flight 100945 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100945/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-raw 13
On Wed, 2016-09-14 at 10:34 +0100, George Dunlap wrote:
> On 12/09/16 18:00, Dario Faggioli wrote:
> >
> > I also agree on the fact that most of the times ratelimit_us and
> > MIN_TIMER will be close enough (like in the example above) that it
> > won't probably matter much... but if someone set
On 14/09/16 07:28, Sergej Proskurin wrote:
Hi Julien,
struct arch_vcpu
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 1a004ed..de0c90a 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/include/asm-arm/p2m.h
@@ -9,6 +9,8 @@
#include
#include
+#define MAX_ALTP2M
On Wed, Sep 14, 2016 at 01:34:10PM +0100, Julien Grall wrote:
>
>
>On 14/09/16 13:18, Peng Fan wrote:
>>Hello Julien,
>>
>>On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
>>>
>>>
>>>On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
>>>
>>>Hello Peng,
>>>
On Wed, Sep 14, 2016
On Mon, Sep 12, 2016 at 02:30:39PM +0200, Roger Pau Monné wrote:
> On Sat, Sep 10, 2016 at 03:51:33PM +0530, Aashaka Shah wrote:
> > Hello! I am Aashaka. I like computer architecture and have a good knowledge
> > of C. While browsing Outreachy projects, I came across the project about
> > adding
Hello Julien,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
>Hello,
>
>On 14/09/16 08:41, Peng Fan wrote:
>>On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
>>diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
>>index 35ab08d..cc71e6f 100644
>>---
On 09/14/2016 12:13 AM, Shannon Zhao wrote:
>
> On 2016/9/8 2:59, Boris Ostrovsky wrote:
>> PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor
>> objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so
>> that it can be included in ASLs for both HVM and
>>> On 14.09.16 at 13:34, wrote:
>> On 2016-09-09 09:51, Peter Milesson wrote:
> [snip]
>>> I've been using Xen for 3 years, starting out with 4.2, and I've been
>>> upgrading regularly, and installed 4.7.0 today.
>>>
>>> I'm using Windows 10, 64-bit with PCI pass
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
>>> On 2016-09-09 09:51, Peter Milesson wrote:
>> [snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and installed 4.7.0 today.
I'm
flight 100952 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100952/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 773522000cc17f6f4323a4d97423790138ea98f2
baseline version:
xen
On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
Hello Peng,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
Hello,
On 14/09/16 08:41, Peng Fan wrote:
On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
diff --git a/xen/arch/arm/domain_build.c
flight 100944 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100944/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 100933
On Sat, Sep 10, 2016 at 9:04 PM, Sarah Newman wrote:
> On 09/10/2016 07:58 AM, Mark Pryor wrote:
>> Hello,
>>
>> In a xen 4.7 source build, pv-grub works with domU kernel 3.x.x, but not
>> with 4.x.x. So, the recent fc24, xenial, and debian sid/stretch can't use
>> pv-grub.
>
>
flight 100947 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100947/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 18b00c8c8773e62b1e2c4a36f490996325570b67
baseline version:
ovmf
On 13/09/16 19:12, Tamas K Lengyel wrote:
> Setting response flags in vm_event are only ever safe if the vCPUs are paused.
> To reflect this we move all checks within the if block that already checks
> whether this is the case. Checks that are only supported on one architecture
> we relocate the
Hello,
On 14/09/16 08:41, Peng Fan wrote:
On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 35ab08d..cc71e6f 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -28,6 +28,8 @@
>>> On 13.09.16 at 21:40, wrote:
> Allows for the conditional inclusion of VGA driver on the x86 platform
> rather than having it always enabled.
So I guess with all three of these patches an overview mail is missing.
What are you trying to accomplish? Solely reducing the
On 13/09/16 18:38, Lai, Paul wrote:
> On Mon, Sep 12, 2016 at 11:47:35AM +0100, George Dunlap wrote:
>> On 08/09/16 17:45, Lai, Paul C wrote:
>>> [Paul2] in-line
>>
>> If you're going to engage in discussions on xen-devel it would really be
>> worth your time to find a mail setup that allows you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.8b-rc6-tag
xen: regression fix for 4.8-rc6
- - Fix SMP boot in arm guests.
Thanks.
