On 3/22/2016 10:15 PM, George Dunlap wrote:
On 16/03/16 12:21, Yu Zhang wrote:
Previously p2m type p2m_mmio_write_dm was introduced for write-
protected memory pages whose write operations are supposed to be
forwarded to and emulated by an ioreq server. Yet limitations of
rangeset restricts th
Hi George,
Thanks a lot for your thorough review. :)
On 3/22/2016 7:31 PM, George Dunlap wrote:
On Wed, Mar 16, 2016 at 12:21 PM, Yu Zhang wrote:
For clarity this patch breaks the code to set/get memory types out
of do_hvm_op() into dedicated functions: hvmop_set/get_mem_type().
Also, for c
On Wed, Mar 23, 2016 at 10:02:24AM +0800, Shuai Ruan wrote:
> > > -/* Set XSTATE_BV and XCOMP_BV. */
> > > +/* Set XSTATE_BV. */
> > > xsave->xsave_hdr.xstate_bv = xstate_bv;
> > > -xsave->xsave_hdr.xcomp_bv = v->arch.xcr0_accum |
> > > XSTATE_COMPACTION_ENABLED;
> > > setu
On 22/03/16 18:02, Borislav Petkov wrote:
> On Wed, Mar 16, 2016 at 06:46:58PM -0600, Toshi Kani wrote:
>> Xen supports PAT without MTRR for its guests. In order to
>> enable WC attribute, it was necessary for xen_start_kernel()
>> to call pat_init_cache_modes() to update PAT table before
>> start
And nested xen.
CPU: AMD Opteron 2352
Outer configuration: Xen4CentOS 6 xen 4.6.1-2.el6, linux 3.18.25-18.el6.x86_64
Inner configuration: Xen4CentOS 6 xen 4.6.1-2.el6, linux 3.18.25-19.el6.x86_64
Inner xen command line: cpuinfo loglvl=all guest_loglvl=error
dom0_mem=512M,max:512M com1=115200,8n1
On Wed, Mar 23, 2016, 10:25 Mina Naghshnejad
wrote:
>
> ___You Only Live Once
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
>
___
Xen-devel mailing list
Xen-devel@lists.xe
On March 23, 2016 1:37pm, wrote:
> > From: Xu, Quan
> > Sent: Wednesday, March 23, 2016 11:30 AM
> >
> > >
> > > Yes, still inconsistent. As I said, you put invalidation sync within
> > > dev_invalidate_iotlb, while for all other IOMMU invalidations the
> > > sync is put after. Below would be cons
> From: Xu, Quan
> Sent: Wednesday, March 23, 2016 11:30 AM
>
> >
> > Yes, still inconsistent. As I said, you put invalidation sync within
> > dev_invalidate_iotlb, while for all other IOMMU invalidations the sync is
> > put
> > after. Below would be consistent then:
> >
> > if ( flush_de
-- Forwarded message --
From: Mina Naghshnejad
Date: Tue, Mar 22, 2016 at 2:36 PM
Subject: Re: Last minute submission for OUTREACHY!
To: Brenton Leanhardt
Great!
For "stages" class variable, "question", "action" types are already defined
elsewhere or should I define them? and a
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, Mar 23, 2016 at 09:28:03AM +0800, Shuai Ruan wrote:
> On Tue, Mar 22, 2016 at 04:53:02AM -0600, Jan Beulich wrote:
> > >>> On 16.03.16 at 13:12, wrote:
> >
> > Don't you need to use xcomp_bv here? That's what "Extended
> > Region of an XSAVE Area" in SDM Vol 1 suggests to me.
> >
> "OPER
On March 21, 2016 11:27am, Tian, Kevin wrote:
> > From: Xu, Quan
> > Sent: Friday, March 18, 2016 8:22 PM
> > > > static void queue_invalidate_iec(struct iommu *iommu, u8 granu,
> > > > u8 im, u16 iidx) {
> > > > unsigned long flags;
> > > > @@ -342,8 +393,6 @@ static int flush_iotlb_qi(
>
flight 86898 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86898/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 64451
build-i386-rumpuserxen
(( __ sorry, I was out of office on Mon./Tues. __))
On March 21, 2016 11:27am, Tian, Kevin wrote:
> > From: Xu, Quan
> > Sent: Friday, March 18, 2016 8:22 PM
> > > > static void queue_invalidate_iec(struct iommu *iommu, u8 granu,
> > > > u8 im, u16 iidx) {
> > > > unsigned long flags;
> >
On Tue, Mar 22, 2016 at 08:34:33AM -0600, Jan Beulich wrote:
> >>> On 18.03.16 at 04:01, wrote:
> > * Copy legacy XSAVE area, to avoid complications with CPUID
> > * leaves 0 and 1 in the loop below.
