branch xen-unstable
xenbranch xen-unstable
job build-amd64
testid xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced
This run is configured for baseline tests only.
flight 71536 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71536/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6
** Delivery incomplete **
There was a temporary problem delivering your message to
curtiskwo...@gmail.com. Gmail will retry for 22 more hours. You'll be notified
if the delivery fails permanently.
Reporting-MTA: dns; googlemail.com
Received-From-MTA: dns;
flight 110165 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110165/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
110063
Tests
On 06/09/2017 11:22 AM, Jan Beulich wrote:
On 19.05.17 at 17:50, wrote:
>> @@ -734,8 +735,15 @@ static struct page_info *get_free_buddy(unsigned int
>> zone_lo,
>>
>> /* Find smallest order which can satisfy the request. */
>> for ( j
From the context calling pi_desc_init(), we can conclude the current
implementation of VT-d PI depends on CPU-side PI. If we disable APICv
but enable VT-d PI explicitly in xen boot command line, we would get
an assertion failure.
This patch disables VT-d PI when APICv is disabled and adds some
** Message not delivered **
There was a problem delivering your message to curtiskwo...@gmail.com. See the
technical details below.
Reporting-MTA: dns; googlemail.com
Received-From-MTA: dns;
>>> On 09.06.17 at 09:44, wrote:
> Xen supports Nested
> Virtualization(https://wiki.xenproject.org/wiki/Nested_Virtualization_in_Xen
> ),
> which means I can run Xen or KVM hypervisor inside a virtual machine,
> and then create a L2 guest. However when I run a Host-Only
>>> On 09.06.17 at 08:22, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -351,6 +351,13 @@ static int vmx_init_vmcs_config(void)
>|| !(_vmx_vmexit_control & VM_EXIT_ACK_INTR_ON_EXIT) )
> _vmx_pin_based_exec_control &=
I have asked the related issue on xen-users list
(https://lists.xenproject.org/archives/html/xen-users/2017-05/msg00090.html),
it has detail on hangs, if you want more detail, I can reproduce the
problem and send you more info.
HyperPlatform and SimpleVisor can work well inside VMware virtual
flight 71535 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71535/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-jessie-netboot-pygrub 1 build-check(1) blocked n/a
build-arm64
branch xen-unstable
xenbranch xen-unstable
job build-amd64-xsm
testid xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and
>>> On 09.06.17 at 10:54, wrote:
> I have asked the related issue on xen-users list
> (https://lists.xenproject.org/archives/html/xen-users/2017-05/msg00090.html),
> it has detail on hangs, if you want more detail, I can reproduce the
> problem and send you more info.
It's
On 6/8/2017 6:39 PM, Julien Grall wrote:
Hi Manish,
Hi Julien,
On 08/06/17 13:38, Manish Jaggi wrote:
Spurious line.
This patch disables the smmu node in IORT table for hardware domain.
Also patches the output_base of pci_rc id_array with output_base of
smmu node id_array.
I would
** Message not delivered **
There was a problem delivering your message to curtiskwo...@gmail.com. See the
technical details below.
Reporting-MTA: dns; googlemail.com
Received-From-MTA: dns;
On 09/06/17 08:44, Kangjie Xi wrote:
> Xen supports Nested
> Virtualization(https://wiki.xenproject.org/wiki/Nested_Virtualization_in_Xen),
> which means I can run Xen or KVM hypervisor inside a virtual machine,
> and then create a L2 guest. However when I run a Host-Only Hypervisor
> (no L2
Am Mittwoch, 7. Juni 2017, 04:28:33 schrieb Jan Beulich:
> >>> On 07.06.17 at 11:28, wrote:
> > Am Freitag, 19. Mai 2017, 06:41:36 schrieb Jan Beulich:
> >> >>> On 19.05.17 at 11:52, wrote:
> >> > I'am struggling with a hypervisor panic.
