On 2016/9/12 23:18, Julien Grall wrote:
> Hi Shannon,
>
> On 02/09/16 03:55, Shannon Zhao wrote:
>> From: Shannon Zhao
>>
>> Here it adds the ACPI tables size to set the target maxmem to avoid
>> providing less available memory for guest.
>>
>> Signed-off-by: Shannon Zhao
>> ---
>> tools/libx
On a machine with a mount of cpus, dump_timerq() lasts several seconds
which may exceed watchdog timeout and cause Xen hyperviosr reboot.
This patch is to disable watchdog when dump timer queues to fix the
issue.
Signed-off-by: Lan Tianyu
---
xen/common/timer.c |4
1 files changed, 4 in
>>> On 12.09.16 at 19:28, wrote:
Please try to get quoting right - your response was rather hard to
follow.
> On Sep 12, 2016, at 2:00 AM, Jan Beulich
> mailto:jbeul...@suse.com>> wrote:
>
> On 12.09.16 at 10:47,
> mailto:andrew.coop...@citrix.com>> wrote:
> c/s 350bc1a9d4 "x86: support newer
>>> On 12.09.16 at 18:21, wrote:
> Without checking the size input, the memcpy() for the uncompressed path might
> read off the end of the vcpu's xsave_area. Both callers pass the approprite
> size, so hold them to it with a BUG_ON().
>
> The compressed path is currently dead code, but its attem
>>> On 12.09.16 at 18:21, wrote:
> compress_xsave_states() mustn't read xstate_bv or xcomp_bv before first
> confirming that the input buffer is large enough. It also doesn't cope with
> compressed input. Make all of these problems the callers responsbility to
> ensure.
>
> Simplify the decompr
On 13/09/16 08:51, Jan Beulich wrote:
On 12.09.16 at 19:28, wrote:
> Please try to get quoting right - your response was rather hard to
> follow.
>
>> On Sep 12, 2016, at 2:00 AM, Jan Beulich
>> mailto:jbeul...@suse.com>> wrote:
>>
>> On 12.09.16 at 10:47,
>> mailto:andrew.coop...@citrix.co
This run is configured for baseline tests only.
flight 67702 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67702/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 10 guest-start
Hi Julien,
On 09/09/2016 07:02 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/16 23:16, Sergej Proskurin wrote:
>> The current implementation differentiates between flushing and
>> destroying altp2m views. This commit adds the function altp2m_flush,
>> which allows to release all of the alt
>>> On 11.09.16 at 22:35, wrote:
> --- a/xen/include/asm-x86/cpufeature.h
> +++ b/xen/include/asm-x86/cpufeature.h
> @@ -34,6 +34,7 @@ XEN_CPUFEATURE(MFENCE_RDTSC,(FSCAPINTS+0)*32+ 9) /*
> MFENCE synchronizes RDTS
>
> /* An alias of a feature we know is always going to be present. */
> #d
>>> On 11.09.16 at 22:35, wrote:
> Furthermore on x86 the bloat-o-meter detects that with this
> change:
>
> [konrad@char xen]$ ~/linux/scripts/bloat-o-meter xen-syms xen-syms.align4
> add/remove: 0/0 grow/shrink: 3/14 up/down: 115/-1497 (-1382)
> function old
Hi Julien,
On 09/09/2016 07:14 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/16 23:16, Sergej Proskurin wrote:
>> +static int altp2m_init_helper(struct domain *d, unsigned int idx)
>> +{
>> +int rc;
>> +struct p2m_domain *p2m = d->arch.altp2m_p2m[idx];
>> +
>> +ASSERT(p2m == NU
On 13/09/16 09:27, Jan Beulich wrote:
On 12.09.16 at 18:21, wrote:
>> compress_xsave_states() mustn't read xstate_bv or xcomp_bv before first
>> confirming that the input buffer is large enough. It also doesn't cope with
>> compressed input. Make all of these problems the callers responsbil
On 13/09/16 09:23, Jan Beulich wrote:
On 12.09.16 at 18:21, wrote:
>> Without checking the size input, the memcpy() for the uncompressed path might
>> read off the end of the vcpu's xsave_area. Both callers pass the approprite
>> size, so hold them to it with a BUG_ON().
