On Mon, Nov 28, 2016 at 09:06:32PM +0300, Andrei Borzenkov wrote:
> 24.11.2016 23:40, Daniel Kiper ?:
> > Multiboot2 is proper name of the boot protocol. Multiboot is name of older
> > boot
> > protocol. So, rename Multiboot to Multiboot2 to not confuse the reader.
> >
> > Signed-off-by: Danie
On 29/11/16 08:34, Wei Liu wrote:
> On Mon, Nov 28, 2016 at 02:53:57PM +0100, Cédric Bosdonnat wrote:
>> Resume is sometimes silently failing for HVM guests. Getting the
>> xc_domain_resume() and libxl__domain_resume_device_model() in the
>> reverse order than what is in the suspend code fixes the
On Fri, Nov 25, 2016 at 02:20:29PM +0100, Juergen Gross wrote:
> include/xen/hvm/pvdrivers.h contains a reference to
> xen-de...@lists.xensource.com. Replace it by the correct address
> xen-de...@lists.xenproject.org
>
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
I will apply this when I'm
On Mon, Nov 14, 2016 at 04:55:40PM +0100, Andreas Ziegler wrote:
> Hi,
>
> few months later Ingo decided again to give it a try as he really
> doesn't want to keep ipv6 disabled in 2016.
> He tried Xen 4.8 - which didn't help, the crash reappeared.
> He then managed to build Xen with debug=y and s
On Mon, Nov 28, 2016 at 08:53:51PM +0300, Andrei Borzenkov wrote:
> 24.11.2016 23:40, Daniel Kiper ?:
> > Signed-off-by: Daniel Kiper
> > ---
> > v2 - suggestions/fixes:
> >- clarify physical address meaning for EFI amd64
> > mode with boot services enabled
> > (suggested by Andr
This run is configured for baseline tests only.
flight 68117 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68117/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-i386-pvgrub 3 host-install(3)
On Sat, Nov 19, 2016 at 03:59:08PM +0300, Alexander Nusov wrote:
> Hello,
>
>
>
> I've reinstalled xen from ports on FreeBSD-11.0
>
> and it seems xenlight.pc is not being installed to
> /usr/local/libdata/pkgconfig/ directory.
>
>
>
> root@controller:/usr/ports/devel/libvirt # find /usr/ -
On Mon, Nov 28, 2016 at 08:59:38PM +0300, Andrei Borzenkov wrote:
> 24.11.2016 23:40, Daniel Kiper ?:
> > Signed-off-by: Daniel Kiper
> > ---
> > doc/multiboot.texi | 28
> > doc/multiboot2.h | 16
> > 2 files changed, 44 insertions(+)
> >
>
On Mon, Nov 28, 2016 at 11:42:14AM -0800, Stefano Stabellini wrote:
> The following changes since commit 00227fefd2059464cd2f59aed29944874c630e2f:
>
> Update version for v2.8.0-rc1 release (2016-11-22 22:29:08 +)
>
> are available in the git repository at:
>
> git://xenbits.xen.org/peopl
>>> On 28.11.16 at 18:49, wrote:
> On Thu, Nov 17, 2016 at 03:49:22AM -0700, Jan Beulich wrote:
>> >>> On 16.11.16 at 19:02, wrote:
>> > On Fri, Nov 11, 2016 at 09:53:49AM -0700, Jan Beulich wrote:
>> >> >>> On 29.10.16 at 10:59, wrote:
>> >> > --- a/xen/arch/x86/setup.c
>> >> > +++ b/xen/arch/x
> On 29. nov 2016, at 11:08, Daniel Kiper wrote:
>
> On Mon, Nov 28, 2016 at 08:53:51PM +0300, Andrei Borzenkov wrote:
>> 24.11.2016 23:40, Daniel Kiper ?:
>>> Signed-off-by: Daniel Kiper
>>> ---
>>> v2 - suggestions/fixes:
>>> - clarify physical address meaning for EFI amd64
>>> mode
>>> On 29.11.16 at 05:38, wrote:
> To make codes be better reviewable, I propose below three suggestions:
> 1) I write a design document about refactor to make you more easily
> understand the ideas.
