AVX-512 is an extention of AVX2. Its spec can be found at:
https://software.intel.com/sites/default/files/managed/b4/3a/319433-024.pdf
This patch detects AVX-512 features by CPUID.
Signed-off-by: Luwei Kang
---
[V4]:
Update the description about features dependency.
[V3]:
flight 96367 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96367/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR.
vs. 94856
flight 96444 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96444/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96439 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96439/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
branch xen-unstable
xenbranch xen-unstable
job build-amd64-xsm
testid xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree: ovmf
flight 96430 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96430/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96428 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96428/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96422 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96422/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96374 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96374/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 80927
flight 96418 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96418/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96416 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96416/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96411 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96411/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
branch xen-unstable
xenbranch xen-unstable
job build-i386-xsm
testid xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree: ovmf
flight 96408 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96408/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96394 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96394/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96399 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96399/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
branch xen-unstable
xenbranch xen-unstable
job build-armhf-xsm
testid xen-build
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree: xen git://xenbits.xen.org/xen.git
Bug introduced:
On 06/29/2016 10:39 AM, Konrad Rzeszutek Wilk wrote:
Hey Jens,
Please git pull the 'stable/for-jens-4.7' branch which is based on your
'for-4.7/drivers' branch. It will nicely merge in your 'for-linus' branch:
git pull git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
On 06/28/2016 09:41 AM, Boris Ostrovsky wrote:
> On 06/28/2016 07:03 AM, Shannon Zhao wrote:
>> On 2016/6/27 20:05, Boris Ostrovsky wrote:
>>> On 06/27/2016 06:29 AM, Julien Grall wrote:
(CC Boris and Doug)
Hi Shannon,
On 27/06/16 07:01, Shannon Zhao wrote:
> On
I have been trying to trace a problem when using Fedora's qemu with a pv
guest which is that no graphics are available. I get the errors
xen be core: xen be: watching backend path (backend/console/2) failed
xen be core: xen be: watching backend path (backend/vkbd/2) failed
xen be core: xen be:
On Tue, Jun 28, 2016 at 1:37 AM, Jan Beulich wrote:
On 27.06.16 at 20:08, wrote:
>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>> +++ b/xen/arch/x86/hvm/vmx/vmx.c
>> @@ -3376,7 +3376,29 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs)
>>
flight 96376 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96376/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96382 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96382/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Sat, 2016-06-25 at 20:48 -0400, Tianyang Chen wrote:
> Vcpu flags are checked and cleared atomically. Performance can be
> improved with corresponding non-atomic versions since schedule.c
> already has spin_locks in place.
>
> Signed-off-by: Tianyang Chen
>
Reviewed-by:
Hey Jens,
Please git pull the 'stable/for-jens-4.7' branch which is based on your
'for-4.7/drivers' branch. It will nicely merge in your 'for-linus' branch:
git pull git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.7
which has one fix for migration of guest. We
On Wed, 2016-06-29 at 10:18 +, osstest service owner wrote:
> flight 96351 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/96351/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-armhf-xsm
On 29/06/16 17:19, Vitaly Kuznetsov wrote:
> Vitaly Kuznetsov writes:
>
>> > Andrew Cooper writes:
>> >
>>> >> On 29/06/16 13:16, Vitaly Kuznetsov wrote:
>>> Andrew Cooper writes:
>>>
> On 28/06/16
In summary, there's a problem
An indication of the guest trying to allocate more memory that the host
admin has allowed.
that's filling logs with 10s of thousands of redundant log entries, with
a suspicion that it's 'ballooning' issue in the guest
Perhaps something wrong in the
On Sat, 2016-06-25 at 20:48 -0400, Tianyang Chen wrote:
> No functional change:
> -aligned comments in rt_vcpu struct
> -removed double underscores from the names of some functions
> -fixed coding sytle for control structures involving lists
> -fixed typos in the comments
> -added comments
Vitaly Kuznetsov writes:
> Andrew Cooper writes:
>
>> On 29/06/16 13:16, Vitaly Kuznetsov wrote:
>>> Andrew Cooper writes:
>>>
On 28/06/16 17:47, Vitaly Kuznetsov wrote:
> @@ -1808,6 +1822,8 @@ static int
>>> On 29.06.16 at 17:38, wrote:
> On 06/29/2016 07:17 AM, Jan Beulich wrote:
>> I don't think a guest would itself issue any relevant messages.
