flight 101254 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101254/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 8 leak-check/basis(8)
fail REGR. vs. 101250
flight 101255 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101255/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs.
101197
On Tue, Oct 4, 2016 at 12:25 AM, Jan Beulich wrote:
On 04.10.16 at 00:38, wrote:
>> @@ -2701,9 +2706,13 @@ static int vmx_msr_read_intercept(unsigned int msr,
>> uint64_t *msr_content)
>> break;
>>
>> case MSR_INTEL_PLATFORM_INFO:
>> -
Thanks for the reviews!
On Tue, Oct 4, 2016 at 3:31 AM, Andrew Cooper wrote:
> On 03/10/16 23:38, Kyle Huey wrote:
>> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
>> execution debugger, would like to trap and emulate the CPUID instruction.
flight 101251 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101251/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail REGR. vs. 101240
Regressions
flight 101256 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101256/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-cubietruck 16 guest-start.2 fail REGR. vs. 100815
Hi Tevin!
If you want, I can define a small contribution for you. Let me know,
and I can summarize over email, and if needed we can decide on some IRC
time to discuss details (let me know about your timezone and
availability to find some convenient slot).
Saludos,
Jesus.
On Tue,
Hello,
On 04/10/2016 04:04, JEUNGWOO, YOO wrote:
From: casionwoo
The "from" should match the signed-off-by below.
Comment of origin code said "wait max 10 ms until cpu is on"
Origin code expects to print "CPU%d power enable failed", if cpu do not on
until 10ms
But
On Tue, 4 Oct 2016, JEUNGWOO, YOO wrote:
> From: casionwoo
>
> Comment of origin code said "wait max 10 ms until cpu is on"
> Origin code expects to print "CPU%d power enable failed", if cpu do not on
> until 10ms
> But actual code do not reach to print even it wait 10 ms
flight 101262 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101262/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl
We provide only a commented-out debug print. This produces more
copius output than is desirable even to a compressed debug log.
No functional change.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive |5 -
1 file changed, 4 insertions(+), 1
In 720f08cb9052 "Executive: Previous duration estimator: use overall
time, not sum of steps" we introduced a bug: the condition to exclude
the host allocation time is now not effective if there are any steps
before host allocation. Usually there are.
This means that the host allocation duration
The flight's intended affects the hostflags required, the duration
searches, and other decisions. It is particularly useful for
debugging, where it can be desirable to try replaying a production
job's allocation with a "play" job.
Signed-off-by: Ian Jackson
---
The old query would return one row for each step in each relevant
flight. But we are really only interested in the flight.
Group by the flight and sort on max(finished).
Signed-off-by: Ian Jackson
---
Osstest/Executive.pm |6 --
1 file changed, 4
This makes the code a little easier to read.
Moving hvm_altp2m_supported() check into functions that use it
for better readability.
Moving ept code to ept specific files as requested in:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04323.html
Renamed p2m_init_altp2m_helper()
Altp2m cleanup work
The altp2m clean work is motivated by the following URLs:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04454.html
Most of the work has been:
Lots of white space, indentation, and other coding style preference
corrections.
Lots of moving altp2m functions
On 23/09/2016 17:36, 조현권 wrote:
Hi
Hello,
Sorry for the late reply.
I am experimenting Xen with my embedded system environment and got a
question in next_module() function.
/
/
/static paddr_t __init next_module(paddr_t s, paddr_t *end)/
/{/
/struct bootmodules *mi = /
/paddr_t
Ian Jackson writes ("[OSSTEST PATCH 1/2] libvirt: Check migration capabilities
using proper XML parser"):
> Do not grep the virsh capabilities output (!) Instead, parse the XML
> using perl's XML modules and look for the specific feature flag using
> an XPATH pattern.
...>
> +sub
Currently, osstest, the Xen Project's automated test framework,
erroneously thinks that save/restore is supported with libvirt on ARM.
In fact, save/restore is not supported by Xen on ARM at all.
The result is that osstest then actually attempts the save/restore,
and abandons the test job as a
Currently, osstest wrongly thinks that ARM can do save/restore,
because `virsh help' does mention the save command (on all
architectures).
Additionally, check the virth capabilities xpath
/capabilities/host/migration_features
to try to see whether this host supports migration.
