>>> On 04.07.17 at 18:34, wrote:
> In my testing with sysbench in a HVM domU running a linux-4.4 based
> pvops kernel on a xen-4.7 based dom0 the time does not move forward
> properly:
>
> There (URL below) is basically code like this:
> clock_gettime(CLOCK_MONOTONIC, a)
> do_work
> clock_g
flight 111377 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111377/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
111368
test-amd64-a
> From: Gao, Chao
> Sent: Wednesday, July 5, 2017 12:28 PM
>
> On Wed, Jul 05, 2017 at 10:46:39AM +0800, Tian, Kevin wrote:
> >> From: Gao, Chao
> >> Sent: Monday, July 3, 2017 12:37 PM
> >>
> >> On Fri, Jun 30, 2017 at 05:19:52PM +0800, Tian, Kevin wrote:
> >> >> From: Gao, Chao
> >> >> Sent: Fri
Hi,
When I compile xen with commit a7d802bca13489d303749177127089af48844f29, it
failed when make tools.
"ERROR 404: Not Found" showed when wget
http://xenbits.xen.org/xen-extfiles/ipxe-git-356f6c1b64d7a97746d1816cef8ca22bdd8d0b5d.tar.gz
Then I checked above URL, the following error occurred:
N
On Wed, Jul 05, 2017 at 10:46:39AM +0800, Tian, Kevin wrote:
>> From: Gao, Chao
>> Sent: Monday, July 3, 2017 12:37 PM
>>
>> On Fri, Jun 30, 2017 at 05:19:52PM +0800, Tian, Kevin wrote:
>> >> From: Gao, Chao
>> >> Sent: Friday, June 30, 2017 9:17 AM
>> >>
>> >> The problem is for a VF of RC integr
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Monday, June 26, 2017 6:45 PM
>
> 1. Remove RDMSRs of VMX MSRs since all values are already available in
>raw_vmx_msr_policy.
> 2. Replace bit operations involving VMX bitmasks with accessing VMX
>features by name and using vm
Hi Julien:
Thanks for your review.
On 2017年07月04日 18:39, Julien Grall wrote:
>> +vIOMMU hypercall
>> +
>> +Introduce new domctl hypercall "xen_domctl_viommu_op" to create/destroy
>> +vIOMMU and query vIOMMU capabilities that device model can support.
>> +
>> +* vIOMMU hyper
If MCG_LMCE_P is present in guest MSR_IA32_MCG_CAP, then allow guest
to read/write MSR_IA32_MCG_EXT_CTL.
Signed-off-by: Haozhong Zhang
---
Changes in v6:
* Remove Jan's R-b.
* Handle hvm_vmce_vcpu::mcg_ext_ctl in XEN_DOMCTL_{set,get}_ext_vcpucontext.
---
xen/arch/x86/cpu/mcheck/vmce.c
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Monday, June 26, 2017 6:45 PM
>
> This structure provides a convenient way of accessing contents of
> VMX MSRs: every bit value is accessible by its name. Bit names match
> existing Xen's definitions as close as possible.
>
> The st
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Monday, June 26, 2017 6:44 PM
>
> The end goal of having VMX MSRs policy is to be able to manage
> L1 VMX features. This patch series is the first part of this work.
> There is no functional change to what L1 sees in VMX MSRs at this
flight 111374 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111374/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 16 guest-localmigrate fail REGR. vs. 110515
test-amd64-amd64-xl
> From: Gao, Chao
> Sent: Monday, July 3, 2017 12:37 PM
>
> On Fri, Jun 30, 2017 at 05:19:52PM +0800, Tian, Kevin wrote:
> >> From: Gao, Chao
> >> Sent: Friday, June 30, 2017 9:17 AM
> >>
> >> The problem is for a VF of RC integrated PF (e.g. PF's BDF is 00:02.0),
> >> we would wrongly use 00:00.0
On 17-07-04 01:28:32, Jan Beulich wrote:
> >>> On 04.07.17 at 03:40, wrote:
> > On 17-06-30 03:18:53, Jan Beulich wrote:
> >> >>> Yi Sun 06/30/17 10:05 AM >>>
> >> >On 17-06-30 01:33:02, Jan Beulich wrote:
> >> >> >>> Yi Sun 06/30/17 9:01 AM >>>
> > There will be problem if we substract 1 before
This run is configured for baseline tests only.