>
> You mentioned ballooning in the guest. The doc I found addressed
> ballooning, in the guest.
>
> If not that, then what
On Wed, Jun 29, 2016 at 05:50:48PM +0200, Juergen Gross wrote:
> The qdisk implementation is using the native xenbus protocol only in
> case of no protocol specified at all. As using the explicit 32- or
> 64-bit protocol is slower than the native one due to copying requests
> not by memcpy but
The qdisk implementation is using the native xenbus protocol only in
case of no protocol specified at all. As using the explicit 32- or
64-bit protocol is slower than the native one due to copying requests
not by memcpy but element for element, this is not optimal.
Correct this by using the
Hi Julien,
On 22.06.2016 17:26, Julien Grall wrote:
Hello Dirk,
On 21/06/16 11:16, Dirk Behme wrote:
Some clocks might be used by the Xen hypervisor and not by the Linux
kernel. If these are not registered by the Linux kernel, they might be
disabled by clk_disable_unused() as the kernel
[Cc-ing Roger and Wei, which have *BSD experience]
On Tue, 2016-06-28 at 18:00 -0700, John Nemeth wrote:
> I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for
> use with NetBSD. I have it mostly done; however, when I try to
> create a domU, libxl goes into an infinite loop calling
On 29/06/16 16:00, Amitoj Kaur Chawla wrote:
> The kernel.h macro DIV_ROUND_UP performs the computation
> (((n) + (d) - 1) /(d)) but is perhaps more readable.
>
> The Coccinelle script used to make this change is as follows:
> @haskernel@
> @@
>
> #include
>
> @depends on haskernel@
>
On 29/06/16 17:20, Anthony PERARD wrote:
> On Fri, Jun 17, 2016 at 01:14:56PM +0200, Juergen Gross wrote:
>> The qdisk implementation is using the native xenbus protocol only in
>> case of no protocol specified at all. As using the explicit 32- or
>> 64-bit protocol is slower than the native one
On 29/06/16 17:34, Jan Beulich wrote:
On 29.06.16 at 17:00, wrote:
>> --- a/arch/x86/xen/enlighten.c
>> +++ b/arch/x86/xen/enlighten.c
>> @@ -591,7 +591,7 @@ static void xen_load_gdt(const struct desc_ptr *dtr)
>> {
>> unsigned long va = dtr->address;
>>
On 06/29/2016 07:17 AM, Jan Beulich wrote:
I don't think a guest would itself issue any relevant messages.
You mentioned ballooning in the guest. The doc I found addressed
ballooning, in the guest.
If not that, then what output, with specificity, would be helpful in
troubleshooting this ?
>>> On 29.06.16 at 17:00, wrote:
> --- a/arch/x86/xen/enlighten.c
> +++ b/arch/x86/xen/enlighten.c
> @@ -591,7 +591,7 @@ static void xen_load_gdt(const struct desc_ptr *dtr)
> {
> unsigned long va = dtr->address;
> unsigned int size = dtr->size + 1;
> -
On 06/29/2016 03:51 AM, Xu, Quan wrote:
On June 15, 2016 7:49 PM, < wei.l...@citrix.com > wrote:
On Tue, Jun 14, 2016 at 12:32:19PM +0200, Andrea Genuise wrote:
[...]
libxl: debug: libxl_aoutils.c:88:xswait_timeout_callback: backend
/local/domain/748/backend/vtpm/749/0/state (hoping for state
On Fri, Jun 17, 2016 at 01:14:56PM +0200, Juergen Gross wrote:
> The qdisk implementation is using the native xenbus protocol only in
> case of no protocol specified at all. As using the explicit 32- or
> 64-bit protocol is slower than the native one due to copying requests
> not by memcpy but
This adds a Kconfig option and support for including the XSM policy from
tools/flask/policy in the hypervisor so that the bootloader does not
need to provide a policy to get sane behavior from an XSM-enabled
hypervisor. The policy provided by the bootloader, if present, will
override the built-in
On 06/29/2016 06:58 AM, Ian Jackson wrote:
Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 96330: regressions -
trouble: blocked/broken/fail/pass"):
On 28.06.16 at 21:16, wrote:
This latter one is
objcopy -S -I binary -O elf64-little
The kernel.h macro DIV_ROUND_UP performs the computation
(((n) + (d) - 1) /(d)) but is perhaps more readable.
