>>> On 2/3/2016 at 02:11 AM, in message
<22192.61775.427189.268...@mariner.uk.xensource.com>, Ian Jackson
wrote:
> George Dunlap writes ("Re: [Xen-devel] [PATCH V13 3/5] libxl: add pvusb
> API"):
> > There are effectively four states a device can be in, from the
> > 'assignment' point of vie
On 2/2/2016 11:21 PM, Jan Beulich wrote:
On 02.02.16 at 16:00, wrote:
The limit of 4G is to avoid the data missing from uint64 to uint32
assignment. And I can accept the 8K limit for XenGT in practice.
After all, it is vGPU page tables we are trying to trap and emulate,
not normal page frames
On 02/02/16 17:11, Stefano Stabellini wrote:
> Haozhong, thanks for your work!
>
> On Mon, 1 Feb 2016, Haozhong Zhang wrote:
> > 3.2 Address Mapping
> >
> > 3.2.1 My Design
> >
> > The overview of this design is shown in the following figure.
> >
> > Dom0
> From: Gerd Hoffmann [mailto:kra...@redhat.com]
> Sent: Tuesday, February 02, 2016 4:56 PM
>
> Hi,
>
> > > I'd have qemu copy the data on 0xfc write then, so things continue to
> > > work without updating seabios. So, the firmware has to allocate space,
> > > reserve it etc., and programming
From: Christian Borntraeger
As virtio-ccw will have dma ops, we can no longer default to the
zPCI ones. Make use of dev_archdata to keep the dma_ops per device.
The pci devices now use that to override the default, and the
default is changed to use the noop ops for everything that does not
specif
This switches to vring_create_virtqueue, simplifying the driver and
adding DMA API support.
Signed-off-by: Andy Lutomirski
---
drivers/virtio/virtio_mmio.c | 67 ++--
1 file changed, 15 insertions(+), 52 deletions(-)
diff --git a/drivers/virtio/virtio_mmi
This leaves vring_new_virtqueue alone for compatbility, but it
adds two new improved APIs:
vring_create_virtqueue: Creates a virtqueue backed by automatically
allocated coherent memory. (Some day it this could be extended to
support non-coherent memory, too, if there ends up being a platform
on w
This switches to vring_create_virtqueue, simplifying the driver and
adding DMA API support.
This fixes virtio-pci on platforms and busses that have IOMMUs. This
will break the experimental QEMU Q35 IOMMU support until QEMU is
fixed. In exchange, it fixes physical virtio hardware as well as
virti
virtio_ring currently sends the device (usually a hypervisor)
physical addresses of its I/O buffers. This is okay when DMA
addresses and physical addresses are the same thing, but this isn't
always the case. For example, this never works on Xen guests, and
it is likely to fail if a physical "virt
From: Christian Borntraeger
We are going to require dma_ops for several common drivers, even for
systems that do have an identity mapping. Lets provide some minimal
no-op dma_ops that can be used for that purpose.
Signed-off-by: Christian Borntraeger
Reviewed-by: Joerg Roedel
Signed-off-by: An
From: Christian Borntraeger
Some of the alpha pci noop dma ops are identical to the common ones.
Use them.
Signed-off-by: Christian Borntraeger
Reviewed-by: Joerg Roedel
Signed-off-by: Andy Lutomirski
---
arch/alpha/kernel/pci-noop.c | 46
1 file
Signed-off-by: Andy Lutomirski
---
drivers/virtio/virtio_ring.c | 12
1 file changed, 12 insertions(+)
diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c
index e46d08107a50..5c802d47892c 100644
--- a/drivers/virtio/virtio_ring.c
+++ b/drivers/virtio/virtio_ring
This is a kludge, but no one has come up with a a better idea yet.
We'll introduce DMA API support guarded by vring_use_dma_api().
Eventually we may be able to return true on more and more systems,
and hopefully we can get rid of vring_use_dma_api() entirely some
day.
Signed-off-by: Andy Lutomirsk
This switches virtio to use the DMA API on Xen and if requested by
module option.
This fixes virtio on Xen, and it should break anything because it's
off by default on everything except Xen PV on x86.
To the Xen people: is this okay? If it doesn't work on other Xen
variants (PVH? HVM?), can you
flight 79947 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79947/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 11 guest-start fail REGR. vs. 79426
Tests which did not succeed,
At the time, I had a patch queue for splitting the p2m locking into a tree
of per-2M locks. Very similar to Linux's split locks. I scaffolded the
macros to allow for that expansion. Then, I got pulled onto other things.
