Hi Konrad,
On 4 March 2017 at 01:32, Konrad Rzeszutek Wilk wrote:
> On Tue, Feb 21, 2017 at 04:55:59PM +0530, Bhupinder Thakur wrote:
>> Three new HVM param handlers added for:
>> - allocating a new VIRQ and return to the toolstack
>> - allocating a new event channel for sending/receiving
On 23/03/17 19:22, Stefano Stabellini wrote:
> On Thu, 23 Mar 2017, Paolo Bonzini wrote:
>> On 23/03/2017 14:55, Juergen Gross wrote:
>>> On 23/03/17 14:00, Greg Kurz wrote:
On Mon, 20 Mar 2017 11:19:05 -0700
Stefano Stabellini wrote:
> Do not use the ring.h header installed on
flight 106855 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106855/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-buildfail REGR. vs. 106829
Tests which did not suc
On 23/03/17 18:35, Andrew Cooper wrote:
> On 23/03/17 17:12, Tim Deegan wrote:
>> At 17:02 + on 23 Mar (1490288548), Andrew Cooper wrote:
>>> On 23/03/17 16:55, Tim Deegan wrote:
At 16:31 + on 16 Mar (1489681899), Andrew Cooper wrote:
> Some bits are unconditionally reserved in pag
Hi Julien,
On 2017/3/24 3:20, Julien Grall wrote:
> Hi Wei,
>
> Unless the current patch does not apply cleanly, it is not necessary to
> send a backport patch. Stefano will check-pick it from unstable when it
> has been merged and pass the testing.
>
Oh, thanks for the explanation. Now I know :)
Hi Julien,
On 2017/3/24 3:19, Julien Grall wrote:
> Hi Wei,
>
> NIT: title: please add a space between : and alternative.
>
Ok.
> On 23/03/17 09:43, Wei Chen wrote:
>> While I was using the alternative patching in the SErrors patch series [1].
>> I used a branch instruction as alternative instru
flight 106852 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106852/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 173bf5c847e3ca8b42c11796ce048d8e2e916ff8
baseline version:
ovmf 5920a9d16b1ab887c2858
flight 106846 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106846/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-libvirt-pair 3 host-install/src_host(3) broken pass in 106823
test-amd64-i386-qem
On Thu, 23 Mar 2017, Paul Durrant wrote:
> Commit 090fa1c8 "add support for unplugging NVMe disks..." extended the
> existing disk unplug flag to cover NVMe disks as well as IDE and SCSI.
>
> The recent thread on the xen-devel mailing list [1] has highlighted that
> this is not desirable behaviour
flight 106844 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106844/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl 11 guest-start fail in 106820 pass in 106844
test-amd64-amd64-xl-qemuu-deb
On Thu, 23 Mar 2017, Julien Grall wrote:
> Hi Wei,
>
> On 23/03/17 03:13, Wei Chen wrote:
> > On 2017/3/23 6:22, Stefano Stabellini wrote:
> > > On Wed, 22 Mar 2017, Julien Grall wrote:
> > > > Hi Wei,
> > > >
> > > > On 22/03/17 08:49, Wei Chen wrote:
> > > > > Hi Stefano,
> > > > >
> > > > > O
Add functions to libxl to setup a Xen 9pfs frontend/backend connection.
Add support to xl to parse a xen_9pfs option in the VM config file, in
the following format:
xen_9pfs=["tag=share_dir,security_model=none,path=/path/share_dir"]
where tag identifies the 9p share and it is required to mount it
On Thu, 23 Mar 2017, Stefano Stabellini wrote:
> CC'ing Jan
>
> On Tue, 21 Mar 2017, Stefano Stabellini wrote:
> > +static inline void name##_read_packet(const unsigned char *buf,
> >\
> > +RING_IDX masked_prod, RING_IDX *masked_cons,
> >\
> > +
flight 106842 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106842/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-xtf-amd64-amd64-3 3 host-install(3) broken in 106821 pass in 106842
test-amd64-i386-freebsd10-amd
On Tue, Nov 22, 2016 at 07:10:57AM +0100, Juergen Gross wrote:
> In order to have an easy way to add a new qdev with a specific id
> carve out the needed functionality from qdev_device_add() into a new
> function qdev_set_id().
