On 2017/8/29 21:55, Konrad Rzeszutek Wilk wrote:
On Tue, Aug 29, 2017 at 11:46:35AM +, Yang Zhang wrote:
So far, pv_idle_ops.poll is the only ops for pv_idle. .poll is called in
idle path which will polling for a while before we enter the real idle
state.
In virtualization, idle path includ
flight 112987 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112987/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
On 2017年08月31日 23:38, Roger Pau Monné wrote:
> On Thu, Aug 31, 2017 at 01:01:47AM -0400, Lan Tianyu wrote:
>> This patch is to change DSDT table for processor object to support >128 vcpus
>> accroding to ACPI spec 8.4 Declaring Processors
>>
>> Signed-off-by: Lan Tianyu
>> ---
>> tools/libacpi/mk
flight 112983 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112983/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-multivcpu 4 host-install(4) broken in 112968 pass in 112983
test-amd64-i386-xl-qemuu-debianh
This run is configured for baseline tests only.
flight 72047 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72047/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f29ca8e8b96adc2539f44d41ed8521ef6d29c14c
baseline v
On Thu, Aug 31, 2017 at 02:33:57AM -0600, Jan Beulich wrote:
On 31.08.17 at 09:15, wrote:
>> On Thu, Aug 31, 2017 at 01:42:53AM -0600, Jan Beulich wrote:
>> On 31.08.17 at 00:57, wrote:
On Wed, Aug 30, 2017 at 10:00:49AM -0600, Jan Beulich wrote:
On 16.08.17 at 07:14, wrot
flight 112981 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112981/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1 build-che
flight 112986 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112986/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f29ca8e8b96adc2539f44d41ed8521ef6d29c14c
baseline version:
ovmf ea8314e4402f6c385b6e4
This run is configured for baseline tests only.
flight 72046 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72046/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-localmi
When running as Xen pv-guest the exception frame on the stack contains
%r11 and %rcx additional to the other data pushed by the processor.
Instead of having a paravirt op being called for each exception type
prepend the Xen specific code to each exception entry. When running as
Xen pv-guest just u
From: Jérôme Glisse
Call to mmu_notifier_invalidate_page() are replaced by call to
mmu_notifier_invalidate_range() and thus call are bracketed by
call to mmu_notifier_invalidate_range_start()/end()
Remove now useless invalidate_page callback.
Signed-off-by: Jérôme Glisse
Reviewed-by: Boris Ost
From: Jérôme Glisse
(Sorry for so many list cross-posting and big cc)
Changes since v1:
- remove more dead code in kvm (no testing impact)
- more accurate end address computation (patch 2)
in page_mkclean_one and try_to_unmap_one
- added tested-by/reviewed-by gotten so far
Tested as b
On 31/08/17 16:01, Boris Ostrovsky wrote:
> On 08/31/2017 08:00 AM, Thomas Gleixner wrote:
>> On Thu, 31 Aug 2017, Juergen Gross wrote:
I've applied it on top of tip:x86/apic and fixed up the merge conflicts
mindlessly. Patch below.
Juergen, can you please check the result?
>>>
flight 112979 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112979/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 10 debian-install fail REGR. vs. 112869
test-armhf-armhf-
On 08/29/2017 04:53 PM, Gary R Hook wrote:
Hm. For some odd reason I stopped receiving xen-devel mail a while ago.
I never
unsubscribed, never turned anything off (to the best of my knowledge). Now
a co-worker is unable to subscribe.
What's up with that? Any ideas?
Looks like we may have a pro
Hi Volodymyr,
On 08/31/2017 04:58 PM, Volodymyr Babchuk wrote:
> Hi Sergej
>
> On 31.08.17 16:51, Sergej Proskurin wrote:
>> Hi Volodymyr,
>>
>>
>> On 08/31/2017 02:44 PM, Volodymyr Babchuk wrote:
>>> Hello Sergej,
>>>
>>> On 31.08.17 15:20, Sergej Proskurin wrote:
Hi Volodymyr, hi Julien,
>
This feature indicates that hypervisor is compatible with ARM
SMC calling convention. Previously hypervisor would inject an
undefined instruction exception if an invalid SMC function were
called or would crash a domain if an invalid HVC function
were invoked.