This is appreciated, but I don't think it's strictly necessary. Describing
the new design (rathe
On Tue, Nov 29, 2016 at 11:39:39AM +0200, Toomas Soome wrote:
> > On 29. nov 2016, at 11:08, Daniel Kiper wrote:
> > On Mon, Nov 28, 2016 at 08:53:51PM +0300, Andrei Borzenkov wrote:
> >> 24.11.2016 23:40, Daniel Kiper ?:
> >>> Signed-off-by: Daniel Kiper
> >>> ---
> >>> v2 - suggestions/fixe
flight 102703 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102703/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt13 saverestore-support-check fail REGR. vs. 101275
Tests which are
> On 29. nov 2016, at 12:09, Daniel Kiper wrote:
>
> On Tue, Nov 29, 2016 at 11:39:39AM +0200, Toomas Soome wrote:
>>> On 29. nov 2016, at 11:08, Daniel Kiper wrote:
>>> On Mon, Nov 28, 2016 at 08:53:51PM +0300, Andrei Borzenkov wrote:
24.11.2016 23:40, Daniel Kiper ?:
> Signed-off
>>> On 29.11.16 at 03:59, wrote:
> Either we have to hide the watchdog timer section in GTDT or emulate
> watchdog timer block for dom0. Otherwise, system gets panic when
> dom0 accesses its MMIO registers. The current XEN doesn't support
> virtualization of watchdog timer, so hide the watchdog ti
When allocating a new ring slot for a request don't advance the
producer index until the request is really ready to go to the backend.
Otherwise only partially filled requests will be visible to the
backend in case of errors on the frontend side.
In scsifront_action_handler() free the request id i
Benchmarks have shown that per-socket runqueues arrangement
behaves better (e.g., we achieve better load balancing)
than the current per-core default.
Here's an example (coming from
https://lists.xen.org/archives/html/xen-devel/2016-06/msg02287.html ):
|===|
|
Hi,
This patch changes the way in which runqueue are arranged by default in
Credit2. Despite being so late, I think this should go in Xen 4.8, and here's
why.
So, first of all, runqueues in Credit2 can be arranged in various ways, just by
means of a Xen boot parameter. Right now, the default is o
On Mon, 2016-11-28 at 13:27 -0500, Boris Ostrovsky wrote:
> On 11/28/2016 12:19 PM, Dario Faggioli wrote:
> >
> > In any case, what I'm wondering is, could this ACPI / PM thing be
> > linked to the behavior we are seeing?
>
> I find it somewhat unlikely.
>
> BTW, I wouldn't worry about C2 specif
On Tue, Nov 29, 2016 at 11:57:03AM +0100, Dario Faggioli wrote:
> Benchmarks have shown that per-socket runqueues arrangement
> behaves better (e.g., we achieve better load balancing)
> than the current per-core default.
>
> Here's an example (coming from
> https://lists.xen.org/archives/html/xen-
>>> On 29.11.16 at 11:50, wrote:
> --- a/drivers/scsi/xen-scsifront.c
> +++ b/drivers/scsi/xen-scsifront.c
> @@ -184,8 +184,6 @@ static struct vscsiif_request *scsifront_pre_req(struct
> vscsifrnt_info *info)
>
> ring_req = RING_GET_REQUEST(&(info->ring), ring->req_prod_pvt);
>
> -
On 29/11/16 12:14, Jan Beulich wrote:
On 29.11.16 at 11:50, wrote:
>> --- a/drivers/scsi/xen-scsifront.c
>> +++ b/drivers/scsi/xen-scsifront.c
>> @@ -184,8 +184,6 @@ static struct vscsiif_request *scsifront_pre_req(struct
>> vscsifrnt_info *info)
>>
>> ring_req = RING_GET_REQUEST(&(in
On 29/11/16 11:19, Juergen Gross wrote:
> On 29/11/16 12:14, Jan Beulich wrote:
> On 29.11.16 at 11:50, wrote:
>>> --- a/drivers/scsi/xen-scsifront.c
>>> +++ b/drivers/scsi/xen-scsifront.c
>>> @@ -184,8 +184,6 @@ static struct vscsiif_request *scsifront_pre_req(struct
>>> vscsifrnt_info *info
On 29/11/16 12:28, David Vrabel wrote:
> On 29/11/16 11:19, Juergen Gross wrote:
>> On 29/11/16 12:14, Jan Beulich wrote:
>> On 29.11.16 at 11:50, wrote:
--- a/drivers/scsi/xen-scsifront.c
+++ b/drivers/scsi/xen-scsifront.c
@@ -184,8 +184,6 @@ static struct vscsiif_request
On Tue, 2016-11-29 at 11:14 +, Wei Liu wrote:
> On Tue, Nov 29, 2016 at 11:57:03AM +0100, Dario Faggioli wrote:
> Strictly speaking, this is not necessary for 4.8 because even though
> the
> default configuration is not optimal, there is a simple way to change
> it.
