On 27/11/15 16:33, Wei Liu wrote:
> On Fri, Nov 27, 2015 at 03:50:53PM +0100, Juergen Gross wrote:
>> For migration the last used pfn of a guest is needed to size the
>> logdirty bitmap and as an upper bound of the page loop. Unfortunately
>> there are pv-kernels advertising a much higher maximum
Hi Dario,
Thanks for the reply!
My goal for the experiment is to show that xen rtds scheduler is better
than credit scheduler when it comes to real time tasks.
so my set up is:
for xen-credit : 2vms sharing 8 cores (cpu 0-7) using credit scheduler(both
with weight of 800 and capacity of 400)
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpu/amd.c | 2 +-
xen/arch/x86/cpu/common.c | 4 ++--
xen/arch/x86/cpu/intel_cacheinfo.c | 2 +-
xen/arch/x86/numa.c | 2 +-
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Ian Campbell
CC: Stefano Stabellini
---
xen/arch/arm/cpu.c | 2 +-
xen/arch/arm/gic-hip04.c| 6 +++---
flight 65147 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65147/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs.
64579
No resulting change on any architecture.
Andrew Cooper (6):
xen: Drop unused fastcall annotation
xen: Drop empty __cpuinitdata annotation
xen: Drop empty __cpuinit annotation
xen: Drop empty __devinitdata annotation
xen: Drop empty __devinit annotation, and aliased __pminit
xen: Drop
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/include/asm-x86/config.h | 1 -
xen/include/xen/init.h | 8
2 files changed, 9 deletions(-)
diff --git a/xen/include/asm-x86/config.h b/xen/include/asm-x86/config.h
index
x86 is the only architecture which uses __devinitdata, and also has
CONFIG_HOTPLUG enabled, making the annotation empty.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpu/common.c | 12 ++--
xen/arch/x86/mpparse.c|
x86 is the only architecture which uses __devinit, and also has CONFIG_HOTPLUG
enabled, making the annotation empty.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/apic.c | 6 +++---
xen/arch/x86/cpu/amd.c | 6
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/crypto/vmac.c| 3 ---
xen/include/xen/config.h | 1 -
2 files changed, 4 deletions(-)
diff --git a/xen/crypto/vmac.c b/xen/crypto/vmac.c
index 8f2f372..f3f2743 100644
---
On Wed, 2015-11-11 at 15:13 +, Ian Jackson wrote:
> > +/*
> > + * Maps a range within one domain to a local address range. Mappings
> > + * should be unmapped with munmap and should follow the same rules as
> > mmap
> > + * regarding page alignment.
> > + *
> > + * prot is as for mmap(2).
> >
On 03.11.2015 19:16, Ross Lagerwall wrote:
> +#ifdef CONFIG_X86
> +unsigned long search_module_extables(unsigned long addr)
> +{
> +struct payload *data;
> +unsigned long ret;
> +
> +/* No locking since this list is only ever changed during apply or revert
> + * context. */
How do
Fold `guest-localmigrate.2' into `guest-localmigrate/x10' and
`guest-start.2' into `guest-start.repeat'. In each case increase the
iteration count of the 2nd test by one so that the total number of
reps remains constant.
This will allow the heisenbug compensator to see more of these
failures as
flight 65150 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65150/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 60684
Add IOCTL_GNTDEV_GRANT_COPY to allow applications to copy between user
space buffers and grant references.
This interface is similar to the GNTTABOP_copy hypercall ABI except
the local buffers are provided using a virtual address (instead of a
GFN and offset). To avoid userspace from having to
On 27/11/15 15:53, Juergen Gross wrote:
> On 27/11/15 16:33, Wei Liu wrote:
>> On Fri, Nov 27, 2015 at 03:50:53PM +0100, Juergen Gross wrote:
>>> For migration the last used pfn of a guest is needed to size the
>>> logdirty bitmap and as an upper bound of the page loop. Unfortunately
>>> there are
On 27/11/15 17:18, Ian Campbell wrote:
> On Fri, 2015-11-13 at 15:27 +, Ian Jackson wrote:
>> Ian Campbell writes ("Re: [PATCH XEN v5 13/23] tools: Refactor foreign
>> memory mapping into libxenforeignmemory"):
>>> On Wed, 2015-11-11 at 15:13 +, Ian Jackson wrote:
>>> Are you suggesting:
On 27/11/15 16:22, Han, Huaitong wrote:
> On Fri, 2015-11-27 at 12:59 +, Andrew Cooper wrote:
>> Just for my own understand, do you have a sample use-case for
>> protection
>> keys?
