On Wed, 2015-05-20 at 16:39 +0100, Ian Campbell wrote:
> On Wed, 2015-05-13 at 11:36 +0800, longtao.pang wrote:
> > parsing grub which has 'submenu' primitive
> > Changes to support '/boot' leading paths of kernel, xen, in grub
> > Refactor installation of overlays for guest used
>>> On 21.05.15 at 08:40, wrote:
> @@ -329,7 +340,7 @@ static uint64_t acpi_pm_ticks_elapsed(uint64_t t1,
> uint64_t t2)
> }
>
> uint64_t (*__read_mostly cpuidle_get_tick)(void) = get_acpi_pm_tick;
> -static uint64_t (*__read_mostly ticks_elapsed)(uint64_t, uint64_t)
> +uint64_t (*__read_most
>>> On 21.05.15 at 05:34, wrote:
> flight 56811 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/56811/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-armhf-armhf-xl-multivcpu 17 leak-check/check
When checking the ACPI funciton of C-status, after 100 seconds sleep,
the sampling value of C0 status from the xenpm tool decreases.
Because C0=NOW()-C1-C2-C3-C4, when NOW() value is during idle time,
NOW() value is bigger than last C-status update time, and C0 value
is also bigger than ture value.
>>> On 20.05.15 at 19:00, wrote:
> On 20/05/15 17:22, Jan Beulich wrote:
> On 17.05.15 at 22:03, wrote:
>>> Xen environment table is ACPI table that is used to pass grant table
>>> and event channel interrupt information to dom0.
>>
>> The documents linked to by the uefi.org web site don't l
flight 56818 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56818/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect
test-amd64-amd64-pair
flight 56860 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56860/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 56492
build-amd64
On Wed, May 20, 2015 at 03:12:24PM +0100, Julien Grall wrote:
> On 20/05/15 14:40, Edgar E. Iglesias wrote:
> > Thanks for the pointers,
> >
> > I agree that fundamental differences like these beteween v7 and v8 wouldn't
> > be good.
>
> I didn't find any fundamental differences for device memory
On 05/20/2015 05:25 PM, George Dunlap wrote:
On 05/20/2015 03:55 PM, Juergen Gross wrote:
On 05/20/2015 04:41 PM, George Dunlap wrote:
On Wed, May 20, 2015 at 3:33 PM, Juergen Gross wrote:
On 05/20/2015 04:20 PM, George Dunlap wrote:
On Mon, Apr 20, 2015 at 9:12 AM, Juergen Gross wrote:
flight 56811 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56811/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 17 leak-check/check fail REGR. vs. 56375
Regressions which ar
flight 56810 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56810/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 15
rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 5671
On 2015/5/18 23:34, Wei Liu wrote:
When building HVM guests, originally some fields of xc_hvm_build_args
are filled in xc_hvm_build (and buried in the wrong function), some are
set in libxl__build_hvm before passing xc_hvm_build_args to
xc_hvm_build. This is fragile.
After examining the code in
flight 56851 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56851/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 56492
build-amd64
branch xen-unstable
xen branch xen-unstable
job build-i386-xsm
test xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in t
On 05/20/2015 11:00 PM, Julien Grall wrote:
> On 20/05/15 15:56, Roger Pau Monné wrote:
>> El 20/05/15 a les 15.21, Julien Grall ha escrit:
>>> Hi,
>>>
>>> On 20/05/15 14:10, Bob Liu wrote:
---
drivers/block/xen-blkback/blkback.c | 12
drivers/block/xen-blkback/common.h |
On 05/13/2015 05:49 AM, Vitaly Kuznetsov wrote:
Dummy policy just checks that the current domain is privileged,
in flask policy soft_reset is added to create_domain.
Signed-off-by: Vitaly Kuznetsov
I think the FLASK policy should also check that memory can be moved
from d1 to d2, independent
From: "Luis R. Rodriguez"
This driver uses the same area for MTRR as for the ioremap().
