>>> On 02.03.17 at 21:56, wrote:
> Ping? I'd like the question to be sorted out before Andre is sending a
> new version.
>
> On 02/15/2017 09:25 PM, Stefano Stabellini wrote:
>> On Wed, 15 Feb 2017, Julien Grall wrote:
>>> Hi Stefano,
>>>
>>> On 14/02/17 21:00, Stefano Stabellini wrote:
On
On Thu, Mar 02, 2017 at 05:15:26PM -0800, Stefano Stabellini wrote:
> clean_dcache_va_range and clean_and_invalidate_dcache_va_range don't
> calculate the range correctly when "end" is not cacheline aligned. As a
> result, the last cacheline is not skipped. Fix the issue by aligning the
> start add
flight 106381 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106381/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 106372
test-amd64-amd64-xl-qemuu-win7-a
flight 106377 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106377/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 3 host-install(3)broken REGR. vs. 1063
flight 106378 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106378/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-amd64-xl-qemuu-
flight 106375 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106375/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
clean_dcache_va_range and clean_and_invalidate_dcache_va_range don't
calculate the range correctly when "end" is not cacheline aligned. As a
result, the last cacheline is not skipped. Fix the issue by aligning the
start address to the cacheline size.
In addition, make the code simpler and faster i
On Thu, 2 Mar 2017, Julien Grall wrote:
> On 02/03/2017 22:39, Stefano Stabellini wrote:
> > On Thu, 2 Mar 2017, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 02/03/17 19:12, Stefano Stabellini wrote:
> > > > On Thu, 2 Mar 2017, Julien Grall wrote:
> > > > > On 02/03/17 08:53, Edgar E. Igle
On 02/03/2017 23:07, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Edgar E. Iglesias wrote:
On Thu, Mar 02, 2017 at 02:39:55PM -0800, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Julien Grall wrote:
Hi Stefano,
On 02/03/17 19:12, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Julien Grall
On 02/03/2017 22:39, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Julien Grall wrote:
Hi Stefano,
On 02/03/17 19:12, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Julien Grall wrote:
On 02/03/17 08:53, Edgar E. Iglesias wrote:
On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wr
On Thu, 2 Mar 2017, Edgar E. Iglesias wrote:
> On Thu, Mar 02, 2017 at 02:39:55PM -0800, Stefano Stabellini wrote:
> > On Thu, 2 Mar 2017, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 02/03/17 19:12, Stefano Stabellini wrote:
> > > > On Thu, 2 Mar 2017, Julien Grall wrote:
> > > > > On 02/
In some cases during XenBus disconnect event handling and subsequent
queue resource release there may be some TX handlers active on
other processors. Use RCU in order to synchronize with them.
Signed-off-by: Igor Druzhinin
---
drivers/net/xen-netback/interface.c | 13 -
drivers/net/x
On Thu, Mar 02, 2017 at 02:39:55PM -0800, Stefano Stabellini wrote:
> On Thu, 2 Mar 2017, Julien Grall wrote:
> > Hi Stefano,
> >
> > On 02/03/17 19:12, Stefano Stabellini wrote:
> > > On Thu, 2 Mar 2017, Julien Grall wrote:
> > > > On 02/03/17 08:53, Edgar E. Iglesias wrote:
> > > > > On Thu, Mar
On Thu, 2 Mar 2017, Paul Durrant wrote:
> This patch modifies the wrapper functions in xen_common.h to use the
> new xendevicemodel interface if it is available along with compatibility
> code to use the old libxenctrl interface if it is not.
>
> Signed-off-by: Paul Durrant
> ---
> Cc: Stefano St
From: Anoob Soman
Date: Thu, 2 Mar 2017 10:50:20 +
> Allocation of new_hash, inside xenvif_new_hash(), always happen
> in softirq context, so use GFP_ATOMIC instead of GFP_KERNEL for new
> hash allocation.
>
> Signed-off-by: Anoob Soman
Applied.
