On 03/20/17 08:24 -0600, Jan Beulich wrote:
> >>> On 17.03.17 at 07:46, wrote:
[..]
> > @@ -1704,10 +1717,11 @@ static void mce_softirq(void)
> > {
> > int cpu = smp_processor_id();
> > unsigned int workcpu;
> > +bool nowait = !this_cpu(mce_in_process);
> >
> > mce_printk(MCE
On 03/20/17 08:30 -0600, Jan Beulich wrote:
> >>> On 17.03.17 at 07:46, wrote:
> > --- a/xen/arch/x86/cpu/mcheck/mce_intel.c
> > +++ b/xen/arch/x86/cpu/mcheck/mce_intel.c
> > @@ -29,6 +29,9 @@ boolean_param("mce_fb", mce_force_broadcast);
> >
> > static int __read_mostly nr_intel_ext_msrs;
> >
This run is configured for baseline tests only.
flight 71019 xen-4.7-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71019/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd
On 03/20/17 10:33 -0600, Jan Beulich wrote:
> >>> On 17.03.17 at 07:46, wrote:
> > --- a/xen/include/public/hvm/params.h
> > +++ b/xen/include/public/hvm/params.h
> > @@ -259,6 +259,11 @@
> > */
> > #define HVM_PARAM_VM86_TSS_SIZED 37
> >
> > -#define HVM_NR_PARAMS 38
> > +/* Enable MCA capab
Hi Elena,
On Mon, 2017-03-06 at 16:21 +0200, Elena Reshetova wrote:
> refcount_t type and corresponding API should be
> used instead of atomic_t when the variable is used as
> a reference counter. This allows to avoid accidental
> refcounter overflows that might lead to use-after-free
> situations
This run is configured for baseline tests only.
flight 71026 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71026/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd6
On 03/20/17 18:27 +, Ian Jackson wrote:
> Haozhong Zhang writes ("[PATCH v2 09/12] x86/vmce, tools/libxl: expose LMCE
> capability in guest MSR_IA32_MCG_CAP"):
> > If LMCE is supported by host and ' mca_caps = [ "lmce" ] ' is
> > present in xl config, the LMCE capability will be exposed in gue
On 03/21/17 15:29 +0800, Haozhong Zhang wrote:
> On 03/20/17 18:27 +, Ian Jackson wrote:
> > Haozhong Zhang writes ("[PATCH v2 09/12] x86/vmce, tools/libxl: expose LMCE
> > capability in guest MSR_IA32_MCG_CAP"):
[..]
> > Is MCA "Machine Check Architecture" ? Is that precisely the machinery
>
>>> On 21.03.17 at 02:53, wrote:
> On March 20, 2017 3:35 PM, Jan Beulich wrote:
> On 20.03.17 at 02:58, wrote:
>>> On March 16, 2017 11:32 PM, Jan Beulich wrote:
>>> On 16.03.17 at 15:21, wrote:
> On March 16, 2017 10:06 PM, Jan Beulich wrote:
> On 16.03.17 at 14:55, wrote:
>>> On 20.03.17 at 21:20, wrote:
> On 03/20/2017 06:54 PM, Jan Beulich wrote:
> On 20.03.17 at 17:48, wrote:
>>> On 03/20/2017 06:40 PM, Jan Beulich wrote:
>>> On 20.03.17 at 17:16, wrote:
> On 03/20/2017 06:14 PM, Razvan Cojocaru wrote:
>> In any case, back when I've added xc_se
>>> On 20.03.17 at 19:27, wrote:
> On Fri, Mar 03, 2017 at 10:06:03AM -0700, Jan Beulich wrote:
>> >>> On 23.02.17 at 12:52, wrote:
>> > --- a/xen/arch/x86/hvm/vlapic.c
>> > +++ b/xen/arch/x86/hvm/vlapic.c
>> > @@ -1120,7 +1120,7 @@ static int __vlapic_accept_pic_intr(struct vcpu *v)
>> > if
On 01/03/17 13:31, Juergen Gross wrote:
> I'd like to request backport of upstream commit bc6a499ebcf1
> ("libxl: correct xenstore entry for empty cdrom") to at least
> 4.8 and 4.7.