flight 71641 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71641/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 16 debian-h
Hi
On 7/4/17 12:54 PM, Andrew Cooper wrote:
> On 04/07/17 20:48, PGNet Dev wrote:
>> [0.00] NX (Execute Disable) protection: active
>> [0.00] efi: EFI v2.31 by American Megatrends
>> [0.00] efi: ESRT=0x9ef8d998 ACPI 2.0=0x9e819000
>> ACPI=0x9e819000 SMBI
flight 111373 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111373/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 111359
test-armhf-armhf-
flight 111375 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111375/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 18 guest-start/win.repeat fail in 111255
REGR. vs. 110441
Tes
From: Julien Grall [mailto:julien.gr...@arm.com]
Sent: Tuesday, July 04, 2017 09:47
On 07/04/2017 05:42 PM, Nick Garnett wrote:
> I tried installing the tools with an ARM64 chroot also and had a similar
> issue. In that case, the package
> "crossbuild_essential_arm64" wouldn't install because
Hi Julien,
On 07/04/2017 10:46 PM, Sergej Proskurin wrote:
> Hi Julien,
>
> On 07/04/2017 06:28 PM, Julien Grall wrote:
>> Hi Sergej,
>>
>> On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
>>> The current implementation of GENMASK is capable of creating bitmasks of
>>> 32-bit values on AArch32 and
Hi Julien,
On 07/04/2017 06:15 PM, Julien Grall wrote:
> Hi Sergej,
>
[...]
>> +
>> +#define GUEST_TABLE_OFFSET(offs, gran) ((paddr_t)(offs) &
>> lpae_entry_mask(gran))
>> +#define
>> GUEST_TABLE_OFFSET_HELPERS(gran)
>>
>> \
>> +static in
Hi Julien,
On 07/04/2017 06:28 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
>> The current implementation of GENMASK is capable of creating bitmasks of
>> 32-bit values on AArch32 and 64-bit values on AArch64. As we need to
>> create masks for 64-bit va
Hello,
I'm testing IRQ latency on exynos5422. I'm using Xen 4.10-unstable. I used
device passthrough for SPI irq 64. For guest domain I used FreeRTOS. When I
use credit scheduler after destruction of domain, IRQ is released. I changed
scheduler to credit2 and rtds at boot time and IRQ wasn't r
Hi Julien,
On 07/04/2017 06:58 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
>> The function p2m_mem_access_check_and_get_page in mem_access.c
>> translates a gva to an ipa by means of the hardware functionality of the
>> ARM architecture. This is implem
On 04/07/17 20:48, PGNet Dev wrote:
> [0.00] NX (Execute Disable) protection: active
> [0.00] efi: EFI v2.31 by American Megatrends
> [0.00] efi: ESRT=0x9ef8d998 ACPI 2.0=0x9e819000
> ACPI=0x9e819000 SMBIOS=0xf04c0 MPS=0xfd490
> (XEN) [2017-07-0
> As a general remark, I think such issues should rather be brought up on
> xen-devel.
upgrading a working Xen server to
kernel 4.12.0-2.gb8e7496-default
Xen 4.9.0_08-512
now, boot crashes @
domain_crash_sync called from entry.S: fault at 82d080342328
entry.o#creat
flight 71633 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71633/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-i386-daily-netboot-pvgrub 9 debian-di-install fail REGR. vs.
71604
Remove unnecessary static on local variables last_frontswap_pages and
tgt_frontswap_pages. Such variables are initialized before being used,
on every execution path throughout the function. The statics have no
benefit and, removing them reduce the code size.