Andres
On Tue, Feb 2, 2016 at 8:26 AM, Jan Beulich wrote:
> >>> On 02.02.16
branch xen-unstable
xenbranch xen-unstable
job build-amd64-libvirt
testid libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xe
> From: Boris Ostrovsky
> Sent: Wednesday, February 03, 2016 7:17 AM
> To: jbeul...@suse.com; andrew.coop...@citrix.com; k...@xen.org
> Cc: Boris Ostrovsky; roger@citrix.com; david.vra...@citrix.com;
> xen-devel@lists.xen.org
> Subject: [Xen-devel] [PATCH] x86/hvm: Provide list of emulated feat
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: Tuesday, February 02, 2016 12:27 AM
>
> Holding the p2m lock while calling ept_sync_domain() is very expensive
> since it does a on_selected_cpus() call. IPIs on many socket machines
> can be very slows and on_selected_cpus() is serial
Hi Dario and Tianyang,
I will just comment on the parts Tianyang hasn't replied.
On Tue, Feb 2, 2016 at 10:08 AM, Dario Faggioli
wrote:
>
> On Sun, 2016-01-31 at 23:32 -0500, Tianyang Chen wrote:
> > v4 is meant for discussion on the addition of replq.
> >
> In which cases, you should always put
Hi all-
Would it make sense to add some basic Xen PV testing to the kbuild bot?
qemu can boot Xen like this:
qemu-system-x86_64 -kernel path/to/xen-4.5.2 -initrd 'path/to/bzImage
kernelarg otherkernelarg=value" -append 'xenarg other_xen_arg'
This should work with any kernel image for x86 or x86
flight 79918 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79918/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
build-amd64-rumpuserx
Hi,
I met a problem when passthrough 82599 to domU(for some reasons, I use pci
passthrough not SRIOV).
It works well after passthrough, but the host hung after destroy domU.
Btw, no log prints even from serial port, but I found it hung afer unbind irq.
anyone knows what's wrong with it? thanks.
On Tue, Feb 2, 2016 at 6:00 PM, Andrew Cooper
wrote:
> On 03/02/2016 00:51, Tamas K Lengyel wrote:
>
> Hello all,
> with the latest master branch of Xen there is a regression enabling
> vm_event on a domain. If an event listener was previously active on the
> domain it is now not possible to reen
On 03/02/2016 00:51, Tamas K Lengyel wrote:
> Hello all,
> with the latest master branch of Xen there is a regression enabling
> vm_event on a domain. If an event listener was previously active on
> the domain it is now not possible to reenable events as the domctl
> returns -EINVAL. The problem se
On Tue, Feb 02, 2016 at 10:39:09AM +, Andrew Cooper wrote:
> On 02/02/16 04:43, Shuai Ruan wrote:
> >
> >>> I tried booting staging branch but results were identical. Following
> >>> line repeats endlessly.
> >>> (XEN) traps.c:3290: GPF (): 82d0801c1cce -> 82d080252e5c
> >>>
> >>> $
Hello all,
with the latest master branch of Xen there is a regression enabling
vm_event on a domain. If an event listener was previously active on the
domain it is now not possible to reenable events as the domctl returns
-EINVAL. The problem seems to stem from activating the magic page for
vm_even
On Tue, Feb 2, 2016 at 4:28 PM, Luis R. Rodriguez wrote:
> On Tue, Feb 2, 2016 at 4:25 PM, H. Peter Anvin wrote:
>> On 02/02/2016 04:22 PM, Luis R. Rodriguez wrote:
>>s>>
Should it be possible to resuse free_init_pages() and/or
free_reserved_area() only for routines (members in the arra
On Tue, Feb 2, 2016 at 4:25 PM, H. Peter Anvin wrote:
> On 02/02/2016 04:22 PM, Luis R. Rodriguez wrote:
>>>
>>> Should it be possible to resuse free_init_pages() and/or
>>> free_reserved_area() only for routines (members in the array in this
>>> case of a struct of fns) that don't meet our subarc
On 02/02/2016 04:22 PM, Luis R. Rodriguez wrote:
>>
>> Should it be possible to resuse free_init_pages() and/or
>> free_reserved_area() only for routines (members in the array in this
>> case of a struct of fns) that don't meet our subarch once we're done
>> iterating over the routies and know we c
On Fri, Jan 22, 2016 at 1:52 PM, Luis R. Rodriguez
wrote:
> On Fri, Jan 22, 2016 at 11:06 AM, H. Peter Anvin wrote:
>> On 01/22/2016 05:44 AM, Michael Matz wrote:
>>> Hi,
>>>
>>> On Thu, 21 Jan 2016, H. Peter Anvin wrote:
>>>
Something that confuses me is that gcc seems to give these section
On 02/02/2016 23:30, Boris Ostrovsky wrote:
> On 02/02/2016 06:22 PM, Andrew Cooper wrote:
>> On 02/02/2016 23:17, Boris Ostrovsky wrote:
>>> Hypervisor may choose which features to emulate for HVMlite guests.
