This run is configured for baseline tests only.
flight 71953 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71953/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 2913ebb2b550f50a14f105e26995dd095e627ba4
baseline v
flight 112525 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112525/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 2913ebb2b550f50a14f105e26995dd095e627ba4
baseline version:
ovmf 9e2a8e928995c3b1bb664
This run is configured for baseline tests only.
flight 71952 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71952/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 9e2a8e928995c3b1bb664b73fd59785055c6b5f6
baseline v
On 17-08-09 09:09:10, Chao Peng wrote:
>
> > @@ -71,7 +78,6 @@ enum psr_feat_type {
> > /*
> > * This structure represents one feature.
> > * cos_max - The max COS registers number got through CPUID.
> > - * cbm_len - The length of CBM got through CPUID.
>
> As you are moving instead
Avoid panic in cpufreq_gov_stop.
Only execute the CPUFREQ_GOV_STOP logic if the governor has
actually been started.
Patch originated in OpenXT.
Signed-off-by: Christopher Clark
---
xen/drivers/cpufreq/cpufreq_ondemand.c | 4
1 file changed, 4 insertions(+)
diff --git a/xen/drivers/cpufre
flight 112521 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112521/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 5 host-build-prep fail REGR. vs. 112456
test-amd64-i386-x
> /* write_msr is used to write out feature MSR register. */
> void (*write_msr)(unsigned int cos, uint32_t val, enum
> psr_val_type type);
> +
> +/*
> + * check_change_val is used to check if input val fulfills SDM
> requirement.
> + * Change it to valid value if SDM allows.
> diff --git a/xen/include/asm-x86/psr.h b/xen/include/asm-x86/psr.h
> index 551ccf3..81da1c2 100644
> --- a/xen/include/asm-x86/psr.h
> +++ b/xen/include/asm-x86/psr.h
> @@ -38,7 +38,9 @@
> /* Used by psr_get_info() */
> #define PSR_INFO_IDX_COS_MAX0
> #define PSR_INFO_IDX_CAT_CBM_
flight 112519 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112519/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 17 guest-start.2fail REGR. vs. 112496
build-armhf-xsm
Move the point where interrupts are disabled in tboot_shutdown
to slightly later, to after the call to map_pages_to_xen.
This patch originated in OpenXT with the following report:
"Disabling interrupts early causes debug assertions.
This is only seen with debug builds but since it causes asserti
> @@ -71,7 +78,6 @@ enum psr_feat_type {
> /*
> * This structure represents one feature.
> * cos_max - The max COS registers number got through CPUID.
> - * cbm_len - The length of CBM got through CPUID.
As you are moving instead of removing the code, the comment can also
move togeth
flight 112522 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112522/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 9e2a8e928995c3b1bb664b73fd59785055c6b5f6
baseline version:
ovmf 4cf3f37c87ba1f9d58072
On Tue, Aug 8, 2017 at 3:52 PM, Dario Faggioli
wrote:
> On Tue, 2017-08-08 at 12:06 -0700, Meng Xu wrote:
>> On Tue, Aug 8, 2017 at 10:57 AM, Dario Faggioli
>> wrote:
>> > On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
>> > >
>> > > diff --git a/xen/include/public/domctl.h
>> > > b/xen/include
On Tue, Aug 8, 2017 at 3:24 PM, Dario Faggioli
wrote:
> On Tue, 2017-08-08 at 12:16 -0700, Meng Xu wrote:
>> On Tue, Aug 8, 2017 at 9:09 AM, Dario Faggioli
>> wrote:
>> > On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote:
>> > >
>> > > As to (1), if users want to set some VCPUs with extratime flag
On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
> This series of patches make RTDS scheduler work-conserving
> without breaking real-time guarantees.
> VCPUs with extratime flag set can get extra time
> from the unreserved system resource.