This issue was detected using Coccinell
On 07/04/2017 01:30 PM, Florian Jakobsmeier wrote:
Hello all,
Hi Florian,
asmlinkage void leave_hypervisor_tail(void)
{
+/*This methode will be called after the 'guest_entry' macro in
/arch/arm64/entry.S set guest registers
+Check single_step_enabled flag in d
flight 111368 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111368/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemut-win7-amd64 16 guest-localmigrate/x10 fail like 111249
test-armhf-armhf-libvirt 14 save
Hi,
On 07/04/2017 03:17 PM, Andrew Cooper wrote:
On 04/07/17 13:20, Jan Beulich wrote:
On 04.07.17 at 14:12, wrote:
When removing if/for/while statements, the code should be reworked to
remove the { } and the extra indentation.
Yes.
This is improving code maintainability and code readabili
flight 111376 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111376/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
Hi Sergej,
On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
Also, create a macro CHECK_BASE_SIZE which simply reduces the code
size and simplifies readability.
No, it makes more confusing because you have the return within the
macro. It is not that bad too have an helper checking the
On Tue, Jul 04, 2017 at 09:45:19AM -0700, Nick Garnett wrote:
>
>
> -Original Message-
> From: Roger Pau Monné [mailto:roger@citrix.com]
> Sent: Tuesday, July 04, 2017 09:40
> To: Nick Garnett
> Cc: xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] What is provided with the Xen Too
On Tue, Jul 04, 2017 at 01:48:32PM +0200, Vincent Legout wrote:
> Devices are not unmounted inside a domU after a xl block-detach.
>
> After xl block-detach, blkfront_closing() is called with state ==
> XenbusStateConnected, it detects that the device is still in use and
> only switches state to X
Hi Sergej,
On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
The function p2m_mem_access_check_and_get_page in mem_access.c
translates a gva to an ipa by means of the hardware functionality of the
ARM architecture. This is implemented in the function gva_to_ipa. If
mem_access is active, hardware-b
On Tue, Jul 04, 2017 at 09:34:17AM -0700, Nick Garnett wrote:
> Is "xl" the application that is installed following the "Xen ARM with
> Virtualization Extensions/CrossCompiling" page, "Build arm64 tools" section?
>
I suppose so.
> I was able to install the "xen-tools" package with no issues, fol
On 04/07/17 17:42, Paul Durrant wrote:
>> -Original Message-
>> From: Igor Druzhinin
>> Sent: 04 July 2017 17:34
>> To: Paul Durrant ; xen-de...@lists.xenproject.org;
>> qemu-de...@nongnu.org
>> Cc: sstabell...@kernel.org; Anthony Perard ;
>> pbonz...@redhat.com
>> Subject: Re: [PATCH v2 3/
Hello Nick,
Please avoid top-posting and keep mailing list CCed.
On 07/04/2017 05:42 PM, Nick Garnett wrote:
I tried installing the tools with an ARM64 chroot also and had a similar issue. In that
case, the package "crossbuild_essential_arm64" wouldn't install because it
depended on a packag
-Original Message-
From: Roger Pau Monné [mailto:roger@citrix.com]
Sent: Tuesday, July 04, 2017 09:40
To: Nick Garnett
Cc: xen-devel@lists.xen.org
Subject: Re: [Xen-devel] What is provided with the Xen Tools and why do I
need them?
Hello,
Please avoid top-posting, it breaks the fl
> -Original Message-
> From: Igor Druzhinin
> Sent: 04 July 2017 17:34
> To: Paul Durrant ; xen-de...@lists.xenproject.org;
> qemu-de...@nongnu.org
> Cc: sstabell...@kernel.org; Anthony Perard ;
> pbonz...@redhat.com
> Subject: Re: [PATCH v2 3/4] xen/mapcache: introduce
> xen_replace_cache_
Hello,
Please avoid top-posting, it breaks the flow of the conversation.
On Tue, Jul 04, 2017 at 09:34:17AM -0700, Nick Garnett wrote:
> Is "xl" the application that is installed following the "Xen ARM with
> Virtualization Extensions/CrossCompiling" page, "Build arm64 tools" section?
Yes, those
Is "xl" the application that is installed following the "Xen ARM with
Virtualization Extensions/CrossCompiling" page, "Build arm64 tools" section?