I am not sure
Do not grep the virsh capabilities output (!) Instead, parse the XML
using perl's XML modules and look for the specific feature flag using
an XPATH pattern.
AFAICT from looking at the XML, that's
But the original code does not test for .
Xen could in principle
On Tue, 4 Oct 2016, Jan Beulich wrote:
> Commit e170622f95 ("xen/arm: p2m: Re-implement p2m_set_mem_access using
> p2m_{set,get}_entry") eliminated the only user of level_sizes[],
> causing gcc6 to warn about the unused variable (as it's a const one
> older gcc versions apparently don't care to
flight 101259 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101259/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl
On 04/10/16 16:10, Jan Beulich wrote:
> @@ -767,9 +770,23 @@ static int _get_fpu(
> unsigned long cr0;
>
> fail_if(!ops->read_cr);
> +if ( type >= X86EMUL_FPU_xmm )
> +{
> +unsigned long cr4;
> +
> +rc = ops->read_cr(4, , ctxt);
> +
Lars Kurth writes ("Re: Proposed plan and URL name for new VM to download xen
tarballs (ftp.xenproject.org)"):
> Using downloads.xenproject.org seems to be the best way then.
I have:
* Used cvs-repomove to move the primary cvs repository for the
Xen releases to mail.xenproject.org aka
These checks belong into the emulator instead of hvmemul_get_fpu().
The CR0.PE/EFLAGS.VM ones can actually just be ASSERT()ed, as decoding
should make it impossible to get into get_fpu() with them in the wrong
state.
Signed-off-by: Jan Beulich
---
v2: Convert CR0.PE /
At 08:29 -0600 on 04 Oct (1475569774), Jan Beulich wrote:
> >>> On 04.10.16 at 16:12, wrote:
> > yes, I understand that is the case when you do need to flush a guest.
> > And yes, there seem to be paths that require to bump the tag of a
> > specific guest for certain
On 04/10/16 13:47, Konrad Rzeszutek Wilk wrote:
> On Tue, Oct 04, 2016 at 10:29:16AM +0100, Paul Durrant wrote:
>> From: David Vrabel
>>
>> Instead of only placing one skb on the guest rx ring at a time, process
>> a batch of up-to 64. This improves performance by ~10%
>>> On 04.10.16 at 16:12, wrote:
> yes, I understand that is the case when you do need to flush a guest.
> And yes, there seem to be paths that require to bump the tag of a
> specific guest for certain events (mov-to-cr4 with paging mode changes
> for example). What
On 03/10/16 06:14, Ronald Rojas wrote:
> On Tue, Sep 20, 2016 at 04:24:47PM +0100, George Dunlap wrote:
>> Thanks for your interest in the Xen Project! Sorry for the delay in
>> responding -- somehow your mail either never made it to my personal
>> inbox or I accidentally deleted it instead of
On Tue, Oct 04, 2016 at 01:35:41PM +, Paul Durrant wrote:
> > -Original Message-
> > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> > Sent: 04 October 2016 13:52
> > To: Paul Durrant ; annie...@oracle.com;
> > joao.m.mart...@oracle.com
> > Cc:
>>> On 04.10.16 at 15:58, wrote:
> On 04/10/16 14:39, Jan Beulich wrote:
>> @@ -770,9 +773,23 @@ static int _get_fpu(
>> unsigned long cr0;
>>
>> fail_if(!ops->read_cr);
>> +if ( type >= X86EMUL_FPU_xmm )
>> +{
>> +
On Tue, Oct 4, 2016 at 1:41 AM, Jan Beulich wrote:
On 01.10.16 at 21:05, wrote:
>> However, I've found two other sources that need more attention:
>>
>> In x86/flushtlb.c the function flush_area_local invalidates all guest
>> TLBs as such:
>>
> -Original Message-
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> Sent: 04 October 2016 13:48
> To: Paul Durrant
> Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org; Wei Liu
> ; David Vrabel
On 04/10/16 14:39, Jan Beulich wrote:
> #MF only applies to x87 instructions. SSE and AVX ones need #XM to be
> raised instead, unless CR4.OSXMMEXCPT is clear, in which case #UD needs
> to result. (But note that this is only a latent issue - we don't
> emulate any instructions so far which could
> -Original Message-
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> Sent: 04 October 2016 13:49
> To: Paul Durrant
> Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org; Wei Liu
> ; David Vrabel
On 04/10/16 14:39, Jan Beulich wrote:
> @@ -770,9 +773,23 @@ static int _get_fpu(
> unsigned long cr0;
>
> fail_if(!ops->read_cr);
> +if ( type >= X86EMUL_FPU_xmm )
> +{
> +unsigned long cr4;
> +
> +rc = ops->read_cr(4, , ctxt);
> +
> -Original Message-
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> Sent: 04 October 2016 13:52
> To: Paul Durrant ; annie...@oracle.com;
> joao.m.mart...@oracle.com
> Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org; Wei Liu
>
We can't exclude someone wanting to hide the FPU from guests.