>>> Guest will query the HVM CPUID leaf to find out what is available.
>>>
>>> Signed-off
On Tue, Feb 2, 2016 at 3:48 PM, H. Peter Anvin wrote:
> On 01/22/2016 05:44 AM, Michael Matz wrote:
>> Hi,
>>
>> On Thu, 21 Jan 2016, H. Peter Anvin wrote:
>>
>>> Something that confuses me is that gcc seems to give these sections the
>>> "aw" attributes which makes as complain. This might be a g
On 01/22/2016 05:44 AM, Michael Matz wrote:
> Hi,
>
> On Thu, 21 Jan 2016, H. Peter Anvin wrote:
>
>> Something that confuses me is that gcc seems to give these sections the
>> "aw" attributes which makes as complain. This might be a gcc bug.
>
> Workaround: use an (possibly empty) intializer:
Joao Martins wrote:
> Introduce support for VIR_MIGRATE_PEER2PEER in libvirt migration.
> Most of the changes occur at the source and no modifications
> at the receiver.
>
> In P2P mode there is only the Perform phase so we must handle
> the connection with the destination and actually perform the
> -Original Message-
> From: Alex Williamson [mailto:alex.william...@redhat.com]
> Sent: Tuesday, February 02, 2016 11:37 AM
> To: Kay, Allen M; Tian, Kevin; Gerd Hoffmann; qemu-de...@nongnu.org
> Cc: igv...@ml01.01.org; xen-de...@lists.xensource.com; Eduardo Habkost;
> Stefano Stabellini
On 02/02/2016 06:22 PM, Andrew Cooper wrote:
On 02/02/2016 23:17, Boris Ostrovsky wrote:
Hypervisor may choose which features to emulate for HVMlite guests.
Guest will query the HVM CPUID leaf to find out what is available.
Signed-off-by: Boris Ostrovsky
Roger also submitted a patch to do thi
On 02/02/2016 23:17, Boris Ostrovsky wrote:
> Hypervisor may choose which features to emulate for HVMlite guests.
> Guest will query the HVM CPUID leaf to find out what is available.
>
> Signed-off-by: Boris Ostrovsky
Roger also submitted a patch to do this. However, it is not
appropriate, so wa
Hypervisor may choose which features to emulate for HVMlite guests.
Guest will query the HVM CPUID leaf to find out what is available.
Signed-off-by: Boris Ostrovsky
---
Another option to expose this is via features interface. The advantage of using
cpuid
is that we don't need to setup hypercal
Wei Liu wrote:
> On Mon, Jan 25, 2016 at 05:25:02PM -0700, Jim Fehlig wrote:
>> I would like to hear the community's opinion on supporting more qdisk types
>> in
>> xl/libxl, e.g. nbd, rbd, iSCSI, etc. I prefer supporting additional qdisk
>> types
>> in libxl over apps like xl or libvirt doing al
On Mon, Jan 18, 2016 at 02:41:52AM -0700, Jan Beulich wrote:
> >>> On 15.01.16 at 22:39, wrote:
> > On Tue, Jan 12, 2016 at 02:22:03AM -0700, Jan Beulich wrote:
> >> Since we can (I hope) pretty much exclude a paging type, the
> >> ASSERT() must have triggered because of vapic_pg being NULL.