> > */
> > memcpy(xsave, src, FXSAVE_SIZE);
> >
> > -/* Set XSTATE_BV
On Tue, Mar 22, 2016 at 04:53:02AM -0600, Jan Beulich wrote:
> >>> On 16.03.16 at 13:12, wrote:
>
> Don't you need to use xcomp_bv here? That's what "Extended
> Region of an XSAVE Area" in SDM Vol 1 suggests to me.
>
"OPERATION OF XRSTORS" and "OPERATION OF XSAVES" in SDM Vol1.
For xsaves:
"Exe
On Fri, 2016-03-18 at 01:45 -0600, Jan Beulich wrote:
> >
> > > > On 18.03.16 at 05:09, wrote:
> > Great job! However, we still have 1 mile in the 100-mile journey.
> > :-D
> >
> > I applied the patch on staging and tried some test cases. One of
> > them
> > is as follows:
> >
> > I tried to cr
On 03/22/2016 05:21 PM, Julien Grall wrote:
> (CC some ARM folks)
>
> On 21/03/2016 23:18, Shanker Donthineni wrote:
>> Hi Julien,
>
> Hello Shanker,
>
> Sorry for the late answer.
>
>> Do you have any other comments to be addressed?
>
> I have a question regarding the implication for what you wr
(CC some ARM folks)
On 21/03/2016 23:18, Shanker Donthineni wrote:
Hi Julien,
Hello Shanker,
Sorry for the late answer.
Do you have any other comments to be addressed?
I have a question regarding the implication for what you wrote in the
commit.
As far as I understand, any speculative
On Tue, 2016-03-22 at 18:02 +0100, Borislav Petkov wrote:
> On Wed, Mar 16, 2016 at 06:46:59PM -0600, Toshi Kani wrote:
> > Update PAT documentation to describe how PAT is initialized under
> > various configurations.
> >
:
> >
> > +PAT Initialization
> > +--
> > +
> > +The foll
This run is configured for baseline tests only.
flight 44273 linux-3.4 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44273/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build
On Tue, 2016-03-22 at 18:01 +0100, Borislav Petkov wrote:
> Subject: [PATCH v2 4/6] x86/mtrr: Fix PAT init handling when MTRR MSR is
> disabled
>
> s/ MSR//
Will do.
> On Wed, Mar 16, 2016 at 06:46:57PM -0600, Toshi Kani wrote:
> > get_mtrr_state() calls pat_init() on BSP even if MTRR is disable
On Tue, 2016-03-22 at 18:00 +0100, Borislav Petkov wrote:
> On Wed, Mar 16, 2016 at 06:46:56PM -0600, Toshi Kani wrote:
> > A Xorg failure on qemu32 was reported as a regression caused
> > by 'commit 9cd25aac1f44 ("x86/mm/pat: Emulate PAT when it is
> > disabled")'. [1] This patch fixes the regres
On Fri, Mar 18, 2016 at 11:46:03AM -0500, Doug Goldstein wrote:
> The command line instructions for FLASK include a note on how to compile
> Xen with FLASK but the note was out of date after the change to Kconfig.
>
> Signed-off-by: Doug Goldstein
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> CC:
On Tue, Mar 22, 2016 at 07:36:58PM +, Wei Liu wrote:
> On Tue, Mar 22, 2016 at 12:00:24PM -0500, Doug Goldstein wrote:
> > The help message did not include information about the --type parameter.
