> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: Thursday, June 25, 2015 6:22 PM
> To: Pang, LongtaoX
> Cc: Ian Campbell; Hu, Robert; xen-devel@lists.xen.org; wei.l...@citrix.com
> Subject: RE: [OSSTEST Nested PATCH v11 6/7] Compose the main recipe of
> ne
Hi Jan,
On 17/08/2015 22:10, Jan Beulich wrote:
Julien Grall 08/17/15 6:27 PM >>>
On 17/08/2015 08:33, Jan Beulich wrote:
On 14.08.15 at 16:59, wrote:
b) Create EFI_MEMORY_DESCRIPTOR table. This will add memory start and
size information of Dom0. And Dom0 will get the memory information
thr
On 17/08/2015 20:19, Shannon Zhao wrote:
Yes, I think it's good to drop the "linux," too. But if we drop the
linux, would it impact the linux kernel booting with UEFI? And why we
don't do it to Xen since Xen still uses "linux,"?
I don't understand your second question.
I mean that Xen is us
I'd really like to see this fixed in 4.6, and it makes no sense to post the
final hypervisor patch before this one got applied. The upstream one
has been in our qemuu tree for a while now, but apparently didn't get
pushed upstream yet.
Jan
>>> On 23.07.15 at 09:00, wrote:
> The number of slots p
Hi,
Firstly, this patch is not ready at all and mostly here for collecting comment
about the way to do it. It's not clean so no need to complain about the coding
style.
The qdisk backend in QEMU is not supporting indirect grant, this is means that
a request can only support 11 * 4KB = 44KB.
W
On 8/14/2015 9:51 PM, Paul Durrant wrote:
-Original Message-
From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 14 August 2015 13:03
To: xen-devel@lists.xen.org; Paul Durrant; Ian Jackson; Stefano Stabellini; Ian
Campbell; Wei Liu; Keir (Xen.org); jbeul...@suse.com; Andrew Cooper
On 08/17/2015 12:18 PM, Eric Dumazet wrote:
From: Eric Dumazet
Then can you try following fix as well ?
Thanks !
[PATCH] timer: fix a race in __mod_timer()
I have been running the latest code from git with the 2 patches in this
thread applied. No issues so far.
-Jon
___
On 08/17/2015 09:25 AM, Sander Eikelenboom wrote:
> OK, but have you applied the fix ?
>
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=83fccfc3940c4a2db90fd7e7079f5b465cd8c6af
> It will be part of net iteration from David Miller to Linus Torvald.
I did not have that
>>> Shannon Zhao 08/18/15 5:46 AM >>>
>On 2015/8/17 23:33, Jan Beulich wrote:
> On 14.08.15 at 16:59, wrote:
>>> 1. Copy and change some EFI and ACPI tables
>>> ---
>>
>> While some explanation on the reasons for this was given in the past
>> discussio
flight 60711 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60711/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 19 guest-start/debianhvm.repeat
fail REGR. vs. 60683
>>> Julien Grall 08/17/15 6:27 PM >>>
>On 17/08/2015 08:33, Jan Beulich wrote:
> On 14.08.15 at 16:59, wrote:
>>> b) Create EFI_MEMORY_DESCRIPTOR table. This will add memory start and
>>> size information of Dom0. And Dom0 will get the memory information
>>> through this EFI table.
