flight 105959 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105959/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl 17 guest-localmigrate/x10 fail REGR. vs. 102714
test-
On 22/02/17 07:31, Jan Beulich wrote:
On 21.02.17 at 18:40, wrote:
>> On 21/02/17 17:25, Jan Beulich wrote:
>> On 20.02.17 at 12:00, wrote:
The thermal/performance leaf was previously hidden from HVM guests, but
>> fully
visible to PV guests. Most of the leaf refers to MSR av
On Tue, 2017-02-21 at 09:29 +, Tian, Kevin wrote:
> > From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> > Sent: Friday, February 17, 2017 11:43 PM
> >
> > Modify vmx_add_msr() to use a variation of insertion sort algorithm:
> > find a place for the new entry and shift all subsequent elem
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Wednesday, February 22, 2017 4:38 PM
>
> > >
> > > -for ( idx = 0; idx < *msr_count; idx++ )
> > > +for ( idx = 0; (*msr_area)[idx].index <= msr && idx < *msr_count;
> > > idx++ )
> >
> > risk of out-of-boundary access.
>
>
On Wed, 2017-02-22 at 08:40 +, Tian, Kevin wrote:
> > From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> > Sent: Wednesday, February 22, 2017 4:38 PM
> >
> > > >
> > > > -for ( idx = 0; idx < *msr_count; idx++ )
> > > > +for ( idx = 0; (*msr_area)[idx].index <= msr && idx < *msr_
>>> On 22.02.17 at 01:02, wrote:
> On 21/02/2017 23:45, osstest service owner wrote:
>> flight 105948 xen-4.7-testing real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/105948/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> including tests which could no
>>> On 21.02.17 at 21:42, wrote:
> --- a/docs/misc/xen-command-line.markdown
> +++ b/docs/misc/xen-command-line.markdown
> @@ -1406,6 +1406,15 @@ If segment of the first device is not specified,
> segment zero will be used.
> If other segments are not specified, first device segment will be used
On Tue, Nov 22, 2016 at 05:58:56PM +0800, Jan Beulich wrote:
On 18.11.16 at 02:57, wrote:
>> @@ -597,31 +598,50 @@ static int msi_msg_to_remap_entry(
>
>Considering you basically re-do most of the function, I think there's
>some more adjustment necessary (or at least very desirable) here.
>
>
>>> On 22.02.17 at 02:53, wrote:
> On Tue, Nov 22, 2016 at 05:58:56PM +0800, Jan Beulich wrote:
> On 18.11.16 at 02:57, wrote:
>>> else
>>> -new_ire.remap.dst = ((msg->address_lo >> MSI_ADDR_DEST_ID_SHIFT)
>>> - & 0xff) << 8;
>>> +{
>>> +ne
>>> On 20.02.17 at 12:00, wrote:
> Leaf 0xa is reserved by AMD, and only exposed to Intel guests when vPMU is
> enabled. Leave the logic as-was, ready to be cleaned up when further
> toolstack infrastructure is in place.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
___
On 22/02/17 08:23, Andrew Cooper wrote:
> On 22/02/17 07:31, Jan Beulich wrote:
> On 21.02.17 at 18:40, wrote:
>>> On 21/02/17 17:25, Jan Beulich wrote:
>>> On 20.02.17 at 12:00, wrote:
> The thermal/performance leaf was previously hidden from HVM guests, but
>>> fully
> visible
>>> On 20.02.17 at 12:00, wrote:
> Leaf 0xb is reserved by AMD, and uniformly hidden from guests by the toolstack
> logic and hypervisor PV logic.
>
> The previous dynamic logic filled in the x2APIC ID for all HVM guests. This
> is modified to respect the entire leaf being reserved by AMD, but i
On Mon, Feb 20, 2017 at 5:09 PM, Julien Grall wrote:
> Hello Vijay,
>
> On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Right not CONFIG_NUMA is not enabled for ARM and
>
>
> s/not/now/
>
>> existing code in asm-arm/numa.h is for !COFIG_NUMA.
