Hi Julien,
On Fri, Sep 02, 2016 at 02:13:07PM +0100, Julien Grall wrote:
>
>
>On 02/09/16 12:27, Peng Fan wrote:
>>Hi Julien, Stefano
>
>Hi Peng,
>
>>
>>On My ARM64 platform, there is 6GB memory.
>>0x8000 - 0xfff: 2GB
>>0x88000 - 0x9: 4GB
>>
>>xen will alloc 1:1 mapping for Dom
>>> On 25.08.16 at 07:22, wrote:
> --- a/xen/arch/x86/psr.c
> +++ b/xen/arch/x86/psr.c
> @@ -23,22 +23,116 @@
> #define PSR_CAT(1<<1)
> #define PSR_CDP(1<<2)
>
> -struct psr_cat_cbm {
> -union {
> -uint64_t cbm;
> -struct {
> -uint64_t code;
> -
>>> On 25.08.16 at 07:22, wrote:
Please extend the comments given for patch 1 to this one. Just one
extra thing:
> @@ -743,7 +744,7 @@ struct xen_sysctl_psr_cat_op {
> uint32_t cos_max; /* OUT: Maximum COS */
> #define XEN_SYSCTL_PSR_CAT_L3_CDP (1u << 0)
> uint
>>> On 05.09.16 at 19:20, wrote:
> On 05/09/16 14:31, Jan Beulich wrote:
> On 02.09.16 at 12:47, wrote:
>>> @@ -178,8 +179,27 @@ static int hvmemul_do_io(
>>> break;
>>> case X86EMUL_UNHANDLEABLE:
>>> {
>>> -struct hvm_ioreq_server *s =
>>> -hvm_select_i
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 06 September 2016 08:58
> To: George Dunlap ; Yu Zhang
>
> Cc: Andrew Cooper ; Paul Durrant
> ; George Dunlap ;
> JunNakajima ; Kevin Tian ;
> zhiyuan...@intel.com; xen-devel@lists.xen.org; Tim (Xen.org)
>
> Subje
>>> On 12.08.16 at 13:49, wrote:
> On 12/08/16 11:58, Jan Beulich wrote:
> On 11.08.16 at 20:10, wrote:
>>> On 09/08/16 11:40, Jan Beulich wrote:
--- a/xen/arch/x86/cpu/mtrr/main.c
+++ b/xen/arch/x86/cpu/mtrr/main.c
@@ -332,7 +332,7 @@ int mtrr_add_page(unsigned long base, un
>
On Tue, Sep 06, 2016 at 01:17:38PM +0800, Dongli Zhang wrote:
> This patch implemented parts of TODO left in commit id
> a902c12ee45fc9389eb8fe54eeddaf267a555c58. It moved TLB-flush filtering out
> into populate_physmap.
>
> Because of TLB-flush in alloc_heap_pages, it's very slow to create a gues
>>> On 06.09.16 at 10:03, wrote:
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 06 September 2016 08:58
>> To: George Dunlap ; Yu Zhang
>>
>> Cc: Andrew Cooper ; Paul Durrant
>> ; George Dunlap ;
>> JunNakajima ; Kevin Tian ;
>> zhiyuan...@intel.com; xen-d
Stefano Stabellini writes:
> On Mon, 5 Sep 2016, Vitaly Kuznetsov wrote:
>> Julien Grall writes:
>>
>> > Hi Vitaly,
>> >
>> > On 26/07/16 13:30, Vitaly Kuznetsov wrote:
>> >> It may happen that Xen's and Linux's ideas of vCPU id diverge. In
>> >> particular, when we crash on a secondary vCPU we
On Mon, 2016-09-05 at 16:11 +0200, Juergen Gross wrote:
> diff --git a/tools/libxl/libxl_qmp.c b/tools/libxl/libxl_qmp.c
> @@ -1103,14 +1103,48 @@ int libxl__qmp_x_blockdev_change(libxl__gc
> *gc, int domid, const char *parent,
> return qmp_run_command(gc, domid, "x-blockdev-change", args,
> N
On Fri, Sep 02, 2016 at 12:47:08PM +0100, Wei Liu wrote:
> Currently only gcc 3.4 format is supported.
