This run is configured for baseline tests only.
flight 72034 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72034/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 51ce27fd8c583845480858eda503f38e8b42d619
baseline v
Hi,
I'm following instructions on https://wiki.xenproject.org/wiki/HiKey and
https://github.com/Jeeppler/xen-note/blob/master/
arm64/hikey/hikey-xen-centos.md.
I'm trying to boot Xen on Hikey but Dom0 doesn't boot after Xen! I can boot
the linux individually with startup.sh. This works fine but w
flight 112910 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112910/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail in 112900
pass in 112910
test-amd64-i386-xl
On 2017年08月25日 18:36, Roger Pau Monné wrote:
> On Thu, Aug 24, 2017 at 10:52:18PM -0400, Lan Tianyu wrote:
>> This patch is to change DSDT table for processor object to support >255
>> vcpus.
>
> The note in ACPI 6.1A spec section 5.2.12.12 contains the following:
>
> [Compatibility note] On som
On 2017年08月25日 20:01, Jan Beulich wrote:
On 25.08.17 at 12:36, wrote:
>> On Thu, Aug 24, 2017 at 10:52:18PM -0400, Lan Tianyu wrote:
>>> This patch is to change DSDT table for processor object to support >255
>> vcpus.
>>
>> The note in ACPI 6.1A spec section 5.2.12.12 contains the following
flight 112911 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112911/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 51ce27fd8c583845480858eda503f38e8b42d619
baseline version:
ovmf ef5e0db22cdd73e9727af
On 2017年08月25日 22:10, Meng Xu wrote:
> Hi Tianyu,
>
> On Thu, Aug 24, 2017 at 10:52 PM, Lan Tianyu wrote:
>>
>> This patchset is to extend some resources(i.e, event channel,
>> hap and so) to support more vcpus for single VM.
>>
>>
>> Chao Gao (1):
>> xl/libacpi: extend lapic_id() to uint32_t
>
On Mon, Aug 28, 2017 at 06:58:37PM -0400, John Snow wrote:
>
>
> On 08/25/2017 03:39 PM, Eduardo Habkost wrote:
> > CCing maintainers of affected devices (sorry for not CCing you
> > before).
> >
> > On Wed, Aug 23, 2017 at 07:14:44PM -0300, Eduardo Habkost wrote:
> >> Add INTERFACE_LEGACY_PCI_D
flight 112909 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112909/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-2 48 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 112851
test-xtf-amd64-
On 2017年08月25日 18:11, Roger Pau Monné wrote:
> On Thu, Aug 24, 2017 at 10:52:19PM -0400, Lan Tianyu wrote:
>> This patch is to add x2apic entry support for ACPI MADT table.
>>
>> Signed-off-by: Lan Tianyu
>> Signed-off-by: Chao Gao
>> ---
>> tools/libacpi/acpi2_0.h | 10
>> tools/libacp
flight 112908 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112908/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-4 48 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 112871
test-amd64-i386
On 08/25/2017 03:39 PM, Eduardo Habkost wrote:
> CCing maintainers of affected devices (sorry for not CCing you
> before).
>
> On Wed, Aug 23, 2017 at 07:14:44PM -0300, Eduardo Habkost wrote:
>> Add INTERFACE_LEGACY_PCI_DEVICE to all direct subtypes of
>> TYPE_PCI_DEVICE, except:
>>
>> 1) The on
flight 112907 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112907/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 16 guest-localmigrate/x10 fail REGR.
vs. 112872
test
On 6/12/2017 7:24 AM, Julien Grall wrote:
> Hi Sameer,
>
> On 08/06/17 20:30, Sameer Goel wrote:
>> Add limited support for parsing IORT table to initialize SMMU devices.
>
> It would be nice to explain what you actually support in the commit message.
>
> [...]
>
>>
>> #define IORT_TYPE_MASK
On 6/9/2017 5:15 AM, Robin Murphy wrote:
> On 08/06/17 20:30, Sameer Goel wrote:
> [...]
>> /**
>> - * iort_iommu_configure - Set-up IOMMU configuration for a device.
