Some clocks might be used by the Xen hypervisor and not by the Linux
kernel. If these are not registered by the Linux kernel, they might be
disabled by clk_disable_unused() as the kernel doesn't know that they
are used. The clock of the serial console handled by Xen is one
example for this. It migh
Signed-off-by: Dirk Behme
---
Changes in v2: Drop unneeded rcar3.c
docs/misc/arm/early-printk.txt| 1 +
xen/arch/arm/Rules.mk | 1 +
xen/arch/arm/arm64/debug-scif.inc | 54 +++
xen/drivers/char/Kconfig | 2 +-
4 files change
From: Shannon Zhao
Rename finalise_one_memory_node to finalise_one_node and pass the node
name via function parameter.
This is useful for adding ACPI module which will be added by a later
patch.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm.c | 8
1 file changed, 4 insertions
From: Shannon Zhao
According to the GIC version, construct the MADT table.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 83
1 file changed, 83 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c
From: Shannon Zhao
Factor MPIDR computing codes out as a helper, so it could be shared
between DT and ACPI.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm.c | 8 +---
tools/libxl/libxl_arm.h | 11 +++
2 files changed, 12 insertions(+), 7 deletions(-)
diff --git a/tools/lib
From: Shannon Zhao
Construct ACPI RSDP table and add a helper to calculate the ACPI table
checksum.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 35 +++
1 file changed, 35 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/l
From: Shannon Zhao
Copy all the ACPI tables to guest space so that UEFI or guest could
access them.
Signed-off-by: Shannon Zhao
---
tools/libxc/xc_dom_core.c | 51 +++
1 file changed, 51 insertions(+)
diff --git a/tools/libxc/xc_dom_core.c b/tools/l
From: Shannon Zhao
Estimate the size of ACPI tables and reserve a memory map space for ACPI
tables.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 85 +++
xen/include/public/arch-arm.h | 4 ++
2 files changed, 89 insertions(+)
diff --g
From: Shannon Zhao
The guest kernel will get the event channel interrupt information via
domain param HVM_PARAM_CALLBACK_IRQ. Initialize it here.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm.c | 11 +++
1 file changed, 11 insertions(+)
diff --git a/tools/libxl/libxl_arm.c b/t
From: Shannon Zhao
Copy the static DSDT table into ACPI blob.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c
index 6075391..368db04 100644
--- a/tools/libxl
From: Shannon Zhao
Construct GTDT table with the interrupt information of timers.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 29 +
1 file changed, 29 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c
index 19
From: Shannon Zhao
Add the ARM Multiboot module for ACPI, so UEFI or DomU can get the base
address of ACPI tables from it.
Signed-off-by: Shannon Zhao
---
docs/misc/arm/device-tree/acpi.txt | 24
tools/libxl/libxl_arm.c| 24
2 files
From: Shannon Zhao
It uses static DSDT table like the way x86 uses. Currently the DSDT
table only contains processor device objects and it generates the
maximal objects which so far is 128.
Signed-off-by: Shannon Zhao
---
tools/libacpi/Makefile| 15 -
tools/libacpi/mk_dsdt.
From: Shannon Zhao
Note: while there are still two points (user configuration name and
where to load the ACPI blob) which we don't reach an agreement and need
other maintainer's opinions, but I'd like to send the updated series out
since we could move forward and once we reach an agreement I can
From: Shannon Zhao
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 21 +
1 file changed, 21 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c
index 96ce605..6075391 100644
--- a/tools/libxl/libxl_arm_acpi.c
+++ b/tools/lib
From: Shannon Zhao
Factor out codes for generating DTB to prepare for adding ACPI tables
generation codes.
Signed-off-by: Shannon Zhao
Acked-by: Wei Liu
---
tools/libxl/libxl_arm.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/tools/libxl/libxl_arm.c
From: Shannon Zhao
Add a configuration option for ARM DomU so that user can deicde to use
ACPI or not. This option is defaultly false.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl.h | 5 +
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_cmdimpl.c| 4
3 files changed
From: Shannon Zhao
Add placeholders for ACPI tables blob and size here so that ACPI blob
can be accessed from libxl and libxc.
