This run is configured for baseline tests only.
flight 67708 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67708/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
Hello Peng,
On 14/09/2016 02:31, Peng Fan wrote:
On Tue, Sep 13, 2016 at 02:24:31PM +0100, Julien Grall wrote:
On 13/09/16 14:12, Peng Fan wrote:
Hi Julien,
On Tue, Sep 13, 2016 at 01:59:01PM +0100, Julien Grall wrote:
Hello Peng,
On 13/09/16 13:55, Peng Fan wrote:
On AArch64 SoCs, some I
Hello,
On 14/09/2016 02:06, Stefano Stabellini wrote:
On Wed, 14 Sep 2016, Shannon Zhao wrote:
On 2016/9/13 23:17, Julien Grall wrote:
On 13/09/16 14:06, Shannon Zhao wrote:
Hi Julien,
Hello Shannon,
On 2016/9/13 19:56, Julien Grall wrote:
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao w
Chen, Farrah would like to recall the message, "OVMF compile error".
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Chen, Farrah would like to recall the message, "OVMF compile error".
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hello,
On 14/09/2016 06:12, Peng Fan wrote:
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not in 4GB address space, then the IPs will not work properly.
Introduce dom0_lowmem bootargs, user could pass "dom0_low
On 2016/9/14 15:14, Julien Grall wrote:
> Hello,
>
> On 14/09/2016 02:06, Stefano Stabellini wrote:
>> On Wed, 14 Sep 2016, Shannon Zhao wrote:
>>> On 2016/9/13 23:17, Julien Grall wrote:
On 13/09/16 14:06, Shannon Zhao wrote:
> Hi Julien,
Hello Shannon,
> O
On 14/09/2016 08:32, Shannon Zhao wrote:
>
>
> On 2016/9/14 15:14, Julien Grall wrote:
>> Hello,
>>
>> On 14/09/2016 02:06, Stefano Stabellini wrote:
>>> On Wed, 14 Sep 2016, Shannon Zhao wrote:
On 2016/9/13 23:17, Julien Grall wrote:
>
>
> On 13/09/16 14:06, Shannon Zhao wrote
Hello Julien,
On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
>Hello,
>
>On 14/09/2016 06:12, Peng Fan wrote:
>>On AArch64 SoCs, some IPs may only have the capability to access
>>32bits address space. The physical memory assigned for Dom0 maybe
>>not in 4GB address space, then the IPs
On 09/13/2016 09:12 PM, Tamas K Lengyel wrote:
> Setting response flags in vm_event are only ever safe if the vCPUs are paused.
> To reflect this we move all checks within the if block that already checks
> whether this is the case. Checks that are only supported on one architecture
> we relocate t
This run is configured for baseline tests only.
flight 67709 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67709/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d947fbed72226011961e5e2691f09baebf128795
baseline v
Hi Julien
[...]
>>> static void do_trap_instr_abort_guest(struct cpu_user_regs *regs,
>>>const union hsr hsr)
>>> {
>>> @@ -2445,6 +2465,14 @@ static void do_trap_instr_abort_guest(struct
>>> cpu_user_regs *regs,
>>> break;
>>> case FSC_FLT
On 09/13/2016 09:12 PM, Tamas K Lengyel wrote:
> When emulating instructions the emulator maintains a small i-cache fetched
> from the guest memory. This patch extends the vm_event interface to allow
> returning this i-cache via the vm_event response instead.
>
> When responding to a SOFTWARE_BREA
On 2016/9/14 15:40, Julien Grall wrote:
>
> On 14/09/2016 08:32, Shannon Zhao wrote:
>> >
>> >
>> > On 2016/9/14 15:14, Julien Grall wrote:
>>> >> Hello,
>>> >>
>>> >> On 14/09/2016 02:06, Stefano Stabellini wrote:
>>> On Wed, 14 Sep 2016, Shannon Zhao wrote:
> On 2016/9/13 23:17
flight 67710 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67710/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-amd64-squeeze-netboot-pygrub 9 debian-di-install fail like
67665
test-amd64-
Hey,
So, as I promised in other thread I am sending more info about my investigation
related to low memory allocation for trampoline and other early boot data.