>> + * iort_iommu_configure - Set-up IOMMU configuration for a device. This
>> + * function sets up the fwspec as needed for a gi
On 6/12/2017 6:40 AM, Julien Grall wrote:
> Hi,
>
> On 08/06/17 22:57, Stefano Stabellini wrote:
>> On Thu, 8 Jun 2017, Goel, Sameer wrote:
> diff --git a/xen/include/xen/fwnode.h b/xen/include/xen/fwnode.h
> new file mode 100644
> index 000..db65b15
> --- /dev/null
> +++
On 6/12/2017 6:51 AM, Julien Grall wrote:
> Hi Sameer,
>
> On 08/06/17 22:42, Goel, Sameer wrote:
>> On 6/8/2017 1:59 PM, Julien Grall wrote:
>>>
>>>
>>> On 08/06/2017 20:30, Sameer Goel wrote:
This will be used as a device property to match the DMA capable devices
with the associated
On 6/9/2017 3:44 AM, Wei Liu wrote:
> On Thu, Jun 08, 2017 at 08:49:01PM +0100, Julien Grall wrote:
>> CC the REST maintainers
>>
>> On 08/06/2017 20:30, Sameer Goel wrote:
>>> Introduce a memory realloc function.
>>>
>>> Signed-off-by: Sameer Goel
>>> ---
>>> xen/common/xmalloc_tlsf.c | 13 +++
flight 112906 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112906/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 7 xen-boot fail REGR. vs. 112853
test-amd64-i386-xl-q
On 08/28/2017 11:41 AM, Jan Beulich wrote:
On 28.08.17 at 16:35, wrote:
>> On 08/28/2017 03:38 AM, Jan Beulich wrote:
> And finally I continue to be not really happy about the change as
> a whole. Despite what was discussed on v1, I'm concerned of the
> effects of this on hosts _n
If boot-time scrubbing is turned off we don't check pages in
check_one_page(). Thus there is no reason to ever poison them.
Signed-off-by: Boris Ostrovsky
---
xen/common/page_alloc.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
index 7d
Once pages are removed from the heap we don't need to hold the heap
lock. It is especially useful to drop it for an unscrubbed buddy since
we will be scrubbing it.
Signed-off-by: Boris Ostrovsky
---
xen/common/page_alloc.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a
scrub_heap_pages() does early return if boot-time scrubbing is
disabled, neglecting to initialize lowmem VIRQ.
Signed-off-by: Boris Ostrovsky
---
xen/common/page_alloc.c | 12
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/xen/common/page_alloc.c b/xen/common/page_all
There is no need to scrub pages freed during dom0 construction
since heap will be scrubbed once dom0 is ready (by scrub_heap_pages()).
Since boot_scrub_done will not be set if boot-time scrubbing is off we
also check for domain state.
Signed-off-by: Boris Ostrovsky
---
xen/common/page_alloc.c |
First patch fixes a long-standing bug where a low memory monitor is
not initializes if boottime scrubbing is turned off.
The other threee patches are performace optimizations.
Boris Ostrovsky (4):
mm: Initialize lowmem virq when boot-time scrubbing is disabled
mm: Don't poison a page if boot-
Hi Julien,
On 24.08.17 18:00, Julien Grall wrote:
Hi Volodymyr,
Title: No need for the full stop.
On 21/08/17 21:27, Volodymyr Babchuk wrote:
This patch adds generic definitions used in ARM SMC call convention.
Those definitions was taken from linux header arm-smccc.h, extended
and formatted
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.13
.. which as a bug-fix when shutting down xen block backend driver with
multiple queues and the driver not clearing all of them.
Thank you!
If you pull it in your
flight 112912 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112912/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
On Mon, Aug 28, 2017 at 02:40:14PM -0400, Konrad Rzeszutek Wilk wrote:
> Commit d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe introduced
> the support for this, but it does not work under x86 (as it stops
> 20_linux_xen from running).
>
> The 20_linux_xen is run under a shell and any exits from within
Commit d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe introduced
the support for this, but it does not work under x86 (as it stops
20_linux_xen from running).
The 20_linux_xen is run under a shell and any exits from within it:
(For example on x86):
+ /usr/bin/grub2-file --is-arm64-efi /boot/xen-4.9.0.g
The multiboot2 is much more preferable than multiboot. Especiall
if booting under EFI where multiboot does not have the functionality
to pass ImageHandler.