Has anyone tried to generate a live patch for xsa213 against 4.8? When I try to
do so I get errors for common/compat/compat/multicall.o and
xen/common/multicall.o stating that 'changed section .discard not selected for
inclusion'.
I think, but could be mistaken, that the .discard section is not
Xen supports Nested
Virtualization(https://wiki.xenproject.org/wiki/Nested_Virtualization_in_Xen),
which means I can run Xen or KVM hypervisor inside a virtual machine,
and then create a L2 guest. However when I run a Host-Only Hypervisor
(no L2 guests, like MoRE, SimpleVisor and HyperPlatform)
** Message not delivered **
There was a problem delivering your message to curtiskwo...@gmail.com. See the
technical details below.
Reporting-MTA: dns; googlemail.com
Received-From-MTA: dns;
flight 110131 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110131/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 9 redhat-install fail REGR. vs. 110093
On 6/8/2017 7:28 PM, Julien Grall wrote:
Hi,
Hello Julien,
Please CC all relevant maintainers.
Sure. Will do in the next patch rev.
On 08/06/17 14:03, Manish Jaggi wrote:
Spurious newline
This patch supports ITS in hardware domain, supports ITS in Xen
when booting with ACPI.
On 08/06/2017 13:43, Sergej Proskurin wrote:
Hi Julien,
Hi Sergej,
[...]
I know I suggested to move in p2m.c. Looking at the diff stat, this
will increase quite a lot p2m.c which is already big.
How about introducing a file guest_walk.c which contain the new
functions?
No problem at
>>> On 07.06.17 at 10:12, wrote:
On 06.06.17 at 21:19, wrote:
>> On Tue, 6 Jun 2017, Jan Beulich wrote:
>>> >>> On 06.06.17 at 16:00, wrote:
>>> > Looking at the serial logs for that and comparing them with 10009,
>>> >
On 09/06/2017 07:48, Manish Jaggi wrote:
On 6/8/2017 7:28 PM, Julien Grall wrote:
Hi,
Hello Julien,
Hello,
+list_for_each_entry(its_data, _its_list, entry)
+{
Pointless {
+size += sizeof(struct acpi_madt_generic_translator);
+}
Just for readability of code.
On 09/06/2017 08:13, Manish Jaggi wrote:
On 6/8/2017 6:39 PM, Julien Grall wrote:
Hi Manish,
Hi Julien,
Hello,
On 08/06/17 13:38, Manish Jaggi wrote:
Spurious line.
This patch disables the smmu node in IORT table for hardware domain.
Also patches the output_base of pci_rc id_array
On Fri, Jun 2, 2017 at 6:22 PM, Oleksandr Grytsov wrote:
> On Thu, May 25, 2017 at 3:17 PM, Oleksandr Grytsov wrote:
>> From: Oleksandr Grytsov
>>
>> These patches add PV display device to libxl and xl.
>>
>> Changes since v1:
>>
On Thu, Jun 08, 2017 at 08:49:01PM +0100, Julien Grall wrote:
> CC the REST maintainers
>
> On 08/06/2017 20:30, Sameer Goel wrote:
> > Introduce a memory realloc function.
> >
> > Signed-off-by: Sameer Goel
> > ---
> > xen/common/xmalloc_tlsf.c | 13 +
> >
On Fri, Jun 09, 2017 at 02:43:30AM -0600, Jan Beulich wrote:
On 09.06.17 at 08:22, wrote:
>> --- a/xen/arch/x86/hvm/vmx/vmcs.c
>> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
>> @@ -351,6 +351,13 @@ static int vmx_init_vmcs_config(void)
>>|| !(_vmx_vmexit_control &
I reproduce the issue again, and attachments are the log.
# xl dmesg > xldmesg.log
# dmesg > dmesg.log
However there is not error in the log.