The Coccinelle script used to make this change is as follows:
@haskernel@
@@
#include
@depends on haskernel@
expression n,d;
@@
(
- (n + d - 1) / d
+ DIV_ROUND_UP(n,d)
|
- (n + (d -
>>> On 29.06.16 at 13:27, wrote:
> AVX-512 is an extention of AVX2. Its spec can be found at:
> https://software.intel.com/sites/default/files/managed/b4/3a/319433-024.pdf
> This patch detects AVX-512 features by CPUID.
>
> Signed-off-by: Luwei Kang
>>> On 29.06.16 at 13:45, wrote:
> From table 2-2 I can see that
> AVX512F = AVX512F & AVX512VL
> AVX512CD = AVX512F & AVX512VL & AVX512CD
> AVX512DQ = AVX512F & AVX512VL & AVX512DQ
> AVX512BW = AVX512F & AVX512VL & AVX512BW
> AVX512IFMA = AVX512F &
>>> On 29.06.16 at 13:21, wrote:
> The other reason I am hesitant about PTR_ERR() is that it obfuscates the
> semantics sufficiently for Coverity to give up.
Mind giving some more detail? These inline functions aren't all that
obfuscating - just a couple of casts. If
>>> On 29.06.16 at 14:58, wrote:
> On 06/29/2016 03:07 AM, Jan Beulich wrote:
>>> What needs to be fixed, or if of no concern, can these messages be silenced?
>>
>> Perhaps something wrong in the guest's balloon driver.
>
> I'm seeing these @host log-entries for Ubuntu, Arch
>>> On 29.06.16 at 13:37, wrote:
> On 29/06/16 11:03, Jan Beulich wrote:
> On 29.06.16 at 11:50, wrote:
>>> On 29/06/16 03:20, Luwei Kang wrote:
--- a/xen/tools/gen-cpuid.py
+++ b/xen/tools/gen-cpuid.py
@@ -235,6 +235,10 @@
fyi, per
Verify Xen Project PVHVM drivers are working in the Linux HVM guest
kernel
http://wiki.xen.org/wiki/Xen_Linux_PV_on_HVM_drivers
"Run "dmesg | egrep -i 'xen|front'" in the HVM guest VM."
with Guest cmd line,
... systemd.log_level=debug
On 29/06/16 15:31, Ross Lagerwall wrote:
> On 06/29/2016 02:00 PM, Juergen Gross wrote:
>> On 29/06/16 14:52, Andrew Cooper wrote:
>>> On 29/06/16 13:44, Juergen Gross wrote:
@@ -2068,13 +1964,6 @@ int main(int argc, char *argv[])
/* Tell the kernel we're up and running. */
flight 96355 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96355/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build fail REGR. vs. 87893
On 2016年06月29日 17:42, Julien Grall wrote:
> On 29/06/2016 10:29, Shannon Zhao wrote:
>>
>>
>> On 2016/6/27 18:17, Julien Grall wrote:
>>> On 27/06/16 02:44, Shannon Zhao wrote:
On 2016/6/24 0:26, Julien Grall wrote:
> On 23/06/16 04:16, Shannon Zhao wrote:
>> From: Shannon Zhao
On 06/29/2016 02:00 PM, Juergen Gross wrote:
On 29/06/16 14:52, Andrew Cooper wrote:
On 29/06/16 13:44, Juergen Gross wrote:
@@ -2068,13 +1964,6 @@ int main(int argc, char *argv[])
/* Tell the kernel we're up and running. */
xenbus_notify_running();
-#if
On 29/06/16 14:52, Andrew Cooper wrote:
> On 29/06/16 13:44, Juergen Gross wrote:
>> @@ -2068,13 +1964,6 @@ int main(int argc, char *argv[])
>> /* Tell the kernel we're up and running. */
>> xenbus_notify_running();
>>
>> -#if defined(XEN_SYSTEMD_ENABLED)
>> -if (systemd) {
>> -
On 06/29/2016 03:07 AM, Jan Beulich wrote:
What are these 'Over-allocation' messages?
