>>> On 23.02.16 at 18:42, wrote:
> On 23/02/16 14:59, Jan Beulich wrote:
> On 23.02.16 at 12:05, wrote:
>>> --- a/xen/arch/x86/xstate.c
>>> +++ b/xen/arch/x86/xstate.c
>>> @@ -263,41 +263,24 @@ void xsave(struct vcpu *v, uint64_t mask)
>>>
>>> if ( word_size <= 0 || !is_pv_32bit_vcpu(v
>>> On 23.02.16 at 20:04, wrote:
> From 7da6d169835acb4aa93bfa48b1ae6b8e198f8e5f Mon Sep 17 00:00:00 2001
> From: Konrad Rzeszutek Wilk
> Date: Fri, 19 Feb 2016 09:26:02 -0500
> Subject: [PATCH] version: Document guest_handle
>
> And what it is usually used for.
>
> Signed-off-by: Konrad Rzeszu
Turning parse_config_data() exit codes towards using the
EXIT_[SUCCESS|FAILURE] constants, instead of arbitrary
numbers or libxl return codes.
Signed-off-by: Harmandeep Kaur
Reviewed-by: Dario Faggioli
---
v2: Changelog edit.
---
tools/libxl/xl_cmdimpl.c | 112 +++---
On Mon, Feb 22, 2016 at 10:08:52AM -0700, Jan Beulich wrote:
> >>> On 22.02.16 at 06:35, wrote:
>
> First of all I wonder on what basis you collect your Cc lists on
> patches.
>
I send the bugs-fix patch as whole. I just get the Cc lists using the
script based on the whole patchset. May be I wil
> >> -void virtual_vmcs_enter(void *vvmcs)
> >> +void virtual_vmcs_enter(const struct vcpu *v)
> >> {
> >> -__vmptrld(pfn_to_paddr(domain_page_map_to_mfn(vvmcs)));
> >> +__vmptrld(v->arch.hvm_vmx.vmcs_shadow_maddr);
> >
> > Debug shows v->arch.hvm_vmx.vmcs_shadow_maddr will equal to 0 at
On Mon, Feb 22, 2016 at 10:18:42AM -0700, Jan Beulich wrote:
> > (1ULL << sub_leaf) )
> > +{
> > +domain_cpuid(d, input, sub_leaf, &_eax, &_ebx,
> > + &_ecx, &_edx);
> > +
flight 83683 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83683/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399
build-i386-rumpuserxen
On 02/23/16 08:37, Jan Beulich wrote:
> >>> On 23.02.16 at 15:16, wrote:
> > On 02/23/2016 09:10 AM, Jan Beulich wrote:
> > On 23.02.16 at 15:00, wrote:
> >>> On 02/22/2016 09:04 PM, Haozhong Zhang wrote:
> >>>
>
> +if ( cpu_has_tsc_ratio )
> +svm_function_table
flight 83704 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83704/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 65543
test-amd64-amd64-
On Mon, Feb 22, 2016 at 10:18:42AM -0700, Jan Beulich wrote:
> > @@ -4703,7 +4703,19 @@ void hvm_cpuid(unsigned int input, unsigned int
> > *eax, unsigned int *ebx,
> > for ( sub_leaf = 2; sub_leaf < 63; sub_leaf++ )
> > if ( (v->arch.xcr0 | v->arch.hv
On 02/22/2016 04:15 PM, Joao Martins wrote:
>
> On 12/08/2015 04:06 PM, Jim Fehlig wrote:
>> Daniel P. Berrange wrote:
>>> On Mon, Dec 07, 2015 at 10:59:32PM -0700, Jim Fehlig wrote:
On 12/07/2015 11:52 AM, Daniel P. Berrange wrote:
> On Mon, Dec 07, 2015 at 09:42:21AM -0700, Jim Fehlig wr
On 02/22/2016 07:35 AM, Ján Tomko wrote:
> On Wed, Feb 17, 2016 at 05:33:45PM -0700, Jim Fehlig wrote:
>> xl/libxl already supports qemu's network-based block backends
>> such as nbd and rbd. libvirt has supported configuring such
>> s for long time too. This patch adds support for rbd
>> disks in
flight 83674 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83674/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail in 83463 REGR. vs. 81632
Tests which are f
> -Original Message-
> From: Doug Goldstein [mailto:car...@cardoe.com]
> Sent: Wednesday, February 24, 2016 11:02 AM
> To: Jan Beulich ; Wu, Feng