Signed-off-by: Shannon Zhao
---
tools/libxc/include/xc_dom.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/x
From: Shannon Zhao
It only constructs the ACPI tables for 64-bit ARM DomU when user enables
acpi because 32-bit DomU doesn't support ACPI.
Signed-off-by: Shannon Zhao
---
tools/libxl/Makefile | 4
tools/libxl/libxl_arm.c | 19 ++-
tools/libxl/libxl_arm.h | 3
From: Shannon Zhao
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 30 ++
1 file changed, 30 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c
index 9df1573..1989050 100644
--- a/tools/libxl/libxl_arm_acpi.c
+++ b/
What about remove the dependency between AVX2 and AVX512F ( AVX2: [AVX512F], ) ?
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Friday, July 1, 2016 3:56 PM
To: andrew.coop...@citrix.com; Kang, Luwei
Cc: chao.p.p...@linux.intel.com; xen-devel@lists.xen.org
Subject
On July 05, 2016 8:47 AM, Tian, Kevin wrote:
> > From: Xu, Quan
> > Sent: Monday, July 04, 2016 5:12 PM
> >
> > From: Quan Xu
> >
> > If Device-TLB flush timed out, we hide the target ATS device
> > immediately. By hiding the device, we make sure it can't be assigned
> > to any domain any longer
flight 96634 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96634/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 96611
test-armhf-armhf-xl-
> From: Xu, Quan
> Sent: Monday, July 04, 2016 5:12 PM
>
> From: Quan Xu
>
> If Device-TLB flush timed out, we hide the target ATS device
> immediately. By hiding the device, we make sure it can't be
> assigned to any domain any longer (see device_assigned).
>
> Signed-off-by: Quan Xu
>
> CC:
flight 96645 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96645/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 3 host-install(3) broken REGR. vs. 960
flight 96639 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96639/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 94748
test-amd64-i386-
On 07/04/2016 08:30 PM, Julien Grall wrote:
>
>
> On 04/07/16 17:40, Sergej Proskurin wrote:
>> On 07/04/2016 05:17 PM, Julien Grall wrote:
>>> On 04/07/16 12:45, Sergej Proskurin wrote:
>
> [...]
>
+static struct p2m_domain *p2m_init_one(struct domain *d)
+{
+struct p2m_do
On 07/04/2016 11:19 PM, Sergej Proskurin wrote:
>
> On 07/04/2016 07:44 PM, Julien Grall wrote:
>>
>>
>> On 04/07/16 17:56, Sergej Proskurin wrote:
>>> Hi Andrew,
>>>
>>> On 07/04/2016 06:43 PM, Andrew Cooper wrote:
On 04/07/16 17:40, Sergej Proskurin wrote:
>
>>>{
>>> -
Hello Sergej,
On 04/07/2016 22:19, Sergej Proskurin wrote:
On 07/04/2016 07:44 PM, Julien Grall wrote:
On 04/07/16 17:56, Sergej Proskurin wrote:
On 07/04/2016 06:43 PM, Andrew Cooper wrote:
On 04/07/16 17:40, Sergej Proskurin wrote:
{
-struct p2m_domain *p2m = &d->arch.p2m;
+in
On 07/04/2016 08:18 PM, Julien Grall wrote:
>
>
> On 04/07/16 17:43, Andrew Cooper wrote:
>> On 04/07/16 17:40, Sergej Proskurin wrote:
>>>
>{
> -struct p2m_domain *p2m = &d->arch.p2m;
> +int ret = 0;
> +
> +spin_lock_init(&p2m->lock);
> +INIT_PAGE_LI
On 07/04/2016 07:44 PM, Julien Grall wrote:
>
>
> On 04/07/16 17:56, Sergej Proskurin wrote:
>> Hi Andrew,
>>
>> On 07/04/2016 06:43 PM, Andrew Cooper wrote:
>>> On 04/07/16 17:40, Sergej Proskurin wrote:
>>{
>> -struct p2m_domain *p2m = &d->arch.p2m;
>> +int ret = 0
On Mon, Jul 4, 2016 at 2:02 PM, Julien Grall wrote:
>
>
> On 04/07/2016 20:13, Tamas K Lengyel wrote:
>>>
>>> On ARMv8, ESR_EL2.ISS has a different encoding depending on the state
>>> (i.e
>>> AArch64 or AArch32). See D7-1861 in ARM DDI 0487A.i. Furthermore, in
>>> AArch32
>>> state, the ARMv8 spe
On 07/04/2016 07:56 PM, Tamas K Lengyel wrote:
> On Mon, Jul 4, 2016 at 11:42 AM, Julien Grall wrote:
>>
>>
>> On 04/07/16 12:45, Sergej Proskurin wrote:
>>>
>>> The Xen altp2m subsystem is currently supported only on x86-64 based
>>> architectures. By utilizing ARM's virtualization extensions, w
This run is configured for baseline tests only.