Maybe just as you said, the nested virtualization is not mature. Do
you know how much work to do to change the Xen source code, to make
Xen support
HI Julien,
On 6/9/2017 2:53 PM, Julien Grall wrote:
On 09/06/2017 08:13, Manish Jaggi wrote:
On 6/8/2017 6:39 PM, Julien Grall wrote:
Hi Manish,
Hi Julien,
Hello,
On 08/06/17 13:38, Manish Jaggi wrote:
Spurious line.
This patch disables the smmu node in IORT table for hardware
If we have a large amount of livepatches and want to print them
on the console using 'xl debug-keys x' we eventually hit
the preemption check:
if ( i && !(i % 64) )
{
spin_unlock(_lock);
process_pending_softirqs();
if ( spin_trylock(_lock) )
return
On 06/09/2017 08:44 AM, Jan Beulich wrote:
> - correct CR3, CR4, and EFER checks
> - delete bogus nested paging check
> - add vcpu parameter (to include in log messages) and constify vmcb one
> - use bool/true/false
> - use accessors (and local variables to improve code readability)
> - adjust
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.12b-rc5-tag
xen: fix for 4.12 rc5
It contains a fix for Xen on ARM when dealing with 64kB page size of a guest.
Thanks.
Juergen
drivers/xen/privcmd.c | 4 ++--
1 file changed,
>>> On 09.06.17 at 17:14, wrote:
> I've characterised the issue some more and it appears to be an overflow
> inside the int13 handler if es:bx is less than 512 bytes below a 4k boundary.
> I modified the code to use a hardcoded segment, which I set at 0x6000, and
> all
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 09 June 2017 16:41
> To: Paul Durrant
> Cc: Julien Grall (julien.gr...@arm.com) ; Andrew
> Cooper ; xen-devel(xen-
>
>>> On 09.06.17 at 17:47, wrote:
> I'll go have a look and the linux edd code. I'm also trying a BIOS update
> (which is proving to be trickier than I thought as it seems to have killed
> networking in some weird way).
Speaks for the quality of what that vendor
Ignore differences in discard sections. They are not included in the final xen
binary so there is no need to include them in the live patch.
Signed-off-by: Ross Lagerwall
---
create-diff-object.c | 8
1 file changed, 8 insertions(+)
diff --git
Remove the requirement that section twins have the same alignment. The
section alignment of the patched section is respected by the loader in
Xen so it shouldn't matter if the original section alignment was
different.
Signed-off-by: Ross Lagerwall
---
Hi Bhupinder,
On 06/06/17 18:25, Bhupinder Thakur wrote:
The vpl011 changes available at the following repo:
url: ssh://g...@git.linaro.org:/people/bhupinder.thakur/xen.git
This address can only be access by Linaro employee/assignee. Please
provide an URL accessible by everyone so we can
Hi Stefano,
On 07/06/17 00:26, Stefano Stabellini wrote:
diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c
index 00909ad4..a8efd5e 100644
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -343,6 +343,29 @@ int xc_domain_get_guest_width(xc_interface *xch, uint32_t
Hi Bhupinder,
On 06/06/17 18:25, Bhupinder Thakur wrote:
diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h
index 1629f41..77425dd 100644
--- a/tools/libxc/include/xenctrl.h
+++ b/tools/libxc/include/xenctrl.h
@@ -884,6 +884,23 @@ int xc_vcpu_getcontext(xc_interface
Julien Grall writes ("Re: [PATCH for-4.9 0/4] Makefiles: Provide way to ship
livepatch tests"):
> Release-acked-by: Julien Grall
Thanks. I have pushed this to staging and will wait for an osstest
test report to check I didn't break the build, before applying the
same
flight 110187 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110187/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12
Avoid needless gaps. Make flags field mandatory for all three
operations (and rename it to fit the intended future purpose of
possibly holding more than just one flag).
Also correct a typo in a related domctl.h comment.
