flight 56373 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56373/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 15 guest-localmigrate.2 fail REGR. vs. 50282
Tests w
>>> On 15.05.15 at 08:39, wrote:
> On 2015/5/15 14:25, Jan Beulich wrote:
> On 15.05.15 at 08:11, wrote:
>>> Even we may separate the
>>> low memory to construct memory_map.map[]...
>>
>> ???
>
> Sorry I just mean that the low memory is not represented with only one
> memory_map.map[] in so
Hi Jan,
> On 28/04/2015 16:37, Wei Wang wrote
> > Changes:
> > *NO.1 The intel_pstate driver can be controlled via two ways:
> > A. min_perf_pct and max_perf_pct
> >The user directly adjusts min_perf_pct and max_perf_pct to get what
> >they want. For example, if min_perf_pct=max_perf_pct=6
On 2015/5/15 14:25, Jan Beulich wrote:
On 15.05.15 at 08:11, wrote:
On 2015/4/20 22:29, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
@@ -119,10 +120,6 @@ int build_e820_table(struct e820entry *e820,
/* Low RAM goes here. Reserve space for special pages. */
BUG_ON((hvm_info-
>>> On 14.05.15 at 17:27, wrote:
> El 13/05/15 a les 11.53, Jan Beulich ha escrit:
> On 11.05.15 at 16:57, wrote:
>>> --- a/xen/common/domain.c
>>> +++ b/xen/common/domain.c
>>> @@ -42,6 +42,7 @@
>>> #include
>>> #include
>>> #include
>>> +#include
>>>
>>> /* Linux config option: pr
>>> On 15.05.15 at 08:24, wrote:
> On 2015/5/15 14:12, Jan Beulich wrote:
> On 15.05.15 at 04:33, wrote:
>>> On 2015/4/20 21:46, Jan Beulich wrote:
>>> On 10.04.15 at 11:22, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4729,7 +4729,6 @@ static lo
On Wed, May 13, Ian Campbell wrote:
> On Wed, 2015-05-06 at 13:28 +, Olaf Hering wrote:
> > +++ b/docs/man/xl.pod.1
> > @@ -1328,6 +1328,24 @@ List virtual trusted platform modules for a domain.
> >
> > =back
> >
> > +=head2 PVSCSI DEVICES
> > +
> > +=over 4
> > +
> > +=item B I I I,I<[fe
>>> On 15.05.15 at 08:11, wrote:
> On 2015/4/20 22:29, Jan Beulich wrote:
> On 10.04.15 at 11:22, wrote:
>>> @@ -119,10 +120,6 @@ int build_e820_table(struct e820entry *e820,
>>>
>>> /* Low RAM goes here. Reserve space for special pages. */
>>> BUG_ON((hvm_info->low_mem_pgend << P
On 2015/5/15 14:12, Jan Beulich wrote:
On 15.05.15 at 04:33, wrote:
On 2015/4/20 21:46, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -4729,7 +4729,6 @@ static long hvm_memory_op(int cmd,
XEN_GUEST_HANDLE_PARAM(void) arg)
Use singular for option, it refers to vfb= itself.