Signed-off-by: Konrad Rzeszutek Wilk
---
v2: Rebase on top of d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe
---
util/grub.d/20_linux_xen.in | 4
Hey,
The first patch:
[PATCH 1/2] Fix util/grub.d/20_linux_xen.in: Add xen_boot command
is a fix discovered on Fedora rawhide where I was surprised to see that
grub2-mkconfig would not create a configuration file anymore.
See https://bugzilla.redhat.com/show_bug.cgi?id=1486002 for details.
The
Il 28 Ago 2017 16:49, George Dunlap ha scritto:
On 07/27/2017 01:05 PM, Dario Faggioli wrote:
> By, basically, moving all the logic of the function
> inside the usual two steps (soft-affinity step and
> hard-affinity step) loop.
>
> While there, add two performance counters (in cpu_pick
> and in g
flight 112904 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112904/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
Otherwise a stale generated Kconfig may still be used after a tree-wide clean.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Ian Jackson
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei Liu
---
xen/include/Makefile | 2 +-
1 file changed, 1
flight 112902 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112902/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 18 guest-start/win.repeat fail REGR. vs.
112809
test-amd64-
Il 28 Ago 2017 16:40, George Dunlap ha scritto:
On 07/27/2017 01:05 PM, Dario Faggioli wrote:
> Soft-affinity support is usually implemented by means
> of a two step "balancing loop", where:
> - during the first step, we consider soft-affinity
> (if the vcpu has one);
> - during the second (if w
From: Oleksandr Tyshchenko
Oleksandr Tyshchenko (2):
xen/arm: vgic: Check for vgic handler to be initialized before
dereferencing it
xen/arm: p2m: Check for p2m->domain to be initialized before releasing
resources
xen/arch/arm/p2m.c | 13 -
xen/arch/arm/vgic.c | 3 ++-
From: Oleksandr Tyshchenko
Since domain_vgic_free() can be called when the vgic_ops haven't been
initialised yet, always check that d->arch.vgic.handler is not a null.
Signed-off-by: Oleksandr Tyshchenko
---
xen/arch/arm/vgic.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --gi
From: Oleksandr Tyshchenko
Since p2m_teardown() can be called when p2m_init() haven't executed yet
we might deal with unitialized list "p2m->pages" which leads to crash.
To avoid this use back pointer to domain as end-of-initialization indicator.
Signed-off-by: Oleksandr Tyshchenko
---
xen/arc
Hi, Stefano, Julien.
On Fri, Aug 25, 2017 at 11:06 PM, Stefano Stabellini
wrote:
> On Wed, 23 Aug 2017, Julien Grall wrote:
>> Hi Oleksandr,
>>
>> On 21/08/17 16:53, Oleksandr Tyshchenko wrote:
>> > On Thu, Aug 10, 2017 at 6:13 PM, Julien Grall wrote:
>> > > On 10/08/17 15:27, Oleksandr Tyshchen
On Fri, Aug 25, 2017 at 05:35:47PM -0400, Daniel Sabogal wrote:
> With musl, the build fails with the following errors:
>
> actypes.h:202:2: error: #error unknown ACPI_MACHINE_WIDTH
>#error unknown ACPI_MACHINE_WIDTH
> ^
> actypes.h:207:9: error: unknown type name ‘acpi_native_uint
On 07/18/2017 11:34 AM, Sergey Dyasli wrote:
> Nested p2m (shadow EPT) is an object that stores memory address
> translations from L2 GPA directly to L0 HPA. This is achieved by
> combining together L1 EPT tables with L0 EPT during L2 EPT violations.
>
> In the usual case, L1 uses the same EPTP va
On 07/18/2017 11:34 AM, Sergey Dyasli wrote:
> Modify p2m_get_nestedp2m() to allow sharing a np2m between multiple
> vcpus with the same np2m_base (L1 EPTP value in VMCS12).
>
> np2m_schedule_in/out() callbacks are added to context_switch() as well
> as pseudo schedule-out is performed during virt
On Mon, Aug 28, 2017 at 02:25:49PM +0530, Bhupinder Thakur wrote:
> Add a new domctl API to initialize vpl011. It takes the GFN and console
> backend domid as input and returns an event channel to be used for
> sending and receiving events from Xen.
>
> Xen will communicate with xenconsole using G
On Mon, Aug 28, 2017 at 02:26:04PM +0530, Bhupinder Thakur wrote:
> This patch adds the support for multiple consoles and introduces the
> iterator functions to operate on multiple consoles.