I was able to install the "xen-tools" package with no issues, following the
"xen-tools a straightforward VM provisioning/installation tool" page
("ht
Is "xl" the application that is installed following the "Xen ARM with
Virtualization Extensions/CrossCompiling" page, "Build arm64 tools" section?
I was able to install the "xen-tools" package with no issues, following the
"xen-tools a straightforward VM provisioning/installation tool" page
("ht
In my testing with sysbench in a HVM domU running a linux-4.4 based
pvops kernel on a xen-4.7 based dom0 the time does not move forward
properly:
There (URL below) is basically code like this:
clock_gettime(CLOCK_MONOTONIC, a)
do_work
clock_gettime(CLOCK_MONOTONIC, b)
diff_time(a,b)
All '
On 04/07/17 17:27, Paul Durrant wrote:
>> -Original Message-
>> From: Igor Druzhinin
>> Sent: 04 July 2017 16:48
>> To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org
>> Cc: Igor Druzhinin ; sstabell...@kernel.org;
>> Anthony Perard ; Paul Durrant
>> ; pbonz...@redhat.com
>> Subject:
> -Original Message-
> From: Igor Druzhinin
> Sent: 04 July 2017 16:48
> To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org
> Cc: Igor Druzhinin ; sstabell...@kernel.org;
> Anthony Perard ; Paul Durrant
> ; pbonz...@redhat.com
> Subject: [PATCH v2 3/4] xen/mapcache: introduce
> xen_r
Hi Sergej,
On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
The current implementation of GENMASK is capable of creating bitmasks of
32-bit values on AArch32 and 64-bit values on AArch64. As we need to
create masks for 64-bit values on AArch32 as well, in this commit we
introduce the GENMASK_ULL
Hi Sergej,
On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
We introduce the BIT_ULL macro to using values of unsigned long long as
to enable setting bits of 64-bit registers on AArch32. In addition,
this commit adds a define holding the register width of 64 bit
double-word registers. This defin
Hi Sergej,
On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective translation table entries.
Signed-off-by: Sergej P
On 07/04/2017 05:22 PM, Julien Grall wrote:
Hi Sergekj,
On 06/20/2017 09:33 PM, Sergej Proskurin wrote:
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective tra
Hi Sergej,
On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
This commit introduces a new helper that checks whether the target PTE
holds a page mapping or not. This helper will be used as part of the
following commits.
Signed-off-by: Sergej Proskurin
Reviewed-by: Julien Grall
Cheers,
---
Hi Sergekj,
On 06/20/2017 09:33 PM, Sergej Proskurin wrote:
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective translation table entries.
Signed-off-by: Sergej
Hi Sergej,
On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
The ARMv8 architecture supports pages with different (4K, 16K, and 64K) sizes.
To enable guest page table walks for various configurations, this commit
extends the defines and helpers of the current implementation.
Signed-off-by: Sergej
> -Original Message-
> From: Igor Druzhinin
> Sent: 04 July 2017 16:48
> To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org
> Cc: Igor Druzhinin ; sstabell...@kernel.org;
> Anthony Perard ; Paul Durrant
> ; pbonz...@redhat.com
> Subject: [PATCH v2 2/4] xen/mapcache: add an ability to
> -Original Message-
> From: Igor Druzhinin
> Sent: 04 July 2017 16:48
> To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org
> Cc: Igor Druzhinin ; sstabell...@kernel.org;
> Anthony Perard ; Paul Durrant
> ; pbonz...@redhat.com
> Subject: [PATCH v2 1/4] xen: move physmap saving into
Hi Sergej,
On 06/27/2017 12:52 PM, Sergej Proskurin wrote:
diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h
index 855ded1b07..3dd439de33 100644
--- a/xen/include/asm-arm/processor.h
+++ b/xen/include/asm-arm/processor.h
@@ -94,6 +94,13 @@
#define TTBCR_N_2KB _AC(
This new call is trying to update a requested map cache entry
according to the changes in the physmap. The call is searching
for the entry, unmaps it and maps again at the same place using
a new guest address. If the mapping is dummy this call will
make it real.