XENFEAT_ARM_SMCCC_supported feature mea
PSCI handling code had helper routine that checked calling convention.
It does not needed anymore, because:
- Generic handler checks that 64 bit calls can be made only by
64 bit guests.
- SMCCC requires that 64-bit handler should support both 32 and 64 bit
calls even if they originate fro
SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs.
SMCCC states that both HVC and SMC are valid conduits to call to different
firmware functions. Thus, for example, PSCI calls can be made both by
SMC or HVC. Also SMCCC defines function number coding for such calls.
Besides func
PSCI is part of HVC/SMC interface, so it should be handled in
appropriate place: `vsmc.c`. This patch moves PSCI handler
calls from `traps.c` to `vsmc.c`. Also it corrects coding
style of the PSCI handler functions.
Older PSCI 0.1 uses SMC function identifiers in range that is
reserved for existin
smccc.h provides definitions to construct SMC call function number according
to SMCCC. We don't need multiple definitions for one thing, and definitions
in smccc.h are more generic than ones used in psci.h.
So psci.h will only provide function codes, while whole SMC function
identifier will be con
Trapped SMC instruction can fail condition check on ARMv8 architecture
(ARM DDI 0487B.a page D7-2271). So we need to check if condition was meet.
Signed-off-by: Volodymyr Babchuk
Reviewed-by: Julien Grall
---
* added Julien's R-b tag
---
xen/arch/arm/traps.c | 6 ++
1 file changed, 6 inser
Added type xen_uuid_t. This type represents UUID as an array of 16
bytes in big endian format.
Added macro XEN_DEFINE_UUID that constructs UUID in the usual way:
XEN_DEFINE_UUID(00112233, 4455, 6677, 8899, aabbccddeeff)
will construct UUID 00112233-4455-6677-8899-aabbccddeeff presented as
{0x0
This patch define HSR_XXC_IMM_MASK. It can be used to extract
immediate value for trapped HVC32, HVC64, SMC64, SVC32, SVC64
instructions, as described in the ARM ARM
(ARM DDI 0487B.a pages D7-2270, D7-2272).
Signed-off-by: Volodymyr Babchuk
---
* spelling fixes
---
xen/include/asm-arm/process
There are standard functions set_user_reg() and get_user_reg(). We can
use them in PSCI_SET_RESULT()/PSCI_ARG() macros instead of relying on
CONFIG_ARM_64 definition.
Signed-off-by: Volodymyr Babchuk
---
* removed 0x mask
* coding style left unchanged, because it will be fixed in next p
Hello all,
v5:
* Patches that add end enable XENFEAT_ARM_SMCCC_supported were
squashed together
* All other chages are described in corresponding patches
This patch series still depend on Julien's patches for traps.c cleanup ([1]).
---
v4:
* Added patch with public definitiod for xen_uuid
This patch adds generic definitions used in ARM SMC call convention.
Those definitions was taken from linux header arm-smccc.h, extended
and formatted according to XEN coding style. Some of the macros were
converted to inlined functions to ease parsing.
They can be used by both SMCCC clients (like
flight 112978 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112978/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail in 112966
pass in 112978
test-amd64-i386-xl-qem
flight 112985 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112985/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf 295eeb7e3cd8c506c5ade03865a0e440a5cd8b22
baseline version:
xtf b369b8f9cc89f906deba9a
On Thu, 31 Aug 2017, Boris Ostrovsky wrote:
> On 08/31/2017 08:00 AM, Thomas Gleixner wrote:
> > On Thu, 31 Aug 2017, Juergen Gross wrote:
> >>> I've applied it on top of tip:x86/apic and fixed up the merge conflicts
> >>> mindlessly. Patch below.
> >>>
> >>> Juergen, can you please check the resu
flight 112973 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112973/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 5 host-build-prep fail REGR. vs. 112863
test-amd64-i386-xl-qe
From: Juergen Gross
When running as Xen pv-guest the exception frame on the stack contains
%r11 and %rcx additional to the other data pushed by the processor.
