On 10/10/16 14:16, Eric Blake wrote:
> On 10/09/2016 07:34 PM, Haozhong Zhang wrote:
> > Xen uses this command to get the backend resource, guest SPA and size of
> > NVDIMM devices so as to map them to guest.
> >
> > Signed-off-by: Haozhong Zhang
> > ---
> > Cc: Markus Armbruster
>
> > +++ b/do
On 10/10/16 17:43, Andrew Cooper wrote:
> On 10/10/16 01:35, Haozhong Zhang wrote:
> > Overview
> >
> > This RFC kernel patch series along with corresponding patch series of
> > Xen, QEMU and ndctl implements Xen vNVDIMM, which can map the host
> > NVDIMM devices to Xen HVM domU as vNVDIMM
Hi there,
I am trying to install and boot xen. I followed the following procedure. There
was no errors while installation. But when I select the grub entry it hangs.
The following is the steps I followed.
yum -y install centos-release-xen
yum --enablerepo=centos-virt-xen -y update kernel
yum -
Hi there,
Platform - Intel
CPU - Skylake
I am trying to install and boot xen. I followed the following procedure. There
was no errors while installation. But when I select the grub entry it hangs.
The following is the steps I followed.
yum -y install centos-release-xen
yum --enablerepo=cento
On Mon, Oct 10, 2016 at 06:16:41AM -0600, Jan Beulich wrote:
> >>> On 09.10.16 at 10:20, wrote:
> > Changes in v7:
> > * bugfix: fix the bug that this patch doesn't work on machine without SMAP.
> > * test: This patch has not been tested (on 32-bit PV environment).
> > Really sorry for tha
On 16-10-10 01:34:47, Jan Beulich wrote:
> >>> On 09.10.16 at 08:43, wrote:
> > On 16-09-30 17:18:33, Konrad Rzeszutek Wilk wrote:
> >> On Thu, Sep 22, 2016 at 10:15:20AM +0800, Yi Sun wrote:
> >> > Current psr.c is designed for supporting L3 CAT/CDP. It has many
> >> > limitations to add new feat
flight 101358 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101358/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail like 101328
test-amd64-i386-xl-qemuu-w
On 2016年10月06日 02:36, Konrad Rzeszutek Wilk wrote:
>>> 3.3 Interrupt remapping
>>> > > Interrupts from virtual devices and physical devices will be delivered
>>> > > to vlapic from vIOAPIC and vMSI. It needs to add interrupt remapping
>>> > > hooks in the vmsi_deliver() and ioapic_deliver() to find
On 2016年10月10日 21:55, Konrad Rzeszutek Wilk wrote:
> On Sat, Oct 08, 2016 at 11:26:44AM +0800, Lan Tianyu wrote:
>> On 2016年10月06日 20:52, Jan Beulich wrote:
>> On 30.09.16 at 04:19, wrote:
@@ -87,10 +89,10 @@ void handle_keypress(unsigned char key, struct
cpu_user_regs *regs)
We may hit the last ASSERT() in vmx_vcpu_block in the current code,
since vmx_vcpu_block() may get called before vmx_pi_switch_to()
has been installed or executed. Here We use cmpxchg to update
the NDST field, this can make sure we only update the NDST when
vmx_pi_switch_to() has not been called. S
We don't set the affinity for posted format IRTE, since the
destination of these interrupts is vCPU and the vCPU affinity
is set during vCPU scheduling.
Signed-off-by: Feng Wu
---
v5:
- Only suppress affinity related IRTE updates for PI
xen/drivers/passthrough/vtd/intremap.c | 52 ++
This patch handles some concern cases when the last assigned device
is removed from the domain. In this case we should carefully handle
pi descriptor and the per-cpu blocking list, to make sure:
- all the PI descriptor are in the right state when next time a
devices is assigned to the domain again.
We should remove the vCPU from the per-cpu blocking list
if it is going to be destroyed.
