From: Andrii Anisov
Signed-off-by: Andrii Anisov
---
xen/common/perfc.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/xen/common/perfc.c b/xen/common/perfc.c
index 0675677..0abd977 100644
--- a/xen/common/perfc.c
+++ b/xen/common/perfc.c
@@ -33,8 +33,7 @@ void perfc_prin
Hi, Hans!
On 09/10/2018 03:26 PM, Hans Verkuil wrote:
On 09/10/2018 01:49 PM, Oleksandr Andrushchenko wrote:
On 09/10/2018 02:09 PM, Hans Verkuil wrote:
On 09/10/2018 11:52 AM, Oleksandr Andrushchenko wrote:
On 09/10/2018 12:04 PM, Hans Verkuil wrote:
On 09/10/2018 10:24 AM, Oleksandr Andrus
flight 127474 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127474/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 7 xen-boot fail REGR. vs. 127443
test-amd64-i386-xl-q
flight 127483 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127483/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8e2018f944ed18400f468fd9380284d665535481
baseline version:
ovmf f4eaaf1a6d50c761e2af9
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-qemuu-nested-amd
testid debian-hvm-install
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen
This run is configured for baseline tests only.
flight 75193 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75193/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
flight 127472 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127472/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 16 guest-localmigrate/x10
fail REGR. vs. 12729
The backtrace of the BUG is quite similar to a hang I encountered:
https://lists.xenproject.org/archives/html/xen-devel/2018-09/msg00454.html
No sure if they are related.
Dongli Zhang
On 09/10/2018 08:37 PM, Olaf Hering wrote:
> While preparing another variant of the fix for the bug in
> disab
On 09/10/2018 11:02 AM, Jan Beulich wrote:
> Use EFLAGS.IF for most ordinary purposes; there's in particular no need
> to unduly defer NMI/#MC. Clear GIF only immediately before VMRUN itself.
> This has the additional advantage that svm_stgi_label now indeed marks
> the only place where GIF gets se
On 09/10/2018 10:03 AM, Jan Beulich wrote:
> Having noticed that VMLOAD alone is about as fast as a single of the
> involved WRMSRs, I thought it might be a reasonable idea to also use it
> for PV. Measurements, however, have shown that an actual improvement can
> be achieved only with an early pre
On Fri, Aug 24, 2018 at 3:16 AM Dario Faggioli wrote:
>
> On Wed, 2018-08-15 at 14:17 +0100, Andrew Cooper wrote:
> > Hello,
> >
> > Now that the embargo on XSA-273 is up, we can start publicly
> > discussing
> > the remaining work do, because there is plenty to do. In no
> > particular
> > order
On Mon, Sep 10, 2018 at 07:04:49PM +0100, Lars Kurth wrote:
> See
> https://wiki.xenproject.org/wiki/Xen_Project_Software_Overview_v2
> and https://wiki.xenproject.org/wiki/Booting_Overview
> I'd appreciate a look and feedback.
On Booting_Overview, the diagram for pvgrub is wrong - kernel+initra
flight 127470 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127470/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f4eaaf1a6d50c761e2af9a6dd0976fb8a3bd3c08
baseline version:
ovmf 4b2dc555d8a67e715d8fa
flight 127475 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127475/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
freebsd 4e22ee3754200e9ce86c4820d484dfeb94041c56
baseline version:
freebsd 7b6d891a9f0
flight 127464 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127464/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 16 guest-localmigrate/x10 fail
in 127453 pass in 127464
test-amd64
Hi,
On 10.09.18 18:34, Julien Grall wrote:
Hi Volodymyr,
On 03/09/18 17:54, Volodymyr Babchuk wrote:
OP-TEE can issue multiple RPC requests. We are interested mostly in
request that asks NW to allocate/free shared memory for OP-TEE
needs, becuase mediator need to do address translation in the
See
https://wiki.xenproject.org/wiki/Xen_Project_Software_Overview_v2
and https://wiki.xenproject.org/wiki/Booting_Overview
I'd appreciate a look and feedback. Once in order I will replace
https://wiki.xenproject.org/wiki/Xen_Project_Software_Overview
with https://wiki.xenproject.org/wiki/Xen_Proj
Hi,
On 10.09.18 17:02, Julien Grall wrote:
Hi,
On 03/09/18 17:54, Volodymyr Babchuk wrote:
Shared memory is widely used by NW to communicate with
TAs in OP-TEE. NW can share part of own memory with
TA or OP-TEE core, by registering it OP-TEE, or by providing
a temporal refernce. Anyways, infor
On 10/09/18 14:29, Jan Beulich wrote:
On 10.09.18 at 15:21, wrote:
> On 31.08.18 at 10:43, wrote:
>> On 31.08.18 at 10:29, wrote:
--- a/xen/Kconfig.debug
+++ b/xen/Kconfig.debug
@@ -11,6 +11,13 @@ config DEBUG
You probably want to say 'N' here.