David
arch/arm/xen/enlighten.c | 7 +++
1
Hello Sergej,
On 16/08/16 23:16, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index 180154e..c69da36 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -83,8 +83,40 @@ static int do_altp2m_op(XEN_GUEST_HANDLE_PARAM(void) arg)
break;
case
On Wed, Sep 14, 2016 at 12:13:00PM +0100, George Dunlap wrote:
> On Sat, Sep 10, 2016 at 9:04 PM, Sarah Newman wrote:
> > On 09/10/2016 07:58 AM, Mark Pryor wrote:
> >> Hello,
> >>
> >> In a xen 4.7 source build, pv-grub works with domU kernel 3.x.x, but not
> >> with 4.x.x. So,
Hello Derek,
On 13/09/16 20:40, Derek Straka wrote:
diff --git a/xen/drivers/video/Kconfig b/xen/drivers/video/Kconfig
index 0ffbbd9..0f208fe 100644
--- a/xen/drivers/video/Kconfig
+++ b/xen/drivers/video/Kconfig
@@ -3,7 +3,8 @@ config VIDEO
bool
config VGA
- bool
+ bool
On 14/09/16 08:53, Sergej Proskurin wrote:
Hi Julien
[...]
static void do_trap_instr_abort_guest(struct cpu_user_regs *regs,
const union hsr hsr)
{
@@ -2445,6 +2465,14 @@ static void do_trap_instr_abort_guest(struct
cpu_user_regs *regs,
Hello Julien,
On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
>
>
>On 14/09/16 13:03, Peng Fan wrote:
>>Hello Julien,
>
>Hello Peng,
>
>>On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
>>>Hello,
>>>
>>>On 14/09/16 08:41, Peng Fan wrote:
On Wed, Sep 14, 2016 at
On 14/09/16 13:18, Peng Fan wrote:
Hello Julien,
On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
Hello Peng,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
Hello,
On 14/09/16 08:41, Peng Fan wrote:
On
On 14/09/16 14:23, Andrew Cooper wrote:
> On 14/09/16 13:50, Jan Beulich wrote:
> On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
>>> [snip]
> I've been using Xen for 3 years, starting out with 4.2, and I've been
> upgrading
On 13/09/16 14:00, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 10:47 AM, Julien Grall wrote:
Hello Sergej,
On 16/08/2016 23:16, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc:
> On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
>> I've been using Xen for 3 years, starting out with 4.2, and I've been
>> upgrading regularly, and installed 4.7.0 today.
>>
>> I'm using Windows 10, 64-bit with PCI pass through in a VM with
>> PV-drivers, using a AMD Radeon HD6450 card (AMD
On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall wrote:
> Hello Tamas,
>
> On 13/09/16 19:12, Tamas K Lengyel wrote:
>>
>> diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
>> index 53c4d78..5e9bc54 100644
>> --- a/xen/include/asm-arm/p2m.h
>> +++
On Wed, Sep 14, 2016 at 7:38 AM, George Dunlap wrote:
> On 13/09/16 19:12, Tamas K Lengyel wrote:
>> Setting response flags in vm_event are only ever safe if the vCPUs are
>> paused.
>> To reflect this we move all checks within the if block that already checks
>>
On 09/07/2016 02:59 PM, Boris Ostrovsky wrote:
> The goal here is to build ACPI tables for PVHv2/HVMlite guests while reusing
> existing
> hvmloader's ACPI builder code. The builder is provided as a library in
> tools/libacpi.
>
> This is version 3 of the series, see individual patches for
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and installed 4.7.0 today.
I'm using Windows 10,
This run is configured for baseline tests only.
flight 67711 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67711/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 18b00c8c8773e62b1e2c4a36f490996325570b67
baseline
>>> On 14.09.16 at 16:22, wrote:
> On 08/09/16 14:10, Jan Beulich wrote:
>> This way we can at least size (and e.g. skip) them if needed, and we
>> also won't raise the wrong fault due to not having read all relevant
>> bytes.