> System administrators can decide which VCPUs have extra
On Tue, 2017-08-08 at 12:06 -0700, Meng Xu wrote:
> On Tue, Aug 8, 2017 at 10:57 AM, Dario Faggioli
> wrote:
> > On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
> > >
> > > diff --git a/xen/include/public/domctl.h
> > > b/xen/include/public/domctl.h
> > > index 0669c31..ba5daa9 100644
> > > ---
On Tue, 2017-08-08 at 12:16 -0700, Meng Xu wrote:
> On Tue, Aug 8, 2017 at 9:09 AM, Dario Faggioli
> wrote:
> > On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote:
> > >
> > > As to (1), if users want to set some VCPUs with extratime flag
> > > set
> > > and
> > > some with extratime flag clear, th
flight 112517 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112517/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
When allocating pages in alloc_heap_pages() first look for clean pages. If none
is found then retry, take pages marked as unscrubbed and scrub them.
Note that we shouldn't find unscrubbed pages in alloc_heap_pages() yet. However,
this will become possible when we stop scrubbing from free_heap_page
Make buddy merging part of free_heap_pages() a bit more readable.
Signed-off-by: Boris Ostrovsky
---
Changes in v7:
* New in this version (this used to be part of patch 2, splitting
into separate patch)
xen/common/page_alloc.c | 29 ++---
1 file changed, 18 insertions(
Add a debug Kconfig option that will make page allocator verify
that pages that were supposed to be scrubbed are, in fact, clean.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
xen/Kconfig.debug | 7 ++
xen/common/page_alloc.c | 63 +++
Instead of scrubbing pages during guest destruction (from
free_heap_pages()) do this opportunistically, from the idle loop.
We might come to scrub_free_pages()from idle loop while another CPU
uses mapcache override, resulting in a fault while trying to do
__map_domain_page() in scrub_one_page(). T
Signed-off-by: Boris Ostrovsky
Reviewed-by: Wei Liu
---
xen/common/page_alloc.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
index 726f857..675ac0d 100644
--- a/xen/common/page_alloc.c
+++ b/xen/common/page_alloc.c
@@ -2314,6 +2314,
Changes in v7:
* Split free_heap_pages() buddy merge changes into a separate patch (patch 1)
* Changed type for page_info.u.free.need_tlbflush to bool:1
* Added BUILD_BUG_ON
* Adjusted datatype of temp variable in check_and_stop_scrub()
* Formatting changes
(see per-patch changes)
When a domain
While waiting for a lock we may want to periodically run some
code. This code may, for example, allow the caller to release
resources held by it that are no longer needed in the critical
section protected by the lock.
Specifically, this feature will be needed by scrubbing code where
the scrubber,
Instead of scrubbing pages while holding heap lock we can mark
buddy's head as being scrubbed and drop the lock temporarily.
If someone (most likely alloc_heap_pages()) tries to access
this chunk it will signal the scrubber to abort scrub by setting
head's BUDDY_SCRUB_ABORT bit. The scrubber checks
This will make code a bit more readable, especially with changes that
will be introduced in subsequent patches.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
xen/common/page_alloc.c | 139 +++-
1 file changed, 77 insertions(+), 62 deletions
.. so that it's easy to find pages that need to be scrubbed (those pages are
now marked with _PGC_need_scrub bit).
We keep track of the first unscrubbed page in a page buddy using first_dirty
field. For now it can have two values, 0 (whole buddy needs scrubbing) or
INVALID_DIRTY_IDX (the buddy doe
Hi Andrew
On 08.08.17 23:37, Andrew Cooper wrote:
On 08/08/2017 21:08, Volodymyr Babchuk wrote:
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 6cf9ee7..ed78b36 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1449,13 +1449,12 @@ static void do_debug_trap(struct c
Hi Julien,
On 28.07.17 23:37, Julien Grall wrote:
Hi,
On 07/28/2017 08:43 PM, Volodymyr Babchuk wrote:
On ARMv8 architecture SMC instruction in aarch32 state can be
conditional.
version + paragraph please.