>
> The functions called by the iterators check that they are operating
> on valid I/O parameters. This ens
On 07/18/2017 11:34 AM, Sergey Dyasli wrote:
> np2m maintenance is required for a nested vcpu during scheduling:
>
> 1. On schedule-out: clear pCPU's bit in p2m->dirty_cpumask
> to prevent useless IPIs.
>
> 2. On schedule-in: check if np2m is up to date and wasn't
On Mon, Aug 28, 2017 at 02:25:54PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_init function. This function
> initializes the console structure.
>
> Signed-off-by: Bhupinder Thakur
It appears that you forgot to collect my ack:
Acked-by: Wei Liu
___
On Mon, Aug 28, 2017 at 02:25:49PM +0530, Bhupinder Thakur wrote:
> Add a new domctl API to initialize vpl011. It takes the GFN and console
> backend domid as input and returns an event channel to be used for
> sending and receiving events from Xen.
>
> Xen will communicate with xenconsole using G
On 07/18/2017 11:34 AM, Sergey Dyasli wrote:
> The new variable will indicate if update of a shadow EPTP is needed
*element
> prior to vmentry. Update is required if a nested vcpu gets a new np2m
> or if its np2m was flushed by an IPI.
>
> Helper function nvcpu_flush() is added.
Passive voice i
On 07/18/2017 11:34 AM, Sergey Dyasli wrote:
> Add np2m_generation variable to both p2m_domain and nestedvcpu.
s/variable/element;
BTW still trying to get a feel for the whole series. Patches w/o
comments (or with minor comments like this) look plausible but I won't
know what I think of the whol
On 07/18/2017 11:34 AM, Sergey Dyasli wrote:
> The new function finds all np2m objects with the specified eptp and
> flushes them. p2m_flush_table_locked() is added in order not to release
> the p2m lock after np2m_base check.
>
> Signed-off-by: Sergey Dyasli
This patch looks plausible except fo
On 28/08/17 16:02, Jan Beulich wrote:
On 28.08.17 at 16:49, wrote:
>> Commit 63e8a1e5ffa7a7fdbde887805f673fea7e8d2e94 ("xen: check parameter
>> validity when parsing command line") introduced a bug for the case
>> when a boolean parameter was specified by its keyword only (no value).
>> It wo
On Mon, Aug 28, 2017 at 7:29 AM, Jan Beulich wrote:
On 28.08.17 at 14:51, wrote:
>> --- a/xen/include/asm-arm/monitor.h
>> +++ b/xen/include/asm-arm/monitor.h
>> @@ -26,6 +26,12 @@
>> #include
>>
>> static inline
>> +void arch_allow_userspace(struct domain *d, uint8_t allow_userspace)
>>
On Mon, Aug 28, 2017 at 5:10 AM, Jan Beulich wrote:
On 28.08.17 at 11:38, wrote:
>> In some introspection usecases, an in-guest agent needs to communicate
>> with the external introspection agent. An existing mechanism is
>> HVMOP_guest_request_vm_event, but this is restricted to kernel use
> diff --git a/xen/common/monitor.c b/xen/common/monitor.c
> index 451f42f..0c3e645 100644
> --- a/xen/common/monitor.c
> +++ b/xen/common/monitor.c
> @@ -75,6 +75,7 @@ int monitor_domctl(struct domain *d, struct
> xen_domctl_monitor_op *mop)
> domain_pause(d);
> d->monitor.guest
>>> On 28.08.17 at 16:35, wrote:
> On 08/28/2017 03:38 AM, Jan Beulich wrote:
>>
And finally I continue to be not really happy about the change as
a whole. Despite what was discussed on v1, I'm concerned of the
effects of this on hosts _not_ suffering from vector shortage.
Coul
On Mon, Aug 28, 2017 at 01:27:46AM -0600, Jan Beulich wrote:
> >>> On 25.08.17 at 18:05, wrote:
> > On Fri, Aug 25, 2017 at 09:54:18AM -0600, Jan Beulich wrote:
> >> >>> On 25.08.17 at 17:25, wrote:
> >> > On Wed, Aug 16, 2017 at 06:20:01AM -0600, Jan Beulich wrote:
> >> >> So far callers of the
On Mon, Aug 28, 2017 at 12:38:46PM +0300, Alexandru Isaila wrote:
> In some introspection usecases, an in-guest agent needs to communicate
> with the external introspection agent. An existing mechanism is
> HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
> like all other hy
On Mon, Aug 28, 2017 at 03:50:59PM +0100, Andrew Cooper wrote:
> With a 64bit hypervisor there are no conditional l3 slots, and this is
> unlikely to change moving forwards.