> >
> > Signed-off-by: Doug Goldstein
> > ---
> > CC: Ian Jackson
> > CC: Stefano Stabellini
>
On 03/22/2016 04:46 PM, Firas Azar wrote:
Andrew:
Currently if we use pygrub --isconfig , there is a good chance
that this command could fail with an "out of memory" error. This can
happen especially if the image file in question is at least a few
gigabytes in size and the dom0_mem setting is
On Tue, 2016-03-22 at 17:59 +0100, Borislav Petkov wrote:
> On Wed, Mar 16, 2016 at 06:46:55PM -0600, Toshi Kani wrote:
> > In preparation to fix a regression caused by 'commit 9cd25aac1f44
> > ("x86/mm/pat: Emulate PAT when it is disabled")', PAT needs to
> > provide an interface that disables the
Andrew:
Currently if we use pygrub --isconfig , there is a good chance
that this command could fail with an "out of memory" error. This can
happen especially if the image file in question is at least a few
gigabytes in size and the dom0_mem setting is relatively small. So even
if any software
On 03/22/2016 04:02 PM, Jan Beulich wrote:
On 22.03.16 at 16:51, wrote:
>
>>
>> On 03/22/2016 12:46 PM, Jan Beulich wrote:
>> On 22.03.16 at 13:41, wrote:
>>>
On 03/18/2016 08:21 PM, Andrew Cooper wrote:
> On 17/03/16 16:12, Joao Martins wrote:
>> Introduce support f
On Tue, Mar 22, 2016 at 07:28:57PM +, Andrew Cooper wrote:
> On 22/03/16 18:57, Konrad Rzeszutek Wilk wrote:
> > --- a/xen/include/xsm/dummy.h
> > +++ b/xen/include/xsm/dummy.h
> > @@ -751,3 +751,22 @@ static XSM_INLINE int xsm_xen_version
> > (XSM_DEFAULT_ARG uint32_t op)
> >>
On 22/03/16 08:43, Jan Beulich wrote:
>
> Going through the HAP-only features, btw, revealed another
> possible dependency missing from patch 10: I would think that
> INVPCID depends on PCID.
And, as it turns out PCID on LM.
Attempting to set CR4.PCIDE while IA32_EFER.LMA = 0 is specified to
incu
On 22/03/16 20:06, Firas Azar wrote:
> The pygrub command option "isconfig" is broken and obsolete. This patch
> removes it since the alternate options "-l -n" provide the same functionality.
Broken how?
Are you sure that no existing software is using that option?
~Andrew
_
. snip..
> > +struct virtual_region kernel_text = {
>
> static
>
> > +.list = LIST_HEAD_INIT(kernel_text.list),
> > +.start = (unsigned long)_stext,
> > +.end = (unsigned long)_etext,
> > +#ifdef CONFIG_X86
> > +.ex = (struct exception_table_entry *)__start___ex_table,
> > +.e
The pygrub command option "isconfig" is broken and obsolete. This patch removes
it since the alternate options "-l -n" provide the same functionality.
Signed-off-by: Firas Azar
---
tools/pygrub/src/pygrub | 21 +
1 file changed, 5 insertions(+), 16 deletions(-)
diff --git a
On 03/15/2016 06:28 AM, Wei Liu wrote:
> On Mon, Mar 14, 2016 at 07:14:12PM -0600, Jim Fehlig wrote:
>> Opps, forgot to cc the tools maintainers, sorry. I can resend if needed.
>>
>> Regards,
>> Jim
>>
>> On 03/14/2016 07:08 PM, Jim Fehlig wrote:
>>> Commit 6ef823fd added '-nodefaults' to the qemu
On Tue, Mar 22, 2016 at 12:00:24PM -0500, Doug Goldstein wrote:
> The help message did not include information about the --type parameter.
>
> Signed-off-by: Doug Goldstein
> ---
> CC: Ian Jackson
> CC: Stefano Stabellini
> CC: Wei Liu
Acked-by: Wei Liu
_
Hi Shannon,
On 17/03/16 09:41, Shannon Zhao wrote:
From: Shannon Zhao
Add a new member in gic_hw_operations which is used to deny Dom0 access
to GIC regions.
Signed-off-by: Shannon Zhao
---
v6: use SZ_64K for GICv3 distributor
---
xen/arch/arm/gic-v2.c | 31
On 22/03/16 18:57, Konrad Rzeszutek Wilk wrote:
> --- a/xen/include/xsm/dummy.h
> +++ b/xen/include/xsm/dummy.h
> @@ -751,3 +751,22 @@ static XSM_INLINE int xsm_xen_version
> (XSM_DEFAULT_ARG uint32_t op)
> return xsm_default_action(XSM_PRIV, current->domain, NULL);
>>
On Tue, 22 Mar 2016, Borislav Petkov wrote:
> > +static void pat_keep_handoff_state(void)
>
> Static function, no need for "pat_" prefix. Also, no need for the
> kernel-doc comment.