This function makes use of a new xe
Saving/restoring the physmap to/from xenstore was introduced to
QEMU majorly in order to cover up the VRAM region restore issue.
The sequence of restore operations implies that we should know
the effective guest VRAM address *before* we have the VRAM region
restored (which happens later). Unfortuna
If we have a system with xenforeignmemory_map2() implemented
we don't need to save/restore physmap on suspend/restore
anymore. In case we resume a VM without physmap - try to
recreate the physmap during memory region restore phase and
remap map cache entries accordingly. The old code is left
for co
Non-functional change.
Signed-off-by: Igor Druzhinin
---
hw/i386/xen/xen-hvm.c | 57 ---
1 file changed, 31 insertions(+), 26 deletions(-)
diff --git a/hw/i386/xen/xen-hvm.c b/hw/i386/xen/xen-hvm.c
index cffa7e2..d259cf7 100644
--- a/hw/i386/xen/x
Dummys are simple anonymous mappings that are placed instead
of regular foreign mappings in certain situations when we need
to postpone the actual mapping but still have to give a
memory region to QEMU to play with.
This is planned to be used for restore on Xen.
Signed-off-by: Igor Druzhinin
---
>>> On 27.06.17 at 19:14, wrote:
First of all, please Cc all maintainers of code you modify.
> xen: Add support for hiding and unhiding pcie passthrough devices
Please don't repeat the subject in the body of the mail.
> Add support for hiding and unhiding (by introducing two new hypercall
> su
Hi Wei,
On 06/30/2017 04:15 AM, Wei Chen wrote:
This add_device callback function is taking care of adding a device
to SMMU and make sure it is fully prepare to be used by the SMMU
afterwards.
In previous code, we don't implement the add_device callback in
iommu_ops for ARM SMMU. We placed the
Hi,
On 07/04/2017 03:41 PM, Wei Liu wrote:
CC Julien and Stefano -- not sure if the wiki page should be updated
I don't cross-compile the tools usually but either build on the target
or using an ARM chroot (setup with qemu-debootstrap).
Stefano seems to have updated the wiki page recently,
On Tue, Jul 4, 2017 at 8:28 AM, Andrii Anisov wrote:
>
>
> On 03.07.17 21:42, Meng Xu wrote:
>>
>> As far as I know, there is no known issue for ARM as long as that
>> version Xen runs on the ARM board.
>
> That's good.
>>
>> I assume you have your own workloads to run, which are periodically
>>
>>> On 26.06.17 at 12:44, wrote:
> @@ -2085,7 +2097,7 @@ int nvmx_msr_read_intercept(unsigned int msr, u64
> *msr_content)
> {
> struct vcpu *v = current;
> struct domain *d = v->domain;
> -struct vmx_msr_policy *p = &hvm_max_vmx_msr_policy;
> +struct vmx_msr_policy *p = d->arc
>>> On 26.06.17 at 12:44, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -244,6 +244,8 @@ static u32 adjust_vmx_controls(
> return ctl;
> }
>
> +void calculate_hvm_max_policy(void);
As said for a prior patch, this once again needs to move to a header
w
Presented herewith is the a plan for the final part of CPUID work, which
primarily covers better Xen/Toolstack interaction for configuring the guests
CPUID policy.
A PDF version of this document is available from:
http://xenbits.xen.org/people/andrewcoop/cpuid-part-3-rev2.pdf
Changes from v1:
*
On Tue, Jul 04, 2017 at 10:35:28PM +0800, Dongli Zhang wrote:
> Signed-off-by: Dongli Zhang
Acked-by: Wei Liu
This section of the list isn't ordered alphabetically so it isn't really
your fault. But I wouldn't want to make things worse, so I would move
this line below tools/misc/xen-detect whil
Hi all,
Sorry, I forgot to write the list of attendees. I only wrote down the
company name. Feel free to forward the e-mail to any people interested.
During the previous community call, we discussed about potential
embedded/automative boards. Stefano Stabellini brought up 3 names:
- Renases
CC Julien and Stefano -- not sure if the wiki page should be updated
On Mon, Jul 03, 2017 at 11:41:37AM -0700, Nick Garnett wrote:
> I was able to cross-compile the hypervisor on an amd64 host for the aarch64
> target. However, I can't build the Xen toolset.