Also, ARMv8 supports both AArch32 and AArch64. As I said in my answer on
"arm: smccc
On 08/08/2017 21:08, Volodymyr Babchuk wrote:
> diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
> index 6cf9ee7..ed78b36 100644
> --- a/xen/arch/arm/traps.c
> +++ b/xen/arch/arm/traps.c
> @@ -1449,13 +1449,12 @@ static void do_debug_trap(struct cpu_user_regs *regs,
> unsigned int code)
>
This run is configured for baseline tests only.
flight 71951 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71951/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4cf3f37c87ba1f9d58072444bd735e40e4779e70
baseline v
From: Volodymyr Babchuk
There are standard functions set_user_reg() and get_user_reg(). We can
use them in PSCI_SET_RESULT()/PSCI_ARG() macroses instead of relying on
CONFIG_ARM_64 definition.
Signed-off-by: Volodymyr Babchuk
---
xen/arch/arm/traps.c | 38 +-
PSCI handling code had helper routine that checked calling convention.
It does not needed anymore, because:
- Generic handler checks that 64 bit calls can be made only by
64 bit guests.
- SMCCC requires that 64-bit handler should support both 32 and 64 bit
calls even if they originate fro
PSCI is part of HVC/SMC interface, so it should be handled in
appropriate place: `vsmc.c`. This patch just moves PSCI
handler calls from `traps.c` to `vsmc.c`.
PSCI is considered as two different "services" in terms of SMCCC.
Older PSCI 1.0 is treated as "architecture service", while never
PSCI 2.
vsmc.h provides definitions to construct SMC call function number according
to SMCCC. We don't need multiple definitions for one thing, and definitions
in vsmc.h are more generic than ones used in psci.h.
So psci.h will only provide function codes and whole SMC function number
will be constructed
From: Volodymyr Babchuk
The following list of functions:
- advance_pc()
- check_conditional_instr()
- inject_undef_exception()
- inject_iabt_exception()
- inject_dabt_exception()
- inject_vabt_exception()
are now globaly visible. This change is needed becase we plan to handle SMCs
in diff
On certain ARM arhcitectures SMC instruction can be conditional
(ARM DDI 0487A.k page D7-1949) and we need to check if that
conditional was meet.
Signed-off-by: Volodymyr Babchuk
---
This patch was separated from the next one
---
xen/arch/arm/traps.c | 6 ++
1 file changed, 6 insertions(+)
Hello all,
This is third version. Instead of 4 patches, there are 7 now.
As part of the series, I make some functions in traps.c
available globally, moved SMC conditional check into
separate patch, changed how PSCI functiond numbers are defined.
Per-patch changes are described in corresponding pa
SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs.
SMCCC states that both HVC and SMC are valid conduits to call to a different
firmware functions. Thus, for example PSCI calls can be made both by
SMC or HVC. Also SMCCC defines function number coding for such calls.
Besides fun
On Tue, Aug 8, 2017 at 9:09 AM, Dario Faggioli
wrote:
> On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote:
>> On Sun, Aug 6, 2017 at 12:22 PM, Meng Xu
>> wrote:
>> >
>> > diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c
>> > index 2c71a9f..88933a4 100644
>> > --- a/tools/xl/xl_cmdtable
On Tue, Aug 8, 2017 at 10:57 AM, Dario Faggioli
wrote:
> On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
>> Make RTDS scheduler work conserving without breaking the real-time
>> guarantees.
>>
>> VCPU model:
>> Each real-time VCPU is extended to have an extratime flag
>> and a priority_level fie
flight 112514 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112514/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
test-amd64-amd64-xl
On Tue, Aug 8, 2017 at 12:06 PM, Petre Pircalabu wrote:
> If case of a vm_event with the emulate_flags set, if the instruction
> is not implemented by the emulator, the monitor should be notified instead
> of directly injecting a hw exception.
> This behavior can be used to re-execute an instruct
This patchset implements a new way of handling the instructions unimplemented
in x86emul. Instead of inserting a hardware exception the monitor will
be notified and it will to try to single-step the faulty instruction using the
real processor and then resume execution of the normal instruction flow
If case of a vm_event with the emulate_flags set, if the instruction
is not implemented by the emulator, the monitor should be notified instead
of directly injecting a hw exception.