Hi Julien,
On 10.09.18 16:01, Julien Grall wrote:
Hi Volodymyr,
On 03/09/18 17:54, Volodymyr Babchuk wrote:
OP-TEE usually uses the same idea with command buffers (see
previous commit) to issue RPC requests. Problem is that initially
it has no buffer, where it can write request. So the first R
Hi Julien,
On 05.09.18 18:17, Julien Grall wrote:
Hi,
On 09/03/2018 05:54 PM, Volodymyr Babchuk wrote:
Main way to communicate with OP-TEE is to issue standard SMCCC
NIT: The main way
call. "Standard" is a SMCCC term and it means that call can be
interrupted and OP-TEE can return control t
flight 127463 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127463/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xen-freebsd broken
build-amd64-xen-free
On 9/10/2018 5:52 AM, Pasi Kärkkäinen wrote:
Hi,
On Sun, Sep 09, 2018 at 10:33:02PM -0400, Sinan Kaya wrote:
On 9/9/2018 2:59 PM, Pasi Kärkkäinen wrote:
I noticed pcie_has_flr() has been recently exported in upstream Linux:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/com
From: Andrii Anisov
Make xentrace_format more convinient and up to date in usage.
Andrii Anisov (5):
xentrace_format: print timestamps in nanoseconds
xentrace_format: switch mhz option to float
xentrace_format: combine 64-bit LE values from traces
formats: allign trace record format to t
From: Andrii Anisov
Signed-off-by: Andrii Anisov
---
tools/xentrace/xentrace_format | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/tools/xentrace/xentrace_format b/tools/xentrace/xentrace_format
index 5ff85ae..323d0c2 100644
--- a/tools/xentrace/xentrace_format
+++
From: Andrii Anisov
Allign rtds:repl_budget trace record format to the current code.
Signed-off-by: Andrii Anisov
---
tools/xentrace/formats | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/xentrace/formats b/tools/xentrace/formats
index d6e7e3f..7db6d49 100644
--- a/t
From: Andrii Anisov
In order to be able to print possible 64bit LE values from
trace records, precombine possible variants.
Signed-off-by: Andrii Anisov
---
tools/xentrace/xentrace_format | 23 +++
1 file changed, 19 insertions(+), 4 deletions(-)
diff --git a/tools/xentrac
From: Andrii Anisov
For convinience, print RTDS budget and deadline values as decimals.
Signed-off-by: Andrii Anisov
---
tools/xentrace/formats | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/tools/xentrace/formats b/tools/xentrace/formats
index 7db6d49..cf25ab0 10064
From: Andrii Anisov
In some systems fraction of the MHz might be a meaningful part
of the cycles frequency value. So accept MHz value as float.
Signed-off-by: Andrii Anisov
---
tools/xentrace/xentrace_format | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/tools/xentra
On Mon, Jul 16, 2018 at 5:39 AM Jan Beulich wrote:
> >>> On 13.07.18 at 20:54, wrote:
> > Hello,
> >
> > I'm currently testing last Xen 4.8.4 build for CentOS
> > (http://cbs.centos.org/koji/buildinfo?buildID=23169) and disabling
> > XPTI for dom0 doesn't seem to work:
> >
> > (XEN) Command line
On Mon, Sep 10, 2018 at 05:00:58PM +0200, Roger Pau Monné wrote:
> I can try to take a look at this and attempt to make sure the state is
> only changed to closed in blkback _after_ the device has been
> released, but it might take me a couple of days to get you a patch.