> Cc: Tian, Kevin ; Keir Fraser ; George
> Dunlap ; Andrew Cooper
> ; Dario Faggioli ; xen-
> de...@lists.xen.org
> Subject: Re: [Xen-devel] [
On 2/23/16 10:34 AM, Jan Beulich wrote:
On 23.02.16 at 09:34, wrote:
>
>> --- a/xen/include/asm-x86/hvm/hvm.h
>> +++ b/xen/include/asm-x86/hvm/hvm.h
>> @@ -565,6 +565,12 @@ const char *hvm_efer_valid(const struct vcpu *v,
>> uint64_t value,
>> signed int cr0_pg);
flight 83655 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83655/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
build-amd64-rumpuserx
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, February 24, 2016 12:34 AM
> To: Wu, Feng
> Cc: Andrew Cooper ; Dario Faggioli
> ; George Dunlap ;
> Tian, Kevin ; xen-devel@lists.xen.org; Keir Fraser
>
> Subject: Re: [PATCH v13 1/2] vmx: VT-d poste
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: Tuesday, February 23, 2016 7:07 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: Keir Fraser ; Jan Beulich ; Andrew
> Cooper ; Tian, Kevin ;
> George Dunlap ; Dario Faggioli
>
> Subject: Re: [PATCH v13
On Tue, Feb 23, 2016 at 04:06:55PM -0800, H. Peter Anvin wrote:
> On 02/23/2016 03:36 PM, Luis R. Rodriguez wrote:
> >
> >> 4. the only useful operator on a range is "is address X inside this
> >>range"; this operator is likely *not* useful for a table, since
On 02/23/2016 03:36 PM, Luis R. Rodriguez wrote:
>
>> 4. the only useful operator on a range is "is address X inside this
>>range"; this operator is likely *not* useful for a table, since
>>if you have to ever invoke it you are probably doing something very
>>wrong.
>
> kprobe uses it
On 23/02/2016 23:44, Luis R. Rodriguez wrote:
> On Tue, Feb 23, 2016 at 10:44:56PM +, Andrew Cooper wrote:
>> On 23/02/2016 22:18, Luis R. Rodriguez wrote:
>>> On Tue, Feb 23, 2016 at 05:00:12PM -0500, Konrad Rzeszutek Wilk wrote:
On Tue, Feb 23, 2016 at 12:48:18PM -0800, Luis R. Rodriguez
Ján Tomko wrote:
> On Wed, Feb 17, 2016 at 05:33:45PM -0700, Jim Fehlig wrote:
>> xl/libxl already supports qemu's network-based block backends
>> such as nbd and rbd. libvirt has supported configuring such
>> s for long time too. This patch adds support for rbd
>> disks in the libxl driver by gene
On Tue, Feb 23, 2016 at 10:44:56PM +, Andrew Cooper wrote:
> On 23/02/2016 22:18, Luis R. Rodriguez wrote:
> > On Tue, Feb 23, 2016 at 05:00:12PM -0500, Konrad Rzeszutek Wilk wrote:
> >> On Tue, Feb 23, 2016 at 12:48:18PM -0800, Luis R. Rodriguez wrote:
> >>> For a while now I've been installin
On Tue, Feb 23, 2016 at 3:22 PM, H. Peter Anvin wrote:
> On 02/23/2016 03:08 PM, Luis R. Rodriguez wrote:
>>
>> OK yes I see the issue now. I've modified this to use const, and
>> retested the kprobe patch and it works well still. kprobe would not
>> use LINKTABLE_TEXT, instead it uses its own mac
On 02/23/2016 03:08 PM, Luis R. Rodriguez wrote:
>
> OK yes I see the issue now. I've modified this to use const, and
> retested the kprobe patch and it works well still. kprobe would not
> use LINKTABLE_TEXT, instead it uses its own macro, however users of
> LINKTABLE_TEXT would then have const d
Thanks a lot, Lars. Akanksha, sorry for the long delay in answering, i
had completely missed your message.
I guess Lars comments are a good intro to how to start. Please, let me
know if you need something else, or comment on how you are progressing.
Saludos,
Jesus.