Convert the driver from using the x86 specific MTRR code to
the architecture agnostic arch_phys_wc_add(). arch_phys_wc_add()
will avoid MTRR if write-combining is available, in order to
take advantage of that
From: "Luis R. Rodriguez"
This driver uses the same area for MTRR as for the ioremap().
Convert the driver from using the x86 specific MTRR code to
the architecture agnostic arch_phys_wc_add(). arch_phys_wc_add()
will avoid MTRR if write-combining is available, in order to
take advantage of that
From: "Luis R. Rodriguez"
Convert the driver from using the x86 specific MTRR code to
the architecture agnostic arch_phys_wc_add(). arch_phys_wc_add()
will avoid MTRR if write-combining is available, in order to
take advantage of that also ensure the ioremap'd area is requested
as write-combining
From: "Luis R. Rodriguez"
This allows drivers to take advantage of write-combining
when possible. The PCI specification does not allow for us
to automatically identify a memory region which needs
write-combining so drivers have to identify these areas
on their own. There is IORESOURCE_PREFETCH bu
it/mcgrof/linux-pci.git
pci_iomap_wc-v6-20150520
for you to fetch changes up to 480d550fa62bdad1c8f25b16d27d2035f36a283b:
video: fbdev: vt8623fb: use arch_phys_wc_add() and pci_iomap_wc() (2015-05-20
15:12:04 -0700)
[0] https://git.kernel.org/cgit/linux/kernel/git/helgaas/pci.git/
Luis R
On 20/05/2015 18:40, Don Slutz wrote:
> On 05/15/15 04:49, Ian Campbell wrote:
>> On Fri, 2015-05-15 at 00:42 +0100, Andrew Cooper wrote:
>>> On 15/05/2015 00:34, Don Slutz wrote:
This allows use of QEMU's VMware emulated video card
Signed-off-by: Don Slutz
>>> Nack.
>>>
>>> Qemu-tr
flight 56832 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56832/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 56492
build-amd64
flight 56796 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56796/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-localmigrate.2 fail in 56731
pass in 56796
test-armhf-armhf-xl
On Tue, 2015-05-19 at 18:35 +0100, Wei Liu wrote:
> On Sat, May 16, 2015 at 03:15:21AM +0200, Dario Faggioli wrote:
> > > === Hypervisor X86 ===
> >
> > > * HT enabled with credit has 7.9 per perf drop. (none)
> > >kernbench demonstrated it
> > >http://www.gossamer-threads.com/lists/xen
On Wed, May 20, 2015 at 1:39 PM, Bjorn Helgaas wrote:
> On Tue, May 19, 2015 at 04:45:30PM -0700, Luis R. Rodriguez wrote:
>> On Tue, May 19, 2015 at 4:29 PM, David Airlie wrote:
>> >
>> >> On Tue, May 19, 2015 at 4:02 PM, Bjorn Helgaas
>> >> wrote:
>> >> > [-cc Venkatesh (bouncing)
>> >> >
>>
flight 56791 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56791/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-freebsd10-amd64 9 freebsd-install fail like 56718
test-amd64-i386-libvirt 1
On Tue, May 19, 2015 at 04:45:30PM -0700, Luis R. Rodriguez wrote:
> On Tue, May 19, 2015 at 4:29 PM, David Airlie wrote:
> >
> >> On Tue, May 19, 2015 at 4:02 PM, Bjorn Helgaas wrote:
> >> > [-cc Venkatesh (bouncing)
> >> >
> >> > On Tue, May 19, 2015 at 5:46 PM, Luis R. Rodriguez
> >> > wrote:
On Wed, 20 May 2015, Major Hayden wrote:
> On 05/20/2015 05:41 AM, Jan Beulich wrote:
> > Considering that no-one else is seeing this - is this perhaps connected
> > to you building Xen with pre-release gcc 5.0.1? This is also because in
> > order for the above to indeed occur, mmio_ro_do_page_fau
On Wed, May 20, 2015 at 05:40:39PM +0800, Jiang Liu wrote:
> diff --git a/arch/arm/kernel/irq.c b/arch/arm/kernel/irq.c
> index 350f188c92d2..baf8edebe26f 100644
> --- a/arch/arm/kernel/irq.c
> +++ b/arch/arm/kernel/irq.c
> @@ -140,7 +140,7 @@ int __init arch_probe_nr_irqs(void)
> static bool migr
From: "Luis R. Rodriguez"
This lets you build a kernel which can support xen dom0
or xen guests on i386, x86-64 and arm64 by just using:
make xenconfig
You can start from an allnoconfig and then switch to xenconfig.