>>
>> To s
Hi Jan,
On 2015/8/17 23:33, Jan Beulich wrote:
On 14.08.15 at 16:59, wrote:
>> 1. Copy and change some EFI and ACPI tables
>> ---
>
> While some explanation on the reasons for this was given in the past
> discussion, I'm still missing a word on the "w
Hi Julien,
On 2015/8/18 0:10, Julien Grall wrote:
> Hi,
>
> On 17/08/2015 06:01, Shannon Zhao wrote:
>>
>>
>> On 2015/8/14 23:17, Julien Grall wrote:
>>> On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
>>> On 8/13/2015 at 05:09 PM, in message
<20150813090938.gi7...@zion.uk.xensource.com>, Wei Liu
wrote:
> On Tue, Aug 11, 2015 at 08:24:01PM -0600, Chun Yan Liu wrote:
> >
> >
> > >>> On 8/11/2015 at 07:27 PM, in message
> > <2015082702.gf7...@zion.uk.xensource.com>, Wei Liu
> >
> >
On 2015/8/17 18:36, Roger Pau Monné wrote:
> El 11/08/15 a les 16.19, Ian Campbell ha escrit:
>> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
>>> This document is going to explain the design details of Xen booting with
>>> ACPI on ARM. Maybe parts of it may not be appropriate. Any comme
On Tue, Aug 18, 2015 at 3:25 AM Dario Faggioli
wrote:
> On Mon, 2015-08-17 at 00:55 +, Kun Cheng wrote:
> >
> >
> > On Mon, Aug 17, 2015 at 12:16 AM Frediano Ziglio
> >
> > What I'm planing is adding page migration support for NUMA aware
> > scheduling. In such a case the most time I'll be d
flight 60709 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60709/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm 14 guest-saverestore fail REGR. vs. 59254
test-amd64-i386-xl
On Mon, Aug 17, 2015 at 09:51:58AM -0600, Jan Beulich wrote:
> >>> On 20.07.15 at 16:29, wrote:
> > Create generic alloc and copy functions. We need
> > separate tools for memory allocation and copy to
> > provide multiboot2 protocol support.
> >
> > Signed-off-by: Daniel Kiper
> > Reviewed-by: A
branch xen-unstable
xen branch xen-unstable
job build-armhf-libvirt
test libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git
***
flight 60706 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60706/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are failing
On Sun, Aug 16, 2015 at 01:22:05PM -0400, Konrad Rzeszutek Wilk wrote:
> On August 16, 2015 9:48:05 AM EDT, George Diamantopoulos
> wrote:
> >Hello,
> >
> >I've been trying to compile xen with multiboot2 support, but building
> >has
> >been failing. Tried with both gcc-4.8.4 and gcc-5.2 on ivybri
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse host dt and generate ITS node for Dom0.
ITS node resides inside GIC node so when GIC node
is encountered look for ITS node.
Signed-off-by: Vijaya Kumar K
---
v5: - Moved ITS dt node generation to ITS driver
v4: -
On Mon, 2015-08-17 at 00:55 +, Kun Cheng wrote:
>
>
> On Mon, Aug 17, 2015 at 12:16 AM Frediano Ziglio
>
> What I'm planing is adding page migration support for NUMA aware
> scheduling. In such a case the most time I'll be dealing with Xen's
> memory management & scheduling part to make re
Hi Vijay,
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
ITS translation space contains GITS_TRANSLATOR register
which is written by device to raise LPI. This space needs
to mapped to every domain address space for all physical
ITS available,so that device can access G
Hi Vijay,
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
+for ( i = 0; i < dev->nr_lpis; i++ )
+{
+msi = xzalloc(struct msi_desc);
+/* Reserve pLPI */
+if ( its_alloc_device_irq(dev, &plpi) || !msi )
+{
+its_discard_lpis(dev, i);
+
On Mon, 17 Aug 2015, Eric Dumazet wrote:
> [PATCH] timer: fix a race in __mod_timer()
>
> lock_timer_base() can not catch following :
>
> CPU1 ( in __mod_timer()
> timer->flags |= TIMER_MIGRATING;
> spin_unlock(&base->lock);
> base = new_base;
> spin_lock(&base->lock);
> timer->flags &= ~TIMER_BA
> > P.S. Apologies for any threading issues - I have not yet managed to
> > get git send-email working properly.
>
> I'm usually using git format-patch to get a list of files (one per
> patch) and my cover letter (--cover-letter).
Thanks.
> Then I use git send-email *.patch which will send the p
On 17/08/2015 11:58, Chris (Christopher) Brand wrote:
Hi Julien,
Thanks for the review.
+.pxn = 0,
I would add a comment to explain that this bit is reserved for PL2 stage
1 page table.
Will do.