>
> Signed-off-by: Wei Liu
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim Deegan
> Cc: We
On Mon, Sep 05, 2016 at 09:21:19PM +0200, Samuel Thibault wrote:
> Wei Liu, on Mon 05 Sep 2016 15:43:21 +0100, wrote:
> > Signed-off-by: Wei Liu
>
> Acked-by: Samuel Thibault
>
Thanks. Pushed.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https
This run is configured for baseline tests only.
flight 67645 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67645/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf bc54e50e0fe03c570014f363b547426913e92449
baseline v
On Wed, 2016-08-31 at 11:56 +0800, Feng Wu wrote:
> PI hooks: vmx_pi_switch_from() and vmx_pi_switch_to() are
> needed even all the assigned devices were dettached from
> the domain.
>
maybe "are needed even when any previously passed through device is
detached from the domain" (or something like
This patch implemented parts of TODO left in commit id
a902c12ee45fc9389eb8fe54eeddaf267a555c58. It moved TLB-flush filtering out
into populate_physmap.
Because of TLB-flush in alloc_heap_pages, it's very slow to create a guest
with memory size of more than 100GB on host with 100+ cpus.
This patc
This run is configured for baseline tests only.
flight 67643 linux-3.18 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67643/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 17 capture-lo
On August 30, 2016 1:58 PM, Tian, Kevin wrote:
>> From: Xuquan (Euler) [mailto:xuqu...@huawei.com]
>> Sent: Friday, August 19, 2016 8:59 PM
>>
>> When Xen apicv is enabled, wall clock time is faster on Windows7-32
>> guest with high payload (with 2vCPU, captured from xentrace, in high
>> payload,
On Wed, 2016-08-31 at 11:56 +0800, Feng Wu wrote:
> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -158,14 +158,12 @@ static void vmx_pi_switch_to(struct vcpu *v)
> pi_clear_sn(pi_desc);
> }
>
Not terribly important, but what about calling this:
> -static void vm
>>> On 06.09.16 at 10:53, wrote:
> to be honest, my fix is also a tradeoff.. w/ my patch, multiple pending pt
> interrupt instances may be combined as one injection of guest timer
> interrupt..
> but as Yang said, It should be ok since it happens rarely and even native
> OS will encounter the
On Tue, Aug 16, 2016 at 08:55:56AM +0200, Paulina Szubarczyk wrote:
> diff --git a/configure b/configure
> index 8d84919..68b3374 100755
> --- a/configure
> +++ b/configure
> @@ -1956,6 +1956,43 @@ EOF
> /*
> * If we have stable libs the we don't want the libxc compat
> * layers, regardless of
On Wed, 2016-08-31 at 11:56 +0800, Feng Wu wrote:
> We should remove the vCPU from the per-cpu blocking list
> if it is going to be destroyed.
>
> Signed-off-by: Feng Wu
> ---
> xen/arch/x86/hvm/vmx/vmx.c | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/
On 06/09/16 09:42, Dongli Zhang wrote:
> This patch implemented parts of TODO left in commit id
> a902c12ee45fc9389eb8fe54eeddaf267a555c58. It moved TLB-flush filtering out
> into populate_physmap.
>
> Because of TLB-flush in alloc_heap_pages, it's very slow to create a guest
> with memory size of
Wei Liu writes ("Re: [OSSTEST PATCH 0/7] Apropos of XTF: Improve failed step
selection"):
> > On Thu, Aug 11, 2016 at 05:17:56PM +0100, Ian Jackson wrote:
> > -SELECT sum(finished-started)
> > +SELECT sum(max(finished)-min(started))
...
> resourcecall DBD::Pg::st execute fa
On Tue, Sep 06, 2016 at 10:45:08AM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [OSSTEST PATCH 0/7] Apropos of XTF: Improve failed step
> selection"):
> > > On Thu, Aug 11, 2016 at 05:17:56PM +0100, Ian Jackson wrote:
> > > -SELECT sum(finished-started)
> > > +SELECT su
Wei Liu writes ("Re: [PATCH v2 1/2] tools: remove blktap2 related code and
documentation"):
> On Tue, Aug 30, 2016 at 01:54:17PM +0100, Ian Jackson wrote:
> > What error message and error code do you get ? If we're removing
> > this, we should make sure that the error message makes sense.