>
Absolutely true.
> On th
On Tue, Nov 29, 2016 at 03:40:37AM -0700, Jan Beulich wrote:
> >>> On 29.11.16 at 03:59, wrote:
> > Either we have to hide the watchdog timer section in GTDT or emulate
> > watchdog timer block for dom0. Otherwise, system gets panic when
> > dom0 accesses its MMIO registers. The current XEN doesn'
>>> On 29.11.16 at 12:19, wrote:
> On 29/11/16 12:14, Jan Beulich wrote:
> On 29.11.16 at 11:50, wrote:
>>> --- a/drivers/scsi/xen-scsifront.c
>>> +++ b/drivers/scsi/xen-scsifront.c
>>> @@ -184,8 +184,6 @@ static struct vscsiif_request *scsifront_pre_req(struct
> vscsifrnt_info *info)
>>>
On Tue, Nov 29, 2016 at 12:33:24PM +0100, Dario Faggioli wrote:
> On Tue, 2016-11-29 at 11:14 +, Wei Liu wrote:
> > On Tue, Nov 29, 2016 at 11:57:03AM +0100, Dario Faggioli wrote:
> > Strictly speaking, this is not necessary for 4.8 because even though
> > the
> > default configuration is not o
>>> On 29.11.16 at 12:38, wrote:
> On Tue, Nov 29, 2016 at 03:40:37AM -0700, Jan Beulich wrote:
>> >>> On 29.11.16 at 03:59, wrote:
>> > Either we have to hide the watchdog timer section in GTDT or emulate
>> > watchdog timer block for dom0. Otherwise, system gets panic when
>> > dom0 accesses it
>>> On 29.11.16 at 12:42, wrote:
> On Tue, Nov 29, 2016 at 12:33:24PM +0100, Dario Faggioli wrote:
>> On Tue, 2016-11-29 at 11:14 +, Wei Liu wrote:
>> > On Tue, Nov 29, 2016 at 11:57:03AM +0100, Dario Faggioli wrote:
>> > Strictly speaking, this is not necessary for 4.8 because even though
>>
On Tue, 2016-11-29 at 04:51 -0700, Jan Beulich wrote:
> > > > On 29.11.16 at 12:42, wrote:
> > > I've tried to state that in the cover letter:
> > > https://lists.xen.org/archives/html/xen-devel/2016-11/msg02616.ht
> > > ml
> > >
> > Ah, I thought that was a dupe because it had the same subject
On Tue, Nov 29, 2016 at 04:51:04AM -0700, Jan Beulich wrote:
> >>> On 29.11.16 at 12:42, wrote:
> > On Tue, Nov 29, 2016 at 12:33:24PM +0100, Dario Faggioli wrote:
> >> On Tue, 2016-11-29 at 11:14 +, Wei Liu wrote:
> >> > On Tue, Nov 29, 2016 at 11:57:03AM +0100, Dario Faggioli wrote:
> >> > S
On Sun, 2016-11-27 at 08:52 +, Michael Schinzel wrote:
> Good Morning,
>
Hello,
First, one thing, can you avoid sending HTML email to the list? Tanks
in advance. :-)
> Name ID Mem VCPUs
> State Time(s)
> Domain-0
On Tue, Nov 29, 2016 at 04:44:18AM -0700, Jan Beulich wrote:
> >>> On 29.11.16 at 12:38, wrote:
> > On Tue, Nov 29, 2016 at 03:40:37AM -0700, Jan Beulich wrote:
> >> >>> On 29.11.16 at 03:59, wrote:
> >> > Either we have to hide the watchdog timer section in GTDT or emulate
> >> > watchdog timer
On Tue, 2016-11-29 at 12:52 +0800, Yi Sun wrote:
> On 16-11-25 18:39:41, Dario Faggioli wrote:
> > On Tue, 2016-10-25 at 11:40 +0800, Yi Sun wrote:
> > > +* xl interfaces:
> > > +
> > > + 1. `psr-cat-show [OPTIONS] domain-id`:
> > > +
> > > + Show domain L2 or L3 CAT CBM.
