>>> On 14.09.16 at 19:56, wrote:
> On 08/09/16 14:14, Jan Beulich wrote:
>> int __get_instruction_length_from_list(struct vcpu *v,
>> const enum instruction_index *list, unsigned int list_count)
>> {
>> struct vmcb_struct *vmcb = v->arch.hvm_svm.vmcb;
>> -unsigned int i, j, ins
> > I rewrite the inline function in xen/include/xen/mm.h to:
> >
> > +#include
> > +
> > +static inline bool accumulate_tlbflush(bool need_tlbflush,
> > + const struct page_info *page,
> > + uint32_t tlbflush_timestamp)
>>> On 14.09.16 at 19:30, wrote:
>> @@ -435,6 +438,51 @@ struct x86_emulate_ctxt
>> void *data;
>> };
>>
>> +/*
>> + * This encodes the opcode extension in a "natural" way:
>
> I am not sure what you mean by natural way here. All you seem to mean
> is that you are encoding instructions w
>>> On 14.09.16 at 19:12, wrote:
> On 14/09/16 16:24, Jan Beulich wrote:
>> --- a/xen/arch/x86/domain.c
>> +++ b/xen/arch/x86/domain.c
>> @@ -1745,22 +1745,22 @@ static void load_segments(struct vcpu *n
>> (unsigned long *)pv->kernel_sp;
>> unsigned long cs_and_mask, rflags;
>>> On 14.09.16 at 19:05, wrote:
> On 08/09/16 14:12, Jan Beulich wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -336,6 +336,27 @@ union vex {
>> ptr[1] = rex | REX_PREFIX; \
>> } while (0)
>>
>> +union evex {
>> +uint8_
>>> On 15.09.16 at 00:36, wrote:
>> I don't think you should pass this into the function ...
>>
>> > +{
>> > +return page->u.free.need_tlbflush &&
>> > + page->tlbflush_timestamp <= tlbflush_current_time &&
>>
>> ... and use tlbflush_current_time() here instead.
>
> I rewrite the
>>> On 14.09.16 at 18:20, wrote:
> On Wed, Sep 14, 2016 at 9:55 AM, Jan Beulich wrote:
> On 13.09.16 at 20:12, wrote:
>>> When emulating instructions the emulator maintains a small i-cache fetched
>>> from the guest memory. This patch extends the vm_event interface to allow
>>> returning thi
On Wed, Sep 14, 2016 at 6:17 PM, Andy Lutomirski wrote:
> On Wed, Sep 14, 2016 at 3:03 PM, Kyle Huey wrote:
>> On Wed, Sep 14, 2016 at 2:35 PM, Dave Hansen
>> wrote:
>>> On 09/14/2016 02:01 PM, Kyle Huey wrote:
>
>>> Is any of this useful to optimize away at compile-time? We have config
>>> opt
On Wed, Sep 14, 2016 at 2:35 PM, Dave Hansen
wrote:
> On 09/14/2016 02:01 PM, Kyle Huey wrote:
>> Xen advertises the underlying support for CPUID faulting but not does pass
>> through writes to the relevant MSR, nor does it virtualize it, so it does
>> not actually work. For now mask off the relev
flight 100961 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100961/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
- julien.gr...@arm.com wrote:
> Hi Stefano,
>
> On 14/09/2016 21:48, Stefano Stabellini wrote:
> > On Wed, 14 Sep 2016, Julien Grall wrote:
> >> On 14/09/2016 02:06, Stefano Stabellini wrote:
> >>> On Wed, 14 Sep 2016, Shannon Zhao wrote:
> On 2016/9/13 23:17, Julien Grall wrote:
>
On Fri, 2 Sep 2016, Olaf Hering wrote:
> Implement SUSE specific unplug protocol for emulated PCI devices
> in PVonHVM guests. Its a simple 'outl(1, (ioaddr + 4));'.
> This protocol was implemented and used since Xen 3.0.4.