Signed-off-by: Olaf Hering
Cc: Ian Campbell
Cc: Ian Jackson
---
docs/man/xl.cfg.pod.5 | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/man/xl.cfg.pod.5 b/docs/man/xl.cfg.pod.5
index 566e343..5a0ca50 100644
--- a/docs/ma
>>> On 15.05.15 at 05:18, wrote:
> On 2015/4/20 22:21, Jan Beulich wrote:
> On 10.04.15 at 11:22, wrote:
>>> --- a/tools/firmware/hvmloader/pci.c
>>> +++ b/tools/firmware/hvmloader/pci.c
>>> @@ -59,8 +59,8 @@ void pci_setup(void)
>>> uint32_t bar_reg;
>>> uint64_t bar_sz;
>>> On 15.05.15 at 04:57, wrote:
> On 2015/4/20 21:51, Jan Beulich wrote:
> On 10.04.15 at 11:22, wrote:
>>> --- a/tools/libxl/libxl_dom.c
>>> +++ b/tools/libxl/libxl_dom.c
>>> @@ -787,6 +787,70 @@ out:
>>> return rc;
>>> }
>>>
>>> +static int libxl__domain_construct_memmap(libxl_ctx
On 2015/4/20 22:29, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/firmware/hvmloader/e820.c
+++ b/tools/firmware/hvmloader/e820.c
@@ -73,7 +73,8 @@ int build_e820_table(struct e820entry *e820,
unsigned int lowmem_reserved_base,
unsigne
>>> On 15.05.15 at 04:33, wrote:
>
> On 2015/4/20 21:46, Jan Beulich wrote:
> On 10.04.15 at 11:22, wrote:
>>> --- a/xen/arch/x86/hvm/hvm.c
>>> +++ b/xen/arch/x86/hvm/hvm.c
>>> @@ -4729,7 +4729,6 @@ static long hvm_memory_op(int cmd,
> XEN_GUEST_HANDLE_PARAM(void) arg)
>>>
>>> switch
On Fri, May 15, Jürgen Groß wrote:
> Multi-LUN devices do exist and they are required to be presented as
> those to the guest.
Ok, this means we need the bus concept. I will see if the API for
add/remove can be changed that only devices get passed to the libxl.
Olaf
On Wed, May 13, 2015 at 11:57:55AM -0400, Konrad Rzeszutek Wilk wrote:
> according to the documentation the option ucode=scan should tell XEN to
> look for a microcode update in an uncompressed initrd.
>
> While I don’t use the Debian kernel the tools to generate the initrd are
> part of Debian.
On 05/13/2015 07:31 PM, Olaf Hering wrote:
On Wed, May 13, Ian Campbell wrote:
Is it important/useful that the user be able to configure/control the
number (and addresses) of the buses themselves and which devices are on
which, or can we get away with the pvpci model where the libxl user just
gi
On 2015/4/20 22:21, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/firmware/hvmloader/pci.c
+++ b/tools/firmware/hvmloader/pci.c
@@ -59,8 +59,8 @@ void pci_setup(void)
uint32_t bar_reg;
uint64_t bar_sz;
} *bars = (struct bars *)scratch_start;
-unsigned
On 2015/4/20 21:57, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/firmware/hvmloader/util.c
+++ b/tools/firmware/hvmloader/util.c
@@ -27,6 +27,16 @@
#include
#include
+int check_hole_conflict(uint64_t start, uint64_t size,
+uint64_t reserved_start, u
On 05/14/2015 08:47 PM, Ian Campbell wrote:
On Thu, 2015-05-14 at 18:06 +0800, Yang Hongyang wrote:
With Remus, the save flow should be:
live migration->{ periodically save(checkpointed save) }
Signed-off-by: Yang Hongyang
Reviewed-by: Andrew Cooper
CC: Ian Campbell
CC: Ian Jackson
CC: We
On 2015/4/20 21:51, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/libxl/libxl_dom.c
+++ b/tools/libxl/libxl_dom.c
@@ -787,6 +787,70 @@ out:
return rc;
}
+static int libxl__domain_construct_memmap(libxl_ctx *ctx,
+ libxl_domain_conf
On Thu, May 14, 2015 at 06:01:01PM +0100, Julien Grall wrote:
> The PV network protocol is using 4KB page granularity. The goal of this
> patch is to allow a Linux using 64KB page granularity working as a
> network backend on a non-modified Xen.
>
> It's only necessary to adapt the ring size and b
On 2015/4/20 21:46, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -4729,7 +4729,6 @@ static long hvm_memory_op(int cmd,
XEN_GUEST_HANDLE_PARAM(void) arg)
switch ( cmd & MEMOP_CMD_MASK )
{
-case XENMEM_memory_map:
flight 56370 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56370/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-freebsd10-amd64 13 guest-localmigrate fail like 55353
test-amd64-i386-freebsd10-i386 13 gue
On 2015/5/11 22:54, Wei Liu wrote:
On Mon, May 11, 2015 at 01:35:06PM +0800, Chen, Tiejun wrote:
On 2015/5/8 21:04, Wei Liu wrote:
Sorry for the late review.