>>
>> As everything can WRPKRU, I cant see how it would actually be useful.
>> Clearly there is a usecase or you
On Fri, 2015-11-27 at 08:36 -0800, Yu-An(Victor) Chen wrote:
> Hi Dario,
>
Hi,
> Thanks for the reply!
>
You're welcome. :-)
I'm adding Meng to Cc...
> My goal for the experiment is to show that xen rtds scheduler is
> better than credit scheduler when it comes to real time tasks.
> so my
On Fri, 2015-11-27 at 17:16 +, Ian Jackson wrote:
>
> > Maybe you should remove the ts-guest-stop right at the start of this fn
> > too?
>
> It's probably better to swap the order of things in the repeat, and
> move the extra start to below the repeat.
>
> That way if guest-stop fails
On Wed, 2015-11-11 at 15:14 +, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH XEN v5 14/23] tools: foreignmemory: provide
> xenforeignmemory_unmap."):
> > And require it be used instead of direct munmap.
> >
> > This will allow e.g. Valgrind hooks to help track incorrect use of
> > foreign
On Fri, 2015-11-27 at 12:59 +, Andrew Cooper wrote:
> Just for my own understand, do you have a sample use-case for
> protection
> keys?
>
> As everything can WRPKRU, I cant see how it would actually be useful.
> Clearly there is a usecase or you (Intel) wouldn't have gone to the
> effort of
On 11/27/2015 04:28 PM, Martin Pohlack wrote:
On 03.11.2015 19:16, Ross Lagerwall wrote:
+#ifdef CONFIG_X86
+unsigned long search_module_extables(unsigned long addr)
+{
+struct payload *data;
+unsigned long ret;
+
+/* No locking since this list is only ever changed during apply or
>>> On 27.11.15 at 14:49, wrote:
> On 27/11/15 11:54, Jan Beulich wrote:
>> switch ( __builtin_expect(ptr->fpu_sse.x[FPU_WORD_SIZE_OFFSET], 8) )
>> {
>> +#define XRSTOR(pfx) \
>> +alternative_io("1: .byte " pfx "0x0f,0xae,0x2f\n" \
>> +
On 27/11/15 17:10, Jan Beulich wrote:
On 27.11.15 at 17:00, wrote:
>> It is also odd to see it added to HVM guests but not PV.
> But that's a result of PV using white listing on leaf 7, as opposed to
> HVM's black listing.
>
> But yes, if you CPUID series is about
On Fri, 2015-11-13 at 15:27 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH XEN v5 13/23] tools: Refactor foreign
> memory mapping into libxenforeignmemory"):
> > On Wed, 2015-11-11 at 15:13 +, Ian Jackson wrote:
> > Are you suggesting:
> >
> > void
Hi Dario & Meng,
Thanks for your analysis!
VM1 and VM2 both are given 8 vCPUs and sharing physical CPU 0-7. So in
theory,"VM1 can get the services of 400%"
And yes, Dario, your explanation about the task utilization is correct.
So the resource configuration as I mentioned before is:
for
flight 65141 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65141/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail REGR. vs.
65114
Regressions
On 27/11/15 16:22, Ian Jackson wrote:
> Juergen Gross writes ("Re: [Xen-devel] [PATCH] libxc: try to find last used
> pfn when migrating"):
>> xl migrate will use much less resources for a domain with a 3.x kernel
>> started with max_mem being much larger than mem. E.g. in case you start
>> a
>>> On 27.11.15 at 17:00, wrote:
> It is also odd to see it added to HVM guests but not PV.
But that's a result of PV using white listing on leaf 7, as opposed to
HVM's black listing.
But yes, if you CPUID series is about to arrive, these two patches
may not be
osstest service owner writes ("[xen-unstable test] 65141: regressions - FAIL"):
> flight 65141 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/65141/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>
On 27/11/15 11:07, Jan Beulich wrote:
> ... or when the guest has the XSAVE feature hidden by CPUID policy.