I have to disagree. kernel-doc comments are not limited to global
functions.
I realy prefer kernel-doc style for s
Hi Shannon,
On 17/03/16 09:41, Shannon Zhao wrote:
From: Shannon Zhao
Interrupt information is described in DSDT and is not available at the
time of booting. Check if the interrupt is permitted to access and set
the interrupt type, route it to guest dynamically only for SPI
and Dom0.
Signed-o
> >> > --- a/xen/include/xsm/dummy.h
> >> > +++ b/xen/include/xsm/dummy.h
> >> > @@ -751,3 +751,22 @@ static XSM_INLINE int xsm_xen_version
> >> > (XSM_DEFAULT_ARG uint32_t op)
> >> > return xsm_default_action(XSM_PRIV, current->domain, NULL);
> >> > }
> >> > }
> >> > +
> >> > +stat
On 03/21/2016 05:29 PM, Boris Ostrovsky wrote:
On 03/15/2016 12:57 PM, Olaf Hering wrote:
On Tue, Mar 01, Boris Ostrovsky wrote:
on domU:
[root@dhcp-burlington7-2nd-B-east-10-152-55-140 ~]# od -N 1 -j 4096
/dev/mem
od: /dev/mem: read error: Bad address
001
[root@dhcp-burlington7-2nd-B-e
On 3/16/16 2:18 PM, Doug Goldstein wrote:
> Rather than have XSM_MAGIC set in the global xen/config.h and set in
> xsm.h if it's unset, just set it once in xsm.h since its only used in
> files that already include xsm.h
>
> Signed-off-by: Doug Goldstein
> ---
> CC: Daniel De Graaf
> ---
> xen/i
On Tue, 2016-03-22 at 17:57 +0100, Borislav Petkov wrote:
> $Subject is misleading - there's no non-default PAT MSR - the setting is
> non-default.
Right. Will change to "Add support of non-default PAT MSR setting at
handoff".
> On Wed, Mar 16, 2016 at 06:44:57PM -0600, Toshi Kani wrote:
> > In
Hi Shannon,
On 17/03/16 09:41, Shannon Zhao wrote:
From: Shannon Zhao
Permit access all Xen unused SPIs for Dom0 except the interrupts that
Xen uses.
You say exactly the same things with all "Xen unused SPIs for Dom0" and
"except the interrupts that Xen uses".
I would instead say:
"Allow
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.6-rc0-tag
xen: features and fixes for 4.6-rc0
- - Make earlyprintk=xen work for HVM guests.
- - Remove module support for things neve
On 03/22/2016 12:10 PM, Konrad Rzeszutek Wilk wrote:
On Mon, Mar 21, 2016 at 05:22:09AM -0600, Jan Beulich wrote:
On 18.03.16 at 18:26, wrote:
On Fri, Mar 18, 2016 at 05:55:55AM -0600, Jan Beulich wrote:
On 15.03.16 at 18:56, wrote:
@@ -223,12 +224,15 @@ void __init do_initcalls(void)
/*
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 22 March 2016 17:27
> To: Yu Zhang; xen-devel@lists.xen.org
> Cc: Keir (Xen.org); jbeul...@suse.com; Andrew Cooper; George Dunlap;
> jun.nakaj...@intel.com; Kevin Tian; Tim (Xen.org); Paul Durrant;
> zhiyua
On 03/15/2016 01:56 PM, Konrad Rzeszutek Wilk wrote:
This hypercall mirrors the XENVER_ in that it has similar functionality.
However it is designed differently:
- No compat layer. The data structures are the same size on 32
as on 64-bit.
- The hypercall accepts three arguments - the comm
On 03/15/2016 01:56 PM, Konrad Rzeszutek Wilk wrote:
All of XENVER_* have now an XSM check for their sub-ops.
The subop for XENVER_commandline is now a priviliged operation.
To not break guests we still return an string - but it is
just '\0'.
The rest: XENVER_[version|extraversion|capabilities|
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 22 March 2016 16:15
> To: Paul Durrant
> Cc: David Vrabel; Konrad Rzeszutek Wilk; Bob Liu; jgr...@suse.com; xen-
> de...@lists.xen.org; annie...@oracle.com; Roger Pau Monne
> Subject: RE: [Xen-devel] [RFC PA
Can you create a Diagram?