>
> Th
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Tuesday, September 6, 2016 4:43 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: Tian, Kevin ; george.dun...@eu.citrix.com;
> andrew.coop...@citrix.com; jbeul...@suse.com
> Subject: Re: [Xen-devel] [PA
On 06/09/16 10:39, David Vrabel wrote:
> On 06/09/16 09:42, Dongli Zhang wrote:
>> This patch implemented parts of TODO left in commit id
>> a902c12ee45fc9389eb8fe54eeddaf267a555c58. It moved TLB-flush filtering out
>> into populate_physmap.
>>
>> Because of TLB-flush in alloc_heap_pages, it's very
On 06/09/16 10:52, George Dunlap wrote:
> On 06/09/16 10:39, David Vrabel wrote:
>> On 06/09/16 09:42, Dongli Zhang wrote:
>>> This patch implemented parts of TODO left in commit id
>>> a902c12ee45fc9389eb8fe54eeddaf267a555c58. It moved TLB-flush filtering out
>>> into populate_physmap.
>>>
>>> Bec
On Fri, Aug 26, 2016 at 11:59:10AM +0100, Wei Liu wrote:
> Wei Liu (2):
> tools: remove blktap2 related code and documentation
> tools: remove blktap2 source code
>
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabel
On 06/09/16 10:31, Dario Faggioli wrote:
> On Mon, 2016-09-05 at 16:11 +0200, Juergen Gross wrote:
>> diff --git a/tools/libxl/libxl_qmp.c b/tools/libxl/libxl_qmp.c
>> @@ -1103,14 +1103,48 @@ int libxl__qmp_x_blockdev_change(libxl__gc
>> *gc, int domid, const char *parent,
>> return qmp_run_co
Currently it is only possible to set mem_access restrictions only for
a contiguous range of GFNs (or, as a particular case, for a single GFN).
This patch introduces a new libxc function taking an array of GFNs.
The alternative would be to set each page in turn, using a userspace-HV
roundtrip for ea
On 08/08/16 10:28, Juergen Gross wrote:
> Support xenstore domain autoballooning by:
> - adding --maxmem parameter to init-xenstore-domain
> - build xenstore stubdom with Mini-OS CONFIG_BALLOON set
> - add XENSTORE_MAX_DOMAIN_SIZE parameter to sysconfig.xencommons
>
> This series requires Mini-OS
On 9/6/2016 4:13 PM, Jan Beulich wrote:
On 06.09.16 at 10:03, wrote:
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 06 September 2016 08:58
To: George Dunlap ; Yu Zhang
Cc: Andrew Cooper ; Paul Durrant
; George Dunlap ;
JunNakajima ; Kevin Tian ;
zhiyuan...@i
On Fri, Aug 26, 2016 at 11:59:12AM +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
Ian said on IRC "considered it acked" (it referring to this patch), so I
will put his ack in while committing.
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzes
Wei Liu writes ("Re: [Xen-devel] [PATCH 0/3] tools: support autoballooning of
xenstore domain"):
> On Mon, Aug 29, 2016 at 08:22:14AM +0200, Juergen Gross wrote:
> > So Mini-OS ballooning is available now. Anything missing from my side
> > for this series to be accepted?
>
> I'm waiting for Ian t
It will be reused for PV hypercalls in subsequent changes.
* Rename hvm_hypercall_t to hypercall_fn_t
* Introduce hypercall_table_t
Finally, rework the #includes for hypercall.h so it may be included in
isolation.
Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
---
xen/arch/x86/hvm/hvm.c
set_segment_base is the only hypercall exists in only one of the two modes
guests might run in; all other hypercalls are either implemented, or
unimplemented in both modes.
Remove this split, by allowing do_set_segment_base() to be called in the
compat hypercall path. This change will simplify th
The highest populated entry in each hypercall table is currently at index 49.
There is no need to extend both to tables to 64 entries.
