>>> On 28.02.17 at 19:45, wrote:
> On Tue, Feb 28, 2017 at 10:24:36AM -0700, Jan Beulich wrote:
>> >>> On 28.02.17 at 18:09, wrote:
>> > On Tue, Feb 28, 2017 at 09:14:24AM -0700, Jan Beulich wrote:
>> >> >>> On 28.02.17 at 17:08, wrote:
>> >> > On 28/02/17 16:03, Jan Beulich wrote:
>> >> > O
>>> On 01.03.17 at 01:01, wrote:
> On Tue, Feb 28, 2017 at 09:43:09AM -0700, Jan Beulich wrote:
> On 27.02.17 at 02:45, wrote:
>>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>>> +++ b/xen/arch/x86/hvm/vmx/vmx.c
>>> @@ -260,9 +260,15 @@ void vmx_pi_hooks_deassign(struct domain *d)
>>>
>>> ASSERT(
>>> On 01.03.17 at 04:23, wrote:
> On February 28, 2017 11:08 PM, Jan Beulich wrote:
> On 27.02.17 at 11:53, wrote:
>>> If guest is already in non-root mode, an posted interrupt will be
>>> directly delivered to guest (leaving softirq being set without
>>> actually incurring a VM-Exit - break
On 24/02/17 17:14, Vitaly Kuznetsov wrote:
> Get read of #ifdefs in suspend.c by splitting the code into
> suspend_pv.c and suspend_hvm.c.
>
> Signed-off-by: Vitaly Kuznetsov
Reviewed-by: Juergen Gross
Juergen
___
Xen-devel mailing list
Xen-devel@l
On 24/02/17 17:14, Vitaly Kuznetsov wrote:
> xen_pmu_init/finish() functions are used in suspend.c and
> enlighten.c, add stubs for now.
>
> Signed-off-by: Vitaly Kuznetsov
Reviewed-by: Juergen Gross
Juergen
___
Xen-devel mailing list
Xen-devel@lis
On Tue, Feb 28, 2017 at 09:43:09AM -0700, Jan Beulich wrote:
On 27.02.17 at 02:45, wrote:
>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>> +++ b/xen/arch/x86/hvm/vmx/vmx.c
>> @@ -260,9 +260,15 @@ void vmx_pi_hooks_deassign(struct domain *d)
>>
>> ASSERT(d->arch.hvm_domain.pi_ops.vcpu_block);
>>
On 17-02-28 15:25:39, Roger Pau Monn� wrote:
> On Wed, Feb 15, 2017 at 04:49:35PM +0800, Yi Sun wrote:
> > +static int l2_cat_compare_val(const uint64_t val[],
> > + const struct feat_node *feat,
> > + unsigned int cos, bool *found)
> > +{
>
On 17-02-28 15:15:36, Roger Pau Monn� wrote:
> On Wed, Feb 15, 2017 at 04:49:32PM +0800, Yi Sun wrote:
> > This patch implements the CPU init and free flow for L2 CAT including
> > L2 CAT initialization callback function.
> >
> > Signed-off-by: Yi Sun
> > ---
> > xen/arch/x86/psr.c| 72
On 24/02/17 17:14, Vitaly Kuznetsov wrote:
> These three files (mmu.c, p2m.c, setup.c) are mostly required to support
> PV guests, in fact p2m.c and setup.c have no code for PVHVM at all. mmu.c
> has some, split the file into mmu.c, mmu_pv.c and mmu_hvm.c.
>
> Some additional changes are required:
On 24/02/17 17:14, Vitaly Kuznetsov wrote:
> More or less mechanically split smp.c into 3 files. XEN_PV_SMP and
> XEN_PVHVM_SMP config options added to support the change.
>
> Signed-off-by: Vitaly Kuznetsov
Same as in patch 1: one patch with no functional changes and one with
the functional stu
On 17-02-28 13:58:55, Roger Pau Monn� wrote:
> > +static int find_cos(const uint64_t *val, uint32_t array_len,
> > +enum psr_feat_type feat_type,
> > +const struct psr_socket_info *info)
> > +{
> ASSERT(spin_is_locked(info->ref_lock));
> > +return -EN
On 24/02/17 17:14, Vitaly Kuznetsov wrote:
> Introduce CONFIG_XEN_PV config option and split enlighten.c into
> 4 files. Temporary add #ifdef CONFIG_XEN_PV to smp.c and mmu.c to
> not break the build and not make the patch even bigger.