> > > +
> > > + N
On Tue, 2016-11-29 at 13:20 +0800, Yi Sun wrote:
> On 16-11-25 18:19:17, Dario Faggioli wrote:
> > On Fri, 2016-11-11 at 16:33 -0500, Konrad Rzeszutek Wilk wrote:
> > > Intel Problem Solver Resolver (PSR)
> > >
> > Wasn't it the 'Intel Probabilistic Silicon Reorganizer' ? :-D :-D
> >
> It is 'Int
On 29/11/16 12:40, Jan Beulich wrote:
On 29.11.16 at 12:19, wrote:
>> On 29/11/16 12:14, Jan Beulich wrote:
>> On 29.11.16 at 11:50, wrote:
--- a/drivers/scsi/xen-scsifront.c
+++ b/drivers/scsi/xen-scsifront.c
@@ -184,8 +184,6 @@ static struct vscsiif_request
*scsifr
On Thu, Nov 03, 2016 at 07:54:24AM -0400, Boris Ostrovsky wrote:
>
>
> On 11/03/2016 07:35 AM, Jan Beulich wrote:
> > > > > On 03.11.16 at 11:58, wrote:
> > > On Mon, Oct 31, 2016 at 10:47:15AM -0600, Jan Beulich wrote:
> > > > > > > On 29.10.16 at 10:59, wrote:
> > > > > --- a/xen/arch/x86/set
On Fri, Nov 11, 2016 at 09:58:44AM -0700, Jan Beulich wrote:
> >>> On 29.10.16 at 10:59, wrote:
> > Current {un}map_mmio_regions implementation has a maximum number of loops to
> > perform before giving up and returning to the caller. This is an issue when
> > mapping large MMIO regions when build
>>> On 29.11.16 at 13:33, wrote:
> On Thu, Nov 03, 2016 at 07:54:24AM -0400, Boris Ostrovsky wrote:
>>
>>
>> On 11/03/2016 07:35 AM, Jan Beulich wrote:
>> > > > > On 03.11.16 at 11:58, wrote:
>> > > On Mon, Oct 31, 2016 at 10:47:15AM -0600, Jan Beulich wrote:
>> > > > > > > On 29.10.16 at 10:59
Hi Bhupinder,
On 25/11/16 10:33, Bhupinder Thakur wrote:
VMID space is increased to 16-bits from 8-bits in ARMv8 8.1 revision.
This allows more than 256 VMs to be supported by Xen.
This change adds support for 16-bit VMIDs in Xen based on whether the
architecture supports it.
Signed-off-by: Bh
On Tue, Nov 29, 2016 at 05:47:42AM -0700, Jan Beulich wrote:
> >>> On 29.11.16 at 13:33, wrote:
> > On Thu, Nov 03, 2016 at 07:54:24AM -0400, Boris Ostrovsky wrote:
> >>
> >>
> >> On 11/03/2016 07:35 AM, Jan Beulich wrote:
> >> > > > > On 03.11.16 at 11:58, wrote:
> >> > > On Mon, Oct 31, 2016
Hi Dongli!
On 29 November 2016 at 06:47, Dongli Zhang wrote:
> 2016-11-25 5:10 GMT+08:00 Volodymyr Babchuk :
>> Hello all,
>
> Hi Volodymyr!