Really thanks for taking your time :)
On Fri, Apr 10, 2015 at 05:21:52PM +0800, Tiejun Chen wrote:
This patch introduces user confi
On Thu, May 14, 2015 at 11:19:17AM +0200, Dario Faggioli wrote:
> On Fri, 2015-05-08 at 16:56 +0800, Chao Peng wrote:
> > For CAT, COS is maintained in hypervisor only while CBM is exposed to
> > user space directly to allow getting/setting domain's cache capacity.
> > For each specified CBM, hyper
On 05/14/2015 09:05 PM, Ian Campbell wrote:
On Thu, 2015-05-14 at 18:06 +0800, Yang Hongyang wrote:
With Remus, the restore flow should be:
the first full migration stream -> { periodically restore stream }
Signed-off-by: Yang Hongyang
Signed-off-by: Andrew Cooper
CC: Ian Campbell
CC: Ian
On 05/14/2015 10:04 PM, Ian Campbell wrote:
On Thu, 2015-05-14 at 14:17 +0100, Andrew Cooper wrote:
On 14/05/15 14:05, Ian Campbell wrote:
On Thu, 2015-05-14 at 18:06 +0800, Yang Hongyang wrote:
With Remus, the restore flow should be:
the first full migration stream -> { periodically restore
On 05/14/2015 08:35 PM, Ian Campbell wrote:
On Thu, 2015-05-14 at 16:55 +0800, Yang Hongyang wrote:
This is the combination of Andrew Cooper's misc patches and mine
to aid migration v2 Remus support.
Applied, thanks. I made a few changes to some commit logs, I hope that's
ok.
That's great
On Thu, May 14, 2015 at 06:00:48PM +0100, Julien Grall wrote:
> The variables old_req_cons and ring_slots_used are assigned but never
> used since commit 1650d5455bd2dc6b5ee134bd6fc1a3236c266b5b "xen-netback:
> always fully coalesce guest Rx packets".
>
> Signed-off-by: Julien Grall
> Cc: Ian Cam
On 05/14/15 19:42, Andrew Cooper wrote:
> On 15/05/2015 00:34, Don Slutz wrote:
>> This allows use of QEMU's VMware emulated video card
>>
>> Signed-off-by: Don Slutz
>
> Nack.
>
> Qemu-trad is currently has remote code execution vulnerabilities in its
> vmware vga model. CVE-2014-3689 amongst
On 05/13/15 01:01, wei.l...@citrix.com wrote:
> * VMware tools support (fair)
> - Don Slutz
>
v10 of patch set posted. Should be able to move to ok.
-Don Slutz
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 15/05/2015 00:34, Don Slutz wrote:
> This allows use of QEMU's VMware emulated video card
>
> Signed-off-by: Don Slutz
Nack.
Qemu-trad is currently has remote code execution vulnerabilities in its
vmware vga model. CVE-2014-3689 amongst others.
Please fix those first before offering an opti
Changes v9 to v10:
Split out LIBXL_VGA_INTERFACE_TYPE_VMWARE into it's own patch (#1)
that can stand alone. In the patch set because a later patch
depends on it.
Reworked to be based on:
commit a7511905fae7ba592c5bf63cd77d8ff78087d689
Author: Julien Grall
Date: Wed Apr 1 1
This adds synchronization of the 6 vcpu registers (only 32bits of
them) that vmport.c needs between Xen and QEMU.
This is to avoid a 2nd and 3rd exchange between QEMU and Xen to
fetch and put these 6 vcpu registers used by the code in vmport.c
and vmmouse.c
In the tools, enable usage of QEMU's vm
This is done by adding xen_arch_domainconfig vmware_hw. It is set to
the VMware virtual hardware version.
Currently 0, 3-4, 6-11 are good values. However the
code only checks for == 0 or != 0 or >= 7.
If non-zero then
Return VMware's cpuid leaves. If >= 7 return data, else
return 0.
The su
Test out special #GP handling for the VMware port 0x5658.
This is done in two "modes", j=0 and j=1. Testing 4
instructions (all the basic PIO) in both modes.
The port used is based on j.
