flight 112942 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112942/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
On 17-08-29 07:58:04, Jan Beulich wrote:
> >>> On 29.08.17 at 15:44, wrote:
> > On Thu, Aug 24, 2017 at 09:14:38AM +0800, Yi Sun wrote:
> >> @@ -80,9 +86,23 @@ enum psr_feat_type {
> >> * cos_reg_val[1] (Code).
> >> */
> >> struct feat_node {
> >> -/* cos_max and cbm_len are
On 17-08-29 13:15:24, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:37AM +0800, Yi Sun wrote:
> > This patch renames 'cbm_type' to 'psr_val_type' to make it be general.
>
> I'm unsure whether the '_val_' is really needed here. AFAICT it
> doesn't add any meaningful information to the defi
On 2017年08月29日 16:49, Jan Beulich wrote:
On 29.08.17 at 06:38, wrote:
>> On 2017年08月25日 22:10, Meng Xu wrote:
>>> How many VCPUs for a single VM do you want to support with this patch set?
>>
>> Hi Meng:
>> Sorry for later response. We hope to increase max vcpu number to 512.
>> This als
On 17-08-29 16:01:00, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:39AM +0800, Yi Sun wrote:
> > diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
> > index df54d38..cbab85a 100644
> > --- a/xen/arch/x86/sysctl.c
> > +++ b/xen/arch/x86/sysctl.c
> > @@ -214,6 +214,25 @@ long arch_
On 17-08-29 14:44:32, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:38AM +0800, Yi Sun wrote:
> > +#define MBA_LINEAR (1u << 2)
>
> Why is this shifted by 2?
>
This is used to mask ECX register to know if MBA linear mode is set or not.
> > +union {
> > +struct {
> >
On 17-08-29 13:00:19, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:36AM +0800, Yi Sun wrote:
> > --- a/xen/arch/x86/domctl.c
> > +++ b/xen/arch/x86/domctl.c
> > @@ -1439,60 +1439,60 @@ long arch_do_domctl(
> > }
> > break;
> >
> > -case XEN_DOMCTL_psr_cat_op:
> > -
Thanks a lot for the review comments!
On 17-08-29 12:46:49, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:35AM +0800, Yi Sun wrote:
> > +# Overview
> > +
> > +The Memory Bandwidth Allocation (MBA) feature provides indirect and
> > approximate
> > +control over memory bandwidth available
I just got it to work. As that link said I disabled USB_DWC2 in the kernel
and now it boots! I hope it works fine later. Thanks.
--
Saeed Mirzamohammadi
Ph.D. candidate
Computer Science Department
University of California, Irvine
On Tue, Aug 29, 2017 at 11:55 AM, Saeed Mirzamohammadi
wrote:
> T
flight 112938 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112938/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 111687
test-amd64-amd64-xl-qemuu-ws16-amd64 10 w
flight 112937 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112937/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 7 xen-bootfail REGR. vs. 112809
test-amd64-i386-xl
On Tue, Aug 29, 2017 at 05:11:24PM -0700, Linus Torvalds wrote:
> On Tue, Aug 29, 2017 at 4:54 PM, Jérôme Glisse wrote:
> >
> > Note this is barely tested. I intend to do more testing of next few days
> > but i do not have access to all hardware that make use of the mmu_notifier
> > API.
>
> Than
On Tue, Aug 29, 2017 at 4:54 PM, Jérôme Glisse wrote:
>
> Note this is barely tested. I intend to do more testing of next few days
> but i do not have access to all hardware that make use of the mmu_notifier
> API.
Thanks for doing this.
> First 2 patches convert existing call of mmu_notifier_in
Call to mmu_notifier_invalidate_page() are replaced by call to
mmu_notifier_invalidate_range() and thus call are bracketed by
call to mmu_notifier_invalidate_range_start()/end()
Remove now useless invalidate_page callback.
Signed-off-by: Jérôme Glisse
Cc: Konrad Rzeszutek Wilk
Cc: Roger Pau Mon
(Sorry for so many list cross-posting and big cc)
Please help testing !
The invalidate_page callback suffered from 2 pitfalls. First it used to
happen after page table lock was release and thus a new page might have
been setup for the virtual address before the call to invalidate_page().