>
> xen_cpu_up_prepare*/xen_cpu_die hooks require separation t
flight 106266 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106266/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 106237
test-amd64-amd64-xl-qemuu-
On 02/28/2017 10:51 PM, Andrew Cooper wrote:
On 28/02/17 19:50, Oleksandr Andrushchenko wrote:
Hi, all!
I have a use-case when I may need to call __vmap for kernel provided
IPAs (read MFNs)
which may not be PAGE_SIZE aligned etc.
The question is if it is safe to call __vmap multiple times for
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-xl-qemuu-winxpsp3-vcpus1
testid xen-boot
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git:/
On 17-02-28 12:44:34, Roger Pau Monn� wrote:
> On Wed, Feb 15, 2017 at 04:49:22PM +0800, Yi Sun wrote:
> > +static bool l3_cat_get_val(const struct feat_node *feat, unsigned int cos,
> > + enum cbm_type type, uint64_t *val)
> > +{
> > +if ( cos > feat->info.l3_cat_info
On 17-02-28 11:58:59, Roger Pau Monn� wrote:
> On Wed, Feb 15, 2017 at 04:49:18PM +0800, Yi Sun wrote:
> > To construct an extendible framework, we need analyze PSR features
> > and abstract the common things and feature specific things. Then,
> > encapsulate them into different data structures.
>
On 17-02-28 11:02:42, Roger Pau Monn� wrote:
> On Wed, Feb 15, 2017 at 04:49:15PM +0800, Yi Sun wrote:
> > Hi all,
> >
> > We plan to bring a new PSR (Platform Shared Resource) feature called
> > Intel L2 Cache Allocation Technology (L2 CAT) to Xen.
> >
> > Besides the L2 CAT implementaion, we re
flight 106270 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106270/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-amd64-xl-qemuu-
On February 28, 2017 11:08 PM, Jan Beulich wrote:
On 27.02.17 at 11:53, wrote:
>> If guest is already in non-root mode, an posted interrupt will be
>> directly delivered to guest (leaving softirq being set without
>> actually incurring a VM-Exit - breaking desired softirq behavior).
>
>This i
flight 106265 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106265/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
flight 106261 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106261/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs.
105933
test-amd64
flight 106263 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106263/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-qemut-winxpsp3 15 guest-localmigrate/x10 fail in 106051
REGR. vs. 105835
On Wed, Dec 7, 2016 at 8:29 PM, Dario Faggioli
wrote:
> % Heterogeneous Multi Processing Support in Xen
> % Revision 1
>
> \clearpage
>
> # Basics
>
>
> Status: **Design Document**
>
> Architecture(s): x86, arm
>
>Component(s): Hypervisor and
Hi Julien, Stefano, all
please add the big.LITTLE discussion to the agenda, as we're in the
process of cleaning up and sending a branch for initial comments. I'm
adding Thanasis Katsios in CC, the main contributor.
I might not be able to join the call, but Thanasis will be around.
cheers,
A.
On
> However, the pl011 ring is similar to the console ring. So maybe we should
> re-use the console header rather than re-inventing the wheel.
That would be an excellent approach.
>
> Cheers,
>
> --
> Julien Grall
___
Xen-devel mailing list
Xen-devel@l
On Mon, Feb 20, 2017 at 08:53:50PM +0530, Bhupinder Thakur wrote:
> Hi,
>
>
> On 17 February 2017 at 20:59, Konrad Rzeszutek Wilk
> wrote:
> >> Should vpl011.h be in include/xen/public/ ? If so you need
> >> a different license for that file.
> >>
> >> I have moved the file
Introduce new Xen command line parameter called "vwfi", which stands for
virtual wfi. The default is "trap": Xen traps guest wfi and wfe
instructions. In the case of wfi, Xen calls vcpu_block on the guest
vcpu; in the case of guest wfe, Xen calls vcpu_yield on the guest vcpu.
The behavior can be ch
On Tue, 28 Feb 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 22/02/17 17:29, Stefano Stabellini wrote:
> > Introduce new Xen command line parameter called "vwfi", which stands for
> > virtual wfi. The default is "trap": Xen traps the guest wfi instruction
> > and calls vcpu_block on the guest vcp
On 28/02/17 19:50, Oleksandr Andrushchenko wrote:
> Hi, all!