Range check eax against the hypercall table array size, and use a
BUILD_BUG_ON() to ensure that the hypercall tables don't grow larger than the
args table.
Signed
Editing (and indeed, finding) the hypercall tables can be tricky, especially
towards the end where .rept's are used to maintain the correct layout.
Move this all into C, and let the compiler do the hard work.
To do this, xen/hypercall.h and asm-x86/hypercall.h need to contain prototypes
for all t
I decided to dust off this series, and found it had been accumulating dust for
18 months. Oops.
There is no practical change from the point of view of guests, but:
* There is a net reduction in LoC
* There is a net reduction in compiled size (according to bloat-o-meter)
* Easier to maintain/e
In a similar style to hvm_do_hypercall(). The C version is far easier to
understand and edit than the assembly versions.
There are a few small differences however. The register clobbering values
have changed (to match the HVM side), and in particular clobber the upper
32bits of 64bit arguments.
For the same reason as c/s 33a231e3f "x86/HVM: fold hypercall tables", this
removes the risk of accidentally updating only one of the tables.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/hypercall.c | 75 +---
1 file changed,
For the same reason as c/s 33a231e3f "x86/HVM: fold hypercall tables" and
(TODO - changeset) "x86/pv: Merge the pv hypercall tables", this removes the
risk of accidentally updating only one of the tables.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/hvm/hvm.c
The x86 multicall handling was previously some very hairy inline assembly, and
is hard to follow and maintain.
Replace the existing do_multicall_call() with arch_do_multicall_call(). The
x86 side needs to handle both compat and non-compat calls, so pass the full
multicall state, rather than just
Editing (and indeed, finding) the hypercall args tables can be tricky,
especially towards the end where .rept's are used to maintain the correct
layout.
Move this all into C, and let the compiler do the hard work. As 0 is the
default value, drop all explicit 0's.
No functional change.
Signed-of
On 06/09/16 09:03, Jan Beulich wrote:
On 12.08.16 at 13:49, wrote:
>> On 12/08/16 11:58, Jan Beulich wrote:
>> On 11.08.16 at 20:10, wrote:
On 09/08/16 11:40, Jan Beulich wrote:
> --- a/xen/arch/x86/cpu/mtrr/main.c
> +++ b/xen/arch/x86/cpu/mtrr/main.c
> @@ -332,7 +332,7
Razvan Cojocaru writes ("[PATCH V3] tools/libxc, xen/x86: Added
xc_set_mem_access_multi()"):
> Currently it is only possible to set mem_access restrictions only for
> a contiguous range of GFNs (or, as a particular case, for a single GFN).
> This patch introduces a new libxc function taking an arr
On 06/09/2016 10:57, "Wei Liu" wrote:
>On Fri, Aug 26, 2016 at 11:59:10AM +0100, Wei Liu wrote:
>> Wei Liu (2):
>> tools: remove blktap2 related code and documentation
>> tools: remove blktap2 source code
>>
>> Cc: Andrew Cooper
>> Cc: George Dunlap
>> Cc: Ian Jackson
>> Cc: Jan Beulich
On 09/06/2016 01:16 PM, Ian Jackson wrote:
> Razvan Cojocaru writes ("[PATCH V3] tools/libxc, xen/x86: Added
> xc_set_mem_access_multi()"):
>> Currently it is only possible to set mem_access restrictions only for
>> a contiguous range of GFNs (or, as a particular case, for a single GFN).
>> This p
On 06/09/16 10:55, David Vrabel wrote:
> On 06/09/16 10:52, George Dunlap wrote:
>> On 06/09/16 10:39, David Vrabel wrote:
>>> On 06/09/16 09:42, Dongli Zhang wrote:
This patch implemented parts of TODO left in commit id
a902c12ee45fc9389eb8fe54eeddaf267a555c58. It moved TLB-flush filteri
>>> On 06.09.16 at 12:16, wrote:
> Razvan Cojocaru writes ("[PATCH V3] tools/libxc, xen/x86: Added
> xc_set_mem_access_multi()"):
>> Currently it is only possible to set mem_access restrictions only for
>> a contiguous range of GFNs (or, as a particular case, for a single GFN).