Signed-off-by: Jan Beulich
---
The domain ID treatment
flight 110140 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110140/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 3 host-install(3)broken REGR. vs. 109754
On 06/09/2017 09:05 AM, Jan Beulich wrote:
On 09.06.17 at 14:19, wrote:
>> ..., but all this has
>> got me wondering why Xen bothers to read the MBR, or the EDD info for that
>> matter? EDD or MBR signatures are returned by the XENPF_firmware_info
>> hypercall,
Hi Bhupinder,
On 06/06/17 18:25, Bhupinder Thakur wrote:
Add emulation code to emulate read/write access to pl011 registers
and pl011 interrupts:
- Emulate DR read/write by reading and writing from/to the IN
and OUT ring buffers and raising an event to the backend when
there is
>>> On 19.05.17 at 17:50, wrote:
> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -383,6 +383,8 @@ typedef struct page_list_head
> heap_by_zone_and_order_t[NR_ZONES][MAX_ORDER+1];
> static heap_by_zone_and_order_t *_heap[MAX_NUMNODES];
> #define
>>> On 09.06.17 at 16:16, wrote:
> If we have a large amount of livepatches and want to print them
> on the console using 'xl debug-keys x' we eventually hit
> the preemption check:
>
> if ( i && !(i % 64) )
> {
> spin_unlock(_lock);
>
Correct respective comments.
Signed-off-by: Jan Beulich
---
v2: Also mention XENMAPSPACE_gmfn_foreign for DOMID_XEN.
--- a/xen/include/public/xen.h
+++ b/xen/include/public/xen.h
@@ -550,16 +550,21 @@ DEFINE_XEN_GUEST_HANDLE(mmuext_op_t);
* is useful to ensure that no
On Thu, Jun 08, 2017 at 08:08:56AM -0600, Jan Beulich wrote:
> >>> On 08.06.17 at 15:49, wrote:
> > On Tue, Jun 06, 2017 at 07:08:43AM -0600, Jan Beulich wrote:
> >> >>> On 06.06.17 at 15:00, wrote:
> >> > On Mon, May 29, 2017 at 08:38:33AM -0600, Jan
On 09/06/17 13:47, Jan Beulich wrote:
>
>> The prereq revert is fine for backport to 4.7 (which was when the change
>> was introduced.
> You mean - other than I've indicated - without the follow-up
> also backported?
The two patches are logically independent. They were presented as a
series
Konrad Rzeszutek Wilk writes ("Re: [OSSTEST PATCH v4 00/11] livepatch test
support"):
> Done. I am satisfied with them.
Great, thanks. I have pushed this to osstest pretest. I think it
should go through without regressions; the new tests will fail, of
course, on Xen branches that don't have
On 06/09/2017 03:16 PM, Konrad Rzeszutek Wilk wrote:
If we have a large amount of livepatches and want to print them
on the console using 'xl debug-keys x' we eventually hit
the preemption check:
if ( i && !(i % 64) )
{
spin_unlock(_lock);
process_pending_softirqs();
>>> On 19.05.17 at 17:50, wrote:
> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -694,22 +694,15 @@ static void page_list_add_scrub(struct page_info *pg,
> unsigned int node,
> page_list_add(pg, (node, zone, order));
> }
>
> -/*
> -Original Message-
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: 09 June 2017 14:52
> To: Jan Beulich ; Paul Durrant
>
> Cc: Julien Grall (julien.gr...@arm.com) ; Andrew
> Cooper
flight 110166 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110166/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 5 xen-buildfail REGR. vs. 110078
build-amd64
>>> On 19.05.17 at 17:50, wrote:
> @@ -734,8 +735,15 @@ static struct page_info *get_free_buddy(unsigned int
> zone_lo,
>
> /* Find smallest order which can satisfy the request. */
> for ( j = order; j <= MAX_ORDER; j++ )
> +{
>
Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a
privileged domain to change the value of the #VE suppress bit for a
page.
Add a libxc wrapper for invoking this hvmop.