Instead of having a paravirt op being called for each exception type
prepend the Xen specific code to each exception entry. When running
flight 112988 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112988/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
Luckily, this isn't a security issue, because the fix for XSA-202 (c/s
0e47f92b072) took a proactive aproach and clobbered these flags on the
exit-to-guest path.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/domain.c | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
flight 112974 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112974/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1 build-check(1)
This run is configured for baseline tests only.
flight 72045 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72045/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ea8314e4402f6c385b6e41e4f7803853e64e421b
baseline v
On 31/08/17 16:55, Jan Beulich wrote:
> There's no reason for the first Mb to be excluded here. Enforce the
> restriction right in the top level page table entries.
>
> Suggested-by: Andrew Cooper
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
_
>>> On 16.08.17 at 07:14, wrote:
> +static inline bool pi_over_limit(unsigned int cpu)
> +{
> +/* Compare w/ constant first to save a division and an add */
> +if ( likely(read_atomic(&per_cpu(vmx_pi_blocking, cpu).counter) <=
> +PI_LIST_FIXED_LIMIT) )
> +return 0;
On Thu, Aug 31, 2017 at 09:07:59AM -0600, Jan Beulich wrote:
> >>> On 31.08.17 at 16:58, wrote:
> > --- a/xen/include/public/arch-x86/xen.h
> > +++ b/xen/include/public/arch-x86/xen.h
> > @@ -162,14 +162,10 @@ typedef uint64_t tsc_timestamp_t; /* RDTSC timestamp
> > */
> > * The following is al
There's no reason for the first Mb to be excluded here. Enforce the
restriction right in the top level page table entries.
Suggested-by: Andrew Cooper
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@ -887,32 +887,21 @@ void __init subarch_init_memory(v
On Thu, Aug 31, 2017 at 09:16:35AM -0600, Jan Beulich wrote:
> >>> On 31.08.17 at 17:10, wrote:
> > Changes since v1:
> > - Completely remove the comment, HVM guests also use
> >vcpu_hvm_context instead of vcpu_guest_context.
>
> Are you sure? Specifically for ...
>
> > --- a/xen/include/pu
On Wed, Aug 30, 2017 at 03:15:09PM +0100, George Dunlap wrote:
> On 08/30/2017 02:54 PM, Andrew Cooper wrote:
> > On 30/08/17 14:49, osstest service owner wrote:
> >> flight 112957 xen-unstable-smoke real [real]
> >> http://logs.test-lab.xenproject.org/osstest/logs/112957/
> >>
> >> Regressions :-(
On Thu, Aug 31, 2017 at 01:01:47AM -0400, Lan Tianyu wrote:
> This patch is to change DSDT table for processor object to support >128 vcpus
> accroding to ACPI spec 8.4 Declaring Processors
>
> Signed-off-by: Lan Tianyu
> ---
> tools/libacpi/mk_dsdt.c | 18 --
> 1 file changed, 1
>>> On 31.08.17 at 17:10, wrote:
> Changes since v1:
> - Completely remove the comment, HVM guests also use
>vcpu_hvm_context instead of vcpu_guest_context.
Are you sure? Specifically for ...
> --- a/xen/include/public/arch-x86/xen.h
> +++ b/xen/include/public/arch-x86/xen.h
> @@ -161,15 +1
flight 112984 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112984/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
>>> On 31.08.17 at 15:21, wrote:
> So, will it be acceptable to use my approach with that union?
As per Ian's reply, go with just the containerized uint8_t[].
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
flight 112970 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112970/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
test-armhf-armhf-lib
From the vcpu_guest_context structure. PVHv2/HVM uses a completely
different structure (vcpu_hvm_context), that's described in
hvm_vpcu.h.