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Stefano Stabellini
flight 106871 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106871/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12 mig
CC'ing Jan
On Tue, 21 Mar 2017, Stefano Stabellini wrote:
> +static inline void name##_read_packet(const unsigned char *buf,
> \
> +RING_IDX masked_prod, RING_IDX *masked_cons,
> \
> +RING_IDX ring_size, void *opaque, size_t size)
Hi,
I am reviewing the existing code that sets has_dynamic_sysbus,
and this patch confused me. I have a question below:
On Tue, Nov 22, 2016 at 07:10:58AM +0100, Juergen Gross wrote:
> Create a qdev plugged to the xen-sysbus for each new backend device.
> This device can be used as a parent for a
On 22/03/17 23:44, Stefano Stabellini wrote:
> On Thu, 16 Mar 2017, Andre Przywara wrote:
>> For the same reason that allocating a struct irq_desc for each
>> possible LPI is not an option, having a struct pending_irq for each LPI
>> is also not feasible. However we actually only need those when an
flight 106838 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106838/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-winxpsp3 6 xen-boot fail REGR. vs. 106806
test-amd64-i386-xl-q
Hi Andre,
On 16/03/17 11:20, Andre Przywara wrote:
The number of LPIs on a host can be potentially huge (millions),
although in practise will be mostly reasonable. So prematurely allocating
an array of struct irq_desc's for each LPI is not an option.
However Xen itself does not care about LPIs,
Hi Wei,
Unless the current patch does not apply cleanly, it is not necessary to
send a backport patch. Stefano will check-pick it from unstable when it
has been merged and pass the testing.
Cheers,
On 23/03/17 09:43, Wei Chen wrote:
While I was using the alternative patching in the SErrors
Hi Mark,
On Thu, Mar 23, 2017 at 06:54:52PM +, Mark Rutland wrote:
> Hi Daniel,
>
> On Thu, Mar 23, 2017 at 06:42:01PM +0100, Daniel Lezcano wrote:
> > In the next changes, we track the interrupts but we discard the timers as
> > that does not make sense. The next interrupt on a timer is pred
Hi Wei,
NIT: title: please add a space between : and alternative.
On 23/03/17 09:43, Wei Chen wrote:
While I was using the alternative patching in the SErrors patch series [1].
I used a branch instruction as alternative instruction.
ALTERNATIVE("nop",
"b skip_check"
Hi Wei,
On 23/03/17 03:13, Wei Chen wrote:
On 2017/3/23 6:22, Stefano Stabellini wrote:
On Wed, 22 Mar 2017, Julien Grall wrote:
Hi Wei,
On 22/03/17 08:49, Wei Chen wrote:
Hi Stefano,
On 2017/3/21 5:38, Stefano Stabellini wrote:
On Mon, 13 Mar 2017, Wei Chen wrote:
Currently, we masked th
flight 106840 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106840/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
105990
Tests whi
Hi Daniel,
On Thu, Mar 23, 2017 at 06:42:01PM +0100, Daniel Lezcano wrote:
> In the next changes, we track the interrupts but we discard the timers as
> that does not make sense. The next interrupt on a timer is predictable.
Sorry, but I could not parse this.
[...]
> diff --git a/drivers/perf/
On Thu, 23 Mar 2017, Wei Chen wrote:
> Hi Julien,
>
> On 2017/3/22 20:29, Julien Grall wrote:
> > Hi Wei,
> >
> > On 22/03/17 08:53, Wei Chen wrote:
> >> Hi Stefano,
> >>
> >> On 2017/3/21 5:46, Stefano Stabellini wrote:
> >>> On Mon, 13 Mar 2017, Wei Chen wrote:
> If there is a pending SErro
On 23/03/17 15:58, Jan Beulich wrote:
On 22.03.17 at 20:55, wrote:
--- a/xen/arch/x86/hvm/dm.c
+++ b/xen/arch/x86/hvm/dm.c
@@ -119,56 +119,89 @@ static int set_isa_irq_level(struct domain *d, uint8_t
--- a/xen/include/public/hvm/dm_op.h
+++ b/xen/include/public/hvm/dm_op.h
@@ -237,13 +237,2
9pfs maintainers,
The patch series is fully acked, except for the header import from Xen
(http://marc.info/?l=linux-kernel&m=149020945130417&w=2) which needs to
be acked in Xen first (this is corresponding Xen series:
http://marc.info/?l=xen-devel&m=149013482308654).