+.avail = 0,
I don't think this one is necessary. avail is not us
Hi Vijay,
On 27/07/2015 04:11, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Initialize physical ITS driver from GIC v3 driver
if LPIs are supported by hardware
Signed-off-by: Vijaya Kumar K
---
v5: Made check of its dt node availability before
setting lpi_supported flag
---
xen/
Hi Julien,
Thanks for the review.
> > +.pxn = 0,
>
> I would add a comment to explain that this bit is reserved for PL2 stage
> 1 page table.
Will do.
> > +.avail = 0,
>
> I don't think this one is necessary. avail is not used by the hardware neither
> Xen.
"grep -rF
Wei Liu (3):
xl: fix vNUMA vdistance parsing
xl: error out if vNUMA specifies more vcpus than pcpus
libxc: fix vNUMA memory allocation
tools/libxc/xc_hvm_build_x86.c | 6 --
tools/libxl/xl_cmdimpl.c | 34 +-
2 files changed, 33 insertions(+), 7 del
Hi Vijay,
This patch doesn't only do initialization but also destruction of vGIC info.
Although, a part of the domain initialization is done in part in #8 and
#8. It's very confusing to see the initialization split in 3 different
patch.
I would prefer to see the initialization/destruction in
We should parse the output from splitting function, not the original
string, otherwise the parsed result is wrong.
For example:
vnuma = [ [...,"vdistance=10,20",...],
[...,"vdistance=20,10",...] ]
Before this change, vdistance from node 0 to all nodes (including
itself) was 10 and vdis
... but allow user to override that check by specifying maxvcpus= in xl
configuration file.
Note that the code is constructed such that the fallout is dealt with
after parsing. We can live with that because though it wastes a bit of
cpu cycles but it is still functionally correct and I would like
Only 4KB allocation was using new_memflags. We should use new_memflags
in for 2MB and 1GB allocation as well because that variable contains
node information.
Without this patch, when creating a HVM guest with vNUMA, because the
node information was not present in the flags passed to libxc, actual
Hi Chris,
On 14/08/2015 14:42, Chris (Christopher) Brand wrote:
Ensure that every bit has a specific value.
Reported-by: Julien Grall
Signed-off-by: Chris Brand
---
xen/include/asm-arm/page.h | 5 +
1 file changed, 5 insertions(+)
diff --git a/xen/include/asm-arm/page.h b/xen/include/
On Sun, Aug 16, 2015 at 09:51:53AM +0100, Ian Campbell wrote:
> On Fri, 2015-08-14 at 00:38 +0100, Wei Liu wrote:
> > > In fact, if b_info->max_vcpus is 0, the elements of vcpu_parsed are
> > > sized against the host pcpus, and we risk to call libxl_bitmap_set() for
> > > vcpus beyond that limit, w
On 2015-08-17 19:18, Eric Dumazet wrote:
From: Eric Dumazet
On Mon, 2015-08-17 at 16:25 +0200, Sander Eikelenboom wrote:
Monday, August 17, 2015, 4:21:47 PM, you wrote:
> On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
>> This is very similar to the behavior I am seeing in this b
Hi Chris,
On 14/08/2015 14:41, Chris (Christopher) Brand wrote:
Shuffle lines around so that the assignments in mfn_to_xen_entry()
occur in the same order as the bits are declared in lpae_pt_t.
This makes it easier to see which ones are never given a value.
No change in behaviour.
Also fix a mi
On 14/08/2015 14:41, Chris (Christopher) Brand wrote:
Hi,
Hi Chris,
Thank you for the patch.