> Not doing so is at best confusing to guests.
>
> Signed-off-by: Jan Beulich
> ---
> One question is whether we shouldn't switch leaf 7 to white listing,
> just like
On 27/11/15 14:50, Juergen Gross wrote:
> For migration the last used pfn of a guest is needed to size the
> logdirty bitmap and as an upper bound of the page loop. Unfortunately
> there are pv-kernels advertising a much higher maximum pfn as they
> are really using in order to support memory
On 27/11/15 17:42, Andrew Cooper wrote:
> On 27/11/15 14:50, Juergen Gross wrote:
>> For migration the last used pfn of a guest is needed to size the
>> logdirty bitmap and as an upper bound of the page loop. Unfortunately
>> there are pv-kernels advertising a much higher maximum pfn as they
>>
Ian Campbell writes ("Re: [OSSTEST PATCH] sg-run-job: Coalesce a couple of
repetitions"):
> On Fri, 2015-11-27 at 16:54 +, Ian Jackson wrote:
> > The resulting testid `guest-localmigrate/x10' becomes a bit misleading
> > in that it now does 11 repetitions. But we don't want to change the
> >
On Fri, 2015-11-27 at 15:38 +, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
> CC: Jan Beulich
Acked-by: Ian Campbell
> ---
> README.email | 51 +++
> 1 file
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Parth Dixit
>
> Interrupt information is described in DSDT and is not available at
> the time of booting. Configure the interrupts dynamically when requested
> by Dom0
>
> Signed-off-by: Parth Dixit
On Fri, 27 Nov 2015, Stefano Stabellini wrote:
> On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> > From: Parth Dixit
> >
> > Interrupt information is described in DSDT and is not available at
> > the time of booting. Configure the interrupts dynamically when
On Fri, 2015-11-27 at 16:54 +, Ian Jackson wrote:
> Fold `guest-localmigrate.2' into `guest-localmigrate/x10' and
> `guest-start.2' into `guest-start.repeat'. In each case increase the
> iteration count of the 2nd test by one so that the total number of
> reps remains constant.
>
> This will
2015-11-27 12:23 GMT-05:00 Dario Faggioli :
> On Fri, 2015-11-27 at 08:36 -0800, Yu-An(Victor) Chen wrote:
>> Hi Dario,
>>
> Hi,
>
>> Thanks for the reply!
>>
> You're welcome. :-)
>
> I'm adding Meng to Cc...
>
Thanks! :-)
>> My goal for the experiment is to show that
flight 65151 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65151/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 63340
flight 65139 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65139/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 21f9922e3c82183f5c9030e5dbbcfc6313034471
baseline version:
ovmf
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Parth Dixit
>
> Create a helper function for mapping with cached attributes.
>
> Signed-off-by: Parth Dixit
> Signed-off-by: Shannon Zhao
You might be able to
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Copy RSDP table and replace rsdp->xsdt_physical_address with new address
> of XSDT table, so it can point to the right XSDT table.
>
> Signed-off-by: Shannon Zhao
... or when the guest has the XSAVE feature hidden by CPUID policy.
Not doing so is at best confusing to guests.
Signed-off-by: Jan Beulich
---
One question is whether we shouldn't switch leaf 7 to white listing,
just like done for PV guests.
--- a/xen/arch/x86/cpu/common.c
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Copy and modify XSDT table before passing it to Dom0. Repalce the entry
> value of the copied table. Add a new entry for STAO table as well. And
> keep entry value of other reused tables
flight 65136 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65136/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 16
guest-localmigrate/x10 fail REGR. vs.
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Map other reused tables for Dom0.
"Map all other tables to Dom0 using 1:1 mappings."
> Signed-off-by: Shannon Zhao
> ---
> xen/arch/arm/domain_build.c | 25
On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112:
> regressions - FAIL"):
> > On Fri, 2015-11-27 at 01:18 -0700, Jan Beulich wrote:
> > > Neither of these failed in this flight, and there's nothing else
> > > blocking
> > >
>>> On 27.11.15 at 13:02, wrote:
>> > > build-i386 5 xen-build fail in 65062 REGR. vs. 63449
>
> This is completely explained below, I think.
I can't see the connection to any other (failed) test here (also not
in flight 65136's results, which have just come in).
Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On Fri, 2015-11-27 at 01:18 -0700, Jan Beulich wrote:
> > Neither of these failed in this flight, and there's nothing else blocking
> > the push. Why did this not result in a push then? Or in other words
>
On 27/11/15 11:11, Jan Beulich wrote:
On 27.11.15 at 11:57, wrote:
>> On 27/11/15 08:28, Jan Beulich wrote:
>> On 26.11.15 at 17:59, wrote:
Before c/s 44e24f8567 "x86: don't call generic_identify() redundantly", the
On 27/11/15 09:51, Huaitong Han wrote:
> Changes in v2:
> *Rebase all patches in staging branch
> *Disable X86_CR4_PKE on hypervisor, and delete pkru_read/write functions, and
> use xsave state read to get pkru value.
> *Delete the patch that adds pkeys support for do_page_fault.
> *Add pkeys
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Create a few EFI memory descriptors to tell Dom0 the RAM region
> information, ACPI table regions and EFI tables reserved resions.
>
> Signed-off-by: Parth Dixit
>
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Here we map these new created EFI and ACPI tables to the non-RAM space
> of Dom0. Then Dom0 could visit them.
"Map the UEFI and ACPI tables which we created to non-RAM space in
Dom0."
>
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Create a DT for Dom0 for ACPI-case only. DT contains minimal required
> informations such as Dom0 bootargs, initrd, efi description table and
> address of uefi memory table.
>
> Signed-off-by:
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Create STAO table for Dom0. This table is used to tell Dom0 whether it
> should ignore UART defined in SPCR table or the ACPI namespace names.
>
> Look at below url for details:
>
We don't need the claimed API compatibility. No change in generated
code.
Signed-off-by: Jan Beulich
--- a/xen/include/asm-x86/alternative.h
+++ b/xen/include/asm-x86/alternative.h
@@ -83,16 +83,15 @@ extern void alternative_instructions(voi
* Best is to use constraints
On 03.11.2015 19:15, Ross Lagerwall wrote:
[...]
> +struct xen_sysctl_xsplice_summary {
> +xen_xsplice_id_tid; /* IN, the name of the payload. */
I still feel a bit confused about the ID vs. name thingy. IMHO, each
payload should have a name (easily readable by a human, like
On 27/11/15 11:01, Jan Beulich wrote:
> VMX doesn't need a software CPL check on the XSETBV intercept, and
> SVM can do that check without resorting to hvm_get_segment_register().
>
> Clean up what is left of hvm_handle_xsetbv(), namely make it return a
> proper error code.
>
> Signed-off-by: Jan
Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
> > As explained below, in 65112 this step did not run because the earlier
> > step `guest-localmigrate' failed:
> >
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM
builder now uses the PV xc_dom_* set of functions this kernel will be parsed
and loaded inside the guest like on PV, but the container is a pure HVM
guest.
Also, if device_model_version is set to none or a device model
Introduce a new flag in xc_dom_image that turns on and off the emulated
devices. This prevents creating the VGA hole, the hvm_info page and the
ioreq server pages. libxl unconditionally sets it to true for all HVM
domains at the moment.
Signed-off-by: Roger Pau Monné
Instead of choosing the interface to expose to guests based on the guest
type, do it based on whether the guest has an emulated local apic or not.
Signed-off-by: Roger Pau Monné
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
VCPUOP_is_up hypercalls from HVM guests.
This patch introduces a new structure (vcpu_hvm_context) that should be used
in conjuction with the VCPUOP_initialise hypercall in order to initialize
vCPUs for HVM guests.
Only allow enabling or disabling all the emulated devices inside of Xen,
right now Xen doesn't support enabling specific emulated devices only.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Cc: Jan Beulich
Cc:
This are the remaining patches of the HVMlite series. They have been
successfully tested on the following hardware:
- Intel Core i3-5010U.
- AMD Opteron 4184.
With both hap=0 and hap=1 in the configuration file. I've been able to boot
a SMP guest in this mode with a virtual hard drive and a
If certain devices (like the local or the io apic) are disabled some modes
of operation of the HVM event channel callback cannot be used. Make sure Xen
doesn't try to setup them.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
Jan Beulich writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On 27.11.15 at 13:02, wrote:
> > The fact that we have both `guest-localmigrate' and
> > `guest-localmigrate/x10' isn't ideal because it hides from the
> > heisenbug compensator
On 27/11/15 11:54, Jan Beulich wrote:
> All they differ by is the REX64 prefix. Create a single macro covering
> both, at once allowing to get rid of the disconnect between the current
> partial macro and its two use sites.