This behavior can be used to re-execute an instruction not supported by
the emulator using the real processor (e.g. a
Enforce the distinction between an instruction not implemented by the
emulator and the failure to emulate that instruction by defining a new
return code, X86EMUL_UNIMPLEMENTED.
This value should only be used by the core emulator if it fails to decode
the current instruction, and not by any of the
flight 112518 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112518/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4cf3f37c87ba1f9d58072444bd735e40e4779e70
baseline version:
ovmf 6e414300b5f19d3045a0d
Regular BUG_ON()'s work fine by this point on all architectures, so drop the
custom infrastructure. Substitute BUG_ON(1) for BUG().
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Stefano Stabellini
CC: Julien Grall
---
xen/common/page_alloc.c | 16
1 file changed, 4 in
Xen allows shared mapping to be Normal inner-cacheable with any inner cache
allocation strategy and no restriction of the outer-cacheability.
However, Xen is always mapping those region Normal Inner Write-Back
Outer Write-Back Inner-shareable. Per B2.8 "Mismatched memory
attributes" in ARM DDI 048
flight 112516 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112516/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
112456
test-armhf
Hi Stefano,
On Wed, Aug 2, 2017 at 12:15 AM, Stefano Stabellini
wrote:
[...]
> The main thing that will be different is the list of dependencies you
> need to install to build Xen. On Fedora it should be (I am using
> Raisin[1] as a reference):
Thank you for the pointer to Raisin.
I have mana
On Tue, 8 Aug 2017, Julien Grall wrote:
> On 01/08/17 18:13, Oleksandr Tyshchenko wrote:
> > Hi, Julien
> >
> > On Tue, Aug 1, 2017 at 3:27 PM, Julien Grall wrote:
> > > On 26/07/17 16:09, Oleksandr Tyshchenko wrote:
> > > >
> > > > From: Oleksandr Tyshchenko
> > > >
> > > > Hi, all.
> > >
>
Wei
On 31/07/17 12:22, Wei Liu wrote:
> A document for the release manager.
>
> Signed-off-by: Wei Liu
Reviewed-by: Lars Kurth
Regards
Lars
On 08/08/2017, 12:03, "Julien Grall" wrote:
Hi Wei,
On 31/07/17 12:22, Wei Liu wrote:
> A document for th
On 08/08/2017 06:20 PM, Andrew Cooper wrote:
> On 08/08/17 16:28, Sergej Proskurin wrote:
>> On 08/08/2017 05:18 PM, Julien Grall wrote:
>>> On 08/08/17 16:17, Sergej Proskurin wrote:
Hi Julien,
On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
> This commit adds functionali
On Tue, 8 Aug 2017, Wei Liu wrote:
> On Tue, Aug 08, 2017 at 09:19:21AM -0700, Stefano Stabellini wrote:
> > On Tue, 8 Aug 2017, Wei Liu wrote:
> > > Ian and Stefano
> > >
> > > Oleksandr discovered that the p9fs array in libxl_domain_config is name
> > > p9 instead of p9s. This causes problem for
On Tue, Aug 08, 2017 at 09:19:21AM -0700, Stefano Stabellini wrote:
> On Tue, 8 Aug 2017, Wei Liu wrote:
> > Ian and Stefano
> >
> > Oleksandr discovered that the p9fs array in libxl_domain_config is name
> > p9 instead of p9s. This causes problem for his work to rework device
> > framework.
> >
On 08/08/17 16:28, Sergej Proskurin wrote:
>
> On 08/08/2017 05:18 PM, Julien Grall wrote:
>>
>> On 08/08/17 16:17, Sergej Proskurin wrote:
>>> Hi Julien,
>>>
>>>
>>> On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
This commit adds functionality to walk the guest's page tables using
the
>
On Tue, 8 Aug 2017, Wei Liu wrote:
> Ian and Stefano
>
> Oleksandr discovered that the p9fs array in libxl_domain_config is name
> p9 instead of p9s. This causes problem for his work to rework device
> framework.