Starting from the beginning it looks that there are "soft" limits enforced
in BIOS early boot code looking for usable low memory region.
On Tue, Sep 13, 2016 at 7:16 PM, Andrew Cooper
wrote:
> On 12/09/16 16:23, Jan Beulich wrote:
>> All,
>>
>> in
>> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
>> and
>> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01210.html
>> Andrew basically sugg
>>> On 14.09.16 at 04:23, wrote:
>> From: Wu, Feng
>> Sent: Monday, September 5, 2016 11:12 AM
>> I still have trouble to fully understand this, please see the following
>> scenario:
>>
>> 1) Set 'NDST' to the pCPU0 (which vCPU is currently running on, but
>> it may changes since vCPU scheduling
Thanks.
I checked my code again to see where I open files but not closing them.
The error was due to opening the xc interface (xc_interface_open()) and not
closing it via xc_interface_close().
On Mon, Sep 12, 2016 at 2:12 PM, Razvan Cojocaru
wrote:
> > I am using xen-access to write protect a l
flight 100941 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100941/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail REGR. vs. 100915
test-armhf-armhf-
On 14/09/16 09:35, George Dunlap wrote:
> On Tue, Sep 13, 2016 at 7:16 PM, Andrew Cooper
> wrote:
>> On 12/09/16 16:23, Jan Beulich wrote:
>>> All,
>>>
>>> in
>>> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
>>> and
>>> https://lists.xenproject.org/archives/html/xen-d
Wednesday, September 14, 2016, 10:35:30 AM, you wrote:
> On Tue, Sep 13, 2016 at 7:16 PM, Andrew Cooper
> wrote:
>> On 12/09/16 16:23, Jan Beulich wrote:
>>> All,
>>>
>>> in
>>> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
>>> and
>>> https://lists.xenproject.org/ar
Hello Tamas,
On 13/09/16 19:12, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 53c4d78..5e9bc54 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/include/asm-arm/p2m.h
@@ -121,10 +121,10 @@ typedef enum {
p2m_to_mask(p
On 12/09/16 18:00, Dario Faggioli wrote:
> On Mon, 2016-09-12 at 16:14 +0100, George Dunlap wrote:
>> On 17/08/16 18:17, Dario Faggioli wrote:
>>>
>>> If vcpu x has run for 200us, and sched_ratelimit_us is
>>> 1000us, continue running x _but_ return 1000us-200us as
>>> the next time slice. This way
Hello Derek,
On 13/09/16 18:35, Derek Straka wrote:
Allows for the conditional inclusion of NS16550 UART driver on the x86 platform
rather than having it always enabled.
The default configuration for the HAS_NS16550 option remains 'y' on x86, so the
behavior out of the box remains unchanged. T
Hello Derek,
On 13/09/16 18:35, Derek Straka wrote:
diff --git a/xen/drivers/char/Kconfig b/xen/drivers/char/Kconfig
index c87e018..08a60e0 100644
--- a/xen/drivers/char/Kconfig
+++ b/xen/drivers/char/Kconfig
@@ -45,7 +45,8 @@ config HAS_SCIF
say Y.
config HAS_EHCI
- bool
+
>>> On 13.09.16 at 18:07, wrote:
> On 12/09/16 15:32, Jan Beulich wrote:
> On 09.09.16 at 17:16, wrote:
>>> The following code illustrates this idea:
>>>
>>> typedef struct dm_op_buffer {
>>> XEN_GUEST_HANDLE(void) h;
>>> size_t len;
>>> } dm_op_buffer_t;
>>
>> This implies that we
>>> On 13.09.16 at 20:44, wrote:
> On 08/09/16 14:07, Jan Beulich wrote:
>> @@ -1602,6 +1602,45 @@ struct x86_emulate_state {
>> #define _regs (state->regs)
>>
>> static int
>> +x86_decode_base(
>
> What do you mean by decode_base here?
