What about remove the dependency between AVX2 and AVX512F ( AVX2: [AVX512F], ) ?
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Friday, July 1, 2016 3:56 PM
To: andrew.coop...@citrix.com; Kang, Luwei
Cc: chao.p.p...@linux.intel.com;
This run is configured for baseline tests only.
flight 66514 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66514/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4
On Mon, Jul 4, 2016 at 2:02 PM, Julien Grall wrote:
>
>
> On 04/07/2016 20:13, Tamas K Lengyel wrote:
>>>
>>> On ARMv8, ESR_EL2.ISS has a different encoding depending on the state
>>> (i.e
>>> AArch64 or AArch32). See D7-1861 in ARM DDI 0487A.i. Furthermore, in
>>> AArch32
On 07/04/2016 08:30 PM, Julien Grall wrote:
>
>
> On 04/07/16 17:40, Sergej Proskurin wrote:
>> On 07/04/2016 05:17 PM, Julien Grall wrote:
>>> On 04/07/16 12:45, Sergej Proskurin wrote:
>
> [...]
>
+static struct p2m_domain *p2m_init_one(struct domain *d)
+{
+struct
From: Shannon Zhao
Construct GTDT table with the interrupt information of timers.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 29 +
1 file changed, 29 insertions(+)
diff --git
From: Shannon Zhao
Copy all the ACPI tables to guest space so that UEFI or guest could
access them.
Signed-off-by: Shannon Zhao
---
tools/libxc/xc_dom_core.c | 51 +++
1 file changed, 51
From: Shannon Zhao
Estimate the size of ACPI tables and reserve a memory map space for ACPI
tables.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 85 +++
xen/include/public/arch-arm.h |
From: Shannon Zhao
The guest kernel will get the event channel interrupt information via
domain param HVM_PARAM_CALLBACK_IRQ. Initialize it here.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm.c | 11 +++
1 file changed, 11
From: Shannon Zhao
Construct ACPI RSDP table and add a helper to calculate the ACPI table
checksum.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 35 +++
1 file changed, 35 insertions(+)
diff
From: Shannon Zhao
Add the ARM Multiboot module for ACPI, so UEFI or DomU can get the base
address of ACPI tables from it.
Signed-off-by: Shannon Zhao
---
docs/misc/arm/device-tree/acpi.txt | 24
From: Shannon Zhao
Copy the static DSDT table into ACPI blob.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c
On 07/04/2016 08:18 PM, Julien Grall wrote:
>
>
> On 04/07/16 17:43, Andrew Cooper wrote:
>> On 04/07/16 17:40, Sergej Proskurin wrote:
>>>
>{
> -struct p2m_domain *p2m = >arch.p2m;
> +int ret = 0;
> +
> +spin_lock_init(>lock);
> +
Hello Sergej,
On 04/07/2016 12:45, Sergej Proskurin wrote:
This commit makes sure that the TLB of a domain considers flushing all
of the associated altp2m views. Therefore, in case a different domain
(not the currently active domain) shall flush its TLBs, the current
implementation loops over
(CC Tamas)
Hello Sergej,
On 04/07/2016 12:45, Sergej Proskurin wrote:
This commit adds the function p2m_altp2m_lazy_copy implementing the
altp2m paging mechanism. The function p2m_altp2m_lazy_copy lazily copies
the hostp2m's mapping into the currently active altp2m view on 2nd stage
On 07/04/2016 07:56 PM, Tamas K Lengyel wrote:
> On Mon, Jul 4, 2016 at 11:42 AM, Julien Grall wrote:
>>
>>
>> On 04/07/16 12:45, Sergej Proskurin wrote:
>>>
>>> The Xen altp2m subsystem is currently supported only on x86-64 based
>>> architectures. By utilizing ARM's
> From: Xu, Quan
> Sent: Monday, July 04, 2016 5:12 PM
>
> From: Quan Xu
>
> If Device-TLB flush timed out, we hide the target ATS device
> immediately. By hiding the device, we make sure it can't be
> assigned to any domain any longer (see device_assigned).
>
>
From: Shannon Zhao
Factor out codes for generating DTB to prepare for adding ACPI tables
generation codes.