>>
>> The compressed
Really fix the address this time...
On Tue, Sep 13, 2016 at 10:39:02AM +0100, Wei Liu wrote:
> Hi,
>
> I just realise that your xen-devel address is wrong.
>
> It should be xen-devel@lists.xen.org.
>
> On Tue, Sep 13, 2016 at 03:30:51AM +, Chen, Farrah wrote:
> > Hi Wei,
> >
> > We have up
On 12/09/16 15:32, Jan Beulich wrote:
On 09.09.16 at 17:16, wrote:
>> The following code illustrates this idea:
>>
>> typedef struct dm_op_buffer {
>> XEN_GUEST_HANDLE(void) h;
>> size_t len;
>> } dm_op_buffer_t;
>
> This implies that we'll lose all type safety on the handles passe
Hi Shannon,
On 13/09/16 08:03, Shannon Zhao wrote:
On 2016/9/12 23:18, Julien Grall wrote:
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
Here it adds the ACPI tables size to set the target maxmem to avoid
providing less available memory for guest.
Signed-off-by: S
On 05/09/16 14:47, Dario Faggioli wrote:
> On Wed, 2016-08-31 at 18:10 +0100, anshul makkar wrote:
>> On 17/08/16 18:18, Dario Faggioli wrote:
>>>
>>> Right now, the following scenario can occurr:
>>> - upon vcpu v wakeup, v itself is put in the runqueue,
>>> and pcpu X is tickled;
>>> - pc
On 17/08/16 18:18, Dario Faggioli wrote:
> Right now, the following scenario can occurr:
> - upon vcpu v wakeup, v itself is put in the runqueue,
>and pcpu X is tickled;
> - pcpu Y schedules (for whatever reason), sees v in
>the runqueue and picks it up.
>
> This may seem ok (or even a g
[using xendevel correct address]
On Tue, 2016-09-13 at 16:54 +0800, Wei Yang wrote:
> On Fri, 2016-09-09 at 17:41 +0800, Wei Yang wrote:
> >
> > I'm not surprised by that. Yet, I'd be interested in hearing more
> > about this profiling you have done (things like, how you captured
> > the data, wh
This run is configured for baseline tests only.
flight 67703 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67703/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop
>>> On 13.09.16 at 12:37, wrote:
> On 12/09/16 15:32, Jan Beulich wrote:
> On 09.09.16 at 17:16, wrote:
>>> The following code illustrates this idea:
>>>
>>> typedef struct dm_op_buffer {
>>> XEN_GUEST_HANDLE(void) h;
>>> size_t len;
>>> } dm_op_buffer_t;
>>
>> This implies that we
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
The design of this feature is described as below.
Firstly, the toolstack (libxl) generates the ACPI tables according the
number of vcpus and gic controller.
Then, it copies these ACPI tables to DomU non-RAM memory map space
branch xen-4.7-testing
xenbranch xen-4.7-testing
job build-amd64
testid xen-build
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree: xen
Hi Julien,
On 09/12/2016 10:41 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:16, Sergej Proskurin wrote:
>> Signed-off-by: Sergej Proskurin
>> ---
>> Cc: Stefano Stabellini
>> Cc: Julien Grall
>> ---
>> v2: Substituted the call to tlb_flush for p2m_flush_table.
>> Added comm
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not in 4GB address space, then the IPs will not work properly.
Introduce dom0_lowmem bootargs, user could pass "dom0_lowmem=xx"
to xen. It means how much memory user w
flight 100902 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100902/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 16 guest-start.2fail in 100893 pass in 100902
test-armhf-armhf-xl-cubietruck 1
Hello Peng,
On 13/09/16 13:55, Peng Fan wrote:
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not in 4GB address space, then the IPs will not work properly.