Thanks, I have two test no
Am Fri, 7 Sep 2018 12:56:37 -0400
schrieb Boris Ostrovsky :
> I was hoping you'd respond to my question about warning.
>
> root@haswell> xl vcpu-set 3 0
> and in the guest
>
> [root@vm-0238 ~]# [ 32.866955] [ cut here ]
> [ 32.866963] spinlock on CPU0 exists on IRQ1
Hi Volodymyr,
On 03/09/18 17:54, Volodymyr Babchuk wrote:
OP-TEE can issue multiple RPC requests. We are interested mostly in
request that asks NW to allocate/free shared memory for OP-TEE
needs, becuase mediator need to do address translation in the same
s/becuase/because/
s/need/needs/
the
Am Mon, 10 Sep 2018 14:49:07 +0200
schrieb Olaf Hering :
> After reboot I tried to start my HVM domU, this is what I get in dom0:
> [ 223.019451] page:ea007bed9040 count:1 mapcount:-1
> mapping: index:0x0
this also happens with rc2 and xen.git#staging as dom0. v4.18 works.
Use EFLAGS.IF for most ordinary purposes; there's in particular no need
to unduly defer NMI/#MC. Clear GIF only immediately before VMRUN itself.
This has the additional advantage that svm_stgi_label now indeed marks
the only place where GIF gets set.
Note regarding the main STI placement: Quite co
On Mon, Sep 10, 2018 at 03:22:52PM +0200, Valentin Vidic wrote:
> On Mon, Sep 10, 2018 at 02:45:31PM +0200, Lars Ellenberg wrote:
> > On Sat, Sep 08, 2018 at 09:34:32AM +0200, Valentin Vidic wrote:
> > > On Fri, Sep 07, 2018 at 07:14:59PM +0200, Valentin Vidic wrote:
> > > > In fact the first one i
On Wed, Mar 07, 2018 at 06:58:35PM +, Andrew Cooper wrote:
> Dispatch from the guest_{rd,wr}msr() functions. The read side should be safe
> outside of current context, but the write side is definitely not. As the
> toolstack has no legitimate reason to access the APIC registers via this
> int
On Wed, Mar 07, 2018 at 06:58:34PM +, Andrew Cooper wrote:
> We currently have MSR_IA32_APICBASE and MSR_IA32_APICBASE_MSR which are
> synonymous from a naming point of view, but refer to very different things.
>
> Rename the x2APIC MSRs to MSR_X2APIC_*, which are shorter constants and
> visua
This run is configured for baseline tests only.
flight 75190 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75190/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
On Fri, Sep 07, 2018 at 07:13:08PM +0100, Andrew Cooper wrote:
> On 07/09/18 17:01, Roger Pau Monné wrote:
> > On Wed, Sep 05, 2018 at 07:12:01PM +0100, Andrew Cooper wrote:
> >> There are holes in the HVM_PARAM space, some of which are from deprecated
> >> parameters, but toolstack and device mode
This patch is aimed on using the new save_one fuctions in the hvm_save
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V17:
- Remove double ;
- Move struct vcpu *v to reduce scope
- Remove stray lines.
---
xen/arch/x86/hvm/save.c | 26
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Change handler name from hvm_save_one_handler to
hvm_save_vcpu_handler.
---
xen/arch/x86/cpu/mcheck/vmce.c | 1 +
xen/arch/x86/emul-i8254.c | 2 +-
xen/arch/x86/hvm/hpet.c| 2 +-
xen/arch/x86
This patch is focused on moving changing hvm_save_one() to save one
typecode from one vcpu and now that the save functions get data from a
single vcpu we can pause the specific vcpu instead of the domain.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V19:
-
This patch removes the redundant save functions and renames the
save_one* to save. It then changes the domain param to vcpu in the
save funcs and adapts print messages in order to match the format of the
other save related messages.