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -1246,6 +1246,7 @@ static bool_t
These checks belong into the emulator instead of hvmemul_get_fpu().
Signed-off-by: Jan Beulich
---
Eventually the XCR0 checks should also move into the insn emulator, but
that'll require a new hook (or an extension to the read_cr()
semantics).
---
#MF only applies to x87 instructions. SSE and AVX ones need #XM to be
raised instead, unless CR4.OSXMMEXCPT is clear, in which case #UD needs
to result. (But note that this is only a latent issue - we don't
emulate any instructions so far which could result in #XM.)
Signed-off-by: Jan Beulich
1: honor guest CR4.OSFXSR, CR4.OSXSAVE, and CR0.PE/EFLAGS.VM
2: deliver correct math exceptions
3: check for FPU availability
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
Hi,
I had created a VM in my xen installation with the following command:
sudo xen-create-image --hostname=test --memory=512mb --vcpus=2 --lvm=vg0 --dhcp
--pygrub —dist=wheezy
I have booted in to the VM with the following command: sudo xl create -c
/etc/xen/test.cfg
Now when I run ifconfig
On Tue, Oct 04, 2016 at 10:29:13AM +0100, Paul Durrant wrote:
> As far as I am aware only very old Windows network frontends make use of
> this style of passing GSO packets from backend to frontend. These
> frontends can easily be replaced by the freely available Xen Project
> Windows PV network
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016- / XSA-190
version 5
CR0.TS and CR0.EM not always honored for x86 HVM guests
UPDATES IN VERSION 5
Public release.
ISSUE DESCRIPTION
On Tue, Oct 04, 2016 at 02:29:15AM -0700, Paul Durrant wrote:
> From: David Vrabel
>
> When an skb is removed from the guest rx queue, immediately wake the
> tx queue, instead of after processing them.
Please, could the description explain why?
>
> Signed-off-by:
On Tue, Oct 04, 2016 at 10:29:16AM +0100, Paul Durrant wrote:
> From: David Vrabel
>
> Instead of only placing one skb on the guest rx ring at a time, process
> a batch of up-to 64. This improves performance by ~10% in some tests.
And does it regress latency workloads?
flight 101252 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101252/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl
Break out $shareix assignment from $4. (We are going to want to put
some code just after this point which will want to do regexp matching,
which would trash $4.)
Signed-off-by: Ian Jackson
---
mg-allocate | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff
May be repeated (cuddled with itself) or given a number. Forces
deletion, even if there is enough space. Normally clean up one less
flight than specified, since cr-ensure-disk-space reruns its check
after acquiring the lock.
Signed-off-by: Ian Jackson
---
Teach mg-allocate to create and delete resources table entries for
flights, as necessary. And, provide a conveniance alias F/.
Signed-off-by: Ian Jackson
---
README.planner | 10 --
mg-allocate| 39 +++
2 files changed,
Signed-off-by: Ian Jackson
---
cr-ensure-disk-space | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/cr-ensure-disk-space b/cr-ensure-disk-space
index c65423a..83372ca 100755
--- a/cr-ensure-disk-space
+++ b/cr-ensure-disk-space
@@ -153,7 +153,7 @@
Look in the resources and tasks table for a resources table entry
corresponding to each flight, owned by a live task. Such flights are
not deleted.
Specifically:
* At the start, we get a list of all the preserved flights, and
also print the information to stdout.