Introduce dom0_lowmem bootargs, user could pass "dom0_
Hi Julien,
On 09/12/2016 10:47 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:16, Sergej Proskurin wrote:
>> Signed-off-by: Sergej Proskurin
>> ---
>> Cc: Stefano Stabellini
>> Cc: Julien Grall
>> ---
>> v3: Extended the function "altp2m_switch_domain_altp2m_by_id" so that if
>>
flight 100924 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100924/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Hi Julien,
On 2016/9/13 19:56, Julien Grall wrote:
> Hi Shannon,
>
> On 02/09/16 03:55, Shannon Zhao wrote:
>> From: Shannon Zhao
>>
>> The design of this feature is described as below.
>> Firstly, the toolstack (libxl) generates the ACPI tables according the
>> number of vcpus and gic controlle
flight 67704 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67704/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-i386-current-netinst-pygrub 10 guest-start fail REGR. vs.
67647
Re
On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
> All,
>
> in
> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
> and
> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01210.html
> Andrew basically suggests that we should switch away from usi
Hi Julien,
On Tue, Sep 13, 2016 at 01:59:01PM +0100, Julien Grall wrote:
>Hello Peng,
>
>On 13/09/16 13:55, Peng Fan wrote:
>>On AArch64 SoCs, some IPs may only have the capability to access
>>32bits address space. The physical memory assigned for Dom0 maybe
>>not in 4GB address space, then the IPs
On 13/09/16 14:12, Peng Fan wrote:
Hi Julien,
On Tue, Sep 13, 2016 at 01:59:01PM +0100, Julien Grall wrote:
Hello Peng,
On 13/09/16 13:55, Peng Fan wrote:
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not in
Hi Julien,
On 09/12/2016 10:53 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:16, Sergej Proskurin wrote:
>> This commit extends the function prototypes of the functions:
>> * __p2m_get_mem_access
>> * p2m_mem_access_check_and_get_page
>>
>> We extend the function prototype of "__p2
On 13/09/16 14:27, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 10:53 AM, Julien Grall wrote:
Hello Sergej,
On 16/08/2016 23:16, Sergej Proskurin wrote:
This commit extends the function prototypes of the functions:
* __p2m_get_mem_access
* p2m_mem_access_check_and_get_
On 17/08/16 18:18, Dario Faggioli wrote:
> When a vcpu explicitly yields it is usually giving
> us an advice of "let someone else run and come back
> to me in a bit."
>
> Credit2 isn't, so far, doing anything when a vcpu
> yields, which means an yield is basically a NOP (well,
> actually, it's pur
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
> Beulich
> Sent: 12 September 2016 16:24
> To: xen-devel
> Subject: [Xen-devel] BUG_ON() vs ASSERT()
>
> All,
>
> in
> https://lists.xenproject.org/archives/html/xen-devel/2016-
> 09/msg0120
Hi Julien,
On 09/13/2016 03:30 PM, Julien Grall wrote:
>
>
> On 13/09/16 14:27, Sergej Proskurin wrote:
>> Hi Julien,
>
> Hello Sergej,
>
>>
>> On 09/12/2016 10:53 AM, Julien Grall wrote:
>>> Hello Sergej,
>>>
>>> On 16/08/2016 23:16, Sergej Proskurin wrote:
This commit extends the function
On 13/09/16 14:42, Sergej Proskurin wrote:
Hi Julien,
On 09/13/2016 03:30 PM, Julien Grall wrote:
On 13/09/16 14:27, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 10:53 AM, Julien Grall wrote:
Hello Sergej,
On 16/08/2016 23:16, Sergej Proskurin wrote:
This commit
On Thu, Sep 08, 2016 at 12:24:46PM +0200, Laszlo Ersek wrote:
> On 09/08/16 11:38, Anthony PERARD wrote:
> > Hello,
> >
> > We are introducing a new virtualisation mode in Xen called PVHv2 (also
> > called hvmlite in the past). We would like to have a UEFI firmware
> > running on it to make it eas
On Tue, 13 Sep 2016 09:10:32 -0400 Konrad Rzeszutek Wilk wrote:
> On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
> > All,
> >
> > in
> > https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
> > and
> > https://lists.xenproject.org/archives/html/xen-devel/2016-09
flight 100905 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100905/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail like 100813
test-amd64-i386-xl-qemut
Hi Julien,
On 09/12/2016 11:02 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:17, Sergej Proskurin wrote:
>> This commit extends the function "p2m_mem_access_check" and
>> "p2m_mem_access_check_and_get_page" to consider altp2m. The function
>> "p2m_mem_access_check_and_get_page" nee
On 13/09/16 15:00, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 11:02 AM, Julien Grall wrote:
On 16/08/2016 23:17, Sergej Proskurin wrote:
This commit extends the function "p2m_mem_access_check" and
"p2m_mem_access_check_and_get_page" to consider altp2m. The function
"p2
Hi Julien,
On 09/12/2016 11:17 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:17, Sergej Proskurin wrote:
>> This commit makes sure that the page reference count is updated through
>> the function "p2m_put_l3_page" only the entries have been freed from the
>> hosts's p2m.