flight 66515 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66515/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop
Hello Sergej,
On 04/07/2016 12:45, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/p2m.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index 96892a5..de97a
(CC Tamas)
Hello Sergej,
On 04/07/2016 12:45, Sergej Proskurin wrote:
This commit adds the function p2m_altp2m_lazy_copy implementing the
altp2m paging mechanism. The function p2m_altp2m_lazy_copy lazily copies
the hostp2m's mapping into the currently active altp2m view on 2nd stage
instruction
flight 96618 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96618/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs.
94856
test-amd64-am
Hello Sergej,
On 04/07/2016 12:45, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c
index ce1c3c3..413125f 100644
--- a/xen/arch/arm/guestcopy.c
+++ b/xen/arch/arm/guestcopy.c
@@ -17,7 +17,7 @@ static unsigned long raw_copy_to_guest_helper(void *to, const
Hello Sergej,
On 04/07/2016 12:45, Sergej Proskurin wrote:
This commit makes sure that the TLB of a domain considers flushing all
of the associated altp2m views. Therefore, in case a different domain
(not the currently active domain) shall flush its TLBs, the current
implementation loops over al
This run is configured for baseline tests only.
flight 66514 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66514/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4 capture-logs
flight 66516 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66516/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4 capture-logs !broken [st=
Dear all
I am modifying credit scheduler and I want to give credit to each vcpu
based on cpu time which its domain has consumed.
Suppose:
credit_fair =((credit_total*sdom->weight)+(weight_total-1))/weight_total
I want to multiply something to this formula according to the domain cpu
usage. Thus I
On 04/07/2016 20:13, Tamas K Lengyel wrote:
On ARMv8, ESR_EL2.ISS has a different encoding depending on the state (i.e
AArch64 or AArch32). See D7-1861 in ARM DDI 0487A.i. Furthermore, in AArch32
state, the ARMv8 specs permits to trap conditional SMC instructions that
fail their condition check
Hello,
Juergen Gross, on Mon 04 Jul 2016 07:29:46 +0200, wrote:
> > Did you check the boot output e.g. of a trivial mini-os application?
> > Notably, iirc there were perhaps odd formating with %x, %p or such.
> > Moving to the posix behavior would be a good thing, I'd just want to
> > know whether
flight 96641 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96641/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
> On ARMv8, ESR_EL2.ISS has a different encoding depending on the state (i.e
> AArch64 or AArch32). See D7-1861 in ARM DDI 0487A.i. Furthermore, in AArch32
> state, the ARMv8 specs permits to trap conditional SMC instructions that
> fail their condition check (see D7-1897 in ARM DDI 0406C.c).