>
> I am following the "Xen ARM with
Signed-off-by: Dongli Zhang
---
.gitignore | 1 +
1 file changed, 1 insertion(+)
diff --git a/.gitignore b/.gitignore
index 068f430..e1009e0 100644
--- a/.gitignore
+++ b/.gitignore
@@ -211,6 +211,7 @@ tools/misc/xenperf
tools/misc/xenpm
tools/misc/xen-hvmctx
tools/misc/xenlockprof
+tools/mis
Hi Wei,
I will send the patch based on staging.
Dongli Zhang
On 07/04/2017 10:10 PM, Wei Liu wrote:
> I pushed your two patches and discovered you also need to patch
> .gitignore. Could you please send a patch for that? thanks
>
> ___
> Xen-devel mail
>>> On 26.06.17 at 12:44, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -227,7 +227,8 @@ static u32 adjust_vmx_controls(
> {
> u32 vmx_msr_low, vmx_msr_high, ctl = ctl_min | ctl_opt;
>
> -rdmsr(msr, vmx_msr_low, vmx_msr_high);
> +vmx_msr_low =
On 04/07/17 13:20, Jan Beulich wrote:
On 04.07.17 at 14:12, wrote:
>> When removing if/for/while statements, the code should be reworked to
>> remove the { } and the extra indentation.
> Yes.
>
>> This is improving code maintainability and code readability.
> For the given example, yes. Howev
>>> On 26.06.17 at 12:44, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -144,6 +144,8 @@ static void __init vmx_display_features(void)
> printk(" - none\n");
> }
>
> +struct vmx_msr_policy __read_mostly raw_vmx_msr_policy;
Does this really need to
On Tue, Jul 04, 2017 at 01:12:13PM +0100, Julien Grall wrote:
> Signed-off-by: Julien Grall
Applied this patch.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
I pushed your two patches and discovered you also need to patch
.gitignore. Could you please send a patch for that? thanks
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
flight 111372 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111372/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
>>> On 26.06.17 at 12:44, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -144,6 +144,14 @@ static void __init vmx_display_features(void)
> printk(" - none\n");
> }
>
> +bool vmx_msr_available(struct vmx_msr_policy *p, uint32_t msr)
const
> --- a/x
flight 111365 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111365/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 18 guest-start/win.repeat fail in 111255
REGR. vs. 110441
Tes
Op 2017-07-04 14:51, schreef Juergen Gross:
On 04/07/17 14:44, Jean-Louis Dupond wrote:
Hi Juergen,
We run Xen as dom0 with Windows domU's.
Now with older 4.9.x kernels, we had BSOD's when we booted a domU with
old Xen drivers in it.
With the newest kernel (4.9.34), this seems to be resolved.
This commit substitutes the direct access of the host's p2m
(&d->arch.p2m) for the macro "p2m_get_hostp2m". This macro simplifies
readability and also the differentiation between the host's p2m and
alternative p2m's, i.e., as part of the altp2m subsystem that will be
submitted in the future.
Signe
flight 111363 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111363/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
110515
Tests which
On 04/07/17 14:44, Jean-Louis Dupond wrote:
> Hi Juergen,
>
> We run Xen as dom0 with Windows domU's.
>
> Now with older 4.9.x kernels, we had BSOD's when we booted a domU with
> old Xen drivers in it.
> With the newest kernel (4.9.34), this seems to be resolved.
>
> I was wondering what caused
Hi Juergen,
We run Xen as dom0 with Windows domU's.
Now with older 4.9.x kernels, we had BSOD's when we booted a domU with
old Xen drivers in it.
With the newest kernel (4.9.34), this seems to be resolved.
I was wondering what caused this. And that patch triggered my attention
:)
Thanks
Je
On 04/07/17 13:54, Jean-Louis Dupond wrote:
> Hi All,
>
> We had some issues with BSOD's on Windows at startup when using some old
> Xen drivers inside Windows.