>
> What faults are you referring to? #UD
On 14/09/16 16:14, Tamas K Lengyel wrote:
On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall wrote:
Hello Tamas,
On 13/09/16 19:12, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 53c4d78..5e9bc54 100644
---
Hi Julien,
On 09/14/2016 12:57 PM, Julien Grall wrote:
>
>
> On 13/09/16 14:00, Sergej Proskurin wrote:
>> Hi Julien,
>
> Hello Sergej,
>
>>
>> On 09/12/2016 10:47 AM, Julien Grall wrote:
>>> Hello Sergej,
>>>
>>> On 16/08/2016 23:16, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
Hi Julien,
On 09/12/2016 02:08 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 16/08/16 23:17, Sergej Proskurin wrote:
>> The HVMOP_altp2m_set_mem_access allows to set gfn permissions of
>> (currently one page at a time) of a specific altp2m view. In case the
>> view does not hold the requested gfn
On 2016-09-14 15:30, George Dunlap wrote:
On 14/09/16 14:23, Andrew Cooper wrote:
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and
On 2016-09-14 16:49, Jan Beulich wrote:
On 14.09.16 at 16:04, wrote:
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
Can you think of anything that's changed between 4.6 and 4.7 that
would cause the performance problems he's
Hi all,
I wanted to get libvirt's libxl driver have per-domain logs like all other
drivers. After
looking at the libxl and XenToolLogger it seems I'll need to add the feature in
either libxl
XenToolLogger. Would anyone already have an idea how best to add API to allow
this?
Thanks for your
On 08/09/16 14:10, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
What faults are you referring to? #UD vs #GP from hitting the %cs limit?
>
> This at once adds correct
On Wed, 2016-09-14 at 02:23 +, Wu, Feng wrote:
> Then I tried to implement the function like the following:
>
> /* This function is called when pcidevs_lock is held */
> void vmx_pi_hooks_assign(struct domain *d)
> {
> if ( !iommu_intpost || !has_hvm_container_domain(d) )
>
>>> On 13.09.16 at 20:12, wrote:
> When emulating instructions the emulator maintains a small i-cache fetched
> from the guest memory. This patch extends the vm_event interface to allow
> returning this i-cache via the vm_event response instead.
I guess I'm sightly
flight 100948 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100948/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops4 host-build-prep fail in 100936 REGR. vs. 100895
Tests which
On Wed, Sep 14, 2016 at 08:40:09PM +0800, Peng Fan wrote:
> On Wed, Sep 14, 2016 at 01:34:10PM +0100, Julien Grall wrote:
> >
> >
> >On 14/09/16 13:18, Peng Fan wrote:
> >>Hello Julien,
> >>
> >>On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
> >>>
> >>>
> >>>On 14/09/16 13:03, Peng
On Wed, Sep 14, 2016 at 3:04 PM, Peter Milesson wrote:
>
>
> On 2016-09-14 14:50, Jan Beulich wrote:
>
> On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
>>>
>>> [snip]
>
> I've been using Xen for 3
On 2016-09-14 15:23, Andrew Cooper wrote:
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and
On Wed, Sep 14, 2016 at 9:15 AM, Julien Grall wrote:
>
>
> On 14/09/16 16:14, Tamas K Lengyel wrote:
>>
>> On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall
>> wrote:
>>>
>>> Hello Tamas,
>>>
>>> On 13/09/16 19:12, Tamas K Lengyel wrote:
>>> On 14.09.16 at 16:04, wrote:
> On 2016-09-14 14:50, Jan Beulich wrote:
> On 14.09.16 at 13:34, wrote:
>>> Can you think of anything that's changed between 4.6 and 4.7 that
>>> would cause the performance problems he's describing when both a video
No need to have the same logic twice.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1745,22 +1745,22 @@ static void load_segments(struct vcpu *n
(unsigned long *)pv->kernel_sp;
unsigned long cs_and_mask, rflags;
On Tue, Sep 13, 2016 at 01:30:17PM +0200, Dario Faggioli wrote:
>[using xendevel correct address]
>
>On Tue, 2016-09-13 at 16:54 +0800, Wei Yang wrote:
>> On Fri, 2016-09-09 at 17:41 +0800, Wei Yang wrote:
>> >
>> > I'm not surprised by that. Yet, I'd be interested in hearing more
>> > about this
On 2016-09-14 16:17, George Dunlap wrote:
On Wed, Sep 14, 2016 at 3:04 PM, Peter Milesson wrote:
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3
>>> On 12.09.16 at 10:16, wrote:
> This patch cleaned up the code by replacing complicated tlbflush check with
> an inline function. We should use this inline function to avoid the long
> and complicated to read tlbflush check when implementing TODOs left in
> commit
Extend the "tsc" boot parameter is to further relax TSC restrictions and
allow it to be used on machines that guarantee reliable TSC across
sockets. This is up to board manufacturers and there's no way for the OS
to probe this property, therefore user needs to explicitly set this option.