On Tue, 2016-02-23 at
On Fri, Feb 19, 2016 at 1:48 PM, Luis R. Rodriguez wrote:
> On Fri, Feb 19, 2016 at 12:25:55PM -0800, H. Peter Anvin wrote:
>> On 02/19/2016 05:45 AM, Luis R. Rodriguez wrote:
>> > +
>> > +/**
>> > + * DOC: Regular linker linker table constructors
>> > + *
>> > + * Regular constructors are expecte
On 23/02/2016 22:18, Luis R. Rodriguez wrote:
> On Tue, Feb 23, 2016 at 05:00:12PM -0500, Konrad Rzeszutek Wilk wrote:
>> On Tue, Feb 23, 2016 at 12:48:18PM -0800, Luis R. Rodriguez wrote:
>>> For a while now I've been installing Xen from source on my Debian box,
>>> with a default configuration al
On Tue, Feb 23, 2016 at 11:18:09PM +0100, Luis R. Rodriguez wrote:
> On Tue, Feb 23, 2016 at 05:00:12PM -0500, Konrad Rzeszutek Wilk wrote:
> > On Tue, Feb 23, 2016 at 12:48:18PM -0800, Luis R. Rodriguez wrote:
> > > For a while now I've been installing Xen from source on my Debian box,
> > > with
On Tue, Feb 23, 2016 at 05:00:12PM -0500, Konrad Rzeszutek Wilk wrote:
> On Tue, Feb 23, 2016 at 12:48:18PM -0800, Luis R. Rodriguez wrote:
> > For a while now I've been installing Xen from source on my Debian box,
> > with a default configuration always. This is party why I've run into
> > compile
On Tue, Feb 23, 2016 at 12:48:18PM -0800, Luis R. Rodriguez wrote:
> For a while now I've been installing Xen from source on my Debian box,
> with a default configuration always. This is party why I've run into
> compile issues before it seems, but I've also just picked up on
> another possible iss
On 02/22/2016 11:15 PM, Joao Martins wrote:
>
>
> On 12/08/2015 04:06 PM, Jim Fehlig wrote:
>> Daniel P. Berrange wrote:
>>> On Mon, Dec 07, 2015 at 10:59:32PM -0700, Jim Fehlig wrote:
On 12/07/2015 11:52 AM, Daniel P. Berrange wrote:
> On Mon, Dec 07, 2015 at 09:42:21AM -0700, Jim Feh
flight 83636 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83636/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-xsm 15 guest-localmigratefail REGR. vs. 60684
build-i386
On 23/02/2016 20:41, Konrad Rzeszutek Wilk wrote:
> . snip..
>>> + * Note that because of this NOP code the do_nmi is not safely patchable.
>>> + * Also if we do receive 'real' NMIs we have lost them.
>> The MCE path needs consideration as well. Unlike the NMI path however,
>> that one cannot be i
> > > +static void reschedule_fn(void *unused)
> > > +{
> > > +smp_mb(); /* Synchronize with setting do_work */
> > > +raise_softirq(SCHEDULE_SOFTIRQ);
> >
> > As you have to IPI each processor to raise a schedule softirq, you can
> > set a per-cpu "xsplice enter rendezvous" variable. Thi
On Tue, Feb 23, 2016 at 03:41:57PM -0500, Konrad Rzeszutek Wilk wrote:
> .. snip..
> > > + * Note that because of this NOP code the do_nmi is not safely patchable.
> > > + * Also if we do receive 'real' NMIs we have lost them.
> >
> > The MCE path needs consideration as well. Unlike the NMI path
For a while now I've been installing Xen from source on my Debian box,
with a default configuration always. This is party why I've run into
compile issues before it seems, but I've also just picked up on
another possible issue. My system on dom0 overheats and shuts itself
off. For a while I didn't
>
> Also above, you've got:
> list_for_each_entry_safe_reverse ( data, tmp, &applied_list, list )
>
> but it needs to be:
> list_for_each_entry_safe_reverse ( data, tmp, &applied_list, applied_list )
Totally mised it.
>
> I'm not sure why this was changed from how I had it...
I had issues appl
On Mon, Feb 22, 2016 at 03:00:31PM +, Ross Lagerwall wrote:
> On 02/12/2016 06:05 PM, Konrad Rzeszutek Wilk wrote:
> snip
> >+static void xsplice_do_single(unsigned int total_cpus)
> >+{
> >+nmi_callback_t saved_nmi_callback;
> >+struct payload *data, *tmp;
> >+s_time_t timeout;
> >
. snip..