* Whenever we compare
This makes testing a bit easier, and is of course fine.
Signed-off-by: Ian Jackson
---
cr-ensure-disk-space | 8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/cr-ensure-disk-space b/cr-ensure-disk-space
index ff6b01b..bfdbcc5 100755
---
flight 67794 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67794/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-weekly-netinst-pygrub 6 xen-boot fail REGR. vs. 67770
>>> On 04.10.16 at 11:12, wrote:
> On Fri, Sep 30, 2016 at 09:52:56AM -0600, Jan Beulich wrote:
>> >>> On 27.09.16 at 17:57, wrote:
>> > @@ -43,6 +44,11 @@ static long __initdata dom0_nrpages;
>> > static long __initdata dom0_min_nrpages;
>> > static
On 04/10/16 10:29, Paul Durrant wrote:
> From: Ross Lagerwall
>
> This allows full 64K skbuffs (with 1500 mtu ethernet, composed of 45
> fragments) to be handled by netback for to-guest rx.
Reviewed-by: David Vrabel
David
On Tue, Oct 04, 2016 at 04:27:07AM -0600, Jan Beulich wrote:
> Introduced by commit 80dd5b401e ("tools: add --maxmem parameter to
> init-xenstore-domain").
>
> Signed-off-by: Jan Beulich
Acked + applied.
>
> --- a/tools/helpers/init-xenstore-domain.c
> +++
On 03/10/16 23:38, Kyle Huey wrote:
> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
> execution debugger, would like to trap and emulate the CPUID instruction.
> This would allow us to a) mask away certain hardware features that rr does
> not support (e.g. RDRAND) and
Introduced by commit 80dd5b401e ("tools: add --maxmem parameter to
init-xenstore-domain").
Signed-off-by: Jan Beulich
--- a/tools/helpers/init-xenstore-domain.c
+++ b/tools/helpers/init-xenstore-domain.c
@@ -236,7 +236,6 @@ static int parse_maxmem(xc_interface *xc
Commit e170622f95 ("xen/arm: p2m: Re-implement p2m_set_mem_access using
p2m_{set,get}_entry") eliminated the only user of level_sizes[],
causing gcc6 to warn about the unused variable (as it's a const one
older gcc versions apparently don't care to emit a warning).
Signed-off-by: Jan Beulich
This run is configured for baseline tests only.
flight 67792 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67792/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 9
On 04/10/16 10:29, Paul Durrant wrote:
> As far as I am aware only very old Windows network frontends make use of
> this style of passing GSO packets from backend to frontend. These
> frontends can easily be replaced by the freely available Xen Project
> Windows PV network frontend, which uses the
This run is configured for baseline tests only.
flight 67793 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67793/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c0b7e2b2bfc2748112607bfe83fc99cf48c97b48
baseline
Checked that.
Tested-by: Igor Druzhinin
On 30/09/16 17:12, George Dunlap wrote:
On 30/09/16 17:04, Igor Druzhinin wrote:
On 30/09/16 15:46, George Dunlap wrote:
On 29/09/16 14:53, Igor Druzhinin wrote:
As long as t_info_first_offset is calculated in uint32_t
Lars Kurth writes ("Re: [PATCH v3 4/4] Addressed comments on quorum and
security team members"):
> Originally I was planning on changing the quorum to match the one for
> leadership teams for consistency.
Actually, that's probably a better idea. I think when I wrote my
previous mail I had
On Tue, Oct 04, 2016 at 10:48:57AM +0100, Ian Jackson wrote:
> Wei Liu writes ("[PATCH] libxl: fix issues in 38cd0664"):
> > A few issues were introduced in 38cd0664 ("libxl/arm: Add the size of
> > ACPI tables to maxmem"):
> >
> > 1. d_config was not properly initialised and disposed of.
> > 2.
From: David Vrabel
Refactor the to-guest (rx) path to:
1. Push responses for completed skbs earlier, reducing latency.
2. Reduce the per-queue memory overhead by greatly reducing the
maximum number of grant copy ops in each hypercall (from 4352 to
64). Each
From: Ross Lagerwall
This allows full 64K skbuffs (with 1500 mtu ethernet, composed of 45
fragments) to be handled by netback for to-guest rx.