This is more-or-less what Julien requested. He noted that pt.contig was never
set to zero. When I looked further, I found other bits that were also never
given a value. Looking at the callsites, th
Hi Wei,
Thanks for CCing me, for me, I prefer option 2, it won't affect the normal
development release cycle, if the contributor wants to contribute to
-unstable, then it is his responsibility to resolve the confilicts on the
main branch. but I think it depends on the maintainers who will make th
From: Eric Dumazet
On Mon, 2015-08-17 at 16:25 +0200, Sander Eikelenboom wrote:
> Monday, August 17, 2015, 4:21:47 PM, you wrote:
>
> > On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
> >> This is very similar to the behavior I am seeing in this bug:
> >>
> >> https://bugzilla.kern
On 17/08/2015 08:33, Jan Beulich wrote:
On 14.08.15 at 16:59, wrote:
1. Copy and change some EFI and ACPI tables
---
While some explanation on the reasons for this was given in the past
discussion, I'm still missing a word on the "why" for each of the
Hi,
On 17/08/2015 06:01, Shannon Zhao wrote:
On 2015/8/14 23:17, Julien Grall wrote:
On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
--
The minimal DT mainly passes Dom0 bootargs, address
El 07/08/15 a les 18.36, Andrew Cooper ha escrit:
> On 07/08/15 11:18, Roger Pau Monne wrote:
>> @@ -1336,7 +1343,8 @@ static int meminit_hvm(struct xc_dom_image *dom)
>> * tot_pages will be target_pages - VGA_HOLE_SIZE after
>> * this call.
>> */
>> -rc = xc_d
>>> On 20.07.15 at 16:29, wrote:
> Rename mbi and mbi_old variables and rearrange code a bit to make
> it more readable. Additionally, this way multiboot (v1) protocol
> implementation and future multiboot2 protocol implementation will
> use the same variable naming convention.
>
> Signed-off-by:
>>> On 20.07.15 at 16:29, wrote:
> Create generic alloc and copy functions. We need
> separate tools for memory allocation and copy to
> provide multiboot2 protocol support.
>
> Signed-off-by: Daniel Kiper
> Reviewed-by: Andrew Cooper
> ---
> v2 - suggestions/fixes:
>- generalize new functi
>>> On 20.07.15 at 16:28, wrote:
An empty description leaves us guess at the "why".
> --- a/xen/arch/x86/boot/reloc.c
> +++ b/xen/arch/x86/boot/reloc.c
> @@ -10,15 +10,27 @@
> *Keir Fraser
> */
>
> -/* entered with %eax = BOOT_TRAMPOLINE */
> +/*
> + * This entry point is entered from
>>> On 28.07.15 at 15:28, wrote:
> x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq
> servers and and replaces the shared_info frame with an empty page to support
> subsequent XENMAPSPACE_shared_info call.
>
> ARM-specific hook is -ENOSYS for now.
>
> Signed-off-by: Vital
>>> On 14.08.15 at 16:59, wrote:
> 1. Copy and change some EFI and ACPI tables
> ---
While some explanation on the reasons for this was given in the past
discussion, I'm still missing a word on the "why" for each of these here.
> a) Copy EFI_SYSTEM_TABLE a
>>> On 17.08.15 at 17:07, wrote:
> At 14:53 +0100 on 17 Aug (1439823232), Ben Catterall wrote:
>> So, have we arrived at a decision for this? Thanks!
>
> Seems to have stalled a bit. OK, I propose that:
> - we use TR/IST to make Xen take interrupts/exceptions at a different SP;
> - we make tha
>>> On 17.08.15 at 16:58, wrote:
> At 14:59 +0100 on 17 Aug (1439823550), Ben Catterall wrote:
>> On 11/08/15 11:33, Ben Catterall wrote:
>> > On 10/08/15 11:07, Tim Deegan wrote:
>> >> I wonder whether it would be better to switch to an IDT with all
>> >> unacceptable traps stubbed out, rather th
At 14:53 +0100 on 17 Aug (1439823232), Ben Catterall wrote:
> On 12/08/15 14:33, Andrew Cooper wrote:
> > On 12/08/15 14:29, Andrew Cooper wrote:
> >> On 11/08/15 19:29, Boris Ostrovsky wrote:
> >>> Would switching TR only when we know that we need to enter this
> >>> deprivileged mode help?