On Monday, March 21, 2016 7:26 AM, Jason Long wrote:
It is not a good diagram. Looking at my OS diagram.
For example, Xen have Dom0, DomU and
On Monday, March 21, 2016 6:34 AM, Andrew Cooper
wrote:
On 21/03/16 13:28, Jason Long wrote:
Don't top post.
> Than
On 16/03/16 12:22, Yu Zhang wrote:
> A new HVMOP - HVMOP_map_mem_type_to_ioreq_server, is added to
> let one ioreq server claim its responsibility for the handling
> of guest pages with p2m type p2m_ioreq_server. Users of this
> HVMOP can specify whether the p2m_ioreq_server is supposed to
> handle
.. snip..
> +static void* xsplice_map_rx(const mfn_t *mfn, unsigned int pages)
> +{
> +unsigned long cur;
> +unsigned long start, end;
> +
> +start = (unsigned long)avail_virt_start;
> +end = start + pages * PAGE_SIZE;
> +
> +ASSERT(find_space_fnc);
> +
> +if ( (find_space_f
On 22/03/16 14:46, Jan Beulich wrote:
On 22.03.16 at 14:48, wrote:
>>> @@ -300,9 +304,9 @@ static void xc_cpuid_config_xsave(xc_int
>>> {
>>> case 0:
>>> /* EAX: low 32bits of xfeature_enabled_mask */
>>> -regs[0] = info->xfeature_mask & 0x;
>>> +re
>>> On 22.03.16 at 16:57, wrote:
> On 21/03/16 16:23, Jan Beulich wrote:
> On 15.03.16 at 16:35, wrote:
>>> --- a/xen/arch/x86/cpu/common.c
>>> +++ b/xen/arch/x86/cpu/common.c
>>> @@ -36,6 +36,12 @@ integer_param("cpuid_mask_ext_ecx",
>>> opt_cpuid_mask_ext_ecx);
>>> unsigned int opt_cpuid_
On Wed, Mar 16, 2016 at 06:46:59PM -0600, Toshi Kani wrote:
> Update PAT documentation to describe how PAT is initialized under
> various configurations.
>
> Signed-off-by: Toshi Kani
> Cc: Borislav Petkov
> Cc: Luis R. Rodriguez
> Cc: Juergen Gross
> Cc: Ingo Molnar
> Cc: H. Peter Anvin
> C
On Wed, Mar 16, 2016 at 06:46:58PM -0600, Toshi Kani wrote:
> Xen supports PAT without MTRR for its guests. In order to
> enable WC attribute, it was necessary for xen_start_kernel()
> to call pat_init_cache_modes() to update PAT table before
> starting guest kernel.
>
> Now that the kernel initi
Subject: [PATCH v2 4/6] x86/mtrr: Fix PAT init handling when MTRR MSR is
disabled
s/ MSR//
On Wed, Mar 16, 2016 at 06:46:57PM -0600, Toshi Kani wrote:
> get_mtrr_state() calls pat_init() on BSP even if MTRR is disabled
> by its MSR.
s/by its MSR//
> This causes pat_init() to be called on BSP o
The help message did not include information about the --type parameter.
Signed-off-by: Doug Goldstein
---
CC: Ian Jackson
CC: Stefano Stabellini
CC: Wei Liu
---
tools/console/client/main.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/console/client/main.c b/tools/console/client/
On Wed, Mar 16, 2016 at 06:46:56PM -0600, Toshi Kani wrote:
> A Xorg failure on qemu32 was reported as a regression caused
> by 'commit 9cd25aac1f44 ("x86/mm/pat: Emulate PAT when it is
> disabled")'. [1] This patch fixes the regression.
I hope so.