This is
flight 112920 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112920/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail REGR. vs. 112910
Tests which did not succeed,
This run is configured for baseline tests only.
flight 72036 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72036/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 2f208e59e4b994978a1a24affc306eb694a00327
baseline v
Hm. For some odd reason I stopped receiving xen-devel mail a while ago.
I never
unsubscribed, never turned anything off (to the best of my knowledge). Now
a co-worker is unable to subscribe.
What's up with that? Any ideas?
Gary
___
Xen-devel mailing
flight 112945 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112945/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
Commit d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe introduced
the support for this, but it does not work under x86 (as it stops
20_linux_xen from running).
The 20_linux_xen is run under a shell and any exits from within it:
(For example on x86):
+ /usr/bin/grub2-file --is-arm64-efi /boot/xen-4.9.0.g
Since v1 [http://lists.gnu.org/archive/html/grub-devel/2017-08/msg00073.html]
- Fixed up patch with failing invocation,
- Redid patch #2 per Daniel's instructions.
Hey,
The first patch:
[PATCH 1/2] Fix util/grub.d/20_linux_xen.in: Add xen_boot command
is a fix discovered on Fedora rawhide wh
The multiboot2 is much more preferable than multiboot. Especiall
if booting under EFI where multiboot does not have the functionality
to pass ImageHandler.
Signed-off-by: Konrad Rzeszutek Wilk
---
v2: Rebase on top of d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe
v3: Add 'else' in the conditional.
flight 112919 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112919/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 2f208e59e4b994978a1a24affc306eb694a00327
baseline version:
ovmf 51ce27fd8c58384548085
flight 112917 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112917/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-4 48 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 112851
Tests which are
Hey Tamas,
Sorry for late reply. I was on vacation.
On Tue, Aug 22, 2017 at 09:01:06PM -0600, Tamas K Lengyel wrote:
> On Tue, May 16, 2017 at 5:04 AM, Daniel Kiper wrote:
[...]
> > UEFI will verify shim secure boot signature then shim will verify GRUB2
> > signature then GRUB2 will verify (wi
On Fri, Aug 25, 2017 at 8:05 AM, Thomas Garnier wrote:
> On Fri, Aug 25, 2017 at 1:04 AM, Ingo Molnar wrote:
>>
>> * Thomas Garnier wrote:
>>
>>> With the fix for function tracing, the hackbench results have an
>>> average of +0.8 to +1.4% (from +8% to +10% before). With a default
>>> configurat
flight 112918 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112918/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1 build-check(1)
On Mon, Aug 28, 2017 at 02:40:15PM -0400, Konrad Rzeszutek Wilk wrote:
> The multiboot2 is much more preferable than multiboot. Especiall
> if booting under EFI where multiboot does not have the functionality
> to pass ImageHandler.
>
> Signed-off-by: Konrad Rzeszutek Wilk
> ---
> v2: Rebase on to
On Mon, Aug 28, 2017 at 02:42:18PM -0400, Konrad Rzeszutek Wilk wrote:
> On Mon, Aug 28, 2017 at 02:40:14PM -0400, Konrad Rzeszutek Wilk wrote:
> > Commit d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe introduced
> > the support for this, but it does not work under x86 (as it stops
> > 20_linux_xen from
Thanks for your feedback. Yes, I'm using "HiKey" that I recently bought. I
tried RELEASE-4.9.0 and RELEASE-4.8.0 and RELEASE-4.7.3. None of them
boots. There were little differences. Xen 4.8 printed one line more and
stopped:
~~~
...
(XEN) Freed 268kB init memory.
(XEN) Hardware Dom0 sh
flight 112941 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112941/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
flight 112916 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112916/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-1 48 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 112871
Regressions whi
flight 112915 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112915/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
112872
Regressio
On Tue, Aug 29, 2017 at 11:38:12AM -0600, Tamas K Lengyel wrote:
> On Tue, Aug 29, 2017 at 9:59 AM, Wei Liu wrote:
> > On Tue, Aug 29, 2017 at 05:17:05PM +0300, Alexandru Isaila wrote:
> > [...]
> >>
> >> /**
> >> diff --git a/xen/common/domain.c b/xen/common/domain.c
> >> index b22aacc..30f507b
On Tue, Aug 29, 2017 at 9:59 AM, Wei Liu wrote:
> On Tue, Aug 29, 2017 at 05:17:05PM +0300, Alexandru Isaila wrote:
> [...]
