On Tue, 2015-06-30 at 17:36 +0100, Ian Jackson wrote:
> Provides nested-layer-descend, which can be called in an individual
> test job at the appropriate point (after the L1 has been set up).
>
> The inner host is a guest of the outer host; powering it off means
> destroying it. Putting the power
Hi,
I want to simulate xen on ARM with fast model, but I failed to download
git://xenbits.xen.org/people/ianc/boot-wrapper.git which is lost.
Who has this file can send me one or who can tell me where I can download it?
Thanks,
Harry___
Xen-devel
flight 60021 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60021/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are failing
On Tue, 2015-06-30 at 17:36 +0100, Ian Jackson wrote:
> No functional change.
>
> We now call the per-host-ts finish steps unconditionally, rather than
> only if !$need_build_host, per-host-ts is (complicated) no-op if
> $need_build_host, since in that case $need_xen_hosts is {}.
>
> Signed-off-b
On Tue, 2015-06-30 at 17:36 +0100, Ian Jackson wrote:
> I wrote:
> > I think it would be best if I proposed some code to you. I will get
> > back to you with a suggestion.
>
> Here is the result. Please let me know what you think.
>
> NB that this is an RFC and I have NOT EXECUTED IT. It is ea
The modify_ldt syscall exposes a large attack surface and is
unnecessary for modern userspace. Make it optional.
Signed-off-by: Andy Lutomirski
---
arch/x86/Kconfig | 17 +
arch/x86/include/asm/mmu.h | 2 ++
arch/x86/include/asm/mmu_context.h | 31
This tests general modify_ldt behavior (only writes, so far) as
well as synchronous updates via IPI. It fails on old kernels.
I called this ldt_gdt because I'll add set_thread_area tests to
it at some point.
Signed-off-by: Andy Lutomirski
---
tools/testing/selftests/x86/Makefile | 2 +-
too
I've been able to get an unmodified Xen guest to OOPS once after a
lot of test iterations without this patch. I think this patch fixes
the problem. I'm a bit surprised that we don't see much more severe
LDT problems on Xen without this fix.
Once the synchronous modify_ldt code causes modify_ldt
This is intended for x86/urgent. Sorry for taking so long, but it
seemed nice to avoid breaking Xen.
This fixes the "dazed and confused" issue which was exposed by the
CVE-2015-5157 fix. It's also probably a good general attack surface
reduction, and it replaces some scary code with IMO less sca
modify_ldt has questionable locking and does not synchronize
threads. Improve it: redesign the locking and synchronize all
threads' LDTs using an IPI on all modifications.
This will dramatically slow down modify_ldt in multithreaded
programs, but there shouldn't be any multithreaded programs that
flight 59967 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59967/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 11 guest-saverestore fail REGR. vs. 58880
Tests whic
On 07/27/2015 04:09 PM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you'd like to add an
abstraction layer, in Linux, like in generic (or, perhaps, scheduling)
co
flight 59963 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59963/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 3 host-install(3) broken pass in 59869
test-armhf-armhf-xl-credit2 6
Our next Xen Project Document Day is this Wednesday, July 29!
Our THEME OF THE MONTH: "The Reverse Yard Sale"
For many of us in the northern hemisphere, this is the time of year
when people sort through the things they own and put the things they
no longer need into a yard sale. Well, instead of
On 07/28/2015 01:19 AM, Andrew Cooper wrote:
On 27/07/2015 18:42, Dario Faggioli wrote:
On Mon, 2015-07-27 at 17:33 +0100, Andrew Cooper wrote:
On 27/07/15 17:31, David Vrabel wrote:
Yeah, indeed.
That's the downside of Juergen's "Linux scheduler
approach". But the issue is there, even witho
On 07/27/2015 11:16 PM, Andy Lutomirski wrote:
On Mon, Jul 27, 2015 at 7:20 PM, Andy Lutomirski wrote:
On Mon, Jul 27, 2015 at 9:18 AM, Boris Ostrovsky
wrote:
On 07/27/2015 11:53 AM, Andy Lutomirski wrote:
On Mon, Jul 27, 2015 at 8:36 AM, Boris Ostrovsky
wrote:
On 07/25/2015 01:36 AM, Andy
On Mon, Jul 27, 2015 at 8:16 PM, Andy Lutomirski wrote:
> On Mon, Jul 27, 2015 at 7:20 PM, Andy Lutomirski wrote:
>> On Mon, Jul 27, 2015 at 9:18 AM, Boris Ostrovsky
>> wrote:
>>> On 07/27/2015 11:53 AM, Andy Lutomirski wrote:
On Mon, Jul 27, 2015 at 8:36 AM, Boris Ostrovsky
wrot
On 07/10/15 05:07, Wei Liu wrote:
> On Fri, Jul 10, 2015 at 09:40:59AM +0100, Jan Beulich wrote:
> On 28.06.15 at 01:27, wrote:
>>> Changes v11 to v12:
>>> Rebased on staging.