Signed-off-by: Shannon Zhao
Acked-by: Wei Liu
---
tools/libxl/libxl_arm.c | 18 --
1 file changed,
From: Shannon Zhao
Add a configuration option for ARM DomU so that user can deicde to use
ACPI or not. This option is defaultly false.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl.h | 5 +
tools/libxl/libxl_types.idl | 1 +
From: Shannon Zhao
Add placeholders for ACPI tables blob and size here so that ACPI blob
can be accessed from libxl and libxc.
Signed-off-by: Shannon Zhao
---
tools/libxc/include/xc_dom.h | 2 ++
1 file changed, 2 insertions(+)
diff --git
From: Shannon Zhao
It only constructs the ACPI tables for 64-bit ARM DomU when user enables
acpi because 32-bit DomU doesn't support ACPI.
Signed-off-by: Shannon Zhao
---
tools/libxl/Makefile | 4
tools/libxl/libxl_arm.c |
From: Shannon Zhao
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 21 +
1 file changed, 21 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c
index 96ce605..6075391 100644
From: Shannon Zhao
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 30 ++
1 file changed, 30 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c
index
From: Shannon Zhao
It uses static DSDT table like the way x86 uses. Currently the DSDT
table only contains processor device objects and it generates the
maximal objects which so far is 128.
Signed-off-by: Shannon Zhao
---
From: Shannon Zhao
Note: while there are still two points (user configuration name and
where to load the ACPI blob) which we don't reach an agreement and need
other maintainer's opinions, but I'd like to send the updated series out
since we could move forward and once we
flight 96645 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96645/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 3 host-install(3) broken REGR. vs.
On July 05, 2016 8:47 AM, Tian, Kevin wrote:
> > From: Xu, Quan
> > Sent: Monday, July 04, 2016 5:12 PM
> >
> > From: Quan Xu
> >
> > If Device-TLB flush timed out, we hide the target ATS device
> > immediately. By hiding the device, we make sure it can't
Hello Sergej,
On 04/07/2016 12:45, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c
index ce1c3c3..413125f 100644
--- a/xen/arch/arm/guestcopy.c
+++ b/xen/arch/arm/guestcopy.c
@@ -17,7 +17,7 @@ static unsigned long raw_copy_to_guest_helper(void *to, const
Hello Sergej,
On 04/07/2016 12:45, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/p2m.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
flight 96634 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96634/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 96611
From: Shannon Zhao
Factor MPIDR computing codes out as a helper, so it could be shared
between DT and ACPI.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm.c | 8 +---
tools/libxl/libxl_arm.h | 11 +++
2 files changed, 12
From: Shannon Zhao
Rename finalise_one_memory_node to finalise_one_node and pass the node
name via function parameter.
This is useful for adding ACPI module which will be added by a later
patch.
Signed-off-by: Shannon Zhao
---
From: Shannon Zhao
According to the GIC version, construct the MADT table.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 83
1 file changed, 83 insertions(+)
diff --git
flight 96618 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96618/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs.
94856
flight 66516 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66516/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4 capture-logs !broken
On 07/04/2016 07:44 PM, Julien Grall wrote:
>
>
> On 04/07/16 17:56, Sergej Proskurin wrote:
>> Hi Andrew,
>>
>> On 07/04/2016 06:43 PM, Andrew Cooper wrote:
>>> On 04/07/16 17:40, Sergej Proskurin wrote:
>>{
>> -struct p2m_domain *p2m = >arch.p2m;
>> +int ret = 0;
Hello Sergej,
On 04/07/2016 22:19, Sergej Proskurin wrote:
On 07/04/2016 07:44 PM, Julien Grall wrote:
On 04/07/16 17:56, Sergej Proskurin wrote:
On 07/04/2016 06:43 PM, Andrew Cooper wrote:
On 04/07/16 17:40, Sergej Proskurin wrote:
{
-struct p2m_domain *p2m = >arch.p2m;
+int
This run is configured for baseline tests only.