>
> Given that p9fs was added only during last release and the only known
> external
On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote:
> On Sun, Aug 6, 2017 at 12:22 PM, Meng Xu
> wrote:
> >
> > diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c
> > index 2c71a9f..88933a4 100644
> > --- a/tools/xl/xl_cmdtable.c
> > +++ b/tools/xl/xl_cmdtable.c
> > @@ -272,12 +272,13 @@
Hi Bhupinder,
I gave another and I have a couple of comments.
Booting Linux with earlycon enabled take quite a while. I can see the
characters coming slower than on the minitel. It seems to be a bit
better after switching off the bootconsole. Overall Linux is taking ~20
times to boot with pl0
We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ
vectors that are available to each processor. Currently, when x2apic
cluster mode is used (which is default), each vector is shared among
all processors in the cluster. With many IRQs (as is the case on systems
with multiple SR-I
On Wed, Aug 02, 2017 at 07:34:28AM -0600, Jan Beulich wrote:
> >>> Roger Pau Monne 06/30/17 5:01 PM >>>
> >+int vpci_msi_arch_enable(struct vpci_arch_msi *arch, struct pci_dev *pdev,
> >+ uint64_t address, uint32_t data, unsigned int
> >vectors)
> >+{
> >+struct msi_in
On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
> Modify libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
> functions to support per-VCPU extratime flag
>
> Signed-off-by: Meng Xu
>
Reviewed-by: Dario Faggioli
Of course, if the flag name in domctl.h change, this will have to
chang
On 08/08/2017 05:18 PM, Julien Grall wrote:
>
>
> On 08/08/17 16:17, Sergej Proskurin wrote:
>> Hi Julien,
>>
>>
>> On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
>>> This commit adds functionality to walk the guest's page tables using
>>> the
>>> short-descriptor translation table format for bo
On 08/08/17 16:17, Sergej Proskurin wrote:
Hi Julien,
On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
This commit adds functionality to walk the guest's page tables using the
short-descriptor translation table format for both ARMv7 and ARMv8. The
implementation is based on ARM DDI 0487B-a J1
Hi Julien,
On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
> This commit adds functionality to walk the guest's page tables using the
> short-descriptor translation table format for both ARMv7 and ARMv8. The
> implementation is based on ARM DDI 0487B-a J1-6002 and ARM DDI 0406C-b
> B3-1506.
>
> S
On Tue, Aug 08, 2017 at 09:51:36AM -0500, Venu Busireddy wrote:
> I will implement all your above suggestions in v4.
>
> > I think a bigger question is whether you agree with Ian's comments
> > regarding API design and whether you have more questions?
>
> Ian suggested that I document the use of
Ian and Stefano
Oleksandr discovered that the p9fs array in libxl_domain_config is name
p9 instead of p9s. This causes problem for his work to rework device
framework.
Given that p9fs was added only during last release and the only known
external toolstack libvirt can't possibility use that, mayb
On Tue, Aug 08, 2017 at 03:39:23PM +0300, Oleksandr Grytsov wrote:
> On Fri, Aug 4, 2017 at 2:53 PM, Wei Liu wrote:
> > On Wed, Aug 02, 2017 at 02:37:10PM +0300, Oleksandr Grytsov wrote:
> > [...]
> >> >> >> From other side this rename touches only internals changes: no
> >> >> >> changes
> >> >>
On 08/08/2017 04:58 PM, Andrew Cooper wrote:
> On 08/08/17 15:47, Sergej Proskurin wrote:
>> Hi Julien,
>>
>>> The patch belows solve my problem:
>>>
>>> diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c
>>> index b258248322..6ca994e438 100644
>>> --- a/xen/arch/arm/guest_walk.c
>
On 08/08/17 15:47, Sergej Proskurin wrote:
> Hi Julien,
>
>> The patch belows solve my problem:
>>
>> diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c
>> index b258248322..6ca994e438 100644
>> --- a/xen/arch/arm/guest_walk.c
>> +++ b/xen/arch/arm/guest_walk.c
>> @@ -112,7 +112,7 @
On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
> Make RTDS scheduler work conserving without breaking the real-time
> guarantees.
>
> VCPU model:
> Each real-time VCPU is extended to have an extratime flag
> and a priority_level field.