>>
>> /**
>> diff --git a/xen/common/domain.c b/xen/common/domain.c
>> index b22aacc..30f507b 100644
>> --- a/xen/common/domain.c
>> +++ b/xen/common/domain.c
>> @@ -363,9 +
flight 112914 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112914/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
On 08/29/2017 06:27 AM, Wei Liu wrote:
> No functional change because MMU_NORMAL_PT_UPDATE is in fact 0. Set it
> to make the code consistent with similar code in mmu_pv.c
>
> Signed-off-by: Wei Liu
> ---
> arch/x86/xen/mmu.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git
scrub_heap_pages() does early return if boot-time scrubbing is
disabled, neglecting to initialize lowmem VIRQ.
Because setup_low_mem_virq() doesn't logically belong in
scrub_heap_pages() we put them both into the newly added
heap_init_late().
Signed-off-by: Boris Ostrovsky
---
CC: Julien Grall
Once pages are removed from the heap we don't need to hold the heap
lock. It is especially useful to drop it for an unscrubbed buddy since
we will be scrubbing it.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
Changes in v2:
* Moved spin_unlock() after d->last_alloc_node assignment
First patch fixes a long-standing bug where a low memory monitor is
not initialized if boottime scrubbing is turned off.
Patch 2 is new.
The other threee patches are performace and readability optimizations.
Boris Ostrovsky (5):
mm: Initialize lowmem virq when boot-time scrubbing is disabled
Rename it to the more appropriate scrub_debug and define as a macro
for !CONFIG_SCRUB_DEBUG. This will allow us to get rid of some
ifdefs (here and in the subsequent patch).
Signed-off-by: Boris Ostrovsky
Suggested-by: Jan Beulich
---
New in v2
xen/common/page_alloc.c | 15 ++-
1 f
If scrub_debug is off we don't check pages in check_one_page().
Thus there is no reason to ever poison them.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Wei Liu
---
Changes in v2:
* s/boot_scrub_done/scrub_debug
xen/common/page_alloc.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen
There is no need to scrub pages freed during dom0 construction
since heap will be scrubbed once dom0 is ready (by scrub_heap_pages()).
Signed-off-by: Boris Ostrovsky
---
Changes in v2:
* Removed '#ifdef CONFIG_SCRUB_DEBUG'
xen/common/page_alloc.c | 6 +-
1 file changed, 1 insertion(+), 5 de
We need to choose ACPI tables properly depending on the device
model version we are running. Previously, this decision was
made by BIOS type specific code in hvmloader, e.g. always load
QEMU traditional specific tables if it's ROMBIOS and always
load QEMU Xen specific tables if it's SeaBIOS.
This
On 08/18/2017 07:04 PM, Dario Faggioli wrote:
> Idea is: the more CPUs are still active in a grace period,
> the more we can wait to check whether it's time to invoke
> the callbacks (on those CPUs that have already quiesced,
> are idle, and have callbacks queued).
>
> What we're trying to avoid i
On 08/22/2017 02:04 PM, Jan Beulich wrote:
On 18.08.17 at 20:04, wrote:
>> --- a/xen/arch/x86/cpu/mwait-idle.c
>> +++ b/xen/arch/x86/cpu/mwait-idle.c
>> @@ -741,9 +741,8 @@ static void mwait_idle(void)
>> }
>>
>> cpufreq_dbs_timer_suspend();
>> -
>> sched_tick_suspend();
>> -
On 08/18/2017 07:04 PM, Dario Faggioli wrote:
> On the CPU where a callback is queued, cpu_is_haltable()
> returns false (due to rcu_needs_cpu() being itself false).
> That means the CPU would spin inside idle_loop(), continuously
> calling do_softirq(), and, in there, continuously checking
> rcu_p
On Tue, Aug 29, 2017 at 05:17:05PM +0300, Alexandru Isaila wrote:
[...]
>
> /**
> diff --git a/xen/common/domain.c b/xen/common/domain.c
> index b22aacc..30f507b 100644
> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -363,9 +363,6 @@ struct domain *domain_create(domid_t domid, unsig
Switch the return value from int to bool, to match its semantics. Switch its
parameter from a frame offset to a byte offset (simplifying the sole caller)
and allowing for an extra sanity check that the fault is within the LDT limit.