> >>
osstest service owner wrote:
> flight 79891 libvirt real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/79891/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-amd64-libvirt 5 libvirt-build fa
On 2/2/16 3:20 PM, Daniel Kiper wrote:
> On Tue, Feb 02, 2016 at 01:02:56PM -0800, PGNet Dev wrote:
>> Here http://wiki.xenproject.org/wiki/Xen_EFI#Xen_as_gz_binary refers
>> to original discussion in 2013 (work has been deferred to Xen 4.6. )
>>
>> and says "work has been deferred to Xen 4.6."
>>
On 02/02/2016 21:20, Daniel Kiper wrote:
> On Tue, Feb 02, 2016 at 01:02:56PM -0800, PGNet Dev wrote:
>> Here http://wiki.xenproject.org/wiki/Xen_EFI#Xen_as_gz_binary refers
>> to original discussion in 2013 (work has been deferred to Xen 4.6. )
>>
>> and says "work has been deferred to Xen 4.6."
>
On Tue, Feb 02, 2016 at 01:02:56PM -0800, PGNet Dev wrote:
> Here http://wiki.xenproject.org/wiki/Xen_EFI#Xen_as_gz_binary refers
> to original discussion in 2013 (work has been deferred to Xen 4.6. )
>
> and says "work has been deferred to Xen 4.6."
>
> >I think that this should be Xen 4.8 target.
Here http://wiki.xenproject.org/wiki/Xen_EFI#Xen_as_gz_binary refers to
original discussion in 2013 (work has been deferred to Xen 4.6. )
and says "work has been deferred to Xen 4.6."
I think that this should be Xen 4.8 target.
That's roughly another year+ from now for EFI support?
Per, htt
HVMlite domains add/remove VCPUs by toggling "availability" property in
xenstore.
Signed-off-by: Boris Ostrovsky
---
tools/libxl/libxl.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 94b5656..ae8bbd8 100644
--- a/tools/li
On Tue, Feb 02, 2016 at 05:10:58PM +, Andrew Cooper wrote:
> On 02/02/16 17:01, PGNet Dev wrote:
> > I launch Xen on EFI currently via chainload in Grub2.
> >
> > While troubleshooting other issue, it's , at best, quite inconvenient.
> > I understand multiboot2 support is in the works.
> >
> >
flight 79889 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79889/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 60684
build-amd6
This run is configured for baseline tests only.
flight 38722 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38722/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1
On Tue, 2016-02-02 at 11:31 -0500, Kevin O'Connor wrote:
> On Tue, Feb 02, 2016 at 09:56:20AM +0100, Gerd Hoffmann wrote:
> > Hi,
> >
> > > > I'd have qemu copy the data on 0xfc write then, so things continue to
> > > > work without updating seabios. So, the firmware has to allocate space,
> >
On Tue, Feb 02, 2016 at 01:15:13PM +, Li, Liang Z wrote:
> > >> We found dom0 will crash when booing on HSW-EX server, the dom0
> > >> kernel version is v4.4. By debugging I found the your patch '
> > >> x86/xen: discard RAM regions above the maximum reservation' , which
> > the commit ID is :
On Tue, 2016-02-02 at 19:10 +, Kay, Allen M wrote:
>
> > -Original Message-
> > From: Tian, Kevin
> > Sent: Monday, February 01, 2016 11:08 PM
> > To: Kay, Allen M; Alex Williamson; Gerd Hoffmann; qemu-de...@nongnu.org
> > Cc: igv...@ml01.01.org; xen-de...@lists.xensource.com; Eduardo
> 3. Design of vNVDIMM in Xen
Thank you for this design!
>
> Similarly to that in KVM/QEMU, enabling vNVDIMM in Xen is composed of
> three parts:
> (1) Guest clwb/clflushopt/pcommit enabling,
> (2) Memory mapping, and
> (3) Guest ACPI emulation.
.. MCE? and vMCE?