> It is used in all SUSE/SLES/openSUSE releases up to SLES11SP3 and
> openS
This run is configured for baseline tests only.
flight 67712 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67712/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
On Fri, 2 Sep 2016, Olaf Hering wrote:
> Using 'vdev=sd[a-o]' will create an emulated LSI controller, which can
> be used by the emulated BIOS to boot from disk. If the HVM domU has also
> PV driver the disk may appear twice in the guest. To avoid this an
> unplug of the emulated hardware is needed
flight 100957 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100957/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 15 guest-start/debian.repeatfail like 100895
test-amd64-amd64-xl-qemu
This run is configured for baseline tests only.
flight 67713 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67713/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 062f9fd2cfaad09f6dd0e302094bc030827eb706
baseline v
Hi Wei,
I am happy to queue up this for QEMU, but I'll wait for the first patch
to be committed to Xen before sending a pull request. Is that OK?
Cheers,
Stefano
On Wed, 14 Sep 2016, Paulina Szubarczyk wrote:
> Hi,
>
> It is a proposition for implementation of grant copy operation in qemu-qdis
On Wed, Sep 14, 2016 at 3:03 PM, Kyle Huey wrote:
> On Wed, Sep 14, 2016 at 2:35 PM, Dave Hansen
> wrote:
>> On 09/14/2016 02:01 PM, Kyle Huey wrote:
>> Is any of this useful to optimize away at compile-time? We have config
>> options for when we're running as a guest, and this seems like a fea
Hi Edgar,
On Wed, Sep 14, 2016 at 04:16:58PM +0200, Edgar E. Iglesias wrote:
>On Wed, Sep 14, 2016 at 08:40:09PM +0800, Peng Fan wrote:
>> On Wed, Sep 14, 2016 at 01:34:10PM +0100, Julien Grall wrote:
>> >
>> >
>> >On 14/09/16 13:18, Peng Fan wrote:
>> >>Hello Julien,
>> >>
>> >>On Wed, Sep 14, 201
flight 100954 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100954/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail like 100933
test-amd64-i386-xl-qemuu-wi
Hi all,
This is the design document of the PV Calls protocol. You can find
prototypes of the Linux frontend and backend drivers here:
git://git.kernel.org/pub/scm/linux/kernel/git/sstabellini/xen.git pvcalls-6
To use them, make sure to enable CONFIG_XEN_PVCALLS in your kernel
config and add "pvc
> I don't think you should pass this into the function ...
>
> > +{
> > +return page->u.free.need_tlbflush &&
> > + page->tlbflush_timestamp <= tlbflush_current_time &&
>
> ... and use tlbflush_current_time() here instead.
I rewrite the inline function in xen/include/xen/mm.h to:
Xen advertises the underlying support for CPUID faulting but not does pass
through writes to the relevant MSR, nor does it virtualize it, so it does
not actually work. For now mask off the relevant bit on MSR_PLATFORM_INFO.
Signed-off-by: Kyle Huey
---
arch/x86/include/asm/cpufeatures.h | 1 +
On 09/14/2016 02:01 PM, Kyle Huey wrote:
> Xen advertises the underlying support for CPUID faulting but not does pass
> through writes to the relevant MSR, nor does it virtualize it, so it does
> not actually work. For now mask off the relevant bit on MSR_PLATFORM_INFO.
That needs to make it into
Xen advertises the underlying support for CPUID faulting but not does pass
through writes to the relevant MSR, nor does it virtualize it, so it does
not actually work. For now mask off the relevant bit on MSR_PLATFORM_INFO.