___
On Thu, 2 Mar 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 02/03/17 19:12, Stefano Stabellini wrote:
> > On Thu, 2 Mar 2017, Julien Grall wrote:
> > > On 02/03/17 08:53, Edgar E. Iglesias wrote:
> > > > On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wrote:
> > > > > On Wed, Mar 01,
flight 106380 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106380/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
branch xen-unstable
xenbranch xen-unstable
job test-armhf-armhf-xl-cubietruck
testid guest-start
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree
flight 106371 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106371/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-vhd 9 debian-di-installfail REGR. vs. 106351
Regressions which
On Thu, Feb 23, 2017 at 04:47:19PM +, Julien Grall wrote:
>
> Hi Edgar,
>
> On 22/02/17 04:03, Edgar E. Iglesias wrote:
> >On Mon, Feb 13, 2017 at 03:35:19PM +, Julien Grall wrote:
> >>On 02/02/17 15:33, Edgar E. Iglesias wrote:
> >>>On Wed, Feb 01, 2017 at 07:04:43PM +, Julien Grall
flight 106372 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106372/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 105970
test-amd64-amd64-xl-qemuu-win7-a
Hi,
Ping? I'd like the question to be sorted out before Andre is sending a
new version.
On 02/15/2017 09:25 PM, Stefano Stabellini wrote:
On Wed, 15 Feb 2017, Julien Grall wrote:
Hi Stefano,
On 14/02/17 21:00, Stefano Stabellini wrote:
On Mon, 30 Jan 2017, Andre Przywara wrote:
+/*
+ * Ha
On Thu, Mar 2, 2017 at 10:54 AM, Volodymyr Babchuk
wrote:
> Hello,
>
> Thank you all for the discussion. I want to summarize it a bit.
>
> Looks like there are no objections about my initial list of
> requirements. There was born another requirement in the discussion.
> Thanks to Stefano for formu
c/s 5cecf60f4 "x86/cpuid: Handle leaf 0x1 in guest_cpuid()" causes Linux 4.10
to crash during boot.
It turns out to be because of the reported apic_id, which was altered to be
more consistent across guests. Revert back to the previous behaviour, by
limiting the apic_id adjustment to HVM guests on
On 02/03/17 19:33, Boris Ostrovsky wrote:
>> I expect it might have something to do with fact that this failure to
>> boot is a 6-core system, rather than a power of two, at which point I
>> doubt the APIC IDs follow a linear trend.
>>
>> (Properly fixing the reported topology is going to be a can
On 02/03/17 19:28, Sander Eikelenboom wrote:
> On 02/03/17 20:17, Andrew Cooper wrote:
>> On 02/03/17 19:15, Boris Ostrovsky wrote:
>>> On 03/02/2017 01:56 PM, Andrew Cooper wrote:
On 02/03/17 18:51, Sander Eikelenboom wrote:
> On 02/03/17 19:29, Andrew Cooper wrote:
>> On 02/03/17 18:
Hi Stefano,
On 02/03/17 19:12, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Julien Grall wrote:
On 02/03/17 08:53, Edgar E. Iglesias wrote:
On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wrote:
On Wed, Mar 01, 2017 at 05:05:21PM -0800, Stefano Stabellini wrote:
Julien, from loo
> I expect it might have something to do with fact that this failure to
> boot is a 6-core system, rather than a power of two, at which point I
> doubt the APIC IDs follow a linear trend.
>
> (Properly fixing the reported topology is going to be a can of worms.