Reported-by: Andrew Cooper
Signed-off-by: Roger Pau Monné
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wi
>>> On 31.08.17 at 16:58, wrote:
> --- a/xen/include/public/arch-x86/xen.h
> +++ b/xen/include/public/arch-x86/xen.h
> @@ -162,14 +162,10 @@ typedef uint64_t tsc_timestamp_t; /* RDTSC timestamp
> */
> * The following is all CPU context. Note that the fpu_ctxt block is filled
> * in by FXSAVE
On Thu, Aug 31, 2017 at 01:36:13PM +0100, Andrew Cooper wrote:
> On 31/08/17 13:03, Jan Beulich wrote:
> On 31.08.17 at 13:45, wrote:
> >> There is only one function gate_op_read that needs to be modified.
> > I'm fine with it just being read() here, but I can see this being possibly
> > cont
On Thu, Aug 31, 2017 at 09:16:14AM -0400, Boris Ostrovsky wrote:
> There is no need to scrub pages freed during dom0 construction since
> once dom0 is ready the heap will be scrubbed by scrub_heap_pages() anyway,
> setting scrub_debug at the end.
>
> Signed-off-by: Boris Ostrovsky
Reviewed-by: W
Hi Sergej
On 31.08.17 16:51, Sergej Proskurin wrote:
Hi Volodymyr,
On 08/31/2017 02:44 PM, Volodymyr Babchuk wrote:
Hello Sergej,
On 31.08.17 15:20, Sergej Proskurin wrote:
Hi Volodymyr, hi Julien,
On 08/24/2017 07:25 PM, Julien Grall wrote:
On 21/08/17 21:27, Volodymyr Babchuk wrote:
From the vcpu_guest_context structure. PVHv2 uses it in the same exact
way as HVM guests, and from the hypervisor point of view PVHv2 is not
even a different guest type, so only mention HVM in the public
headers.
Reported-by: Andrew Cooper
Signed-off-by: Roger Pau Monné
---
Cc: Andrew Cooper
Cc
Volodymyr Babchuk writes ("Re: [PATCH v4 03/11] public: xen.h: add definitions
for UUID handling"):
> Do you have any ideas how to indicate endianess of the fields, then? I
> can just write it in the comments. But I fear of misuse.
I definitely prefer your approach of providing only an array. (
Hi Jan,
On 08/31/2017 12:19 PM, Jan Beulich wrote:
On 31.08.17 at 11:49, wrote:
>> On 08/31/2017 10:04 AM, Jan Beulich wrote:
>> On 30.08.17 at 20:32, wrote:
We move the macros (MAX|INVALID)_ALTP2M out of x86-related code to
common code, as the following patches will make use
On 08/31/2017 08:00 AM, Thomas Gleixner wrote:
> On Thu, 31 Aug 2017, Juergen Gross wrote:
>>> I've applied it on top of tip:x86/apic and fixed up the merge conflicts
>>> mindlessly. Patch below.
>>>
>>> Juergen, can you please check the result?
>> You missed the updates to arch/x86/xen/xen-asm_64.
On 31/08/17 06:01, Lan Tianyu wrote:
> From: Chao Gao
>
> This patch is to extend lapic_id() to support more vcpus.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 31/08/17 06:01, Lan Tianyu wrote:
> This patch is to increase hap page pool size to support more vcpus in single
> VM.
>
> Signed-off-by: Lan Tianyu
> ---
> xen/arch/x86/mm/hap/hap.c | 10 +-
> 1 file changed, 9 insertions(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/mm/hap/hap.c b
Hi Volodymyr,
On 08/31/2017 02:44 PM, Volodymyr Babchuk wrote:
> Hello Sergej,
>
> On 31.08.17 15:20, Sergej Proskurin wrote:
>> Hi Volodymyr, hi Julien,
>>
>>
>> On 08/24/2017 07:25 PM, Julien Grall wrote:
>>>
>>>
>>> On 21/08/17 21:27, Volodymyr Babchuk wrote:
This feature indicates that h
flight 112971 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112971/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ea8314e4402f6c385b6e41e4f7803853e64e421b
baseline version:
ovmf 5202e6c907e5769ac8ecb
On 31.08.17 15:53, Jan Beulich wrote:
On 31.08.17 at 14:24, wrote:
Hi Jan,
On 31.08.17 10:34, Jan Beulich wrote:
On 30.08.17 at 18:20, wrote:
My first intention was to declare union with all possible
representations, so it would be possible to access the same UUID as an
array of bytes or,
Rename it to the more appropriate scrub_debug and define as a macro
for !CONFIG_SCRUB_DEBUG. This will allow us to get rid of some
ifdefs (here and in the subsequent patch).