Signed-off-by: Feng Wu
---
v5:
- Use vmx_pi_list_remove() instead of vmx_pi_list_cleanup()
xen/arch/x86/hvm/vmx/vmx.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arc
Use type-safe structure assignment instead of memcpy()
Use sizeof(*iremap_entry)
Signed-off-by: Feng Wu
---
xen/drivers/passthrough/vtd/intremap.c | 17 +
1 file changed, 9 insertions(+), 8 deletions(-)
diff --git a/xen/drivers/passthrough/vtd/intremap.c
b/xen/drivers/passthrou
The current VT-d PI related code may operate incorrectly in the
following scenarios:
1. When the last assigned device is dettached from the domain, all
the PI related hooks are removed then, however, the vCPU can be
blocked, switched to another pCPU, etc, all without the aware of
PI. After the next
When cpu is offline, we need to move all the vcpus in its blocking
list to another online cpu, this patch handles it.
Signed-off-by: Feng Wu
---
v5:
- Add some comments to explain why it doesn't cause deadlock
for the ABBA deadlock scenario.
xen/arch/x86/hvm/vmx/vmcs.c | 1 +
xen/arch/x8
PI hooks: vmx_pi_switch_from() and vmx_pi_switch_to() are
needed even when any previously assigned device is detached
from the domain. Since 'SN' bit is also used to control the
CPU side PI and we change the state of SN bit in these two
functions, then evaluate this bit in vmx_deliver_posted_intr()
flight 101355 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101355/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 6 xen-boot fail REGR. vs. 101347
Regressions which
> >> How do you know? Judging just from current callers is - as said
> >> before - calling for trouble down the road. And the function clearly
> >> creates a brand new IRTE, which fully replaces the previous one.
> >
> > This function copy the old IRTE to 'new_ire' and it doesn't touch
> > fields l
flight 101359 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101359/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Hi Shannon:
I’m reporting that commit 38cd0664a6bf1c3b887992ea029d2bb516f52c59 is causing a
hang in the `xl create windows7` command on my skylake desktop. This is a
regression from previous behavior.
commit 38cd0664a6bf1c3b887992ea029d2bb516f52c59
Author: Shannon Zhao
Date: Wed Sep 28 18:19:
Yes you are right,
I was too focused on my issue that I didn't specify what I am trying to
achieve :)
My company current driver can work as normal PF pci device, and also we
support SR-IOV.
In driver initialization we can call sriov_configure to turn on SRIOV
and enable VFs.
To be able to run
Currently function p2m_restore_state() would clear HCR_VM bit, i.e.,
disabling stage2 translation, before updating VTTBR register. After
some research and talking to ARM support, I got confirmed that this is not
necessary. We are currently working on a new platform that would need this
to be remove
On 10/09/2016 07:34 PM, Haozhong Zhang wrote:
> Xen uses this command to get the backend resource, guest SPA and size of
> NVDIMM devices so as to map them to guest.
>
> Signed-off-by: Haozhong Zhang
> ---
> Cc: Markus Armbruster
> +++ b/docs/qmp-commands.txt
> @@ -3800,3 +3800,39 @@ Example fo
On Mon, 10 Oct 2016, Konrad Rzeszutek Wilk wrote:
> On Mon, Oct 10, 2016 at 01:28:16AM -0600, Jan Beulich wrote:
> > >>> On 07.10.16 at 19:57, wrote:
> > > On Wed, 21 Sep 2016, Konrad Rzeszutek Wilk wrote:
> > >> On Wed, Sep 21, 2016 at 10:04:21AM -0600, Jan Beulich wrote:
> > >> > >>> On 21.09.16
On Mon, Oct 10, 2016 at 01:28:16AM -0600, Jan Beulich wrote:
> >>> On 07.10.16 at 19:57, wrote:
> > On Wed, 21 Sep 2016, Konrad Rzeszutek Wilk wrote:
> >> On Wed, Sep 21, 2016 at 10:04:21AM -0600, Jan Beulich wrote:
> >> > >>> On 21.09.16 at 17:59, wrote:
> >> > > The fix can be done two ways:
>
and where have you applied that patch ? is it xen-4.8-rc1 ?
do I have to apply that patch ?
do I need to check out another tag ?
do I have to wait a week?
- On 10 Oct, 2016, at 16:33, Wei Liu wei.l...@citrix.com wrote:
> Sure. I will check ipxe mailing list in one week.
>
> Wei.