>
> No change in generated code.
>
> Signed-off-by: Jan Beulich
On Fri, 2015-11-27 at 13:44 +, Ian Jackson wrote:
> Eg, consider these flights:
>
> 100 is now master A pass, B pass pushed
> 200 stagingA pass, B fail `B REGR. vs 100'
> 201 stagingA fail, B not run `B fail in 200 REGR. vs 100'
>
> In flight 201, the
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Signed-off-by: Parth Dixit
> Signed-off-by: Shannon Zhao
> ---
> xen/arch/arm/domain_build.c | 2 ++
> xen/common/efi/boot.c | 64
>
This run is configured for baseline tests only.
flight 38364 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38364/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-ovmf-amd64 5 xen-install fail
Jan Beulich writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On 27.11.15 at 13:28, wrote:
> >> --- a/README.email
> >> +++ b/README.email
> >> @@ -71,6 +71,24 @@ history. Here are some examples:
> >>detect regressions of this test.
On 03.11.2015 19:16, Ross Lagerwall wrote:
> Implement support for the apply, revert and replace actions.
>
> To perform and action on a payload, the hypercall sets up a data
> structure to schedule the work. A hook is added in all the
> return-to-guest paths to check for work to do and execute
On 27/11/15 13:43, Roger Pau Monne wrote:
> diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
> index 7e8054a..d6cb63d 100644
> --- a/tools/libxl/libxl_internal.h
> +++ b/tools/libxl/libxl_internal.h
> @@ -3036,6 +3036,9 @@ struct libxl__stream_write_state {
>
On Fri, 2015-11-27 at 13:24 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112:
> regressions - FAIL"):
> > On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
> > > As explained below, in 65112 this step did not run because the
> > > earlier
> > >
On Fri, 2015-11-27 at 14:03 +, Ian Campbell wrote:
> On Fri, 2015-11-27 at 13:24 +, Ian Jackson wrote:
> > Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112:
> > regressions - FAIL"):
> > > On Fri, 2015-11-27 at 12:02 +, Ian Jackson wrote:
> > > > As explained below,
2015-11-27 14:50 GMT-05:00 Yu-An(Victor) Chen :
> Hi Dario & Meng,
>
> Thanks for your analysis!
>
> VM1 and VM2 both are given 8 vCPUs and sharing physical CPU 0-7. So in
> theory,"VM1 can get the services of 400%"
> And yes, Dario, your explanation about the task utilization is
flight 65155 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65155/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-freebsd10-amd64 6 xen-bootfail like 65132
test-amd64-amd64-xl
flight 65156 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65156/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 6 xen-boot fail REGR. vs. 59254
Ian Campbell writes ("Re: [Xen-devel] [xen-4.6-testing test] 65112: regressions
- FAIL"):
> On Fri, 2015-11-27 at 13:24 +, Ian Jackson wrote:
> > But it might not be true that it was blocked.
>
> Can't sg-run-job tell if it was blocked vs something else though?
(You meant
On 27/11/15 14:50, Juergen Gross wrote:
> For migration the last used pfn of a guest is needed to size the
> logdirty bitmap and as an upper bound of the page loop. Unfortunately
> there are pv-kernels advertising a much higher maximum pfn as they
> are really using in order to support memory
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> Route all SPIs to Dom0 except the interrupts that Xen uses. Since Xen
> already uses the uart interrupt, the desc->action will not be NULL, so
> it will skip it.
>
> Signed-off-by: Shannon
El 27/11/15 a les 14.55, Andrew Cooper ha escrit:
> On 27/11/15 13:43, Roger Pau Monne wrote:
>> diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
>> index 7e8054a..d6cb63d 100644
>> --- a/tools/libxl/libxl_internal.h
>> +++ b/tools/libxl/libxl_internal.h
>> @@ -3036,6
On 27/11/15 11:05, Jan Beulich wrote:
> ... or when the guest has the XSAVE feature hidden by CPUID policy.