>
> As libxl sources have been split in 4.9 the patch doesn't apply.
> Attached patch applies cleanly to 4.8 and wit
flight 106800 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106800/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 106780
test-armhf-armhf-libvirt 13
This run is configured for baseline tests only.
flight 71022 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71022/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-
On 20/03/17 18:59, Stefano Stabellini wrote:
> Introduce the Xen 9pfs transport driver: add struct xenbus_driver to
> register as a xenbus driver and add struct p9_trans_module to register
> as v9fs driver.
>
> All functions are empty stubs for now.
>
> Signed-off-by: Stefano Stabellini
> Review
>>> On 20.03.17 at 20:21, wrote:
> On Fri, 17 Mar 2017 05:03:44 -0600
> "Jan Beulich" wrote:
>> >>> On 10.03.17 at 16:50, wrote:
>> > +else
>> > +{
>> > +hvm_emulate_init_once(&ctxt, NULL, guest_cpu_user_regs());
>> > +rc = hvm_emulate_one(&ctxt);
>> > +switch ( r
>>> On 21.03.17 at 08:06, wrote:
> On 03/20/17 08:30 -0600, Jan Beulich wrote:
>> >>> On 17.03.17 at 07:46, wrote:
>> > --- a/xen/arch/x86/cpu/mcheck/mce_intel.c
>> > +++ b/xen/arch/x86/cpu/mcheck/mce_intel.c
>> > @@ -29,6 +29,9 @@ boolean_param("mce_fb", mce_force_broadcast);
>> >
>> > static
On 20/03/17 18:59, Stefano Stabellini wrote:
> Implement functions to handle the xenbus handshake. Upon connection,
> allocate the rings according to the protocol specification.
>
> Initialize a work_struct and a wait_queue. The work_struct will be used
> to schedule work upon receiving an event c
This run is configured for baseline tests only.
flight 71020 xen-4.8-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71020/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvir
This run is configured for baseline tests only.
flight 71025 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71025/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debian
On Mon, 2017-03-20 at 16:21 -0700, Stefano Stabellini wrote:
> On Fri, 17 Mar 2017, Dario Faggioli wrote:
> >
> > --- /dev/null
> > +++ b/xen/common/sched_null.c
> > +/*
> > + * Virtual CPU
> > + */
> > +struct null_vcpu {
> > +struct list_head waitq_elem;
> > +struct null_dom *ndom;
>
>
On 20/03/17 18:59, Stefano Stabellini wrote:
> Implement struct p9_trans_module create and close functions by looking
> at the available Xen 9pfs frontend-backend connections. We don't expect
> many frontend-backend connections, thus walking a list is OK.
>
> Send requests to the backend by copyin
On 20/03/17 18:59, Stefano Stabellini wrote:
> Upon receiving a notification from the backend, schedule the
> p9_xen_response work_struct. p9_xen_response checks if any responses are
> available, if so, it reads them one by one, calling p9_client_cb to send
> them up to the 9p layer (p9_client_cb c
2017-03-21 0:50 GMT+08:00 Jan Beulich :
On 20.03.17 at 17:32, wrote:
>> Added 2 new config entries in common/Kconfig:
>> CMDLINE and CMDLINE_OVERRIDE
>> Modifed common/kernel.c:cmdline_parse().
>>
>> The 2 new entries enable an embedded command line to be compiled
>> in the hypervisor. CM
This allows downstreams to set their defaults without modifying the source code
all over the place. Also probably useful for the embedded space.
(See Also: https://xenproject.atlassian.net/browse/XEN-41)
Added 2 new config entries in common/Kconfig:
CMDLINE and CMDLINE_OVERRIDE
Modified common
On Mon, 2017-03-20 at 16:46 -0700, Stefano Stabellini wrote:
> On Fri, 17 Mar 2017, Dario Faggioli wrote:
> >
> > --- a/xen/common/sched_null.c
> > +++ b/xen/common/sched_null.c
> > @@ -117,6 +117,14 @@ static inline struct null_dom *null_dom(const
> > struct domain *d)
> > return d->sched_pr
On Tue, 2017-03-21 at 16:43 +0800, Zhongze Liu wrote:
> This allows downstreams to set their defaults without modifying the
> source code
> all over the place. Also probably useful for the embedded space.