>>>
>>
>> I was actually meaning to apply this (at least until patch 6; I'm
>> not convinced patch 7 makes sense t
On Mon, Jul 27, 2015 at 7:20 PM, Andy Lutomirski wrote:
> On Mon, Jul 27, 2015 at 9:18 AM, Boris Ostrovsky
> wrote:
>> On 07/27/2015 11:53 AM, Andy Lutomirski wrote:
>>>
>>> On Mon, Jul 27, 2015 at 8:36 AM, Boris Ostrovsky
>>> wrote:
On 07/25/2015 01:36 AM, Andy Lutomirski wrote:
>
On 07/07/15 11:02, Konrad Rzeszutek Wilk wrote:
diff --git a/xen/include/public/hvm/params.h
b/xen/include/public/hvm/params.h
index 7c73089..130eba9 100644
--- a/xen/include/public/hvm/params.h
+++ b/xen/include/public/hvm/params.h
@@ -50,6 +50,8 @@
#define H
On 07/07/15 11:59, Ian Campbell wrote:
> On Wed, 2015-07-01 at 16:14 -0400, Konrad Rzeszutek Wilk wrote:
>> On Sat, Jun 27, 2015 at 07:27:40PM -0400, Don Slutz wrote:
>>> From: Don Slutz
>>> +In a .ovf it is part of the value of vssd:VirtualSystemType.
>>> +For vssd:VirtualSystemType == vmx-07,
On 07/07/15 11:03, Konrad Rzeszutek Wilk wrote:
diff --git a/xen/arch/x86/hvm/vmware/cpuid.c
b/xen/arch/x86/hvm/vmware/cpuid.c
new file mode 100644
index 000..0dff36b
--- /dev/null
+++ b/xen/arch/x86/hvm/vmware/cpuid.c
@@ -0,0 +1,77 @@
+/*
+ * arch/
On Mon, Jul 27, 2015 at 9:18 AM, Boris Ostrovsky
wrote:
> On 07/27/2015 11:53 AM, Andy Lutomirski wrote:
>>
>> On Mon, Jul 27, 2015 at 8:36 AM, Boris Ostrovsky
>> wrote:
>>>
>>> On 07/25/2015 01:36 AM, Andy Lutomirski wrote:
Here's v3. It fixes the "dazed and confused" issue, I hope.
Hi Razvan,
thanks for open sourcing this project! It's great to see Bitdefender moving
in the OSS direction =) I've pinged the other LibVMI maintainers as well to
take a look. In summary, what do you see as the benefit in libbdvmi over
LibVMI?
Cheers,
Tamas
On Mon, Jul 27, 2015 at 9:25 AM, Razvan
On Mon, Sep 1, 2014 at 10:39 AM, Andy Lutomirski wrote:
> This fixes virtio on Xen guests as well as on any other platform
> that uses virtio_pci on which physical addresses don't match bus
> addresses.
>
> This can be tested with:
>
> virtme-run --xen xen --kimg arch/x86/boot/bzImage --consol
On 2015/7/28 1:45, Wei Liu wrote:
I missed the fact that next_bdf is used to parsed user supplied
strings when reviewing. The user supplied string is a NULL-terminated
string separated by comma. User can supply several PCI devices in that
string. There is, however, no delimiter for different devi
>From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of
>Andrew Cooper
>Sent: Monday, July 27, 2015 4:22 PM
>
>On 27/07/2015 19:09, Wei Liu wrote:
>> On Mon, Jul 27, 2015 at 04:18:15PM +0100, Wei Liu wrote:
>>> Found this when I did "xl destroy" to a hvm guest *without* altp2m
>>> turned
On 27/07/2015 19:09, Wei Liu wrote:
> On Mon, Jul 27, 2015 at 04:18:15PM +0100, Wei Liu wrote:
>> Found this when I did "xl destroy" to a hvm guest *without* altp2m turned
>> on.