The base instruction set (no 0f or alike prefixes). Sug
>>> On 13.09.16 at 21:09, wrote:
> On 08/09/16 14:09, Jan Beulich wrote:
>> Now that all decoding happens in x86_decode() there's no need to keep
>> the local registers copy in struct x86_emulate_state. Only rIP gets
>> updated in the decode phase, so only that register needs tracking
>> there. Al
On Wed, Sep 14, 2016 at 01:59:49AM +, Chen, Farrah wrote:
> Hi
>
> We can try the latest nasm. But there is still a problem that the
> included nasm package does not work, it works well before xen commit
> (8c8b6fb02) . Does RHEL 6.7 still support compiling xen now?
>
Yes, I think so. But I
CC xen-devel as well.
On Tue, Sep 13, 2016 at 02:11:27PM +0200, Filipe Manco wrote:
> In case of error during netback_probe() (e.g. an entry missing on the
> xenstore) netback_remove() is called on the new device, which will set
> the device backend state to XenbusStateClosed by calling
> set_back
On Thu, Sep 08, 2016 at 10:38:01AM -0400, Daniel E. Shub wrote:
> This is a follow on to a message I sent to xen-users:
> https://lists.xen.org/archives/html/xen-devel/2015-08/msg01924.html
>
> I am trying to compile Xen 4.7.0 with gcc 6.1.1, but I get an error
> related to etherboot. It was sugge
>>> On 13.09.16 at 19:35, wrote:
> --- a/xen/drivers/char/Kconfig
> +++ b/xen/drivers/char/Kconfig
> @@ -1,6 +1,6 @@
> config HAS_NS16550
> - bool
> - default y
> + bool "NS16550 UART" if EXPERT = "y"
This need more adjustment: HAS_* options should never have
prompts. I.e. you need t
>>> On 13.09.16 at 19:35, wrote:
> --- a/xen/drivers/char/Kconfig
> +++ b/xen/drivers/char/Kconfig
> @@ -45,7 +45,8 @@ config HAS_SCIF
> say Y.
>
> config HAS_EHCI
> - bool
> + bool "EHCI UART" if EXPERT = "y"
Please make the prompt say e.g "EHCI debug port" - UART is not a
ter
Hello,
On 14/09/16 08:41, Peng Fan wrote:
On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 35ab08d..cc71e6f 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -28,6 +28,8 @@
stat
>>> On 13.09.16 at 21:40, wrote:
> Allows for the conditional inclusion of VGA driver on the x86 platform
> rather than having it always enabled.
So I guess with all three of these patches an overview mail is missing.
What are you trying to accomplish? Solely reducing the binary size of
Xen doesn
On 14/09/16 07:28, Sergej Proskurin wrote:
Hi Julien,
struct arch_vcpu
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 1a004ed..de0c90a 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/include/asm-arm/p2m.h
@@ -9,6 +9,8 @@
#include
#include
+#define MAX_ALTP2M
On Mon, Sep 12, 2016 at 02:30:39PM +0200, Roger Pau Monné wrote:
> On Sat, Sep 10, 2016 at 03:51:33PM +0530, Aashaka Shah wrote:
> > Hello! I am Aashaka. I like computer architecture and have a good knowledge
> > of C. While browsing Outreachy projects, I came across the project about
> > adding PV
On 13/09/16 14:00, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 10:47 AM, Julien Grall wrote:
Hello Sergej,
On 16/08/2016 23:16, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v3: Extended the function "altp2m
flight 100952 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100952/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 773522000cc17f6f4323a4d97423790138ea98f2
baseline version:
xen a3fe
Hello Sergej,
On 16/08/16 23:16, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index 180154e..c69da36 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -83,8 +83,40 @@ static int do_altp2m_op(XEN_GUEST_HANDLE_PARAM(void) arg)
break;
case HV
On Sat, Sep 10, 2016 at 9:04 PM, Sarah Newman wrote:
> On 09/10/2016 07:58 AM, Mark Pryor wrote:
>> Hello,
>>
>> In a xen 4.7 source build, pv-grub works with domU kernel 3.x.x, but not
>> with 4.x.x. So, the recent fc24, xenial, and debian sid/stretch can't use
>> pv-grub.