Once that happens, the series
On 03/23/2017 10:42 AM, Daniel Lezcano wrote:
> In the next changes, we track the interrupts but we discard the timers as
> that does not make sense. The next interrupt on a timer is predictable.
>
> But, the API request_percpu_irq does not allow to pass a flag, hence
> specifying
> if the interru
Hi,
On 23/03/17 18:01, Stefano Stabellini wrote:
> On Thu, 23 Mar 2017, Julien Grall wrote:
>> Hi Stefano,
>>
>> On 23/03/17 17:45, Stefano Stabellini wrote:
>>> On Thu, 23 Mar 2017, Julien Grall wrote:
> So as I mentioned before, I am happy to loose the Kconfig option, but
> then we need
On Thu, 23 Mar 2017, Wei Liu wrote:
> The code which used that field has been deleted. Found by code
> inspection.
>
> Signed-off-by: Wei Liu
Reviewed-by: Stefano Stabellini
> ---
> Cc: Stefano Stabellini
> Cc: Julien Grall
>
> Compile test only
> ---
> xen/include/asm-arm/mm.h | 6 --
PVH guest is actually an translated guest. It should be able to
manipulate page table for other domains when acting as Dom0.
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Roger Pau Monné
---
xen/arch/x86/mm.c | 6 --
1 file changed, 6 deletions(-)
diff --git a/xen/arch
On 23/03/17 18:06, Andre Przywara wrote:
Hi,
Hi Andre,
On 06/02/17 17:43, Julien Grall wrote:
Hi,
On 30/01/17 18:31, Andre Przywara wrote:
+int gicv3_its_init(struct host_its *hw_its)
+{
+uint64_t reg;
+int i;
+
+hw_its->its_base = ioremap_nocache(hw_its->addr, hw_its->size);
You are still using HTML emails
On Thu, 23 Mar 2017, Luca Miccio wrote:
>
> Il giorno 23 mar 2017, alle ore 01:55, Stefano Stabellini
> ha scritto:
>
> On Thu, 23 Mar 2017, Luca Miccio wrote:
> Il giorno 23 mar 2017, alle ore 01:27, Stefano Stabellini
> ha scritto:
>
>
Hi,
On 06/02/17 17:43, Julien Grall wrote:
> Hi,
>
> On 30/01/17 18:31, Andre Przywara wrote:
>> +int gicv3_its_init(struct host_its *hw_its)
>> +{
>> +uint64_t reg;
>> +int i;
>> +
>> +hw_its->its_base = ioremap_nocache(hw_its->addr, hw_its->size);
>> +if ( !hw_its->its_base )
>>
Hello Julien
> Il giorno 23 mar 2017, alle ore 15:49, Julien Grall ha
> scritto:
>
> Hello Luca,
>
> On 23/03/17 02:23, Luca Miccio wrote:
>> I tried also this method but i had the same error. So i came up with the
>> idea of removing the
>> psci method from the configure and also from the dtsi
flight 106869 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106869/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On Thu, 23 Mar 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 23/03/17 17:45, Stefano Stabellini wrote:
> > On Thu, 23 Mar 2017, Julien Grall wrote:
> > > > So as I mentioned before, I am happy to loose the Kconfig option, but
> > > > then we need some sensible default value. In our case we could
On Thu, 23 Mar 2017, Andre Przywara wrote:
> Hi,
>
> On 22/03/17 23:38, Stefano Stabellini wrote:
> > On Thu, 16 Mar 2017, Andre Przywara wrote:
> >> The number of LPIs on a host can be potentially huge (millions),
> >> although in practise will be mostly reasonable. So prematurely allocating
> >>
Hi Stefano,
On 23/03/17 17:45, Stefano Stabellini wrote:
On Thu, 23 Mar 2017, Julien Grall wrote:
So as I mentioned before, I am happy to loose the Kconfig option, but
then we need some sensible default value. In our case we could be cheeky
here for now and just use the Linux value, because a L
On 23/03/17 10:50, Andre Przywara wrote:
Hi,
Hi Andre,
On 21/03/17 23:27, Stefano Stabellini wrote:
On Tue, 21 Mar 2017, André Przywara wrote:
On 21/03/17 22:57, Stefano Stabellini wrote:
On Thu, 16 Mar 2017, Andre Przywara wrote:
The ARM GICv3 provides a new kind of interrupt called LP
On 23/03/17 17:09, Tim Deegan wrote:
> At 16:31 + on 16 Mar (1489681902), Andrew Cooper wrote:
>> --- a/xen/arch/x86/mm/guest_walk.c
>> +++ b/xen/arch/x86/mm/guest_walk.c
>> @@ -32,24 +32,28 @@ asm(".file \"" __OBJECT_FILE__ "\"");
>> #include
>> #include
>>
>> -/* Modify a guest pagetabl
On Thu, 23 Mar 2017, Julien Grall wrote:
> On 23/03/17 14:40, Andre Przywara wrote:
> > Hi,
>
> Hi Andre,
>
> >
> > On 21/03/17 21:23, Julien Grall wrote:
> > > Hi Andre,
> > >
> > > On 03/16/2017 11:20 AM, Andre Przywara wrote:
> > > > diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
>
On 23/03/17 14:40, Andre Przywara wrote:
Hi,
Hi Andre,
On 21/03/17 21:23, Julien Grall wrote:
Hi Andre,
On 03/16/2017 11:20 AM, Andre Przywara wrote:
diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index bf64c61..86f7b53 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kcon
In the next changes, we track the interrupts but we discard the timers as
that does not make sense. The next interrupt on a timer is predictable.
But, the API request_percpu_irq does not allow to pass a flag, hence specifying
if the interrupt type is a timer.
Solve this by passing a 'flags' param
On 23/03/17 17:12, Tim Deegan wrote:
> At 17:02 + on 23 Mar (1490288548), Andrew Cooper wrote:
>> On 23/03/17 16:55, Tim Deegan wrote:
>>> At 16:31 + on 16 Mar (1489681899), Andrew Cooper wrote:
Some bits are unconditionally reserved in pagetable entries, or reserved
because of al
On 20/03/17 13:59, Jan Beulich wrote:
On 20.03.17 at 14:36, wrote:
>> On 20/03/17 08:45, Jan Beulich wrote:
>>> Also I'm still not really happy with the guest_supports_ prefixes
>>> for this and its L2 counterpart: The question here isn't whether the
>>> guest supports it (we can't know wheth
Hi Andre,
On 23/03/17 10:57, Andre Przywara wrote:
On 21/03/17 20:17, Julien Grall wrote:
On 03/16/2017 11:20 AM, Andre Przywara wrote:
diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index 2e023d1..bf64c61 100644
diff --git a/xen/arch/arm/gic-v3-its.c b/xen/arch/arm/gic-v3-its.c
new
At 17:02 + on 23 Mar (1490288548), Andrew Cooper wrote:
> On 23/03/17 16:55, Tim Deegan wrote:
> > At 16:31 + on 16 Mar (1489681899), Andrew Cooper wrote:
> >> Some bits are unconditionally reserved in pagetable entries, or reserved
> >> because of alignment restrictions. Other bits are re
At 16:31 + on 16 Mar (1489681903), Andrew Cooper wrote:
> * Drop trailing whitespace
> * Consistently apply Xen style
> * Introduce a local variable block
>
> Signed-off-by: Andrew Cooper
Acked-by: Tim Deegan
___
Xen-devel mailing list
Xen-dev
This new changeset contain a fix to build with GCC 6.3.