> > + * Note that because of this NOP code the do_nmi is not safely patchable.
> > + * Also if we do receive 'real' NMIs we have lost them.
>
> The MCE path needs consideration as well. Unlike the NMI path however,
> that one cannot be ignored.
>
> In both cases, it might be best to see
On Tue, Feb 23, 2016 at 11:34:09AM +0100, Luis R. Rodriguez wrote:
> On Tue, Feb 23, 2016 at 09:51:19AM +0100, Ingo Molnar wrote:
> >
> > * Luis R. Rodriguez wrote:
> >
> > > Although hardware_subarch has been in place since the x86 boot
> > > protocol 2.07 it hasn't been used much. Enumerate cu
It provides a little more information than just "something went wrong".
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/hvm/emulate.c| 2 +-
xen/arch/x86/hvm/hvm.c| 8 ++--
xen/include/asm-x86/hvm/emulate.h | 1 +
3 files changed, 8 insertions(+), 3 del
On Mon, Feb 22, 2016 at 05:32:53AM -0700, Jan Beulich wrote:
> >>> On 19.02.16 at 15:32, wrote:
> > --- a/xen/include/public/version.h
> > +++ b/xen/include/public/version.h
> > @@ -79,6 +79,10 @@ typedef struct xen_feature_info xen_feature_info_t;
> > #define XENVER_pagesize 7
> >
> > /* arg
On 23/02/16 18:36, Andrew Cooper wrote:
> Clang-3.8 generates several .data.rel.ro sections when compiling Xen. As
> these contain no global symbols, they should be .data.rel.ro.local. This
> breaks the SPECIAL_DATA_SECTIONS check when converting the transition units to
> being init-only.
>
> For
Clang-3.8 generates several .data.rel.ro sections when compiling Xen. As
these contain no global symbols, they should be .data.rel.ro.local. This
breaks the SPECIAL_DATA_SECTIONS check when converting the transition units to
being init-only.
For alternatives.c, explicitly move the nops arrays in
On Fri, 2016-02-19 at 22:07 +0530, Harmandeep Kaur wrote:
> Turning parse_config_data() exit codes towards using the
> EXIT_[SUCCESS|FAILURE] constants, instead of instead of arbitrary
>
repetition of "instead of"
> numbers or libxl return codes.
> - for main_*: arbitrary -> EXIT_SUCCESS|E
On Tue, Feb 23, 2016 at 11:57:16AM +, David Vrabel wrote:
> On 23/02/16 07:24, Luis R. Rodriguez wrote:
> > --- a/arch/x86/xen/enlighten.c
> > +++ b/arch/x86/xen/enlighten.c
> [...]
> > @@ -1526,8 +1525,6 @@ asmlinkage __visible void __init
> > xen_start_kernel(void)
> >
> > /* Install X
On Tue, Feb 23, 2016 at 07:38:15PM +0200, Oleksii Kurochko wrote:
> Hello.
>
> Any updates?
>
> With best regards,
> Oleksii
>
> 2016-02-09 14:23 GMT+02:00 Oleksii Kurochko :
>
> > Hello.
> >
> > I want to use Mini-OS as Dom0.
> >
> > What should be done for this purpose?
> > Someone tried to
On Tue, Feb 23, 2016 at 10:24:50AM -0700, Jan Beulich wrote:
> >>> On 23.02.16 at 18:09, wrote:
> > On Tue, Feb 23, 2016 at 08:46:14AM -0700, Jan Beulich wrote:
> >> >>> On 23.02.16 at 15:31, wrote:
> >> > On Mon, Feb 22, 2016 at 04:28:19AM -0700, Jan Beulich wrote:
> >> >> >>> On 19.02.16 at 17:
flight 83634 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83634/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 3 host-install(3) broken REGR. vs. 83118
test-amd64-amd64-xl-qe
On 23/02/16 14:59, Jan Beulich wrote:
On 23.02.16 at 12:05, wrote:
>> --- a/xen/arch/x86/xstate.c
>> +++ b/xen/arch/x86/xstate.c
>> @@ -263,41 +263,24 @@ void xsave(struct vcpu *v, uint64_t mask)
>>
>> if ( word_size <= 0 || !is_pv_32bit_vcpu(v) )
>> {
>> -typeof(ptr->fpu_
Hello.