>>
>> Sign
Hi Julien,
On 09/12/2016 04:18 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/16 23:17, Sergej Proskurin wrote:
>> This commit adds the function "altp2m_lazy_copy" implementing the altp2m
>> paging mechanism. The function "altp2m_lazy_copy" lazily copies the
>> hostp2m's mapping into the cu
On 13/09/16 16:06, Sergej Proskurin wrote:
+}
+
+out:
+p2m_read_unlock(hp2m);
+
+return true;
+}
+
static inline void altp2m_reset(struct p2m_domain *p2m)
{
p2m_write_lock(p2m);
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 0bf1653..a4c923c 100644
--- a/xen/a
Hi Julien,
On 09/12/2016 04:29 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/16 23:17, Sergej Proskurin wrote:
>> Signed-off-by: Sergej Proskurin
>> ---
>> Cc: Stefano Stabellini
>> Cc: Julien Grall
>> ---
>> v2: Dump p2m information of the hostp2m and all altp2m views.
>> ---
>> xen/a
On 13/09/16 14:06, Shannon Zhao wrote:
Hi Julien,
Hello Shannon,
On 2016/9/13 19:56, Julien Grall wrote:
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
The design of this feature is described as below.
Firstly, the toolstack (libxl) generates the ACPI tables acco
On 13/09/16 16:17, Julien Grall wrote:
On 13/09/16 14:06, Shannon Zhao wrote:
Hi Julien,
Hello Shannon,
On 2016/9/13 19:56, Julien Grall wrote:
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
The design of this feature is described as below.
Firstly, the toolst
>>> On 13.09.16 at 16:56, wrote:
Seems like mistakenly dropped xen-devel in my earlier reply; re-added.
> On 9/13/2016 5:02 PM, Jan Beulich wrote:
> On 13.09.16 at 09:12, wrote:
>>> On a machine with a mount of cpus, dump_timerq() lasts several seconds
>>> which may exceed watchdog timeout
Hi Wei,
On 08/24/2016 02:27 PM, Wei Liu wrote:
> On Wed, Aug 17, 2016 at 12:17:14AM +0200, Sergej Proskurin wrote:
>> This commit extends xen-access by a simple test of the functionality
>> provided by "xc_altp2m_change_gfn". The idea is to dynamically remap a
>> trapping gfn to another mfn, whic
On Mon, Sep 12, 2016 at 01:49:51AM -0600, Jan Beulich wrote:
> >>> On 11.09.16 at 17:48, wrote:
> > --- a/docs/misc/livepatch.markdown
> > +++ b/docs/misc/livepatch.markdown
> > @@ -875,6 +875,12 @@ section and the new function will reference the new
> > string in the new
> >
> > This is imple
Hi Julien,
On 09/13/2016 05:08 PM, Julien Grall wrote:
>
>
> On 13/09/16 16:06, Sergej Proskurin wrote:
+}
+
+out:
+p2m_read_unlock(hp2m);
+
+return true;
+}
+
static inline void altp2m_reset(struct p2m_domain *p2m)
{
p2m_w
On 09/11/2016 04:48 PM, Konrad Rzeszutek Wilk wrote:
The initial patch: 11ff40fa7bb5fdcc69a58d0fec49c904ffca4793
"xen/xsplice: Hypervisor implementation of XEN_XSPLICE_op" caps the
size of the binary at 2MB. We follow that in capping the size
of the .BSSes to be at maximum 2MB.