>
> I have a use-case when I may need to call __vmap for kernel provided
> IPAs (read MFNs)
>
> which may not be PAGE_SIZE aligned etc.
>
> The question is if it is safe to call __vmap multiple times for
> different IPAs
>
> sharing the s
flight 106273 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106273/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
Hi, all!
I have a use-case when I may need to call __vmap for kernel provided
IPAs (read MFNs)
which may not be PAGE_SIZE aligned etc.
The question is if it is safe to call __vmap multiple times for
different IPAs
sharing the same page (mfn), e.g. map something like 6ca00 0080 and
6ca00 0
On Tue, 28 Feb 2017, Oleksandr Andrushchenko wrote:
> On 02/28/2017 12:17 AM, Stefano Stabellini wrote:
> > On Mon, 27 Feb 2017, Oleksandr Andrushchenko wrote:
> > > On 02/23/2017 08:45 PM, Stefano Stabellini wrote:
> > > > On Thu, 23 Feb 2017, Oleksandr Andrushchenko wrote:
> > > > > Hi, Stefano!
On Tue, Feb 28, 2017 at 07:09:14PM +, Andrew Cooper wrote:
> On 28/02/17 19:01, Daniel Kiper wrote:
> > On Tue, Feb 28, 2017 at 05:58:26PM +, Andrew Cooper wrote:
> >> On 28/02/17 17:41, Daniel Kiper wrote:
> >>> On Tue, Feb 28, 2017 at 04:08:35PM +, Andrew Cooper wrote:
> On 28/02
From: Zhang Chen
We can call this qmp command to do checkpoint outside of qemu.
Xen colo will need this function.
Signed-off-by: Zhang Chen
Signed-off-by: Wen Congyang
Reviewed-by: Eric Blake
Signed-off-by: Stefano Stabellini
---
migration/colo.c | 23 +++
qapi-schema.js
t tags/xen-20170228-tag
for you to fetch changes up to daa33c52153df48ef0a7d06013f8ca6f24eff92f:
Add a new qmp command to do checkpoint, query xen replication status
(2017-02-28 11:02:12 -0800)
Xen
From: Zhang Chen
We can call this qmp command to start/stop replication outside of qemu.
Like Xen colo need this function.
Signed-off-by: Zhang Chen
Signed-off-by: Wen Congyang
Reviewed-by: Eric Blake
Reviewed-by: Stefano Stabellini
Reviewed-by: zhanghailiang
Signed-off-by: Stefano Stabelli
On 28/02/17 19:01, Daniel Kiper wrote:
> On Tue, Feb 28, 2017 at 05:58:26PM +, Andrew Cooper wrote:
>> On 28/02/17 17:41, Daniel Kiper wrote:
>>> On Tue, Feb 28, 2017 at 04:08:35PM +, Andrew Cooper wrote:
On 28/02/17 16:03, Jan Beulich wrote:
On 28.02.17 at 16:20, wrote:
On Tue, Feb 28, 2017 at 05:58:26PM +, Andrew Cooper wrote:
> On 28/02/17 17:41, Daniel Kiper wrote:
> > On Tue, Feb 28, 2017 at 04:08:35PM +, Andrew Cooper wrote:
> >> On 28/02/17 16:03, Jan Beulich wrote:
> >> On 28.02.17 at 16:20, wrote:
> Freeing part of the BSS back for genera
flight 106269 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106269/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 106258
Tests which
On Tue, Feb 28, 2017 at 10:24:36AM -0700, Jan Beulich wrote:
> >>> On 28.02.17 at 18:09, wrote:
> > On Tue, Feb 28, 2017 at 09:14:24AM -0700, Jan Beulich wrote:
> >> >>> On 28.02.17 at 17:08, wrote:
> >> > On 28/02/17 16:03, Jan Beulich wrote:
> >> > On 28.02.17 at 16:20, wrote:
> >> >>> Fre
On 27/02/17 17:20, Andre Przywara wrote:
Hi,
Hi Andre,
On 24/02/17 19:57, Shanker Donthineni wrote:
Hi Julien,
On 01/31/2017 10:18 AM, Julien Grall wrote:
On 31/01/17 16:02, Jaggi, Manish wrote:
On 1/31/2017 8:47 PM, Julien Grall wrote:
On 31/01/17 14:08, Jaggi, Manish wrote:
H
Hi Roger,
On Tue, Feb 28, 2017 at 09:20:05AM +, Roger Pau Monné wrote:
> Hello,
>
> It seems that your changes are causing issues when booting a 32bit Dom0, it
> seems there are several IOMMU faults that prevent Dom0 from booting at all.