Signed-off-by: Adrian Pop
---
tools/libxc/include/xenctrl.h | 2 ++
As the code stands right now, after DomU has enabled #VE using
HVMOP_altp2m_vcpu_enable_notify, all its pages have the #VE suppress bit
cleared, generating #VEs for any EPT violation. There is currently no
way to change the value of the #VE suppress bit for a page from a
domain; it can only be
From: Vlad Ioan Topan
The default value for the "suppress #VE" bit set by set_mem_access()
currently depends on whether the call is made from the same domain (the
bit is set when called from another domain and cleared if called from
the same domain). This patch changes
On 09/06/17 17:38, Konrad Rzeszutek Wilk wrote:
> On Fri, Jun 09, 2017 at 05:03:36PM +0100, Ross Lagerwall wrote:
>> Remove the requirement that section twins have the same alignment. The
>> section alignment of the patched section is respected by the loader in
>> Xen so it shouldn't matter if the
On Fri, Jun 09, 2017 at 06:00:35PM +0100, Andrew Cooper wrote:
> On 09/06/17 17:38, Konrad Rzeszutek Wilk wrote:
> > On Fri, Jun 09, 2017 at 05:03:36PM +0100, Ross Lagerwall wrote:
> >> Remove the requirement that section twins have the same alignment. The
> >> section alignment of the patched
On 06/09/2017 10:16 AM, Konrad Rzeszutek Wilk wrote:
> If we have a large amount of livepatches and want to print them
> on the console using 'xl debug-keys x' we eventually hit
> the preemption check:
>
> if ( i && !(i % 64) )
> {
> spin_unlock(_lock);
>
flight 110151 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110151/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358
On 08/06/17 16:21, Jan Beulich wrote:
> It is not impossible that the page owner is dom_io. While no current
> caller cares about this case, let's nevertheless return an appropriate
> type even in that case.
>
> Signed-off-by: Jan Beulich
Acked-by: Andrew Cooper
flight 110177 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110177/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 3 host-install(3) broken REGR. vs. 110131
test-amd64-i386-xl
flight 110178 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110178/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-vhd 3 host-install(3)broken REGR. vs. 110093
On 09/06/17 11:51, Julien Grall wrote:
>
>
> On 07/06/17 16:22, Dario Faggioli wrote:
>> On Wed, 2017-06-07 at 12:16 +0100, Julien Grall wrote:
>>> Hi Dario,
>>>
>> Hi,
>>
>>> On 01/06/17 18:34, Dario Faggioli wrote:
diff --git a/xen/common/spinlock.c b/xen/common/spinlock.c
index
On Fri, 2017-06-09 at 04:59 -0600, Jan Beulich wrote:
> > > > On 01.06.17 at 19:35, wrote:
> > --- a/xen/common/tasklet.c
> > +++ b/xen/common/tasklet.c
> > @@ -30,10 +30,87 @@ static DEFINE_PER_CPU(struct list_head,
> > [...]
> > +#else
> >
> > +#define
Hi Christoph,
On Thu, Jun 8, 2017 at 3:25 PM, Christoph Hellwig wrote:
> This implementation is simply bogus - hexagon only has a simple
openrisc?
> direct mapped DMA implementation and thus doesn't care about the
> address.
>
> Signed-off-by: Christoph Hellwig
> ---
On 08/06/17 16:19, Jan Beulich wrote:
> Correct respective comments.
>
> Signed-off-by: Jan Beulich
Acked-by: Andrew Cooper
> ---
> MMUEXT_{CLEAR,COPY}_PAGE in fact also allow to be invoked on DOMID_IO
> owned pages at present. I've intentionally
>>> On 09.06.17 at 14:29, wrote:
> On 08/06/17 16:19, Jan Beulich wrote:
>> Correct respective comments.
>>
>> Signed-off-by: Jan Beulich
>
> Acked-by: Andrew Cooper
>
>> ---
>> MMUEXT_{CLEAR,COPY}_PAGE in fact also
Hi Bhupinder,
On 06/06/17 18:25, Bhupinder Thakur wrote:
These functions are generic in nature and can be reused by other emulation
code in Xen. One recent example is pl011 emulation, which needs similar
functions to read/write the registers.