>
> The rest of this s
> -Original Message-
> From: Tian, Kevin
> Sent: Monday, February 01, 2016 11:08 PM
> To: Kay, Allen M; Alex Williamson; Gerd Hoffmann; qemu-de...@nongnu.org
> Cc: igv...@ml01.01.org; xen-de...@lists.xensource.com; Eduardo Habkost;
> Stefano Stabellini; Cao jin; vfio-us...@redhat.com
> Su
> > 2.2 vNVDIMM Implementation in KVM/QEMU
> >
> > (1) Address Mapping
> >
> > As described before, the host Linux NVDIMM driver provides a block
> > device interface (/dev/pmem0 at the bottom) for a pmem NVDIMM
> > region. QEMU can than mmap(2) that device into its virtual address
> > s
On Tue, Feb 2, 2016 at 3:25 AM, Michael S. Tsirkin wrote:
> On Mon, Feb 01, 2016 at 10:00:56AM -0800, Andy Lutomirski wrote:
>> This leaves vring_new_virtqueue alone for compatbility, but it
>> adds two new improved APIs:
>>
>> vring_create_virtqueue: Creates a virtqueue backed by automatically
>>
On 2/2/2016 3:29 AM, Dario Faggioli wrote:
On Tue, 2016-02-02 at 01:18 -0500, Tianyang Chen wrote:
The following script caused an unresponsive dom0 and it can not be
reproduced all the time. The dom0 is using credit2 scheduler.
#!/bin/bash
xl cpupool-list -c
xl cpupool-cpu-remove Pool-0 3
xl
George Dunlap writes ("Re: [Xen-devel] [PATCH V13 3/5] libxl: add pvusb API"):
> There are effectively four states a device can be in, from the
> 'assignment' point of view:
>
> 1. Assigned to the normal Linux device driver(s) for the USB device
>
> 2. Assigned to no driver
>
> 3. Assigned to us
On 2/2/2016 10:08 AM, Dario Faggioli wrote:
On Sun, 2016-01-31 at 23:32 -0500, Tianyang Chen wrote:
v4 is meant for discussion on the addition of replq.
In which cases, you should always put something like RFC in the
subject, so people knows what the intent is even by just skimming their
inb
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> This function will be used by ACPI booting. Export it so that it can be
> used by other files.
>
> Signed-off-by: Shannon Zhao
Please remove __init from the declaration.
Reviewed-by: Stefano Stabellini
> xen/arch/arm/bootfd
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Define new command line parameter "acpi" to enable/disable acpi.
> This implements the following policy to decide whether ACPI should be
> used to boot the system:
> - acpi=off: ACPI will not be used to boot the system, even if the
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Parse ACPI SPCR (Serial Port Console Redirection table) table and
> initialize the serial port pl011.
>
> Signed-off-by: Parth Dixit
> Signed-off-by: Shannon Zhao
> ---
> V4: Add other fields of SPCR Interface type
Reviewed-by:
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> This adds a new function to initialize UART for ACPI on ARM.
>
> Signed-off-by: Shannon Zhao
> ---
> xen/arch/arm/setup.c| 2 +-
> xen/drivers/char/arm-uart.c | 33 +++--
> xen/include/xen/se
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Parse GTDT (Generic Timer Descriptor Table) to initialize timer. Using
> the information presented by GTDT to initialize the arch timer (not
> memory-mapped).
>
> Signed-off-by: Parth Dixit
> Signed-off-by: Shannon Zhao
> ---
>
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Since ACPI 6.0 defines that GIC Distributor Structure contains the GIC
> version filed, it could get GIC version from that. Then call acpi device
> initializing function to preinit GIC device.
>
> Signed-off-by: Shannon Zhao
> --
On Sat, 23 Jan 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Like GICv2, ACPI on Xen hypervisor uses MADT table for proper GICv3
> initialization. Parse GIC distributor subtable, redistributor subtable
> and interrupt subtable.
>
> Signed-off-by: Shannon Zhao
> ---
> V4: move ioremap to co
flight 79987 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79987/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 02/02/2016 11:39 AM, David Vrabel wrote:
On 01/02/16 15:38, Boris Ostrovsky wrote:
--- a/include/xen/xen.h
+++ b/include/xen/xen.h
@@ -29,6 +29,12 @@ extern enum xen_domain_type xen_domain_type;
#define xen_initial_domain() (0)
#endif/* CONFIG_XEN_DOM0 */
+#ifdef CONFIG_XEN_PV
Haozhong, thanks for your work!
On Mon, 1 Feb 2016, Haozhong Zhang wrote:
> 3.2 Address Mapping
>
> 3.2.1 My Design
>
> The overview of this design is shown in the following figure.
>
> Dom0 | DomU
>
On 02/02/16 17:01, PGNet Dev wrote:
> I launch Xen on EFI currently via chainload in Grub2.
>
> While troubleshooting other issue, it's , at best, quite inconvenient.
> I understand multiboot2 support is in the works.