> AFAICT this only happens when using a 32bit Dom0. The
QEMU XenServer/XenProject Working group meeting 10th February 2017
==
Attendance
--
Andrew Cooper
Ian Jackson
Paul Durrent
Jennifer Herbert
George Dunlap
Igor Druzhinin
Sergey Dyasli
First topic: DMop
-
Af
On 28/02/17 17:39, Roger Pau Monne wrote:
> This removal applies to both the hypervisor and the toolstack side of PVHv1.
>
>
>
> 40 files changed, 96 insertions(+), 696 deletions(-)
What a diffstat, and so many fixeme's fixed.
Reviewed-by: Andrew Cooper
___
On 28/02/17 17:41, Daniel Kiper wrote:
> On Tue, Feb 28, 2017 at 04:08:35PM +, Andrew Cooper wrote:
>> On 28/02/17 16:03, Jan Beulich wrote:
>> On 28.02.17 at 16:20, wrote:
Freeing part of the BSS back for general use proves to be problematic. It
is
not accounted for in xe
On Tue, Feb 28, 2017 at 05:44:51PM +, Ian Jackson wrote:
> Roger Pau Monne writes ("[PATCH v2 1/3] x86: remove PVHv1 code"):
> > This removal applies to both the hypervisor and the toolstack side of PVHv1.
> >
> > Note that on the toolstack side there's one hiccup: on xl the "pvh"
> > configur
On 02/28/2017 12:39 PM, Roger Pau Monne wrote:
> It is now useless since PVHv1 is removed and PVHv2 is a HVM domain from Xen's
> point of view.
>
> Signed-off-by: Roger Pau Monné
> Reviewed-by: Andrew Cooper
> Acked-by: Tim Deegan
> Reviewed-by: Kevin Tian
Reviewed-by: Boris Ostrovsky
_
On Tue, Feb 28, 2017 at 05:39:39PM +, Roger Pau Monne wrote:
> This removal applies to both the hypervisor and the toolstack side of PVHv1.
>
> Note that on the toolstack side there's one hiccup: on xl the "pvh"
> configuration option is translated to builder="hvm",
> device_model_version="non
Roger Pau Monne writes ("[PATCH v2 1/3] x86: remove PVHv1 code"):
> This removal applies to both the hypervisor and the toolstack side of PVHv1.
>
> Note that on the toolstack side there's one hiccup: on xl the "pvh"
> configuration option is translated to builder="hvm",
> device_model_version="no
On Tue, Feb 28, 2017 at 04:08:35PM +, Andrew Cooper wrote:
> On 28/02/17 16:03, Jan Beulich wrote:
> On 28.02.17 at 16:20, wrote:
> >> Freeing part of the BSS back for general use proves to be problematic. It
> >> is
> >> not accounted for in xen_in_range(), causing errors when construc
Roger Pau Monne writes ("[PATCH] xl: fix compilation of xl_migrate.c"):
> The usage of signal(3) requires the inclusion of the signal.h header:
>
> http://pubs.opengroup.org/onlinepubs/9699919799/functions/signal.html
>
> This fixes the build on FreeBSD.
Acked-by: Ian Jackson
_
This removal applies to both the hypervisor and the toolstack side of PVHv1.
Note that on the toolstack side there's one hiccup: on xl the "pvh"
configuration option is translated to builder="hvm",
device_model_version="none". This is done because otherwise xl would start
parsing PV like options,
This function is only used by PVHv2 domain build, so move it together with the
other PVH domain build functions.
Just code motion, no functional change.
Signed-off-by: Roger Pau Monné
Acked-by: Jan Beulich
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain_build.c | 134 ++
It is now useless since PVHv1 is removed and PVHv2 is a HVM domain from Xen's
point of view.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Tim Deegan
Reviewed-by: Kevin Tian
---
Cc: Christoph Egger
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Boris Ostrovsky
Cc: Suravee Suth
Hello,
This patch series removes the PVHv1 code, both from the hypervisor and the
tools, and also gets rid of the has_hvm_container_{domain/vcpu} macro, since
from Xen's point of view there are only two types of guests: PV or HVM.