Signed-off-by: Alexandru Isaila
---
Changes since V19:
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Paul Durrant
---
Changes since V14:
- Moved all the operations in the initializer.
---
xen/arch/x86/hvm/viridian.c | 30 +++---
1 file changed, 19 insertions(+), 11 de
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V13:
- Moved tsc_adjust to the initializer.
---
xen/arch/x86/hvm/hvm.c | 13 ++---
1 file changed, 10 insertions(+), 3 deletions(-)
diff --git a/xen/arc
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V11:
- Removed the memset and added init with {}.
---
xen/arch/x86/cpu/mcheck/vmce.c | 21 +
1 file changed, 13 insertions(+), 8 deletions(-)
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Paul Durrant
Reviewed-by: Jan Beulich
---
Changes since V14:
- Remove err init
- Add blank line ahead of return.
---
xen/arch/x86/hvm/hvm.c | 106 +++-
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila i
Reviewed-by: Jan Beulich
---
Changes since v16:
- Address style comments.
---
xen/arch/x86/hvm/mtrr.c | 80 ++---
1 file changed, 43 insertions(+), 37 deletions(-)
di
Hi all,
This patch series addresses the ideea of saving data from a single vcpu
instance.
First it starts by adding *save_one functions, then it introduces a handler for
the
new save_one* funcs and makes use of it in the hvm_save and hvm_save_one funcs.
The final patches are used for clean up an
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Move all free fields to the initializer
- Add blank line to before the return
- Move v->pause_flags check to the save_one function.
---
xe
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Remove err init
- Add blank line ahead of return
- Move xsave_enabled() check to the save_one func.
---
xen/arch/x86/hvm/hvm.c | 47 ++
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since v15:
- Drop struct vlapic *s.
---
xen/arch/x86/hvm/vlapic.c | 20
1 file changed, 12 insertions(+), 8 deletions(-)
diff --git a/xen/arch/x8
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since v15:
- Drop struct vlapic *s.
---
xen/arch/x86/hvm/vlapic.c | 26 +++---
1 file changed, 15 insertions(+), 11 deletions(-)
diff --git a/xen/
flight 127458 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127458/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 10 debian-hvm-install
fail REGR. vs. 125898
>>> On 10.09.18 at 15:54, wrote:
> On Mon, 2018-09-10 at 07:42 -0600, Jan Beulich wrote:
>> > > > On 10.09.18 at 15:33, wrote:
>> >
>> > On Mon, 2018-09-10 at 15:36 +0300, Alexandru Isaila wrote:
>> > > This patch removes the redundant save functions and renames the
>> > > save_one* to save. It
Having noticed that VMLOAD alone is about as fast as a single of the
involved WRMSRs, I thought it might be a reasonable idea to also use it
for PV. Measurements, however, have shown that an actual improvement can
be achieved only with an early prefetch of the VMCB (thanks to Andrew
for suggesting
Hi,
On 03/09/18 17:54, Volodymyr Babchuk wrote:
Shared memory is widely used by NW to communicate with
TAs in OP-TEE. NW can share part of own memory with
TA or OP-TEE core, by registering it OP-TEE, or by providing
a temporal refernce. Anyways, information about such memory
buffers are sent to
On Fri, Sep 07, 2018 at 07:23:43PM +0200, Andreas Kinzler wrote:
> Hello Roger,
>
> in August 2017, I reported a problem with PCI passthrough and MSI interrupts
> (https://lists.xenproject.org/archives/html/xen-devel/2017-08/msg01433.html).
>
> That report lead to some patches for Xen and qemu.
>
Rather than unconditionally using vCPU 0, use the current vCPU if the
subject domain is the current one.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -858,7 +858,7 @@ void pagetable_dying(struct domain *d, p
ASSERT(paging_mode_shadow(d));
-
That earlier change introduced two "else switch ()" constructs which now
get converted back to "normal" style (indentation). To limit indentation
depth, a conditional gets inverted in ptwr_emulated_update().