Signed-off-by: Kyle Huey
---
arch/x86/include/asm/cpufeatures.h | 1 +
flight 100955 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100955/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 062f9fd2cfaad09f6dd0e302094bc030827eb706
baseline version:
ovmf 18b00c8c8773e62b1e2c4
Hi Stefano,
On 14/09/2016 21:48, Stefano Stabellini wrote:
On Wed, 14 Sep 2016, Julien Grall wrote:
On 14/09/2016 02:06, Stefano Stabellini wrote:
On Wed, 14 Sep 2016, Shannon Zhao wrote:
On 2016/9/13 23:17, Julien Grall wrote:
On 13/09/16 14:06, Shannon Zhao wrote:
Hi Julien,
Hello Sha
On Wed, 14 Sep 2016, Julien Grall wrote:
> Hello,
>
> On 14/09/2016 02:06, Stefano Stabellini wrote:
> > On Wed, 14 Sep 2016, Shannon Zhao wrote:
> > > On 2016/9/13 23:17, Julien Grall wrote:
> > > >
> > > >
> > > > On 13/09/16 14:06, Shannon Zhao wrote:
> > > > > Hi Julien,
> > > >
> > > > He
On 14/09/2016 20:36, Andy Lutomirski wrote:
> On Wed, Sep 14, 2016 at 12:28 PM, Andrew Cooper
> wrote:
>> On 14/09/2016 20:23, Boris Ostrovsky wrote:
>>> On 09/14/2016 02:52 PM, Andy Lutomirski wrote:
On Tue, Sep 13, 2016 at 11:13 PM, Kyle Huey wrote:
> On Mon, Sep 12, 2016 at 9:56 AM, A
Copy data operated on during request from/to local buffers to/from
the grant references.
Before grant copy operation local buffers must be allocated what is
done by calling ioreq_init_copy_buffers. For the 'read' operation,
first, the qemu device invokes the read operation on local buffers
and on
In a linux part an ioctl(gntdev, IOCTL_GNTDEV_GRANT_COPY, ..)
system call is invoked. In mini-os the operation is yet not
implemented. For the OSs that does not implement gnttab the
call of the grant copy operation causes abort.
Signed-off-by: Paulina Szubarczyk
Reviewed-by: David Vrabel
---
to
Hi,
It is a proposition for implementation of grant copy operation in qemu-qdisk
and interface in libxc/libs.
Changes since v6:
qemu-qdisk:
-removed blank lines
-renamed functions free_buffers -> ioreq_free_copy_buffers,
ioreq_copy -> ioreq_grant_copy
-merged the if(ioreq_copy) with the condit
flight 100951 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100951/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail in 100941 pass in
100951
test-armhf-armhf-xl-rtds
On 08/09/16 14:14, Jan Beulich wrote:
> @@ -89,141 +54,96 @@ static unsigned long svm_nextrip_insn_le
> return vmcb->nextrip - vmcb->rip;
> }
>
> -/* First byte: Length. Following bytes: Opcode bytes. */
> -#define MAKE_INSTR(nm, ...) static const u8 OPCODE_##nm[] = { __VA_ARGS__ }
> -MAKE_
And accomodate platform time source initialization in
try_platform_time(). This is a preparatory patch for deferring
TSC clocksource initialization to the stage where all CPUS are
up (verify_tsc_reliability init call).
Signed-off-by: Joao Martins
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: J
Extend the "tsc" boot parameter is to further relax TSC restrictions and
allow it to be used on machines that guarantee reliable TSC across
sockets. This is up to board manufacturers and there's no way for the OS
to probe this property, therefore user needs to explicitly set this option.
Also make
To allow the caller to fetch the last read from the clocksource which
was used to calculate system_time. This is a prerequisite for a
subsequent patch that will use this last read.
Signed-off-by: Joao Martins
---
Cc: Jan Beulich
Cc: Andrew Cooper
Changes since v3:
- Add mention of this being
Recent x86/time changes improved a lot of the monotonicity in xen
timekeeping, making it much harder to observe time going backwards.
Although platform timer can't be expected to be perfectly in sync with
TSC and so get_s_time won't be guaranteed to always return
monotonically increasing values acr
This patch proposes relying on host TSC synchronization and
passthrough to the guest, when running on a TSC-safe platform. On
time_calibration we retrieve the platform time in ns and the counter
read by the clocksource that was used to compute system time. We
introduce a new rendezous function whic
Hey,
This is v4 on the pvclock TSC series addressing comments from previous
version, see individual patches for complete changelog.
This series is divided as follows:
R * Patch 1: Small refactor around init_platform_time to reuse
initialization code when switching to TSC
On 08/09/16 14:14, Jan Beulich wrote:
"of a canonical opcode representation".
You appear to be inventing your own here, but it isn't the only
canonical form you could represent x86 opcodes with.