Hi J
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
+int p2m_table_init(struct domain *d)
+{
+int i = 0;
+int rc = -ENOMEM;
+struct p2m_domain *p2m = p2m_get_hostp2m(d);
+
+spin_lock(&p2m->lock);
+
+rc = p2m_alloc_table(p2m);
+if ( rc != 0 )
+goto out;
+
+
On 04/07/16 17:51, Sergej Proskurin wrote:
On 07/04/2016 06:15 PM, Julien Grall wrote:
On 04/07/16 12:45, Sergej Proskurin wrote:
+static void p2m_teardown_hostp2m(struct domain *d)
+{
+struct p2m_domain *p2m = p2m_get_hostp2m(d);
+struct page_info *pg = NULL;
+mfn_t mfn;
+uns
On 04/07/16 17:40, Sergej Proskurin wrote:
On 07/04/2016 05:17 PM, Julien Grall wrote:
On 04/07/16 12:45, Sergej Proskurin wrote:
[...]
+static struct p2m_domain *p2m_init_one(struct domain *d)
+{
+struct p2m_domain *p2m = xzalloc(struct p2m_domain);
+
+if ( !p2m )
+return
On 04/07/16 17:43, Andrew Cooper wrote:
On 04/07/16 17:40, Sergej Proskurin wrote:
{
-struct p2m_domain *p2m = &d->arch.p2m;
+int ret = 0;
+
+spin_lock_init(&p2m->lock);
+INIT_PAGE_LIST_HEAD(&p2m->pages);
+
+spin_lock(&p2m->lock);
+
+p2m->domain = d;
+p2m->acce
On Mon, Jul 4, 2016 at 11:42 AM, Julien Grall wrote:
>
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>>
>> The Xen altp2m subsystem is currently supported only on x86-64 based
>> architectures. By utilizing ARM's virtualization extensions, we intend
>> to implement altp2m support for ARM architec
On 04/07/16 17:56, Sergej Proskurin wrote:
Hi Andrew,
On 07/04/2016 06:43 PM, Andrew Cooper wrote:
On 04/07/16 17:40, Sergej Proskurin wrote:
{
-struct p2m_domain *p2m = &d->arch.p2m;
+int ret = 0;
+
+spin_lock_init(&p2m->lock);
+INIT_PAGE_LIST_HEAD(&p2m->pages);
+
+
On 04/07/16 12:45, Sergej Proskurin wrote:
The Xen altp2m subsystem is currently supported only on x86-64 based
architectures. By utilizing ARM's virtualization extensions, we intend
to implement altp2m support for ARM architectures and thus further
extend current Virtual Machine Introspection
Julien Grall writes ("Re: [Xen-devel] [linux-4.1 baseline-only test] 66490:
trouble: blocked/broken/fail/pass"):
> On 03/07/2016 09:09, Platform Team regression test user wrote:
> > This run is configured for baseline tests only.
> >
> > flight 66490 linux-4.1 real [real]
> > http://osstest.xs.cit
Wei Liu writes ("Re: [PATCH 0/6] xenconsoled: rotating log file abstration"):
> Ian, do you have any opinion on this series?
>
> Despite the pending discussion of how to proceed on the logging issue, I
> think this functionality is useful to have in xenconsoled.
I was waiting for a decision on wh
Wei Liu writes ("Re: [PATCH 4/6] libxl: debug output for args and env when
invoking hotplug script"):
> > From 49714976c5fde3d08baa6f34295b3f7db6a81444 Mon Sep 17 00:00:00 2001
> > From: Wei Liu
> > Date: Fri, 15 Apr 2016 12:56:03 +0100
> > Subject: [PATCH] libxl: debug output for args and env wh
Hi Andrew,
On 07/04/2016 06:43 PM, Andrew Cooper wrote:
> On 04/07/16 17:40, Sergej Proskurin wrote:
>>
{
-struct p2m_domain *p2m = &d->arch.p2m;
+int ret = 0;
+
+spin_lock_init(&p2m->lock);
+INIT_PAGE_LIST_HEAD(&p2m->pages);
+
+spin_lo
Hello Julien,
On 07/04/2016 06:15 PM, Julien Grall wrote:
>
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> +static void p2m_teardown_hostp2m(struct domain *d)
>> +{
>> +struct p2m_domain *p2m = p2m_get_hostp2m(d);
>> +struct page_info *pg = NULL;
>> +mfn_t mfn;
>> +unsigned in
From: Gerd Hoffmann
Commit "8156d48 pc: allow raising low memory via max-ram-below-4g
option" causes a regression on xen, because it uses a different
memory split.