flight 66515 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66515/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop
On 07/04/2016 11:19 PM, Sergej Proskurin wrote:
>
> On 07/04/2016 07:44 PM, Julien Grall wrote:
>>
>>
>> On 04/07/16 17:56, Sergej Proskurin wrote:
>>> Hi Andrew,
>>>
>>> On 07/04/2016 06:43 PM, Andrew Cooper wrote:
On 04/07/16 17:40, Sergej Proskurin wrote:
>
>>>{
>>> -
flight 96639 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96639/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 94748
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c| 2 +-
xen/arch/arm/p2m.c| 32
On 04/07/16 17:40, Sergej Proskurin wrote:
>
>>> {
>>> -struct p2m_domain *p2m = >arch.p2m;
>>> +int ret = 0;
>>> +
>>> +spin_lock_init(>lock);
>>> +INIT_PAGE_LIST_HEAD(>pages);
>>> +
>>> +spin_lock(>lock);
>>> +
>>> +p2m->domain = d;
>>> +p2m->access_required =
From: Gerd Hoffmann
Commit "8156d48 pc: allow raising low memory via max-ram-below-4g
option" causes a regression on xen, because it uses a different
memory split.
This patch initializes max-ram-below-4g to zero and leaves the
initialization to the memory initialization
Wei Liu writes ("Re: [PATCH 0/6] xenconsoled: rotating log file abstration"):
> Ian, do you have any opinion on this series?
>
> Despite the pending discussion of how to proceed on the logging issue, I
> think this functionality is useful to have in xenconsoled.
I was waiting for a decision on
On 04/07/16 12:45, Sergej Proskurin wrote:
+void p2m_flush_altp2m(struct domain *d)
+{
+unsigned int i;
+
+altp2m_lock(d);
+
+for ( i = 0; i < MAX_ALTP2M; i++ )
+{
+p2m_flush_table(d->arch.altp2m_p2m[i]);
+flush_tlb();
I forgot to comment on this line.
Can you
On 7/4/2016 7:16 PM, Jan Beulich wrote:
On 04.07.16 at 18:09, wrote:
Now that I think about it, that's feasible too. So then, make
arch_vm_event be dynamically allocated as it was, but slightly change
its definition to:
struct arch_vm_event {
uint32_t
Hello Julien,
On 07/04/2016 05:17 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> The p2m intialization now invokes intialization routines responsible for
>
> s/intialization/initialization/
>
>> the allocation and intitialization of altp2m structures.
Hello Julien,
On 07/04/2016 06:15 PM, Julien Grall wrote:
>
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> +static void p2m_teardown_hostp2m(struct domain *d)
>> +{
>> +struct p2m_domain *p2m = p2m_get_hostp2m(d);
>> +struct page_info *pg = NULL;
>> +mfn_t mfn;
>> +unsigned
Hi Andrew,
On 07/04/2016 06:43 PM, Andrew Cooper wrote:
> On 04/07/16 17:40, Sergej Proskurin wrote:
>>
{
-struct p2m_domain *p2m = >arch.p2m;
+int ret = 0;
+
+spin_lock_init(>lock);
+INIT_PAGE_LIST_HEAD(>pages);
+
+spin_lock(>lock);
Wei Liu writes ("Re: [PATCH 4/6] libxl: debug output for args and env when
invoking hotplug script"):
> > From 49714976c5fde3d08baa6f34295b3f7db6a81444 Mon Sep 17 00:00:00 2001
> > From: Wei Liu
> > Date: Fri, 15 Apr 2016 12:56:03 +0100
> > Subject: [PATCH] libxl: debug
On 04/07/16 12:45, Sergej Proskurin wrote:
The Xen altp2m subsystem is currently supported only on x86-64 based
architectures. By utilizing ARM's virtualization extensions, we intend
to implement altp2m support for ARM architectures and thus further
extend current Virtual Machine Introspection
On 04/07/16 17:56, Sergej Proskurin wrote:
Hi Andrew,
On 07/04/2016 06:43 PM, Andrew Cooper wrote:
On 04/07/16 17:40, Sergej Proskurin wrote:
{
-struct p2m_domain *p2m = >arch.p2m;
+int ret = 0;
+
+spin_lock_init(>lock);
+INIT_PAGE_LIST_HEAD(>pages);
+
+
On Mon, Jul 4, 2016 at 11:42 AM, Julien Grall wrote:
>
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>>
>> The Xen altp2m subsystem is currently supported only on x86-64 based
>> architectures. By utilizing ARM's virtualization extensions, we intend
>> to implement altp2m
On 04/07/16 17:40, Sergej Proskurin wrote:
On 07/04/2016 05:17 PM, Julien Grall wrote:
On 04/07/16 12:45, Sergej Proskurin wrote:
[...]