Signed-off-by: Boris Ostrovsky
Suggested-by: Jan Beulich
Reviewed-by: Wei Liu
---
xen/common/page_alloc.c | 15 ++---
First patch fixes a long-standing bug where a low memory monitor is
not initialized if boottime scrubbing is turned off.
The other threee patches are performace and readability optimizations.
I will send the last patch from previous posting (the one that broke the
tree) later. I have a couple of
scrub_heap_pages() does early return if boot-time scrubbing is
disabled, neglecting to initialize lowmem VIRQ.
Because setup_low_mem_virq() doesn't logically belong in
scrub_heap_pages() we put them both into the newly added
heap_init_late().
Signed-off-by: Boris Ostrovsky
Reviewed-by: Wei Liu
If scrub_debug is off we don't check pages in check_one_page().
Thus there is no reason to ever poison them.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Wei Liu
---
xen/common/page_alloc.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
i
There is no need to scrub pages freed during dom0 construction since
once dom0 is ready the heap will be scrubbed by scrub_heap_pages() anyway,
setting scrub_debug at the end.
Signed-off-by: Boris Ostrovsky
---
Changes in v2:
* Use '||' instead of '|'. Drop '!!'
* Clarified commit message.
xen/
>>> On 31.08.17 at 14:24, wrote:
> Hi Jan,
>
> On 31.08.17 10:34, Jan Beulich wrote:
> On 30.08.17 at 18:20, wrote:
>>> My first intention was to declare union with all possible
>>> representations, so it would be possible to access the same UUID as an
>>> array of bytes or, for example, as
flight 112982 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112982/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
flight 112968 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112968/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 4 host-install(4) broken REGR. vs. 112948
test-amd64-i386-xl-
>>> On 31.08.17 at 12:27, wrote:
> vMCE: Is MCE an x86-only thing, or could this conceivably by extended
> to ARM?
I think this can't be reasonably extended beyond x86 (and,
considering their similar origin, ia64).
> +## Tooling
> +
> +### gdbsx
> +
> +Status, x86: Supported
> +
> +Debugger
Hello Sergej,
On 31.08.17 15:20, Sergej Proskurin wrote:
Hi Volodymyr, hi Julien,
On 08/24/2017 07:25 PM, Julien Grall wrote:
On 21/08/17 21:27, Volodymyr Babchuk wrote:
This feature indicates that hypervisor is compatible with ARM
SMC calling convention. Hypervisor will not inject an unde
>>> On 31.08.17 at 13:25, wrote:
> On Thu, Aug 31, 2017 at 11:27:19AM +0100, George Dunlap wrote:
>> +## Limits/Guest
>> +
>> +### Virtual CPUs
>> +
>> +Limit, x86 PV: 512
>> +Limit, x86 HVM: 128
>
> There has already been some discussion about the HVM vCPU limit due to
> other topics, is
On 31/08/17 12:22, Wei Liu wrote:
> Rewrite the code so that it has the same structure as
> mmio_ro_emualte_ctxt. x86_emulate_ctxt now points to ptwr_emulate_ctxt
> via its data pointer.
>
> This patch will help unify mmio_ro and ptwr code paths later.
>
> Signed-off-by: Wei Liu
Reviewed-by: Andr
On Thu, 2017-08-31 at 11:16 +0200, Ingo Molnar wrote:
> * Thomas Gleixner wrote:
> Low prio nitpicking, could we please write such table based initializers in a
> vertically organized, tabular fashion:
>
> > + { debug,xen_xendebug,
> > true },
On 31/08/17 13:03, Jan Beulich wrote:
On 31.08.17 at 13:45, wrote:
>> There is only one function gate_op_read that needs to be modified.