This patch initializes max-ram-below-4g to zero and leaves the
initialization to the memory initialization functions. That way
they
On 04/07/16 17:40, Sergej Proskurin wrote:
>
>>> {
>>> -struct p2m_domain *p2m = &d->arch.p2m;
>>> +int ret = 0;
>>> +
>>> +spin_lock_init(&p2m->lock);
>>> +INIT_PAGE_LIST_HEAD(&p2m->pages);
>>> +
>>> +spin_lock(&p2m->lock);
>>> +
>>> +p2m->domain = d;
>>> +p2m->access
Hello Julien,
On 07/04/2016 05:17 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> The p2m intialization now invokes intialization routines responsible for
>
> s/intialization/initialization/
>
>> the allocation and intitialization of altp2m structures.
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c| 2 +-
xen/arch/arm/p2m.c| 32
xen/include/asm-arm/p2m.h | 3 +++
3 files changed
On 7/4/2016 7:16 PM, Jan Beulich wrote:
On 04.07.16 at 18:09, wrote:
Now that I think about it, that's feasible too. So then, make
arch_vm_event be dynamically allocated as it was, but slightly change
its definition to:
struct arch_vm_event {
uint32_t emulate_flags;
struct vm_eve
On 04/07/16 12:45, Sergej Proskurin wrote:
+void p2m_flush_altp2m(struct domain *d)
+{
+unsigned int i;
+
+altp2m_lock(d);
+
+for ( i = 0; i < MAX_ALTP2M; i++ )
+{
+p2m_flush_table(d->arch.altp2m_p2m[i]);
+flush_tlb();
I forgot to comment on this line.
Can you e
>>> On 04.07.16 at 18:09, wrote:
> Now that I think about it, that's feasible too. So then, make
> arch_vm_event be dynamically allocated as it was, but slightly change
> its definition to:
>
> struct arch_vm_event {
> uint32_t emulate_flags;
> struct vm_event_emul_read_data *emul_r
On 04/07/16 12:45, Sergej Proskurin wrote:
+static void p2m_teardown_hostp2m(struct domain *d)
+{
+struct p2m_domain *p2m = p2m_get_hostp2m(d);
+struct page_info *pg = NULL;
+mfn_t mfn;
+unsigned int i;
+
+spin_lock(&p2m->lock);
-if ( p2m->root )
-free_domheap_p
>>> On 04.07.16 at 18:00, wrote:
> On 7/4/2016 5:58 PM, Jan Beulich wrote:
> On 04.07.16 at 13:02, wrote:
>>> On 7/4/2016 1:22 PM, Jan Beulich wrote:
>>> On 30.06.16 at 20:43, wrote:
> @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
>return test
flight 96628 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96628/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 96002
Regres
On 7/4/2016 6:57 PM, Jan Beulich wrote:
On 04.07.16 at 17:21, wrote:
On 7/4/2016 6:07 PM, Jan Beulich wrote:
On 04.07.16 at 16:21, wrote:
On 07/04/16 17:17, Jan Beulich wrote:
On 04.07.16 at 15:50, wrote:
On 07/04/16 16:11, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:
On 7/4/2016 5:58 PM, Jan Beulich wrote:
On 04.07.16 at 13:02, wrote:
On 7/4/2016 1:22 PM, Jan Beulich wrote:
On 30.06.16 at 20:43, wrote:
@@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
return test_bit(msr, bitmap);
}
+static void write_ctrlreg_adjust
On 15/06/16 11:30, Jan Beulich wrote:
> If that had been done from the beginning, mistakes like the one
> corrected in commit b64438c7c1 ("x86/time: use correct (local) time
> stamp in constant-TSC calibration fast path") would likely never have
> happened.