Signed-off-by: Ross Lagerwall
[re-based]
Signed-off-by: Paul Durrant
From: David Vrabel
Instead of only placing one skb on the guest rx ring at a time, process
a batch of up-to 64. This improves performance by ~10% in some tests.
Signed-off-by: David Vrabel
[re-based]
Signed-off-by: Paul Durrant
As far as I am aware only very old Windows network frontends make use of
this style of passing GSO packets from backend to frontend. These
frontends can easily be replaced by the freely available Xen Project
Windows PV network frontend, which uses the 'default' mechanism for
passing GSO packets,
This series refactors the guest rx side of xen-netback:
- The code is moved into its own source module.
- The prefix variant of GSO handling is retired (since it is no longer
in common use, and alternatives exist).
- The code is then simplified and modifications made to improve
performance.
From: David Vrabel
Instead of flushing the copy ops when an packet is complete, complete
packets when their copy ops are done. This improves performance by
reducing the number of grant copy hypercalls.
Latency is still limited by the relatively small size of the copy
On 03/10/2016 17:27, "Ian Jackson" wrote:
>Lars Kurth writes ("[PATCH v3 4/4] Addressed comments on quorum and
>security team members"):
>> Main changes
>> Leadership team decisions: express quorum in terms of +1 votes
>> Security Team Members: election
>> Project
Wei Liu writes ("[PATCH] libxl: fix issues in 38cd0664"):
> A few issues were introduced in 38cd0664 ("libxl/arm: Add the size of
> ACPI tables to maxmem"):
>
> 1. d_config was not properly initialised and disposed of.
> 2. using libxl_retrieve_domain_configuration caused thread to
>deadlock
The netback source module has become very large and somewhat confusing.
This patch simply moves all code related to the backend to frontend (i.e
guest side rx) data-path into a separate rx source module.
This patch contains no functional change, it is code movement and
minimal changes to avoid
From: David Vrabel
When an skb is removed from the guest rx queue, immediately wake the
tx queue, instead of after processing them.
Signed-off-by: David Vrabel
[re-based]
Signed-off-by: Paul Durrant
---
Cc: Wei Liu
Hi Ian and Wei,
On Mon, 2016-09-19 at 16:23 +0100, Ian Jackson wrote:
> Cedric Bosdonnat writes ("Re: [Xen-devel] per-domain logging"):
> > On Thu, 2016-09-15 at 16:11 +0100, Wei Liu wrote:
> > > IIRC there is already logfile abstraction inside libvirt -- can you just
> > > pass in a libvirt
On Fri, Sep 30, 2016 at 09:52:56AM -0600, Jan Beulich wrote:
> >>> On 27.09.16 at 17:57, wrote:
> > @@ -43,6 +44,11 @@ static long __initdata dom0_nrpages;
> > static long __initdata dom0_min_nrpages;
> > static long __initdata dom0_max_nrpages = LONG_MAX;
> >
> > +/*
Hi all,
I updated the following pages regarding test days
- https://wiki.xenproject.org/wiki/Xen_Project_Test_Days
- https://wiki.xenproject.org/wiki/Xen_4.8_RC_test_instructions (needs to be
fleshed out with instructions for new features/modified ones)
Regards
Lars
> On 3 Oct 2016, at 13:54,
> -Original Message-
> From: David Miller [mailto:da...@davemloft.net]
> Sent: 04 October 2016 05:52
> To: Paul Durrant
> Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org
> Subject: Re: [PATCH net-next 0/7] xen-netback: guest rx side refactor
>
> From:
On 04/10/2016 10:06, Paolo Bonzini wrote:
>
>
> On 04/10/2016 08:43, Emil Condrea wrote:
>> xen_be_frontend_changed -> xen_fe_frontend_changed
>
> This is not correct. The front-end is implemented in the guest domain,
> while the back-end is implemented in the dom0 or stubdom.
>
> This
On 04/10/2016 08:43, Emil Condrea wrote:
> xen_be_frontend_changed -> xen_fe_frontend_changed
This is not correct. The front-end is implemented in the guest domain,
while the back-end is implemented in the dom0 or stubdom.