This also splits out the options which are available currently
to be built w
From: "Luis R. Rodriguez"
We'll be adding options for xen as well.
Cc: Josh Triplett
Cc: Borislav Petkov
Cc: Pekka Enberg
Cc: David Rientjes
Cc: Michal Marek
Cc: Randy Dunlap
Cc: penb...@kernel.org
Cc: levinsasha...@gmail.com
Cc: mtosa...@redhat.com
Cc: fengguang...@intel.com
Cc: David Vra
From: "Luis R. Rodriguez"
Michal Marek, Xen folks (David Vrabel, Konrad, Ian), which tree should
these go through?
This v6 addresses enabling xen on i386, x86-64 and arm64 starting
from a 'make allnoconfig' setting.
Luis R. Rodriguez (2):
kconfig: clarify kvmconfig is for kvm
kconfig: add x
On 05/20/15 04:03, Julien Grall wrote:
> Hi,
>
> On 19/05/2015 21:02, Andrew Cooper wrote:
>>> diff --git a/xen/include/public/arch-x86/xen.h
>>> b/xen/include/public/arch-x86/xen.h
>>> index cea3fe7..5a5bad6 100644
>>> --- a/xen/include/public/arch-x86/xen.h
>>> +++ b/xen/include/public/arch-x86
Hi,
On 18/05/15 09:20, Jan Beulich wrote:
On 17.05.15 at 22:03, wrote:
>> --- a/xen/drivers/char/Makefile
>> +++ b/xen/drivers/char/Makefile
>> @@ -6,5 +6,5 @@ obj-$(HAS_EXYNOS4210) += exynos4210-uart.o
>> obj-$(HAS_OMAP) += omap-uart.o
>> obj-$(HAS_SCIF) += scif-uart.o
>> obj-$(HAS_EHCI)
On Wed, May 20, 2015 at 06:56:23PM +0100, Wei Liu wrote:
> I worked a little bit on upgrading Osstest to Jessie a few months ago but
> dropped the ball. Here are the patches I wrote.
>
> With these patches I can run build jobs (Xen and kernel) with Jessie. Running
> test jobs requires more work be
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
> Parse GTDT (Generic Timer Descriptor Table) to initialize timer.
> Using the information presented by GTDT to initialize the arch
> timer (not memory-mapped).
>
> Clear all el2 fields in GTDT table after initialization
> for passing it to Dom0.
>
When we use Wheezy the arm kernel is only available in wheezy-backports.
In Jessie it is not in backports.
Signed-off-by: Wei Liu
---
Not sure if this patch does the right thing.
---
mg-debian-installer-update | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/mg-debian
In ts-xen-build-prep, replace matching lenny with jessie since lenny is
not used in production anymore.
Signed-off-by: Wei Liu
---
ts-host-install | 4 +++-
ts-xen-build-prep | 4 ++--
2 files changed, 5 insertions(+), 3 deletions(-)
diff --git a/ts-host-install b/ts-host-install
index b73c7f
There is no package called libnl-dev on Jessie. To build remus, use
libnl-route-3-dev instead.
Signed-off-by: Wei Liu
---
ts-xen-build-prep | 31 ++-
1 file changed, 18 insertions(+), 13 deletions(-)
diff --git a/ts-xen-build-prep b/ts-xen-build-prep
index 25ba3d4..
I worked a little bit on upgrading Osstest to Jessie a few months ago but
dropped the ball. Here are the patches I wrote.
With these patches I can run build jobs (Xen and kernel) with Jessie. Running
test jobs requires more work because now Jessie uses systemd a lot of things
have changed.