+static struct p2m_domain *p2m_init_one(struct domain *d)
+{
+struct p2m_domain *p2m = xzalloc(struct p2m_domain);
+
+if ( !p2m )
+return
On 04/07/16 17:51, Sergej Proskurin wrote:
On 07/04/2016 06:15 PM, Julien Grall wrote:
On 04/07/16 12:45, Sergej Proskurin wrote:
+static void p2m_teardown_hostp2m(struct domain *d)
+{
+struct p2m_domain *p2m = p2m_get_hostp2m(d);
+struct page_info *pg = NULL;
+mfn_t mfn;
+
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
+int p2m_table_init(struct domain *d)
+{
+int i = 0;
+int rc = -ENOMEM;
+struct p2m_domain *p2m = p2m_get_hostp2m(d);
+
+spin_lock(>lock);
+
+rc = p2m_alloc_table(p2m);
+if ( rc != 0 )
+goto out;
+
+
This run is configured for baseline tests only.
flight 66513 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66513/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 capture-logs
On 15/06/16 11:29, Jan Beulich wrote:
> I have no idea why we didn't do so from the beginning.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
Hello Sergej,
On 04/07/16 13:12, Sergej Proskurin wrote:
+/* Reset this p2m table to be empty */
+static void p2m_flush_table(struct p2m_domain *p2m)
+{
+struct page_info *top, *pg;
+mfn_t mfn;
+unsigned int i;
+
+/* Check whether the p2m table has already been flushed before.
>>> On 04.07.16 at 17:39, wrote:
> On 20/06/16 16:20, Jan Beulich wrote:
> On 20.06.16 at 16:32, wrote:
>>> On 15/06/16 11:28, Jan Beulich wrote:
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -1358,6 +1358,24 @@
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
The current implementation differentiates between flushing and
destroying altp2m views. This commit adds the functions
p2m_flush_altp2m, and p2m_flush_table, which allow to flush all or
individual altp2m views without destroying the
On 7/4/2016 5:58 PM, Jan Beulich wrote:
On 04.07.16 at 13:02, wrote:
On 7/4/2016 1:22 PM, Jan Beulich wrote:
On 30.06.16 at 20:43, wrote:
@@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
return test_bit(msr,
flight 96628 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96628/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 96002
On 7/4/2016 6:57 PM, Jan Beulich wrote:
On 04.07.16 at 17:21, wrote:
On 7/4/2016 6:07 PM, Jan Beulich wrote:
On 04.07.16 at 16:21, wrote:
On 07/04/16 17:17, Jan Beulich wrote:
On 04.07.16 at 15:50, wrote:
On
>>> On 04.07.16 at 18:09, wrote:
> Now that I think about it, that's feasible too. So then, make
> arch_vm_event be dynamically allocated as it was, but slightly change
> its definition to:
>
> struct arch_vm_event {
> uint32_t emulate_flags;
> struct
On 04/07/16 12:45, Sergej Proskurin wrote:
+static void p2m_teardown_hostp2m(struct domain *d)
+{
+struct p2m_domain *p2m = p2m_get_hostp2m(d);
+struct page_info *pg = NULL;
+mfn_t mfn;
+unsigned int i;
+
+spin_lock(>lock);
-if ( p2m->root )
-
On 7/4/2016 4:11 PM, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45, wrote:
The arch_vm_event structure is dynamically allocated and freed @
vm_event_cleanup_domain. This cleanup is
>>> On 04.07.16 at 15:50, wrote:
> On 07/04/16 16:11, Jan Beulich wrote:
> On 04.07.16 at 15:03, wrote:
>>> On 7/4/2016 3:47 PM, Jan Beulich wrote:
>>> On 30.06.16 at 20:45, wrote:
> The arch_vm_event structure
On 07/04/16 17:05, Jan Beulich wrote:
On 04.07.16 at 15:22, wrote:
>> On 07/04/16 13:22, Jan Beulich wrote:
>> On 30.06.16 at 20:43, wrote:
@@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
return
On 7/4/2016 5:17 PM, Jan Beulich wrote:
On 04.07.16 at 15:50, wrote:
On 07/04/16 16:11, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45, wrote:
The
Introduce a new command to dynamically change log level thresholds.