Any updates?
With best regards,
Oleksii
2016-02-09 14:23 GMT+02:00 Oleksii Kurochko :
> Hello.
>
> I want to use Mini-OS as Dom0.
>
> What should be done for this purpose?
> Someone tried to do something like that? Maybe there are some patches.
>
> With best regards,
> Oleksii
>
__
>>> On 23.02.16 at 18:24, wrote:
On 23.02.16 at 18:09, wrote:
>> On Tue, Feb 23, 2016 at 08:46:14AM -0700, Jan Beulich wrote:
>>> >>> On 23.02.16 at 15:31, wrote:
>>> > On Mon, Feb 22, 2016 at 04:28:19AM -0700, Jan Beulich wrote:
>>> >> >>> On 19.02.16 at 17:05, wrote:
>>> >> > On Wed, Feb
>>> On 23.02.16 at 18:09, wrote:
> On Tue, Feb 23, 2016 at 08:46:14AM -0700, Jan Beulich wrote:
>> >>> On 23.02.16 at 15:31, wrote:
>> > On Mon, Feb 22, 2016 at 04:28:19AM -0700, Jan Beulich wrote:
>> >> >>> On 19.02.16 at 17:05, wrote:
>> >> > On Wed, Feb 17, 2016 at 05:28:08PM +, Wei Liu w
On Tue, Feb 23, 2016 at 08:46:14AM -0700, Jan Beulich wrote:
> >>> On 23.02.16 at 15:31, wrote:
> > On Mon, Feb 22, 2016 at 04:28:19AM -0700, Jan Beulich wrote:
> >> >>> On 19.02.16 at 17:05, wrote:
> >> > On Wed, Feb 17, 2016 at 05:28:08PM +, Wei Liu wrote:
> >> >> Hi all
> >> >>
> >> >> To
On Fri, Feb 19, 2016 at 10:39 AM, Chunyan Liu wrote:
> Add pvusb APIs, including:
> - attach/detach (create/destroy) virtual usb controller.
> - attach/detach usb device
> - list usb controller and usb devices
> - some other helper functions
>
> Signed-off-by: Simon Cao
> Signed-off-by: George Du
... rather than at runtime.
The bootmaps are discarded in zap_low_mappings(), so the tables themselves can
live in .init.data and be reclaimed after boot.
Hooking the l1_identmap into l2_xenmap stays for safety, along with a longer
comment explaining why.
Signed-off-by: Andrew Cooper
---
CC: Ja
This balloons the size of Xen in memory from 4.4MB to 8MB, because of the
required alignment adjustments.
However
* All mappings are 2M superpages.
* .text (and .init at boot) are the only sections marked executable.
* .text and .rodata are marked read-only.
Signed-off-by: Andrew Cooper
---
C
In preparation for marking .text as read-only, care needs to be taken not to
fault while applying alternatives.
Swapping back to RW mappings is a possibility, but would require additional
TLB management. A temporary disabling of CR0.WP is cleaner.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulic
* Additional comments, including size and runtime use.
* Consistent use of idx, rather than a mix including pfn.
* Consistent use of .quad, rather than a mix including .long.
* Consistent use of PAGE_HYPERVISOR for addresses in the Xen global range,
which include _PAGE_GLOBAL.
No change in
>>> On 23.02.16 at 17:27, wrote:
> On 23/02/16 15:24, Jan Beulich wrote:
> On 23.02.16 at 12:05, wrote:
>>> @@ -292,17 +296,17 @@ void xsave(struct vcpu *v, uint64_t mask)
>>> asm volatile ( "fnstenv %0" : "=m" (fpu_env) );
>>> ptr->fpu_sse.fip.sel = fpu_env.fcs;
>>>
>>> On 23.02.16 at 09:34, wrote:
> +static void vmx_vcpu_block(struct vcpu *v)
> +{
> +unsigned long flags;
> +unsigned int dest;
> +spinlock_t *old_lock = pi_blocking_list_lock(v);
> +spinlock_t *pi_blocking_list_lock =
> &vmx_pi_blocking_list_lock(v->processor);
> +struct pi
And make use of NX and RO attributes wherever possible.