___
On 10/10/2016 12:33 PM, Wei Liu wrote:
> On Mon, Oct 10, 2016 at 04:51:13PM +0100, Ian Jackson wrote:
>> Wei Liu writes ("Re: [PATCH for-4.8] ipxe: update to newer commit"):
>>> On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Jackson wrote:
How did you choose 827dd1bfee67daa683935ce65316f7e0f057
flight 101353 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101353/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 6 xen-boot fail REGR. vs. 101328
test-armhf-armhf-
This run is configured for baseline tests only.
flight 67856 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67856/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 87c04781d5a7d13ba3cae87daedd52fe71280f3f
baseline v
Hi,
Your series failed automatic build test. Please find the testing commands and
their output below. If you have docker installed, you can probably reproduce it
locally.
Message-id: 20161010003423.4333-1-haozhong.zh...@intel.com
Subject: [Qemu-devel] [RFC QEMU PATCH 0/8] Implement vNVDIMM for Xe
On 10/10/16 01:35, Haozhong Zhang wrote:
> Overview
>
> This RFC kernel patch series along with corresponding patch series of
> Xen, QEMU and ndctl implements Xen vNVDIMM, which can map the host
> NVDIMM devices to Xen HVM domU as vNVDIMM devices.
>
> Xen hypervisor does not include an NVD
On Mon, Oct 10, 2016 at 04:51:13PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH for-4.8] ipxe: update to newer commit"):
> > On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Jackson wrote:
> > > How did you choose 827dd1bfee67daa683935ce65316f7e0f057fe1c ?
> >
> > That's the latest commit
flight 101356 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101356/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On Sun, Oct 9, 2016 at 11:32 PM, Haozhong Zhang
wrote:
> On 10/09/16 20:45, Dan Williams wrote:
>> On Sun, Oct 9, 2016 at 5:35 PM, Haozhong Zhang
>> wrote:
>> > Overview
>> >
>> > This RFC kernel patch series along with corresponding patch series of
>> > Xen, QEMU and ndctl implements X
Roger Pau Monne writes ("[PATCH v2 for-4.8] libelf: fix symtab/strtab loading
for 32bit domains"):
> Commit ed04ca introduced a bug in the symtab/strtab loading for 32bit
> guests, that corrupted the section headers array due to the padding
> introduced by the elf_shdr union.
>
> The Elf section
>>> On 27.09.16 at 17:57, wrote:
> --- a/xen/arch/x86/hvm/vmsi.c
> +++ b/xen/arch/x86/hvm/vmsi.c
> @@ -40,6 +40,7 @@
> #include
> #include
> #include
> +#include
>
> static void vmsi_inj_irq(
> struct vlapic *target,
> @@ -1162,3 +1163,500 @@ struct hvm_pt_handler_init hvm_pt_msi_in
Commit ed04ca introduced a bug in the symtab/strtab loading for 32bit
guests, that corrupted the section headers array due to the padding
introduced by the elf_shdr union.
The Elf section header array on 32bit should be accessible as an array of
Elf32_Shdr elements, and the union with Elf64_Shdr d
>>> On 10.10.16 at 17:47, wrote:
> Wei Liu writes ("[PATCH v2 0/9] Rework gcov support in Xen"):
>> Since the hypervisor interface is sysctl, we have the liberty to not
>> care about backward compatibility. This series completely rewrites the
>> gcov support inside Xen.
>
> I have looked at these
Wei Liu writes ("Re: [PATCH for-4.8] ipxe: update to newer commit"):
> On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Jackson wrote:
> > How did you choose 827dd1bfee67daa683935ce65316f7e0f057fe1c ?
>
> That's the latest commit -- since upstream wants us to always use the
> latest, I just picked th
Wei Liu writes ("[PATCH v2 0/9] Rework gcov support in Xen"):
> Since the hypervisor interface is sysctl, we have the liberty to not
> care about backward compatibility. This series completely rewrites the
> gcov support inside Xen.
I have looked at these patches. One of them seemed in my bailiwi
On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Jackson wrote:
> Wei Liu writes ("[PATCH for-4.8] ipxe: update to newer commit"):
> > The current commit in tree is rather old. It has come to a point that
> > cherry-picking commits from upstream isn't trivial anymore.