> (See Also: https://xenproject.atlassian.net/browse/XEN-41)
>
> Added 2 new config entries i
flight 106796 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106796/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 106778
test-amd64-amd64-x
flight 106801 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106801/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 09da11081915dea25d2d1bba87cdf460102e52bb
baseline version:
ovmf f2333c707dd04f069c102
2017-03-21 16:59 GMT+08:00 Dario Faggioli :
> On Tue, 2017-03-21 at 16:43 +0800, Zhongze Liu wrote:
>> This allows downstreams to set their defaults without modifying the
>> source code
>> all over the place. Also probably useful for the embedded space.
>> (See Also: https://xenproject.atlassian.ne
On Tue, 2017-03-21 at 17:17 +0800, Zhongze Liu wrote:
:
> > On Tue, 2017-03-21 at 16:43 +0800, Zhongze Liu wrote:
> > >
> Added 2 new config entries in common/Kconfig:
> > > CMDLINE and CMDLINE_OVERRIDE
> > > Modified common/kernel.c:cmdline_parse().
> > >
> > > The 2 new entries enable an em
>>> On 20.03.17 at 19:27, wrote:
> Haozhong Zhang writes ("[PATCH v2 09/12] x86/vmce, tools/libxl: expose LMCE
> capability in guest MSR_IA32_MCG_CAP"):
>> +=head3 x86
>> +
>> +=over 4
>> +
>> +=item B
>> +
>> +(HVM only) Enable MCA capabilities besides default ones enabled
>> +by Xen hypervisor
>>> On 21.03.17 at 09:43, wrote:
> Added 2 new config entries in common/Kconfig:
> CMDLINE and CMDLINE_OVERRIDE
> Modified common/kernel.c:cmdline_parse().
>
> The 2 new entries enable an embedded command line to be compiled
> in the hypervisor. CMDLINE depends on EXPERT = "y", and CMDLINE_OV
Boris Ostrovsky writes:
> On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
>> PVH guests after kexec boot like normal HVM guests and we're not entering
>> xen_prepare_pvh()
>
> Is it not? Aren't we going via xen_hvm_shutdown() and then
> SHUTDOWN_soft_reset which would restart at the same entry po
To measure how many dirty pages a domU creates within a timeframe the
attached tool was created, based on code from xc_domain_save.
Once the domU touches many pages the reported dirty rate is high, but
after a few seconds the rate drops down from thousands to just a few dozen.
I wonder if the usag
>>> On 20.03.17 at 20:27, wrote:
> Signed-off-by: Tamas K Lengyel
> Signed-off-by: Sergej Proskurin
> Acked-by: Jan Beulich
I'll need to make this conditional upon a few more adjustments:
> @@ -4370,18 +4370,19 @@ static int do_altp2m_op(
> goto out;
> }
>
> -if ( (rc = xs
> -Original Message-
> From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
> Sent: 21 March 2017 02:53
> To: xen-devel@lists.xen.org
> Cc: zhiyuan...@intel.com; Paul Durrant ; Jan
> Beulich ; Andrew Cooper
> ; George Dunlap
>
> Subject: [PATCH v9 5/5] x86/ioreq server: Synchronously reset o
This run is configured for baseline tests only.