Drop the unnecessary gmfn and okay local variables, and correct
On Ma, 2017-08-29 at 09:14 -0600, Tamas K Lengyel wrote:
> On Tue, Aug 29, 2017 at 8:17 AM, Alexandru Isaila
> wrote:
> >
> > The patch splits the vm_event into three structures:vm_event_share,
> > vm_event_paging, vm_event_monitor. The allocation for the
> > structure is moved to vm_event_enable
flight 112940 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112940/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
On Tue, Aug 29, 2017 at 8:17 AM, Alexandru Isaila
wrote:
> The patch splits the vm_event into three structures:vm_event_share,
> vm_event_paging, vm_event_monitor. The allocation for the
> structure is moved to vm_event_enable so that it can be
> allocated/init when needed and freed in vm_event_di
On Tue, Aug 29, 2017 at 3:23 AM, Alexandru Isaila
wrote:
> In some introspection usecases, an in-guest agent needs to communicate
> with the external introspection agent. An existing mechanism is
> HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
> like all other hypercalls
On Tue, Aug 29, 2017 at 3:36 AM, Jan Beulich wrote:
On 29.08.17 at 11:23, wrote:
>> In some introspection usecases, an in-guest agent needs to communicate
>> with the external introspection agent. An existing mechanism is
>> HVMOP_guest_request_vm_event, but this is restricted to kernel use
On Thu, Aug 24, 2017 at 09:14:40AM +0800, Yi Sun wrote:
> This patch implements get value domctl interface for MBA.
>
> Signed-off-by: Yi Sun
Reviewed-by: Roger Pau Monné
Just one minor comment...
> ---
> xen/arch/x86/domctl.c | 7 +++
> xen/include/public/domctl.h | 1 +
> 2 files
On Thu, Aug 24, 2017 at 09:14:39AM +0800, Yi Sun wrote:
> diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
> index df54d38..cbab85a 100644
> --- a/xen/arch/x86/sysctl.c
> +++ b/xen/arch/x86/sysctl.c
> @@ -214,6 +214,25 @@ long arch_do_sysctl(
> break;
> }
>
> +
On 08/18/2017 07:04 PM, Dario Faggioli wrote:
> If a CPU has a callback queued, it must be ready to invoke
> it, as soon as all the other CPUs involved in the grace period
> has gone through a quiescent state.
>
> But if we let such CPU go idle, we can't really tell when (if!)
> it will realize th
On 08/18/2017 07:04 PM, Dario Faggioli wrote:
> Xen is a tickless (micro-)kernel, i.e., when a CPU becomes
> idle there is no timer tick that will periodically wake the
> CPU up.
> OTOH, when we imported RCU from Linux, Linux was (on x86) a
> ticking kernel, i.e., there was a periodic timer tick al
On 29/08/17 15:14, Jan Beulich wrote:
On 29.08.17 at 13:19, wrote:
>> --- a/xen/arch/x86/mm.c
>> +++ b/xen/arch/x86/mm.c
>> @@ -667,45 +667,49 @@ static int alloc_segdesc_page(struct page_info *page)
>> }
>>
>>
>> -/* Map shadow page at offset @off. */
>> -int map_ldt_shadow_page(unsigne
> -Original Message-
> From: George Dunlap
> Sent: 29 August 2017 15:38
> To: Paul Durrant
> Cc: Stefano Stabellini ; Wei Liu
> ; Andrew Cooper ; Tim
> (Xen.org) ; Jan Beulich ; Ian Jackson
> ; xen-de...@lists.xenproject.org; Roger Pau
> Monne
> Subject: Re: [Xen-devel] [PATCH v2 REPOST 1
On 08/29/2017 03:44 PM, Konrad Rzeszutek Wilk wrote:
> .giant snip..
>> Indeed; and as I think I said before, I think we need to move forward
>> with getting a statement on livepatching in, and since most of the
>> voices involved in this conversation seem to be in favor of saying
>> livepatch-tool
On 29/08/17 15:44, Konrad Rzeszutek Wilk wrote:
> .giant snip..
>> Indeed; and as I think I said before, I think we need to move forward
>> with getting a statement on livepatching in, and since most of the
>> voices involved in this conversation seem to be in favor of saying
>> livepatch-tools are
.giant snip..