After this series, the pagetable layout looks like:
(XEN) *** Dumping Xen text/data/bss mappings from 82d08000
(XEN) cr3 000826484000, idle_pg_table 82d080818000, pa ac018000
(XEN) l2_xenmap: 82d080814000, pa
In preparation for using superpage mappings, .data and .bss will both want to
be mapped as read-write. By making them adjacent, they can share the same
superpage and will not require superpage alignment between themselves.
While making this change, fix an exposed alignment bug. __init_end only n
The entire contents of .lockprofile.data are unchanging pointers to
lock_profile structure in .data. Annotate the type as such, and link the
section in .rodata. As these are just pointers, there is no need for 32byte
alignment.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Ian Campbell
Because of the new 2M alignment of .init and .bss, the existing memory
guarding infrastructure causes a shattered 2M superpage with non-present
entries for .init, and present entries for the alignment space.
Do away with the difference in behaviour between debug and non-debug builds;
always destro
The use of MAP_SMALL_PAGES causes shattering of the superpages making up the
Xen virtual region, and is counter to the purpose of this series.
Furthermore, it is not required for the memguard infrastructure to function
(which itself uses map_pages_to_xen() for creating holes).
Signed-off-by: Andre
On 23/02/16 15:24, Jan Beulich wrote:
On 23.02.16 at 12:05, wrote:
>> @@ -292,17 +296,17 @@ void xsave(struct vcpu *v, uint64_t mask)
>> asm volatile ( "fnstenv %0" : "=m" (fpu_env) );
>> ptr->fpu_sse.fip.sel = fpu_env.fcs;
>> ptr->fpu_sse.fdp.sel = fpu_
On 23/02/16 16:17, Jan Beulich wrote:
On 10.02.16 at 11:09, wrote:
>> % Xen PV IOMMU interface
>> % Malcolm Crossley <>
>> Paul Durrant <>
>> % Draft D
>>
>> Introduction
>>
>>
>> Revision History
>>
>>
>> ---
>>> On 10.02.16 at 11:09, wrote:
> % Xen PV IOMMU interface
> % Malcolm Crossley <>
> Paul Durrant <>
> % Draft D
>
> Introduction
>
>
> Revision History
>
>
>
> Version Date Changes
>
>>> On 23.02.16 at 16:38, wrote:
> On 2/23/16 7:45 AM, Andrew Cooper wrote:
>> On 23/02/16 13:42, Andrew Cooper wrote:
>>> On 23/02/16 13:12, Doug Goldstein wrote:
This macro doesn't really provide a benefit. When support is added the
implementer can implement this how it needs to be and
>>> On 23.02.16 at 12:43, wrote:
>> On February 11, 2016 1:01am, Jan Beulich wrote:
>> >>> On 05.02.16 at 11:18, wrote:
>> > This patch checks all kinds of error and all the way up the call trees
>> > of VT-d Device-TLB flush(IOMMU part).
>> > @@ -171,7 +172,10 @@ void __hwdom_init iommu_hwdom_
>>> On 23.02.16 at 15:31, wrote:
> On Mon, Feb 22, 2016 at 04:28:19AM -0700, Jan Beulich wrote:
>> >>> On 19.02.16 at 17:05, wrote:
>> > On Wed, Feb 17, 2016 at 05:28:08PM +, Wei Liu wrote:
>> >> Hi all
>> >>
>> >> Tools people are in the process of splitting libxenctrl into a set of
>> >> s
On 2/23/16 7:45 AM, Andrew Cooper wrote:
> On 23/02/16 13:42, Andrew Cooper wrote:
>> On 23/02/16 13:12, Doug Goldstein wrote:
>>> This macro doesn't really provide a benefit. When support is added the
>>> implementer can implement this how it needs to be and not conform to the
>>> macro. Additiona
>>> On 23.02.16 at 15:16, wrote:
> On 02/23/2016 09:10 AM, Jan Beulich wrote:
> On 23.02.16 at 15:00, wrote:
>>> On 02/22/2016 09:04 PM, Haozhong Zhang wrote:
>>>
+if ( cpu_has_tsc_ratio )
+svm_function_table.tsc_scaling.ratio_frac_bits = 32;
+
>>>
>>> On 23.02.16 at 12:05, wrote:
> @@ -292,17 +296,17 @@ void xsave(struct vcpu *v, uint64_t mask)
> asm volatile ( "fnstenv %0" : "=m" (fpu_env) );
> ptr->fpu_sse.fip.sel = fpu_env.fcs;
> ptr->fpu_sse.fdp.sel = fpu_env.fds;
> -word_size = 4;
> +
>>> On 23.02.16 at 12:05, wrote:
> --- a/xen/arch/x86/xstate.c
> +++ b/xen/arch/x86/xstate.c
> @@ -263,41 +263,24 @@ void xsave(struct vcpu *v, uint64_t mask)
>
> if ( word_size <= 0 || !is_pv_32bit_vcpu(v) )
> {
> -typeof(ptr->fpu_sse.fip.sel) fcs = ptr->fpu_sse.fip.sel;
> -
On 2/23/2016 4:30 PM, Tamas K Lengyel wrote:
2) For Tamas: would it be ok if I put p2m_get_vcpu_altp2m_idx in
asm/altp2m.h and rename it to altp2m_vcpu_idx(v) (to obey
function-naming pattern in that file)?