> --- a/xen/arch/x86/x86_emulate/x86_emulate.h
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.h
> @@ -4
On 08/09/16 14:13, Jan Beulich wrote:
> Only code movement, no functional change.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 14/09/16 16:24, Jan Beulich wrote:
> No need to have the same logic twice.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/domain.c
> +++ b/xen/arch/x86/domain.c
> @@ -1745,22 +1745,22 @@ static void load_segments(struct vcpu *n
> (unsigned long *)pv->kernel_sp;
> un
On 08/09/16 14:12, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
>
> Signed-off-by: Jan Beulich
> ---
> TBD: I'm kind of undecided whether to right away propagate evex.R into
On Tue, 13 Sep 2016 19:25:54 +0100 Andrew Cooper wrote:
> On 13/09/16 14:46, Mihai Donțu wrote:
> > On Tue, 13 Sep 2016 09:10:32 -0400 Konrad Rzeszutek Wilk wrote:
> >> On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
> >>> All,
> >>>
> >>> in
> >>> https://lists.xenproject.org/arch
On Mon, 2016-09-12 at 16:16 +0800, Dongli Zhang wrote:
> This patch implemented parts of TODO left in commit id
> a902c12ee45fc9389eb8fe54eeddaf267a555c58.
>
We usually put both the (not necessarily full) hash and the subject
line of the commit in here.
> Signed-off-by: Dongli Zhang
>
> diff --
On 11/09/16 11:52, Kavya Sharma wrote:
> Hello Sir,I am Kavya Sharma, an aspiring Outreachy intern.It would be my
> privilege to be an intern with xenproject.org this winter.I have read
> about Xen Hypervisor Userspace Tools and I am interested in your project
> 'golang bindings for libxl'.
>
> Si
>>> On 14.09.16 at 18:11, wrote:
> On 08/09/16 14:11, Jan Beulich wrote:
>> @@ -1580,6 +1586,9 @@ struct x86_emulate_state {
>> ext_0f = vex_0f,
>> ext_0f38 = vex_0f38,
>> ext_0f3a = vex_0f3a,
>> +ext_8f08 = 8,
>> +ext_8f09,
>> +ext_8f0a,
>
> W
On Wed, Sep 14, 2016 at 9:55 AM, Jan Beulich wrote:
On 13.09.16 at 20:12, wrote:
>> When emulating instructions the emulator maintains a small i-cache fetched
>> from the guest memory. This patch extends the vm_event interface to allow
>> returning this i-cache via the vm_event response inst
On Wed, 2016-09-14 at 18:44 +0800, Wei Yang wrote:
> On Tue, Sep 13, 2016 at 01:30:17PM +0200, Dario Faggioli wrote:
> >
> > Do you mind sharing just a bit more, such as:
> > - number of pcpus
> > - number of vcpus of the various VMs
> 160 pcpus
> 16 vcpus in VM and 8 VMs
>
So, 16x8=128, which
>>> On 12.09.16 at 10:16, wrote:
> This patch cleaned up the code by replacing complicated tlbflush check with
> an inline function. We should use this inline function to avoid the long
> and complicated to read tlbflush check when implementing TODOs left in
> commit a902c12ee45fc9389eb8fe54eeddaf
On 08/09/16 14:11, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emul
flight 100948 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100948/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops4 host-build-prep fail in 100936 REGR. vs. 100895
Tests which are
>>> On 13.09.16 at 20:12, wrote:
> When emulating instructions the emulator maintains a small i-cache fetched
> from the guest memory. This patch extends the vm_event interface to allow
> returning this i-cache via the vm_event response instead.