>
> While this should
On 14/09/16 08:53, Sergej Proskurin wrote:
Hi Julien
[...]
static void do_trap_instr_abort_guest(struct cpu_user_regs *regs,
const union hsr hsr)
{
@@ -2445,6 +2465,14 @@ static void do_trap_instr_abort_guest(struct
cpu_user_regs *regs,
brea
On Wed, Sep 14, 2016 at 12:13:00PM +0100, George Dunlap wrote:
> On Sat, Sep 10, 2016 at 9:04 PM, Sarah Newman wrote:
> > On 09/10/2016 07:58 AM, Mark Pryor wrote:
> >> Hello,
> >>
> >> In a xen 4.7 source build, pv-grub works with domU kernel 3.x.x, but not
> >> with 4.x.x. So, the recent fc24,
> On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
>> I've been using Xen for 3 years, starting out with 4.2, and I've been
>> upgrading regularly, and installed 4.7.0 today.
>>
>> I'm using Windows 10, 64-bit with PCI pass through in a VM with
>> PV-drivers, using a AMD Radeon HD6450 card (AMD gr
Hello Julien,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
>Hello,
>
>On 14/09/16 08:41, Peng Fan wrote:
>>On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
>>diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
>>index 35ab08d..cc71e6f 100644
>>--- a/
On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
Hello Peng,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
Hello,
On 14/09/16 08:41, Peng Fan wrote:
On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domai
flight 100945 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100945/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-raw 13 guest-sav
Hello Julien,
On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
>
>
>On 14/09/16 13:03, Peng Fan wrote:
>>Hello Julien,
>
>Hello Peng,
>
>>On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
>>>Hello,
>>>
>>>On 14/09/16 08:41, Peng Fan wrote:
On Wed, Sep 14, 2016 at 08:23
flight 100947 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100947/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 18b00c8c8773e62b1e2c4a36f490996325570b67
baseline version:
ovmf d947fbed72226011961e5
On 14/09/16 13:18, Peng Fan wrote:
Hello Julien,
On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
Hello Peng,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
Hello,
On 14/09/16 08:41, Peng Fan wrote:
On Wed,
On Wed, Sep 14, 2016 at 01:34:10PM +0100, Julien Grall wrote:
>
>
>On 14/09/16 13:18, Peng Fan wrote:
>>Hello Julien,
>>
>>On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
>>>
>>>
>>>On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
>>>
>>>Hello Peng,
>>>
On Wed, Sep 14, 2016 at
On 09/14/2016 12:13 AM, Shannon Zhao wrote:
>
> On 2016/9/8 2:59, Boris Ostrovsky wrote:
>> PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor
>> objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so
>> that it can be included in ASLs for both HVM and PVH2
>>> On 14.09.16 at 13:34, wrote:
>> On 2016-09-09 09:51, Peter Milesson wrote:
> [snip]
>>> I've been using Xen for 3 years, starting out with 4.2, and I've been
>>> upgrading regularly, and installed 4.7.0 today.
>>>
>>> I'm using Windows 10, 64-bit with PCI pass through in a VM with
>>> PV-driv
Hello Derek,
On 13/09/16 20:40, Derek Straka wrote:
diff --git a/xen/drivers/video/Kconfig b/xen/drivers/video/Kconfig
index 0ffbbd9..0f208fe 100644
--- a/xen/drivers/video/Kconfig
+++ b/xen/drivers/video/Kconfig
@@ -3,7 +3,8 @@ config VIDEO
bool
config VGA
- bool
+ bool "V
flight 100944 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100944/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 100933
Regress
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
>>> On 2016-09-09 09:51, Peter Milesson wrote:
>> [snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and installed 4.7.0 today.