flight 71024 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71024/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumprun-amd6
On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
> Boris Ostrovsky writes:
>
> > On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
> >> PVH guests after kexec boot like normal HVM guests and we're not entering
> >> xen_prepare_pvh()
> >
> > Is it not? Aren't we going via xen_hvm_sh
>>> On 20.03.17 at 20:03, wrote:
> --- xen.orig/arch/x86/e820.c
> +++ xen/arch/x86/e820.c
> @@ -134,7 +134,7 @@ static struct change_member *change_poin
> static struct e820entry *overlap_list[E820MAX] __initdata;
> static struct e820entry new_bios[E820MAX] __initdata;
>
> -static int __init sa
>>> On 21.03.17 at 06:14, wrote:
> On 20/03/17 20:03, Alex Thorlton wrote:
>> Hey everyone,
>>
>> Recently, I've been working with Boris Ostrovsky to get Xen running on
>> some of our larger systems, and we've run into a few problems with the
>> amount of space that Xen sets aside for the E820 ma
> -Original Message-
> From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
> Sent: 21 March 2017 02:53
> To: xen-devel@lists.xen.org
> Cc: zhiyuan...@intel.com; Paul Durrant ; Jan
> Beulich ; Andrew Cooper
> ; George Dunlap
> ; Jun Nakajima ;
> Kevin Tian
> Subject: [PATCH v9 4/5] x86/ioreq
On Tue, Mar 21, 2017 at 10:01:15AM +, Roger Pau Monne wrote:
> On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
> > Boris Ostrovsky writes:
> >
> > > On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
> > >> PVH guests after kexec boot like normal HVM guests and we're not enteri
>>> On 21.03.17 at 11:01, wrote:
> On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
>> Boris Ostrovsky writes:
>>
>> > On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
>> >> PVH guests after kexec boot like normal HVM guests and we're not entering
>> >> xen_prepare_pvh()
>> >
>>
This run is configured for baseline tests only.
flight 71023 qemu-upstream-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71023/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64
On Mon, 20 Mar 2017 11:18:46 -0700 (PDT)
Stefano Stabellini wrote:
> Hi all,
>
> This patch series implements a new transport for 9pfs, aimed at Xen
> systems.
>
> The transport is based on a traditional Xen frontend and backend drivers
> pair. This patch series implements the backend, which ty
On Tue, Mar 21, 2017 at 04:07:51AM -0600, Jan Beulich wrote:
> >>> On 21.03.17 at 11:01, wrote:
> > On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
> >> Boris Ostrovsky writes:
> >>
> >> > On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
> >> >> PVH guests after kexec boot like
>>> On 21.03.17 at 11:21, wrote:
> On Tue, Mar 21, 2017 at 04:07:51AM -0600, Jan Beulich wrote:
>> >>> On 21.03.17 at 11:01, wrote:
>> > On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
>> >> Boris Ostrovsky writes:
>> >>
>> >> > On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
On Tue, Mar 21, 2017 at 01:56:51AM -0600, Jan Beulich wrote:
> >>> On 20.03.17 at 19:27, wrote:
> > On Fri, Mar 03, 2017 at 10:06:03AM -0700, Jan Beulich wrote:
> >> >>> On 23.02.17 at 12:52, wrote:
> >> > --- a/xen/arch/x86/hvm/vlapic.c
> >> > +++ b/xen/arch/x86/hvm/vlapic.c
> >> > @@ -1120,7 +1
2017-03-21 17:30 GMT+08:00 Dario Faggioli :
> On Tue, 2017-03-21 at 17:17 +0800, Zhongze Liu wrote:
> :
>> > On Tue, 2017-03-21 at 16:43 +0800, Zhongze Liu wrote:
>> > >
>> Added 2 new config entries in common/Kconfig:
>> > > CMDLINE and CMDLINE_OVERRIDE
>> > > Modified common/kernel.c:cmdline_
On Tue, Mar 21, 2017 at 04:42:12AM -0600, Jan Beulich wrote:
> >>> On 21.03.17 at 11:21, wrote:
> > On Tue, Mar 21, 2017 at 04:07:51AM -0600, Jan Beulich wrote:
> >> >>> On 21.03.17 at 11:01, wrote:
> >> > On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
> >> >> Boris Ostrovsky
On 21/03/17 10:42, Jan Beulich wrote:
On 21.03.17 at 11:21, wrote:
>> On Tue, Mar 21, 2017 at 04:07:51AM -0600, Jan Beulich wrote:
>> On 21.03.17 at 11:01, wrote:
On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
> Boris Ostrovsky writes:
>
>> On 03/20/2
2017-03-21 17:37 GMT+08:00 Jan Beulich :
On 21.03.17 at 09:43, wrote:
>> Added 2 new config entries in common/Kconfig:
>> CMDLINE and CMDLINE_OVERRIDE
>> Modified common/kernel.c:cmdline_parse().