For IN, eax should change. For OUT eax should not change.
All 4 PIO instructions are 1 byte long, so eip sh
This file: backdoor_def.h comes from:
http://packages.vmware.com/tools/esx/3.5latest/rhel4/SRPMS/index.html
open-vm-tools-kmod-7.4.8-396269.423167.src.rpm
open-vm-tools-kmod-7.4.8.tar.gz
vmhgfs/backdoor_def.h
and is unchanged.
Added the badly named include file includeCheck.h also. It onl
This new libxl_domain_create_info field is used to set
XEN_DOMCTL_CONFIG_VMWARE_PORT_MASK in the xc_domain_configuration_t
for x86.
In xen it is is_vmware_port_enabled.
If is_vmware_port_enabled then
enable a limited support of VMware's hyper-call.
VMware's hyper-call is also known as VMware B
This is used to set xen_arch_domainconfig vmware_hw. It is set to
the emulated VMware virtual hardware version.
Currently 0, 3-4, 6-11 are good values. However the code only
checks for == 0, != 0, or < 7.
If non-zero then
default VGA to VMware's VGA.
Signed-off-by: Don Slutz
---
v10:
LIB
This includes adding is_vmware_port_enabled
This is a new xen_arch_domainconfig flag,
XEN_DOMCTL_CONFIG_VMWARE_PORT_MASK.
This enables limited support of VMware's hyper-call.
This is both a more complete support then in currently provided by
QEMU and/or KVM and less. The missing part requires Q
Also added missing TRAP_DEBUG & VLAPIC.
Signed-off-by: Don Slutz
Acked-by: Ian Campbell
---
v10:
Added Acked-by: Ian Campbell
Added back in the trace point calls.
Why is cmd in this patch?
Because the trace points use it.
v9:
Dropped unneed VMPORT_UNHANDLED, VMPORT_DECODE.
v7:
Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)")
to port 0x5658 specially. Note: since many operations return data
in EAX, "in (%dx),%eax" is the one to use. The other lengths like
"in (%dx),%al" will still do things, only AL part of EAX will be
changed. For "out %eax,(%dx)" o
This allows use of QEMU's VMware emulated video card
Signed-off-by: Don Slutz
---
v10: New at v10.
Was part of "tools: Add vmware_hwver support"
docs/man/xl.cfg.pod.5 | 2 +-
tools/libxl/libxl.h | 6 ++
tools/libxl/libxl_dm.c | 8
tools/libxl/libxl_types.idl |
On 05/14/2015 07:54 AM, Ian Campbell wrote:
On Thu, 2015-05-14 at 12:21 +0100, Julien Grall wrote:
Hi Ian,
On 14/05/15 11:33, Ian Campbell wrote:
system_u:system_r:domU_t is defined in the default policy and makes as
much sense as anything for a default.
So you rule out the possibility to ru
On 03/03/15 09:23, Ian Campbell wrote:
> On Mon, 2015-02-16 at 18:05 -0500, Don Slutz wrote:
>
I do not see that I ever replied to this :(
>> > +=item B
>> > +
>> > +Turns on or off the exposure of VMware port. This is known as
>> > +vmport in QEMU. Also called VMware Backdoor I/O Port. Not a
Sorry for the resend, i messed up the to's en from's.
Hi Konrad / David,
One big snip on this thread, got some more debug info, hopefully this will
lead to something:
On a working kernel (with the two seemingly non related patches reverted) i get:
[0.717796] pcifront pci-0: Allocated pdev
Hi Konrad / David,
One a big snip on this thread, got some more debug info, hopefully this will
lead to something:
On a working kernel (with the two seemingly non related patches reverted) i get:
[0.717796] pcifront pci-0: Allocated pdev @ 0x880019e11780
pdev->sh_info @ 0x880018f58
On Mon, May 11, 2015 at 1:57 AM, Jan Beulich wrote:
> >>> On 11.05.15 at 00:04, wrote:
> > On Fri, May 8, 2015 at 2:49 AM, Jan Beulich wrote:
> >> >>> On 07.05.15 at 19:05, wrote:
> >> > @@ -1110,6 +1113,67 @@ rt_dom_cntl(
> >> > }
> >> > spin_unlock_irqrestore(&prv->lock, fl
On Mon, May 11, 2015 at 8:11 AM, Dario Faggioli
wrote:
> On Thu, 2015-05-07 at 12:05 -0500, Chong Li wrote:
> > Add two hypercalls(XEN_DOMCTL_SCHEDOP_getvcpuinfo/putvcpuinfo) to
> get/set a domain's
> > per-VCPU parameters. Hypercalls are handled in function rt_dom_cntl.