Signed-off-by: Ko
On 12/09/16 15:32, Jan Beulich wrote:
On 09.09.16 at 17:16, wrote:
>> The following code illustrates this idea:
>>
>> typedef struct dm_op_buffer {
>> XEN_GUEST_HANDLE(void) h;
>> size_t len;
>> } dm_op_buffer_t;
>
> This implies that we'll lose all type safety on the handles passe
> On Sep 13, 2016, at 2:05 AM, Andrew Cooper wrote:
>
> On 13/09/16 08:51, Jan Beulich wrote:
> On 12.09.16 at 19:28, wrote:
>> Please try to get quoting right - your response was rather hard to
>> follow.
>>
>>> On Sep 12, 2016, at 2:00 AM, Jan Beulich
>>> mailto:jbeul...@suse.com>> wrot
>>> On 13.09.16 at 17:59, wrote:
> On Mon, Sep 12, 2016 at 01:49:51AM -0600, Jan Beulich wrote:
>> >>> On 11.09.16 at 17:48, wrote:
>> > --- a/docs/misc/livepatch.markdown
>> > +++ b/docs/misc/livepatch.markdown
>> > @@ -875,6 +875,12 @@ section and the new function will reference the new
>> > s
This makes the code a little easier to read.
Moving hvm_altp2m_supported() check into functions that use it
for better readability.
Moving ept code to ept specific files as requested in:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04323.html
Renamed p2m_init_altp2m_helper() to
Indent goto labels by one space.
Inline (header) altp2m functions.
In do_altp2m_op(), during the sanity check of the passed command,
return -ENONSYS if not a valid command.
In do_altp2m_op(), when evaluating a command, ASSERT_UNREACHABLE()
if the command is not recognizable. The sanity check above
Altp2m cleanup work
The altp2m clean work is motivated by the following URLs:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04323.html
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04454.html
https://lists.xenproject.org/archives/html/xen-devel/2015-07/
Ravi Sahita's dynamically allocated altp2m domain.
Introduce set_altp2m_active() and altp2m_active() api()s.
Signed-off-by: Ravi Sahita
Signed-off-by: Paul Lai
---
xen/arch/x86/hvm/hvm.c| 8 +++---
xen/arch/x86/hvm/vmx/vmx.c| 2 +-
xen/arch/x86/mm/altp2m.c | 16 +--
x
On 12/09/16 17:20, Lars Kurth wrote:
> Added RTC Policy
> Added +2 ... -2 scheme for votes
> Clarified lazy consensus (tallying and lazy voting)
> Added Informal Votes/Surveys
> Added Project Team Leadership role and Decision making
> Added Community Decisions with Funding and Legal Implications
>
On Mon, Sep 12, 2016 at 04:31:20PM +0100, Julien Grall wrote:
> Hi,
>
> On 12/09/16 16:28, Jan Beulich wrote:
> > > > > On 11.09.16 at 22:35, wrote:
> > > x86 implements all of them by default - and we just
> > > add two extra HAS_ variables to be declared in autoconf.h.
> > >
> > > ARM 64 only
On 13/09/2016 17:46, "George Dunlap" wrote:
>On 12/09/16 17:20, Lars Kurth wrote:
>> Added RTC Policy
>> Added +2 ... -2 scheme for votes
>> Clarified lazy consensus (tallying and lazy voting)
>> Added Informal Votes/Surveys
>> Added Project Team Leadership role and Decision making
>> Added Com
> > > On Mon, Sep 12, 2016 at 07:31:42AM +, Chen, Farrah wrote:
> > > > When I compile xen with the latest commit in RHEL 6.7, it failed when
> > > > make tools. Errors showed when running edk2 build for OvmfPkgX64.
> > > > erAsm.iii:315: error: invalid combination of opcode and operands
The
I'm looking to get started with osstest and running to some roadblocks.
The page
https://blog.xenproject.org/2013/02/02/xen-automatic-test-system-osstest/ looks
like the place to begin, but
1. The README link returns 404 (file not found)
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob
Allows for the conditional inclusion of EHCI UART driver on the x86 platform
rather than having it always enabled.