>> This patch intr
On 09/06/2016 01:26 PM, Jan Beulich wrote:
On 06.09.16 at 12:16, wrote:
>> Razvan Cojocaru writes ("[PATCH V3] tools/libxc, xen/x86: Added
>> xc_set_mem_access_multi()"):
>>> Currently it is only possible to set mem_access restrictions only for
>>> a contiguous range of GFNs (or, as a partic
On Tue, Sep 06, 2016 at 01:27:21PM +0300, Razvan Cojocaru wrote:
> On 09/06/2016 01:16 PM, Ian Jackson wrote:
> > Razvan Cojocaru writes ("[PATCH V3] tools/libxc, xen/x86: Added
> > xc_set_mem_access_multi()"):
> >> Currently it is only possible to set mem_access restrictions only for
> >> a conti
>>> On 06.09.16 at 12:12, wrote:
> In a similar style to hvm_do_hypercall(). The C version is far easier to
> understand and edit than the assembly versions.
>
> There are a few small differences however. The register clobbering values
> have changed (to match the HVM side), and in particular c
Razvan Cojocaru writes ("Re: [PATCH V3] tools/libxc, xen/x86: Added
xc_set_mem_access_multi()"):
> On 09/06/2016 01:16 PM, Ian Jackson wrote:
> > Could this aim be achieved with a multicall ? (Can multicalls defer
> > the TLB flush?)
>
> I assume your question is: could we do multiple xc_set_mem
>>> On 06.09.16 at 12:12, wrote:
> Editing (and indeed, finding) the hypercall tables can be tricky, especially
> towards the end where .rept's are used to maintain the correct layout.
>
> Move this all into C, and let the compiler do the hard work.
>
> To do this, xen/hypercall.h and asm-x86/hy
Hi Ravzan,
On 06/09/16 11:00, Razvan Cojocaru wrote:
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index b648a9d..e65a9b8 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.c
@@ -1836,6 +1836,15 @@ long p2m_set_mem_access(struct domain *d, gfn_t gfn,
uint32_t nr,
return 0;
}
+
On 06/09/16 11:16, Ian Jackson wrote:
> Razvan Cojocaru writes ("[PATCH V3] tools/libxc, xen/x86: Added
> xc_set_mem_access_multi()"):
>> Currently it is only possible to set mem_access restrictions only for
>> a contiguous range of GFNs (or, as a particular case, for a single GFN).
>> This patch
On 06/09/16 11:37, Jan Beulich wrote:
On 06.09.16 at 12:12, wrote:
>> Editing (and indeed, finding) the hypercall tables can be tricky, especially
>> towards the end where .rept's are used to maintain the correct layout.
>>
>> Move this all into C, and let the compiler do the hard work.
>>
>>
Hello,
> On 06/09/16 11:00, Razvan Cojocaru wrote:
>> diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
>> index b648a9d..e65a9b8 100644
>> --- a/xen/arch/arm/p2m.c
>> +++ b/xen/arch/arm/p2m.c
>> @@ -1836,6 +1836,15 @@ long p2m_set_mem_access(struct domain *d, gfn_t
>> gfn, uint32_t nr,
>>
On Tue, Sep 06, 2016 at 11:09:42AM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [Xen-devel] [PATCH 0/3] tools: support autoballooning of
> xenstore domain"):
> > On Mon, Aug 29, 2016 at 08:22:14AM +0200, Juergen Gross wrote:
> > > So Mini-OS ballooning is available now. Anything missing from m
Add a new xl command "qemu-monitor-command" to issue arbitrary commands
to a domain's device model. Syntax is:
xl qemu-monitor-command
The command is issued via qmp human-monitor-command command. Any
information returned by the command is printed to stdout.
Signed-off-by: Juergen Gross
---
V3
On 06/09/16 11:45, Razvan Cojocaru wrote:
Hello,
On 06/09/16 11:00, Razvan Cojocaru wrote:
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index b648a9d..e65a9b8 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.c
@@ -1836,6 +1836,15 @@ long p2m_set_mem_access(struct domain *d, gfn
On 01/09/16 22:51, Daniel Kiper wrote:
Hey Julien,
Hi Daniel,
On Thu, Sep 01, 2016 at 01:47:05PM +0100, Julien Grall wrote:
We have a couple series (this series and [1]) to allow grub booting
Xen on ARM that have been waiting on the GRUB ML for a while to be
pushed.