> >
> > There is long term plan
Wei Liu writes ("[PATCH v2 6/9] gcov: userspace tools to extract and split gcov
data"):
> Provide two tools: a small C program to extract data from hypervisor and
> a python script to split data into multiple files.
Acked-by: Ian Jackson
___
Xen-devel
Wei Liu writes ("[PATCH for-4.8] ipxe: update to newer commit"):
> The current commit in tree is rather old. It has come to a point that
> cherry-picking commits from upstream isn't trivial anymore.
>
> There is long term plan to track ipxe upstream, but for 4.8 release, we
> should just update ip
On 10/10/16 15:50, Jan Beulich wrote:
On 10.10.16 at 16:27, wrote:
>> On 10/10/16 15:21, Jan Beulich wrote:
>> On 27.09.16 at 17:57, wrote:
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -2793,7 +2793,7 @@ int p2m_add_foreign(struct domain *tdom, unsigned
>>> On 10.10.16 at 16:27, wrote:
> On 10/10/16 15:21, Jan Beulich wrote:
> On 27.09.16 at 17:57, wrote:
>>> --- a/xen/arch/x86/mm/p2m.c
>>> +++ b/xen/arch/x86/mm/p2m.c
>>> @@ -2793,7 +2793,7 @@ int p2m_add_foreign(struct domain *tdom, unsigned
>>> long fgfn,
>>> struct domain *fdom;
>>>
On Mon, Oct 10, 2016 at 02:11:58PM +0100, Wei Liu wrote:
[...]
> > > +
> > > +#include "gcov.h"
> > > +
> > > +/*
> > > + * __gcov_init is called by gcc-generated constructor code for each
> > > object
> > > + * file compiled with -fprofile-arcs.
> > > + *
> > > + * Although this function is calle
On 10/10/16 15:21, Jan Beulich wrote:
On 27.09.16 at 17:57, wrote:
>> --- a/xen/arch/x86/mm/p2m.c
>> +++ b/xen/arch/x86/mm/p2m.c
>> @@ -2793,7 +2793,7 @@ int p2m_add_foreign(struct domain *tdom, unsigned long
>> fgfn,
>> struct domain *fdom;
>>
>> ASSERT(tdom);
>> -if ( forei
>>> On 27.09.16 at 17:57, wrote:
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -2793,7 +2793,7 @@ int p2m_add_foreign(struct domain *tdom, unsigned long
> fgfn,
> struct domain *fdom;
>
> ASSERT(tdom);
> -if ( foreigndom == DOMID_SELF || !is_pvh_domain(tdom) )
>
>>> On 27.09.16 at 17:57, wrote:
> The current msixtbl intercepts only partially trap MSI-X accesses, but are
> not complete, there's missing logic in order to setup PIRQs and bind them to
> domains. Disable them for domains without at least an ioreq server (PVH).
So what if a server registers la
flight 101351 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101351/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 87c04781d5a7d13ba3cae87daedd52fe71280f3f
baseline version:
ovmf cf8140930ab23497f729b
On Mon, Oct 10, 2016 at 10:06:19AM -0400, Boris Ostrovsky wrote:
> On 10/10/2016 06:00 AM, Wei Liu wrote:
> > On Mon, Oct 10, 2016 at 10:36:04AM +0100, Juergen Schinker wrote:
> >> Ok then on Debian testing
> >>
> >> ii gcc-6 6.2.0-5
> >>
On 10/10/2016 06:00 AM, Wei Liu wrote:
> On Mon, Oct 10, 2016 at 10:36:04AM +0100, Juergen Schinker wrote:
>> Ok then on Debian testing
>>
>> ii gcc-6 6.2.0-5
>>amd64GNU C compiler
>>
> Right, I think I know why it didn't bui
>>> On 27.09.16 at 17:57, wrote:
> Add a new MMIO handler that traps accesses to PCIe regions, as discovered by
> Xen from the MCFG ACPI table. The handler used is the same as the one used
> for accesses to the IO PCI configuration space.