>
>>
>> My name is Volodymyr Babchuk, I'm working on EPAM Systems with bunch
>> of other guys like Artem Mygaiev or Andrii Anisov. My responsibility
>> ther
>>> On 29.11.16 at 13:41, wrote:
> On Fri, Nov 11, 2016 at 09:58:44AM -0700, Jan Beulich wrote:
>> >>> On 29.10.16 at 10:59, wrote:
>> > Current {un}map_mmio_regions implementation has a maximum number of loops
> to
>> > perform before giving up and returning to the caller. This is an issue when
>>> On 29.11.16 at 13:09, wrote:
> On Tue, Nov 29, 2016 at 04:44:18AM -0700, Jan Beulich wrote:
>> >>> On 29.11.16 at 12:38, wrote:
>> > On Tue, Nov 29, 2016 at 03:40:37AM -0700, Jan Beulich wrote:
>> >> >>> On 29.11.16 at 03:59, wrote:
>> >> > Either we have to hide the watchdog timer section i
This run is configured for baseline tests only.
flight 68119 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68119/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8ae17140476861efa642d28849f627fd9940f1af
baseline v
Hello,
we see this i think when the vms are stopped or restarted by customers (xl
destroy vm and then recreating) or I can reprdoce this when I stop them all by
script with a for loop with xl destroy $i .
It happens with hvm and pvm
testcase all vms started:
root@v34:/var# xl list
Name
(CC Stefano)
On 25/11/16 12:19, Iurii Mykhalskyi wrote:
Hello!
Hi Iurii,
I'm working under Renesas Gen3 H3 board with 4GB RAM (Salvator-X)
support in Xen mainline.
Salvator-X has several CMA pool nodes, for example:
1:
adsp_reserved: linux,adsp {
compatible = "shared-dma-pool";
reusable;
Lars, the project is approved by Coverity. Scan has found some issues in
xen/arch/arm on master, part of them are false positives.
On 28.11.16 13:01, Artem Mygaiev wrote:
> On 28.11.16 12:27, Lars Kurth wrote:
>> On 22/11/2016 13:54, "Artem Mygaiev" wrote:
>>> On 22.11.16 15:42, Andrew Cooper wr
Hi Artem,
On 29/11/16 14:21, Artem Mygaiev wrote:
Lars, the project is approved by Coverity. Scan has found some issues in
xen/arch/arm on master, part of them are false positives.
Perfect. It would be interesting to know the list of issues so we can
categorize them (i.e are they security iss
On Tue, Nov 29, 2016 at 06:07:36AM -0700, Jan Beulich wrote:
> >>> On 29.11.16 at 13:09, wrote:
> > On Tue, Nov 29, 2016 at 04:44:18AM -0700, Jan Beulich wrote:
> >> >>> On 29.11.16 at 12:38, wrote:
> >> > On Tue, Nov 29, 2016 at 03:40:37AM -0700, Jan Beulich wrote:
> >> >> >>> On 29.11.16 at 03:
flight 102706 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102706/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 102660
test-armhf-armhf-libvirt 13
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-201
ARM guests may induce host asynchronous abort
ISSUE DESCRIPTION
=
Depending on how the hardware and firmware have been integrated,
guest-triggered asynchronous aborts (SE
Please don't post them to xen-devel@ though: as a one-off, you may want to
send to Julien and maybe Stefano
Longer term, we ought to find a way to send the output to a safe place, as
for x86
Lars
On 29/11/2016 14:27, "Julien Grall" wrote:
>Hi Artem,
>
>On 29/11/16 14:21, Artem Mygaiev wrote:
>>
flight 102704 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102704/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-qemut-rhel6hvm-amd 14 leak-check/check fail pass in 102695
Regressions which are regarded a
>>> On 28.11.16 at 12:13, wrote:
> When translating the second frame of a write crossing a page boundary, mask
> the linear address down to the page boundary.
>
> This causes the correct %cr2 being reported to the guest in the case that the
> second frame suffers a pagefault during translation.
>
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Grytsov
Signed-off-by: Oleksandr Dmytryshyn
Signed-off-by: Iurii Konovalenko
---
Changes since v1:
* removed __attribute__((__packed__)) from all structures definitions
Changes since v2:
* remove
From: Oleksandr Andrushchenko
Hi, all!
Please find the next version of the ABI for the PV sound
after addressing review comments.