Also
To allow the caller to fetch the last read from the clocksource which
was used to calculate system_time. This is a prerequisite for a
subsequent patch that will use this last read.
Signed-off-by: Joao Martins
---
Cc: Jan Beulich
Cc: Andrew Cooper
And accomodate platform time source initialization in
try_platform_time(). This is a preparatory patch for deferring
TSC clocksource initialization to the stage where all CPUS are
up (verify_tsc_reliability init call).
Signed-off-by: Joao Martins
Reviewed-by: Konrad
On 11/09/16 11:52, Kavya Sharma wrote:
> Hello Sir,I am Kavya Sharma, an aspiring Outreachy intern.It would be my
> privilege to be an intern with xenproject.org this winter.I have read
> about Xen Hypervisor Userspace Tools and I am interested in your project
> 'golang bindings for libxl'.
>
>
On Mon, 2016-09-12 at 16:16 +0800, Dongli Zhang wrote:
> This patch implemented parts of TODO left in commit id
> a902c12ee45fc9389eb8fe54eeddaf267a555c58.
>
We usually put both the (not necessarily full) hash and the subject
line of the commit in here.
> Signed-off-by: Dongli Zhang
On 08/09/16 14:12, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
>
> Signed-off-by: Jan Beulich
> ---
> TBD: I'm kind of undecided whether to right away
On 14/09/16 16:24, Jan Beulich wrote:
> No need to have the same logic twice.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/domain.c
> +++ b/xen/arch/x86/domain.c
> @@ -1745,22 +1745,22 @@ static void load_segments(struct vcpu *n
> (unsigned long
Recent x86/time changes improved a lot of the monotonicity in xen
timekeeping, making it much harder to observe time going backwards.
Although platform timer can't be expected to be perfectly in sync with
TSC and so get_s_time won't be guaranteed to always return
monotonically increasing values
Hey,
This is v4 on the pvclock TSC series addressing comments from previous
version, see individual patches for complete changelog.
This series is divided as follows:
R * Patch 1: Small refactor around init_platform_time to reuse
initialization code when switching to
This patch proposes relying on host TSC synchronization and
passthrough to the guest, when running on a TSC-safe platform. On
time_calibration we retrieve the platform time in ns and the counter
read by the clocksource that was used to compute system time. We
introduce a new rendezous function
On Wed, 2016-09-14 at 18:44 +0800, Wei Yang wrote:
> On Tue, Sep 13, 2016 at 01:30:17PM +0200, Dario Faggioli wrote:
> >
> > Do you mind sharing just a bit more, such as:
> > - number of pcpus
> > - number of vcpus of the various VMs
> 160 pcpus
> 16 vcpus in VM and 8 VMs
>
So, 16x8=128, which
On Wed, Sep 14, 2016 at 9:55 AM, Jan Beulich wrote:
On 13.09.16 at 20:12, wrote:
>> When emulating instructions the emulator maintains a small i-cache fetched
>> from the guest memory. This patch extends the vm_event interface to allow
>>
On 08/09/16 14:14, Jan Beulich wrote:
> @@ -89,141 +54,96 @@ static unsigned long svm_nextrip_insn_le
> return vmcb->nextrip - vmcb->rip;
> }
>
> -/* First byte: Length. Following bytes: Opcode bytes. */
> -#define MAKE_INSTR(nm, ...) static const u8 OPCODE_##nm[] = { __VA_ARGS__ }
>
>>> On 14.09.16 at 18:11, wrote:
> On 08/09/16 14:11, Jan Beulich wrote:
>> @@ -1580,6 +1586,9 @@ struct x86_emulate_state {
>> ext_0f = vex_0f,
>> ext_0f38 = vex_0f38,
>> ext_0f3a = vex_0f3a,
>> +ext_8f08 = 8,
>> +ext_8f09,
On Tue, 13 Sep 2016 19:25:54 +0100 Andrew Cooper wrote:
> On 13/09/16 14:46, Mihai Donțu wrote:
> > On Tue, 13 Sep 2016 09:10:32 -0400 Konrad Rzeszutek Wilk wrote:
> >> On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
> >>> All,
> >>>
> >>> in
> >>>
On 08/09/16 14:13, Jan Beulich wrote:
> Only code movement, no functional change.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 08/09/16 14:14, Jan Beulich wrote:
"of a canonical opcode representation".