> I'm fine with it just being read() here, but I can see this being possibly
> controversial. Please double check that Andrew isn't entirely opposed
> to it
Hi Jan,
On 31.08.17 10:34, Jan Beulich wrote:
On 30.08.17 at 18:20, wrote:
My first intention was to declare union with all possible
representations, so it would be possible to access the same UUID as an
array of bytes or, for example, as Microsoft GUID. Like this:
typedef union {
/* UU
Hi Volodymyr, hi Julien,
On 08/24/2017 07:25 PM, Julien Grall wrote:
>
>
> On 21/08/17 21:27, Volodymyr Babchuk wrote:
>> This feature indicates that hypervisor is compatible with ARM
>> SMC calling convention. Hypervisor will not inject an undefined
>> instruction exception if an invalid SMC fun
>>> On 31.08.17 at 13:45, wrote:
> There is only one function gate_op_read that needs to be modified.
I'm fine with it just being read() here, but I can see this being possibly
controversial. Please double check that Andrew isn't entirely opposed
to it. An alternative suggestion would then be rea
>>> On 31.08.17 at 13:45, wrote:
> Drop the prefix because they live in their own file now. One exception
> is wbinvd handler because drpooing the prefix will clash with the
> actual wbinvd function.
How about _wbinvd() (single underscores as prefix are okay for
static functions) or do_wbinvd()?
On Thu, 31 Aug 2017, Juergen Gross wrote:
> > I've applied it on top of tip:x86/apic and fixed up the merge conflicts
> > mindlessly. Patch below.
> >
> > Juergen, can you please check the result?
>
> You missed the updates to arch/x86/xen/xen-asm_64.S and the declarations
> of the xen specific t
On Thu, Aug 31, 2017 at 2:13 PM, bharat gohil wrote:
> Hello Oleksandr,
Hi Bharat
>
> I had removed A72 cluster and tried to boot only two A35 but I got same
> error.
>
> Is anything added or missing in A35 compare to A53?
Unfortunately, I don't know.
BTW, did you check your GIC settings in the
There is only one function gate_op_read that needs to be modified.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/emul-gate-op.c | 15 +--
1 file changed, 5 insertions(+), 10 deletions(-)
diff --git a/xen/arch/x86/pv/emul-gate-op.c b/xen/arch/x86/pv/emul-gate-op.c
index 0a7381a094..002f
Wei Liu (2):
x86/pv: drop priv_op prefix in emul-priv-op.c
x86/pv: drop gate_op prefix in emul-gate-op.c
xen/arch/x86/pv/emul-gate-op.c | 15 +++
xen/arch/x86/pv/emul-priv-op.c | 99 +-
2 files changed, 55 insertions(+), 59 deletions(-)
--
2.11.0
Drop the prefix because they live in their own file now. One exception
is wbinvd handler because drpooing the prefix will clash with the
actual wbinvd function.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/emul-priv-op.c | 99 +-
1 file changed, 50 insertion
On Thu, Aug 31, 2017 at 11:27:19AM +0100, George Dunlap wrote:
> Add a machine-readable file to describe what features are in what
> state of being 'supported', as well as information about how long this
> release will be supported, and so on.
>
> The document should be formatted using "semantic n
Address Andrew's comments and rebased on top of staging.
Wei Liu (2):
x86/mm: don't wrap x86_emulate_ctxt in ptwr_emulate_ctxt
x86/mm: merge ptwr and mmio_ro page fault handlers
xen/arch/x86/mm.c| 302 +--
xen/arch/x86/traps.c | 20 ++-
> -Original Message-
> From: Michael Schinzel [mailto:schin...@ip-projects.de]
> Sent: 31 August 2017 12:12
> To: Paul Durrant ; xen-devel@lists.xen.org
> Cc: Thomas Toka
> Subject: AW: Memory Issue HVM guest after Upgrade from 4.4 to 4.8
>
> Hello,
>
Again Don't top post!
> with t
Rewrite the code so that it has the same structure as
mmio_ro_emualte_ctxt. x86_emulate_ctxt now points to ptwr_emulate_ctxt
via its data pointer.
This patch will help unify mmio_ro and ptwr code paths later.