> >
> And that is because
Jim Fehlig wrote:
> More hint that libvirtd crashed. Have there been any attempts to
> reproduce this outside of the test rig? Or capture a core dump?
>
FYI, I've unsuccessfully tried to reproduce this using config similar to
debian.guest.osstest.cfg.xml.
Regards,
Jim
__
Anthony PERARD wrote:
> On Thu, May 14, 2015 at 11:47:18AM +0100, Ian Campbell wrote:
>
>> I suppose the openstack CI loop doesn't capture anything more
>> interesting than osstest does?
>>
>
> No, nothing else interesting. The next step would be to enable more debug
> output from libvirtd
Ian Campbell wrote:
> On Wed, 2015-05-13 at 18:46 +0100, Anthony PERARD wrote:
>
>> On Wed, May 13, 2015 at 09:46:28AM +0100, Ian Campbell wrote:
>>
>>> On Mon, 2015-05-11 at 10:36 -0600, Jim Fehlig wrote:
>>> [...]
>>>
> The qemu log is sadly empty so I've no clue why this timed
>>> Tim Deegan 05/14/15 10:55 PM >>>
>At 21:05 +0100 on 14 May (1431637535), Jan Beulich wrote:
>> >>> Tim Deegan 05/14/15 12:36 PM >>>
>> >At 15:37 +0100 on 11 May (1431358623), David Vrabel wrote:
>> >> +while ( observe_head(&lock->tickets) != sample.tail )
>> >
>> >This test should be
Am 14.05.15 um 10:41 schrieb Ian Campbell:
Thanks Atom2, thanks for the refs, I've added the Debian bug and the
submitter back to the CC.
Unfortunately those recipients originally seem to have escaped my eye
... but they are included now.
On Wed, 2015-05-13 at 22:11 +0200, Atom2 wrote:
Am 13.0
At 21:05 +0100 on 14 May (1431637535), Jan Beulich wrote:
> >>> Tim Deegan 05/14/15 12:36 PM >>>
> >At 15:37 +0100 on 11 May (1431358623), David Vrabel wrote:
> >> void _spin_barrier(spinlock_t *lock)
> >> {
> >> +spinlock_tickets_t sample;
> >> #ifdef LOCK_PROFILE
> >> s_time_t block
>>> "Jan Beulich" 05/14/15 10:06 PM >>>
Tim Deegan 05/14/15 12:36 PM >>>
>>At 15:37 +0100 on 11 May (1431358623), David Vrabel wrote:
>>> void _spin_barrier(spinlock_t *lock)
>>> {
>>> +spinlock_tickets_t sample;
>>> #ifdef LOCK_PROFILE
>>> s_time_t block = NOW();
>>> -u64
>>> "Chen, Tiejun" 05/14/15 7:48 AM >>>
>On 2015/5/11 18:57, Jan Beulich wrote:
>> Yeah, the constant name probably shouldn't refer to PCI, but simply
>> to pass-through.
>
>What about XEN_DOMCTL_DEV_RDM_XXX? I mean this may be specific to
>device, right?
Fine with me.
Jan
___
>>> Tim Deegan 05/14/15 12:36 PM >>>
>At 15:37 +0100 on 11 May (1431358623), David Vrabel wrote:
>> void _spin_barrier(spinlock_t *lock)
>> {
>> +spinlock_tickets_t sample;
>> #ifdef LOCK_PROFILE
>> s_time_t block = NOW();
>> -u64 loop = 0;
>> +#endif
>>
>> check_barrie
On 05/14/2015 08:31 PM, Tamas K Lengyel wrote:
> On Thu, May 14, 2015 at 7:11 PM, Razvan Cojocaru
> wrote:
>> On 05/14/2015 07:55 PM, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h
index 45b5283..1dd49dd 100644
--- a/xen/include/asm-x
On 14/05/15 18:48, Julien Grall wrote:
> Although you would need to reshuffle a bit the layout. With your
> solution, if the guest is using 128 vCPUs it will overlap the
> grant-table region, magic page (xenstore, xenconsole,...) and the
> beginning of the RAM. whoops ;).