>>
>> Current staging branch.
>>
>> (XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:C ]
>> (XEN) CPU:
On 27/07/2015 18:42, Dario Faggioli wrote:
> On Mon, 2015-07-27 at 17:33 +0100, Andrew Cooper wrote: >> On 27/07/15 17:31,
> David Vrabel wrote: >>> Yeah, indeed. That's
the downside of Juergen's "Linux scheduler approach". But the issue
is there, even without taking vNUMA into acco
On 27/07/2015 18:45, Wei Liu wrote:
> I missed the fact that next_bdf is used to parsed user supplied
> strings when reviewing. The user supplied string is a NULL-terminated
> string separated by comma. User can supply several PCI devices in that
> string. There is, however, no delimiter for differ
branch xen-unstable
xen branch xen-unstable
job test-amd64-i386-xl-qemut-debianhvm-amd64
test guest-saverestore
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/s
On Mon, Jul 27, 2015 at 12:04:54PM -0700, Kees Cook wrote:
> On Sat, Jul 25, 2015 at 6:03 AM, Willy Tarreau wrote:
> > On Sat, Jul 25, 2015 at 09:50:52AM +0200, Willy Tarreau wrote:
> >> On Fri, Jul 24, 2015 at 11:44:52PM -0700, Andy Lutomirski wrote:
> >> > I'm all for it, but I think it should b
On Mon, Jul 27, 2015 at 4:55 AM, Andrew Cooper
wrote:
> On 24/07/15 17:52, Doug Goldstein wrote:
>
> shortcuts>
>
> I am currently trying to get Xen to boot on my Lenovo T430 laptop with
> BIOS 2.68 and using master results in no output to the screen and the
> machine being completely hung (must
On 07/27/2015 11:36 AM, Konrad Rzeszutek Wilk wrote:
Hey Jens,
There are three bugs that have been found in the xen-blkfront (and
backend). Two of them have the stable tree CC-ed. They have been found
where an guest is migrating to a host that is missing 'feature-persistent'
support (from one th
On Fri, Jul 24, 2015 at 12:22:57PM -0400, Konrad Rzeszutek Wilk wrote:
> On Mon, Jul 20, 2015 at 04:28:56PM +0200, Daniel Kiper wrote:
> > Signed-off-by: Daniel Kiper
>
> Don't you use it in:
>
> /* Switch to low-memory stack. */
> 193 mov sym_phys(trampoline_phys),%edi
> 194
On Fri, Jul 24, 2015 at 12:47:38PM +0100, David Vrabel wrote:
> The series improves the use of hotplug memory in the Xen balloon
> driver.
>
> - Reliably find a non-conflicting location for the hotplugged memory
> (this fixes memory hotplug in a number of cases, particularly in
> dom0).
>
> - U
On Sat, Jul 25, 2015 at 6:03 AM, Willy Tarreau wrote:
> On Sat, Jul 25, 2015 at 09:50:52AM +0200, Willy Tarreau wrote:
>> On Fri, Jul 24, 2015 at 11:44:52PM -0700, Andy Lutomirski wrote:
>> > I'm all for it, but I think it should be hard-disablable in config,
>> > too, for the -tiny people.
>>
>>
> -Original Message-
> From: dunl...@gmail.com [mailto:dunl...@gmail.com] On Behalf Of George
> Dunlap
> Sent: 20 July 2015 10:53
> To: Xuehan Xu; Felipe Franciosi
> Cc: xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] design philosophy of blktap
>
> On Mon, Jul 20, 2015 at 6:01 AM, Xueh
*TODO*:
- XSM add
- Contributs/authors on xsplice.markdown
- Figure out the preemption method (rfc.v4 target). Talk in Seattle?
- Further work - write out an Wiki detailing what implementation
pieces to be done for individual contributions. Do it before
Seattle?
Signed-off-by: Konrad Rze
Signed-off-by: Konrad Rzeszutek Wilk
---
tools/libxc/xc_private.c | 3 +++
tools/misc/xen-xsplice.c | 25 +
xen/common/kernel.c | 11 +++
xen/common/version.c | 5 +
xen/include/public/version.h | 4
xen/include/xen/compile.h.in
Hey!