Both in the title and in the code you use PCIe when you re
On Sat, Oct 08, 2016 at 11:26:44AM +0800, Lan Tianyu wrote:
> On 2016年10月06日 20:52, Jan Beulich wrote:
> On 30.09.16 at 04:19, wrote:
> >> @@ -87,10 +89,10 @@ void handle_keypress(unsigned char key, struct
> >> cpu_user_regs *regs)
> >> if ( key >= ARRAY_SIZE(key_table) || !(h = &key_ta
On 04/08/16 16:16, David Vrabel wrote:
> Currently libxencall using mlocked buffers for hypercall buffers.
> This pages are subject to compaction and page migration. A userspace
> process may see a hypercall fail with -EFAULT if a page backing a
> hypercall buffer is in the process of being migrate
>>> On 27.09.16 at 17:57, wrote:
> --- a/xen/arch/x86/domain_build.c
> +++ b/xen/arch/x86/domain_build.c
> @@ -2378,6 +2378,25 @@ static int __init hvm_setup_acpi(struct domain *d)
> return 0;
> }
>
> +static int __init hvm_setup_pci(struct domain *d)
> +{
> +struct pci_dev *pdev;
> +
>>> On 27.09.16 at 17:57, wrote:
> This is done adding some Dom0 specific logic to the IO APIC emulation inside
> of Xen, so that writes to the IO APIC registers that should unmask an
> interrupt will take care of setting up this interrupt with Xen. A Dom0
> specific EIO handler also has to be use
On Mon, Oct 10, 2016 at 07:22:57AM -0600, Jan Beulich wrote:
> >>> On 10.10.16 at 15:18, wrote:
> > On Mon, Oct 10, 2016 at 06:00:03AM -0600, Jan Beulich wrote:
> >> >>> On 10.10.16 at 11:40, wrote:
> >> > It returns different string depending on compiler version.
> >> >
> >> > No user yet.
> >>
>>> On 10.10.16 at 15:18, wrote:
> On Mon, Oct 10, 2016 at 06:00:03AM -0600, Jan Beulich wrote:
>> >>> On 10.10.16 at 11:40, wrote:
>> > It returns different string depending on compiler version.
>> >
>> > No user yet.
>> >
>> > Signed-off-by: Wei Liu
>>
>> Acked-by: Jan Beulich
>> albeit I
On Mon, Oct 10, 2016 at 06:00:03AM -0600, Jan Beulich wrote:
> >>> On 10.10.16 at 11:40, wrote:
> > It returns different string depending on compiler version.
> >
> > No user yet.
> >
> > Signed-off-by: Wei Liu
>
> Acked-by: Jan Beulich
> albeit I wonder whether ...
>
> > --- a/Config.mk
> >
flight 101352 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101352/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On Mon, Oct 10, 2016 at 06:56:52AM -0600, Jan Beulich wrote:
> >>> On 10.10.16 at 14:23, wrote:
> > On 10/10/16 12:56, Jan Beulich wrote:
> > On 10.10.16 at 11:40, wrote:
> >>> +struct type_info {
> >>> +int ctr_type;
> >> Can this be negative?
> >
> > This code is largely imported strai
On Mon, Oct 10, 2016 at 05:56:35AM -0600, Jan Beulich wrote:
[...]
> Who is 9 (more similar ones below)?
>
> > +static int counter_active(const struct gcov_info *info, unsigned int type)
> > +{
> > +return info->merge[type] ? 1 : 0;
>
> Return type bool and preferably with !! instead of condi
>>> On 10.10.16 at 14:23, wrote:
> On 10/10/16 12:56, Jan Beulich wrote:
> On 10.10.16 at 11:40, wrote:
>>> +struct type_info {
>>> +int ctr_type;
>> Can this be negative?
>
> This code is largely imported straight from Linux. We should not
> needlessly deviate.
Hmm, in that case some
The current commit in tree is rather old. It has come to a point that
cherry-picking commits from upstream isn't trivial anymore.
There is long term plan to track ipxe upstream, but for 4.8 release, we
should just update ipxe to a newer commit (they are using rolling
release model now).