>
>
> s/COFIG_NUMA/C
>>> On 20.02.17 at 12:00, wrote:
> The domain builder in libxc no longer depends on leaked CPUID information to
> properly construct HVM domains. Remove the control domain exclusion.
Am I missing some intermediate step? As long as there's a raw
CPUID invocation in xc_cpuid_x86.c (which is still
>>> On 22.02.17 at 10:12, wrote:
> On 22/02/17 08:23, Andrew Cooper wrote:
>> On 22/02/17 07:31, Jan Beulich wrote:
>> On 21.02.17 at 18:40, wrote:
On 21/02/17 17:25, Jan Beulich wrote:
On 20.02.17 at 12:00, wrote:
>> The PV MSR handling logic as minimal support for some th
>>> On 20.02.17 at 12:00, wrote:
> Now that all leaves have been altered to use the guest_cpuid() path, remove
> all the remaining legacy infrastructure.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
> ---
> xen/arch/x86/cpuid.c| 76
>
Hello guys,
Could someone help me with VLAPIC and Event channel relationship? I can't
find any good design overview for it.
Are they compatible things or not?
Actually I want to map any PIRQ to HVM guest (for example keyboard), and
use VLAPIC to deliver virtual interrupt to HVM guest.
But seems l
>>> On 17.02.17 at 18:40, wrote:
> --- a/xen/arch/x86/cpu/vpmu_intel.c
> +++ b/xen/arch/x86/cpu/vpmu_intel.c
> @@ -884,6 +884,10 @@ int vmx_vpmu_initialise(struct vcpu *v)
> if ( vpmu_mode == XENPMU_MODE_OFF )
> return 0;
>
> +if ( MASK_EXTR(v->domain->arch.cpuid->basic.raw[0xa
On 22/02/17 09:23, Jan Beulich wrote:
On 20.02.17 at 12:00, wrote:
>> The domain builder in libxc no longer depends on leaked CPUID information to
>> properly construct HVM domains. Remove the control domain exclusion.
> Am I missing some intermediate step? As long as there's a raw
> CPUID i
flight 105963 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105963/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf e0307a7dad02aa8c0cd8b3b0b9edce8ddb3fef2e
baseline version:
ovmf 85520606ad459ba7d825c
On Wed, 2017-02-22 at 01:46 -0700, Jan Beulich wrote:
> > > > On 22.02.17 at 01:02, wrote:
> > (XEN) Xen call trace:
> > (XEN)[]
> > sched_credit2.c#vcpu_is_migrateable+0x22/0x9a
> > (XEN)[]
> > sched_credit2.c#csched2_schedule+0x823/0xb4e
> > (XEN)[] schedule.c#schedule+0x108/0x609
>
On Mon, Feb 20, 2017 at 6:07 PM, Julien Grall wrote:
> Hello Vijay,
>
>
> On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Move common generic NUMA code to xen/common/numa.c from
>> xen/arch/x86/numa.c. Also move generic code in header file
>> xen/include/asm-x86/
On Mon, Feb 20, 2017 at 6:17 PM, Julien Grall wrote:
> Hello Vijay,
>
>
> On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Move some common numa code from xen/arch/x86/srat.c
>> to xen/common/numa.c
>>
>> Signed-off-by: Vijaya Kumar K
>> ---
>> xen/arch/x86/srat
>>> On 10.02.17 at 13:33, wrote:
> Changes since v5:
> - s/hvm_copy_to_guest_phys_vcpu/hvm_copy_to_guest_phys/.
> - Move pvh_add_mem_range to previous patch.
> - Add a comment regarding the current limitation to only 1 emulated IO APIC.
> - s/dom0_max_vcpus()/max_vcpus/ in pvh_setup_acpi_madt.
>>> On 22.02.17 at 11:00, wrote:
> On 22/02/17 09:23, Jan Beulich wrote:
> On 20.02.17 at 12:00, wrote:
>>> The domain builder in libxc no longer depends on leaked CPUID information to
>>> properly construct HVM domains. Remove the control domain exclusion.