This patch moves the register access function
flight 110136 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110136/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-qemuu-ovmf-amd64 15 guest-localmigrate/x10 fail in 110102
pass in 110136
>>> On 01.06.17 at 19:34, wrote:
> @@ -106,6 +106,15 @@ config TRACING
> in per-CPU ring buffers. The 'xentrace' tool can be used to read
> the buffers and dump the content on the disk.
>
> +config TRACE_IRQSOFF
> + bool "Trace when IRQs are
On Thu, Jun 08, 2017 at 02:09:09PM +0200, Dario Faggioli wrote:
> Note that a cap is considered valid only if
> it is within the [1, nr_vcpus]% interval.
>
> Signed-off-by: Dario Faggioli
Acked-by: Wei Liu
On 09/06/17 11:02, Manish Jaggi wrote:
SMMU 0
// Note that range of StreamIDs that map to DeviceIDs excludes
// the NIC 0 DeviceID as it does not generate MSIs
// Input ID --> Output reference: Output ID
0x-0x01ff --> ITS GROUP 0 : 0x1->0x101ff
0x0200-0x --> ITS GROUP 0 :
Konrad Rzeszutek Wilk writes ("Re: [OSSTEST PATCH v4 00/11] livepatch test
support"):
> On Wed, Jun 07, 2017 at 06:48:51PM +0100, Ian Jackson wrote:
> > - 06 ts-livepatch: Initial test-cases.
> > - 07 sg-run-job: Add the test-livepatch.
> > m 08 make-flight: Add livepatch build/test
All,
with the goal of releasing in about 3 weeks time, please point out
backport candidates you find missing from the respective staging
branches, but which you consider relevant. Please note that 4.6.6
is expected to be the last xenproject.org managed release from
its branch.
Andrew, I think I
On 08/06/2017 14:12, Andrew Cooper wrote:
Presented herewith is the a plan for the final part of CPUID work, which
primarily covers better Xen/Toolstack interaction for configuring the guests
CPUID policy.
A PDF version of this document is available from:
Hi Bhupinder,
On 06/06/17 18:25, Bhupinder Thakur wrote:
-/* N-bit register helpers */
-#define VGIC_REG_HELPERS(sz, offmask) \
-static inline register_t vgic_reg##sz##_extract(uint##sz##_t reg, \
-const
>>> On 09.06.17 at 14:19, wrote:
> ..., but all this has
> got me wondering why Xen bothers to read the MBR, or the EDD info for that
> matter? EDD or MBR signatures are returned by the XENPF_firmware_info
> hypercall, and Linux does seem to have code called early on
Hi Jan,
On 08/06/17 16:19, Jan Beulich wrote:
Correct respective comments.