Forward-p
>>> On 27.09.16 at 17:57, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -632,6 +632,8 @@ int hvm_domain_initialise(struct domain *d)
> goto fail1;
> }
> memset(d->arch.hvm_domain.io_bitmap, ~0, HVM_IOBITMAP_SIZE);
> +INIT_LIST_HEAD
On 10/10/16 12:56, Jan Beulich wrote:
On 10.10.16 at 11:40, wrote:
>> +struct type_info {
>> +int ctr_type;
> Can this be negative?
This code is largely imported straight from Linux. We should not
needlessly deviate.
~Andrew
___
Xen-devel ma
>>> On 09.10.16 at 10:20, wrote:
> Changes in v7:
> * bugfix: fix the bug that this patch doesn't work on machine without SMAP.
> * test: This patch has not been tested (on 32-bit PV environment).
> Really sorry for that since I have took several days trying to
> setup a 32-bit PV
>>> On 10.10.16 at 11:40, wrote:
> And make it the default in Kconfig.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 10.10.16 at 11:40, wrote:
> It returns different string depending on compiler version.
>
> No user yet.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
albeit I wonder whether ...
> --- a/Config.mk
> +++ b/Config.mk
> @@ -128,6 +128,11 @@ define cc-ver-check-closure
> endif
> e
>>> On 10.10.16 at 11:40, wrote:
> ... so that we can do other comparisons as well.
>
> No functional change.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 10.10.16 at 11:40, wrote:
> +struct type_info {
> +int ctr_type;
Can this be negative?
> +unsigned int offset;
> +};
> +
> +/**
> + * struct gcov_iterator - specifies current file position in logical records
> + * @info: associated profiling data
> + * @record: record type
> + * @
>>> On 10.10.16 at 11:40, wrote:
> The internal data structure and code are tied to an old gcov format.
> It's easier to just redo everything from scratch.
>
> Salvage the reusable parts: leave xen/common/gcov and an empty Makefile
> there, leave gcov support in Kconfig but mark that as broken. A
>>> On 10.10.16 at 11:40, wrote:
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 10.10.16 at 11:40, wrote:
> Previously in d6be2cfc ("xen: make clear gcov support limitation in
> Kconfig") and db6c2264 ("xen: add a gcov Kconfig option"), space was
> used to indent Kconfig text. Change that to use tab instead.
>
> No functional change.
>
> Signed-off-by: Wei Liu
Revi
>>> On 10.10.16 at 11:40, wrote:
> Used to hide feature that is completely broken.
>
> Signed-off-by: Wei Liu
Reviewed-by: Jan Beulich
(in case it matters for this trivial a patch)
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xe
This run is configured for baseline tests only.
flight 67855 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67855/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boot
On October 10, 2016 5:40 PM, Jan Beulich < jbeul...@suse.com > wrote:
>> >>> On 20.09.16 at 15:30, wrote:
>> > --- a/xen/arch/x86/hvm/vlapic.c
>> > +++ b/xen/arch/x86/hvm/vlapic.c
>> > @@ -433,6 +433,12 @@ void vlapic_EOI_set(struct vlapic *vlapic)
>> > void vlapic_handle_EOI(s
The Xen docs specify several flags which a guest can set to advertize
which values of the xenstore control/shutdown key it will recognize.
This patch adds code to write all the relevant feature-flag keys.
Signed-off-by: Paul Durrant
Cc: Boris Ostrovsky
Cc: David Vrabel
Cc: Juergen Gross
---
v
Hi,
On 09/10/16 15:20, Vijay Kilari wrote:
> On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara
> wrote:
>> Create a new file to hold the emulation code for the ITS widget.
>> For now we emulate the memory mapped ITS registers and provide a stub
>> to introduce the ITS command handling framework (
> -Original Message-
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: 10 October 2016 11:16
> To: Paul Durrant ; linux-ker...@vger.kernel.org;
> xen-de...@lists.xenproject.org
> Cc: Boris Ostrovsky ; Juergen Gross
>
> Subject: Re: [PATCH v2] xenbus: advertize control feature f
On 10/10/16 10:43, Paul Durrant wrote:
> The Xen docs specify several flags which a guest can set to advertize
> which values of the xenstore control/shutdown key it will recognize.
> This patch adds code to write all the relevant feature-flag keys.
[...]