Wei.
Debian installer used to have the behaviour to install grub on the
default device. But it's changed in Jessie.
See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759737.
Signed-off-by: Wei Liu
---
Osstest/Debian.pm | 2 ++
1 file changed, 2 insertions(+)
diff --git a/Osstest/Debian.pm b/Oss
Signed-off-by: Wei Liu
---
ts-xen-build-prep | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-xen-build-prep b/ts-xen-build-prep
index 312ae78..76758ac 100755
--- a/ts-xen-build-prep
+++ b/ts-xen-build-prep
@@ -229,7 +229,7 @@ END
if ($ho->{Suite} !~ m/lenny|squeeze/) {
On 05/19/15 16:02, Andrew Cooper wrote:
> On 15/05/15 00:34, Don Slutz wrote:
>> This is done by adding xen_arch_domainconfig vmware_hw. It is set to
>> the VMware virtual hardware version.
>>
...
>> Signed-off-by: Don Slutz
>> Reviewed-by: Andrew Cooper
>> ---
>> v10:
>> Did not add "Reviewe
On 05/19/15 16:23, Andrew Cooper wrote:
> On 15/05/15 00:34, Don Slutz wrote:
>> This includes adding is_vmware_port_enabled
>>
>> diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
>> index bc3d3a5..153048a 100644
>> --- a/xen/arch/x86/domain.c
>> +++ b/xen/arch/x86/domain.c
>> @@ -519,7
On 05/15/15 04:49, Ian Campbell wrote:
> On Fri, 2015-05-15 at 00:42 +0100, Andrew Cooper wrote:
>> On 15/05/2015 00:34, Don Slutz wrote:
>>> This allows use of QEMU's VMware emulated video card
>>>
>>> Signed-off-by: Don Slutz
>>
>> Nack.
>>
>> Qemu-trad is currently has remote code execution vul
On Tue, 19 May 2015, Ian Campbell wrote:
> > # Symbols used by qemu
> >
> > $ nm tools/qemu-xen-dir-remote/i386-softmmu/qemu-system-i386 | grep
> > \\bU.xc_
> >
> > - xc_domain_add_to_physmap
> > - xc_domain_bind_pt_pci_irq
> > - xc_domain_create
> > - xc_domain_destroy
> >
On 05/19/15 16:12, Andrew Cooper wrote:
> It may not be the appropriate half to touch.
>
> Drop the superfluous mem_sharing_enabled assignment, and move the hap_enabled
> assignment to a suitable conditional before it is actually needed.
>
> Signed-off-by: Andrew Cooper
> CC: Keir Fraser
> CC:
flight 56784 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56784/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 9 windows-install fail REGR. vs. 56512
Regressions which a
Hi,
On 17/05/15 21:03, Parth Dixit wrote:
> set edge/level type information for an interrupt
>
> Signed-off-by: Parth Dixit
> ---
> xen/arch/arm/irq.c | 17 +
> xen/include/asm-arm/acpi.h | 26 ++
> xen/include/asm-arm/irq.h | 2 ++
> 3 files ch
On 20/05/15 17:03, Jan Beulich wrote:
On 17.05.15 at 22:03, wrote:
>> --- a/xen/drivers/acpi/osl.c
>> +++ b/xen/drivers/acpi/osl.c
>> @@ -87,16 +87,7 @@ acpi_physical_address __init
>> acpi_os_get_root_pointer(void)
>> void __iomem *
>> acpi_os_map_memory(acpi_physical_address phys, acpi_s
flight 56816 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56816/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 56492
build-amd64
Hi Jan,
On 20/05/15 17:22, Jan Beulich wrote:
On 17.05.15 at 22:03, wrote:
>> Xen environment table is ACPI table that is used to pass grant table
>> and event channel interrupt information to dom0.