I'm using Windows 10, 64-bit w
On 14/09/16 14:23, Andrew Cooper wrote:
> On 14/09/16 13:50, Jan Beulich wrote:
> On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
>>> [snip]
> I've been using Xen for 3 years, starting out with 4.2, and I've been
> upgrading regularly, and installed 4.7.0
On 13/09/16 19:12, Tamas K Lengyel wrote:
> Setting response flags in vm_event are only ever safe if the vCPUs are paused.
> To reflect this we move all checks within the if block that already checks
> whether this is the case. Checks that are only supported on one architecture
> we relocate the bi
On 13/09/16 18:38, Lai, Paul wrote:
> On Mon, Sep 12, 2016 at 11:47:35AM +0100, George Dunlap wrote:
>> On 08/09/16 17:45, Lai, Paul C wrote:
>>> [Paul2] in-line
>>
>> If you're going to engage in discussions on xen-devel it would really be
>> worth your time to find a mail setup that allows you to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.8b-rc6-tag
xen: regression fix for 4.8-rc6
- - Fix SMP boot in arm guests.
Thanks.
David
arch/arm/xen/enlighten.c | 7 +++
1
On Wed, 2016-09-14 at 10:34 +0100, George Dunlap wrote:
> On 12/09/16 18:00, Dario Faggioli wrote:
> >
> > I also agree on the fact that most of the times ratelimit_us and
> > MIN_TIMER will be close enough (like in the example above) that it
> > won't probably matter much... but if someone set ra
On Tue, Sep 13, 2016 at 01:30:17PM +0200, Dario Faggioli wrote:
>[using xendevel correct address]
>
>On Tue, 2016-09-13 at 16:54 +0800, Wei Yang wrote:
>> On Fri, 2016-09-09 at 17:41 +0800, Wei Yang wrote:
>> >
>> > I'm not surprised by that. Yet, I'd be interested in hearing more
>> > about this
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and installed 4.7.0 today.
I'm using Windows 10, 64-bit with PCI pass through
On Wed, Sep 14, 2016 at 08:40:09PM +0800, Peng Fan wrote:
> On Wed, Sep 14, 2016 at 01:34:10PM +0100, Julien Grall wrote:
> >
> >
> >On 14/09/16 13:18, Peng Fan wrote:
> >>Hello Julien,
> >>
> >>On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
> >>>
> >>>
> >>>On 14/09/16 13:03, Peng F
On Wed, Sep 14, 2016 at 3:04 PM, Peter Milesson wrote:
>
>
> On 2016-09-14 14:50, Jan Beulich wrote:
>
> On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
>>>
>>> [snip]
>
> I've been using Xen for 3 years, starting out with 4.2, and I've been
>>>
On 2016-09-14 15:23, Andrew Cooper wrote:
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and installed 4.7.0 today.
I'm using
Hi all,
I wanted to get libvirt's libxl driver have per-domain logs like all other
drivers. After
looking at the libxl and XenToolLogger it seems I'll need to add the feature in
either libxl
XenToolLogger. Would anyone already have an idea how best to add API to allow
this?
Thanks for your hel
This run is configured for baseline tests only.
flight 67711 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67711/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 18b00c8c8773e62b1e2c4a36f490996325570b67
baseline v
On 08/09/16 14:10, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
What faults are you referring to? #UD vs #GP from hitting the %cs limit?