>
> No functional change (as confirmed by diffing the disassembly. GCC obviously
> already optimised this code away.)
>
>
On 08/28/2017 10:52 AM, Jan Beulich wrote:
On 28.08.17 at 16:24, wrote:
As for periodically testing process_pending_softirqs() we may still want
to do this in alloc_heap_pages(), even without CONFIG_SCRUB_DEBUG.
>>> For my taste, alloc_heap_pages() is the wrong place for such
>>> ca
On Mon, Aug 28, 2017 at 4:54 AM, Alexandru Isaila
wrote:
> The patch splits the vm_event into three structures:vm_event_share,
> vm_event_paging, vm_event_monitor. The allocation for the
> structure is moved to vm_event_enable so that it can be
> allocated/init when needed and freed in vm_event_di
On 07/20/2017 05:04 PM, Wei Liu wrote:
> And at once make it an inline function. Add declarations of
at the same time
Other than that:
Acked-by: George Dunlap
> replace_grant_{hvm,pv}_mapping to respective header files.
>
> The code movement will be done later.
>
> Signed-off-by: Wei Liu
>
On 07/20/2017 05:04 PM, Wei Liu wrote:
> And at once make create_grant_host_mapping an inline function. This
"At once" means "immediately" or "without any delay between this event
and the preceding event", which doesn't make sense here. I think you
want, "At the same time."
Other than that, loo
On Tue, Aug 22, 2017 at 03:51:05PM +0100, Paul Durrant wrote:
[...]
> diff --git a/tools/libs/devicemodel/include/xendevicemodel.h
> b/tools/libs/devicemodel/include/xendevicemodel.h
> index 13216db04a..da6b253cfd 100644
> --- a/tools/libs/devicemodel/include/xendevicemodel.h
> +++ b/tools/libs/de
>>> On 28.08.17 at 16:50, wrote:
> With a 64bit hypervisor there are no conditional l3 slots, and this is
> unlikely to change moving forwards.
>
> No functional change (as confirmed by diffing the disassembly. GCC obviously
> already optimised this code away.)
>
> Signed-off-by: Andrew Cooper
On Thu, Aug 24, 2017 at 05:09:35PM +0100, Paul Durrant wrote:
> >
> > Could be written as:
> >
> > return (is_hvm ? compat_gnttab_hvm_seed : compat_gnttab_seed)
> >(xch, guest_domid, console_gmfn, xenstore_gmfn, console_domid,
> > xenstore_domid);
>
> Is that preferable?
>
I do
>>> On 28.08.17 at 16:49, wrote:
> Commit 63e8a1e5ffa7a7fdbde887805f673fea7e8d2e94 ("xen: check parameter
> validity when parsing command line") introduced a bug for the case
> when a boolean parameter was specified by its keyword only (no value).
> It would set just the wrong boolean value for th
On Tue, Aug 22, 2017 at 03:51:00PM +0100, Paul Durrant wrote:
> Since IOREQ servers are only relevant to HVM guests and all the names in
> question unequivocally refer to guest frame numbers, name them all .*gfn
> to avoid any confusion.
>
> This patch is purely cosmetic. No semantic or functional
On Tue, Aug 22, 2017 at 03:50:57PM +0100, Paul Durrant wrote:
> +
> +/*
> + * Get the pages for a particular guest resource, so that they can be
> + * mapped directly by a tools domain.
> + */
> +#define XENMEM_acquire_resource 28
> +struct xen_mem_acquire_resource {
> +/* IN - the domain whose
This run is configured for baseline tests only.
flight 72033 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72033/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ef5e0db22cdd73e9727afcaa5c7fe8e55b7b3671
baseline v
>>> On 28.08.17 at 16:24, wrote:
> On 08/28/2017 09:29 AM, Jan Beulich wrote:
> On 27.08.17 at 10:36, wrote:
>>> --- a/xen/arch/arm/mm.c
>>> +++ b/xen/arch/arm/mm.c
>>> @@ -1284,7 +1284,7 @@ int xenmem_add_to_physmap_one(
>>> return -EINVAL;
>>> }
>>>
>>> -rc =
>>> On 28.08.17 at 16:24, wrote:
>>> As for periodically testing process_pending_softirqs() we may still want
>>> to do this in alloc_heap_pages(), even without CONFIG_SCRUB_DEBUG.