>> Am I missing some intermediate
>>> On 22.02.17 at 09:45, wrote:
> On Wed, 2017-02-22 at 08:40 +, Tian, Kevin wrote:
>> > From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
>> > Sent: Wednesday, February 22, 2017 4:38 PM
>> >
>> > > >
>> > > > -for ( idx = 0; idx < *msr_count; idx++ )
>> > > > +for ( idx = 0; (*
>>> On 17.02.17 at 16:42, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -1347,17 +1347,12 @@ struct vmx_msr_entry *vmx_find_msr(u32 msr, int type)
>
> int vmx_read_guest_msr(u32 msr, u64 *val)
> {
> -struct vcpu *curr = current;
> -unsigned int i,
On 22/02/17 09:16, Jan Beulich wrote:
On 20.02.17 at 12:00, wrote:
>> Leaf 0xb is reserved by AMD, and uniformly hidden from guests by the
>> toolstack
>> logic and hypervisor PV logic.
>>
>> The previous dynamic logic filled in the x2APIC ID for all HVM guests. This
>> is modified to respe
flight 105979 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105979/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen b908131167a67a16fbe9c7a7826b67e2d93d9ec5
baseline version:
xen 75da
>>> On 17.02.17 at 16:42, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -2284,6 +2284,8 @@ static void pi_notification_interrupt(struct
> cpu_user_regs *regs)
> raise_softirq(VCPU_KICK_SOFTIRQ);
> }
>
> +static void __init vmx_lbr_tsx_fixup_check(void);
This run is configured for baseline tests only.
flight 68598 qemu-upstream-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68598/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 14 guest
On Mon, Feb 20, 2017 at 7:09 PM, Julien Grall wrote:
> Hello Vijay,
>
>
> On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> numa_setup() contains generic and arch specific code.
>> Split numa_setup() and move architecture specific code
>> under arch_numa_setup().
>
>>> On 22.02.17 at 11:22, wrote:
> On 22/02/17 09:16, Jan Beulich wrote:
> On 20.02.17 at 12:00, wrote:
>>> Leaf 0xb is reserved by AMD, and uniformly hidden from guests by the
> toolstack
>>> logic and hypervisor PV logic.
>>>
>>> The previous dynamic logic filled in the x2APIC ID for all H
On 17/02/17 12:03, Jan Beulich wrote:
> @@ -4267,6 +4336,12 @@ static int hvmop_get_param(
> case HVM_PARAM_ACPI_S_STATE:
> a.value = d->arch.hvm_domain.is_s3_suspended ? 3 : 0;
> break;
> +
> +case HVM_PARAM_VM86_TSS:
> +a.value = (uint32_t)d->arch.hvm_domain.par
On Mon, Feb 20, 2017 at 11:02 PM, Julien Grall wrote:
> Hello Vijay,
>
> On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Parse CPU node and fetch numa-node-id information.
>> For each node-id found, update nodemask_t mask.
>
>
> A link to the bindings would have
Hello Vijay,
On 22/02/17 09:18, Vijay Kilari wrote:
On Mon, Feb 20, 2017 at 5:09 PM, Julien Grall wrote:
Hello Vijay,
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Right not CONFIG_NUMA is not enabled for ARM and
s/not/now/
existing code in asm-arm/numa.h is f
Hello Vijay,
On 22/02/17 10:04, Vijay Kilari wrote:
On Mon, Feb 20, 2017 at 6:07 PM, Julien Grall wrote:
{
int rr, i;
@@ -288,16 +145,6 @@ void __init numa_initmem_init(unsigned long
start_pfn, unsigned long end_pfn)
(u64)end_pfn << PAGE_SHIFT);
}
-void numa_add_
libxenctrl now depends on this library
Signed-off-by: Paul Durrant
--
Cc: Ian Jackson
---
xen-hooks.mak | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen-hooks.mak b/xen-hooks.mak
index c1ea4be..4356f67 100644
--- a/xen-hooks.mak
+++ b/xen-hooks.mak
@@ -28,6 +28,7 @@ LIBS += -L$(XEN_ROOT)
Now that these have been split out of libxenctrl into libxendevicemodel
QEMU needs to request the compatibility interface.