Since v3 [http://lists.xen.org/archives/html/xen-devel/2015-07/msg00990.html]
- Nailed down the comments, ingested them in.
- Wrote and tested some code.
RFC v2 [http://lists.xen.org/archives/html/xen-devel/2015-05/msg02142.html]
- Ingested every review comment in.
The patches for the co
On Mon, Jul 27, 2015 at 04:18:15PM +0100, Wei Liu wrote:
> Found this when I did "xl destroy" to a hvm guest *without* altp2m turned
> on.
>
> Current staging branch.
>
> (XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:C ]
> (XEN) CPU:0
> (XEN) RIP:e008:[] vmx_vmenter_helpe
. snip..
> So, it looks to me that:
> 1) any application using CPUID for either licensing or
> placement/performance optimization will get (potentially) random
> results;
Right, that is a bug that Andrew outlined in this leveling document I
believe. We just pluck the cpuid results on wha
Document how cpupool_info works. Distinguish success (ERROR_FAIL +
ENOENT) vs failure in libxl_list_cpupool and properly clean up the array
in failure path.
Also switch to libxl__realloc and call libxl_cpupool_{init,dispose}
where appropriate.
There is change of behaviour. Previously if memory a
Signed-off-by: Wei Liu
---
tools/libxl/xl_cmdimpl.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index 77cf603..70ed675 100644
--- a/tools/libxl/xl_cmdimpl.c
+++ b/tools/libxl/xl_cmdimpl.c
@@ -7685,6 +7685,8 @@ int main_cpupoolnu
I missed the fact that next_bdf is used to parsed user supplied
strings when reviewing. The user supplied string is a NULL-terminated
string separated by comma. User can supply several PCI devices in that
string. There is, however, no delimiter for different devices, hence
we can't change the synta
Signed-off-by: Wei Liu
---
tools/libxl/libxlu_pci.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/libxl/libxlu_pci.c b/tools/libxl/libxlu_pci.c
index 026413b..16ddaf7 100644
--- a/tools/libxl/libxlu_pci.c
+++ b/tools/libxl/libxlu_pci.c
@@ -178,6 +178,7 @@ int xlu_pci_parse_bdf(XLU_C
Initialise polFd to -1 before hand to avoid closing 0 by accident.
Also fixed some style problems while I was there.
Signed-off-by: Wei Liu
---
tools/libxl/xl_cmdimpl.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.
Always call init and dispose function on info_buf though it's not
always used.
Signed-off-by: Wei Liu
---
tools/libxl/xl_cmdimpl.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index d0bf0cb..63f80de 100644
--- a/too
Signed-off-by: Wei Liu
---
tools/libxl/xl.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/xl.c b/tools/libxl/xl.c
index f014306..5316ad9 100644
--- a/tools/libxl/xl.c
+++ b/tools/libxl/xl.c
@@ -118,7 +118,7 @@ static void parse_global_config(const char *configfil
Wei Liu (8):
libxl: properly clean up array in libxl_list_cpupool failure path
xl: lockdir should be lockfile in error message
xl: call libxl_dominfo_init in main_list
xl: valid fd can be 0 in main_loadpolicy
xl: call libxl_dominfo_{init,dispose} in main_cpupoolnumasplit
libxlu: free bu
There is no user in tree.
Signed-off-by: Wei Liu
---
tools/libxl/libxl_dom.c | 17 -
tools/libxl/libxl_internal.h | 1 -
2 files changed, 18 deletions(-)
diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
index b3ae5b5..fea 100644
--- a/tools/libxl/libxl_do
On Mon, 2015-07-27 at 17:33 +0100, Andrew Cooper wrote:
> On 27/07/15 17:31, David Vrabel wrote:
> >
> >> Yeah, indeed. That's the downside of Juergen's "Linux scheduler
> >> approach". But the issue is there, even without taking vNUMA into
> >> account, and I think something like that would really
Hey Jens,
There are three bugs that have been found in the xen-blkfront (and
backend). Two of them have the stable tree CC-ed. They have been found
where an guest is migrating to a host that is missing 'feature-persistent'
support (from one that has it enabled). We end up hitting an BUG() in the
d
Avoid stacking of check_all_finished() via synchronous teardown of
tasks. If the _abort() functions call back synchronously,
stream->completion_callback() ends up getting called twice, as first
and last check_all_finished() frames observe each task being finished.