> Negative effects of this regression were two
On Wed, Mar 16, 2016 at 06:46:55PM -0600, Toshi Kani wrote:
> In preparation to fix a regression caused by 'commit 9cd25aac1f44
> ("x86/mm/pat: Emulate PAT when it is disabled")', PAT needs to
> provide an interface that disables the OS to initialize PAT MSR.
prevents the O
i builded xen from the source
git clone git://xenbits.xen.org/xen.git
then i used linux as a dom0
git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
with ubuntu as file system
it worked successfully .. i get a shell but when i write sudo xl list --->
xl command not found
i'
On 21/03/16 17:06, Jan Beulich wrote:
On 15.03.16 at 16:35, wrote:
>> @@ -87,6 +88,129 @@ static void update_domain_cpuid_info(struct domain *d,
>> d->arch.x86_model = (ctl->eax >> 4) & 0xf;
>> if ( d->arch.x86 >= 0x6 )
>> d->arch.x86_model |= (ctl->eax >> 12) &
$Subject is misleading - there's no non-default PAT MSR - the setting is
non-default.
On Wed, Mar 16, 2016 at 06:44:57PM -0600, Toshi Kani wrote:
> In preparation to fix a regression caused by 'commit 9cd25aac1f44
> ("x86/mm/pat: Emulate PAT when it is disabled")', PAT needs to
> support a case th
>>> On 22.03.16 at 17:37, wrote:
> On 21/03/16 17:06, Jan Beulich wrote:
> On 15.03.16 at 16:35, wrote:
>>> +switch ( boot_cpu_data.x86_vendor )
>>> +{
>>> +case X86_VENDOR_INTEL:
>>> +mask &= ((uint64_t)edx << 32) | ecx;
>>> +
On Tue, Mar 22, 2016 at 04:14:40PM +, Ian Jackson wrote:
> Paul Durrant writes ("RE: [Xen-devel] [RFC PATCH] blkif.h: document
> scsi/0x12/0x83 node"):
> > It's getting hard to parse the thread at this point but, as I've
> > mentioned in a previous response in the thread, Windows basically
> >
On Tue, Mar 22, 2016 at 04:11:35PM +, Ian Jackson wrote:
> Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [RFC PATCH] blkif.h: document
> scsi/0x12/0x83 node"):
> > > I don't think this is a sterile academic conversation which would (if
> > > satisfactorily answered) have no real implications.
>>> On 22.03.16 at 16:27, wrote:
> On Tue, Mar 22, 2016 at 03:12:02PM +, Ian Jackson wrote:
>> David Vrabel writes ("Re: [Xen-devel] [RFC PATCH] blkif.h: document
> scsi/0x12/0x83 node"):
>> > On 22/03/16 14:10, Konrad Rzeszutek Wilk wrote:
>> > > Just think of it as a black box.
>> >
>> > T
Paul Durrant writes ("RE: [Xen-devel] [RFC PATCH] blkif.h: document
scsi/0x12/0x83 node"):
> It's getting hard to parse the thread at this point but, as I've
> mentioned in a previous response in the thread, Windows basically
> assumes disks are SCSI and it's up to the controller driver to make
>
Hi Shannon,
On 22/03/16 13:18, Shannon Zhao wrote:
On 2016年03月22日 08:42, Julien Grall wrote:
Hi Shannon,
On 17/03/2016 09:40, Shannon Zhao wrote:
From: Shannon Zhao
Map the UEFI and ACPI tables which we created to non-RAM space in Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Sta
Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [RFC PATCH] blkif.h: document
scsi/0x12/0x83 node"):
> > I don't think this is a sterile academic conversation which would (if
> > satisfactorily answered) have no real implications. Rather, if we
> > understood the use case properly, there would pro
On Mon, Mar 21, 2016 at 05:22:09AM -0600, Jan Beulich wrote:
> >>> On 18.03.16 at 18:26, wrote:
> > On Fri, Mar 18, 2016 at 05:55:55AM -0600, Jan Beulich wrote:
> >> >>> On 15.03.16 at 18:56, wrote:
> >> > @@ -223,12 +224,15 @@ void __init do_initcalls(void)
> >> > /*
> >> > * Simple hypercall
>>> On 22.03.16 at 16:01, wrote:
> On 22/03/16 14:52, Jan Beulich wrote:
> On 22.03.16 at 15:37, wrote:
>>> On 22/03/16 12:39, Jan Beulich wrote:
>>> On 22.03.16 at 12:23, wrote:
> On 18/03/16 17:09, Jan Beulich wrote:
> On 15.03.16 at 16:35, wrote:
>>> +static void __in
>>> On 22.03.16 at 16:52, wrote:
> On Mon, Mar 21, 2016 at 06:45:28AM -0600, Jan Beulich wrote:
>> >>> On 18.03.16 at 20:22, wrote:
>> > @@ -380,6 +388,133 @@ DO(xen_version)(int cmd,
>> > XEN_GUEST_HANDLE_PARAM(void) arg)
>> > return -ENOSYS;
>> > }
>> >
>> > +static const char *capabil
This run is configured for baseline tests only.