You appear to be inventing your own here, but it isn't the only
canonical form you could represent x86 opcodes with.
> --- a/xen/arch/x86/x86_emulate/x86_emulate.h
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.h
> @@
On 08/09/16 14:11, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++
flight 100951 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100951/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail in 100941 pass in
100951
test-armhf-armhf-xl-rtds
Copy data operated on during request from/to local buffers to/from
the grant references.
Before grant copy operation local buffers must be allocated what is
done by calling ioreq_init_copy_buffers. For the 'read' operation,
first, the qemu device invokes the read operation on local buffers
and on
In a linux part an ioctl(gntdev, IOCTL_GNTDEV_GRANT_COPY, ..)
system call is invoked. In mini-os the operation is yet not
implemented. For the OSs that does not implement gnttab the
call of the grant copy operation causes abort.
Signed-off-by: Paulina Szubarczyk
Hi,
It is a proposition for implementation of grant copy operation in qemu-qdisk
and interface in libxc/libs.
Changes since v6:
qemu-qdisk:
-removed blank lines
-renamed functions free_buffers -> ioreq_free_copy_buffers,
ioreq_copy -> ioreq_grant_copy
-merged the if(ioreq_copy) with the
On 14/09/2016 20:36, Andy Lutomirski wrote:
> On Wed, Sep 14, 2016 at 12:28 PM, Andrew Cooper
> wrote:
>> On 14/09/2016 20:23, Boris Ostrovsky wrote:
>>> On 09/14/2016 02:52 PM, Andy Lutomirski wrote:
On Tue, Sep 13, 2016 at 11:13 PM, Kyle Huey
On Wed, 14 Sep 2016, Julien Grall wrote:
> Hello,
>
> On 14/09/2016 02:06, Stefano Stabellini wrote:
> > On Wed, 14 Sep 2016, Shannon Zhao wrote:
> > > On 2016/9/13 23:17, Julien Grall wrote:
> > > >
> > > >
> > > > On 13/09/16 14:06, Shannon Zhao wrote:
> > > > > Hi Julien,
> > > >
> > > >
Hi Stefano,
On 14/09/2016 21:48, Stefano Stabellini wrote:
On Wed, 14 Sep 2016, Julien Grall wrote:
On 14/09/2016 02:06, Stefano Stabellini wrote:
On Wed, 14 Sep 2016, Shannon Zhao wrote:
On 2016/9/13 23:17, Julien Grall wrote:
On 13/09/16 14:06, Shannon Zhao wrote:
Hi Julien,
Hello
Xen advertises the underlying support for CPUID faulting but not does pass
through writes to the relevant MSR, nor does it virtualize it, so it does
not actually work. For now mask off the relevant bit on MSR_PLATFORM_INFO.
Signed-off-by: Kyle Huey
---
Xen advertises the underlying support for CPUID faulting but not does pass
through writes to the relevant MSR, nor does it virtualize it, so it does
not actually work. For now mask off the relevant bit on MSR_PLATFORM_INFO.
Signed-off-by: Kyle Huey
---
On 09/14/2016 02:01 PM, Kyle Huey wrote:
> Xen advertises the underlying support for CPUID faulting but not does pass
> through writes to the relevant MSR, nor does it virtualize it, so it does
> not actually work. For now mask off the relevant bit on MSR_PLATFORM_INFO.
That needs to make it into
On Thu, Sep 08, 2016 at 10:38:01AM -0400, Daniel E. Shub wrote:
> This is a follow on to a message I sent to xen-users:
> https://lists.xen.org/archives/html/xen-devel/2015-08/msg01924.html
>
> I am trying to compile Xen 4.7.0 with gcc 6.1.1, but I get an error
> related to etherboot. It was
>>> On 13.09.16 at 19:35, wrote:
> --- a/xen/drivers/char/Kconfig
> +++ b/xen/drivers/char/Kconfig
> @@ -1,6 +1,6 @@
> config HAS_NS16550
> - bool
> - default y
> + bool "NS16550 UART" if EXPERT = "y"
This need more adjustment: HAS_* options should never have
>>> On 13.09.16 at 19:35, wrote:
> --- a/xen/drivers/char/Kconfig
> +++ b/xen/drivers/char/Kconfig
> @@ -45,7 +45,8 @@ config HAS_SCIF
> say Y.