> All this series is trying to do i
On 02/03/17 20:17, Andrew Cooper wrote:
> On 02/03/17 19:15, Boris Ostrovsky wrote:
>> On 03/02/2017 01:56 PM, Andrew Cooper wrote:
>>> On 02/03/17 18:51, Sander Eikelenboom wrote:
On 02/03/17 19:29, Andrew Cooper wrote:
> On 02/03/17 18:25, Sander Eikelenboom wrote:
>> On 02/03/17 18:
On 02/03/17 19:15, Boris Ostrovsky wrote:
> On 03/02/2017 01:56 PM, Andrew Cooper wrote:
>> On 02/03/17 18:51, Sander Eikelenboom wrote:
>>> On 02/03/17 19:29, Andrew Cooper wrote:
On 02/03/17 18:25, Sander Eikelenboom wrote:
> On 02/03/17 18:38, Andrew Cooper wrote:
>> On 02/03/17 17:
On 03/02/2017 01:56 PM, Andrew Cooper wrote:
> On 02/03/17 18:51, Sander Eikelenboom wrote:
>> On 02/03/17 19:29, Andrew Cooper wrote:
>>> On 02/03/17 18:25, Sander Eikelenboom wrote:
On 02/03/17 18:38, Andrew Cooper wrote:
> On 02/03/17 17:29, Sander Eikelenboom wrote:
>> On 02/03/17
On Thu, 2 Mar 2017, Julien Grall wrote:
> On 02/03/17 08:53, Edgar E. Iglesias wrote:
> > On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wrote:
> > > On Wed, Mar 01, 2017 at 05:05:21PM -0800, Stefano Stabellini wrote:
> > > > Hi all,
> > > >
> > > > Edgar reported a data corruption on
On 02/03/17 18:51, Sander Eikelenboom wrote:
> On 02/03/17 19:29, Andrew Cooper wrote:
>> On 02/03/17 18:25, Sander Eikelenboom wrote:
>>> On 02/03/17 18:38, Andrew Cooper wrote:
On 02/03/17 17:29, Sander Eikelenboom wrote:
> On 02/03/17 15:55, Andrew Cooper wrote:
>> On 02/03/17 14:42
On 02/03/17 19:29, Andrew Cooper wrote:
> On 02/03/17 18:25, Sander Eikelenboom wrote:
>> On 02/03/17 18:38, Andrew Cooper wrote:
>>> On 02/03/17 17:29, Sander Eikelenboom wrote:
On 02/03/17 15:55, Andrew Cooper wrote:
> On 02/03/17 14:42, Sander Eikelenboom wrote:
>> Hi Andrew / Jan,
On 02/03/17 18:25, Sander Eikelenboom wrote:
> On 02/03/17 18:38, Andrew Cooper wrote:
>> On 02/03/17 17:29, Sander Eikelenboom wrote:
>>> On 02/03/17 15:55, Andrew Cooper wrote:
On 02/03/17 14:42, Sander Eikelenboom wrote:
> Hi Andrew / Jan,
>
> While testing current xen-unstable
On 02/03/17 18:38, Andrew Cooper wrote:
> On 02/03/17 17:29, Sander Eikelenboom wrote:
>> On 02/03/17 15:55, Andrew Cooper wrote:
>>> On 02/03/17 14:42, Sander Eikelenboom wrote:
Hi Andrew / Jan,
While testing current xen-unstable staging i ran into my host rebooting in
early k
On Thu, Mar 02, 2017 at 05:53:00PM +, George Dunlap wrote:
> On 02/03/17 17:36, Ian Jackson wrote:
> > Ronald Rojas writes ("[PATCH v2 5/5] golang/xenlight: Add tests host
> > related functionality functions"):
> >> Create tests for the following functions:
> >> - GetVersionInfo
> >> - GetPhys
flight 106359 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106359/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-amd64-xl-qemuu-
On 02/03/17 17:55, Ian Jackson wrote:
> George Dunlap writes ("Re: [PATCH v2 5/5] golang/xenlight: Add tests host
> related functionality functions"):
>> On 02/03/17 17:36, Ian Jackson wrote:
>>> I assume this whole series is RFC still ?
>>
>> I think the earlier patches looked pretty close to bei
flight 106356 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106356/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 106266
test-amd64-amd64-xl-qemuu-
Hi Edgar,
On 02/03/17 08:53, Edgar E. Iglesias wrote:
On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wrote:
On Wed, Mar 01, 2017 at 05:05:21PM -0800, Stefano Stabellini wrote:
Hi all,
Edgar reported a data corruption on network packets in dom0 when the
swiotlb-xen is in use. He a
On 02/03/17 17:29, Sander Eikelenboom wrote:
> On 02/03/17 15:55, Andrew Cooper wrote:
>> On 02/03/17 14:42, Sander Eikelenboom wrote:
>>> Hi Andrew / Jan,
>>>
>>> While testing current xen-unstable staging i ran into my host rebooting in
>>> early kernel boot.