>
> The documents linked to by the uefi.org web site don't look like these
> are final, form
On 05/20/2015 05:41 AM, Jan Beulich wrote:
> Considering that no-one else is seeing this - is this perhaps connected
> to you building Xen with pre-release gcc 5.0.1? This is also because in
> order for the above to indeed occur, mmio_ro_do_page_fault()'s
> put_page() would need to drop the last re
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
> MADT contains the information for MPIDR which is essential for
> SMP initialization, parse the GIC cpu interface structures to
> get the MPIDR value and map it to cpu_logical_map(), and add
> enabled cpu with valid MPIDR into cpu_possible_map.
>
>
>>> On 20.05.15 at 18:05, wrote:
> On 05/20/2015 06:48 PM, Jan Beulich wrote:
> On 20.05.15 at 17:24, wrote:
>>> On 05/20/2015 05:53 PM, Jan Beulich wrote:
>>> On 19.05.15 at 10:31, wrote:
> +/* Supported values for the vm_event_write_ctrlreg index. */
> +#define VM_EVENT_X86_CR0
>>> On 20.05.15 at 17:49, wrote:
> What about defining a new define HAVE_NUMA?
That might be an acceptable compromise.
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 17.05.15 at 22:04, wrote:
> @@ -104,6 +105,7 @@ static void __init parse_acpi_param(char *s)
> else if ( !strcmp(s, "force") )
> {
> acpi_disabled = 0;
> +efi_enabled = 1;
What has "acpi=force" to do with EFI?
> --- a/xen/include/xen/efi.h
> +++ b/xen/include/xe
At 16:57 +0100 on 20 May (1432141031), Andrew Cooper wrote:
> and unconditionally defer the vm_size() call, as it doesn't have a NULL short
> circuit.
>
> Reported-by: Wei Liu
> Signed-off-by: Andrew Cooper
> Tested-by: Wei Liu
> Reviewed-by: Roger Pau Monné
> CC: Keir Fraser
> CC: Jan Beuli
At 18:04 +0200 on 20 May (1432145043), Roger Pau Monné wrote:
> El 20/05/15 a les 17.59, Jan Beulich ha escrit:
> On 20.05.15 at 17:45, wrote:
> >> Try this: It appears that vfree(NULL) isn't safe.
> >
> > And intentionally so (I think this was even mentioned while discussing
> > the patch),
>>> On 17.05.15 at 22:03, wrote:
> add efi table and memory descriptor structures
> to common efi header file and pass efi system table address
> retrieved from uefi.This is required for
> creating efi table and passing memory information
> to DOM0
I may be missing some background here, but from
>>> On 17.05.15 at 22:03, wrote:
> Xen environment table is ACPI table that is used to pass grant table
> and event channel interrupt information to dom0.
The documents linked to by the uefi.org web site don't look like these
are final, formally acceptable definitions. I'm not sure we want to
inc
On 2015-5-20, at 17:57, Roger Pau Monné wrote:
>
> This is a short coming in FreeBSD PVH implementation, I'm working on a
> patch but if you want to boot in the meantime I recommend setting
> dom0_max_vcpus=32 (or any lower value) in the xen_cmdline.
With that added (and your patch), the system
>>> On 17.05.15 at 22:03, wrote:
> --- a/xen/include/xen/efi.h
> +++ b/xen/include/xen/efi.h
> @@ -8,7 +8,7 @@
> extern const bool_t efi_enabled;
>
> #define EFI_INVALID_TABLE_ADDR (~0UL)
> -
> +#define EFI_MEM_DESC_V1 1
> /* Add fields here only if they need to be referenced from non-EFI cod
The series builds on the original series by Matt Wilson and Christoph
Egger from Amazon.
Performance results for aggregate intrahost network throughput
(between 20 VM pairs, with 16 dom0 VCPUs) show substantial
improvements.
Throughput/Gbit/s
Base
From: Malcolm Crossley
Performance analysis of aggregate network throughput with many VMs
shows that performance is signficantly limited by contention on the
maptrack lock when obtaining/releasing maptrack handles from the free
list.
Instead of a single free list use a per-VCPU list. This avoids
Split grant table lock into two separate locks. One to protect
maptrack state (maptrack_lock) and one for everything else (lock).
Based on a patch originally by Matt Wilson .