>> For my taste, alloc_heap_pages() is the wrong place for such
>> calls.
>
> But the loop is in alloc_heap_pages()
With a 64bit hypervisor there are no conditional l3 slots, and this is
unlikely to change moving forwards.
No functional change (as confirmed by diffing the disassembly. GCC obviously
already optimised this code away.)
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
---
xen/arch
On 07/27/2017 01:05 PM, Dario Faggioli wrote:
> By, basically, moving all the logic of the function
> inside the usual two steps (soft-affinity step and
> hard-affinity step) loop.
>
> While there, add two performance counters (in cpu_pick
> and in get_fallback_cpu() itself), in order to be able
>
Commit 63e8a1e5ffa7a7fdbde887805f673fea7e8d2e94 ("xen: check parameter
validity when parsing command line") introduced a bug for the case
when a boolean parameter was specified by its keyword only (no value).
It would set just the wrong boolean value for that parameter.
Signed-off-by: Juergen Gros
On 07/27/2017 01:05 PM, Dario Faggioli wrote:
> Soft-affinity support is usually implemented by means
> of a two step "balancing loop", where:
> - during the first step, we consider soft-affinity
> (if the vcpu has one);
> - during the second (if we get to it), we consider
> hard-affinity.
>
>
On Fri, Aug 25, 2017 at 11:05:54AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Wei Liu [mailto:wei.l...@citrix.com]
> > Sent: 24 August 2017 17:33
> > To: Paul Durrant
> > Cc: xen-de...@lists.xenproject.org; Andrew Cooper
> > ; Jan Beulich ; Wei Liu
> >
> > Subject: Re: [X
On 08/28/2017 03:38 AM, Jan Beulich wrote:
>
>>> And finally I continue to be not really happy about the change as
>>> a whole. Despite what was discussed on v1, I'm concerned of the
>>> effects of this on hosts _not_ suffering from vector shortage.
>>> Could you live with the new behavior requirin
>> As for periodically testing process_pending_softirqs() we may still want
>> to do this in alloc_heap_pages(), even without CONFIG_SCRUB_DEBUG.
> For my taste, alloc_heap_pages() is the wrong place for such
> calls.
But the loop is in alloc_heap_pages() --- where else would you be testing?
-bo
On 08/28/2017 09:29 AM, Jan Beulich wrote:
On 27.08.17 at 10:36, wrote:
>> --- a/xen/arch/arm/mm.c
>> +++ b/xen/arch/arm/mm.c
>> @@ -1284,7 +1284,7 @@ int xenmem_add_to_physmap_one(
>> return -EINVAL;
>> }
>>
>> -rc = xsm_map_gmfn_foreign(XSM_TARGET, d, od);
>>
>>> On 28.08.17 at 15:57, wrote:
> On 08/28/2017 03:25 AM, Jan Beulich wrote:
> On 25.08.17 at 19:14, wrote:
>>> On 08/25/2017 09:40 AM, Jan Beulich wrote:
>>> On 25.08.17 at 05:15, wrote:
> flight 112855 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs
On 08/28/2017 03:25 AM, Jan Beulich wrote:
On 25.08.17 at 19:14, wrote:
>> On 08/25/2017 09:40 AM, Jan Beulich wrote:
>> On 25.08.17 at 05:15, wrote:
flight 112855 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112855/
Regressions :-(
>>> On 28.08.17 at 14:51, wrote:
> --- a/xen/include/asm-arm/monitor.h
> +++ b/xen/include/asm-arm/monitor.h
> @@ -26,6 +26,12 @@
> #include
>
> static inline
> +void arch_allow_userspace(struct domain *d, uint8_t allow_userspace)
> +{
> +return;
> +}
I'm sorry for noticing this only now
flight 112903 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112903/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ef5e0db22cdd73e9727afcaa5c7fe8e55b7b3671
baseline version:
ovmf 714c2603018a99a514c42
In some introspection usecases, an in-guest agent needs to communicate
with the external introspection agent. An existing mechanism is
HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
like all other hypercalls.