Signed-off-by: Paul Durrant
--
Cc: Ian Jackson
---
xen-hooks.mak | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen-hooks.mak b/xen-hooks.mak
index 4356f67..0ca868f 10
libxendevicemodel has just been split out from libxc. From mini-os's
point of view we don't care about the distinction, so keep things
simple by just including libxendevicemodel if libxc is enabled.
Signed-off-by: Paul Durrant
--
Cc: Samuel Thibault
---
Makefile | 2 ++
1 file changed, 2 insert
Paul Durrant, on mer. 22 févr. 2017 11:03:37 +, wrote:
> libxendevicemodel has just been split out from libxc. From mini-os's
> point of view we don't care about the distinction, so keep things
> simple by just including libxendevicemodel if libxc is enabled.
>
> Signed-off-by: Paul Durrant
>
Hello Vijay,
On 22/02/17 10:08, Vijay Kilari wrote:
On Mon, Feb 20, 2017 at 6:17 PM, Julien Grall wrote:
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
diff --git a/xen/common/numa.c b/xen/common/numa.c
index 59dcb63..13f147c 100644
--- a/xen/common/numa.c
+++ b/xen/common/numa.c
@@ -46,6 +
Hello Vijay,
On 22/02/17 10:27, Vijay Kilari wrote:
On Mon, Feb 20, 2017 at 7:09 PM, Julien Grall wrote:
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
@@ -145,13 +141,8 @@ void __init numa_initmem_init(unsigned long
start_pfn, unsigned long end_pfn)
(u64)end_pfn << PAG
Hello Vijay,
On 22/02/17 10:46, Vijay Kilari wrote:
On Mon, Feb 20, 2017 at 11:02 PM, Julien Grall wrote:
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse CPU node and fetch numa-node-id information.
For each node-id found, update nodemask_t mask.
A link to th
flight 68599 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68599/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-i386-squeeze-netboot-pygrub 9 debian-di-install fail like 68561
test-amd64-amd
>>> On 22.02.17 at 11:45, wrote:
> On 17/02/17 12:03, Jan Beulich wrote:
>> @@ -4267,6 +4336,12 @@ static int hvmop_get_param(
>> case HVM_PARAM_ACPI_S_STATE:
>> a.value = d->arch.hvm_domain.is_s3_suspended ? 3 : 0;
>> break;
>> +
>> +case HVM_PARAM_VM86_TSS:
>> +
On Tue, Feb 21, 2017 at 02:03:00PM +0100, Marek Marczykowski-Górecki wrote:
> On Mon, Feb 20, 2017 at 05:18:44PM +, Wei Liu wrote:
> > On Fri, Feb 17, 2017 at 01:36:01PM +0100, Marek Marczykowski-Górecki wrote:
> > > Hi,
> > >
> > > I'm adjusting python bindings to work on python3 too. This wi
On Wed, Feb 22, 2017 at 08:53:24AM +0100, Juergen Gross wrote:
> On 20/02/17 16:19, Andrew Cooper wrote:
> > On 20/02/17 14:43, Juergen Gross wrote:
> >> On 20/02/17 15:31, Wei Liu wrote:
> >>> On Thu, Feb 16, 2017 at 08:47:07AM +0100, Juergen Gross wrote:
> There have been reports that Fedora
On Mon, Feb 20, 2017 at 11:58 PM, Julien Grall wrote:
> Hello Vijay,
>
> On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Parse distance-matrix and fetch node distance information.
>> Store distance information in node_distance[].
>>
>> Signed-off-by: Vijaya Kumar
On 21/02/17 10:39, Oleksandr Tyshchenko wrote:
Hi, Julien.
Hi Oleksandr,
On Mon, Feb 20, 2017 at 10:31 AM, Julien Grall wrote:
Hello Oleksandr,
On 02/17/2017 08:20 PM, Oleksandr Tyshchenko wrote:
Hi, all.
So, as I understand we have two possible solutions for the IOMMU page
table to be
flight 105960 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105960/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
Hello Vijay,
On 22/02/17 11:38, Vijay Kilari wrote:
On Mon, Feb 20, 2017 at 11:58 PM, Julien Grall wrote:
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse distance-matrix and fetch node distance information.