Thank you,
Oleksandr Andrushchenko
Oleksandr Grytsov
Oleksandr Andrushchenko (1):
This is the ABI for the two halves of a para-virtualized sound
driver to
On 28 November 2016 at 22:10, Julien Grall wrote:
>
>
> On 28/11/16 18:09, Volodymyr Babchuk wrote:
>>
>> Hello,
>
>
> Hello Volodymyr,
>
>> On 28 November 2016 at 18:14, Julien Grall wrote:
>>>
>>> On 24/11/16 21:10, Volodymyr Babchuk wrote:
My name is Volodymyr Babchuk, I'm working on
>>> On 28.11.16 at 12:13, wrote:
> X86EMUL_CMPXCHG_FAILED was introduced in c/s d430aae25 in 2005. Even at the
> time it alised what is now X86EMUL_RETRY (as well as what is now
> X86EMUL_EXCEPTION). I am not sure why the distinction was considered useful
> at the time.
I have always guessed th
On Tue, Nov 29, Wei Liu wrote:
> On Mon, Nov 28, 2016 at 10:28:21AM -0800, Stefano Stabellini wrote:
> > Anthony, are you going to take care of this?
> > However, given the state of the release, they'll need a release-ack to
> > be applied.
> I think these patches will need to wait to be backporte
Define VCPU available map address (used by AML's PRSC method)
and GPE0 CPU hotplug event number. Use these definitions in mk_dsdt
instead hardcoded values.
These definitions will later be used by both the hypervisor and
the toolstack (initially for PVH guests only), thus they are
placed in public
This series adds support for ACPI-based VCPU hotplug for unprivileged
PVH guests.
Changes in v4:
* Replaced XEN_DOMCTL_set_avail_vcpus with XEN_DOMCTL_acpi_access,
toolstack is expected to issue two ACPI "writes" to trigger the hotplug
* Moved pm1a registers from PMTState to hvm_domain. gpe0 reg
These registers (pm1a specifically) are not all specific to pm timer
and are accessed by non-pmtimer code (for example, sleep/power button
emulation).
In addition to moving those regsters to struct hvm_domain rename
HVM save state structures and routines as well.
No functional changes are introdu
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* Registers are now explicitly split into 2-byte status and enable.
xen/arch/x86/hvm/acpi.c | 122 +++-
xen/common/domctl.c | 5 ++
xen/include/xen/sched.h | 3 ++
3 files changed, 129 insertion
When GPE0 status register gets a bit set (currently XEN_GPE0_CPUHP_BIT
only) send an SCI to the guest.
Also update send_guest_global_virq() to handle cases when VCPU0
is offlined.
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* Generate SCI only when needed (i.e. when status changes)
* Deal
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* New patch
(This should eventually be moved in acpi.c)
xen/arch/x86/hvm/pmtimer.c | 8
1 file changed, 8 insertions(+)
diff --git a/xen/arch/x86/hvm/pmtimer.c b/xen/arch/x86/hvm/pmtimer.c
index 5144928..a810f2b 100644
--- a/xen/arch/x
PVH guests do not have IOAPIC which typically generates an SCI. For
those guests SCI will be provided as a virtual interrupt.
Copy VIRQ_MCA definition from of xen-mca.h to xen.h to keep all
x86-specific VIRQ_ARCH_* in one place. (However, because we don't
want to require inclusion of xen.h in xen-
This domctl will allow toolstack to read and write some
ACPI registers. It will be available to both x86 and ARM
but will be implemented first only for x86
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* New patch
xen/arch/x86/domctl.c| 9 +
xen/arch/x86/hvm/Makefile
PVH guests will have ACPI accesses emulated by the hypervisor as
opposed to QEMU (as is the case for HVM guests). This patch installs
handler for accesses to PM1A, GPE0 (which is added to struct
hvm_hw_acpi) and VCPU map. Logic for the handler will be provided
by a later patch.
Whether or not the
Signed-off-by: Boris Ostrovsky
---
CC: George Dunlap
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
---
Changes in v4:
* Updated text to reflect new interfaces.
docs/misc/hvmlite.markdown | 13 +
1 file changed, 13 insertions(+)
diff --git a/docs/misc/hvmlite.ma
Signed-off-by: Boris Ostrovsky
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
---
tools/firmware/hvmloader/util.c | 3 ++-
tools/libacpi/build.c | 2 ++
tools/libacpi/libacpi.h | 1 +
3 files changed, 5 insertions(+), 1 deletion(-)
diff --git a/tools/firmware/hvmloa
Provide libxc interface for accessing ACPI via XEN_DOMCTL_acpi_access.