Yes, that works.
Tamas
Thanks. Any thoughts on 3)?
Corneliu.
On Tue, 23 Feb 2016, Shannon Zhao wrote:
> On 2016/1/27 23:41, Stefano Stabellini wrote:
> > On Sat, 23 Jan 2016, Shannon Zhao wrote:
> >> From: Shannon Zhao
> >>
> >> There are two flags: PSCI_COMPLIANT and PSCI_USE_HVC. When set, the
> >> former signals to the OS that the hardware is PSCI compli
On Mon, Feb 22, 2016 at 04:28:19AM -0700, Jan Beulich wrote:
> >>> On 19.02.16 at 17:05, wrote:
> > On Wed, Feb 17, 2016 at 05:28:08PM +, Wei Liu wrote:
> >> Hi all
> >>
> >> Tools people are in the process of splitting libxenctrl into a set of
> >> stable libraries. One of the proposed libra
>
> 2) For Tamas: would it be ok if I put p2m_get_vcpu_altp2m_idx in
> asm/altp2m.h and rename it to altp2m_vcpu_idx(v) (to obey function-naming
> pattern in that file)?
>
Yes, that works.
Tamas
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://
>
> >
> > Great, that settles arch_hvm_event_fill_regs -> vm_event_fill_regs.
> > Should I then do the same for arch_monitor_get_capabilities (->
> > vm_event_monitor_get_capabilities)?
>
> Sounds good to me, so yes, unless Tamas or Jan think otherwise.
>
SGTM too.
Tamas
_
On 02/23/2016 09:10 AM, Jan Beulich wrote:
On 23.02.16 at 15:00, wrote:
On 02/22/2016 09:04 PM, Haozhong Zhang wrote:
+if ( cpu_has_tsc_ratio )
+svm_function_table.tsc_scaling.ratio_frac_bits = 32;
+
+#define hvm_tsc_scaling_supported \
+(!!hvm_funcs.tsc_scaling.rat
Hi Ian
On 23 February 2016 at 18:00, Ian Campbell wrote:
> On Mon, 2016-02-22 at 17:29 +0800, Fu Wei wrote:
>> Hi Julien,
>>
>> On 20 February 2016 at 00:28, Julien Grall
>> wrote:
>> > Xen is currently crashing because of malformed compatible property for
>> > the boot module. This is because t
On Tue, 23 Feb 2016, five wrote:
> setenv xen_bootargs 'sync_console console=dtuart dtuart=serial2'
> setenv dom0_bootargs 'console=hvc0,115200n8 earlyprintk=xen debug
> ignore_loglevel root=/dev/mmcblk0p2 rw
[...]