Store distance information in node_distan
On Wed, Feb 22, 2017 at 11:34:16AM +, Wei Liu wrote:
> On Tue, Feb 21, 2017 at 02:03:00PM +0100, Marek Marczykowski-Górecki wrote:
> > On Mon, Feb 20, 2017 at 05:18:44PM +, Wei Liu wrote:
> > > On Fri, Feb 17, 2017 at 01:36:01PM +0100, Marek Marczykowski-Górecki
> > > wrote:
> > > > Hi,
>
Make the flight number be a link to the unpublished flight logs.
Signed-off-by: Ian Jackson
---
ms-flights-summary | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/ms-flights-summary b/ms-flights-summary
index 78f8675..10ad6e5 100755
--- a/ms-flights-summary
+++ b/ms-flight
This allows us to generate private urls for unpublished flights. This
will be useful for links from the ongoing flights summary - since,
naturally, none of those logs are published yet.
The URLs will be of more limited use; the exact usefulness will depend
on the deployment.
If no separate Unpub
On Wed, Feb 22, 2017 at 1:39 PM, Julien Grall wrote:
> On 21/02/17 10:39, Oleksandr Tyshchenko wrote:
>>
>> Hi, Julien.
Hi, Julien, all.
>
>
> Hi Oleksandr,
>
>> On Mon, Feb 20, 2017 at 10:31 AM, Julien Grall
>> wrote:
>>>
>>> Hello Oleksandr,
>>>
>>> On 02/17/2017 08:20 PM, Oleksandr Tyshchenk
Make each job name in the detailed tables be a link to the
(unpublished) logs for that job.
Requested-by: Roger Pau Monné
Signed-off-by: Ian Jackson
---
ms-flights-summary | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/ms-flights-summary b/ms-flights-summary
index 10a
Will will want this in a moment. For now, no functional change.
Signed-off-by: Ian Jackson
---
ms-flights-summary | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/ms-flights-summary b/ms-flights-summary
index 7981e44..78f8675 100755
--- a/ms-flights-summary
+++ b/ms-f
> On 23 Nov 2016, at 12:20, Lars Kurth wrote:
>
> THIS IS VERSION 5 OF THIS PATCH AND WE ARE READY FOR FORMAL VOTING, UNLESS
> SOMEONE OBJECTS. PEOPLE LISTED AS COMMITTERS IN
> - https://xenproject.org/developers/teams/hypervisor.html
> - https://xenproject.org/developers/teams/xapi.html
> PLEAS
On Fri, Jun 3, 2016 at 5:50 PM, Chris Patterson wrote:
> From: Chris Patterson
>
> Replace the usage of readdir_r() with readdir() to address a
> compilation error under glibc due to the deprecation of readdir_r
> for their next release (2.24) [1, 2].
>
> Remove code specific to usage of readdir_
Paul Durrant writes ("[PATCH 1/2] Add libxendevicemodel to rpath-link"):
> libxenctrl now depends on this library
FAOD, this and the next one look like patches against qemu-trad. It's
normally a good idea to state this somewhere :-).
There is, AIUI, no forward/backward compatibility provided (at
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 22 February 2017 12:09
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org
> Subject: Re: [PATCH 1/2] Add libxendevicemodel to rpath-link
>
> Paul Durrant writes ("[PATCH 1/2] Add libxendevicemodel to
On Tue, Feb 21, 2017 at 04:07:35PM +0100, Juergen Gross wrote:
[...]
> static bool recovery = true;
> static int reopen_log_pipe[2];
> static int reopen_log_pipe0_pollfd_idx = -1;
> -static char *tracefile = NULL;
> +char *tracefile = NULL;
> static TDB_CONTEXT *tdb_ctx = NULL;
> static bool t
On Tue, Feb 21, 2017 at 04:07:34PM +0100, Juergen Gross wrote:
> The Xenstore protocol supports the XS_CONTROL command for triggering
> various actions in the Xenstore daemon. Enhance that support by using
> a command table and adding a help function. Move all the XS_CONTROL
> related code to a new
On Tue, Feb 21, 2017 at 04:07:33PM +0100, Juergen Gross wrote:
> In preparation to support other than pure debug functionality via the
> Xenstore XS_DEBUG wire command rename it to XS_CONTROL and make
> XS_DEBUG an alias of it.