>
> config HAS_EHCI
> - bool
> + bool "EHCI UART" if EXPERT = "y"
Please make the prompt say e.g "EHCI debug port"
Hi Edgar,
On Wed, Sep 14, 2016 at 04:16:58PM +0200, Edgar E. Iglesias wrote:
>On Wed, Sep 14, 2016 at 08:40:09PM +0800, Peng Fan wrote:
>> On Wed, Sep 14, 2016 at 01:34:10PM +0100, Julien Grall wrote:
>> >
>> >
>> >On 14/09/16 13:18, Peng Fan wrote:
>> >>Hello Julien,
>> >>
>> >>On Wed, Sep 14,
flight 100954 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100954/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail like 100933
Hi all,
This is the design document of the PV Calls protocol. You can find
prototypes of the Linux frontend and backend drivers here:
git://git.kernel.org/pub/scm/linux/kernel/git/sstabellini/xen.git pvcalls-6
To use them, make sure to enable CONFIG_XEN_PVCALLS in your kernel
config and add
flight 100955 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100955/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 062f9fd2cfaad09f6dd0e302094bc030827eb706
baseline version:
ovmf
This run is configured for baseline tests only.
flight 67708 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67708/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16
Hello,
On 14/09/2016 06:12, Peng Fan wrote:
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not in 4GB address space, then the IPs will not work properly.
Introduce dom0_lowmem bootargs, user could pass
Hi, I'm Ronald Rojas an undergraduate junior studying
computer science at New York Unversity. I would like
to apply fo the Xen projects Outreachy Program. After
looking through the available projects I think I would
be a good fit for creating the golang bindings for
libxl. I'm proficient in C ,
Hello,
On 14/09/2016 02:06, Stefano Stabellini wrote:
On Wed, 14 Sep 2016, Shannon Zhao wrote:
On 2016/9/13 23:17, Julien Grall wrote:
On 13/09/16 14:06, Shannon Zhao wrote:
Hi Julien,
Hello Shannon,
On 2016/9/13 19:56, Julien Grall wrote:
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao
Hello Peng,
On 14/09/2016 02:31, Peng Fan wrote:
On Tue, Sep 13, 2016 at 02:24:31PM +0100, Julien Grall wrote:
On 13/09/16 14:12, Peng Fan wrote:
Hi Julien,
On Tue, Sep 13, 2016 at 01:59:01PM +0100, Julien Grall wrote:
Hello Peng,
On 13/09/16 13:55, Peng Fan wrote:
On AArch64 SoCs, some
Hi Julien,
>>> struct arch_vcpu
>>> diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
>>> index 1a004ed..de0c90a 100644
>>> --- a/xen/include/asm-arm/p2m.h
>>> +++ b/xen/include/asm-arm/p2m.h
>>> @@ -9,6 +9,8 @@
>>> #include
>>> #include
>>>
>>> +#define MAX_ALTP2M 10
Chen, Farrah would like to recall the message, "OVMF compile error".
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Chen, Farrah would like to recall the message, "OVMF compile error".
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 12/09/16 18:00, Dario Faggioli wrote:
> On Mon, 2016-09-12 at 16:14 +0100, George Dunlap wrote:
>> On 17/08/16 18:17, Dario Faggioli wrote:
>>>
>>> If vcpu x has run for 200us, and sched_ratelimit_us is
>>> 1000us, continue running x _but_ return 1000us-200us as
>>> the next time slice. This
Hello Tamas,
On 13/09/16 19:12, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 53c4d78..5e9bc54 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/include/asm-arm/p2m.h
@@ -121,10 +121,10 @@ typedef enum {
Hello Derek,
On 13/09/16 18:35, Derek Straka wrote:
Allows for the conditional inclusion of NS16550 UART driver on the x86 platform
rather than having it always enabled.
The default configuration for the HAS_NS16550 option remains 'y' on x86, so the
behavior out of the box remains unchanged.
Hello Derek,
On 13/09/16 18:35, Derek Straka wrote:
diff --git a/xen/drivers/char/Kconfig b/xen/drivers/char/Kconfig
index c87e018..08a60e0 100644
--- a/xen/drivers/char/Kconfig
+++ b/xen/drivers/char/Kconfig
@@ -45,7 +45,8 @@ config HAS_SCIF
say Y.
config HAS_EHCI
- bool
+
1 - 100 of 133 matches
Mail list logo