I guess I'm sightly confused: Isn't the purpose to
On 2016-09-14 16:17, George Dunlap wrote:
On Wed, Sep 14, 2016 at 3:04 PM, Peter Milesson wrote:
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've bee
On 2016-09-14 15:30, George Dunlap wrote:
On 14/09/16 14:23, Andrew Cooper wrote:
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularl
On 2016-09-14 16:49, Jan Beulich wrote:
On 14.09.16 at 16:04, wrote:
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
Can you think of anything that's changed between 4.6 and 4.7 that
would cause the performance problems he's describing when both a video
card and a usb
Hi Julien,
On 09/14/2016 12:57 PM, Julien Grall wrote:
>
>
> On 13/09/16 14:00, Sergej Proskurin wrote:
>> Hi Julien,
>
> Hello Sergej,
>
>>
>> On 09/12/2016 10:47 AM, Julien Grall wrote:
>>> Hello Sergej,
>>>
>>> On 16/08/2016 23:16, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
No need to have the same logic twice.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1745,22 +1745,22 @@ static void load_segments(struct vcpu *n
(unsigned long *)pv->kernel_sp;
unsigned long cs_and_mask, rflags;
+/* Fold up
On 09/07/2016 02:59 PM, Boris Ostrovsky wrote:
> The goal here is to build ACPI tables for PVHv2/HVMlite guests while reusing
> existing
> hvmloader's ACPI builder code. The builder is provided as a library in
> tools/libacpi.
>
> This is version 3 of the series, see individual patches for change
Hi Julien,
On 09/12/2016 02:08 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 16/08/16 23:17, Sergej Proskurin wrote:
>> The HVMOP_altp2m_set_mem_access allows to set gfn permissions of
>> (currently one page at a time) of a specific altp2m view. In case the
>> view does not hold the requested gfn e
On Wed, Sep 14, 2016 at 9:15 AM, Julien Grall wrote:
>
>
> On 14/09/16 16:14, Tamas K Lengyel wrote:
>>
>> On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall
>> wrote:
>>>
>>> Hello Tamas,
>>>
>>> On 13/09/16 19:12, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/inc
On 14/09/16 16:14, Tamas K Lengyel wrote:
On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall wrote:
Hello Tamas,
On 13/09/16 19:12, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
index 53c4d78..5e9bc54 100644
--- a/xen/include/asm-arm/p2m.h
+++ b/xen/i
On Wed, Sep 14, 2016 at 3:33 AM, Julien Grall wrote:
> Hello Tamas,
>
> On 13/09/16 19:12, Tamas K Lengyel wrote:
>>
>> diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h
>> index 53c4d78..5e9bc54 100644
>> --- a/xen/include/asm-arm/p2m.h
>> +++ b/xen/include/asm-arm/p2m.h
>> @@ -1
On Wed, Sep 14, 2016 at 7:38 AM, George Dunlap wrote:
> On 13/09/16 19:12, Tamas K Lengyel wrote:
>> Setting response flags in vm_event are only ever safe if the vCPUs are
>> paused.
>> To reflect this we move all checks within the if block that already checks
>> whether this is the case. Checks
>>> On 14.09.16 at 16:22, wrote:
> On 08/09/16 14:10, Jan Beulich wrote:
>> This way we can at least size (and e.g. skip) them if needed, and we
>> also won't raise the wrong fault due to not having read all relevant
>> bytes.
>
> What faults are you referring to? #UD vs #GP from hitting the %cs
On Wed, 2016-09-14 at 02:23 +, Wu, Feng wrote:
> Then I tried to implement the function like the following:
>
> /* This function is called when pcidevs_lock is held */
> void vmx_pi_hooks_assign(struct domain *d)
> {
> if ( !iommu_intpost || !has_hvm_container_domain(d) )
> return;
>>> On 14.09.16 at 16:04, wrote:
> On 2016-09-14 14:50, Jan Beulich wrote:
> On 14.09.16 at 13:34, wrote:
>>> Can you think of anything that's changed between 4.6 and 4.7 that
>>> would cause the performance problems he's describing when both a video
>>> card and a usb controller are passed t
On 08/09/16 14:10, Jan Beulich wrote:
> This way we can at least size (and e.g. skip) them if needed, and we
> also won't raise the wrong fault due to not having read all relevant
> bytes.
What faults are you referring to? #UD vs #GP from hitting the %cs limit?
>
> This at once adds correct rais
This run is configured for baseline tests only.
flight 67711 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67711/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 18b00c8c8773e62b1e2c4a36f490996325570b67
baseline v
Hi all,
I wanted to get libvirt's libxl driver have per-domain logs like all other
drivers. After
looking at the libxl and XenToolLogger it seems I'll need to add the feature in
either libxl
XenToolLogger. Would anyone already have an idea how best to add API to allow
this?