> Indeed; and as I think I said before, I think we need to move forward
> with getting a statement on livepatching in, and since most of the
> voices involved in this conversation seem to be in favor of saying
> livepatch-tools are *not* supported, I won't object. I'm only still
Than
On Tue, Aug 29, 2017 at 3:31 PM, Paul Durrant wrote:
>> -Original Message-
> [snip]
>> >> I'm not terribly happy with allocating out-of-band pages either. One
>> >> of the advantages of the way things are done now (with the page
>> >> allocated to the guest VM) is that it is more resilien
On Tue, Aug 29, 2017 at 03:26:11PM +0100, Igor Druzhinin wrote:
>
>
> On 29/08/17 14:42, Jan Beulich wrote:
> On 29.08.17 at 15:24, wrote:
> >> On 29/08/17 09:50, Roger Pau Monne wrote:
> >>> Commit 149c6b unmasked an issue long present in Xen: the control/event
> >>> block addresses provid
On 08/28/2017 01:43 PM, Konrad Rzeszutek Wilk wrote:
>
> Hey Jens,
>
> Please git pull the following branch:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
> stable/for-jens-4.13
>
> .. which as a bug-fix when shutting down xen block backend driver with
> multiple queues and
> -Original Message-
[snip]
> >> I'm not terribly happy with allocating out-of-band pages either. One
> >> of the advantages of the way things are done now (with the page
> >> allocated to the guest VM) is that it is more resilient to unexpected
> >> events: If the domain dies before the
On Tue, Aug 29, 2017 at 3:10 PM, Paul Durrant wrote:
>> -Original Message-
>> From: George Dunlap
>> Sent: 29 August 2017 14:40
>> To: Paul Durrant
>> Cc: Roger Pau Monne ; Stefano Stabellini
>> ; Wei Liu ; Andrew Cooper
>> ; Tim (Xen.org) ; Jan Beulich
>> ; Ian Jackson ; xen-
>> de...@li
On 29/08/17 14:42, Jan Beulich wrote:
On 29.08.17 at 15:24, wrote:
>> On 29/08/17 09:50, Roger Pau Monne wrote:
>>> Commit 149c6b unmasked an issue long present in Xen: the control/event
>>> block addresses provided in the ACPI FADT table where hardcoded to the
>>> V1 version. This was pape
>>> On 29.08.17 at 16:20, wrote:
>> Yes, but please consider the "#define boot_scrub_done 0" approach
>> too.
>
> Yes, I'll do that but I will rename boot_scrub_done to scrub_debug since
> having boot_scrub_done=0 in non-debug case will not convey what it
> actually is supposed to mean.
Yeah, I
>>> On 29.08.17 at 15:44, wrote:
> On Tue, Aug 29, 2017 at 12:19:16PM +0100, Andrew Cooper wrote:
>> * Drop unnecessary brackets.
>> * Add spaces around binary operators.
>> * Insert appropriate blank lines.
>> * Insert a local variable block at the end.
>>
>> Signed-off-by: Andrew Cooper
>
>>> On 29.08.17 at 13:19, wrote:
> Rename gdt_ldt_ptes() to pv_gdt_ptes() and drop the domain parameter, as it is
> incorrect to use the helper with d != v->domain.
Indeed, but it was still done this way for a reason:
> --- a/xen/include/asm-x86/domain.h
> +++ b/xen/include/asm-x86/domain.h
> @@
Hello All
I am trying to run Xen on new hardware which has two A35 and one A72 core.
Xen booted intially but it hangs at *smp_call_function(setup_virt_paging_one,
(void *)val, 1) *function call.
Find following log of Xen booting,
> Yes, but please consider the "#define boot_scrub_done 0" approach
> too.
Yes, I'll do that but I will rename boot_scrub_done to scrub_debug since
having boot_scrub_done=0 in non-debug case will not convey what it
actually is supposed to mean.
-boris
__
>>> On 29.08.17 at 15:39, wrote:
> On Tue, Aug 29, 2017 at 12:19:14PM +0100, Andrew Cooper wrote:
>> Rather than having a mix of code behaviour. This requires updating
>> pagetable_{get,from}_page() to use the non-overridden helpers.