Signed-off-by: Andrew Cooper
--
Only ever set stream->rc in check_all_finished(). The first version of
the migration v2 series had separate rc and joined_rc parameters, where
this logic worked. However when combining the two, the teardown path
fails to trigger if stream_complete() records stream->rc itself. A side
effect of th
Part of the callback contract with check_all_finished() is that each
running parallel task shall call it exactly once.
Previously, it was possible for stream_continue() or
write_toolstack_record() to fail and call into check_all_finished(). As
the save helpers callback has fired, it no longer cou
Split the original patch into 3 distinct fixes.
Andrew Cooper (3):
tools/libxl: Do not set stream->rc in stream_complete()
tools/libxl: Do not fire the stream callback multiple times
tools/libxl: Only continue stream operations if the stream is still
in progress
tools/libxl/libxl_inter
On 27/07/15 17:31, David Vrabel wrote:
>
>>> 2. For HVM guests, use the existing hardware interfaces to present NUMA
>>> topology. i.e., CPUID, ACPI tables etc. This will work for both kernel
>>> and userspace and both will see the same topology.
>>>
>>> This also has the advantage that any hyper
On 27/07/15 17:02, Dario Faggioli wrote:
> On Mon, 2015-07-27 at 16:13 +0100, David Vrabel wrote:
>> On 16/07/15 11:32, Dario Faggioli wrote:
>>>
>>> Anyway, is there anything we can do to fix or workaround things?
>>
>> This thread has gotten a bit long...
>>
> Yep, indeed... :-(
>
>> For Linux I
flight 59960 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59960/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl 13 guest-saverestore fail REGR. vs. 59393
Tests which are failing
On 07/27/2015 11:53 AM, Andy Lutomirski wrote:
On Mon, Jul 27, 2015 at 8:36 AM, Boris Ostrovsky
wrote:
On 07/25/2015 01:36 AM, Andy Lutomirski wrote:
Here's v3. It fixes the "dazed and confused" issue, I hope. It's also
probably a good general attack surface reduction, and it replaces some
s
On Fri, 2015-07-10 at 23:52 -0500, Chong Li wrote:
> diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h
> index d1d2ab3..58f1a7a 100644
> --- a/tools/libxc/include/xenctrl.h
> +++ b/tools/libxc/include/xenctrl.h
> @@ -915,6 +915,15 @@ int xc_sched_rtds_domain_get(xc_interfa
On Mon, 2015-07-27 at 16:13 +0100, David Vrabel wrote:
> On 16/07/15 11:32, Dario Faggioli wrote:
> >
> > Anyway, is there anything we can do to fix or workaround things?
>
> This thread has gotten a bit long...
>
Yep, indeed... :-(
> For Linux I would like to see:
>
> 1. No support for NUMA i
On Mon, Jul 27, 2015 at 8:36 AM, Boris Ostrovsky
wrote:
> On 07/25/2015 01:36 AM, Andy Lutomirski wrote:
>>
>> Here's v3. It fixes the "dazed and confused" issue, I hope. It's also
>> probably a good general attack surface reduction, and it replaces some
>> scary code with IMO less scary code.
>
This tests general modify_ldt behavior (only writes, so far) as
well as synchronous updates via IPI. It fails on old kernels.
I called this ldt_gdt because I'll add set_thread_area tests to
it at some point.
Signed-off-by: Andy Lutomirski
---
Oops. This is what I meant to send as v4. Patches
On Fri, 2015-07-10 at 23:52 -0500, Chong Li wrote:
> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
> to independently get and set the scheduling parameters of each
> vCPU of a domain
>
I'd add a note about the fact that, for now, this is only supported and
being implemented for RT
On 07/25/2015 01:36 AM, Andy Lutomirski wrote:
Here's v3. It fixes the "dazed and confused" issue, I hope. It's also
probably a good general attack surface reduction, and it replaces some
scary code with IMO less scary code.
Also, servers and embedded systems should probably turn off modify_ld
Hello all,
I'm very happy to announce that the library we've created to help us
perform virtual machine introspection is now on GitHub, under the LGPLv3
license, here:
https://github.com/razvan-cojocaru/libbdvmi
We hope that the community will find it useful, and welcome discussion
(the LibVMI a
Found this when I did "xl destroy" to a hvm guest *without* altp2m turned
on.