Provide adequate documentation.
Based on a patch by Jan Beulich.
Signed-off-by: Jan Beulich
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
Cc: Ian Jackson
Previously Jan posted [0]. The downside of that approach is that we need to
rework log level number space to make it suitable for stable API (safe against
addition and removal of numbers).
This version changes the interface to use buffers that contain string
representation of log level. User
... from serial console and via sysctl so that one doesn't always need
to reboot to see more / less messages.
Note that upper thresholds driven from the serial console are sticky,
i.e. while they get adjusted upwards when the lower threshold would
otherwise end up above the upper one, they don't
Signed-off-by: Wei Liu
---
Cc: Ian Jackson
Cc: Jan Beulich
---
tools/libxl/libxl.c | 40
tools/libxl/libxl.h | 11 +++
2 files changed, 51 insertions(+)
diff --git
It cleaner than open-coding strings and numbers. The array will also
become handy later when we need to refactor things a bit.
No functional change.
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
---
xen/drivers/char/console.c | 25 +++--
Signed-off-by: Wei Liu
---
Cc: Ian Jackson
Cc: Jan Beulich
---
tools/libxc/include/xenctrl.h | 6 ++
tools/libxc/xc_misc.c | 143 ++
2 files changed, 149 insertions(+)
diff
flight 96636 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96636/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 3 host-install(3) broken REGR. vs.
On 7/4/2016 6:07 PM, Jan Beulich wrote:
On 04.07.16 at 16:21, wrote:
On 07/04/16 17:17, Jan Beulich wrote:
On 04.07.16 at 15:50, wrote:
On 07/04/16 16:11, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On
On 7/4/2016 6:09 PM, Jan Beulich wrote:
On 04.07.16 at 16:31, wrote:
Hmm, I meant "<= 80" the first time too, I was under the impression that
that's what CODING_STYLE asks for too, but, quoting:
'Lines should be less than 80 characters in length.'
Why not <= 80?
On Mon, Jul 04, 2016 at 04:13:22PM +0100, Wei Liu wrote:
> It cleaner than open-coding strings and numbers. The array will also
> become handy later when we need to refactor things a bit.
>
> No functional change.
>
> Signed-off-by: Wei Liu
> ---
> Cc: Jan Beulich
On 20/06/16 16:20, Jan Beulich wrote:
On 20.06.16 at 16:32, wrote:
>> On 15/06/16 11:28, Jan Beulich wrote:
>>> --- a/xen/arch/x86/time.c
>>> +++ b/xen/arch/x86/time.c
>>> @@ -1358,6 +1358,24 @@ static void time_calibration(void *unuse
>>> ,
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index 8e8e0f7..cb90a55 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -104,8 +104,36 @@ static int do_altp2m_op(XEN_GUEST_HANDLE_PARAM(void) arg)
break;
On 15/06/16 11:30, Jan Beulich wrote:
> Common code between time_calibration_{std,tsc}_rendezvous() can better
> live in a single place, eliminating the risk of adjusting one without
> the other.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
>>> On 04.07.16 at 17:21, wrote:
> On 7/4/2016 6:07 PM, Jan Beulich wrote:
> On 04.07.16 at 16:21, wrote:
>>> On 07/04/16 17:17, Jan Beulich wrote:
>>> On 04.07.16 at 15:50, wrote:
> On 07/04/16 16:11, Jan
On 15/06/16 11:30, Jan Beulich wrote:
> If that had been done from the beginning, mistakes like the one
> corrected in commit b64438c7c1 ("x86/time: use correct (local) time
> stamp in constant-TSC calibration fast path") would likely never have
> happened.