Introduce a mechanism whereby the introspection agent can white
flight 112905 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112905/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
flight 112900 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112900/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
112891
test-amd64-i
>>> On 28.08.17 at 13:01, wrote:
> 2017-08-28 16:29 GMT+08:00 Jan Beulich :
> On 27.08.17 at 10:36, wrote:
>>> -static XSM_INLINE int xsm_map_gmfn_foreign(XSM_DEFAULT_ARG struct domain
>>> *d, struct domain *t)
>>> +static XSM_INLINE int xsm_map_gmfn_foreign(XSM_DEFAULT_ARG struct domain
>>
>>> On 28.08.17 at 12:45, wrote:
> Oh!! I'm so sorry Jan Beulich.
> It is my first time to use this mailing list.
> Please understand my fault, this time only.
>
> Anyway, as you mentioned, I added below line in '/etc/default/grub' file
> and reboot:
>> GRUB_CMDLINE_XEN="crashkernel=384M-:256M@64
>>> On 28.08.17 at 11:38, wrote:
> In some introspection usecases, an in-guest agent needs to communicate
> with the external introspection agent. An existing mechanism is
> HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
> like all other hypercalls.
>
> Introduce a mecha
Hi Jan,
Thanks for having a look at the patch.
2017-08-28 16:29 GMT+08:00 Jan Beulich :
On 27.08.17 at 10:36, wrote:
>> --- a/xen/arch/arm/mm.c
>> +++ b/xen/arch/arm/mm.c
>> @@ -1284,7 +1284,7 @@ int xenmem_add_to_physmap_one(
>> return -EINVAL;
>> }
>>
>> -rc
The patch splits the vm_event into three structures:vm_event_share,
vm_event_paging, vm_event_monitor. The allocation for the
structure is moved to vm_event_enable so that it can be
allocated/init when needed and freed in vm_event_disable.
Signed-off-by: Alexandru Isaila
---
Changes since V3:
flight 112901 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112901/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1 build-check(1)
Oh!! I'm so sorry Jan Beulich.
It is my first time to use this mailing list.
Please understand my fault, this time only.
Anyway, as you mentioned, I added below line in '/etc/default/grub' file
and reboot:
> GRUB_CMDLINE_XEN="crashkernel=384M-:256M@64M"
Then,
1. I cannot see anything when I type "
On 08/25/2017 06:37 PM, Andrew Cooper wrote:
> On 25/08/17 17:43, George Dunlap wrote:
>> You don't need __AFL_INIT if you have __AFL_LOOP.
>>
>> Signed-off-by: George Dunlap
>
> Really? Is that covered in any documentation?
>
> I got the contrary impression from whichever version of AFL I was
Hi!
> > + The kernel and modules will generate slightly more assembly (1 to
> > 2%
> > + increase on the .text sections). The vmlinux binary will be
> > + significantly smaller due to less relocations.
> >
> > ... but describing a 1-2% kernel text size increase as "slightl
In some introspection usecases, an in-guest agent needs to communicate
with the external introspection agent. An existing mechanism is
HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
like all other hypercalls.
Introduce a mechanism whereby the introspection agent can white
>>> On 28.08.17 at 11:11, wrote:
> On 8/25/2017 6:04 PM, Wei Liu wrote:
>> On Fri, Aug 25, 2017 at 10:57:26AM +0100, Roger Pau Monné wrote:
>>> On Fri, Aug 25, 2017 at 10:18:24AM +0100, Wei Liu wrote:
On Thu, Aug 24, 2017 at 10:52:17PM -0400, Lan Tianyu wrote:
> This patch is to increase
On Mon, Aug 28, 2017 at 05:11:27PM +0800, Lan, Tianyu wrote:
> On 8/25/2017 6:04 PM, Wei Liu wrote:
> > On Fri, Aug 25, 2017 at 10:57:26AM +0100, Roger Pau Monné wrote:
> > > On Fri, Aug 25, 2017 at 10:18:24AM +0100, Wei Liu wrote:
> > > > On Thu, Aug 24, 2017 at 10:52:17PM -0400, Lan Tianyu wrote:
1 - 100 of 166 matches
Mail list logo