Signed-off-by: Anthony PERARD
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index f0ca9e9379..7a0f94b2f2 100644
--- a/Config.mk
+++ b/Config.mk
@@ -267,7 +267,7 @@ QEMU_TRADITIONAL_U
At 16:31 + on 16 Mar (1489681902), Andrew Cooper wrote:
> --- a/xen/arch/x86/mm/guest_walk.c
> +++ b/xen/arch/x86/mm/guest_walk.c
> @@ -32,24 +32,28 @@ asm(".file \"" __OBJECT_FILE__ "\"");
> #include
> #include
>
> -/* Modify a guest pagetable entry to set the Accessed and Dirty bits.
>
>>> On 23.03.17 at 17:36, wrote:
> On Wed, Mar 22, 2017 at 5:56 PM, Jan Beulich wrote:
> On 15.03.17 at 21:05, wrote:
>>> --- a/xen/include/public/domctl.h
>>> +++ b/xen/include/public/domctl.h
>>> @@ -66,6 +66,9 @@ struct xen_domctl_createdomain {
>>> /* Is this a xenstore domain? */
>>>
On 23/03/17 16:55, Tim Deegan wrote:
> At 16:31 + on 16 Mar (1489681899), Andrew Cooper wrote:
>> Some bits are unconditionally reserved in pagetable entries, or reserved
>> because of alignment restrictions. Other bits are reserved because of
>> control
>> register configuration.
>>
>> Intro
The use of seabios defconfig kills boot performance of Windows guests
because the default is for the int13 handler to use PIO when accessing
the emulated IDE device.
By instead using a canned configuration with the ATA settings overridden
to enable DMA access (and also wider PIO) boot performance
On 23/03/17 17:54, Jan Beulich wrote:
On 23.03.17 at 17:44, wrote:
>> On 23/03/17 16:04, Jan Beulich wrote:
>> On 23.03.17 at 07:25, wrote:
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -335,3 +335,5 @@ ASSERT(IS_ALIGNED(__bss_end,8), "__bss_end
>>>
At 16:31 + on 16 Mar (1489681901), Andrew Cooper wrote:
> The shadow logic should not create a valid/present shadow of a guest PTE which
> contains reserved bits from the guests point of view. It is not guaranteed
> that the hardware pagewalk will come to the same conclusion, and raise a
> pag
At 16:31 + on 16 Mar (1489681899), Andrew Cooper wrote:
> Some bits are unconditionally reserved in pagetable entries, or reserved
> because of alignment restrictions. Other bits are reserved because of control
> register configuration.
>
> Introduce helpers which take an individual vcpu and
On 23/03/17 16:35, Jan Beulich wrote:
On 23.03.17 at 07:25, wrote:
>> --- a/xen/arch/x86/boot/mem.S
>> +++ b/xen/arch/x86/boot/mem.S
>> @@ -67,10 +67,32 @@ get_memory_map:
>>
>> ret
>>
>> +/*
>> + * Copy E820 map obtained from BIOS to a buffer allocated by Xen.
>> + * Input: %rdi
>>> On 23.03.17 at 17:44, wrote:
> On 23/03/17 16:04, Jan Beulich wrote:
> On 23.03.17 at 07:25, wrote:
>>> --- a/xen/arch/x86/xen.lds.S
>>> +++ b/xen/arch/x86/xen.lds.S
>>> @@ -335,3 +335,5 @@ ASSERT(IS_ALIGNED(__bss_end,8), "__bss_end
>>> misaligned")
>>>
>>> ASSERT((trampoline_
On Thu, 23 Mar 2017, Greg Kurz wrote:
> On Wed, 22 Mar 2017 11:32:22 -0700 (PDT)
> Stefano Stabellini wrote:
>
> > On Wed, 22 Mar 2017, Greg Kurz wrote:
> > > On Tue, 21 Mar 2017 13:14:02 -0700 (PDT)
> > > Stefano Stabellini wrote:
> > >
> > > > On Tue, 21 Mar 2017, Greg Kurz wrote:
> > > >
On 23/03/17 16:04, Jan Beulich wrote:
On 23.03.17 at 07:25, wrote:
>> @@ -131,6 +151,14 @@ start64:
>> movabs $__high_start,%rax
>> jmpq*%rax
>>
>> +#include "wakeup.S"
>> +
>> +/* The first page of trampoline is permanent, the rest boot-time only. */
>> +.equ
On 03/21/2017 06:43 PM, Ankur Arora wrote:
> This patch series re-enables the upload of PM data from initial-domain
> to Xen. This was broken in commit cd979883b9ede90643e019f33cb317933eb867b4.