>>
>> The 2 new entries enable an embedded command line to be compiled
>> in the hypervisor.
This allows downstreams to set their defaults without modifying the source code
all over the place. Also probably useful for the embedded space.
(See Also: https://xenproject.atlassian.net/browse/XEN-41)
If CMDLINE is set, it will be parsed prior to the bootloader command line.
This order of parsi
On 3/21/2017 6:00 PM, Paul Durrant wrote:
-Original Message-
From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 21 March 2017 02:53
To: xen-devel@lists.xen.org
Cc: zhiyuan...@intel.com; Paul Durrant ; Jan
Beulich ; Andrew Cooper
; George Dunlap
Subject: [PATCH v9 5/5] x86/ioreq s
On 17/03/17 03:05, Boris Ostrovsky wrote:
>
>
> On 03/16/2017 08:18 PM, Ben Hutchings wrote:
>> On Thu, 2017-03-16 at 21:49 +, Andrew Cooper wrote:
>>> On 16/03/2017 21:05, Ben Hutchings wrote:
On Thu, 2017-03-16 at 00:50 +, Ben Hutchings wrote:
> On Wed, 2017-03-15 at 22:24 +,
flight 106799 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106799/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
Roger Pau Monne writes:
> On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
>> Boris Ostrovsky writes:
>>
>> > On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
>> >> PVH guests after kexec boot like normal HVM guests and we're not entering
>> >> xen_prepare_pvh()
>> >
>> > Is it
This run is configured for baseline tests only.
flight 71021 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71021/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 2
On 21/03/17 11:05, Jan Beulich wrote:
On 21.03.17 at 06:14, wrote:
>> On 20/03/17 20:03, Alex Thorlton wrote:
>>> Hey everyone,
>>>
>>> Recently, I've been working with Boris Ostrovsky to get Xen running on
>>> some of our larger systems, and we've run into a few problems with the
>>> amount
On 10/03/17 15:50, Vlad Ioan Topan wrote:
> Adds monitor support for descriptor access events (reads & writes of
> IDTR/GDTR/LDTR/TR) for the x86 architecture (VMX and SVM).
>
> Signed-off-by: Vlad Ioan Topan
How much extra overhead does this typically give? (I am curious, more
than anything els
On Mon, Mar 20, 2017 at 03:18:37PM +, Ian Jackson wrote:
> The variable @changes is eaten during processing. So on db retry,
> there would be changes missing. (When creating a new flight, this
> would often mean a flight with no jobs, which cannot be executed.)
>
> CC: Roger Pau Monné
> Sig
On Tue, Mar 21, 2017 at 12:53:07PM +0100, Vitaly Kuznetsov wrote:
> Roger Pau Monne writes:
>
> > On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
> >> Boris Ostrovsky writes:
> >>
> >> > On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
> >> >> PVH guests after kexec boot like n
On Mon, Mar 20, 2017 at 05:47:32PM +0100, Felix Schmoll wrote:
> #include
> #include
>
> int main(void) {
> xc_interface *xch = xc_interface_open(NULL, NULL, 0);
>
> int ver = xc_version(xch, XENVER_version, NULL);
>
Did this succeed?
> printf("Xen Version %d.%d\n", ver >> 16,
flight 106805 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106805/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5d5a19028a55a1fb42c9e4304fc84108d3206296
baseline version:
ovmf 09da11081915dea25d2d1
On Thu, Mar 16, 2017 at 07:43:57AM -0600, Jan Beulich wrote:
> >>> On 16.03.17 at 14:35, wrote:
> > On Thu, Mar 16, 2017 at 07:12:21AM -0600, Jan Beulich wrote:
> >> >>> On 16.03.17 at 13:12, wrote:
> >> > Everything works. I am not able to reproduce any issues reported by Doug.
> >> > Andrew, Ja
On Tue, Mar 21, 2017 at 01:01:44PM +0100, Juergen Gross wrote:
> On 21/03/17 11:05, Jan Beulich wrote:
> On 21.03.17 at 06:14, wrote:
> >> On 20/03/17 20:03, Alex Thorlton wrote:
> >>> Hey everyone,
> >>>
> >>> Recently, I've been working with Boris Ostrovsky to get Xen running on
> >>> some
This patch series is the first part for adding support of large EFI
memory maps (> the current limit of 128 entries) while reducing
trampoline size.