flight 44274 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44274/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop
On 21/03/16 16:23, Jan Beulich wrote:
On 15.03.16 at 16:35, wrote:
>> --- a/xen/arch/x86/cpu/common.c
>> +++ b/xen/arch/x86/cpu/common.c
>> @@ -36,6 +36,12 @@ integer_param("cpuid_mask_ext_ecx",
>> opt_cpuid_mask_ext_ecx);
>> unsigned int opt_cpuid_mask_ext_edx = ~0u;
>> integer_param("cpu
Hi Shannon,
On 22/03/16 13:16, Shannon Zhao wrote:
On 2016年03月22日 00:51, Julien Grall wrote:
+memory_map[offset].Attribute = EFI_MEMORY_WB;
+}
+
+for( i = 0; i < acpi_mem.nr_banks; i++, offset++ )
+{
+memory_map[offset].Type = EfiACPIReclaimMemory;
+memory_ma
>>> On 22.03.16 at 16:51, wrote:
>
> On 03/22/2016 12:46 PM, Jan Beulich wrote:
> On 22.03.16 at 13:41, wrote:
>>
>>>
>>> On 03/18/2016 08:21 PM, Andrew Cooper wrote:
On 17/03/16 16:12, Joao Martins wrote:
> Introduce support for using TSC as platform time which is the highest
>>>
Hi Shannon,
On 22/03/16 13:05, Shannon Zhao wrote:
On 2016年03月21日 23:52, Julien Grall wrote:
Title: to map/unmap
On 17/03/2016 09:40, Shannon Zhao wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 433952a..17be6ad 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/
>>> On 22.03.16 at 16:39, wrote:
> On Mon, Mar 21, 2016 at 06:49:03AM -0600, Jan Beulich wrote:
>> >>> On 18.03.16 at 20:59, wrote:
>> > I know I copied and pasted it and I must have done something uncanny.
>> >
>> > Anyhow this is what the change looks like now (I've retained the Reviewed
>> >
On Mon, Mar 21, 2016 at 06:45:28AM -0600, Jan Beulich wrote:
> >>> On 18.03.16 at 20:22, wrote:
> >> > + * return the number of bytes requested for the operation. Or an
> >> > + * negative value if an error is encountered.
> >> > + */
> >> > +
> >> > +typedef uint64_t xen_version_op_val_t;
> >> >
On 03/22/2016 12:46 PM, Jan Beulich wrote:
On 22.03.16 at 13:41, wrote:
>
>>
>> On 03/18/2016 08:21 PM, Andrew Cooper wrote:
>>> On 17/03/16 16:12, Joao Martins wrote:
Introduce support for using TSC as platform time which is the highest
resolution time and most performant to get
On 3/21/16 7:12 AM, sabiya kazi wrote:
> Hi Doug,
> Can you please help on questions/problems where I am stuck?
> Deadline for applying for outreachy is coming closer.
> Regards,
> Sabiya
>
> Hi Doug,
> I am done with building of xen source.Now, I have started looking
> at source files an
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 22 March 2016 15:09
> To: Paul Durrant
> Cc: David Vrabel; Konrad Rzeszutek Wilk; Bob Liu; jgr...@suse.com; xen-
> de...@lists.xen.org; annie...@oracle.com; Roger Pau Monne
> Subject: RE: [Xen-devel] [RFC PA
On Mon, Mar 21, 2016 at 06:49:03AM -0600, Jan Beulich wrote:
> >>> On 18.03.16 at 20:59, wrote:
> > I know I copied and pasted it and I must have done something uncanny.
> >
> > Anyhow this is what the change looks like now (I've retained the Reviewed
> > and Ack as I think this change is mostly
flight 86881 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/86881/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 60684
test-amd64
On 22/03/16 08:29, Juergen Gross wrote:
> This patch series is meant to be applied on top of Chunyan's series
> to support pvusb in libxl.
>
> It is adding support for an alternative pvusb backend "qusb" via qemu.