>
> Also add a few "const" to make more
>>> On 04.07.16 at 18:00, wrote:
> On 7/4/2016 5:58 PM, Jan Beulich wrote:
> On 04.07.16 at 13:02, wrote:
>>> On 7/4/2016 1:22 PM, Jan Beulich wrote:
>>> On 30.06.16 at 20:43, wrote:
> @@ -119,6 +156,55 @@ bool_t
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
This commit moves the altp2m-related code from x86 to ARM.
Looking at the code in the follow-up patches, I have the impression that
the code is very similar (if not exactly) to the x86 code. If so, we
should move the HVMOP for altp2m
On 7/4/2016 4:50 PM, Razvan Cojocaru wrote:
On 07/04/16 16:11, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45, wrote:
The arch_vm_event structure is dynamically allocated and freed @
>>> On 04.07.16 at 15:21, wrote:
> On 7/4/2016 4:07 PM, Jan Beulich wrote:
> On 04.07.16 at 14:47, wrote:
>>> On 7/4/2016 3:37 PM, Jan Beulich wrote:
>>> On 30.06.16 at 20:44, wrote:
> After trapping a
>>> On 04.07.16 at 15:22, wrote:
> On 07/04/16 13:22, Jan Beulich wrote:
> On 30.06.16 at 20:43, wrote:
>>> @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
>>> return test_bit(msr, bitmap);
>>> }
>>>
>>>
flight 96614 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96614/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
>>> On 04.07.16 at 16:24, wrote:
> On 7/4/2016 5:08 PM, Jan Beulich wrote:
> On 04.07.16 at 15:21, wrote:
>>> On 7/4/2016 4:07 PM, Jan Beulich wrote:
>>> On 04.07.16 at 14:47, wrote:
> On 7/4/2016 3:37 PM, Jan
On 07/04/16 14:45, Sergej Proskurin wrote:
> Signed-off-by: Sergej Proskurin
> ---
> Cc: Razvan Cojocaru
> Cc: Tamas K Lengyel
> Cc: Ian Jackson
> Cc: Wei Liu
> ---
>
Hello Julien,
On 07/04/2016 03:25 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> The Xen altp2m subsystem is currently supported only on x86-64 based
>> architectures. By utilizing ARM's virtualization extensions, we intend
>> to implement altp2m
Hello Julien,
On 07/04/2016 03:36 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> This commit moves the altp2m-related code from x86 to ARM.
>
> Looking at the code in the follow-up patches, I have the impression that
> the code is very similar (if not
>>> On 04.07.16 at 15:28, wrote:
> On 7/4/2016 4:11 PM, Jan Beulich wrote:
> On 04.07.16 at 15:03, wrote:
>>> On 7/4/2016 3:47 PM, Jan Beulich wrote:
>>> On 30.06.16 at 20:45, wrote:
> The arch_vm_event structure
On 07/04/16 17:17, Jan Beulich wrote:
On 04.07.16 at 15:50, wrote:
>> On 07/04/16 16:11, Jan Beulich wrote:
>> On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45,
On 7/4/2016 5:16 PM, Razvan Cojocaru wrote:
On 07/04/16 17:05, Jan Beulich wrote:
On 04.07.16 at 15:22, wrote:
On 07/04/16 13:22, Jan Beulich wrote:
On 30.06.16 at 20:43, wrote:
@@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain
On 07/04/2016 04:22 AM, George Dunlap wrote:
Thanks for your persistence. :-)
I appreciate the reply :-)
It's likely that this is related to a known problem with the interface
between the balloon driver and the toolstack. The warning itself is
benign: it simply means that the balloon driver
>>> On 04.07.16 at 13:02, wrote:
> On 7/4/2016 1:22 PM, Jan Beulich wrote:
> On 30.06.16 at 20:43, wrote:
>>> @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
>>> return test_bit(msr, bitmap);
>>> }
>>>
>>>
>>> On 04.07.16 at 16:21, wrote:
> On 07/04/16 17:17, Jan Beulich wrote:
> On 04.07.16 at 15:50, wrote:
>>> On 07/04/16 16:11, Jan Beulich wrote:
>>> On 04.07.16 at 15:03, wrote:
> On 7/4/2016 3:47 PM, Jan
1 - 100 of 208 matches
Mail list logo