Hmmm... forget this parag
Ian Campbell writes ("Re: [Xen-devel] [PATCH OSSTEST] Toolstack::xl: Support
for ACPI fallback for shutdown"):
> You acked the xl one, so here is a separate one.
Acked-by: Ian Jackson
Thanks,
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
ht
Hi Chen,
On 14/05/15 15:14, Chen Baozi wrote:
> From: Chen Baozi
>
> Signed-off-by: Chen Baozi
> ---
> xen/include/public/arch-arm.h | 3 +--
> 1 file changed, 1 insertion(+), 2 deletions(-)
>
> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
> index c029e0f..cbcda7
Ian Campbell writes ("Re: [OSSTEST v6 13/24] distros: support PV guest install
from Debian netinst media."):
> On Tue, 2015-05-12 at 16:52 +0100, Ian Jackson wrote:
> > Wrap damage on my screen. I appreciate that you want to retain the
> > tabular nature, but perhaps
> >
> > my %arch_props
Ian Campbell writes ("Re: [OSSTEST v6 14/24] Test pygrub and pvgrub on the
regular flights"):
> On Tue, 2015-05-12 at 16:54 +0100, Ian Jackson wrote:
> > I think we should consider at this point which jobs we can drop as a
> > result of these new ones being added. Ideally this patch would
> > con
Hi Chen,
On 14/05/15 15:14, Chen Baozi wrote:
> From: Chen Baozi
>
> GIC-500 supports up to 128 cores in a single SoC. Since the
> redistributor register map is no longer set by fixed size, which limits
> the number of vcpu, we increase MAX_VIRT_CPUS to 128 and remove the
> corresponding restric
On 05/14/2015 10:07 AM, Michael S. Tsirkin wrote:
> On Thu, May 14, 2015 at 02:02:04PM +0200, Markus Armbruster wrote:
>> Correct.
>>
>> Here's how I think it should be done:
>>
>> * Create a machine option to control the FDC
>>
>> This is a machine-specific option. It should only exist for ma
Hi Chen,
On 14/05/15 15:14, Chen Baozi wrote:
> diff --git a/xen/common/domctl.c b/xen/common/domctl.c
> index e571e76..43b9f79 100644
> --- a/xen/common/domctl.c
> +++ b/xen/common/domctl.c
> @@ -33,6 +33,11 @@
> #include
> #include
>
> +#ifdef CONFIG_ARM_64
> +#include
> +#include
> +#en
Run QEMU as non-root. Starting from uid 6000, the chosen uid is
base+domid. If the uid doesn't exist, try just 6000. This is less
secure: ideally we don't want different domains having their QEMUs
running with the same uid. Finally if uid 6000 doesn't exist either,
fall back to running QEMU as root
Ian Campbell writes ("Re: [OSSTEST PATCH 5/6] ts-xen-build-prep: mkfs a new
/home/osstest, don't resize2fs"):
> On Wed, 2015-05-13 at 12:15 +0100, Ian Jackson wrote:
> > + echo '$mapper $dir $fstype defaults 0 0' >>/etc/fstab
>
> This doesn't update /etc/fstab so in standalone mode (when a host
Hi Chen,
On 14/05/15 15:14, Chen Baozi wrote:
> From: Chen Baozi
>
> Currently the number of vcpus on arm64 with GICv3 is limited up to 8 due
> to the fixed size of redistributor mmio region. In this patch series, I
> postpone setting the size of GICR0 to the point when max_vcpus of a domU is
>
Signed-off-by: Ian Jackson
---
ts-logs-capture |2 ++
1 file changed, 2 insertions(+)
diff --git a/ts-logs-capture b/ts-logs-capture
index 4ad55b9..6445e03 100755
--- a/ts-logs-capture
+++ b/ts-logs-capture
@@ -102,6 +102,8 @@ sub fetch_logs_host_guests () {
/var/log/kern.