Signed-off-by: Jan Beulich
---
MMUEXT_{CLEAR,COPY}_PAGE in fact also allow to be invoked on DOMID_IO
owned pages at present. I've intentionally not added this to the text,
as I'm not sure we really
>>> On 01.06.17 at 19:34, wrote:
> --- a/xen/common/rcupdate.c
> +++ b/xen/common/rcupdate.c
> @@ -92,6 +92,57 @@ static int qhimark = 1;
> static int qlowmark = 100;
> static int rsinterval = 1000;
>
> +#ifdef CONFIG_TRACE_RCU
> +static inline void
On 09/06/17 11:55, George Dunlap wrote:
On 09/06/17 11:51, Julien Grall wrote:
On 07/06/17 16:22, Dario Faggioli wrote:
On Wed, 2017-06-07 at 12:16 +0100, Julien Grall wrote:
Hi Dario,
Hi,
On 01/06/17 18:34, Dario Faggioli wrote:
diff --git a/xen/common/spinlock.c
Hi,
On 02/06/17 18:12, Julien Grall wrote:
> Hi Andre,
>
> On 05/26/2017 06:35 PM, Andre Przywara wrote:
>> The MAPTI commands associates a DeviceID/EventID pair with a LPI/CPU
>> pair and actually instantiates LPI interrupts. MAPI is just a variant
>> of this comment, where the LPI ID is the
>>> On 09.06.17 at 13:17, wrote:
> On Fri, 2017-06-09 at 04:59 -0600, Jan Beulich wrote:
>> > > > On 01.06.17 at 19:35, wrote:
>> > --- a/xen/common/tasklet.c
>> > +++ b/xen/common/tasklet.c
>> > @@ -30,10 +30,87 @@ static
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 08 June 2017 14:19
> To: Paul Durrant
> Cc: Julien Grall (julien.gr...@arm.com) ; Andrew
> Cooper ; xen-devel(xen-
>
1: drop unused barrier parameter from build_{read,write}_atomic()
2: consolidate atomic build_*() macros
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 09/06/17 13:07, Jan Beulich wrote:
> All,
>
> with the goal of releasing in about 3 weeks time, please point out
> backport candidates you find missing from the respective staging
> branches, but which you consider relevant. Please note that 4.6.6
> is expected to be the last xenproject.org
Hi Sergej,
On 09/06/17 12:50, Sergej Proskurin wrote:
+
+/* Normalize granule size. */
I think 0, 1, 2 is more confusing to read. It would be better to use
directly TCR_TG0_*.
I agree, however the ARM architecture uses different granularity
encodigs for TG0 and TG1. That is the
Also take the opportunity and make an attempt at making the macro
definitions readable. Drop pointless casts while doing so.
Signed-off-by: Jan Beulich
--- a/xen/include/asm-x86/atomic.h
+++ b/xen/include/asm-x86/atomic.h
@@ -4,15 +4,19 @@
#include
#include
-#define
On 07/06/17 16:22, Dario Faggioli wrote:
On Wed, 2017-06-07 at 12:16 +0100, Julien Grall wrote:
Hi Dario,
Hi,
On 01/06/17 18:34, Dario Faggioli wrote:
diff --git a/xen/common/spinlock.c b/xen/common/spinlock.c
index 2a06406..33b903e 100644
--- a/xen/common/spinlock.c
+++
>>> On 01.06.17 at 19:34, wrote:
> --- a/xen/Kconfig.debug
> +++ b/xen/Kconfig.debug
> @@ -124,6 +124,14 @@ config TRACE_RCU
> Makes it possible generate events showing the activity and the
> behavior of the RCU subsystem.
>
> +config
>>> On 01.06.17 at 19:35, wrote:
> --- a/xen/common/tasklet.c
> +++ b/xen/common/tasklet.c
> @@ -30,10 +30,87 @@ static DEFINE_PER_CPU(struct list_head,
> softirq_tasklet_list);
> /* Protects all lists and tasklet structures. */
> static
Hi Julien,
[...]
>
>> +{
>> +input_size = REGISTER_WIDTH_64_BIT - t0_sz;
>> +
>> +if ( input_size > IPS_MAX )
>> +/* We limit the input_size to be max 48 bit. */
>> +input_size = IPS_MAX;
>> +else if ( input_size <
>>> On 09.06.17 at 14:22, wrote:
> On 09/06/17 13:07, Jan Beulich wrote:
>> All,
>>
>> with the goal of releasing in about 3 weeks time, please point out
>> backport candidates you find missing from the respective staging
>> branches, but which you consider relevant.
On 09/06/17 14:20, Julien Grall wrote:
Hi Jan,
On 08/06/17 16:19, Jan Beulich wrote:
Correct respective comments.
Signed-off-by: Jan Beulich
---
MMUEXT_{CLEAR,COPY}_PAGE in fact also allow to be invoked on DOMID_IO
owned pages at present. I've intentionally not added
1 - 100 of 166 matches
Mail list logo