> When a VCPU's budget is depleted in the current period,
>
Hi Julien,
>>
>> diff --git a/tools/libxl/libxl_arm.c b/tools/libxl/libxl_arm.c
>> index a33d3c9..6629852 100644
>> --- a/tools/libxl/libxl_arm.c
>> +++ b/tools/libxl/libxl_arm.c
>> @@ -43,11 +43,29 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
>> {
>> uint32_t nr_spis = 0;
>>
On 2017-08-08 15:33:01 +0100, Wei Liu wrote:
> On Mon, Aug 07, 2017 at 06:54:56PM -0500, Venu Busireddy wrote:
> > Implement the callback function to handle unrecoverable AER errors, and
> > also the public APIs that can be used to register/unregister the handler.
> > When an AER error occurs, the
Hi Julien,
> The patch belows solve my problem:
>
> diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c
> index b258248322..6ca994e438 100644
> --- a/xen/arch/arm/guest_walk.c
> +++ b/xen/arch/arm/guest_walk.c
> @@ -112,7 +112,7 @@ static int guest_walk_sd(const struct vcpu *v,
>
On Tue, Aug 08, 2017 at 03:33:01PM +0100, Wei Liu wrote:
> > +
> > +int libxl_reg_aer_events_handler(libxl_ctx *ctx,
> > + uint32_t domid,
> > + libxl_aer_watch **aer_ws_out)
>
> Afaict libxl_aer_watch is an opaque type to external ca
On 08/08/17 16:26, Asharaf Perinchikkal wrote:
> Hi All,
>
> I am attaching xen boot log when xen fail to boot with updated kernel
> from UEFI shell.
> It show an error when kernel start booting..
>
> N) ***
> (XEN) WARNING: CONSOLE OUTPUT IS SYNCHR
On Mon, Aug 07, 2017 at 06:54:56PM -0500, Venu Busireddy wrote:
> Implement the callback function to handle unrecoverable AER errors, and
> also the public APIs that can be used to register/unregister the handler.
> When an AER error occurs, the handler will forcibly remove the erring
> PCIe device
Hi All,
I am attaching xen boot log when xen fail to boot with updated kernel from UEFI
shell.
It show an error when kernel start booting..
N) ***
(XEN) WARNING: CONSOLE OUTPUT IS SYNCHRONOUS
(XEN) This option is intended to aid debugging of Xen by
Hi,
On 07/08/17 09:53, Bhupinder Thakur wrote:
1. Update documentation for a new vuart option added.
2. Update documentation about SPI irq reserved for vuart.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Coope
On 07/08/17 09:53, Bhupinder Thakur wrote:
The SBSA UART node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and consequently lives
On 08/08/2017 09:28 AM, Andrew Cooper wrote:
> On 08/08/17 14:25, Boris Ostrovsky wrote:
>> On 08/08/2017 05:48 AM, Jan Beulich wrote:
>> Andrew Cooper 08/07/17 7:19 PM >>>
More than once, we've discussed freeing up the legacy PIC range of
vectors, and freeing up the unallocated vect
On 08/08/2017 02:46 AM, Juergen Gross wrote:
> On 28/07/17 12:23, Juergen Gross wrote:
>> This patch series fixes a regression introduced in 4.13-rc1: A Xen
>> HVM guest with KASLR enabled wouldn't boot any longer due to the usage
>> of __va() before kernel_randomize_memory() was called.
>>
>> Chan
Hi Bhupinder,
On 07/08/17 09:52, Bhupinder Thakur wrote:
diff --git a/tools/libxl/libxl_arch.h b/tools/libxl/libxl_arch.h
index 5e1fc60..784ec7f 100644
--- a/tools/libxl/libxl_arch.h
+++ b/tools/libxl/libxl_arch.h
@@ -44,6 +44,13 @@ int libxl__arch_domain_finalise_hw_description(libxl__gc *gc,
On Mon, Aug 07, 2017 at 02:23:14PM +0530, Bhupinder Thakur wrote:
> This patch finally adds the support for vuart console. It adds
> two new fields in the console initialization:
>
> - optional
> - use_gnttab
>
> optional flag tells whether the console is optional.