This function processes *in the backed* a notification that the
>>> On 04.10.16 at 09:53, wrote:
On 04.10.16 at 09:34, wrote:
>> On 04/10/2016 08:25, Jan Beulich wrote:
>> On 04.10.16 at 00:38, wrote:
rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
>>> On 04.10.16 at 09:34, wrote:
> On 04/10/2016 08:25, Jan Beulich wrote:
> On 04.10.16 at 00:38, wrote:
>>> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
>>> execution debugger, would like to trap and emulate the
>>> On 01.10.16 at 21:05, wrote:
> However, I've found two other sources that need more attention:
>
> In x86/flushtlb.c the function flush_area_local invalidates all guest
> TLBs as such:
>
> if ( flags & (FLUSH_TLB|FLUSH_TLB_GLOBAL) )
> {
> if ( order
flight 101250 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101250/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 16 guest-start.2fail in 101247 pass in 101250
test-armhf-armhf-xl-xsm 15
On 04/10/2016 08:25, Jan Beulich wrote:
On 04.10.16 at 00:38, wrote:
>> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
>> execution debugger, would like to trap and emulate the CPUID instruction.
>> This would allow us to a) mask away certain
>>> On 04.10.16 at 00:38, wrote:
> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
> execution debugger, would like to trap and emulate the CPUID instruction.
> This would allow us to a) mask away certain hardware features that rr does
> not support
On 04/10/2016 07:54, Jan Beulich wrote:
On 03.10.16 at 12:09, wrote:
>> I've added the following patch to my queue, in order to allow the user to
>> select whether they want to use HAP or shadow, I've tested it locally and
>> there seems to be no issues in building a
>>> On 03.10.16 at 12:09, wrote:
> I've added the following patch to my queue, in order to allow the user to
> select whether they want to use HAP or shadow, I've tested it locally and
> there seems to be no issues in building a PVHv2 Dom0 using shadow.
Hmm, two remarks:
Anthony, I've split the reorganization and code style issues in a separate
patch series which I've posted today:
http://markmail.org/message/feu6u3f7py5vt77v
Thanks
On Mon, Jul 25, 2016 at 5:09 PM, Anthony PERARD
wrote:
> On Sun, Jul 10, 2016 at 02:47:31PM +0300,
>>> On 03.10.16 at 18:23, wrote:
> On Fri, Sep 30, 2016 at 09:04:24AM -0600, Jan Beulich wrote:
>> >>> On 27.09.16 at 17:57, wrote:
>> > So that it can be called from the Dom0 builder.
>>
>> Why would the Dom0 builder need to call it, when it doesn't
* xenstore_update -> xen_pvdev.c
* xenstore_update_fe -> xen_frontend.c
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 43 +--
hw/xen/xen_frontend.c | 18 ++
hw/xen/xen_pvdev.c|
Prepare xen_be_evtchn_event to be shared with frontends:
* xen_be_evtchn_event -> xen_pv_evtchn_event
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_pvdev.c | 2 +-
include/hw/xen/xen_pvdev.h | 2 +-
3 files changed, 3
xen_be_frontend_changed -> xen_fe_frontend_changed
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_frontend.c | 4 ++--
include/hw/xen/xen_frontend.h | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git
Prepare xen_be_del_xendev to be shared with frontends:
* xen_be_del_xendev -> xen_pv_del_xendev
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_pvdev.c | 2 +-
include/hw/xen/xen_pvdev.h | 2 +-
3 files changed, 3 insertions(+), 3
Prepare xen_be_unbind_evtchn to be shared with frontends:
* xen_be_unbind_evtchn -> xen_pv_unbind_evtchn
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c| 2 +-
hw/char/xen_console.c | 2 +-
hw/display/xenfb.c | 2 +-
hw/net/xen_nic.c |
The name of the functions moved to xen_pvdev.c:
* xenstore_cleanup_dir
* xen_config_cleanup
* xenstore_mkdir
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 49 -
hw/xen/xen_pvdev.c | 51
Prepare xen_be_send_notify to be shared with frontends:
* xen_be_send_notify -> xen_pv_send_notify
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c| 4 ++--
hw/char/xen_console.c | 4 ++--
hw/display/xenfb.c | 8
hw/net/xen_nic.c
1 - 100 of 109 matches
Mail list logo