I'm not posting the final patch for making the trampoline size
reduction effective in order not to add major rebase work to Daniel's
multiboot2 serie
Use a larger e820 map buffer for non-BIOS memory map sources. This
requires to have different defines for the maximum number of E820 map
entries for the raw BIOS buffer and the later used struct e820map.
While at it use e820.h in mem.S in order to avoid having to define the
buffer size at two plac
Instead of using the E820 raw buffer for BIOS, EFI and multiboot based
memory map information use it for the BIOS interface only. This will
enable us to support more E820 entries than the limited trampoline
located buffer can.
Add a new raw e820 table for common purpose and copy the BIOS buffer
to
The hypervisor needs a trampoline in low memory for early boot and
later for bringing up cpus and during wakeup from suspend. Today this
trampoline is kept completely even if most of it isn't needed later.
Split the trampoline into a permanent part and a temporary part needed
at early boot only. I
. snip..
> support to pass-through large bar (pci-e bar > 4G) device..
Yes it does work.
>
> > I was assuming large BAR handling to work so far
> >(Konrad had done some adjustments there quite a while ago, from all I
> >recall).
> >
>
>
> _iirc_ what Konrad mentioned was using qemu-trad..
Ye
> -Original Message-
> From: Konrad Rzeszutek Wilk
> Sent: Tuesday, March 21, 2017 08:19 AM
> To: Xuquan (Quan Xu); Venu Busireddy
> Cc: Jan Beulich; anthony.per...@citrix.com; george.dun...@eu.citrix.com;
> ian.jack...@eu.citrix.com; Fanhenglong; Kevin Tian; StefanoStabellini;
> xen-deve
On Tue, Mar 21, 2017 at 02:10:20PM +0100, Juergen Gross wrote:
> This patch series is the first part for adding support of large EFI
> memory maps (> the current limit of 128 entries) while reducing
> trampoline size.
>
> I'm not posting the final patch for making the trampoline size
> reduction ef
Hi Julien,
On 26 February 2017 at 22:37, Julien Grall wrote:
>> +
>> +#include
>
>
> xen/config.h is included by default. Please drop it.
Removed.
>
>> +#include
>> +#include
>> +#include
>> +#include
>> +#include
>> +#include
>
>
> Why do you need to include monitor.h?
>
>> +#include
>>
On Mon, Mar 20, 2017 at 06:45:18AM +, Wei Chen wrote:
> Hi Konrad,
>
> On 2017/3/17 22:34, Konrad Rzeszutek Wilk wrote:
> > On Thu, Mar 16, 2017 at 05:53:38PM +0800, Wei Chen wrote:
> >> This patch is based on the implementation of ARM64, it introduces
> >> alternative runtime patching to ARM3
>>> On 21.03.17 at 11:52, wrote:
> On Tue, Mar 21, 2017 at 01:56:51AM -0600, Jan Beulich wrote:
>> >>> On 20.03.17 at 19:27, wrote:
>> > On Fri, Mar 03, 2017 at 10:06:03AM -0700, Jan Beulich wrote:
>> >> >>> On 23.02.17 at 12:52, wrote:
>> >> > @@ -91,13 +92,16 @@ static int pt_irq_vector(struct
>>> On 21.03.17 at 14:05, wrote:
> On Thu, Mar 16, 2017 at 07:43:57AM -0600, Jan Beulich wrote:
>> >>> On 16.03.17 at 14:35, wrote:
>> > On Thu, Mar 16, 2017 at 07:12:21AM -0600, Jan Beulich wrote:
>> >> >>> On 16.03.17 at 13:12, wrote:
>> >> > Everything works. I am not able to reproduce any is
> -Original Message-
[snip]
> >> +if ( (first_gfn > 0) || (data->flags == 0 && rc == 0) )
> >> +{
> >> +struct p2m_domain *p2m = p2m_get_hostp2m(d);
> >> +
> >> +while ( read_atomic(&p2m->ioreq.entry_count) &&
> >> +first_gfn <= p2
From: Jennifer Herbert
This new lib devicemodel call allows multiple extents of pages to be
marked as modified in a single call. This is something needed for a
usecase I'm working on.
