and unboosting in Credit1.
Note that they (the trace points) do not cover
the case of the idle vCPU being boosted to run
a tasklet, as there already is
TRC_CSCHED_SCHED_TASKLET for that.
Signed-off-by: Dario Faggioli
---
Cc: George Dunlap
Hi,
take 3 of this series. Only change wrt v2 is the atomic-safeness fix in patch
2.
While there, I've also added a comment about the need for such atomic-safeness
when accessing Credit1's svc->flags.
History is here:
v2: http://lists.xenproject.org/archives/html/xen-devel/2016-02/msg01750.htm
>>> On 05.02.16 at 14:41, wrote:
> +/* Intel-defined CPU features, CPUID level 0x0001.edx, word 0 */
> +#define X86_FEATURE_FPU ( 0*32+ 0) /* Onboard FPU */
Regardless of you limiting the interface to tools only, I'm not
convinced exposing constants starting with X86_* here is
app
On 12/02/16 16:04, Jan Beulich wrote:
On 12.02.16 at 16:25, wrote:
>> Hello,
>>
>> Now that Clang 3.5 can build the hypervisor, I was just preparing a
>> patch to README, and encountered this:
>>
>> In file included from xc_altp2m.c:23:
>> In file included from ./xc_private.h:35:
>> In file i
>>> On 12.02.16 at 16:25, wrote:
> Hello,
>
> Now that Clang 3.5 can build the hypervisor, I was just preparing a
> patch to README, and encountered this:
>
> In file included from xc_altp2m.c:23:
> In file included from ./xc_private.h:35:
> In file included from ./include/xenctrl.h:53:
> /local
On Fri, 12 Feb 2016, Konrad Rzeszutek Wilk wrote:
> On Fri, Feb 12, 2016 at 03:26:14PM +, Stefano Stabellini wrote:
> > On Fri, 12 Feb 2016, Jan Beulich wrote:
> > > >>> On 12.02.16 at 15:17, wrote:
> > > > --- a/xen/include/asm-arm/config.h
> > > > +++ b/xen/include/asm-arm/config.h
> > > > @
On Fri, Feb 12, 2016 at 03:26:14PM +, Stefano Stabellini wrote:
> On Fri, 12 Feb 2016, Jan Beulich wrote:
> > >>> On 12.02.16 at 15:17, wrote:
> > > --- a/xen/include/asm-arm/config.h
> > > +++ b/xen/include/asm-arm/config.h
> > > @@ -15,8 +15,10 @@
> > >
> > > #if defined(CONFIG_ARM_64)
>
On Fri, Feb 12, 2016 at 02:53:21PM +, Stefano Stabellini wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> I agree to the conditions in the XenProject Coverity contribution
> guidelines [0].
+1
>
> I'm a developer working for Citrix Systems UK, Ltd. I've been active
> in the Xen
On Fri, 12 Feb 2016, Jan Beulich wrote:
> >>> On 12.02.16 at 15:17, wrote:
> > --- a/xen/include/asm-arm/config.h
> > +++ b/xen/include/asm-arm/config.h
> > @@ -15,8 +15,10 @@
> >
> > #if defined(CONFIG_ARM_64)
> > # define LONG_BYTEORDER 3
> > +# define ELFSIZE 64
> > #else
> > # define LON
1 - 100 of 186 matches
Mail list logo