Signed-off-by: Wei Liu
---
v2: do away with pointer in ptwr_emulate_ctxt
---
xen/arch/
Provide a unified entry to avoid going through pte look-up, decode and
emulation cycle more than necessary. The path taken is determined by
the faulting address.
Note that the order of checks is changed in the new function, but the
order of the checks is performed shouldn't matter.
The sole calle
Hello Oleksandr,
I had removed A72 cluster and tried to boot only two A35 but I got same
error.
Is anything added or missing in A35 compare to A53?
Regards,
Bharat
On Wed, Aug 30, 2017 at 8:00 PM, bharat gohil wrote:
> Hello Oleksandr,
> Thank you very much for your input.
>
> Yes. agree. I w
Hello,
with traditional i get the information
root@v34:/etc/xen# xl create vmanager1866.cfg
Parsing config from vmanager1866.cfg
libxl: error: libxl_dm.c:2024:libxl__spawn_local_dm: device model
/usr/lib/xen-4.8/bin/qemu-dm is not executable: No such file or directory
libxl: error: libxl_dm.c:21
From: Chao Gao
This patch is to extend lapic_id() to support more vcpus.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
tools/firmware/hvmloader/util.c | 2 +-
tools/libacpi/libacpi.h | 2 +-
tools/libxl/libxl_x86_acpi.c| 2 +-
3 files changed, 3 insertions(+), 3 deletions(
Change since v1:
1) Increase hap page pool according vcpu number
2) Use "Processor" syntax to define vcpus with APIC id < 255
in dsdt and use "Device" syntax for other vcpus in ACPI DSDT table.
3) Use XAPIC structure for vcpus with APIC id < 255
in dsdt and use x2APIC struct
This patch is to increase hap page pool size to support more vcpus in single VM.
Signed-off-by: Lan Tianyu
---
xen/arch/x86/mm/hap/hap.c | 10 +-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm/hap/hap.c b/xen/arch/x86/mm/hap/hap.c
index cdc77a9..96a7ed0 1006
This patch is to add x2apic entry support for ACPI MADT table
according to ACPI spec 5.2.12.12 Processor Local x2APIC Structure
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
tools/libacpi/acpi2_0.h | 10 +
tools/libacpi/build.c | 59 +++-
This patch is to change DSDT table for processor object to support >128 vcpus
accroding to ACPI spec 8.4 Declaring Processors
Signed-off-by: Lan Tianyu
---
tools/libacpi/mk_dsdt.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/tools/libacpi/mk_dsdt.c b/to
On 08/31/2017 12:03 PM, Paul Durrant wrote:
>> -Original Message-
>> From: George Dunlap [mailto:george.dun...@citrix.com]
>> Sent: 31 August 2017 11:56
>> To: Paul Durrant ; xen-de...@lists.xenproject.org
>> Cc: Ian Jackson ; Wei Liu ;
>> Andrew Cooper ; Jan Beulich
>> ; Tim (Xen.org) ; Da
> -Original Message-
> From: Michael Schinzel [mailto:schin...@ip-projects.de]
> Sent: 31 August 2017 12:02
> To: Paul Durrant ; xen-devel@lists.xen.org
> Cc: Thomas Toka
> Subject: AW: Memory Issue HVM guest after Upgrade from 4.4 to 4.8
>
> Hello,
>
> sry for HTML Mail, it is auto conf
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 31 August 2017 11:56
> To: Paul Durrant ; xen-de...@lists.xenproject.org
> Cc: Ian Jackson ; Wei Liu ;
> Andrew Cooper ; Jan Beulich
> ; Tim (Xen.org) ; Dario Faggioli
> ; Tamas K Lengyel ;
> Roger Pau Monn
Hello,
sry for HTML Mail, it is auto configuration of Outlook.
We have testet adding
device_model_version="qemu-xen"
to the config and rebooting the VMs. With this configuration, no change at
memory usage.
Mit freundlichen Grüßen
Michael Schinzel
- Geschäftsführer -
IP-Projects GmbH & C
1 - 100 of 171 matches
Mail list logo