>
> Also add a few "const" to make more o
>>> On 04.07.16 at 17:21, wrote:
> On 7/4/2016 6:07 PM, Jan Beulich wrote:
> On 04.07.16 at 16:21, wrote:
>>> On 07/04/16 17:17, Jan Beulich wrote:
>>> On 04.07.16 at 15:50, wrote:
> On 07/04/16 16:11, Jan Beulich wrote:
> On 04.07.16 at 15:03, wrote:
>>> On 7/4/2016 3:4
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
The current implementation differentiates between flushing and
destroying altp2m views. This commit adds the functions
p2m_flush_altp2m, and p2m_flush_table, which allow to flush all or
individual altp2m views without destroying the entire
>>> On 04.07.16 at 17:39, wrote:
> On 20/06/16 16:20, Jan Beulich wrote:
> On 20.06.16 at 16:32, wrote:
>>> On 15/06/16 11:28, Jan Beulich wrote:
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -1358,6 +1358,24 @@ static void time_calibration(void *unuse
On 15/06/16 11:30, Jan Beulich wrote:
> Common code between time_calibration_{std,tsc}_rendezvous() can better
> live in a single place, eliminating the risk of adjusting one without
> the other.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
__
Hello Sergej,
On 04/07/16 13:12, Sergej Proskurin wrote:
+/* Reset this p2m table to be empty */
+static void p2m_flush_table(struct p2m_domain *p2m)
+{
+struct page_info *top, *pg;
+mfn_t mfn;
+unsigned int i;
+
+/* Check whether the p2m table has already been flushed before. */
On 15/06/16 11:29, Jan Beulich wrote:
> I have no idea why we didn't do so from the beginning.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 20/06/16 16:20, Jan Beulich wrote:
On 20.06.16 at 16:32, wrote:
>> On 15/06/16 11:28, Jan Beulich wrote:
>>> --- a/xen/arch/x86/time.c
>>> +++ b/xen/arch/x86/time.c
>>> @@ -1358,6 +1358,24 @@ static void time_calibration(void *unuse
>>> &r, 1);
>>> }
>>>
>>> +void
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index 8e8e0f7..cb90a55 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -104,8 +104,36 @@ static int do_altp2m_op(XEN_GUEST_HANDLE_PARAM(void) arg)
break;
cas
On Mon, Jul 04, 2016 at 04:13:22PM +0100, Wei Liu wrote:
> It cleaner than open-coding strings and numbers. The array will also
> become handy later when we need to refactor things a bit.
>
> No functional change.
>
> Signed-off-by: Wei Liu
> ---
> Cc: Jan Beulich
> ---
> xen/drivers/char/cons
On 7/4/2016 6:09 PM, Jan Beulich wrote:
On 04.07.16 at 16:31, wrote:
Hmm, I meant "<= 80" the first time too, I was under the impression that
that's what CODING_STYLE asks for too, but, quoting:
'Lines should be less than 80 characters in length.'
Why not <= 80? Shouldn't the limit (i.e.
This run is configured for baseline tests only.
flight 66513 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66513/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 capture-logs
flight 96636 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96636/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 3 host-install(3) broken REGR. vs.
On 7/4/2016 6:07 PM, Jan Beulich wrote:
On 04.07.16 at 16:21, wrote:
On 07/04/16 17:17, Jan Beulich wrote:
On 04.07.16 at 15:50, wrote:
On 07/04/16 16:11, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45, wrote:
The arch_vm_ev
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
The p2m intialization now invokes intialization routines responsible for
s/intialization/initialization/
the allocation and intitialization of altp2m structures. The same
Ditto
applies to teardown routines. The functionality has be
It cleaner than open-coding strings and numbers. The array will also
become handy later when we need to refactor things a bit.
No functional change.
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
---
xen/drivers/char/console.c | 25 +++--
1 file changed, 19 insertions(+), 6 del
Signed-off-by: Wei Liu
---
Cc: Ian Jackson
Cc: Jan Beulich
---
tools/libxl/libxl.c | 40
tools/libxl/libxl.h | 11 +++
2 files changed, 51 insertions(+)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 1c81239..ff70af7 100644
--- a/t
Introduce a new command to dynamically change log level thresholds.