Last patch is a minor code movement to have all the domain build P
On Tue, Feb 28, 2017 at 05:31:04PM +, Roger Pau Monne wrote:
> The usage of signal(3) requires the inclusion of the signal.h header:
>
> http://pubs.opengroup.org/onlinepubs/9699919799/functions/signal.html
>
> This fixes the build on FreeBSD.
>
> Signed-off-by: Roger Pau Monné
Acked + app
The usage of signal(3) requires the inclusion of the signal.h header:
http://pubs.opengroup.org/onlinepubs/9699919799/functions/signal.html
This fixes the build on FreeBSD.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: Wei Liu
---
tools/xl/xl_migrate.c | 1 +
1 file changed, 1 inser
>>> On 28.02.17 at 18:09, wrote:
> On Tue, Feb 28, 2017 at 09:14:24AM -0700, Jan Beulich wrote:
>> >>> On 28.02.17 at 17:08, wrote:
>> > On 28/02/17 16:03, Jan Beulich wrote:
>> > On 28.02.17 at 16:20, wrote:
>> >>> Freeing part of the BSS back for general use proves to be problematic.
>>
On Tue, Feb 28, 2017 at 09:14:24AM -0700, Jan Beulich wrote:
> >>> On 28.02.17 at 17:08, wrote:
> > On 28/02/17 16:03, Jan Beulich wrote:
> > On 28.02.17 at 16:20, wrote:
> >>> Freeing part of the BSS back for general use proves to be problematic. It
> > is
> >>> not accounted for in xen_in_
flight 106259 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106259/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-amd64-xl-qemuu-
>>> On 27.02.17 at 02:45, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -260,9 +260,15 @@ void vmx_pi_hooks_deassign(struct domain *d)
>
> ASSERT(d->arch.hvm_domain.pi_ops.vcpu_block);
>
> +/*
> + * Note that we don't set 'd->arch.hvm_domain.pi_
>>> On 27.02.17 at 02:45, wrote:
> That is to say, don't support a domain assigns a device to itself or detachs
> a device from itself.
>
> Signed-off-by: Chao Gao
Acked-by: Jan Beulich
albeit I would have wished for ...
> --- a/xen/drivers/passthrough/pci.c
> +++ b/xen/drivers/passthrough/pc
flight 106251 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106251/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 6 xen-boot fail like 105998
test-armhf-armhf-libvirt
>>> On 28.02.17 at 17:08, wrote:
> On 28/02/17 16:03, Jan Beulich wrote:
> On 28.02.17 at 16:20, wrote:
>>> Freeing part of the BSS back for general use proves to be problematic. It
> is
>>> not accounted for in xen_in_range(), causing errors when constructing the
>>> IOMMU tables, resultin
On 28/02/17 16:03, Jan Beulich wrote:
On 28.02.17 at 16:20, wrote:
>> Freeing part of the BSS back for general use proves to be problematic. It is
>> not accounted for in xen_in_range(), causing errors when constructing the
>> IOMMU tables, resulting in a failure to boot.
>>
>> Other smaller
>>> On 28.02.17 at 16:20, wrote:
> Freeing part of the BSS back for general use proves to be problematic. It is
> not accounted for in xen_in_range(), causing errors when constructing the
> IOMMU tables, resulting in a failure to boot.
>
> Other smaller issues are that tboot treats the entire BS
Hi Stefano,
On 27/02/17 23:14, Stefano Stabellini wrote:
The default dom0_mem is 128M which is not sufficient to boot a Ubuntu
based Dom0. It is not clear what a better default value could be.
Instead, loudly warn the user when dom0_mem is unspecified and wait 3
secs. Then use 512M.
Update the
On 17/02/17 10:11, Lars Kurth wrote:
> George,
>
> thanks for pulling this together.
>
>> On 14 Feb 2017, at 17:25, George Dunlap wrote:
>>
>> Here is version two, with minor revisions based on comments from version
>> 1. Please give any feedback by 28 February. Thanks!
>
> I think we may nee
>>> On 28.02.17 at 16:20, wrote:
> c/s b4cd59fe "x86: reorder .data and .init when linking" had an unintended
> side effect, where xen_in_range() and the tboot S3 MAC were no longer correct.