osstest service user writes ("[ovmf test] 55883: regressions - FAIL"):
> flight 55883 ovmf real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/55883/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-amd64-xsm
On Thu, May 14, 2015 at 7:11 PM, Razvan Cojocaru
wrote:
> On 05/14/2015 07:55 PM, Tamas K Lengyel wrote:
>>> diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h
>>> index 45b5283..1dd49dd 100644
>>> --- a/xen/include/asm-x86/domain.h
>>> +++ b/xen/include/asm-x86/domain.h
>>>
The Xen hypercall interface is always using 4K page granularity on ARM
and x86 architecture.
With the incoming support of 64K page granularity for ARM64 guest, it
won't be possible to re-use the Linux page definition in Xen drivers.
Introduce Xen page definition helpers based on the Linux page
de
With 64KB page granularity support in Linux, a page will be split accross
multiple MFN (Xen is using 4KB page granularity). Thoses MFNs may not be
contiguous.
With the offset in the page, the helper will be able to know which MFN
the driver needs to retrieve.
Signed-off-by: Julien Grall
Cc: Konr
The PV network protocol is using 4KB page granularity. The goal of this
patch is to allow a Linux using 64KB page granularity using network
device on a non-modified Xen.
It's only necessary to adapt the ring size and break skb data in small
chunk of 4KB. The rest of the code is relying on the gran
The PV network protocol is using 4KB page granularity. The goal of this
patch is to allow a Linux using 64KB page granularity working as a
network backend on a non-modified Xen.
It's only necessary to adapt the ring size and break skb data in small
chunk of 4KB. The rest of the code is relying on
The hypercall interface (as well as the toolstack) is always using 4KB
page granularity. When the toolstack is asking for mapping a series of
guest PFN in a batch, it expects to have the page map contiguously in
its virtual memory.
When Linux is using 64KB page granularity, the privcmd driver will
The console ring is always based on the page granularity of Xen.
Signed-off-by: Julien Grall
Cc: Greg Kroah-Hartman
Cc: Jiri Slaby
Cc: David Vrabel
Cc: Stefano Stabellini
Cc: Boris Ostrovsky
Cc: linuxppc-...@lists.ozlabs.org
---
drivers/tty/hvc/hvc_xen.c | 6 +++---
1 file changed, 3 insert
From: Julien Grall
The PV block protocol is using 4KB page granularity. The goal of this
patch is to allow a Linux using 64KB page granularity using block
device on a non-modified Xen.
The block API is using segment which should at least be the size of a
Linux page. Therefore, the driver will ha
The Xen interface is using 4KB page granularity. This means that each
grant is 4KB.
The current implementation allocates a Linux page per grant. On Linux
using 64KB page granularity, only the first 4KB of the page will be
used.
We could decrease the memory wasted by sharing the page with multiple
The hypercall interface is always using 4KB page granularity. This is
requiring to use xen page definition macro when we deal with hypercall.
Note that pfn_to_mfn is working with a Xen pfn (i.e 4KB). We may want to
rename pfn_mfn to make this explicit.
We also allocate a 64KB page for the shared
When Linux is using 64K page granularity, every page will be slipt in
multiple non-contiguous 4K MFN.
I'm not sure how to handle efficiently the check to know whether we can
merge 2 biovec with a such case. So for now, always says that biovec are
not mergeable.
Signed-off-by: Julien Grall
Cc: Ko
For ARM64 guests, Linux is able to support either 64K or 4K page
granularity. Although, the hypercall interface is always based on 4K
page granularity.
With 64K page granuliarty, a single page will be spread over multiple
Xen frame.
When a driver request/free a balloon page, the balloon driver wi
The xenstore ring is always based on the page granularity of Xen.
Signed-off-by: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
Cc: David Vrabel
---
drivers/xen/xenbus/xenbus_probe.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/xen/xenbus/xenbus_
The PV block protocol is using 4KB page granularity. The goal of this
patch is to allow a Linux using 64KB page granularity behaving as a
block backend on a non-modified Xen.