>>> Bisection has turned up:
>>>
George Dunlap writes ("Re: [PATCH v2 5/5] golang/xenlight: Add tests host
related functionality functions"):
> On 02/03/17 17:36, Ian Jackson wrote:
> > I assume this whole series is RFC still ?
>
> I think the earlier patches looked pretty close to being checked in. I
> think having a basic chu
Hello,
Thank you all for the discussion. I want to summarize it a bit.
Looks like there are no objections about my initial list of
requirements. There was born another requirement in the discussion.
Thanks to Stefano for formulation it:
10. Domains on which the monitor privileged call feature is
Balloon driver uses several PV-only concepts (xen_start_info,
xen_extra_mem,..) and it seems the simpliest solution to make HVM-only
build happy is to decorate these parts with #ifdefs.
Signed-off-by: Vitaly Kuznetsov
---
drivers/xen/balloon.c | 30 --
1 file changed,
After code split between PV and HVM some functions in xen_smp_ops have
xen_pv_ prefix and some only xen_ which makes them look like they're
common for both PV and HVM while they're not. Rename all the rest to
have xen_pv_ prefix.
Signed-off-by: Vitaly Kuznetsov
---
- This patch is rather a matter
Basically, enlighten.c is renamed to enlighten_pv.c and some code moved
out to common enlighten.c.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Makefile |4 +-
arch/x86/xen/enlighten.c| 1626 ++-
arch/x86/xen/enlighten_pv.c | 1552 +++
__pfn_to_mfn() is only used from PV code (mmu_pv.c, p2m.c) and from
page.h where all functions calling it check for
xen_feature(XENFEAT_auto_translated_physmap) first so we can replace
it with any stub to make build happy.
set_foreign_p2m_mapping()/clear_foreign_p2m_mapping() are used from
grant-t
Now everything is in place and we can move PV-only code under
CONFIG_XEN_PV. CONFIG_XEN_PV_SMP is created to support the change.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Kconfig | 4
arch/x86/xen/Makefile | 9 +
2 files changed, 9 insertions(+), 4 deletions(-)
diff --git a
Slit the code in suspend.c into suspend_pv.c and suspend_hvm.c.
Reviewed-by: Juergen Gross
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Makefile | 3 ++-
arch/x86/xen/suspend.c | 54 --
arch/x86/xen/suspend_hvm.c | 22 +++
Basically, smp.c is renamed to smp_pv.c and some code moved out to common
smp.c. struct xen_common_irq delcaration ended up in smp.h.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Makefile | 2 +-
arch/x86/xen/smp.c| 487 +---
arch/x86/xen/smp
Move PVHVM related code to mmu_hvm.c.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Makefile | 2 +-
arch/x86/xen/mmu.c | 74 --
arch/x86/xen/mmu_hvm.c | 79 ++
3 files changed, 80 insertions(+),
startup_xen references PV-only code, decorate it with #ifdef CONFIG_XEN_PV
to make PV-free builds possible.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/xen-head.S | 4
1 file changed, 4 insertions(+)
diff --git a/arch/x86/xen/xen-head.S b/arch/x86/xen/xen-head.S
index 37794e4..72a8e6a
xen_create_contiguous_region()/xen_create_contiguous_region() are PV-only,
they both contain xen_feature(XENFEAT_auto_translated_physmap) check and
bail in the very beginning.
Signed-off-by: Vitaly Kuznetsov
---
include/xen/xen-ops.h | 14 ++
1 file changed, 14 insertions(+)
diff --
Create enlighten_pvh.c by splitting off PVH related code from enlighten.c,
put it under CONFIG_XEN_PVH.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Makefile| 2 +
arch/x86/xen/enlighten.c | 110 -
arch/x86/xen/enlighten_pvh.c | 114 +
xen_pmu_init/finish() functions are used in suspend.c and
enlighten.c, add stubs for now.