An indication of the guest trying to allocate more memory that the
host admin has allowed.
currently, each guest has allocated
maxmem = 2048
memory = 2048
What needs to be fixed, or if of no
On 29/06/16 13:44, Juergen Gross wrote:
> @@ -2068,13 +1964,6 @@ int main(int argc, char *argv[])
> /* Tell the kernel we're up and running. */
> xenbus_notify_running();
>
> -#if defined(XEN_SYSTEMD_ENABLED)
> - if (systemd) {
> - sd_notify(1, "READY=1");
> -
Andrew Cooper writes:
> On 29/06/16 13:16, Vitaly Kuznetsov wrote:
>> Andrew Cooper writes:
>>
>>> On 28/06/16 17:47, Vitaly Kuznetsov wrote:
@@ -1808,6 +1822,8 @@ static int xen_hvm_cpu_notify(struct notifier_block
*self,
On 31/05/16 17:56, Bhaktipriya Shridhar wrote:
> System workqueues have been able to handle high level of concurrency
> for a long time now and there's no reason to use dedicated workqueues
> just to gain concurrency. Replace dedicated xenbus_frontend_wq with the
> use of system_wq.
>
> Unlike a
On 01/06/16 15:15, Bhaktipriya Shridhar wrote:
> System workqueues have been able to handle high level of concurrency
> for a long time now and there's no reason to use dedicated workqueues
> just to gain concurrency. Replace dedicated xen_pcibk_wq with the
> use of system_wq.
>
> Unlike a
Add a configuration option to /etc/sysconfig/xencommons to let the
user configure whether he wants to start xenstore service as a daemon
or as a stubdom.
Juergen Gross (2):
tools: remove systemd xenstore socket definitions
tools: make xenstore domain easy configurable
tools/configure
Add configuration entries to sysconfig.xencommons for selection of the
xenstore type (domain or daemon) and start the selected xenstore
service via a script called from sysvinit or systemd.
Signed-off-by: Juergen Gross
---
tools/configure| 2
On a system with systemd the xenstore sockets are created via systemd.
Remove the related configuration files in order to be able to decide
at runtime whether the sockets should be created or not. This will
enable Xen to start xenstore either via a daemon or via a stub domain.
Signed-off-by:
On 27/06/16 08:24, Jan Beulich wrote:
On 24.06.16 at 17:01, wrote:
>> On 07/06/16 07:31, Jan Beulich wrote:
>>> - drop unused function parameter of read_dev_bar()
>>> - drop rom_init() (now identical to bar_init())
>>> - fold read_dev_bar() into its now single caller
flight 96373 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96373/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
On 29/06/16 10:16, Vitaly Kuznetsov wrote:
> David Vrabel writes:
>
>> On 28/06/16 17:47, Vitaly Kuznetsov wrote:
>>> It may happen that Xen's and Linux's ideas of vCPU id diverge. In
>>> particular, when we crash on a secondary vCPU we may want to do kdump
>>> and
On 28/06/16 17:47, Vitaly Kuznetsov wrote:
> shared_info page has space for 32 vcpu info slots for first 32 vCPUs but
> these are the first 32 vCPUs from Xen's perspective and we should map them
> accordingly with the newly introduced xen_vcpu_id mapping.
>
> Signed-off-by: Vitaly Kuznetsov
On 29/06/16 13:16, Vitaly Kuznetsov wrote:
> Andrew Cooper writes:
>
>> On 28/06/16 17:47, Vitaly Kuznetsov wrote:
>>> @@ -1808,6 +1822,8 @@ static int xen_hvm_cpu_notify(struct notifier_block
>>> *self, unsigned long action,
>>> int cpu = (long)hcpu;
>>>
On 28/06/16 17:47, Vitaly Kuznetsov wrote:
> HYPERVISOR_vcpu_op passes Linux's idea of vCPU id as a parameter while
> Xen's idea is expected. In some cases these ideas diverge so we need to
> do remapping.
>
> There is an issue, however. PV guests do VCPUOP_is_up very early
> (see
Hi Andrew,
On 28/06/2016 18:21, Andrew Cooper wrote:
On 28/06/16 17:17, Julien Grall wrote:
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index f11094e..5ffc3df 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.c
@@ -1211,20 +1211,20 @@ int unmap_mmio_regions(struct domain *d,
}
Andrew Cooper writes:
> On 28/06/16 17:47, Vitaly Kuznetsov wrote:
>> @@ -1808,6 +1822,8 @@ static int xen_hvm_cpu_notify(struct notifier_block
>> *self, unsigned long action,
>> int cpu = (long)hcpu;
>> switch (action) {
>> case CPU_UP_PREPARE:
>> +
On 29/06/2016 12:55, Dirk Behme wrote:
On 29.06.2016 13:47, Julien Grall wrote:
To be honest, the device-tree bindings does not mention any estimation
(see [2]). I have noticed that some pages on the wiki use hardcoded DT
(see [3]). So the documentation needs to be fixed.