Those patches have bee
On 09/06/2016 01:51 PM, Julien Grall wrote:
>
>
> On 06/09/16 11:45, Razvan Cojocaru wrote:
>> Hello,
>>
>>> On 06/09/16 11:00, Razvan Cojocaru wrote:
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index b648a9d..e65a9b8 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm
On 9/2/2016 6:47 PM, Yu Zhang wrote:
XenGT leverages ioreq server to track and forward the accesses to GPU
I/O resources, e.g. the PPGTT(per-process graphic translation tables).
Currently, ioreq server uses rangeset to track the BDF/ PIO/MMIO ranges
to be emulated. To select an ioreq server, th
On 06/09/16 11:51, Julien Grall wrote:
>
>
> On 06/09/16 11:45, Razvan Cojocaru wrote:
>> Hello,
>>
>>> On 06/09/16 11:00, Razvan Cojocaru wrote:
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index b648a9d..e65a9b8 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.
On 06/09/16 12:05, George Dunlap wrote:
On 06/09/16 11:51, Julien Grall wrote:
On 06/09/16 11:45, Razvan Cojocaru wrote:
Hello,
On 06/09/16 11:00, Razvan Cojocaru wrote:
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index b648a9d..e65a9b8 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/
On September 06, 2016 5:05 PM, Jan Beulich
On 06.09.16 at 10:53, wrote:
>> to be honest, my fix is also a tradeoff.. w/ my patch, multiple
>> pending pt interrupt instances may be combined as one injection of
>> guest timer interrupt..
>> but as Yang said, It should be ok since it happens r
On 06/09/16 12:20, Julien Grall wrote:
>
>
> On 06/09/16 12:05, George Dunlap wrote:
>> On 06/09/16 11:51, Julien Grall wrote:
>>>
>>>
>>> On 06/09/16 11:45, Razvan Cojocaru wrote:
Hello,
> On 06/09/16 11:00, Razvan Cojocaru wrote:
>> diff --git a/xen/arch/arm/p2m.c b/xen/arch/a
On 09/06/2016 02:20 PM, Julien Grall wrote:
>
>
> On 06/09/16 12:05, George Dunlap wrote:
>> On 06/09/16 11:51, Julien Grall wrote:
>>>
>>>
>>> On 06/09/16 11:45, Razvan Cojocaru wrote:
Hello,
> On 06/09/16 11:00, Razvan Cojocaru wrote:
>> diff --git a/xen/arch/arm/p2m.c b/xen/a
On 26/08/2016 10:51, "Wei Liu" wrote:
>On Fri, Aug 26, 2016 at 03:35:38PM +0100, Lars Kurth wrote:
>>
>>
>> On 26/08/2016 07:49, "Wei Liu" wrote:
>>
>> >On Sat, Aug 13, 2016 at 09:28:49AM +, Lars Kurth wrote:
>> >>
>> >> >> How about:
>> >> >> +- Failed: Only **-1** or **0** votes by
On 5 September 2016 at 20:02, Stefano Stabellini wrote:
> The following changes since commit 12d2c4184c5ab60be3428b2bdea5ae66e8d5d960:
>
> Update version for v2.7.0-rc5 release (2016-08-30 20:39:45 +0100)
>
> are available in the git repository at:
>
> git://xenbits.xen.org/people/sstabellini/
On 06/09/16 12:36, Razvan Cojocaru wrote:
On 09/06/2016 02:20 PM, Julien Grall wrote:
On 06/09/16 12:05, George Dunlap wrote:
On 06/09/16 11:51, Julien Grall wrote:
On 06/09/16 11:45, Razvan Cojocaru wrote:
Hello,
On 06/09/16 11:00, Razvan Cojocaru wrote:
diff --git a/xen/arch/arm/p2
George Dunlap writes ("Re: [PATCH V3] tools/libxc, xen/x86: Added
xc_set_mem_access_multi()"):
> So you really don't mind if Razvan submits a patch for code that he
> hasn't tested and isn't sure works?