It's only necessary to adapt the ring size and the number of request per
indirect frames. The rest of the code is relying o
Only use the first 4KB of the page to store the events channel info. It
means that we will wast 60KB every time we allocate page for:
* control block: a page is allocating per CPU
* event array: a page is allocating everytime we need to expand it
I think we can reduce the memory waste fo
The logs and images (including .../logs, .../results, etc.) are now on
their own filesystem on the production osstest VM, which I have called
/home/logs.
Changing this in production config will allow us to tidy up by
removing the symlink I left behind.
Signed-off-by: Ian Jackson
---
production-
On 05/14/2015 07:55 PM, Tamas K Lengyel wrote:
>> diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h
>> index 45b5283..1dd49dd 100644
>> --- a/xen/include/asm-x86/domain.h
>> +++ b/xen/include/asm-x86/domain.h
>> @@ -341,19 +341,13 @@ struct arch_domain
>>
>> /* Monitor o
On Mon, May 11, 2015 at 4:56 AM, Dario Faggioli
wrote:
> On Thu, 2015-05-07 at 12:05 -0500, Chong Li wrote:
> > [Goal]
> > The current xl sched-rtds tool can only set the VCPUs of a domain to the
> same parameter
> > although the scheduler supports VCPUs with different parameters. This
> patchset
From: Julien Grall
Signed-off-by: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Roger Pau Monné
Cc: Boris Ostrovsky
Cc: David Vrabel
---
drivers/block/xen-blkfront.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/drivers/block/xen-blkfront.c b/drivers/block/xen-blkfront.c
index 2c61cf8..
From: Julien Grall
Make the code less confusing to read now that Linux may not have the
same page size as Xen.
Signed-off-by: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Roger Pau Monné
---
drivers/block/xen-blkback/blkback.c | 10 +-
drivers/block/xen-blkback/common.h | 2 +-
2 fil
From: Julien Grall
Since commit b764915 "xen-blkfront: use a different scatterlist for each
request", biovec has been replaced by scatterlist when copying back the
data during a completion request.
Signed-off-by: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
Cc: David Vrabel
Cc:
SPP was used by the grant table v2 code which has been removed in
commit 438b33c7145ca8a5131a30c36d8f59bce119a19a "xen/grant-table:
remove support for V2 tables".
Signed-off-by: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
Cc: David Vrabel
---
drivers/xen/grant-table.c | 1 -
1
The variables old_req_cons and ring_slots_used are assigned but never
used since commit 1650d5455bd2dc6b5ee134bd6fc1a3236c266b5b "xen-netback:
always fully coalesce guest Rx packets".
Signed-off-by: Julien Grall
Cc: Ian Campbell
Cc: Wei Liu
Cc: net...@vger.kernel.org
---
drivers/net/xen-netbac
virt_to_mfn should take a void* rather an unsigned long. While it
doesn't really matter now, it would throw a compiler warning later when
virt_to_mfn will enforce the type.
At the same time, avoid to compute new virtual address every time in the
loop and directly increment the parameter as we don'
From: Julien Grall
Signed-off-by: Julien Grall
Cc: Stefano Stabellini
---
arch/arm/include/asm/xen/page.h | 1 -
1 file changed, 1 deletion(-)
diff --git a/arch/arm/include/asm/xen/page.h b/arch/arm/include/asm/xen/page.h
index 0b579b2..1bee8ca 100644
--- a/arch/arm/include/asm/xen/page.h
+++
Using xen/page.h will be necessary later for using common xen page
helpers.
As xen/page.h already include asm/xen/page.h, always use the later.
Signed-off-by: Julien Grall
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
Cc: David Vrabel
Cc:
rx->status is an int16_t, print it using %d rather than %u in order to
have a meaningful value when the field is negative.
Signed-off-by: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
Cc: David Vrabel
Cc: net...@vger.kernel.org
---
drivers/net/xen-netfront.c | 2 +-
1 file change
1 - 100 of 244 matches
Mail list logo