>
> use_gnttab tells whether t
On Mon, Aug 07, 2017 at 02:23:13PM +0530, Bhupinder Thakur wrote:
> This patch adds the support for multiple consoles and introduces the
> iterator functions to operate on multiple consoles.
>
Please check all the functions called by the iterator functions to make
sure they have properly guarded
flight 112515 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112515/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1 build-check(1)
Hi,
On 08/08/17 14:30, Wei Liu wrote:
On Tue, Aug 08, 2017 at 02:11:08PM +0100, Wei Liu wrote:
+else
+rc = -EINVAL;
Indentation.
Ignore this please.
You were right, the indentation is wrong :). It is 8 spaces rather than 4.
Cheers,
--
Julien Grall
On 08/08/17 14:38, Julien Grall wrote:
Hi Bhupinder,
On 07/08/17 09:52, Bhupinder Thakur wrote:
diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
index 229e289..90eaa20 100644
--- a/tools/libxl/libxl.h
+++ b/tools/libxl/libxl.h
@@ -306,6 +306,11 @@
#define LIBXL_HAVE_BUILDINFO_HVM_ACPI_
Hi Bhupinder,
On 07/08/17 09:52, Bhupinder Thakur wrote:
diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
index 229e289..90eaa20 100644
--- a/tools/libxl/libxl.h
+++ b/tools/libxl/libxl.h
@@ -306,6 +306,11 @@
#define LIBXL_HAVE_BUILDINFO_HVM_ACPI_LAPTOP_SLATE 1
/*
+ * LIBXL_HAVE_VUART i
If we take TSC-deadline mode timer out of the picture, the Intel SDM
does not say that the timer is disable when the timer mode is change,
either from one-shot to periodic or vice versa.
After this patch, the timer is no longer disarmed on change of mode, so
the counter (TMCCT) keeps counting down
Hi,
When developing PVH for OVMF, I've used the lapic timer. It turns out that the
way it is used by OVMF did not work with Xen [1]. I tried to find out how
real-hw behave, and write a XTF tests [2]. And this patch series tries to fix
the behavior of the vlapic timer.
The OVMF driver for the APIC
There should not be any functionality change with this patch.
This function is used when the APIC_TMICT register is updated.
vlapic_update_timer is introduce as it will be use also when the
registers APIC_LVTT and APIC_TDCR are updated.
Signed-off-by: Anthony PERARD
---
Changes in V3:
- removed
The description in the Intel SDM of how the divide configuration
register is used: "The APIC timer frequency will be the processor's bus
clock or core crystal clock frequency divided by the value specified in
the divide configuration register."
Observation of baremetal shown that when the TDCR is
On Mon, Aug 07, 2017 at 02:23:11PM +0530, Bhupinder Thakur wrote:
> This patch introduces a console_open_log console_cleanup function. This
> function
> opens the console log file.
>
> Signed-off-by: Bhupinder Thakur
> Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
___
On Tue, Aug 08, 2017 at 02:11:08PM +0100, Wei Liu wrote:
> > +else
> > +rc = -EINVAL;
>
> Indentation.
Ignore this please.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Mon, Aug 07, 2017 at 02:23:10PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_cleanup function. This function
> frees up the console resources.
>
> Signed-off-by: Bhupinder Thakur
> Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
___
On 08/08/17 14:25, Boris Ostrovsky wrote:
> On 08/08/2017 05:48 AM, Jan Beulich wrote:
> Andrew Cooper 08/07/17 7:19 PM >>>
>>> More than once, we've discussed freeing up the legacy PIC range of
>>> vectors, and freeing up the unallocated vectors in 0xfx.
>> And that's something I would prefer
On 08/08/2017 05:48 AM, Jan Beulich wrote:
Andrew Cooper 08/07/17 7:19 PM >>>
>> More than once, we've discussed freeing up the legacy PIC range of
>> vectors, and freeing up the unallocated vectors in 0xfx.
> And that's something I would prefer over the change proposed here,
> albeit I reali
1 - 100 of 132 matches
Mail list logo