I don't think that's a very good idea. (Are there possible security
implications? It's not e
On 06/09/16 12:34, George Dunlap wrote:
On 06/09/16 12:20, Julien Grall wrote:
On 06/09/16 12:05, George Dunlap wrote:
On 06/09/16 11:51, Julien Grall wrote:
On 06/09/16 11:45, Razvan Cojocaru wrote:
Hello,
On 06/09/16 11:00, Razvan Cojocaru wrote:
diff --git a/xen/arch/arm/p2m.c b/x
On 06/09/16 12:51, Ian Jackson wrote:
George Dunlap writes ("Re: [PATCH V3] tools/libxc, xen/x86: Added
xc_set_mem_access_multi()"):
So you really don't mind if Razvan submits a patch for code that he
hasn't tested and isn't sure works?
I don't think that's a very good idea. (Are there pos
On Tue, 2016-09-06 at 12:51 +0200, Juergen Gross wrote:
> Add a new xl command "qemu-monitor-command" to issue arbitrary
> commands
> to a domain's device model. Syntax is:
>
> xl qemu-monitor-command
>
> The command is issued via qmp human-monitor-command command. Any
> information returned by
When I run Xen (4.7.0) nested in VirtualBox (5.0.24_Ubuntu r108355) with a
linux-4.7.2 Dom0 kernel, none of my DomU's (linux-3.17.3) have network
connectivity because they reject all packets with the error 'Invalid extra
type: 4'. When I run exactly the same setup on bare metal, I don't get the
On 09/06/2016 02:53 PM, Julien Grall wrote:
>
>
> On 06/09/16 12:34, George Dunlap wrote:
>> On 06/09/16 12:20, Julien Grall wrote:
>>>
>>>
>>> On 06/09/16 12:05, George Dunlap wrote:
On 06/09/16 11:51, Julien Grall wrote:
>
>
> On 06/09/16 11:45, Razvan Cojocaru wrote:
>> He
The version of gcc (4.9.2) I use put constructors into .init_array*
section(s). Collect those sections into constructor list as well.
Modify both arm and x86 scripts to keep them in sync.
Signed-off-by: Wei Liu
Acked-by: Julien Grall
---
v2: move .init_arry before .init_array.*
Cc: Stefano Sta
Signed-off-by: Wei Liu
---
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/arm/traps.c| 5 +++--
xen/arch/x86/x86_64/traps.c | 5 +++--
xen/drivers/char/console.c | 5 +++--
xen/include/xen/lib.h | 6 ++
4 files changed, 15 insertions(
Wei Liu (4):
xen: indicate gcov in log messages
gcov: collect more sections to constructor list
xen: replace TEST_COVERAGE with CONFIG_GCOV
xen: make clear gcov support limitation in Kconfig
xen/Kconfig.debug | 6 ++
xen/Rules.mk| 2 +-
xen/arch/arm/traps.c
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
xen/Kconfig.debug | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug
The sole purpose of TEST_COVERAGE macro is to guard the availability of
gcov sysctl. Now we have a proper CONFIG_GCOV, use it.
Signed-off-by: Wei Liu
Acked-by: Jan Beulich
---
xen/Rules.mk | 2 +-
xen/common/sysctl.c| 2 +-
xen/include/xen/gcov.h | 2 +-
3 files changed, 3 inserti
I tried to install Xen (4.7.0 with linux 4.7.2 Dom0) on an AWS virtual machine
and it failed because while AWS uses Xen it requires that you use the PVHVM
network driver. I then tried to install Xen on a Google Cloud virtual machine
and despite also requiring you to use PV drivers, that succeede
On 06/09/16 13:41, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> Cc: Stefano Stabellini
> Cc: Julien Grall
> Cc: Jan Beulich
> Cc: Andrew Cooper
> ---
> xen/arch/arm/traps.c| 5 +++--
> xen/arch/x86/x86_64/traps.c | 5 +++--
> xen/drivers/char/console.c | 5 +++--
> xen/include/xen
Hi all,
the Winter Outreachy round is coming up. Given that the winter round is
typically a little quieter and we do not have an extensive list of projects, I
only requested funding for 1 slot in this round.