Signed-off-by: David Vrabel
---
docs/misc/grant-tables.txt|9 +
xen/common/grant_table.c |9 +++
On 20/05/15 16:41, Jan Beulich wrote:
On 20.05.15 at 17:21, wrote:
>> On 20/05/15 16:07, Jan Beulich wrote:
>> On 17.05.15 at 22:03, wrote:
From: Naresh Bhat
Numa is currently not supported for arm in xen.
>>>
>>> This doesn't represent a valid reason for the code to be d
El 20/05/15 a les 17.59, Jan Beulich ha escrit:
On 20.05.15 at 17:45, wrote:
>> On 20/05/15 16:43, Andrew Cooper wrote:
>>> On 20/05/15 16:39, Wei Liu wrote:
I discovered this when running qemu-trad stubdom + shadow page table.
(XEN) Assertion 'pages' failed at vmap.c:275
and unconditionally defer the vm_size() call, as it doesn't have a NULL short
circuit.
Reported-by: Wei Liu
Signed-off-by: Andrew Cooper
Tested-by: Wei Liu
Reviewed-by: Roger Pau Monné
CC: Keir Fraser
CC: Jan Beulich
CC: Tim Deegan
---
xen/common/vmap.c |6 +-
1 file changed, 5 in
In combination with the per-active entry locks, the grant table lock
can be made a read-write lock since the majority of cases only the
read lock is required. The grant table read lock protects against
changes to the table version or size (which are done with the write
lock held).
The write lock i
>>> On 17.05.15 at 22:03, wrote:
> add new function acpi_parse_entries which takes
> acpi table as argument. This will avoid fetching table
> everytime in acpi_table_parse_entries.
This explanation doesn't make a lot of sense to me - I don't see you
save anything. Am I missing anything? Are you i
On Wed, May 20, 2015 at 04:45:25PM +0100, Andrew Cooper wrote:
> On 20/05/15 16:43, Andrew Cooper wrote:
> > On 20/05/15 16:39, Wei Liu wrote:
> >> I discovered this when running qemu-trad stubdom + shadow page table.
> >>
> >> (XEN) Assertion 'pages' failed at vmap.c:275
> >> (XEN) [ Xen-4.6-u
flight 56793 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56793/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 11 guest-start fail REGR. vs. 53854
test-amd64-i386-libvirt
Introduce a per-active entry spin lock to protect active entry state
The grant table lock must be locked before acquiring (locking) an
active entry.
This is a step in reducing contention on the grant table lock, but
will only do so once the grant table lock is turned into a read-write
lock.
Based
On 20/05/15 16:59, Jan Beulich wrote:
On 20.05.15 at 17:45, wrote:
>> On 20/05/15 16:43, Andrew Cooper wrote:
>>> On 20/05/15 16:39, Wei Liu wrote:
I discovered this when running qemu-trad stubdom + shadow page table.
(XEN) Assertion 'pages' failed at vmap.c:275
(XEN)
On Tue, May 19, 2015 at 06:41:19PM -0700, David Rientjes wrote:
> On Tue, 19 May 2015, Luis R. Rodriguez wrote:
>
> > From: "Luis R. Rodriguez"
> >
> > This lets you build a kernel which can support xen dom0
> > or xen guests by just using:
> >
> >make xenconfig
> >
> > on both x86 and arm
>>> On 17.05.15 at 22:03, wrote:
> --- a/xen/include/xen/acpi.h
> +++ b/xen/include/xen/acpi.h
> @@ -40,6 +40,10 @@
> #define ACPI_MADT_GET_POLARITY(inti) ACPI_MADT_GET_(POLARITY, inti)
> #define ACPI_MADT_GET_TRIGGER(inti) ACPI_MADT_GET_(TRIGGER, inti)
>
> +#define BAD_MADT_ENTRY(entry, end)
On 05/20/2015 06:48 PM, Jan Beulich wrote:
On 20.05.15 at 17:24, wrote:
>> On 05/20/2015 05:53 PM, Jan Beulich wrote:
>> On 19.05.15 at 10:31, wrote:
--- a/xen/arch/x86/hvm/event.c
+++ b/xen/arch/x86/hvm/event.c
@@ -88,55 +88,29 @@ static int hvm_event_traps(uint8_t sync,
>>> On 17.05.15 at 22:03, wrote:
> --- a/xen/drivers/acpi/osl.c
> +++ b/xen/drivers/acpi/osl.c
> @@ -87,16 +87,7 @@ acpi_physical_address __init acpi_os_get_root_pointer(void)
> void __iomem *
> acpi_os_map_memory(acpi_physical_address phys, acpi_size size)
> {
> - if (system_state >= SYS_S
>>> On 20.05.15 at 17:45, wrote:
> On 20/05/15 16:43, Andrew Cooper wrote:
>> On 20/05/15 16:39, Wei Liu wrote:
>>> I discovered this when running qemu-trad stubdom + shadow page table.