The xen side of the modified_memory call has been modified to accept
an array of extents. The devicemodle libr
On 03/21/2017 08:13 AM, Roger Pau Monne wrote:
> On Tue, Mar 21, 2017 at 12:53:07PM +0100, Vitaly Kuznetsov wrote:
>> Roger Pau Monne writes:
>>
>>> On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
Boris Ostrovsky writes:
> On 03/20/2017 02:20 PM, Vitaly Kuznetsov w
On Tue, Mar 21, 2017 at 07:45:13AM -0600, Jan Beulich wrote:
> >>> On 21.03.17 at 11:52, wrote:
> > On Tue, Mar 21, 2017 at 01:56:51AM -0600, Jan Beulich wrote:
> >> >>> On 20.03.17 at 19:27, wrote:
> >> > On Fri, Mar 03, 2017 at 10:06:03AM -0700, Jan Beulich wrote:
> >> >> >>> On 23.02.17 at 12:
>>> On 21.03.17 at 14:59, wrote:
> On Tue, Mar 21, 2017 at 07:45:13AM -0600, Jan Beulich wrote:
>> >>> On 21.03.17 at 11:52, wrote:
>> > On Tue, Mar 21, 2017 at 01:56:51AM -0600, Jan Beulich wrote:
>> >> >>> On 20.03.17 at 19:27, wrote:
>> >> > On Fri, Mar 03, 2017 at 10:06:03AM -0700, Jan Beuli
Hi!
> -ENTRY(saved_rbp) .quad 0
> -ENTRY(saved_rsi) .quad 0
> -ENTRY(saved_rdi) .quad 0
> -ENTRY(saved_rbx) .quad 0
> +SYM_DATA_START(saved_rbp).quad 0
> +SYM_DATA_START(saved_rsi).quad 0
> +SYM_DATA_START(saved_rdi).quad 0
> +SYM_D
On Tue, Mar 21, 2017 at 10:05:27AM -0400, Boris Ostrovsky wrote:
> On 03/21/2017 08:13 AM, Roger Pau Monne wrote:
> > On Tue, Mar 21, 2017 at 12:53:07PM +0100, Vitaly Kuznetsov wrote:
> >> Roger Pau Monne writes:
> >>> On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
> >> I didn't
On 3/21/2017 9:49 PM, Paul Durrant wrote:
-Original Message-
[snip]
+if ( (first_gfn > 0) || (data->flags == 0 && rc == 0) )
+{
+struct p2m_domain *p2m = p2m_get_hostp2m(d);
+
+while ( read_atomic(&p2m->ioreq.entry_count) &&
+
>>> On 21.03.17 at 12:18, wrote:
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -237,4 +237,26 @@ config FAST_SYMBOL_LOOKUP
> The only user of this is Live patching.
>
> If unsure, say Y.
> +
> +config CMDLINE
> + string "Built-in hypervisor command string"
> +
Boris Ostrovsky writes:
> On 03/21/2017 08:13 AM, Roger Pau Monne wrote:
>> On Tue, Mar 21, 2017 at 12:53:07PM +0100, Vitaly Kuznetsov wrote:
>>> Roger Pau Monne writes:
>>>
On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
> Boris Ostrovsky writes:
>
>> On 03/2
Vitaly Kuznetsov writes:
> Roger Pau Monne writes:
>
>> On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
>>> Boris Ostrovsky writes:
>>>
>>> > On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
>>> >> PVH guests after kexec boot like normal HVM guests and we're not entering
>>> >
On Mon, Mar 20, 2017 at 01:32:15PM +0100, Jiri Slaby wrote:
> ENTRY(ftrace_caller)
> /* save_mcount_regs fills in first two parameters */
> @@ -184,11 +184,12 @@ GLOBAL(ftrace_epilogue)
> GLOBAL(ftrace_graph_call)
> jmp ftrace_stub
> #endif
> +SYM_FUNC_END(ftrace_caller)
>
> /* Th
2017-03-21 22:27 GMT+08:00 Jan Beulich :
On 21.03.17 at 12:18, wrote:
>> --- a/xen/common/Kconfig
>> +++ b/xen/common/Kconfig
>> @@ -237,4 +237,26 @@ config FAST_SYMBOL_LOOKUP
>> The only user of this is Live patching.