Thanks for your hel
On 2016-09-14 15:23, Andrew Cooper wrote:
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and installed 4.7.0 today.
I'm using
On Wed, Sep 14, 2016 at 3:04 PM, Peter Milesson wrote:
>
>
> On 2016-09-14 14:50, Jan Beulich wrote:
>
> On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
>>>
>>> [snip]
>
> I've been using Xen for 3 years, starting out with 4.2, and I've been
>>>
On Wed, Sep 14, 2016 at 08:40:09PM +0800, Peng Fan wrote:
> On Wed, Sep 14, 2016 at 01:34:10PM +0100, Julien Grall wrote:
> >
> >
> >On 14/09/16 13:18, Peng Fan wrote:
> >>Hello Julien,
> >>
> >>On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
> >>>
> >>>
> >>>On 14/09/16 13:03, Peng F
On 2016-09-14 14:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and installed 4.7.0 today.
I'm using Windows 10, 64-bit with PCI pass through
On Tue, Sep 13, 2016 at 01:30:17PM +0200, Dario Faggioli wrote:
>[using xendevel correct address]
>
>On Tue, 2016-09-13 at 16:54 +0800, Wei Yang wrote:
>> On Fri, 2016-09-09 at 17:41 +0800, Wei Yang wrote:
>> >
>> > I'm not surprised by that. Yet, I'd be interested in hearing more
>> > about this
On Wed, 2016-09-14 at 10:34 +0100, George Dunlap wrote:
> On 12/09/16 18:00, Dario Faggioli wrote:
> >
> > I also agree on the fact that most of the times ratelimit_us and
> > MIN_TIMER will be close enough (like in the example above) that it
> > won't probably matter much... but if someone set ra
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.8b-rc6-tag
xen: regression fix for 4.8-rc6
- - Fix SMP boot in arm guests.
Thanks.
David
arch/arm/xen/enlighten.c | 7 +++
1
On 13/09/16 18:38, Lai, Paul wrote:
> On Mon, Sep 12, 2016 at 11:47:35AM +0100, George Dunlap wrote:
>> On 08/09/16 17:45, Lai, Paul C wrote:
>>> [Paul2] in-line
>>
>> If you're going to engage in discussions on xen-devel it would really be
>> worth your time to find a mail setup that allows you to
On 13/09/16 19:12, Tamas K Lengyel wrote:
> Setting response flags in vm_event are only ever safe if the vCPUs are paused.
> To reflect this we move all checks within the if block that already checks
> whether this is the case. Checks that are only supported on one architecture
> we relocate the bi
On 14/09/16 14:23, Andrew Cooper wrote:
> On 14/09/16 13:50, Jan Beulich wrote:
> On 14.09.16 at 13:34, wrote:
On 2016-09-09 09:51, Peter Milesson wrote:
>>> [snip]
> I've been using Xen for 3 years, starting out with 4.2, and I've been
> upgrading regularly, and installed 4.7.0
On 14/09/16 13:50, Jan Beulich wrote:
On 14.09.16 at 13:34, wrote:
>>> On 2016-09-09 09:51, Peter Milesson wrote:
>> [snip]
I've been using Xen for 3 years, starting out with 4.2, and I've been
upgrading regularly, and installed 4.7.0 today.
I'm using Windows 10, 64-bit w
flight 100944 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100944/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 100933
Regress
Hello Derek,
On 13/09/16 20:40, Derek Straka wrote:
diff --git a/xen/drivers/video/Kconfig b/xen/drivers/video/Kconfig
index 0ffbbd9..0f208fe 100644
--- a/xen/drivers/video/Kconfig
+++ b/xen/drivers/video/Kconfig
@@ -3,7 +3,8 @@ config VIDEO
bool
config VGA
- bool
+ bool "V
>>> On 14.09.16 at 13:34, wrote:
>> On 2016-09-09 09:51, Peter Milesson wrote:
> [snip]
>>> I've been using Xen for 3 years, starting out with 4.2, and I've been
>>> upgrading regularly, and installed 4.7.0 today.