>>
>> This requires some adjustments in priv_op_{read,write}_c
The patch splits the vm_event into three structures:vm_event_share,
vm_event_paging, vm_event_monitor. The allocation for the
structure is moved to vm_event_enable so that it can be
allocated/init when needed and freed in vm_event_disable.
Signed-off-by: Alexandru Isaila
---
Changes since V4:
>>> On 29.08.17 at 13:19, wrote:
> --- a/xen/arch/x86/mm.c
> +++ b/xen/arch/x86/mm.c
> @@ -667,45 +667,49 @@ static int alloc_segdesc_page(struct page_info *page)
> }
>
>
> -/* Map shadow page at offset @off. */
> -int map_ldt_shadow_page(unsigned int off)
> +/*
> + * Map a guests LDT page (a
On Mon, Aug 28, 2017 at 06:23:41PM -0700, Saeed Mirzamohammadi wrote:
> Hi,
>
> I'm following instructions on https://wiki.xenproject.org/wiki/HiKey and
> https://github.com/Jeeppler/xen-note/blob/master/
> arm64/hikey/hikey-xen-centos.md.
And just to make sure, you are using HiKey not Hikey960.
> -Original Message-
> From: George Dunlap
> Sent: 29 August 2017 14:40
> To: Paul Durrant
> Cc: Roger Pau Monne ; Stefano Stabellini
> ; Wei Liu ; Andrew Cooper
> ; Tim (Xen.org) ; Jan Beulich
> ; Ian Jackson ; xen-
> de...@lists.xenproject.org
> Subject: Re: [Xen-devel] [PATCH v2 REPOST
Il 29 Ago 2017 4:03 PM, George Dunlap ha scritto:
On Wed, Aug 16, 2017 at 5:45 PM, Dario Faggioli
wrote:
> In fact, right now, we read it at every iteration of the loop.
> The reason it's done like this is how context switch was handled
> on IA64 (see commit ae9bfcdc, "[XEN] Various softirq clean
On Wed, Aug 16, 2017 at 5:45 PM, Dario Faggioli
wrote:
> In fact, right now, we read it at every iteration of the loop.
> The reason it's done like this is how context switch was handled
> on IA64 (see commit ae9bfcdc, "[XEN] Various softirq cleanups" [1]).
>
> However:
> 1) we don't have IA64 any
On Tue, Aug 29, 2017 at 02:53:56PM +0100, Igor Druzhinin wrote:
> On 29/08/17 14:51, Wei Liu wrote:
> > On Tue, Aug 29, 2017 at 02:37:50PM +0100, Igor Druzhinin wrote:
> >> On 29/08/17 14:33, Wei Liu wrote:
> >>> On Tue, Aug 29, 2017 at 02:24:49PM +0100, Andrew Cooper wrote:
> On 29/08/17 09:5
>>> On 29.08.17 at 13:19, wrote:
> And update all affected callers. Fix the fill_ro_mpt() prototype to be bool
> like its implementation.
>
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
ht
On Tue, Aug 29, 2017 at 11:46:35AM +, Yang Zhang wrote:
> So far, pv_idle_ops.poll is the only ops for pv_idle. .poll is called in
> idle path which will polling for a while before we enter the real idle
> state.
>
> In virtualization, idle path includes several heavy operations
> includes tim
>>> On 29.08.17 at 15:44, wrote:
> On Thu, Aug 24, 2017 at 09:14:38AM +0800, Yi Sun wrote:
>> @@ -80,9 +86,23 @@ enum psr_feat_type {
>> * cos_reg_val[1] (Code).
>> */
>> struct feat_node {
>> -/* cos_max and cbm_len are common values for all features so far. */
>> +/* c
>>> On 29.08.17 at 15:46, wrote:
> On Tue, Aug 29, 2017 at 07:43:41AM -0600, Jan Beulich wrote:
>> >>> On 29.08.17 at 15:33, wrote:
>> > If I don't get a new fix by the end of today I'm going to revert Igor's
>> > patch (but keep Roger's patch in tree).