>>
>> If unsure, say Y.
>> +
>> +config CMDLINE
>> + s
On 03/21/2017 10:16 AM, Roger Pau Monne wrote:
> On Tue, Mar 21, 2017 at 10:05:27AM -0400, Boris Ostrovsky wrote:
>> On 03/21/2017 08:13 AM, Roger Pau Monne wrote:
>>> On Tue, Mar 21, 2017 at 12:53:07PM +0100, Vitaly Kuznetsov wrote:
Roger Pau Monne writes:
> On Tue, Mar 21, 2017 at 10:21
>>> On 19.03.17 at 14:41, wrote:
> @@ -1908,7 +1908,7 @@ long do_tmem_op(tmem_cli_op_t uops)
> /* Acquire write lock for all commands at first. */
> write_lock(&tmem_rwlock);
>
> -if ( op.cmd == TMEM_CONTROL )
> +if ( op.cmd == TMEM_CONTROL || op.cmd == TMEM_RESTORE_NEW )
May
On 03/21/2017 10:44 AM, Vitaly Kuznetsov wrote:
> Vitaly Kuznetsov writes:
>
>> Roger Pau Monne writes:
>>
>>> On Tue, Mar 21, 2017 at 10:21:52AM +0100, Vitaly Kuznetsov wrote:
Boris Ostrovsky writes:
> On 03/20/2017 02:20 PM, Vitaly Kuznetsov wrote:
>> PVH guests after kexec b
>>> On 19.03.17 at 14:41, wrote:
> --- a/xen/include/public/sysctl.h
> +++ b/xen/include/public/sysctl.h
> @@ -772,6 +772,7 @@ DEFINE_XEN_GUEST_HANDLE(xen_sysctl_psr_cat_op_t);
> #define XEN_SYSCTL_TMEM_OP_QUERY_FREEABLE_MB 8
> #define XEN_SYSCTL_TMEM_OP_SET_POOLS 9
> #define
>>> On 19.03.17 at 14:41, wrote:
> Having an off by default option allowing guests to join
> _any_ shared pool is not very secure.
>
> Lets eliminate tmem_shared_auth bootup option (which
> was disabled by default) and have the code force this by default.
>
> Signed-off-by: Konrad Rzeszutek Wilk
>>> On 21.03.17 at 15:56, wrote:
> 2017-03-21 22:27 GMT+08:00 Jan Beulich :
> On 21.03.17 at 12:18, wrote:
>>> --- a/xen/common/Kconfig
>>> +++ b/xen/common/Kconfig
>>> @@ -237,4 +237,26 @@ config FAST_SYMBOL_LOOKUP
>>> The only user of this is Live patching.
>>>
>>> If unsure
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 21 March 2017 15:27
> To: Paul Durrant
> Cc: Andrew Cooper ; xen-
> de...@lists.xenproject.org
> Subject: Re: [PATCH v2 1/6] x86/viridian: fix xen-hvmcrash when vp_assist
> page is present
>
> >>> On 20.03.17 at 1
>>> On 20.03.17 at 18:08, wrote:
> The numbers correspond to ASCII characters so just use appropriate
> character strings directly.
>
> Signed-off-by: Paul Durrant
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https:/
>>> On 20.03.17 at 18:08, wrote:
> --- a/xen/arch/x86/hvm/viridian.c
> +++ b/xen/arch/x86/hvm/viridian.c
> @@ -106,6 +106,21 @@ typedef struct {
> #define CPUID6A_MSR_BITMAPS (1 << 1)
> #define CPUID6A_NESTED_PAGING (1 << 3)
>
> +/*
> + * Version and build number reported by CPUID leaf 2
1 - 100 of 195 matches
Mail list logo