>
> Changes in V2:
> - patch 1: Return false if libxl__get_domid() fails as request
On 21/03/16 16:11, Jan Beulich wrote:
>
>> +/* OSXSAVE cleared by pv_featureset. Fast-forward CR4 back in. */
>> +if ( (is_pv_domain(currd) && guest_kernel_mode(curr, regs) &&
>> + (this_cpu(cr4) & X86_CR4_OSXSAVE)) ||
>> + (curr->arch.pv_vcpu.ctrlreg[4] &
On Tue, Mar 22, 2016 at 03:12:02PM +, Ian Jackson wrote:
> David Vrabel writes ("Re: [Xen-devel] [RFC PATCH] blkif.h: document
> scsi/0x12/0x83 node"):
> > On 22/03/16 14:10, Konrad Rzeszutek Wilk wrote:
> > > Just think of it as a black box.
> >
> > This isn't sufficient.
> >
> > You are pr
On 22/03/16 12:56, Jan Beulich wrote:
slot => slots in the subject.
> domain_cpuid() returns all zeroes anyway when not finding a match, so
> there's no need to explicitly store such a set of values.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
David Vrabel writes ("Re: [Xen-devel] [RFC PATCH] blkif.h: document
scsi/0x12/0x83 node"):
> On 22/03/16 14:10, Konrad Rzeszutek Wilk wrote:
> > Just think of it as a black box.
>
> This isn't sufficient.
>
> You are presenting a solution but have not properly described the
> problem so no one c
Paul Durrant writes ("RE: [Xen-devel] [RFC PATCH] blkif.h: document
scsi/0x12/0x83 node"):
> AFAIK XenServer still very much makes use of it.
Can you answer, for XenServer's use case, some of the questions that
David and I have asked ?
Ian.
___
Xen-de
On 22/03/16 14:52, Jan Beulich wrote:
On 22.03.16 at 15:37, wrote:
>> On 22/03/16 12:39, Jan Beulich wrote:
>> On 22.03.16 at 12:23, wrote:
On 18/03/16 17:09, Jan Beulich wrote:
On 15.03.16 at 16:35, wrote:
>> +static void __init calculate_hvm_featureset(void)
>> +
>>> On 22.03.16 at 15:37, wrote:
> On 22/03/16 12:39, Jan Beulich wrote:
> On 22.03.16 at 12:23, wrote:
>>> On 18/03/16 17:09, Jan Beulich wrote:
>>> On 15.03.16 at 16:35, wrote:
> +static void __init calculate_hvm_featureset(void)
> +{
> +unsigned int i;
> +const
On 22/03/16 12:39, Jan Beulich wrote:
On 22.03.16 at 12:23, wrote:
>> On 18/03/16 17:09, Jan Beulich wrote:
>> On 15.03.16 at 16:35, wrote:
+static void __init calculate_hvm_featureset(void)
+{
+unsigned int i;
+const uint32_t *hvm_featuremask;
+
+
>>> On 22.03.16 at 14:48, wrote:
>> @@ -300,9 +304,9 @@ static void xc_cpuid_config_xsave(xc_int
>> {
>> case 0:
>> /* EAX: low 32bits of xfeature_enabled_mask */
>> -regs[0] = info->xfeature_mask & 0x;
>> +regs[0] &= info->xfeature_mask;
>> /*
> -Original Message-
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: 22 March 2016 14:38
> To: Konrad Rzeszutek Wilk
> Cc: Bob Liu; Ian Jackson; jgr...@suse.com; xen-devel@lists.xen.org;
> annie...@oracle.com; Paul Durrant; Roger Pau Monne
> Subject: Re: [Xen-devel] [RFC PATCH
On 22/03/16 14:10, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 22, 2016 at 01:41:43PM +, David Vrabel wrote:
>> On 22/03/16 12:55, Bob Liu wrote:
>>>
>>> On 03/17/2016 07:12 PM, Ian Jackson wrote:
David Vrabel writes ("Re: [Xen-devel] [RFC PATCH] blkif.h: document
scsi/0x12/0x83 node"
>>> On 22.03.16 at 15:06, wrote:
> On 3/15/16 10:34 AM, Andrew Cooper wrote:
>> None of these features are interesting for Xen to use, or to be advertised
> to
>> guests. Doing so identifies further areas of code which can be removed now
>> that 32bit support has been dropped.
>>
>> IA64 has a
1 - 100 of 157 matches
Mail list logo