> Not doing so is at best confusing to guests.
>
> Signed-off-by: Jan Beulich
These changes here are an improvement (so I don't object to taking them
ahead of my
On Fri, Nov 27, 2015 at 02:43:05PM +0100, Roger Pau Monne wrote:
[...]
> diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
> index 7e8054a..d6cb63d 100644
> --- a/tools/libxl/libxl_internal.h
> +++ b/tools/libxl/libxl_internal.h
> @@ -3036,6 +3036,9 @@ struct
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Shannon Zhao
>
> When booting with ACPI, store the event-channel interrupt number and
> flag in HVM parameter HVM_PARAM_CALLBACK_IRQ. Then Dom0 could get it
> through hypercall HVMOP_get_param.
>
>
On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> From: Naresh Bhat
>
> Add ACPI support on arm64 xen hypervisor. Enable EFI support on ARM.
>
> Signed-off-by: Naresh Bhat
> Signed-off-by: Shannon Zhao
> ---
>
On Fri, Nov 27, 2015 at 03:50:53PM +0100, Juergen Gross wrote:
> For migration the last used pfn of a guest is needed to size the
> logdirty bitmap and as an upper bound of the page loop. Unfortunately
> there are pv-kernels advertising a much higher maximum pfn as they
> are really using in order
Signed-off-by: Ian Jackson
CC: Jan Beulich
---
README.email | 51 +++
1 file changed, 51 insertions(+)
diff --git a/README.email b/README.email
index 5de63dd..e14a816 100644
--- a/README.email
+++
Am 24.11.15 um 11:43 schrieb Jan Beulich:
Taking a random object out of that log, I can't see any non-standard
option passed to the compiler, so I have to assume this is its default
behavior (i.e. determined at build time, or established by extra
patches). Did you check the result of a random,
On Thu, 2015-11-26 at 17:45 +, Ian Jackson wrote:
> Boris Ostrovsky writes ("[PATCH] libxl: Be more careful with error
> handling in libxl__dm_runas_helper()"):
> > getpwnam_r() has fairly complicated return rules. From man pages:
> >
> > RETURN VALUE
> > ...
> > On success,
On 27/11/15 08:51, Kai Huang wrote:
> Since PML series were merged (but disabled by default) we have conducted lots
> of
> PML tests (live migration, GUI display) and PML has been working fine,
> therefore
> turn it on by default.
>
> Document of PML command line is adjusted accordingly as well.
El 27/11/15 a les 9.00, Jan Beulich ha escrit:
On 26.11.15 at 17:57, wrote:
>> El 12/11/15 a les 17.57, Jan Beulich ha escrit:
>> On 06.11.15 at 17:05, wrote:
+if ( reg.attr.fields.pad != 0 )
+{
+
On Thu, 2015-11-26 at 17:19 +, Stefano Stabellini wrote:
> On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote:
> > From: Shannon Zhao
> >
> > Copy and modify FADT table before passing it to Dom0. Set
> > PSCI_COMPLIANT
> > and PSCI_USE_HVC.
> >
> > Signed-off-by:
Changes in v2:
*Rebase all patches in staging branch
*Disable X86_CR4_PKE on hypervisor, and delete pkru_read/write functions, and
use xsave state read to get pkru value.
*Delete the patch that adds pkeys support for do_page_fault.
*Add pkeys support for gva2gfn so that setting _PAGE_PK_BIT in the
This patch adds xstate support for pkeys.
Signed-off-by: Huaitong Han
---
xen/arch/x86/xstate.c| 18 ++
xen/include/asm-x86/xstate.h | 5 -
2 files changed, 22 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/xstate.c
This patch adds the flag to enable Memory Protection Keys.
Signed-off-by: Huaitong Han
---
docs/misc/xen-command-line.markdown | 21 +
xen/arch/x86/setup.c| 7 +++
2 files changed, 28 insertions(+)
diff --git
This patch adds functions to get pkeys value from PTE.
Signed-off-by: Huaitong Han
---
xen/include/asm-x86/guest_pt.h| 7 +++
xen/include/asm-x86/page.h| 5 +
xen/include/asm-x86/x86_64/page.h | 19 +++
3 files changed, 31
1 - 100 of 119 matches
Mail list logo