The default configuration for the HAS_EHCI option remains 'y' on x86, so the
behavior out of the box remains unchanged. The addition of the option allows
advanced users to enable/dis
Allows for the conditional inclusion of NS16550 UART driver on the x86 platform
rather than having it always enabled.
The default configuration for the HAS_NS16550 option remains 'y' on x86, so the
behavior out of the box remains unchanged. The addition of the option allows
advanced users to enab
On Mon, Sep 12, 2016 at 11:47:35AM +0100, George Dunlap wrote:
> On 08/09/16 17:45, Lai, Paul C wrote:
> > [Paul2] in-line
>
> If you're going to engage in discussions on xen-devel it would really be
> worth your time to find a mail setup that allows you to actually quote
> properly such that you
On 13/09/16 18:35, Derek Straka wrote:
> Allows for the conditional inclusion of NS16550 UART driver on the x86
> platform
> rather than having it always enabled.
>
> The default configuration for the HAS_NS16550 option remains 'y' on x86, so
> the
> behavior out of the box remains unchanged. Th
On 13/09/16 18:35, Derek Straka wrote:
> Allows for the conditional inclusion of EHCI UART driver on the x86 platform
> rather than having it always enabled.
>
> The default configuration for the HAS_EHCI option remains 'y' on x86, so the
> behavior out of the box remains unchanged. The addition o
flight 100907 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100907/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail REGR. vs. 100895
test-amd64-amd6
Setting response flags in vm_event are only ever safe if the vCPUs are paused.
To reflect this we move all checks within the if block that already checks
whether this is the case. Checks that are only supported on one architecture
we relocate the bitmask operations to the arch-specific handlers to
When emulating instructions the emulator maintains a small i-cache fetched
from the guest memory. This patch extends the vm_event interface to allow
returning this i-cache via the vm_event response instead.
When responding to a SOFTWARE_BREAKPOINT event (INT3) the monitor subscriber
normally has t
On 12/09/16 16:23, Jan Beulich wrote:
> All,
>
> in
> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
> and
> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01210.html
> Andrew basically suggests that we should switch away from using
> ASSERT() and over t
On 13/09/16 14:46, Mihai Donțu wrote:
> On Tue, 13 Sep 2016 09:10:32 -0400 Konrad Rzeszutek Wilk wrote:
>> On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
>>> All,
>>>
>>> in
>>> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
>>> and
>>> https://lists.xenpro
On 08/09/16 14:07, Jan Beulich wrote:
> This way we can offer to callers the service of just sizing
> instructions, and we also can better guarantee not to raise the wrong
> fault due to not having read all relevant bytes.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/x86_emulate/x86_emula
On 08/09/16 14:09, Jan Beulich wrote:
> Now that all decoding happens in x86_decode() there's no need to keep
> the local registers copy in struct x86_emulate_state. Only rIP gets
> updated in the decode phase, so only that register needs tracking
> there. All other (read-only) registers can be rea
On Tue, Sep 13, 2016 at 03:21:04AM -0600, Jan Beulich wrote:
> >>> On 11.09.16 at 22:35, wrote:
> > Furthermore on x86 the bloat-o-meter detects that with this
> > change:
> >
> > [konrad@char xen]$ ~/linux/scripts/bloat-o-meter xen-syms xen-syms.align4
> > add/remove: 0/0 grow/shrink: 3/14 up/do
flight 100912 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100912/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 9 debian-di-installfail REGR. vs. 100866
Tests which did not suc
Hi Julien,
On 09/09/2016 06:56 PM, Julien Grall wrote:
> Hello Sergej
>
> On 16/08/16 23:16, Sergej Proskurin wrote:
>> diff --git a/xen/arch/arm/Makefile b/xen/arch/arm/Makefile
>> index 23aaf52..4a7f660 100644
>> --- a/xen/arch/arm/Makefile
>> +++ b/xen/arch/arm/Makefile
>> @@ -5,6 +5,7 @@ subd
Allows for the conditional inclusion of VGA driver on the x86 platform
rather than having it always enabled.