No functional change intended.
Requested-by: Andrew Cooper
Signed-off-by: Jan Beulich
Real hardware wraps silently in most cases, so we should behave the
same. Also split real and VM86 mode handling, as the latter really
ought to have limit checks applied.
Signed-off-by: Jan Beulich
---
v4: Re-base.
v3: Restore 32-bit wrap check for AMD.
v2: Extend to non-64-bit modes. Reduce 64-b
For one it is quite pointless to iterate over all pIRQ-s the domain has
when just one is being adjusted. Introduce hvm_migrate_pirq().
Additionally it is bogus to migrate the pIRQ to a vCPU different from
the one the event is supposed to be posted to - if anything, it might be
worth considering no
On Mon, 2018-09-10 at 07:42 -0600, Jan Beulich wrote:
> > > > On 10.09.18 at 15:33, wrote:
> >
> > On Mon, 2018-09-10 at 15:36 +0300, Alexandru Isaila wrote:
> > > This patch removes the redundant save functions and renames the
> > > save_one* to save. It then changes the domain param to vcpu in
On 2018/9/10 17:52, Juergen Gross wrote:
> On 08/09/18 16:18, zhong jiang wrote:
>> kfree has taken null pointer into account. So just remove the
>> condition check before kfree.
>>
>> Signed-off-by: zhong jiang
>> ---
>> drivers/xen/xen-acpi-processor.c | 2 +-
>> 1 file changed, 1 insertion(+),
>>> On 10.09.18 at 15:33, wrote:
> On Mon, 2018-09-10 at 15:36 +0300, Alexandru Isaila wrote:
>> This patch removes the redundant save functions and renames the
>> save_one* to save. It then changes the domain param to vcpu in the
>> save funcs and adapts print messages in order to match the forma
>>> On 10.09.18 at 15:29, wrote:
> On Mon, 2018-09-10 at 07:25 -0600, Jan Beulich wrote:
>> > > > On 10.09.18 at 14:36, wrote:
>> >
>> > --- a/xen/arch/x86/hvm/save.c
>> > +++ b/xen/arch/x86/hvm/save.c
>> > @@ -155,6 +155,11 @@ int hvm_save_one(struct domain *d, unsigned
>> > int typecode, unsig
On Mon, 2018-09-10 at 15:36 +0300, Alexandru Isaila wrote:
> This patch removes the redundant save functions and renames the
> save_one* to save. It then changes the domain param to vcpu in the
> save funcs and adapts print messages in order to match the format of
> the
> other save related message
On Mon, 2018-09-10 at 07:25 -0600, Jan Beulich wrote:
> > > > On 10.09.18 at 14:36, wrote:
> >
> > --- a/xen/arch/x86/hvm/save.c
> > +++ b/xen/arch/x86/hvm/save.c
> > @@ -155,6 +155,11 @@ int hvm_save_one(struct domain *d, unsigned
> > int typecode, unsigned int instance,
> > if ( !ctxt.data
>>> On 10.09.18 at 15:21, wrote:
On 31.08.18 at 10:43, wrote:
> On 31.08.18 at 10:29, wrote:
>>> --- a/xen/Kconfig.debug
>>> +++ b/xen/Kconfig.debug
>>> @@ -11,6 +11,13 @@ config DEBUG
>>>
>>> You probably want to say 'N' here.
>>>
>>> +config DEBUG_INFO
>>> + bool "Compile
>>> On 10.09.18 at 14:36, wrote:
> --- a/xen/arch/x86/hvm/save.c
> +++ b/xen/arch/x86/hvm/save.c
> @@ -155,6 +155,11 @@ int hvm_save_one(struct domain *d, unsigned int
> typecode, unsigned int instance,
> if ( !ctxt.data )
> return -ENOMEM;
>
> +if ( hvm_sr_handlers[typecode].