>
> The latest status I've found on multiboot2 support in Xen is
>
> http://lis
On Tue, Feb 02, 2016 at 09:01:50AM -0800, PGNet Dev wrote:
> I launch Xen on EFI currently via chainload in Grub2.
>
> While troubleshooting other issue, it's , at best, quite inconvenient. I
> understand multiboot2 support is in the works.
>
> The latest status I've found on multiboot2 support i
On 02/02/2016 11:27 AM, David Vrabel wrote:
On 01/02/16 15:38, Boris Ostrovsky wrote:
xen_timer_init() will be called from apic_bsp_setup().
I must be missing something because xen_init_time_ops() is only called
from the PV-only xen_start_kernel()?
This is leftover from the earlier series whe
I launch Xen on EFI currently via chainload in Grub2.
While troubleshooting other issue, it's , at best, quite inconvenient.
I understand multiboot2 support is in the works.
The latest status I've found on multiboot2 support in Xen is
http://lists.gnu.org/archive/html/grub-devel/2015-07/msg
On 02/02/2016 11:21 AM, David Vrabel wrote:
This needs some more description in the commit message.
--- a/arch/x86/xen/smp.c
+++ b/arch/x86/xen/smp.c
[...]
+ hctxt->cpu_regs.x86_32.cs_base = 0;
+ hctxt->cpu_regs.x86_32.cs_limit = ~0u;
+ hctxt->cpu_reg
Including Igor & MST
Thanks
Laszlo
On 02/02/16 17:31, Kevin O'Connor wrote:
> On Tue, Feb 02, 2016 at 09:56:20AM +0100, Gerd Hoffmann wrote:
>> Hi,
>>
I'd have qemu copy the data on 0xfc write then, so things continue to
work without updating seabios. So, the firmware has to allocate
On 02/02/2016 03:39 PM, Jim Fehlig wrote:
> Joao Martins wrote:
>>
>> On 02/02/2016 01:23 AM, Jim Fehlig wrote:
>>> On 01/20/2016 12:00 PM, Joao Martins wrote:
. From libxlMigrationBegin to libxlDomainMigrateBegin3Params().
This is a preparatory patch to be able to begin a job in the
>>
On Tue, Feb 02, 2016 at 01:34:38PM +, David Vrabel wrote:
> On 02/02/16 13:15, Li, Liang Z wrote:
> We found dom0 will crash when booing on HSW-EX server, the dom0
> kernel version is v4.4. By debugging I found the your patch '
> x86/xen: discard RAM regions above the maximum res
On 02/02/2016 11:13 AM, David Vrabel wrote:
On 01/02/16 15:38, Boris Ostrovsky wrote:
.. just like we currently do for PVH guests
I think this description is wrong. In the HVM guess the grant table
initialization is delayed, but here we want to do it immediately (since
we may have no platform
On Tue, Jan 19, 2016 at 3:48 PM, Ian Jackson wrote:
> Chunyan Liu writes ("[PATCH V13 3/5] libxl: add pvusb API"):
>> > Ought this function to really report success if these calls fail ?
>>
>> I think so. Till here, the USB device has already been unbound from
>> usbback and removed from xenstore.
On 01/02/16 15:38, Boris Ostrovsky wrote:
> --- a/include/xen/xen.h
> +++ b/include/xen/xen.h
> @@ -29,6 +29,12 @@ extern enum xen_domain_type xen_domain_type;
> #define xen_initial_domain() (0)
> #endif /* CONFIG_XEN_DOM0 */
>
> +#ifdef CONFIG_XEN_PVHVM
> +extern int xen_hvmlite;
> +#els
On Tue, Feb 02, 2016 at 09:56:20AM +0100, Gerd Hoffmann wrote:
> Hi,
>
> > > I'd have qemu copy the data on 0xfc write then, so things continue to
> > > work without updating seabios. So, the firmware has to allocate space,
> > > reserve it etc., and programming the 0xfc register. Qemu has to
On 01/02/16 15:38, Boris Ostrovsky wrote:
> xen_timer_init() will be called from apic_bsp_setup().
I must be missing something because xen_init_time_ops() is only called
from the PV-only xen_start_kernel()?