>>>
>>> (XEN) Assertion 'pages' failed at vmap.c:275
>>> (XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:
On Tue, May 19, 2015 at 3:45 PM, Jan Beulich wrote:
On 19.05.15 at 12:45, wrote:
>> On Tue, May 19, 2015 at 12:31 PM, Jan Beulich wrote:
>> On 19.05.15 at 12:14, wrote:
You can have a response flag for it to tell Xen to look at the
new_value. What I meant is why restrict the
El 20/05/15 a les 17.05, Eggert, Lars ha escrit:
> On 2015-5-20, at 16:25, Roger Pau Monné wrote:
>> I've realized that both reports of this errors were from hardware that
>> supported posted interrupts, while I don't have any hardware that
>> supports it. The following is just a hunch, but could
On Sun, Apr 19, 2015 at 4:50 AM, Chunyan Liu wrote:
> Add pvusb commands: usb-ctrl-attach, usb-ctrl-detach, usb-list,
> usb-attach and usb-detach.
>
> To attach a usb device to guest through pvusb, one could follow
> following example:
>
> #xl usb-ctrl-attach test_vm version=1 num_ports=8
One mo
>>> On 19.05.15 at 18:59, wrote:
> On 18/05/15 13:46, Jan Beulich wrote:
>> +stub_va = XEN_VIRT_END - (cpu + 1) * PAGE_SIZE;
>> +if ( map_pages_to_xen(stub_va, page_to_mfn(pg), 1,
>> + PAGE_HYPERVISOR_RX | MAP_SMALL_PAGES) )
>> +{
>> +if ( !*mfn )
>> +
On Wed, May 20, 2015 at 5:24 PM, Razvan Cojocaru
wrote:
> On 05/20/2015 05:53 PM, Jan Beulich wrote:
> On 19.05.15 at 10:31, wrote:
>>> The CR0, CR3 and CR4 events are
>>> now pre-write vm_events.
>>
>> I didn't get the impression you and Tamas had already settled on
>> whether this is the wa
>>> On 20.05.15 at 17:24, wrote:
> On 05/20/2015 05:53 PM, Jan Beulich wrote:
> On 19.05.15 at 10:31, wrote:
>>> --- a/xen/arch/x86/hvm/event.c
>>> +++ b/xen/arch/x86/hvm/event.c
>>> @@ -88,55 +88,29 @@ static int hvm_event_traps(uint8_t sync,
> vm_event_request_t *req)
>>> return 1;
>>
On Wed, May 20, 2015 at 3:23 PM, George Dunlap
wrote:
> On Sun, Apr 19, 2015 at 4:50 AM, Chunyan Liu wrote:
>> Add pvusb commands: usb-ctrl-attach, usb-ctrl-detach, usb-list,
>> usb-attach and usb-detach.
>>
>> To attach a usb device to guest through pvusb, one could follow
>> following example:
On 20/05/15 16:43, Andrew Cooper wrote:
> On 20/05/15 16:39, Wei Liu wrote:
>> I discovered this when running qemu-trad stubdom + shadow page table.