Provide adequate documentation.
Based on a patch by Jan Beulich.
Signed-off-by: Jan Beulich
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
Cc: Ian Jackson
---
docs/man/xl.pod.1.in | 22 +
tools/libxl/xl.
Previously Jan posted [0]. The downside of that approach is that we need to
rework log level number space to make it suitable for stable API (safe against
addition and removal of numbers).
This version changes the interface to use buffers that contain string
representation of log level. User space
... from serial console and via sysctl so that one doesn't always need
to reboot to see more / less messages.
Note that upper thresholds driven from the serial console are sticky,
i.e. while they get adjusted upwards when the lower threshold would
otherwise end up above the upper one, they don't g
Signed-off-by: Wei Liu
---
Cc: Ian Jackson
Cc: Jan Beulich
---
tools/libxc/include/xenctrl.h | 6 ++
tools/libxc/xc_misc.c | 143 ++
2 files changed, 149 insertions(+)
diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h
i
>>> On 04.07.16 at 16:31, wrote:
> Hmm, I meant "<= 80" the first time too, I was under the impression that
> that's what CODING_STYLE asks for too, but, quoting:
> 'Lines should be less than 80 characters in length.'
> Why not <= 80? Shouldn't the limit (i.e. "<=") be 80 columns, including
On 7/4/2016 6:03 PM, Jan Beulich wrote:
On 04.07.16 at 16:24, wrote:
On 7/4/2016 5:08 PM, Jan Beulich wrote:
On 04.07.16 at 15:21, wrote:
On 7/4/2016 4:07 PM, Jan Beulich wrote:
On 04.07.16 at 14:47, wrote:
On 7/4/2016 3:37 PM, Jan Beulich wrote:
On 30.06.16 at 20:44, wrote:
After trap
>>> On 04.07.16 at 16:21, wrote:
> On 07/04/16 17:17, Jan Beulich wrote:
> On 04.07.16 at 15:50, wrote:
>>> On 07/04/16 16:11, Jan Beulich wrote:
>>> On 04.07.16 at 15:03, wrote:
> On 7/4/2016 3:47 PM, Jan Beulich wrote:
> On 30.06.16 at 20:45, wrote:
>>> The arch_vm_eve
>>> On 04.07.16 at 16:24, wrote:
> On 7/4/2016 5:08 PM, Jan Beulich wrote:
> On 04.07.16 at 15:21, wrote:
>>> On 7/4/2016 4:07 PM, Jan Beulich wrote:
>>> On 04.07.16 at 14:47, wrote:
> On 7/4/2016 3:37 PM, Jan Beulich wrote:
> On 30.06.16 at 20:44, wrote:
>>> After trapp
>>> On 04.07.16 at 13:02, wrote:
> On 7/4/2016 1:22 PM, Jan Beulich wrote:
> On 30.06.16 at 20:43, wrote:
>>> @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
>>> return test_bit(msr, bitmap);
>>> }
>>>
>>> +static void write_ctrlreg_adjust_traps(struct do
On 07/04/2016 04:22 AM, George Dunlap wrote:
Thanks for your persistence. :-)
I appreciate the reply :-)
It's likely that this is related to a known problem with the interface
between the balloon driver and the toolstack. The warning itself is
benign: it simply means that the balloon driver
flight 96614 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96614/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
On 7/4/2016 5:17 PM, Jan Beulich wrote:
On 04.07.16 at 15:50, wrote:
On 07/04/16 16:11, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45, wrote:
The arch_vm_event structure is dynamically allocated and freed @
vm_event_cleanup_do
On 7/4/2016 5:16 PM, Razvan Cojocaru wrote:
On 07/04/16 17:05, Jan Beulich wrote:
On 04.07.16 at 15:22, wrote:
On 07/04/16 13:22, Jan Beulich wrote:
On 30.06.16 at 20:43, wrote:
@@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
return test_bit(msr, bitmap);
1 - 100 of 207 matches
Mail list logo