On Mon, Sep 10, 2018 at 02:45:31PM +0200, Lars Ellenberg wrote:
> On Sat, Sep 08, 2018 at 09:34:32AM +0200, Valentin Vidic wrote:
> > On Fri, Sep 07, 2018 at 07:14:59PM +0200, Valentin Vidic wrote:
> > > In fact the first one is the original code path before I modified
> > > blkback. The problem i
Hi Oleksandr,
Thank you for the patch.
On Tuesday, 31 July 2018 12:31:41 EEST Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Hello!
>
> At the moment Xen [1] already supports some virtual multimedia
> features [2] such as virtual display, sound. It supports keyboards,
> poi
>>> On 31.08.18 at 10:43, wrote:
On 31.08.18 at 10:29, wrote:
>> --- a/xen/Kconfig.debug
>> +++ b/xen/Kconfig.debug
>> @@ -11,6 +11,13 @@ config DEBUG
>>
>>You probably want to say 'N' here.
>>
>> +config DEBUG_INFO
>> +bool "Compile Xen with debug info"
>> +default y
>>
To make Xen works functionally on Hygon platforms, reuse AMD's Xen
support code path for Hygon Dhyana CPU.
There are six core performance events counters per thread, so there are
six MSRs for these counters(0-5). Also there are four legacy PMC MSRs,
they are alias of the counters(0-3).
In this ve
On 09/10/2018 03:26 PM, Hans Verkuil wrote:
On 09/10/2018 01:49 PM, Oleksandr Andrushchenko wrote:
On 09/10/2018 02:09 PM, Hans Verkuil wrote:
On 09/10/2018 11:52 AM, Oleksandr Andrushchenko wrote:
On 09/10/2018 12:04 PM, Hans Verkuil wrote:
On 09/10/2018 10:24 AM, Oleksandr Andrushchenko wro
As a new x86 CPU Vendor, Chengdu Haiguang IC Design Co., Ltd (Hygon)
is a Joint Venture between AMD and Haiguang Information Technology Co.,
Ltd., and aims at providing high performance x86 processor for China
server market.
The first generation Hygon's processor(Dhyana) originates from AMD
techno
flight 127467 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127467/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt6 libvirt-buildfail REGR. vs. 123814
build-amd64-libvirt
Hi, Laurent!
On 09/10/2018 03:48 PM, Laurent Pinchart wrote:
Hi Oleksandr,
Thank you for the patch.
On Tuesday, 31 July 2018 12:31:41 EEST Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Hello!
At the moment Xen [1] already supports some virtual multimedia
features [2] such as
Hi Volodymyr,
On 03/09/18 17:54, Volodymyr Babchuk wrote:
OP-TEE usually uses the same idea with command buffers (see
previous commit) to issue RPC requests. Problem is that initially
it has no buffer, where it can write request. So the first RPC
request it makes is special: it requests NW to al
After reboot I tried to start my HVM domU, this is what I get in dom0:
Welcome to SUSE Linux Enterprise Server 12 SP2 (x86_64) - Kernel
4.19.321-default-bug1106594 (hvc0).
stein-schneider login: (XEN) HVM1 save: CPU
(XEN) HVM1 save: PIC
(XEN) HVM1 save: IOAPIC
(XEN) HVM1 save: LAPIC
(XEN) HV
On Sat, Sep 08, 2018 at 09:34:32AM +0200, Valentin Vidic wrote:
> On Fri, Sep 07, 2018 at 07:14:59PM +0200, Valentin Vidic wrote:
> > In fact the first one is the original code path before I modified
> > blkback. The problem is it gets executed async from workqueue so
> > it might not always run b
This patch is focused on moving changing hvm_save_one() to save one
typecode from one vcpu and now that the save functions get data from a
single vcpu we can pause the specific vcpu instead of the domain.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V15:
-
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Paul Durrant
Reviewed-by: Jan Beulich
---
Changes since V14:
- Remove err init
- Add blank line ahead of return.
---
xen/arch/x86/hvm/hvm.c | 106 +++-
This patch removes the redundant save functions and renames the
save_one* to save. It then changes the domain param to vcpu in the
save funcs and adapts print messages in order to match the format of the
other save related messages.
Signed-off-by: Alexandru Isaila
---
Changes since V18:
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Paul Durrant
---
Changes since V14:
- Moved all the operations in the initializer.