>
> Add an alias xs_control_command for the associated xs_debug_comman
On Tue, Feb 21, 2017 at 04:07:36PM +0100, Juergen Gross wrote:
> Add a XS_CONTROL command to xenstored for doing a talloc report to a
> file. Right now this is supported by specifying a command line option
> when starting xenstored and sending a signal to the daemon to trigger
> the report.
>
> To
On 22/02/17 13:36, Wei Liu wrote:
> On Tue, Feb 21, 2017 at 04:07:33PM +0100, Juergen Gross wrote:
>> In preparation to support other than pure debug functionality via the
>> Xenstore XS_DEBUG wire command rename it to XS_CONTROL and make
>> XS_DEBUG an alias of it.
>>
>> Add an alias xs_control_co
On 22/02/17 13:36, Wei Liu wrote:
> On Tue, Feb 21, 2017 at 04:07:34PM +0100, Juergen Gross wrote:
>> The Xenstore protocol supports the XS_CONTROL command for triggering
>> various actions in the Xenstore daemon. Enhance that support by using
>> a command table and adding a help function. Move all
On 22/02/17 13:36, Wei Liu wrote:
> On Tue, Feb 21, 2017 at 04:07:35PM +0100, Juergen Gross wrote:
> [...]
>> static bool recovery = true;
>> static int reopen_log_pipe[2];
>> static int reopen_log_pipe0_pollfd_idx = -1;
>> -static char *tracefile = NULL;
>> +char *tracefile = NULL;
>> static T
On Wed, Feb 22, 2017 at 01:40:42PM +0100, Juergen Gross wrote:
> On 22/02/17 13:36, Wei Liu wrote:
> > On Tue, Feb 21, 2017 at 04:07:33PM +0100, Juergen Gross wrote:
> >> In preparation to support other than pure debug functionality via the
> >> Xenstore XS_DEBUG wire command rename it to XS_CONTRO
On 22/02/17 13:36, Wei Liu wrote:
> On Tue, Feb 21, 2017 at 04:07:36PM +0100, Juergen Gross wrote:
>> Add a XS_CONTROL command to xenstored for doing a talloc report to a
>> file. Right now this is supported by specifying a command line option
>> when starting xenstored and sending a signal to the
Hi
I'm writing my master thesis about using hypervisors on automotive high
performance plattforms. As a part of my work for the thesis I'm trying to
set up xen on a s32v234-evb (ARMv8) board using u-boot 2016.01. But I
can't find a way of getting any output after u-boot try's to start the xen
k
On 22/02/17 13:43, Wei Liu wrote:
> On Wed, Feb 22, 2017 at 01:40:42PM +0100, Juergen Gross wrote:
>> On 22/02/17 13:36, Wei Liu wrote:
>>> On Tue, Feb 21, 2017 at 04:07:33PM +0100, Juergen Gross wrote:
In preparation to support other than pure debug functionality via the
Xenstore XS_DEBU
On Wed, Feb 22, 2017 at 01:43:27PM +0100, Juergen Gross wrote:
> On 22/02/17 13:36, Wei Liu wrote:
> > On Tue, Feb 21, 2017 at 04:07:36PM +0100, Juergen Gross wrote:
> >> Add a XS_CONTROL command to xenstored for doing a talloc report to a
> >> file. Right now this is supported by specifying a comm
On 22/02/17 13:47, Wei Liu wrote:
> On Wed, Feb 22, 2017 at 01:43:27PM +0100, Juergen Gross wrote:
>> On 22/02/17 13:36, Wei Liu wrote:
>>> On Tue, Feb 21, 2017 at 04:07:36PM +0100, Juergen Gross wrote:
Add a XS_CONTROL command to xenstored for doing a talloc report to a
file. Right now t
Hi,
I am learning event channel implementation in xen and evtchn driver in
linux.