The default configuration for the CONFIG_VGA option remains 'y' on x86, so the
behavior out of the box remains unchanged. The addition of the option allows
advanced users to enable/disable
flight 100909 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100909/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-xtf-amd64-amd64-3 19 xtf/test-hvm32-invlpg~shadow fail baseline untested
test-xtf-amd64-amd64-3 2
On Thu, Sep 01, 2016 at 10:57:48AM -0700, Ed Swierk wrote:
> Windows 8, 10 and Server 2012 guests hang intermittently while booting
> on Xen 4.5.3 with 1 vCPU and 4 e1000 vNICs, shortly after the Windows
> logo appears and the little dots start spinning.
>
> Running strace on qemu shows its main t
On Mon, Sep 05, 2016 at 06:13:56AM -0400, Kyle Temkin wrote:
> From: "Kyle J. Temkin"
>
> Tegra boards feature a NS16550-compatible serial mapped into the MMIO
> space. Add support for its use both as a full-featured serial port and
> as an earlyprintk driver.
>
> Adds a new "needs_rtoie" (requi
flight 100932 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100932/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf dd82465a9f0f0beff0e4d74c6e3192b966853332
baseline version:
ovmf 8c0b0b34f7875571ee9d3
flight 100915 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100915/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 100877
test-amd64-amd64-xl-rtds
On 2016/9/13 23:17, Julien Grall wrote:
>
>
> On 13/09/16 14:06, Shannon Zhao wrote:
>> Hi Julien,
>
> Hello Shannon,
>
>> On 2016/9/13 19:56, Julien Grall wrote:
>>> Hi Shannon,
>>>
>>> On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
The design of this feature is de
On Wed, 14 Sep 2016, Shannon Zhao wrote:
> On 2016/9/13 23:17, Julien Grall wrote:
> >
> >
> > On 13/09/16 14:06, Shannon Zhao wrote:
> >> Hi Julien,
> >
> > Hello Shannon,
> >
> >> On 2016/9/13 19:56, Julien Grall wrote:
> >>> Hi Shannon,
> >>>
> >>> On 02/09/16 03:55, Shannon Zhao wrote:
> >>
On Tue, Sep 13, 2016 at 02:24:31PM +0100, Julien Grall wrote:
>
>
>On 13/09/16 14:12, Peng Fan wrote:
>>Hi Julien,
>>On Tue, Sep 13, 2016 at 01:59:01PM +0100, Julien Grall wrote:
>>>Hello Peng,
>>>
>>>On 13/09/16 13:55, Peng Fan wrote:
On AArch64 SoCs, some IPs may only have the capability to a
Hi
We can try the latest nasm. But there is still a problem that the included nasm
package does not work, it works well before xen commit (8c8b6fb02) . Does RHEL
6.7 still support compiling xen now?
Thanks,
Fan Chen
-Original Message-
From: Olaf Hering [mailto:o...@aepfle.de]
Sent:
On 9/13/16 2:40 PM, Derek Straka wrote:
> diff --git a/xen/arch/x86/efi/efi-boot.h b/xen/arch/x86/efi/efi-boot.h
> index 10985721..911fdfd 100644
> --- a/xen/arch/x86/efi/efi-boot.h
> +++ b/xen/arch/x86/efi/efi-boot.h
> @@ -476,6 +476,7 @@ static void __init efi_arch_edd(void)
> boot_edd_
> -Original Message-
> From: Wu, Feng
> Sent: Monday, September 5, 2016 11:12 AM
> To: Jan Beulich
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; Wu, Feng
> Subject: RE: [PATCH v3 4/6] Pause/Unpause th
flight 100933 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100933/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail like 100902
test-amd64-i386-xl-qemuu-wi
This run is configured for baseline tests only.
flight 67705 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67705/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boo
This run is configured for baseline tests only.
flight 67707 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67707/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf dd82465a9f0f0beff0e4d74c6e3192b966853332
baseline v
On 2016/9/8 2:59, Boris Ostrovsky wrote:
> PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor
> objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so
> that it can be included in ASLs for both HVM and PVH2.
>
> Signed-off-by: Boris Ostrovsky
> ---
> Ch
This run is configured for baseline tests only.
flight 67706 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67706/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1
1 - 100 of 105 matches
Mail list logo