> >> T
At 14:59 +0100 on 17 Aug (1439823550), Ben Catterall wrote:
> On 11/08/15 11:33, Ben Catterall wrote:
> > On 10/08/15 11:07, Tim Deegan wrote:
> >> This should happen in paging_fault() so it can guard the
> >> shadow-pagetable paths too. Once it's there, it'll need a check for
> >> is_hvm_vcpu() a
This is very similar to the behavior I am seeing in this bug:
https://bugzilla.kernel.org/show_bug.cgi?id=102911
-Jon
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Monday, August 17, 2015, 4:21:47 PM, you wrote:
> On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
>> This is very similar to the behavior I am seeing in this bug:
>>
>> https://bugzilla.kernel.org/show_bug.cgi?id=102911
> OK, but have you applied the fix ?
> http://git.kernel.org/
On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
> This is very similar to the behavior I am seeing in this bug:
>
> https://bugzilla.kernel.org/show_bug.cgi?id=102911
OK, but have you applied the fix ?
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=83fccfc3940c
On 11/08/15 11:33, Ben Catterall wrote:
On 10/08/15 11:07, Tim Deegan wrote:
Hi,
@@ -685,8 +685,17 @@ static int hap_page_fault(struct vcpu *v,
unsigned long va,
{
struct domain *d = v->domain;
+/* If we get a page fault whilst in HVM security user mode */
+if( v->user_mod
On 12/08/15 14:33, Andrew Cooper wrote:
On 12/08/15 14:29, Andrew Cooper wrote:
On 11/08/15 19:29, Boris Ostrovsky wrote:
On 08/11/2015 01:19 PM, Andrew Cooper wrote:
On 11/08/15 18:05, Tim Deegan wrote:
* Under this model, PV exception handlers should copy themselves
onto
the privileged ex
On 08/16/2015 08:46 PM, Jonathan Creekmore wrote:
On Aug 16, 2015, at 1:59 AM, Ian Campbell wrote:
On Thu, 2015-08-13 at 16:44 -0500, Jonathan Creekmore wrote:
With the addition of FMODE_ATOMIC_POS in the Linux 3.14 kernel,
concurrent blocking file accesses to a single open file descriptor can
Monday, August 17, 2015, 3:37:13 PM, you wrote:
> On Mon, 2015-08-17 at 11:09 +0200, Sander Eikelenboom wrote:
>> Saturday, August 15, 2015, 12:39:25 AM, you wrote:
>>
>> > On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
>> >> On 2015-08-13 00:41, Eric Dumazet wrote:
>> >> > On Wed,
On Mon, 2015-08-17 at 11:09 +0200, Sander Eikelenboom wrote:
> Saturday, August 15, 2015, 12:39:25 AM, you wrote:
>
> > On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
> >> On 2015-08-13 00:41, Eric Dumazet wrote:
> >> > On Wed, 2015-08-12 at 23:46 +0200, Sander Eikelenboom wrote:
> >
On 2015/8/14 23:17, Julien Grall wrote:
On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
--
The minimal DT mainly passes Dom0 bootargs, address and size of initrd
(if available), address and
>>> On 16.08.15 at 11:14, wrote:
> On Fri, 2015-08-14 at 04:07 -0600, Jan Beulich wrote:
>> If so, I'd be inclined to suggest a force push based on this flight.
>
> Overall I think I'm inclined to agree, I suppose your motive is that
> you want to get 4.4.x+1 out the door and I don't think we sh
flight 60704 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60704/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-win7-amd64 17 guest-stop fail like 58892
test-amd64-amd64-xl-qemut-
El 11/08/15 a les 16.19, Ian Campbell ha escrit:
> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
>> This document is going to explain the design details of Xen booting with
>> ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are
>> welcome.
>
> Some small subsets of thi
branch xen-unstable
xen branch xen-unstable
job build-i386-libvirt
test libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstr
Saturday, August 15, 2015, 12:39:25 AM, you wrote:
> On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
>> On 2015-08-13 00:41, Eric Dumazet wrote:
>> > On Wed, 2015-08-12 at 23:46 +0200, Sander Eikelenboom wrote:
>> >
>> >> Thanks for the reminder, but luckily i was aware of that,
>>
flight 60705 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60705/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 5dd08a463d5ca40b2ee3a8a0639c846e68265b92
baseline version:
ovmf 0cd1ecea673160417e30e46009a54d361a1
69 matches
Mail list logo