Which ignores the
On 29.06.2016 13:47, Julien Grall wrote:
On 29/06/2016 12:31, Dirk Behme wrote:
On 29.06.2016 13:08, Dirk Behme wrote:
Hi Julien,
On 29.06.2016 12:32, Julien Grall wrote:
Hi Dirk,
On 27/06/2016 08:53, Dirk Behme wrote:
+if ( (end - start) > size ) {
+printk(XENLOG_ERR "Error:
On 29/06/2016 12:31, Dirk Behme wrote:
On 29.06.2016 13:08, Dirk Behme wrote:
Hi Julien,
On 29.06.2016 12:32, Julien Grall wrote:
Hi Dirk,
On 27/06/2016 08:53, Dirk Behme wrote:
+if ( (end - start) > size ) {
+printk(XENLOG_ERR "Error: Kernel Image size: %lu bytes >
bootmodule
From table 2-2 I can see that
AVX512F = AVX512F & AVX512VL
AVX512CD = AVX512F & AVX512VL & AVX512CD
AVX512DQ = AVX512F & AVX512VL & AVX512DQ
AVX512BW = AVX512F & AVX512VL & AVX512BW
AVX512IFMA = AVX512F & AVX512VL & AVX512IFMA
AVX512VBMI = AVX512F & AVX512VL & AVX512VBMI
flight 96353 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96353/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-build fail REGR. vs. 80927
Hi Julien,
On 29.06.2016 13:33, Julien Grall wrote:
On 29/06/2016 12:08, Dirk Behme wrote:
On 29.06.2016 12:32, Julien Grall wrote:
Hi Dirk,
On 27/06/2016 08:53, Dirk Behme wrote:
+if ( (end - start) > size ) {
+printk(XENLOG_ERR "Error: Kernel Image size: %lu bytes >
On 29/06/16 11:03, Jan Beulich wrote:
On 29.06.16 at 11:50, wrote:
>> On 29/06/16 03:20, Luwei Kang wrote:
>>> --- a/xen/tools/gen-cpuid.py
>>> +++ b/xen/tools/gen-cpuid.py
>>> @@ -235,6 +235,10 @@ def crunch_numbers(state):
>>> # subsequent instruction
On 29/06/2016 12:08, Dirk Behme wrote:
On 29.06.2016 12:32, Julien Grall wrote:
Hi Dirk,
On 27/06/2016 08:53, Dirk Behme wrote:
+if ( (end - start) > size ) {
+printk(XENLOG_ERR "Error: Kernel Image size: %lu bytes >
bootmodule size: %lu bytes\n",
+
On 29.06.2016 13:08, Dirk Behme wrote:
Hi Julien,
On 29.06.2016 12:32, Julien Grall wrote:
Hi Dirk,
On 27/06/2016 08:53, Dirk Behme wrote:
+if ( (end - start) > size ) {
+printk(XENLOG_ERR "Error: Kernel Image size: %lu bytes >
bootmodule size: %lu bytes\n",
+
AVX-512 is an extention of AVX2. Its spec can be found at:
https://software.intel.com/sites/default/files/managed/b4/3a/319433-024.pdf
This patch detects AVX-512 features by CPUID.
Signed-off-by: Luwei Kang
---
[V3]
1.adjust dependencies between features.