>
> In practice, it means that Xen's .data section is excluded from
> consideration,
> which means:
> 1)
Hi Stefano,
On 22/02/17 17:29, Stefano Stabellini wrote:
Introduce new Xen command line parameter called "vwfi", which stands for
virtual wfi. The default is "trap": Xen traps the guest wfi instruction
and calls vcpu_block on the guest vcpu. The behavior can be changed
setting vwfi to "native",
flight 106224 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106224/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
On Wed, Feb 15, 2017 at 04:49:35PM +0800, Yi Sun wrote:
> This patch implements L2 CAT set value related callback functions
> and domctl interface.
>
> Signed-off-by: Yi Sun
> ---
> v8:
> - modify 'l2_cat_write_msr' to 'void'.
> ---
> xen/arch/x86/domctl.c | 6 +++
> xen/arch/x86/
On 02/28/2017 02:36 PM, Razvan Cojocaru wrote:
> Hello,
>
> xc_domain_getinfo() gets us info->cpu_time, which, if I understand
> correctly, is the guest uptime.
>
> Is there an officially sanctioned way of retrieving the _exact_ guest
> start time? Obviously we can compute an approximation by doi
flight 106237 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106237/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 106216
test-amd64-amd64-xl-qemuu-
On Wed, Feb 15, 2017 at 04:49:34PM +0800, Yi Sun wrote:
> This patch implements L2 CAT get value callback function and
> interface in domctl.
>
> Signed-off-by: Yi Sun
> ---
> diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c
> index 05100b4..2adf62c 100644
> --- a/xen/arch/x86/psr.c
> +++ b/x
c/s b4cd59fe "x86: reorder .data and .init when linking" had an unintended
side effect, where xen_in_range() and the tboot S3 MAC were no longer correct.
In practice, it means that Xen's .data section is excluded from consideration,
which means:
1) Default IOMMU construction for the hardware doma
Freeing part of the BSS back for general use proves to be problematic. It is
not accounted for in xen_in_range(), causing errors when constructing the
IOMMU tables, resulting in a failure to boot.
Other smaller issues are that tboot treats the entire BSS as hypervisor data,
creating and checking
On Wed, Feb 15, 2017 at 04:49:33PM +0800, Yi Sun wrote:
> This patch implements get HW info flow for L2 CAT including L2 CAT callback
> function.
>
> Signed-off-by: Yi Sun
> ---
> xen/arch/x86/psr.c | 16
> xen/arch/x86/sysctl.c | 15 +++
> xen/include
On Wed, Feb 15, 2017 at 04:49:32PM +0800, Yi Sun wrote:
> This patch implements the CPU init and free flow for L2 CAT including
> L2 CAT initialization callback function.
>
> Signed-off-by: Yi Sun
> ---
> xen/arch/x86/psr.c| 72
> +++
> xen/in
>>> On 27.02.17 at 04:26, wrote:
> For a HVM domain, if a vcpu is in the nested guest mode,
> __raw_copy_to_guest(), __copy_to_guest() and __copy_field_to_guest()
> used by update_runstate_area() and update_secondary_system_time() will
> copy data to L2 guest rather than the L1 guest.
>
> This co
>>> On 27.02.17 at 04:26, wrote:
> The current implementation of nested VMX cannot work without HAP.
>
> Signed-off-by: Haozhong Zhang
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 27.02.17 at 06:09, wrote:
> The current production build works fine even though those ASSERT's are
> violated.
This - without any evidence - is rather weak an argument. Code
inspection, otoh, pretty clearly tells us the ASSERT()s aren't
needed, as there is no dependency on the asserted exp
Hi,
Thanks for the support. I think I solved the problem partially.
@Andrii
> So I guess you see the abort on access to a peripheral missing on r8a7796
> but described in a device tree for r8a7795.
>
You were right. I commented out &sata and &rcarsound nodes from the device
tree created for xen a
>>> On 27.02.17 at 11:53, wrote:
> If guest is already in non-root mode, an posted interrupt will
> be directly delivered to guest (leaving softirq being set without
> actually incurring a VM-Exit - breaking desired softirq behavior).
This is irritating - are you describing a problem you mean to
On Fri, Feb 24, 2017 at 02:25:27AM +, Wang, Hongbo wrote:
> Intel XenGT has another maillist " igv...@lists.01.org" to discuss Intel GPU
> virtualization questions, including XenGT and KVMGT. Feel free to subscribe.