>
> The upload now happens post-resume in workqueue context. From the
> POV of Xen, the PM upload might b
On Wed, Mar 22, 2017 at 5:56 PM, Jan Beulich wrote:
On 15.03.17 at 21:05, wrote:
>> --- a/xen/include/public/domctl.h
>> +++ b/xen/include/public/domctl.h
>> @@ -66,6 +66,9 @@ struct xen_domctl_createdomain {
>> /* Is this a xenstore domain? */
>> #define _XEN_DOMCTL_CDF_xs_domain 5
>
At 16:31 + on 16 Mar (1489681898), Andrew Cooper wrote:
> Switch them to returning bool, and taking const parameters.
>
> Rename guest_supports_superpages() to guest_supports_l2_superpages() to
> indicate which level of pagetables it is actually referring to, and rename
> guest_supports_1G_sup
On 03/23/2017 06:20 PM, Jan Beulich wrote:
On 23.03.17 at 16:54, wrote:
>> I'm not sure where to go from here.
>
> Well, without finding where things start to go wrong, I don't think
> we can make any progress here. Finding that may admittedly be
> a rather tedious process.
I may have stumb
At 16:31 + on 16 Mar (1489681897), Andrew Cooper wrote:
> There is only one single user of VALID_GFN(). Inline the macro to remove the
> added layer of indirection in sh_gva_to_gfn()
>
> Signed-off-by: Andrew Cooper
Acked-by: Tim Deegan
___
Xen-
At 16:31 + on 16 Mar (1489681896), Andrew Cooper wrote:
> It is a pointer, not an array.
>
> No functional change.
>
> Requested-by: Jan Beulich
> Signed-off-by: Andrew Cooper
Acked-by: Tim Deegan
___
Xen-devel mailing list
Xen-devel@lists.xen.
>>> On 23.03.17 at 16:40, wrote:
> On 23/03/17 15:35, Jan Beulich wrote:
> On 23.03.17 at 07:25, wrote:
>
>>> +movlbootsym(e820nr), %ecx
>>> +cmpl%ecx, %eax
>>> +cmova %ecx, %eax # number of entries to move
>>> +movl%eax,
>>> On 23.03.17 at 16:54, wrote:
> I'm not sure where to go from here.
Well, without finding where things start to go wrong, I don't think
we can make any progress here. Finding that may admittedly be
a rather tedious process.
Jan
___
Xen-devel maili
On 23/03/17 15:35, Jan Beulich wrote:
On 23.03.17 at 07:25, wrote:
>> +movlbootsym(e820nr), %ecx
>> +cmpl%ecx, %eax
>> +cmova %ecx, %eax # number of entries to move
>> +movl%eax, %ecx
>> +shll$2, %ecx
>> +
The code which used that field has been deleted. Found by code
inspection.
Signed-off-by: Wei Liu
---
Cc: Stefano Stabellini
Cc: Julien Grall
Compile test only
---
xen/include/asm-arm/mm.h | 6 --
1 file changed, 6 deletions(-)
diff --git a/xen/include/asm-arm/mm.h b/xen/include/asm-arm/
>>> On 23.03.17 at 16:20, wrote:
> On 03/23/2017 02:57 PM, Jan Beulich wrote:
>> I wonder whether we shouldn't go further and suppress the duplicate
>> symbol warnings also when !CONFIG_LIVEPATCH.