---
xen/arch/x86/hvm/viridian.c | 30 +++---
1 file changed, 19 insertions(+), 11 de
While preparing another variant of the fix for the bug in disable_hotplug_cpu,
this crash happend for me while starting my HVM domU a second time. dom0 runs
Xen 4.7.6.
I guess it crashed while it did shutdown the domU running a xenlinux based
kernel.
Olaf
[ 8114.320383] BUG: unable to handle k
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V13:
- Moved tsc_adjust to the initializer.
---
xen/arch/x86/hvm/hvm.c | 13 ++---
1 file changed, 10 insertions(+), 3 deletions(-)
diff --git a/xen/arc
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila i
Reviewed-by: Jan Beulich
---
Changes since v16:
- Address style comments.
---
xen/arch/x86/hvm/mtrr.c | 80 ++---
1 file changed, 43 insertions(+), 37 deletions(-)
di
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V11:
- Removed the memset and added init with {}.
---
xen/arch/x86/cpu/mcheck/vmce.c | 21 +
1 file changed, 13 insertions(+), 8 deletions(-)
This patch is aimed on using the new save_one fuctions in the hvm_save
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V17:
- Remove double ;
- Move struct vcpu *v to reduce scope
- Remove stray lines.
---
xen/arch/x86/hvm/save.c | 26
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since v15:
- Drop struct vlapic *s.
---
xen/arch/x86/hvm/vlapic.c | 26 +++---
1 file changed, 15 insertions(+), 11 deletions(-)
diff --git a/xen/
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Change handler name from hvm_save_one_handler to
hvm_save_vcpu_handler.
---
xen/arch/x86/cpu/mcheck/vmce.c | 1 +
xen/arch/x86/emul-i8254.c | 2 +-
xen/arch/x86/hvm/hpet.c| 2 +-
xen/arch/x86
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Move all free fields to the initializer
- Add blank line to before the return
- Move v->pause_flags check to the save_one function.
---
xe
Hi all,
This patch series addresses the ideea of saving data from a single vcpu
instance.
First it starts by adding *save_one functions, then it introduces a handler for
the
new save_one* funcs and makes use of it in the hvm_save and hvm_save_one funcs.
The final patches are used for clean up an
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since v15:
- Drop struct vlapic *s.
---
xen/arch/x86/hvm/vlapic.c | 20
1 file changed, 12 insertions(+), 8 deletions(-)
diff --git a/xen/arch/x8
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Remove err init
- Add blank line ahead of return
- Move xsave_enabled() check to the save_one func.
---
xen/arch/x86/hvm/hvm.c | 47 ++
On 09/10/2018 01:49 PM, Oleksandr Andrushchenko wrote:
> On 09/10/2018 02:09 PM, Hans Verkuil wrote:
>> On 09/10/2018 11:52 AM, Oleksandr Andrushchenko wrote:
>>> On 09/10/2018 12:04 PM, Hans Verkuil wrote:
On 09/10/2018 10:24 AM, Oleksandr Andrushchenko wrote:
> On 09/10/2018 10:53 AM, Ha
On 09/10/2018 02:09 PM, Hans Verkuil wrote:
On 09/10/2018 11:52 AM, Oleksandr Andrushchenko wrote:
On 09/10/2018 12:04 PM, Hans Verkuil wrote:
On 09/10/2018 10:24 AM, Oleksandr Andrushchenko wrote:
On 09/10/2018 10:53 AM, Hans Verkuil wrote:
Hi Oleksandr,
On 09/10/2018 09:16 AM, Oleksandr An
>>> On 10.09.18 at 13:34, wrote:
> On 30/08/18 11:28, Juergen Gross wrote:
>> On 30/08/18 10:26, Jan Beulich wrote:
>> On 30.08.18 at 09:52, wrote:
@@ -202,7 +202,7 @@ static int alloc_trace_bufs(unsigned int pages)
* Allocate buffers for all of the cpus.
* If any f
1 - 100 of 125 matches
Mail list logo