When a VCPU is hot-(un)plugged to/from a PVH guest update VCPU map
by writing to ACPI's XEN_ACPI_CPU_MAP register and then set GPE0
status bit in GPE0.status.
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* New patch
to
This is the method that will get invoked on an SCI.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
tools/libacpi/mk_dsdt.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/tools/libacpi/mk_dsdt.c b/tools/libacpi/mk_dsdt.c
index 16320a9..5765822 100644
---
ACPI builder marks VCPUS set in vcpu_online map as enabled in MADT.
With ACPI-based CPU hotplug we only want VCPUs that are started by
the guest to be marked as such. Remaining VCPUs will be set to
"enable" by AML code during hotplug.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Konrad Rzeszutek W
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* New patch
xen/arch/x86/hvm/acpi.c | 61 +++--
1 file changed, 54 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/hvm/acpi.c b/xen/arch/x86/hvm/acpi.c
index c80c464..1c205eb 100644
--- a/xen/a
PM timer is not supported by PVH guests.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
---
tools/firmware/hvmloader/util.c | 3 ++-
tools/libacpi/build.c | 5 +
tools/libacpi/libacpi.h | 1 +
3 files changed, 8 insertions(+), 1 de
flight 102705 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102705/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 13 saverestore-support-check fail REGR. vs. 99725
Tests
On Tue, Nov 29, 2016 at 06:00:47AM -0700, Jan Beulich wrote:
> >>> On 29.11.16 at 13:41, wrote:
> > On Fri, Nov 11, 2016 at 09:58:44AM -0700, Jan Beulich wrote:
> >> >>> On 29.10.16 at 10:59, wrote:
> >> > Current {un}map_mmio_regions implementation has a maximum number of
> >> > loops
> > to
>
Hi Julien
On 29.11.16 16:27, Julien Grall wrote:
> Hi Artem,
>
> On 29/11/16 14:21, Artem Mygaiev wrote:
>> Lars, the project is approved by Coverity. Scan has found some issues in
>> xen/arch/arm on master, part of them are false positives.
>
> Perfect. It would be interesting to know the list of
>>> On 28.11.16 at 12:13, wrote:
> The existing propagate_page_fault() is fairly similar to
> pv_inject_page_fault(), although it has a return value. Only a single caller
> makes use of the return value, and non-NULL is only returned if the passed cr2
> is non-canonical. Opencode this single cas
>>> On 28.11.16 at 12:13, wrote:
> Introduce a new x86_emul_pagefault() similar to x86_emul_hw_exception(), and
> use this instead of hvm_inject_page_fault() from emulation codepaths.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
___
Xe
Hello Volodymyr,
On 29/11/16 15:27, Volodymyr Babchuk wrote:
On 28 November 2016 at 22:10, Julien Grall wrote:
On 28/11/16 18:09, Volodymyr Babchuk wrote:
On 28 November 2016 at 18:14, Julien Grall wrote:
On 24/11/16 21:10, Volodymyr Babchuk wrote:
I mean, is there any command that will af
>>> On 29.11.16 at 16:24, wrote:
> From: Oleksandr Andrushchenko
>
> Hi, all!
>
> Please find the next version of the ABI for the PV sound
> after addressing review comments.
You've been asked before, and I feel the need to repeat: Please
slow down with sending new versions. Give people time t
>>> On 29.11.16 at 16:24, wrote:
> +struct xensnd_req {
> +uint16_t id;
> +uint8_t operation;
> +uint8_t stream_idx;
> +uint32_t reserved;
> +union {
> +struct xensnd_open_req open;
> +struct xensnd_rw_req rw;
> +uint8_t padding[24];
> +} op;
> +};
>
On 29/11/16 15:09, Artem Mygaiev wrote:
Hi Julien
On 29.11.16 16:27, Julien Grall wrote:
Hi Artem,
On 29/11/16 14:21, Artem Mygaiev wrote:
Lars, the project is approved by Coverity. Scan has found some issues in
xen/arch/arm on master, part of them are false positives.
Perfect. It would b
>>> On 29.11.16 at 16:33, wrote:
> This series adds support for ACPI-based VCPU hotplug for unprivileged
> PVH guests.