Current staging branch.
(XEN) [ Xen-4.6-unstable x86_64 debug=y Tainted:C ]
(XEN) CPU:0
(XEN) RIP:e008:[] vmx_vmenter_helper+0x263/0x2f3
(XEN) RFLAGS: 00010242 CONTEXT: hypervisor (d0v0)
On Fri, 2015-07-10 at 23:52 -0500, Chong Li wrote:
> Using "xl sched-rtds" will output the default scheduling parameters
> for each domain. An example would be like:
>
> # xl sched-rtds
> Cpupool Pool-0: sched=RTDS
> NameIDPeriodBudget
> Domain-0
On Mon, 2015-07-27 at 14:29 +0100, Wei Liu wrote:
> On Mon, Jul 27, 2015 at 02:44:57PM +0200, Martin Lucina wrote:
> > On Friday, 24.07.2015 at 17:01, Ian Jackson wrote:
> > > Martin Lucina writes ("[PATCH v3] xenconsole: Ensure exclusive access
> > > to console using locks"):
> > > > If more than
On 16/07/15 11:32, Dario Faggioli wrote:
>
> Anyway, is there anything we can do to fix or workaround things?
This thread has gotten a bit long...
For Linux I would like to see:
1. No support for NUMA in PV guests -- if you want new MM features in a
guest use HVM.
2. For HVM guests, use the ex
On 07/27/2015 04:51 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:43 AM, Juergen Gross wrote:
On 07/27/2015 04:34 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, j
flight 60005 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60005/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 5 xen-build fail REGR. vs. 59254
build-i386
On Mon, 2015-07-27 at 10:34 -0400, Boris Ostrovsky wrote:
> On 07/27/2015 10:09 AM, Dario Faggioli wrote:
> > Of course, it's not that my opinion on where should be in Linux counts
> > that much! :-D Nevertheless, I wanted to make it clear that, while
> > skeptic at the beginning, I now think th
On 07/27/2015 10:43 AM, Juergen Gross wrote:
On 07/27/2015 04:34 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you
On 07/27/2015 04:34 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you'd like to add an
abstraction layer, in Linux
Monday, July 27, 2015, 4:07:39 PM, you wrote:
> On 24/07/15 19:56, li...@eikelenboom.it wrote:
>> Hi All,
>>
>> On my AMD system running xen-unstable (last commit: ),
>> after a few restarts of a HVM guest with pci-passthrough i got these
>> on shutdown of the guest:
>> (never seen this before,
On 07/27/2015 04:34 PM, Boris Ostrovsky wrote:
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you'd like to add an
abstraction layer, in Linux
I forgot to mention: you need to use --enable-ovmf in ./configure to
enable OVMF support.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 07/27/2015 10:09 AM, Dario Faggioli wrote:
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
On 07/24/2015 05:58 PM, Dario Faggioli wrote:
So, just to check if I'm understanding is correct: you'd like to add an
abstraction layer, in Linux, like in generic (or, perhaps, scheduling)
code
On 24/07/15 12:41, Ian Jackson wrote:
> Andrew Cooper writes ("[PATCH] tools/libxl: Fixes to stream v2 task joining
> logic"):
>> During review of the libxl migration v2 series, I changes the task
>> joining logic, but clearly didn't think the result through
>> properly. This patch fixes several e
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 27 July 2015 15:08
> To: li...@eikelenboom.it; xen-devel@lists.xen.org
> Cc: Paul Durrant
> Subject: Re: [Xen-devel] xen-unstabel + linux 4.2: MMIO emulation failed:
> d23v0 64bit @ 0010:814e2b1c -
On Sat, 2015-07-25 at 18:04 +0530, Abhinav Gupta wrote:
> Hii everyone :) ,
>
Hi,
>I'm quite familiar with the linux powerclamp driver now.
>
Nice to hear. Is there anything about that you think it would be
useful/interesting about to share here?