Reviewed-by: Juergen Gross
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Kconfig | 2 +-
arch/x86/xen/Makefile | 6 +++---
arch/x86/xen/pmu.h| 5 +
3 files changed, 9 insertions(+), 4 deletions
xen_smp_intr_init() and xen_smp_intr_free() have PV-specific code and as
a praparatory change to splitting smp.c we need to split these fucntions.
Create xen_smp_intr_init_pv()/xen_smp_intr_free_pv().
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/enlighten_pv.c | 9 +
arch/x86/xen/sm
Split xen_cpu_die() into xen_pv_cpu_die() and xen_hvm_cpu_die() to support
further splitting of smp.c.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/smp.c | 26 --
1 file changed, 20 insertions(+), 6 deletions(-)
diff --git a/arch/x86/xen/smp.c b/arch/x86/xen/smp.c
in
have_vcpu_info_placement applies to both PV and HVM and as we're going
to split the code we need to make it global.
Rename to xen_have_vcpu_info_placement.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/enlighten.c | 12 ++--
arch/x86/xen/xen-ops.h | 2 ++
2 files changed, 8 insert
Move PVHVM related code to enlighten_hvm.c. Three functions:
xen_cpuhp_setup(), xen_reboot(), xen_emergency_restart() are shared, drop
static qualifier from them. These functions will go to common code once
it is split from enlighten.c.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Makefile
All code to supprot Xen PV will get under this new option. For the
beginning, check for it in the common code.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/kernel/cpu/hypervisor.c | 4 +++-
arch/x86/kernel/process_64.c | 2 +-
arch/x86/xen/Kconfig | 23 ++-
Split xen_smp_prepare_boot_cpu() into xen_pv_smp_prepare_boot_cpu() and
xen_hvm_smp_prepare_boot_cpu() to support further splitting of smp.c.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/smp.c | 49 ++---
1 file changed, 30 insertions(+), 19 deleti
Move PVHVM related code to smp_hvm.c. Drop 'static' qualifier from
xen_smp_send_reschedule(), xen_smp_send_call_function_ipi(),
xen_smp_send_call_function_single_ipi(), these functions will be moved to
common smp code when smp_pv.c is split.
Signed-off-by: Vitaly Kuznetsov
---
arch/x86/xen/Kconf
Changes since v1:
- Patches 1,2 and 3 were split and reordered to avoid adding temporary
#ifdefs [Juergen Gross]
- Juergen's R-b added to what is now patches 14 and 15 (patches 4 and 5
in v1). Due to re-ordering there are some tiny diffrences but I opted
for keeping the tag.
Some patches are
As a preparation to splitting the code we need to untangle it:
x86_hyper_xen -> x86_hyper_xen_hvm and x86_hyper_xen_pv
xen_platform() -> xen_platform_hvm() and xen_platform_pv()
xen_cpu_up_prepare() -> xen_cpu_up_prepare_pv() and xen_cpu_up_prepare_hvm()
xen_cpu_dead() -> xen_cpu_dead_pv() and xen
On 02/03/17 17:36, Ian Jackson wrote:
> Ronald Rojas writes ("[PATCH v2 5/5] golang/xenlight: Add tests host related
> functionality functions"):
>> Create tests for the following functions:
>> - GetVersionInfo
>> - GetPhysinfo
>> - GetDominfo
>> - GetMaxCpus
>> - GetOnlineCpus
>> - GetMaxNodes
>>
flight 106374 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106374/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
Ronald Rojas writes ("[PATCH v2 5/5] golang/xenlight: Add tests host related
functionality functions"):
> Create tests for the following functions:
> - GetVersionInfo
> - GetPhysinfo
> - GetDominfo
> - GetMaxCpus
> - GetOnlineCpus
> - GetMaxNodes
> - GetFreeMemory
I assume this whole series is RF
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Enable CONFIG_ACPI_NUMA to enable ACPI NUMA
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/Kconfig | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index fbc4f
On 02/03/17 15:55, Andrew Cooper wrote:
> On 02/03/17 14:42, Sander Eikelenboom wrote:
>> Hi Andrew / Jan,
>>
>> While testing current xen-unstable staging i ran into my host rebooting in
>> early kernel boot.