>
> Right now, we have two version GVT-g, "old architecture" vs "new
> archite
On Wed, Feb 15, 2017 at 04:49:30PM +0800, Yi Sun wrote:
> This patch implements L3 CDP get value callback function.
>
> With this patch, 'psr-cat-show' can work for L3 CDP.
>
> Signed-off-by: Yi Sun
> ---
> xen/arch/x86/psr.c | 16
> 1 file changed, 16 insertions(+)
>
> diff -
On Wed, Feb 15, 2017 at 04:49:29PM +0800, Yi Sun wrote:
> This patch implements get HW info flow for CDP including L3 CDP callback
> function.
>
> It also changes sysctl function to make it work for CDP.
>
> With this patch, 'psr-hwinfo' can work for L3 CDP.
>
> Signed-off-by: Yi Sun
> ---
> x
On Wed, Feb 15, 2017 at 04:49:28PM +0800, Yi Sun wrote:
> This patch implements the CPU init and free flow for CDP including L3 CDP
> initialization callback function.
>
> Signed-off-by: Yi Sun
> ---
> xen/arch/x86/psr.c | 104
> +
> 1 file ch
On Tue, 2017-02-28 at 13:55 +, Andrew Cooper wrote:
> On 28/02/17 11:52, Dario Faggioli wrote:
> >
> > +static inline bool_t same_node(unsigned int cpua, unsigned int
> > cpub)
>
> s/bool_t/bool/g
>
Oh.. Yes, you're right. Sorry!
> > +
> > +if ( unlikely(tb_init_done) )
> > +{
> > +
flight 106220 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106220/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-qemut-winxpsp3 15 guest-localmigrate/x10 fail in 106051
REGR. vs. 105835
>>> On 28.02.17 at 14:47, wrote:
> On 28/02/17 13:27, Jan Beulich wrote:
>> This is only part of the necessary changes. Some needed to be
>> dropped due to code having changed recently, and the biggest
>> missing part is the adjustment of the insn emulator, when I'd
>> prefer to do this work only
On Wed, Feb 15, 2017 at 04:49:23PM +0800, Yi Sun wrote:
> As set value flow is the most complicated one in psr, it will be
> divided to some patches to make things clearer. This patch
> implements the set value framework to show a whole picture firstly.
>
> It also changes domctl interface to make
On 28/02/17 11:52, Dario Faggioli wrote:
> +static inline bool_t same_node(unsigned int cpua, unsigned int cpub)
s/bool_t/bool/g
>
> +
> +if ( unlikely(tb_init_done) )
> +{
> +struct {
> +unsigned rqi:16, max_weight:16;
More commonly known as uint16_t :)
~Andrew
___
flight 106258 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106258/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On 02/28/2017 08:38 AM, Jan Beulich wrote:
> Signed-off-by: Jan Beulich
Reviewed-by: Boris Ostrovsky
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 28/02/17 14:13, Ian Jackson wrote:
> Juergen Gross writes ("Re: [Xen-devel] [PATCH 1/4] interface: avoid
> redefinition of __XEN_INTERFACE_VERSION__"):
>> Hmm, maybe this is the problem: the value from the command line is
>> (textually) __XEN_LATEST_INTERFACE_VERSION__ while the value from the
On 11/02/17 00:14, Volodymyr Babchuk wrote:
Hello,
Hi Volodymyr,
This e-mail is sort of follow-up to the two threads: [1] (my thread
about TEE interaction) and [2] (Edgar's thread regarding handling SMC
calls in platform_hvc). I want to discuss more broad topic there.
Obviously, there are
On 28/02/17 13:27, Jan Beulich wrote:
> This is only part of the necessary changes. Some needed to be
> dropped due to code having changed recently, and the biggest
> missing part is the adjustment of the insn emulator, when I'd
> prefer to do this work only after the non-RFC parts of
> https://lis
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 28 February 2017 13:39
> To: xen-devel
> Cc: Andrew Cooper ; Paul Durrant
> ; George Dunlap
> Subject: [PATCH 5/8] x86/Viridian: switch away from temporary 32-bit
> register names
>
> Signed-off-by: Jan Beulich
1 - 100 of 186 matches
Mail list logo