>>
>> (XEN) Assertion 'pages' failed at vmap.c:275
>> (XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:C ]
>> (XEN) CPU:1
>> (XEN) R
On Wed, 2015-05-13 at 11:36 +0800, longtao.pang wrote:
> parsing grub which has 'submenu' primitive
> Changes to support '/boot' leading paths of kernel, xen, in grub
> Refactor installation of overlays for guest used
> Edit some APIs in TestSupport.pm for nested test
>
On 20/05/15 16:39, Wei Liu wrote:
> I discovered this when running qemu-trad stubdom + shadow page table.
>
> (XEN) Assertion 'pages' failed at vmap.c:275
> (XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:C ]
> (XEN) CPU:1
> (XEN) RIP:e008:[] vfree+0x1e/0x128
> (XEN) RFLAGS:
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
> +void __init smp_init_cpus(void)
> +{
> +int rc;
Missing blank line here.
> +/* initialize PSCI and set a global variable */
> +psci_init();
> +
> +if ( (rc = arch_smp_init()) < 0 )
> +{
> +printk(XENLOG_WARNING "SMP i
>>> On 20.05.15 at 17:21, wrote:
> On 20/05/15 16:07, Jan Beulich wrote:
> On 17.05.15 at 22:03, wrote:
>>> From: Naresh Bhat
>>>
>>> Numa is currently not supported for arm in xen.
>>
>> This doesn't represent a valid reason for the code to be disabled,
>> the more that ARM will want to su
I discovered this when running qemu-trad stubdom + shadow page table.
(XEN) Assertion 'pages' failed at vmap.c:275
(XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:C ]
(XEN) CPU:1
(XEN) RIP:e008:[] vfree+0x1e/0x128
(XEN) RFLAGS: 00010246 CONTEXT: hypervisor (d2v0)
(
On Wed, 2015-05-20 at 12:57 +, Mazen Ezzeddine (Student) wrote:
> Thanks for the feedback.
>
> I will arrange to respect the community etiquette as I will write frequently
> to the list in the upcoming period :).
>
Ok. No HTML emails and stopping top posting would make a good start, I
gues
On 20/05/15 16:20, Vitaly Kuznetsov wrote:
> Julien Grall writes:
>
>> Hi Vitaly,
>>
>> On 13/05/15 10:49, Vitaly Kuznetsov wrote:
>>> +int xc_domain_soft_reset(xc_interface *xch, uint32_t source_dom,
>>> + uint32_t dest_dom, domid_t console_domid,
>>> +
On 20/05/15 16:07, Jan Beulich wrote:
On 17.05.15 at 22:03, wrote:
>> From: Naresh Bhat
>>
>> Numa is currently not supported for arm in xen.
>
> This doesn't represent a valid reason for the code to be disabled,
> the more that ARM will want to support NUMA sooner or later. A
> valid reaso
Ian Campbell writes ("Re: [PATCH OSSTEST v2] grub: remove patch to disable
submenu from 20_linux_xen overlay"):
> --- /home/ianc/tmp/x/etc/grub.d/20_linux_xen 2013-07-03 04:39:20.0
> +0100
> +++ overlay/etc/grub.d/20_linux_xen 2015-04-21 11:09:57.777812773 +0100
This looks good to me,
On 05/20/2015 03:55 PM, Juergen Gross wrote:
> On 05/20/2015 04:41 PM, George Dunlap wrote:
>> On Wed, May 20, 2015 at 3:33 PM, Juergen Gross wrote:
>>> On 05/20/2015 04:20 PM, George Dunlap wrote:
On Mon, Apr 20, 2015 at 9:12 AM, Juergen Gross wrote:
>
> On 04/19/2015 05:50 AM,
"Viridian" in xen platform surely means "Hyper-V"
but if window 2008 r2 smp guest boot with viridian=false, it will bring another
problem 0x101 bluescreen.
http://old-list-archives.xenproject.org/archives/html/xen-users/2009-07/msg00661.html
Thanks!
-邮件原件-
发件人: Laszlo Ersek [mailto:ler..
1 - 100 of 238 matches
Mail list logo