> (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to
>
>>> On 23.02.16 at 15:00, wrote:
> On 02/22/2016 09:04 PM, Haozhong Zhang wrote:
>
>>
>> +if ( cpu_has_tsc_ratio )
>> +svm_function_table.tsc_scaling.ratio_frac_bits = 32;
>> +
>
>
>>
>> +#define hvm_tsc_scaling_supported \
>> +(!!hvm_funcs.tsc_scaling.ratio_frac_bits)
>>
>>> On 23.02.16 at 12:54, wrote:
> On 23/02/16 11:18, Andrew Cooper wrote:
>> On 23/02/16 11:05, David Vrabel wrote:
>>> The hardware may not write the FIP/FDP fields with a XSAVE*
>>> instruction. e.g., with XSAVEOPT/XSAVES if the state hasn't changed
>>> or on AMD CPUs when a floating point exc
On 02/22/2016 09:04 PM, Haozhong Zhang wrote:
+if ( cpu_has_tsc_ratio )
+svm_function_table.tsc_scaling.ratio_frac_bits = 32;
+
+#define hvm_tsc_scaling_supported \
+(!!hvm_funcs.tsc_scaling.ratio_frac_bits)
+
What is the difference (in usage) between cpu_has_tsc_rati
On 23/02/16 13:42, Andrew Cooper wrote:
> On 23/02/16 13:12, Doug Goldstein wrote:
>> This macro doesn't really provide a benefit. When support is added the
>> implementer can implement this how it needs to be and not conform to the
>> macro. Additionally this change limits the output of the warnin
On 23/02/16 13:12, Doug Goldstein wrote:
> This macro doesn't really provide a benefit. When support is added the
> implementer can implement this how it needs to be and not conform to the
> macro. Additionally this change limits the output of the warning to just
> once instead of nrpages worth. Wh
flight 83624 qemu-upstream-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83624/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 82482
test-amd64-i386-
This macro doesn't really provide a benefit. When support is added the
implementer can implement this how it needs to be and not conform to the
macro. Additionally this change limits the output of the warning to just
once instead of nrpages worth. While editing this area I dropped
trailing whitespa
On 08/02/16 13:19, Dario Faggioli wrote:
> In fact, they look rather useless: they are never
> referenced neither directly, nor via the sched_data
> pointer, as a dynamic copy that overrides them is
> allocated as the very first step of a scheduler's
> initialization.
>
> While there, take the cha
On 2016/1/27 23:41, Stefano Stabellini wrote:
> On Sat, 23 Jan 2016, Shannon Zhao wrote:
>> From: Shannon Zhao
>>
>> There are two flags: PSCI_COMPLIANT and PSCI_USE_HVC. When set, the
>> former signals to the OS that the hardware is PSCI compliant. The latter
>> selects the appropriate conduit
Hi Akanksha,
Jesus is teaching today.
But having chatted to some people on #metrics-grimoire the first step is to set
up an environment and play with it. To do so, you will need
kibana and elasticsearch - packages for these should be in any distro and can
be installed via apt-get or yum
The t
On 02/23/2016 08:09 AM, Jan Beulich wrote:
On 22.02.16 at 22:14, wrote:
>
> (Please trim you replies.)
>
>> Ping: Or would you prefer resubmitting with the comments so far?
>
> Either way is fine. It's on my list of thing to look at, but being RFC
> it ranges priority wise behind various
On 23/02/16 07:24, Luis R. Rodriguez wrote:
> --- a/arch/x86/xen/enlighten.c
> +++ b/arch/x86/xen/enlighten.c
[...]
> @@ -1526,8 +1525,6 @@ asmlinkage __visible void __init xen_start_kernel(void)
>
> /* Install Xen paravirt ops */
> pv_info = xen_info;
> - if (xen_initial_domain()
On 23/02/16 11:18, Andrew Cooper wrote:
> On 23/02/16 11:05, David Vrabel wrote:
>> The hardware may not write the FIP/FDP fields with a XSAVE*
>> instruction. e.g., with XSAVEOPT/XSAVES if the state hasn't changed
>> or on AMD CPUs when a floating point exception is not pending. We
>> need to id
On 23/02/16 11:10, Andrew Cooper wrote:
> On 23/02/16 11:05, David Vrabel wrote:
>> @@ -653,6 +657,12 @@ int arch_domain_create(struct domain *d, unsigned int
>> domcr_flags,
>> /* PV/PVH guests get an emulated PIT too for video BIOSes to use. */
>> pit_init(d, cpu_khz);
>>
>> +/*
On Fri, Feb 19, 2016 at 9:51 AM, Huaitong Han wrote:
> Protection keys define a new 4-bit protection key field(PKEY) in bits 62:59 of
> leaf entries of the page tables.
>
> PKRU register defines 32 bits, there are 16 domains and 2 attribute bits per
> domain in pkru, for each i (0 ≤ i ≤ 15), PKRU[
1 - 100 of 161 matches
Mail list logo