David
> --- a/arch/x86/xen/time.c
> +++ b/arch/x86/xen/time.c
> @@ -492,7 +492,10 @@ void
>>> On 02.02.16 at 07:54, wrote:
> Hi all:
> In patch e1e40bccee7490a01ac7d1f759ec2bbafd3c7185, it says that"many
> routines can logically assert holding the p2m *FOR A SPECIFIC GFN.*" ,
> But I find out that it did nothing for locking a single gfn, in fact it
> still locked the entire p2m lis
On Tue, Jan 19, 2016 at 3:48 PM, Ian Jackson wrote:
> Chunyan Liu writes ("[PATCH V13 3/5] libxl: add pvusb API"):
>> +static int usbback_dev_unassign(libxl__gc *gc, const char *busid)
>> +{
> ...
>> +/* Till here, USB device has been unbound from USBBACK and
>> + * removed from xenstore,
This needs some more description in the commit message.
> --- a/arch/x86/xen/smp.c
> +++ b/arch/x86/xen/smp.c
[...]
> + hctxt->cpu_regs.x86_32.cs_base = 0;
> + hctxt->cpu_regs.x86_32.cs_limit = ~0u;
> + hctxt->cpu_regs.x86_32.cs_ar = 0xc9b;
> + hctxt
On 01/02/16 15:38, Boris Ostrovsky wrote:
> Subsequent patch will add support for starting secondary VCPUs in
> HVMlite guest. This patch exists to simmplify code review.
>
> No functional changes (except for introduction of 'if (!xen_hvmlite)').
Acked-by: David Vrabel
David
__
On 02/02/2016 07:51 AM, Jan Beulich wrote:
So would you please confirm that this indeed fixes your issue?
I'm hesitant to put it in without confirmation, and it's likely too
late for 4.6.1 now anyway (so would then only appear in 4.6.2).
I don't build Xen. I use packages provided by Opensuse d
On 01/02/16 15:38, Boris Ostrovsky wrote:
> .. just like we currently do for PVH guests
I think this description is wrong. In the HVM guess the grant table
initialization is delayed, but here we want to do it immediately (since
we may have no platform PCI device to trigger it otherwise).
Otherwi
On 01/02/16 15:38, Boris Ostrovsky wrote:
> Signed-off-by: Boris Ostrovsky
Acked-by: David Vrabel
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
flight 79827 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79827/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 19 guest-destroy fail
REGR. vs. 79422
test-a
flight 79969 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79969/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 79786
Tests which di
>>> On 01.02.16 at 15:54, wrote:
> This looks very much like it needs backport of 33c19df9a ("x86/PCI:
> intercept accesses to RO MMIO from dom0s in HVM containers") from
> unstable, which fixes PVH regression introduced by 9256f66c1606
> ("x86/PCI: intercept all PV Dom0 MMCFG writes")
So woul
flight 79852 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79852/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check
fail never pass
test-amd64-amd64-qemuu-nested-
flight 79875 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79875/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 65543
test-amd64-i386-
>>> On 02.02.16 at 16:27, wrote:
> On 02/02/16 15:15, Jan Beulich wrote:
>> @@ -2095,6 +2131,30 @@ void *map_domain_gfn(struct p2m_domain *
>> return map_domain_page(*mfn);
>> }
>>
>> +static unsigned int mmio_order(const struct domain *d,
>> + unsigned long s
Joao Martins wrote:
>
> On 02/02/2016 01:23 AM, Jim Fehlig wrote:
>> On 01/20/2016 12:00 PM, Joao Martins wrote:
>>> . From libxlMigrationBegin to libxlDomainMigrateBegin3Params().
>>> This is a preparatory patch to be able to begin a job in the
>>> perform phase.
>>>
>>> Signed-off-by: Joao Marti
flight 79891 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/79891/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-build fail REGR. vs. 79451
build-i386-libvirt
On 02/01/2016 06:49 PM, Brendan Gregg wrote:
On Mon, Feb 1, 2016 at 11:58 AM, Boris Ostrovsky
mailto:boris.ostrov...@oracle.com>> wrote:
Current PVH implementation has never been described as
production-ready. What is happening now with HVMlite is
essentially bringing PVH to pro
On 02/02/16 15:15, Jan Beulich wrote:
> @@ -2095,6 +2131,30 @@ void *map_domain_gfn(struct p2m_domain *
> return map_domain_page(*mfn);
> }
>
> +static unsigned int mmio_order(const struct domain *d,
> + unsigned long start_fn, unsigned long nr)
> +{
> +if
1 - 100 of 191 matches
Mail list logo