[V2]
1.one per
On 29.06.2016 13:08, Dirk Behme wrote:
Hi Julien,
On 29.06.2016 12:32, Julien Grall wrote:
Hi Dirk,
On 27/06/2016 08:53, Dirk Behme wrote:
+if ( (end - start) > size ) {
+printk(XENLOG_ERR "Error: Kernel Image size: %lu bytes >
bootmodule size: %lu bytes\n",
+
On 29/06/16 12:11, Tim Deegan wrote:
> At 03:55 -0600 on 29 Jun (1467172554), Jan Beulich wrote:
> On 28.06.16 at 20:56, wrote:
>>> Using PTR_ERR() is less disruptive to the code, but will cause
>>> collateral damage for anyone with out-of-tree patches, as the code
flight 96364 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96364/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 guest-saverestorefail never pass
test-armhf-armhf-libvirt 12
At 03:55 -0600 on 29 Jun (1467172554), Jan Beulich wrote:
> >>> On 28.06.16 at 20:56, wrote:
> > Using PTR_ERR() is less disruptive to the code, but will cause
> > collateral damage for anyone with out-of-tree patches, as the code will
> > compile but the error logic
Hi Julien,
On 29.06.2016 12:32, Julien Grall wrote:
Hi Dirk,
On 27/06/2016 08:53, Dirk Behme wrote:
+if ( (end - start) > size ) {
+printk(XENLOG_ERR "Error: Kernel Image size: %lu bytes >
bootmodule size: %lu bytes\n",
+ zimage.image_size, (uint64_t)size);
+
Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 96330: regressions -
trouble: blocked/broken/fail/pass"):
> On 28.06.16 at 21:16, wrote:
> This latter one is
>
> objcopy -S -I binary -O elf64-little --rename-section=.data=.init.xsm_policy
> policy.bin
flight 96368 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96368/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 94748
build-amd64-xsm
flight 96369 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96369/
Perfect :-)
All tests in this flight passed
version targeted for testing:
xen 3cdad93704aaa8bf1f274969e401ca21152bc4a2
baseline version:
xen
Hi Dirk,
On 27/06/2016 08:53, Dirk Behme wrote:
+if ( (end - start) > size ) {
+printk(XENLOG_ERR "Error: Kernel Image size: %lu bytes > bootmodule size:
%lu bytes\n",
+ zimage.image_size, (uint64_t)size);
+printk(XENLOG_ERR "The field 'size' does not match
flight 96351 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96351/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 5 xen-build fail REGR. vs. 96296
>>> On 29.06.16 at 02:06, wrote:
> What are these 'Over-allocation' messages?
An indication of the guest trying to allocate more memory that the
host admin has allowed.
> What needs to be fixed, or if of no concern, can these messages be silenced?
Perhaps something wrong
>>> On 29.06.16 at 11:50, wrote:
> On 29/06/16 03:20, Luwei Kang wrote:
>> --- a/xen/tools/gen-cpuid.py
>> +++ b/xen/tools/gen-cpuid.py
>> @@ -235,6 +235,10 @@ def crunch_numbers(state):
>> # subsequent instruction groups may only be VEX encoded.
>>
>>> On 28.06.16 at 20:56, wrote:
> On 28/06/16 18:56, Andrew Cooper wrote:
>>
>>
>> This is the first in a number of changes trying to clean up error reporting
> of
>> memory conditions.
>
> One area which is constantly causing problems is creation of domains in
>
On 29/06/16 10:50, Andrew Cooper wrote:
> On 29/06/16 03:20, Luwei Kang wrote:
>> diff --git a/xen/tools/gen-cpuid.py b/xen/tools/gen-cpuid.py
>> index 7c45eca..897e660 100755
>> --- a/xen/tools/gen-cpuid.py
>> +++ b/xen/tools/gen-cpuid.py
>> @@ -235,6 +235,10 @@ def crunch_numbers(state):
>>
>>> On 28.06.16 at 19:58, wrote:
> On 28/06/16 18:56, Andrew Cooper wrote:
>> assign_pages() has a return type of int, but uses for a boolean value. As
>> there are two distinct failure cases, return a more meaningful error.
>
> Sorry - sent an out of date version.
On 29/06/16 03:20, Luwei Kang wrote:
> AVX-512 is an extention of AVX2. Its spec can be found at:
> https://software.intel.com/sites/default/files/managed/b4/3a/319433-024.pdf
> This patch detects AVX-512 features by CPUID.
>
> Signed-off-by: Luwei Kang
> ---
>
On 17.06.2016 11:31, George Dunlap wrote:
> On 13/06/16 12:14, Philipp Hahn wrote:
>> Am 13.06.2016 um 12:15 schrieb George Dunlap:
>>> On Fri, Jun 10, 2016 at 4:22 PM, Philipp Hahn wrote:
while trying to live migrate some VMs from an xen-4.1.6.1 host "xc_save"
Hi Shannon,
On 29/06/2016 10:29, Shannon Zhao wrote:
On 2016/6/27 18:17, Julien Grall wrote:
On 27/06/16 02:44, Shannon Zhao wrote:
On 2016/6/24 0:26, Julien Grall wrote:
On 23/06/16 04:16, Shannon Zhao wrote:
From: Shannon Zhao
Construct GTDT table with the
1 - 100 of 114 matches
Mail list logo