> static int setup_shutdown_watcher(void)
flight 67854 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67854/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-armhf-sid-netboot-pygrub 9 debian-di-install fail blocked in
67789
test-amd64-i3
On 10/10/16 11:43, Paul Durrant wrote:
> The Xen docs specify several flags which a guest can set to advertize
> which values of the xenstore control/shutdown key it will recognize.
> This patch adds code to write all the relevant feature-flag keys.
>
> Signed-off-by: Paul Durrant
> Cc: Boris Ost
On Mon, Oct 10, 2016 at 09:03:49AM +0200, Cedric Bosdonnat wrote:
> On Fri, 2016-10-07 at 15:09 +0100, Wei Liu wrote:
> > Instead of trying to change all the format strings I think it would be
> > better to have a new set of LOG macros that takes domid.
> >
> > Something like:
> > LOGEVD(ERROR,
On 10/10/16 11:04, Jan Beulich wrote:
> Following on from commits 5602e74c60 ("x86emul: correct loading of
> %ss") and bdb860d01c ("x86/HVM: correct segment register loading during
> task switch") the point of the non-.present checks needs to be refined:
> #NP (and its #SS companion), other than su
Following on from commits 5602e74c60 ("x86emul: correct loading of
%ss") and bdb860d01c ("x86/HVM: correct segment register loading during
task switch") the point of the non-.present checks needs to be refined:
#NP (and its #SS companion), other than suggested by the various
instruction pages in In
The Xen docs specify several flags which a guest can set to advertize
which values of the xenstore control/shutdown key it will recognize.
This patch adds code to write all the relevant feature-flag keys.
Signed-off-by: Paul Durrant
Cc: Boris Ostrovsky
Cc: David Vrabel
Cc: Juergen Gross
---
v
On Mon, Oct 10, 2016 at 10:36:04AM +0100, Juergen Schinker wrote:
> Ok then on Debian testing
>
> ii gcc-6 6.2.0-5
> amd64GNU C compiler
>
Right, I think I know why it didn't build for you.
We've got some medium to long te
flight 101347 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101347/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 16 guest-start.2 fail pass in 101339
Regressions which are regarded a
On Mon, Oct 10, 2016 at 09:30:53AM +0100, Paul Durrant wrote:
> From: Paul Durrant
>
> It is useful to be able to see the hash configuration when running tests.
> This patch adds a debugfs node for that purpose.
>
> The original version of this patch (commit c0c64c152389) was reverted due
> to b
It returns different string depending on compiler version.
No user yet.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
Config.mk | 5 +
1 file changed, 5 i
Previously in d6be2cfc ("xen: make clear gcov support limitation in
Kconfig") and db6c2264 ("xen: add a gcov Kconfig option"), space was
used to indent Kconfig text. Change that to use tab instead.
No functional change.
Signed-off-by: Wei Liu
---
v2: new
Would like to have this in 4.8
Cc: And
The internal data structure and code are tied to an old gcov format.
It's easier to just redo everything from scratch.
Salvage the reusable parts: leave xen/common/gcov and an empty Makefile
there, leave gcov support in Kconfig but mark that as broken. Also
reserve the sysctl number for later use
Used to hide feature that is completely broken.
Signed-off-by: Wei Liu
---
v2: use tab
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Cc: Doug Goldstein
---
xen/Kconfig | 3 +++
1 file chan
The original implementation of gcov support in Xen has several
limitations:
1. The internal data structures are tied to gcc 3.4 format.
2. The sysctl interface is tied to gcc 3.4 format.
3. The gcov type definition is wrong, doesn't work with 32 bit
hypervisor, which means arm32 wouldn't work.
Provide two tools: a small C program to extract data from hypervisor and
a python script to split data into multiple files.
The file xencov.c is salvaged and modified from the original xencov.c.
Signed-off-by: Wei Liu
---
v2: fix INSTALL_BIN typo
Cc: Ian Jackson
---
tools/misc/Makefile |
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
xen/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/Makefile b/xen/Makefile
index
... so that we can do other comparisons as well.
No functional change.
Signed-off-by: Wei Liu
---
v2: move dash into macro.
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
Config.mk | 8
1 - 100 of 125 matches
Mail list logo