>
> This at once adds correct rais
>>> On 14.09.16 at 16:04, wrote:
> On 2016-09-14 14:50, Jan Beulich wrote:
> On 14.09.16 at 13:34, wrote:
>>> Can you think of anything that's changed between 4.6 and 4.7 that
>>> would cause the performance problems he's describing when both a video
>>> card and a usb controller are passed t
On Wed, 2016-09-14 at 02:23 +, Wu, Feng wrote:
> Then I tried to implement the function like the following:
>
> /* This function is called when pcidevs_lock is held */
> void vmx_pi_hooks_assign(struct domain *d)
> {
> if ( !iommu_intpost || !has_hvm_container_domain(d) )
> return;
>>> On 14.09.16 at 16:22, wrote:
> On 08/09/16 14:10, Jan Beulich wrote:
>> This way we can at least size (and e.g. skip) them if needed, and we
>> also won't raise the wrong fault due to not having read all relevant
>> bytes.
>
> What faults are you referring to? #UD vs #GP from hitting the %cs
On Wed, Sep 14, 2016 at 7:38 AM, George Dunlap wrote:
> On 13/09/16 19:12, Tamas K Lengyel wrote:
>> Setting response flags in vm_event are only ever safe if the vCPUs are
>> paused.
>> To reflect this we move all checks within the if block that already checks
>> whether this is the case. Checks
On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall wrote:
> Hello Tamas,
>
> On 13/09/16 19:12, Tamas K Lengyel wrote:
>>
>> diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
>> index 53c4d78..5e9bc54 100644
>> --- a/xen/include/asm-arm/p2m.h
>> +++ b/xen/include/asm-arm/p2m.h
>> @@ -1
On 14/09/16 16:14, Tamas K Lengyel wrote:
On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall wrote:
Hello Tamas,
On 13/09/16 19:12, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 53c4d78..5e9bc54 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/i
On Wed, Sep 14, 2016 at 9:15 AM, Julien Grall wrote:
>
>
> On 14/09/16 16:14, Tamas K Lengyel wrote:
>>
>> On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall
>> wrote:
>>>
>>> Hello Tamas,
>>>
>>> On 13/09/16 19:12, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/inc
Hi Julien,
On 09/12/2016 02:08 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 16/08/16 23:17, Sergej Proskurin wrote:
>> The HVMOP_altp2m_set_mem_access allows to set gfn permissions of
>> (currently one page at a time) of a specific altp2m view. In case the
>> view does not hold the requested gfn e
On 09/07/2016 02:59 PM, Boris Ostrovsky wrote:
> The goal here is to build ACPI tables for PVHv2/HVMlite guests while reusing
> existing
> hvmloader's ACPI builder code. The builder is provided as a library in
> tools/libacpi.
>
> This is version 3 of the series, see individual patches for change
No need to have the same logic twice.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1745,22 +1745,22 @@ static void load_segments(struct vcpu *n
(unsigned long *)pv->kernel_sp;
unsigned long cs_and_mask, rflags;
+/* Fold up
Hi Julien,
On 09/14/2016 12:57 PM, Julien Grall wrote:
>
>
> On 13/09/16 14:00, Sergej Proskurin wrote:
>> Hi Julien,
>
> Hello Sergej,
>
>>
>> On 09/12/2016 10:47 AM, Julien Grall wrote:
>>> Hello Sergej,
>>>
>>> On 16/08/2016 23:16, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
On 2016-09-14 15:30, George Dunlap wrote:
On 14/09/16 14:23, Andrew Cooper wrote:
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularl
On 2016-09-14 16:49, Jan Beulich wrote:
On 14.09.16 at 16:04, wrote:
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
Can you think of anything that's changed between 4.6 and 4.7 that
would cause the performance problems he's describing when both a video
card and a usb
On 2016-09-14 16:17, George Dunlap wrote:
On Wed, Sep 14, 2016 at 3:04 PM, Peter Milesson wrote:
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've bee
>>> On 13.09.16 at 20:12, wrote:
> When emulating instructions the emulator maintains a small i-cache fetched
> from the guest memory. This patch extends the vm_event interface to allow
> returning this i-cache via the vm_event response instead.