>>
>> I'm not convinced keep the non-confl
On 29/08/17 14:51, Wei Liu wrote:
> On Tue, Aug 29, 2017 at 02:37:50PM +0100, Igor Druzhinin wrote:
>> On 29/08/17 14:33, Wei Liu wrote:
>>> On Tue, Aug 29, 2017 at 02:24:49PM +0100, Andrew Cooper wrote:
On 29/08/17 09:50, Roger Pau Monne wrote:
> Commit 149c6b unmasked an issue long prese
On Tue, Aug 29, 2017 at 02:37:50PM +0100, Igor Druzhinin wrote:
> On 29/08/17 14:33, Wei Liu wrote:
> > On Tue, Aug 29, 2017 at 02:24:49PM +0100, Andrew Cooper wrote:
> >> On 29/08/17 09:50, Roger Pau Monne wrote:
> >>> Commit 149c6b unmasked an issue long present in Xen: the control/event
> >>> bl
flight 112939 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112939/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
>>> On 29.08.17 at 12:24, wrote:
> There is a bug when using highmem-start= where some L4 directmap slots are not
> audited in alloc_l4_table(), and not overwritten by init_guest_l4_table().
>
> As highmem_start is only available in debug builds of the hypervisor, this
> does not constitute a sec
On Tue, Aug 29, 2017 at 07:43:41AM -0600, Jan Beulich wrote:
> >>> On 29.08.17 at 15:33, wrote:
> > If I don't get a new fix by the end of today I'm going to revert Igor's
> > patch (but keep Roger's patch in tree).
>
> I'm not convinced keep the non-conflicting parts of Roger's patch
> is going
On Thu, Aug 24, 2017 at 09:14:38AM +0800, Yi Sun wrote:
> This patch implements main data structures of MBA.
>
> Like CAT features, MBA HW info has cos_max which means the max thrtl
> register number, and thrtl_max which means the max throttle value
> (delay value). It also has a flag to represent
On Tue, Aug 29, 2017 at 12:19:16PM +0100, Andrew Cooper wrote:
> * Drop unnecessary brackets.
> * Add spaces around binary operators.
> * Insert appropriate blank lines.
> * Insert a local variable block at the end.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
>>> On 29.08.17 at 15:33, wrote:
> If I don't get a new fix by the end of today I'm going to revert Igor's
> patch (but keep Roger's patch in tree).
I'm not convinced keep the non-conflicting parts of Roger's patch
is going to work; see the other reply just sent.
Jan
__
On Tue, Aug 29, 2017 at 12:19:15PM +0100, Andrew Cooper wrote:
> Rename gdt_ldt_ptes() to pv_gdt_ptes() and drop the domain parameter, as it is
> incorrect to use the helper with d != v->domain.
>
> Introduce pv_ldt_ptes() to abstract away the fact that the LDT mapping is 16
> slots after the GDT,
On 08/03/2017 03:13 AM, Meng Xu wrote:
> When more than one idle VCPUs that have the same PCPU as their
> previous running core invoke runq_tickle(), they will tickle the same
> PCPU. The tickled PCPU will only pick at most one VCPU, i.e., the
> highest-priority one, to execute. The other VCPUs wil
>>> On 29.08.17 at 15:24, wrote:
> On 29/08/17 09:50, Roger Pau Monne wrote:
>> Commit 149c6b unmasked an issue long present in Xen: the control/event
>> block addresses provided in the ACPI FADT table where hardcoded to the
>> V1 version. This was papered over because hvmloader would also always
On Fri, Aug 25, 2017 at 10:46 AM, Paul Durrant wrote:
>> > +/*
>> > + * Allocated IOREQ server pages are assigned to the emulating
>> > + * domain, not the target domain. This is because the emulator is
>> > + * likely to be destroyed after the target domain has been torn
>> > +
On Mon, 2017-08-28 at 18:03 +0100, George Dunlap wrote:
> On 07/18/2017 11:34 AM, Sergey Dyasli wrote:
> > Nested p2m (shadow EPT) is an object that stores memory address
> > translations from L2 GPA directly to L0 HPA. This is achieved by
> > combining together L1 EPT tables with L0 EPT during L2
On Tue, Aug 29, 2017 at 12:19:14PM +0100, Andrew Cooper wrote:
> Rather than having a mix of code behaviour. This requires updating
> pagetable_{get,from}_page() to use the non-overridden helpers.
>
> This requires some adjustments in priv_op_{read,write}_cr(), which is most
> easily done by swit
1 - 100 of 177 matches
Mail list logo