>> Bisection has turned up:
>> 5cecf60f439e828f4bc0d2a368ced9a73b130cb7 is the firs
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Enable CONFIG_NUMA to enable DT NUMA
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/Kconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index 2e023d1..fbc4f23
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Call ACPI NUMA initialization under CONFIG_ACPI_NUMA.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/numa.c | 12 +++-
xen/common/numa.c | 6 ++
2 files changed, 17 insertions(+), 1 deletion(-)
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Update node_distance() function to handle
ACPI SLIT table information.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/numa.c | 20 +++-
1 file changed, 19 insertions(+), 1 deletion(-)
diff --gi
(+ Jan as ACPI maintainer)
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Register SRAT entry handler for type
ACPI_SRAT_TYPE_GICC_AFFINITY to parse SRAT table
and extract proximity for all CPU IDs.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/acpi_numa.
2017-03-02 16:29 keltezéssel, Simon Weald írta:
Hello
I don't know whether this classifies as a bug or missing functionality,
but I'm looking to attach Ceph RBD volumes directly to a guest (as
opposed to mapping them on the host and then passing the block device to
the guest). The rationale for
On Thu, 2 Mar 2017 15:28:16 +0100
Michal Hocko wrote:
> On Thu 02-03-17 14:53:48, Igor Mammedov wrote:
> [...]
> > When trying to support memory unplug on guest side in RHEL7,
> > experience shows otherwise. Simplistic udev rule which onlines
> > added block doesn't work in case one wants to onli
On 02/03/17 16:41, Vijay Kilari wrote:
On Thu, Mar 2, 2017 at 9:58 PM, Julien Grall wrote:
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse MADT table and extract MPIDR for all
CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries
and store in c
On Thu, Mar 2, 2017 at 9:58 PM, Julien Grall wrote:
> Hello Vijay,
>
> On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Parse MADT table and extract MPIDR for all
>> CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries
>> and store in cpu_uid_to_hwid[].
>>
>>
At 14:03 + on 27 Feb (1488204198), Andrew Cooper wrote:
> The existing pagetable walker has complicated return semantics, which squeeze
> multiple pieces of information into single integer. This would be fine if the
> information didn't overlap, but it does.
>
> Specifically, _PAGE_INVALID_BI
On 02/03/17 16:31, Vijay Kilari wrote:
On Thu, Mar 2, 2017 at 9:00 PM, Julien Grall wrote:
Missing emacs magic here.
You mean this at the end of the file?
Yes.
/*
* Local variables:
* mode: C
* c-file-style: "BSD"
* c-basic-offset: 4
* indent-tabs-mode: nil
* End:
*/
--
Julien
On Thu, Mar 2, 2017 at 9:00 PM, Julien Grall wrote:
> Hello Vijay,
>
> On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Move SRAT handling code which is common across
>> architecture is moved to new file xen/commom/srat.c
>> from xen/arch/x86/srat.c file. New head
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse MADT table and extract MPIDR for all
CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries
and store in cpu_uid_to_hwid[].
This mapping is used by SRAT table parsing to
extract MPIDR of the CPU ID.
Si
On Thu, Mar 2, 2017 at 9:39 PM, Julien Grall wrote:
> Hello Vijay,
>
> On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> On NUMA initialization failure, reset all the
>> NUMA structures to emulate as single node.
>>
>> Signed-off-by: Vijaya Kumar
>> ---
>> xen/ar
On Thu, Mar 2, 2017 at 9:35 PM, Julien Grall wrote:
> Hello Vijay,
>
>
> On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> For all banks in bootinfo.mem, update nodes[] with
>> corresponding nodeid and register these nodes by
>> calling setup_node_bootmem().
>> com
At 14:03 + on 27 Feb (1488204193), Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper
Reviewed-by: Tim Deegan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
flight 106354 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106354/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
At 14:03 + on 27 Feb (1488204197), Andrew Cooper wrote:
> hap_p2m_ga_to_gfn() and sh_page_fault() currently use guest_l1e_get_gfn() to
> obtain the translation of a pagewalk. This is conceptually wrong (the
> semantics of gw.l1e is an internal detail), and will actually be wrong when
> PSE36 s
At 14:03 + on 27 Feb (1488204194), Andrew Cooper wrote:
> Some bits are unconditionally reserved in pagetable entries, or reserved
> because of alignment restrictions. Other bits are reserved because of control
> register configuration.