> Now when we upgrade to the most recent 4.9.x kernel. The issue seems to
> be resolved.
>
> Could it be that the following commit fixes
Hello all,
I'm trying to implement a single step functionality for XEN on ARMv8 using
"Software Step Exceptions". My problem with this is, that after taking the
exception the PC will stay on the same instruction.
By adding a "singlestep_enabled" flag in the "struct arch_domain" (based on
the sing
On 03.07.17 21:42, Meng Xu wrote:
As far as I know, there is no known issue for ARM as long as that
version Xen runs on the ARM board.
That's good.
I assume you have your own workloads to run, which are periodically
activated task.
The workloads in [1] are independent periodic CPU-intensive t
>>> On 04.07.17 at 14:12, wrote:
> When removing if/for/while statements, the code should be reworked to
> remove the { } and the extra indentation.
Yes.
> This is improving code maintainability and code readability.
For the given example, yes. However, there are (rare) cases where
having such
In order to correctly emulate read-modify-write insns, especially
LOCKed ones, we should not issue reads and writes separately. Use a
new hook to combine both, and don't uniformly read the memory
destination anymore. Instead, DstMem opcodes without Mov now need to
have done so in their respective c
Signed-off-by: Julien Grall
---
CODING_STYLE | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/CODING_STYLE b/CODING_STYLE
index 4c3b53a754..6cc5b774cf 100644
--- a/CODING_STYLE
+++ b/CODING_STYLE
@@ -4,11 +4,11 @@ Coding Style for the Xen Hypervisor
The Xen coding style de
When removing if/for/while statements, the code should be reworked to
remove the { } and the extra indentation. This is improving code
maintainability and code readability.
Signed-off-by: Julien Grall
---
This patch was triggered whilst reviewing a patch [1] on ARM that
remove the if sta
Hi All,
We had some issues with BSOD's on Windows at startup when using some old
Xen drivers inside Windows.
Now when we upgrade to the most recent 4.9.x kernel. The issue seems to
be resolved.
Could it be that the following commit fixes the issue:
https://git.kernel.org/pub/scm/linux/kernel/
This run is configured for baseline tests only.
flight 71632 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71632/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-i386-libvirt5 libvirt-buildfai
Devices are not unmounted inside a domU after a xl block-detach.
After xl block-detach, blkfront_closing() is called with state ==
XenbusStateConnected, it detects that the device is still in use and
only switches state to XenbusStateClosing. blkfront_closing() is called
a second time but returns
Hi,
On 07/03/2017 06:29 PM, Stefano Stabellini wrote:
On Sun, 2 Jul 2017, Julien Grall wrote:
Hi,
On 06/30/2017 10:19 PM, Stefano Stabellini wrote:
On Thu, 22 Jun 2017, Volodymyr Babchuk wrote:
PSCI handling code had helper routine that checked calling convention.
It does not needed anymore,
On Tue, Jul 04, 2017 at 12:30:58PM +0100, Roger Pau Monné wrote:
> On Tue, Jul 04, 2017 at 12:07:30PM +0100, Wei Liu wrote:
> > On Mon, Jul 03, 2017 at 03:25:52AM +0800, Xiong Zhang wrote:
> > > No functional change. Just extract this function for next patch and avoid
> > > code repetition.
> > >
On Mon, Jul 03, 2017 at 08:34:22AM +0200, Felix Schmoll wrote:
> Added an interactive option to the 'xl console'-command that
> forwards the input stream of the console to the underlying pty.
>
> Made corresponding changes to libxl, xl and xenconsole.
>
> Signed-off-by: Felix Schmoll
> ---
> to
On Tue, Jul 04, 2017 at 12:07:30PM +0100, Wei Liu wrote:
> On Mon, Jul 03, 2017 at 03:25:52AM +0800, Xiong Zhang wrote:
> > No functional change. Just extract this function for next patch and avoid
> > code repetition.
> >
> > Signed-off-by: Xiong Zhang
>
> Acked-by: Wei Liu
>
> Note to self:
1 - 100 of 155 matches
Mail list logo