>>>
>>> I'm using Windows 10, 64-bit with PCI pass through in a VM with
>>> PV-driv
On 09/14/2016 12:13 AM, Shannon Zhao wrote:
>
> On 2016/9/8 2:59, Boris Ostrovsky wrote:
>> PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor
>> objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so
>> that it can be included in ASLs for both HVM and PVH2
On Wed, Sep 14, 2016 at 01:34:10PM +0100, Julien Grall wrote:
>
>
>On 14/09/16 13:18, Peng Fan wrote:
>>Hello Julien,
>>
>>On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
>>>
>>>
>>>On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
>>>
>>>Hello Peng,
>>>
On Wed, Sep 14, 2016 at
On 14/09/16 13:18, Peng Fan wrote:
Hello Julien,
On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
Hello Peng,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
Hello,
On 14/09/16 08:41, Peng Fan wrote:
On Wed,
flight 100947 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100947/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 18b00c8c8773e62b1e2c4a36f490996325570b67
baseline version:
ovmf d947fbed72226011961e5
Hello Julien,
On Wed, Sep 14, 2016 at 01:06:01PM +0100, Julien Grall wrote:
>
>
>On 14/09/16 13:03, Peng Fan wrote:
>>Hello Julien,
>
>Hello Peng,
>
>>On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
>>>Hello,
>>>
>>>On 14/09/16 08:41, Peng Fan wrote:
On Wed, Sep 14, 2016 at 08:23
flight 100945 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100945/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-raw 13 guest-sav
On 14/09/16 13:03, Peng Fan wrote:
Hello Julien,
Hello Peng,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
Hello,
On 14/09/16 08:41, Peng Fan wrote:
On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domai
Hello Julien,
On Wed, Sep 14, 2016 at 11:47:10AM +0100, Julien Grall wrote:
>Hello,
>
>On 14/09/16 08:41, Peng Fan wrote:
>>On Wed, Sep 14, 2016 at 08:23:24AM +0100, Julien Grall wrote:
>>diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
>>index 35ab08d..cc71e6f 100644
>>--- a/
> On 2016-09-09 09:51, Peter Milesson wrote:
[snip]
>> I've been using Xen for 3 years, starting out with 4.2, and I've been
>> upgrading regularly, and installed 4.7.0 today.
>>
>> I'm using Windows 10, 64-bit with PCI pass through in a VM with
>> PV-drivers, using a AMD Radeon HD6450 card (AMD gr
On Wed, Sep 14, 2016 at 12:13:00PM +0100, George Dunlap wrote:
> On Sat, Sep 10, 2016 at 9:04 PM, Sarah Newman wrote:
> > On 09/10/2016 07:58 AM, Mark Pryor wrote:
> >> Hello,
> >>
> >> In a xen 4.7 source build, pv-grub works with domU kernel 3.x.x, but not
> >> with 4.x.x. So, the recent fc24,
On 14/09/16 08:53, Sergej Proskurin wrote:
Hi Julien
[...]
static void do_trap_instr_abort_guest(struct cpu_user_regs *regs,
const union hsr hsr)
{
@@ -2445,6 +2465,14 @@ static void do_trap_instr_abort_guest(struct
cpu_user_regs *regs,
brea
On Sat, Sep 10, 2016 at 9:04 PM, Sarah Newman wrote:
> On 09/10/2016 07:58 AM, Mark Pryor wrote:
>> Hello,
>>
>> In a xen 4.7 source build, pv-grub works with domU kernel 3.x.x, but not
>> with 4.x.x. So, the recent fc24, xenial, and debian sid/stretch can't use
>> pv-grub.
>
> While this should
Hello Sergej,
On 16/08/16 23:16, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index 180154e..c69da36 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -83,8 +83,40 @@ static int do_altp2m_op(XEN_GUEST_HANDLE_PARAM(void) arg)
break;
case HV
flight 100952 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100952/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 773522000cc17f6f4323a4d97423790138ea98f2
baseline version:
xen a3fe
On 13/09/16 14:00, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 10:47 AM, Julien Grall wrote:
Hello Sergej,
On 16/08/2016 23:16, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v3: Extended the function "altp2m
1 - 100 of 138 matches
Mail list logo