>
> I don't really mind but if that change is made then there's more chance
> that someone accident
>>> On 23.03.17 at 15:54, wrote:
> On 23/03/17 08:35, Jan Beulich wrote:
> On 22.03.17 at 20:55, wrote:
> --- a/xen/arch/x86/hvm/dm.c
> +++ b/xen/arch/x86/hvm/dm.c
> @@ -119,56 +119,89 @@ static int set_isa_irq_level(struct domain *d,
> uint8_t
> isa_irq,
>}
>
On Thu, Mar 23, 2017 at 4:58 PM, Juergen Gross wrote:
> On 23/03/17 15:23, al1img . wrote:
>> This example is clear. But still wrapper macro is required to make it
>> visible for libxen client (xl):
>>
>> #define LIBXL_DEFINE_DEVICE_LIST_FREE(type)
>> void libxl_device_##type##_list_free(libxl
On 03/23/2017 03:23 PM, Jan Beulich wrote:
On 23.03.17 at 11:21, wrote:
>>> Sadly, I've now written this (rough) patch:
>>>
>>> http://pastebin.com/3DJ5WYt0
>>>
>>> only to find that it does not solve our issue. With multiple processors
>>> per guest and heavy emulati
On Thu, 23 Mar 2017, dhara buch wrote:
Hello,
I am doing profiling with command,
operf ./test --events=BR_INST_RETIRED
where test.c is a simple c language file.
then, I am trying to collect information with command
opreport --symbols --debug-info
From the documents of Oprofile, I assume th
Hi, all!
I am trying to implement a zero-copy scenario for DRM front/back,
e.g. buffers allocated by DomU in the DRM frontend used as is
by Dom0. The requirement I have is that the buffer is contiguous.
So, what I currently have is:
1. DomU is 1:1 mapped and is able to allocate physically contig
On 03/23/2017 02:57 PM, Jan Beulich wrote:
There are quite a few of these, and as the option is a development one
only, duplicate symbol names should not be an issue there.
Signed-off-by: Jan Beulich
Acked-by: Ross Lagerwall
---
I wonder whether we shouldn't go further and suppress the dup
On Mon, Mar 20, 2017 at 05:51:03PM +, George Dunlap wrote:
> On Thu, Mar 16, 2017 at 7:08 PM, Ronald Rojas wrote:
> > Create a basic Makefile to build and install libxenlight Golang
> > bindings. Also add a stub package which only opens libxl context.
> >
> > Include a global xenlight.Ctx vari
On Mon, Mar 20, 2017 at 02:45:30PM +, George Dunlap wrote:
> On Thu, Mar 16, 2017 at 7:08 PM, Ronald Rojas wrote:
> > Create a basic Makefile to build and install libxenlight Golang
> > bindings. Also add a stub package which only opens libxl context.
> >
> > Include a global xenlight.Ctx vari
>>> On 23.03.17 at 07:25, wrote:
> Use a larger e820 map buffer for non-BIOS memory map sources. This
> requires to have different defines for the maximum number of E820 map
> entries for the raw BIOS buffer and the later used struct e820map.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Jan Be
>>> On 23.03.17 at 07:25, wrote:
> --- a/xen/arch/x86/boot/mem.S
> +++ b/xen/arch/x86/boot/mem.S
> @@ -67,10 +67,32 @@ get_memory_map:
>
> ret
>
> +/*
> + * Copy E820 map obtained from BIOS to a buffer allocated by Xen.
> + * Input: %rdi: target address of e820 entry array
> + *
>>> On 23.03.17 at 07:25, wrote:
> @@ -131,6 +151,14 @@ start64:
> movabs $__high_start,%rax
> jmpq*%rax
>
> +#include "wakeup.S"
> +
> +/* The first page of trampoline is permanent, the rest boot-time only. */
> +.equtrampoline_boot_start, trampoline_start + P
On 23/03/17 15:23, al1img . wrote:
> This example is clear. But still wrapper macro is required to make it
> visible for libxen client (xl):
>
> #define LIBXL_DEFINE_DEVICE_LIST_FREE(type)
> void libxl_device_##type##_list_free(libxl_device_##type* list, int nr)
> {
> libxl__device
There are quite a few of these, and as the option is a development one
only, duplicate symbol names should not be an issue there.