>
> Introduce helpers which take an individual vcpu and
At 14:03 + on 27 Feb (1488204192), Andrew Cooper wrote:
> All actions which refer to the active ldt/gdt/idt or task register
> (e.g. loading a new segment selector) are known as implicit supervisor
> accesses, even when the access originates from user code.
>
> The distinction is necessary in
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
On NUMA initialization failure, reset all the
NUMA structures to emulate as single node.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/numa.c | 50 --
1 file cha
Add calls for the following host-related functionality:
- libxl_domain_info
- libxl_domain_unpause
Include Golang version for the libxl_domain_info as
DomainInfo.
Signed-off-by: George Dunlap
Signed-off-by: Ronald Rojas
---
Changes since last version
- Created type and enumeration of DomainType
Create error type Errorxl for throwing proper xenlight
errors.
Update Ctx functions to throw Errorxl errors.
Signed-off-by: Ronald Rojas
---
Changes since last patch:
- Whitespace fixes
CC: xen-devel@lists.xen.org
CC: george.dun...@citrix.com
CC: ian.jack...@eu.citrix.com
CC: wei.l...@citrix.c
Create a basic Makefile to build and install libxenlight Golang
bindings. Also add a stub package which only opens libxl context.
Include a global xenlight.Ctx variable which can be used as the
default context by the entire program if desired.
For now, return simple errors. Proper error handling
Hello Vijay,
On 09/02/17 15:57, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
For all banks in bootinfo.mem, update nodes[] with
corresponding nodeid and register these nodes by
calling setup_node_bootmem().
compute memnode_shift and initialize memnodemap[] to fetch
nodeid for a given phy
On 03/02/2017 09:59 AM, Andrew Cooper wrote:
> hvm_set_cr{0,4}() are reachable from the emulator, but use
> hvm_inject_hw_exception() directly.
>
> Alter the API to make the callers of hvm_set_cr{0,3,4}() responsible for
> raising #GP, and apply this change to all existing callers.
>
> Signed-off-b
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 02 March 2017 15:00
> To: Xen-devel
> Cc: Andrew Cooper ; Jan Beulich
> ; Paul Durrant ; Jun
> Nakajima ; Kevin Tian ;
> Boris Ostrovsky ; Suravee Suthikulpanit
>
> Subject: [PATCH 1/2] x86/hvm: Don't ra
>>> On 02.03.17 at 16:39, wrote:
> From: Andy Lutomirski
>
> The Intel microcode driver is using sync_core() to mean "do CPUID
> with EAX=1".
>
> Signed-off-by: Andy Lutomirski
> Acked-by: Borislav Petkov
> [Linux commit 484d0e5c7943644cc46e7308a8f9d83be598f2b9]
> [Ported to Xen]
> Signed-off
From: Andy Lutomirski
The Intel microcode driver is using sync_core() to mean "do CPUID
with EAX=1".
Signed-off-by: Andy Lutomirski
Acked-by: Borislav Petkov
[Linux commit 484d0e5c7943644cc46e7308a8f9d83be598f2b9]
[Ported to Xen]
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch
>>> On 02.03.17 at 16:27, wrote:
> From: keios
>
> It is a non-standard heap-sort algorithm implementation because the index
> of child node is wrong . The sort function still outputs right result, but
> the performance is O( n * ( log(n) + 1 ) ) , about 10% ~ 20% worse than
> standard algorith
On 02/03/17 15:33, Jan Beulich wrote:
On 02.03.17 at 16:06, wrote:
>> On 02/03/17 13:08, Jan Beulich wrote:
>>> start_svm() already runs after cpu_data[] was set up, so it shouldn't
>>> modify it anymore (at least not directly). Constify the involved
>>> pointers.
>>>
>>> Furthermore LMSLE fe
1 - 100 of 233 matches
Mail list logo