>
> Changes in v4:
> * Replaced XEN_DOMCTL_set_avail_vcpus with XEN_DOMCTL_acpi_access,
> toolstack is expected to issue two ACPI "writes" to trigger the hotplug
> * Moved pm1a
flight 102707 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102707/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 2b2efe33eaceb3fd2b5c6859dcb5151970dc797b
baseline version:
ovmf 8ae17140476861efa642d
>>> On 28.11.16 at 12:13, wrote:
> @@ -3012,7 +3018,10 @@ void hvm_task_switch(
>&tss.back_link, sizeof(tss.back_link),
> 0,
>&pfinfo);
> if ( rc == HVMCOPY_bad_gva_to_gfn )
> +{
> +hvm_in
On 29/11/16 16:24, Jan Beulich wrote:
On 28.11.16 at 12:13, wrote:
>> @@ -3012,7 +3018,10 @@ void hvm_task_switch(
>>&tss.back_link,
>> sizeof(tss.back_link), 0,
>>&pfinfo);
>> if ( rc == HVMCOPY_bad_gva
>>> On 29.11.16 at 17:30, wrote:
> On 29/11/16 16:24, Jan Beulich wrote:
> On 28.11.16 at 12:13, wrote:
>>> @@ -3012,7 +3018,10 @@ void hvm_task_switch(
>>>&tss.back_link,
>>> sizeof(tss.back_link),
> 0,
>>>&pfi
On 11/29/2016 11:11 AM, Jan Beulich wrote:
On 29.11.16 at 16:33, wrote:
>> This series adds support for ACPI-based VCPU hotplug for unprivileged
>> PVH guests.
>>
>> Changes in v4:
>> * Replaced XEN_DOMCTL_set_avail_vcpus with XEN_DOMCTL_acpi_access,
>> toolstack is expected to issue two AC
On 29/11/16 16:36, Jan Beulich wrote:
On 29.11.16 at 17:30, wrote:
>> On 29/11/16 16:24, Jan Beulich wrote:
>> On 28.11.16 at 12:13, wrote:
@@ -3012,7 +3018,10 @@ void hvm_task_switch(
&tss.back_link,
sizeof(tss.back_link),
>> 0,
>>
>>> On 29.11.16 at 17:40, wrote:
> On 11/29/2016 11:11 AM, Jan Beulich wrote:
> On 29.11.16 at 16:33, wrote:
>>> This series adds support for ACPI-based VCPU hotplug for unprivileged
>>> PVH guests.
>>>
>>> Changes in v4:
>>> * Replaced XEN_DOMCTL_set_avail_vcpus with XEN_DOMCTL_acpi_access,
On 29/11/16 16:00, Jan Beulich wrote:
On 28.11.16 at 12:13, wrote:
>> The existing propagate_page_fault() is fairly similar to
>> pv_inject_page_fault(), although it has a return value. Only a single caller
>> makes use of the return value, and non-NULL is only returned if the passed
>> cr2
On 11/29/2016 06:09 PM, Jan Beulich wrote:
On 29.11.16 at 16:24, wrote:
+struct xensnd_req {
+uint16_t id;
+uint8_t operation;
+uint8_t stream_idx;
+uint32_t reserved;
+union {
+struct xensnd_open_req open;
+struct xensnd_rw_req rw;
+uint8_t padding[2
I have force pushed all four of the trees below. This is the expected
libvirt regression.
Ian.
osstest service owner writes ("[qemu-upstream-4.5-testing test] 102705:
regressions - FAIL"):
> flight 102705 qemu-upstream-4.5-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/1
On 11/29/2016 11:43 AM, Jan Beulich wrote:
On 29.11.16 at 17:40, wrote:
>> On 11/29/2016 11:11 AM, Jan Beulich wrote:
>> On 29.11.16 at 16:33, wrote:
This series adds support for ACPI-based VCPU hotplug for unprivileged
PVH guests.
Changes in v4:
* Replaced XEN_D
On 11/29/2016 06:06 PM, Jan Beulich wrote:
On 29.11.16 at 16:24, wrote:
From: Oleksandr Andrushchenko
Hi, all!
Please find the next version of the ABI for the PV sound
after addressing review comments.
You've been asked before, and I feel the need to repeat: Please
slow down with sending ne
1 - 100 of 158 matches
Mail list logo