Please update starter projects, add new ones, etc. to
https://wiki.xenproject.org/wiki
> -Original Message-
> From: Anthony Wright [mailto:anth...@overnetdata.com]
> Sent: 06 September 2016 13:23
> To: Xen-devel
> Cc: Paul Durrant
> Subject: Bug in hash changes to netback in 4.7.2 kernel
>
> When I run Xen (4.7.0) nested in VirtualBox (5.0.24_Ubuntu r108355) with a
> linux
On 06/09/16 13:47, Anthony Wright wrote:
> I tried to install Xen (4.7.0 with linux 4.7.2 Dom0) on an AWS virtual
> machine and it failed because while AWS uses Xen it requires that you use the
> PVHVM network driver. I then tried to install Xen on a Google Cloud virtual
> machine and despite al
On Mon, Sep 05, 2016 at 05:47:54PM +0200, Dario Faggioli wrote:
> On Wed, 2016-08-31 at 10:21 -0400, Konrad Rzeszutek Wilk wrote:
> > >
> > > * Per-cpu tasklet
> > > - Konrad Rzeszutek Wilk
> > Waiting for review and hopefully test results from Intel.
> >
> I've just seen it (came back today f
Hi all
This patch series integrates XTF into OSSTest. All the prerequisites have been
met, so this is no longer RFC.
Please see (currently Citrix only):
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67651/
I'm going to run the same series a few more times to verify some assumptions.
Wei
From: Ian Jackson
Specifically:
* Parse it out of the hostflags when constructing the hid
* Look for the `hostalloc-diverse-FLIGHT-CLASS' ClientNote in
the resource plan, to avoid inappropriately planning to reuse hosts.
* Look for the `diversehosts_CLASS' runvar in other jobs in this fligh
From: Ian Jackson
This generates a flight with two jobs, test-1 and test-2. They can be
run, and are supposed to allocate different hosts, and will bomb out
after host allocation.
Signed-off-by: Ian Jackson
CC: Wei Liu
---
make-flight-diverse-test | 11 +++
1 file changed, 11 inserti
From: Ian Jackson
Some jobs runs steps in parallel. Do not add up all the individual
step durations. Instead, calculate the duration as the time between
first step start and last step finish.
Signed-off-by: Ian Jackson
Signed-off-by: Wei Liu
---
Osstest/Executive.pm | 2 +-
1 file changed,
From: Ian Jackson
cs-bisection step wants to completely ignore all skipped steps. So we
adjust the one query which doesn't already insist on particular status
values, to filter out `skip'.
Signed-off-by: Ian Jackson
---
cs-bisection-step | 1 +
1 file changed, 1 insertion(+)
diff --git a/cs-
From: Ian Jackson
Signed-off-by: Ian Jackson
---
sg-run-job | 1 +
1 file changed, 1 insertion(+)
diff --git a/sg-run-job b/sg-run-job
index 6d455c7..1c154be 100755
--- a/sg-run-job
+++ b/sg-run-job
@@ -1,4 +1,5 @@
#!/usr/bin/tclsh8.5
+# -*- Tcl -*-
# This is part of "osstest", an automate
From: Ian Jackson
We are going to want this to implement the new diverse-CLASS hostflag.
Signed-off-by: Ian Jackson
CC: Wei Liu
---
ts-hosts-allocate-Executive | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/ts-hosts-allocate-Executive b/ts-hosts-allocate-Executive
i
From: Ian Jackson
* When we are doing archaeology, searching for flight(s) which ran a
particular testid, ignore all flights where the testid was skipped.
* In a flight we are examining for failures we need to justify, do not
regard `skip' as a failure which requires investigation. We
thu
From: Ian Jackson
There does not seem to be any reason for this. I think it must be a
leftover from a previous use of { A => X, B => Y, ... } syntax.
Signed-off-by: Ian Jackson
CC: Wei Liu
---
ts-hosts-allocate-Executive | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a
1 - 100 of 221 matches
Mail list logo