When PVHVM guest boot, it will set callback vector using function void
*xen_callback_vector(void)*
which will call *xen_set_callback_via()*
The logic itself is simple but I don't know what the '*via*' stands for.
Wo
Hi Bruno
Thanks for your interest.
On Tue, Feb 21, 2017 at 10:34:45AM -0800, Bruno Alvisio wrote:
> Hello,
>
> I have been to doing some research and as far as I know XEN supports
> Live Migration
> of VMs that only have shared storage. (i.e. iSCSI) If the VM has been
> booted with local storage
flight 105962 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105962/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 6 xen-boot fail REGR. vs. 105943
test-armhf-armhf-libvirt
On Wed, Feb 22, 2017 at 12:04:18PM +0100, Samuel Thibault wrote:
> Paul Durrant, on mer. 22 févr. 2017 11:03:37 +, wrote:
> > libxendevicemodel has just been split out from libxc. From mini-os's
> > point of view we don't care about the distinction, so keep things
> > simple by just including l
Hi Andre,
On 30/01/17 18:31, Andre Przywara wrote:
diff --git a/xen/arch/arm/gic-v3-its.c b/xen/arch/arm/gic-v3-its.c
index 6578e8a..4a3a394 100644
--- a/xen/arch/arm/gic-v3-its.c
+++ b/xen/arch/arm/gic-v3-its.c
[...]
+
+int gicv3_its_map_guest_device(struct domain *d, int host_devid,
+
On Wed, Feb 22, 2017 at 08:57:33PM +0800, Yuming Wu wrote:
> Hi,
>
> I am learning event channel implementation in xen and evtchn driver in
> linux.
> When PVHVM guest boot, it will set callback vector using function void
> *xen_callback_vector(void)*
> which will call *xen_set_callback_via()*
>
Julien Grall writes ("Re: [Xen-devel] [linux-linus test] 104684: regressions -
FAIL"):
> On 14/02/17 17:42, Wei Liu wrote:
> > (test-lab)liuw@osstest:~/testing.git$ ./mg-hosts showprops | grep DTUART |
> > grep arndale
> > arndale-bluewater XenDTUARTPath /serial@12C2
> > a
>>> On 22.02.17 at 13:57, wrote:
> I am learning event channel implementation in xen and evtchn driver in
> linux.
> When PVHVM guest boot, it will set callback vector using function void
> *xen_callback_vector(void)*
> which will call *xen_set_callback_via()*
>
> The logic itself is simple but I
My recent patch [1] to the Linux privcmd module introduced a dedicated
mechanism for making dm_op hypercalls.
This patch adds the necessary code to libxendevicemodel to take
advantage of that mechanism if it is implemented in the tools domain
kernel.
[1]
https://git.kernel.org/cgit/linux/kernel/
The new xendevicemodel library is intended to be used by all Xen device
models such that the only hypercall that use will be the dm_op hypercall
added by commit 524a98c2.
This patch adds the boilerplate for the new library, with only open() and
close() entry points, and calls to those from libxenc
Paul Durrant (5):
tools/libxenctrl: fix error check after opening libxenforeignmemory
tools/libxendevicemodel: introduce the new library
tools/libxendevicemodel: extract functions and add a compat layer
tools/libxendevicemodel: introduce a Linux-specific implementation
tools/libxendevicem
My recent patch [1] to the Linux privcmd module introduced a mechanism
to restrict an open file handle to subsequently only accept operations for
a specified domain.
This patch extends the libxendevicemodel API and make use of the
mechanism in the Linux-specific code to restrict operations on the
Checking the value of xch->xcall is clearly incorrect. The code should be
checking xch->fmem (i.e. the return of the previously called function).
Signed-off-by: Paul Durrant
---
Cc: Ian Jackson
Cc: Wei Liu
---
tools/libxc/xc_private.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
di
This patch extracts all functions resulting in a dm_op hypercall from
libxenctrl and moves them into libxendevicemodel. It also adds a compat
layer into libxenctrl, which can be selected by defining
XC_WANT_COMPAT_DEVICEMODEL_API to 1 before including xenctrl.h.