I guess I'm sightly confused: Isn't the purpose to
flight 100948 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100948/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops4 host-build-prep fail in 100936 REGR. vs. 100895
Tests which are
On 08/09/16 14:11, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emul
>>> On 12.09.16 at 10:16, wrote:
> This patch cleaned up the code by replacing complicated tlbflush check with
> an inline function. We should use this inline function to avoid the long
> and complicated to read tlbflush check when implementing TODOs left in
> commit a902c12ee45fc9389eb8fe54eeddaf
On Wed, 2016-09-14 at 18:44 +0800, Wei Yang wrote:
> On Tue, Sep 13, 2016 at 01:30:17PM +0200, Dario Faggioli wrote:
> >
> > Do you mind sharing just a bit more, such as:
> > - number of pcpus
> > - number of vcpus of the various VMs
> 160 pcpus
> 16 vcpus in VM and 8 VMs
>
So, 16x8=128, which
On Wed, Sep 14, 2016 at 9:55 AM, Jan Beulich wrote:
On 13.09.16 at 20:12, wrote:
>> When emulating instructions the emulator maintains a small i-cache fetched
>> from the guest memory. This patch extends the vm_event interface to allow
>> returning this i-cache via the vm_event response inst
>>> On 14.09.16 at 18:11, wrote:
> On 08/09/16 14:11, Jan Beulich wrote:
>> @@ -1580,6 +1586,9 @@ struct x86_emulate_state {
>> ext_0f = vex_0f,
>> ext_0f38 = vex_0f38,
>> ext_0f3a = vex_0f3a,
>> +ext_8f08 = 8,
>> +ext_8f09,
>> +ext_8f0a,
>
> W
On 11/09/16 11:52, Kavya Sharma wrote:
> Hello Sir,I am Kavya Sharma, an aspiring Outreachy intern.It would be my
> privilege to be an intern with xenproject.org this winter.I have read
> about Xen Hypervisor Userspace Tools and I am interested in your project
> 'golang bindings for libxl'.
>
> Si
On Mon, 2016-09-12 at 16:16 +0800, Dongli Zhang wrote:
> This patch implemented parts of TODO left in commit id
> a902c12ee45fc9389eb8fe54eeddaf267a555c58.
>
We usually put both the (not necessarily full) hash and the subject
line of the commit in here.
> Signed-off-by: Dongli Zhang
>
> diff --
On Tue, 13 Sep 2016 19:25:54 +0100 Andrew Cooper wrote:
> On 13/09/16 14:46, Mihai Donțu wrote:
> > On Tue, 13 Sep 2016 09:10:32 -0400 Konrad Rzeszutek Wilk wrote:
> >> On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
> >>> All,
> >>>
> >>> in
> >>> https://lists.xenproject.org/arch
On 08/09/16 14:12, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
>
> Signed-off-by: Jan Beulich
> ---
> TBD: I'm kind of undecided whether to right away propagate evex.R into
On 14/09/16 16:24, Jan Beulich wrote:
> No need to have the same logic twice.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/domain.c
> +++ b/xen/arch/x86/domain.c
> @@ -1745,22 +1745,22 @@ static void load_segments(struct vcpu *n
> (unsigned long *)pv->kernel_sp;
> un
On 08/09/16 14:13, Jan Beulich wrote:
> Only code movement, no functional change.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 08/09/16 14:14, Jan Beulich wrote:
"of a canonical opcode representation".
You appear to be inventing your own here, but it isn't the only
canonical form you could represent x86 opcodes with.
> --- a/xen/arch/x86/x86_emulate/x86_emulate.h
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.h
> @@ -4
Hey,
This is v4 on the pvclock TSC series addressing comments from previous
version, see individual patches for complete changelog.
This series is divided as follows:
R * Patch 1: Small refactor around init_platform_time to reuse
initialization code when switching to TSC
This patch proposes relying on host TSC synchronization and
passthrough to the guest, when running on a TSC-safe platform. On
time_calibration we retrieve the platform time in ns and the counter
read by the clocksource that was used to compute system time. We
introduce a new rendezous function whic
1 - 100 of 138 matches
Mail list logo