Signed-off-by: Jan Beulich
---
I wonder whether we shouldn't go further and suppress the duplicate
symbol warnings also when !CONFIG_LIVEPATCH.
--- a/xen/arch/x86/Mak
On 23/03/17 08:35, Jan Beulich wrote:
On 22.03.17 at 20:55, wrote:
--- a/xen/arch/x86/hvm/dm.c
+++ b/xen/arch/x86/hvm/dm.c
@@ -119,56 +119,89 @@ static int set_isa_irq_level(struct domain *d, uint8_t
isa_irq,
}
static int modified_memory(struct domain *d,
-
Hello Luca,
On 23/03/17 02:23, Luca Miccio wrote:
I tried also this method but i had the same error. So i came up with the
idea of removing the
psci method from the configure and also from the dtsi file that i have
changed.
I guess you are using only 1 core in this case. Am I right?
With th
Hi Stefano,
On 23/03/17 00:55, Stefano Stabellini wrote:
The problem is that no matter the --cores=4 option, the device tree
(foundation-v8.dtb) has 4 cpu cores by default. It also says that the
"enable-method" is "spin-table". At the same time Julien wrote to pass
--enable-psci to the bootwrapp
This example is clear. But still wrapper macro is required to make it
visible for libxen client (xl):
#define LIBXL_DEFINE_DEVICE_LIST_FREE(type)
void libxl_device_##type##_list_free(libxl_device_##type* list, int nr)
{
libxl__device_list_free(libxl__##type##_devtype, list, nr);
Hi,
On 21/03/17 21:23, Julien Grall wrote:
> Hi Andre,
>
> On 03/16/2017 11:20 AM, Andre Przywara wrote:
>> diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
>> index bf64c61..86f7b53 100644
>> --- a/xen/arch/arm/Kconfig
>> +++ b/xen/arch/arm/Kconfig
>> @@ -49,6 +49,21 @@ config HAS_ITS
>>
flight 106868 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106868/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12 mig
flight 106837 qemu-upstream-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106837/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-xsm 3 host-install(3) broken in 106816 pass in 106837
test-amd64-i386-xl-
>>> On 23.03.17 at 14:56, wrote:
> On 23/03/17 14:37, Jan Beulich wrote:
> On 23.03.17 at 13:52, wrote:
>>> Connecting to the backend isn't working reliably in xen-fbfront: in
>>> case XenbusStateInitWait of the backend has been missed the backend
>>> transition to XenbusStateConnected will t
On 03/23/2017 08:52 AM, Juergen Gross wrote:
> Connecting to the backend isn't working reliably in xen-fbfront: in
> case XenbusStateInitWait of the backend has been missed the backend
> transition to XenbusStateConnected will trigger the connected state
> only without doing the actions required wh
On 23/03/17 09:14, Bhupinder Thakur wrote:
.Hi Julien,
Hi Bhupinder,
On 5 March 2017 at 17:42, Julien Grall wrote:
Hi Bhupinder,
On 21/02/17 11:25, Bhupinder Thakur wrote:
diff --git a/xen/arch/arm/vpl011.c b/xen/arch/arm/vpl011.c
Lastly, what if vpl011_write_data is returning an error
On 03/23/2017 08:53 AM, Juergen Gross wrote:
> Today xen-fbfront supports specifying the display size via module
> parameters only. Add support for specifying the size via Xenstore in
> order to enable doing this easily via the domain's Xen configuration.
>
> Add an error message in case the config
On 23/03/17 14:37, Jan Beulich wrote:
On 23.03.17 at 13:52, wrote:
>> Connecting to the backend isn't working reliably in xen-fbfront: in
>> case XenbusStateInitWait of the backend has been missed the backend
>> transition to XenbusStateConnected will trigger the connected state
>> only witho
1 - 100 of 167 matches
Mail list logo