With this patch the core of libxend
>>> On 21.02.17 at 20:24, wrote:
> On Tue, Feb 21, 2017 at 08:19:53PM +0100, Daniel Kiper wrote:
>> This way Xen can be loaded on EFI platforms using GRUB2 and
>> other boot loaders which support multiboot2 protocol.
>>
>> Signed-off-by: Daniel Kiper
>> ---
>> v16 - suggestions/fixes:
>> - im
flight 105985 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105985/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On 2/22/17 5:42 AM, Jan Beulich wrote:
On 21.02.17 at 20:24, wrote:
>> On Tue, Feb 21, 2017 at 08:19:53PM +0100, Daniel Kiper wrote:
>>> This way Xen can be loaded on EFI platforms using GRUB2 and
>>> other boot loaders which support multiboot2 protocol.
>>>
>>> Signed-off-by: Daniel Kiper
>
>>> On 17.02.17 at 07:39, wrote:
> --- a/xen/arch/x86/cpu/mcheck/barrier.c
> +++ b/xen/arch/x86/cpu/mcheck/barrier.c
> @@ -20,7 +20,7 @@ void mce_barrier_enter(struct mce_softirq_barrier *bar)
> {
> int gen;
>
> -if (!mce_broadcast)
> +if ( !mce_broadcast || __get_cpu_var(lmce_in_p
On Wed, 2017-02-22 at 03:26 -0700, Jan Beulich wrote:
> > > > On 17.02.17 at 16:42, wrote:
> >
> > --- a/xen/arch/x86/hvm/vmx/vmx.c
> > +++ b/xen/arch/x86/hvm/vmx/vmx.c
> > @@ -2284,6 +2284,8 @@ static void pi_notification_interrupt(struct
> > cpu_user_regs *regs)
> > raise_softirq(VCPU_KIC
On 22/02/17 13:58, Sergey Dyasli wrote:
>
>>> @@ -2876,7 +2938,11 @@ static int vmx_msr_write_intercept(unsigned int msr,
>>> uint64_t msr_content)
>>> for ( ; (rc == 0) && lbr->count; lbr++ )
>>> for ( i = 0; (rc == 0) && (i < lbr->count); i++ )
>>>
+
+void vpmu_initialise(struct vcpu *v)
+{
+get_vpmu(v);
+
+/*
+ * Guests without LAPIC (i.e. PV) call vpmu_arch_initialise()
+ * from pvpmu_init().
+ */
>>> implication is that PV VPMU is not counted then?
>> No. get_vpmu() is what
Hello,
There was few discussions recently about hiding SMMUs from DOM0 when
using ACPI. I thought it would be good to have a separate thread for this.
When using ACPI, the SMMUs will be described in the IO Remapping Table
(IORT). The specification can be found on the ARM website [1].
For a
On Wed, Feb 22, 2017 at 01:27:34PM +, Paul Durrant wrote:
> Checking the value of xch->xcall is clearly incorrect. The code should be
> checking xch->fmem (i.e. the return of the previously called function).
>
> Signed-off-by: Paul Durrant
Acked-by: Wei Liu
Ian, please backport this.
> --
Paul Durrant writes ("[PATCH v2 1/5] tools/libxenctrl: fix error check after
opening libxenforeignmemory"):
> Checking the value of xch->xcall is clearly incorrect. The code should be
> checking xch->fmem (i.e. the return of the previously called function).
Acked-by: Ian Jackson
___
Hi Ian,
On 22/02/17 13:19, Ian Jackson wrote:
Julien Grall writes ("Re: [Xen-devel] [linux-linus test] 104684: regressions -
FAIL"):
On 14/02/17 17:42, Wei Liu wrote:
(test-lab)liuw@osstest:~/testing.git$ ./mg-hosts showprops | grep DTUART | grep
arndale
arndale-bluewater XenDTUARTPath
1 - 100 of 194 matches
Mail list logo