>
> I have also started looking into xen's
flight 60006 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60006/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build fail REGR. vs. 59907
build-amd64-pvops
On 24/07/15 19:56, li...@eikelenboom.it wrote:
> Hi All,
>
> On my AMD system running xen-unstable (last commit: ),
> after a few restarts of a HVM guest with pci-passthrough i got these
> on shutdown of the guest:
> (never seen this before, so it should be something triggered by a
> recent commit
On Fri, 2015-07-24 at 18:10 +0200, Juergen Gross wrote:
> On 07/24/2015 05:58 PM, Dario Faggioli wrote:
> > So, just to check if I'm understanding is correct: you'd like to add an
> > abstraction layer, in Linux, like in generic (or, perhaps, scheduling)
> > code, to hide the direct interaction wi
On Mon, 2015-07-27 at 12:11 +0100, George Dunlap wrote:
> 1. Userspace applications are in the habit of reading CPUID to determine
> the topology of the system they're running on
>
I'd add this item here:
1b. Linux kernel uses CPUID to configure some bits of its scheduler. The
result of that
On 07/27/2015 03:23 PM, Dario Faggioli wrote:
On Mon, 2015-07-27 at 14:01 +0200, Juergen Gross wrote:
On 07/27/2015 01:11 PM, George Dunlap wrote:
Or alternately, if the user wants to give up on the "consolidation"
aspect of virtualization, they can pin vcpus to pcpus and then pass in
the act
In ea214001 ("x86/altp2m: add altp2mhvm HVM domain parameter"), a
check was added to ensure nestedhvm and altp2m cannot be enabled at
the same time. That check was added in xl, but in fact it should be in
libxl because it should be the entity that decides whether
the provided configuration is valid
On 27/07/15 00:27, Andy Lutomirski wrote:
>
> For SYSRET, I think the way to go is to force Xen to always use the
> syscall slow path. Instead, Xen could hook into
> syscall_return_via_sysret or even right before the opportunistic
> sysret stuff. Then we could remove the USERGS_SY
I found this in OSSTest
http://logs.test-lab.xenproject.org/osstest/logs/59910/test-amd64-amd64-xl-qemuu-ovmf-amd64/serial-fiano1.log
Jul 25 17:48:51.468985 (d1) HVM Loader
Jul 25 17:48:51.517028 (d1) Detected Xen v4.6-unstable
Jul 25 17:48:51.517056 (d1) Xenbus rings @0xfeffc000, event channel 1
On Fri, 2015-07-24 at 13:11 -0400, Boris Ostrovsky wrote:
> On 07/24/2015 12:48 PM, Juergen Gross wrote:
> > On 07/24/2015 06:40 PM, Boris Ostrovsky wrote:
> >> On 07/24/2015 12:10 PM, Juergen Gross wrote:
> >>>
> >>> If we can fiddle with the masks on boot, we could do it in a running
> >>> system
On Mon, Jul 27, 2015 at 02:29:14PM +0800, Xuehan Xu wrote:
> Hi, everyone.
>
> Is there any way to run a stub domain on linux not mini-os?
>
> Thanks:-)
Use your favourite mailing list archive to search for message-id
<1423022775-7132-1-git-send-email-eshel...@pobox.com>
Wei.
> __
flight 59995 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59995/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 11 guest-saverestore fail REGR. vs. 59964
version targeted for testing
On Mon, Jul 27, 2015 at 02:44:57PM +0200, Martin Lucina wrote:
> On Friday, 24.07.2015 at 17:01, Ian Jackson wrote:
> > Martin Lucina writes ("[PATCH v3] xenconsole: Ensure exclusive access to
> > console using locks"):
> > > If more than one instance of xenconsole is run against the same DOMID
>
On Mon, Jul 27, 2015 at 01:34:04PM +0100, Julien Grall wrote:
> Hi Wei,
>
> On 24/07/15 16:39, Wei Liu wrote:
> > In ea214001 ("x86/altp2m: add altp2mhvm HVM domain parameter"), a
> > check was added to ensure nestedhvm and altp2m cannot be enabled at
> > the same time. That check was added in xl,
On Mon, 2015-07-27 at 14:01 +0200, Juergen Gross wrote:
> On 07/27/2015 01:11 PM, George Dunlap wrote:
> > Or alternately, if the user wants to give up on the "consolidation"
> > aspect of virtualization, they can pin vcpus to pcpus and then pass in
> > the actual host topology (hyperthreads and a
Il 23/07/2015 19:08, Stefano Stabellini ha scritto:
Try to use "xen-qemudepriv-domid$domid" first, then
"xen-qemudepriv-shared" and root if everything else fails.
The uids need to be manually created by the user or, more likely, by the
xen package maintainer.
Expose a device_model_user setting
1 - 100 of 173 matches
Mail list logo