flight 60602 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60602/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 3 host-install(3) broken REGR. vs. 60389
R
From: Ross Lagerwall
Date: Tue, 4 Aug 2015 15:40:59 +0100
> Waking the dealloc thread before decrementing inflight_packets is racy
> because it means the thread may go to sleep before inflight_packets is
> decremented. If kthread_stop() has already been called, the dealloc
> thread may wait forev
flight 60597 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60597/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-buildfail in 60395 REGR. vs. 59963
Tests which are f
>>> On 8/7/2015 at 01:21 AM, in message <55c39796.8000...@citrix.com>, George
Dunlap wrote:
> On 08/06/2015 04:11 AM, Chun Yan Liu wrote:
> > As 4.6 goes to bug fixing stage, maybe we can pick up this thread? :-)
> >
> > Beside to call for your precious review comments and suggestions so th
This document is going to explain the design details of Xen booting with
ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are
welcome.
To Xen itself booting with ACPI, this is similar to Linux kernel except
that Xen doesn't parse DSDT table. So I'll skip this part and focus on
h
Or how can I get the address of hypercall page belonging to a running domU?
2015-08-07 9:45 GMT+08:00 big strong :
> I want to locate the hypercall page address when creating a new domU, so
> as to locate hypercalls. Is it possible?
>
> 2015-08-06 17:49 GMT+08:00 Andrew Cooper :
>
>> On 06/08/15
I want to locate the hypercall page address when creating a new domU, so as
to locate hypercalls. Is it possible?
2015-08-06 17:49 GMT+08:00 Andrew Cooper :
> On 06/08/15 10:46, big strong wrote:
>
> The old version of Xen contains information about hypercall page like:
>
> xl dmesg
> ..
> (X
flight 60594 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60594/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl 13 guest-saverestore fail REGR. vs. 59254
test-amd64-i386-xl-xs
On Mon, Jul 20, 2015 at 01:03:52PM +0300, Dan Carpenter wrote:
> Hello Konrad Rzeszutek Wilk,
>
> The patch 7f9140626c75: "xen/mmu: Copy and revector the P2M tree."
> from Jul 26, 2012, leads to the following static checker warning:
>
> arch/x86/xen/mmu.c:1105 xen_cleanhighmap()
> war
On Thu, 2015-08-06 at 12:53 -0700, Luis R. Rodriguez wrote:
> On Fri, Jun 12, 2015 at 9:58 AM, Toshi Kani wrote:
> > On Fri, 2015-06-12 at 08:59 +0100, Jan Beulich wrote:
> > > > > > On 12.06.15 at 01:23, wrote:
> > > > There are two usages on MTRRs:
> > > > 1) MTRR entries set by firmware
> > >
On Wed, Jul 22, 2015 at 08:43:48AM -0500, Bjorn Helgaas wrote:
> Hi Ingo,
>
> On Wed, Jul 22, 2015 at 10:38:45AM +0200, Ingo Molnar wrote:
> >
> > * Bjorn Helgaas wrote:
> >
> > > > > > Let me know if these are OK or if there are any questions.
> > > > > >
> > > > > > [0] http://lkml.kernel.or
On 06/08/2015 17:45, Ben Catterall wrote:
> Added trap handlers to catch exceptions such as a page fault, general
> protection fault, etc. These handlers will crash the domain as such exceptions
> would indicate that either there is a bug in deprivileged mode or it has been
> compromised by an atta
On 06/08/15 17:45, Ben Catterall wrote:
> The process to switch into and out of deprivileged mode can be likened to
> setjmp/longjmp.
>
> To enter deprivileged mode, we take a copy of the stack from the guest's
> registers up to the current stack pointer. This allows us to restore the stack
> when
On Thu, Aug 6, 2015 at 12:53 PM, Luis R. Rodriguez
wrote:
> For those type of OSes...
> could it be possible to negotiate or hint to the platform through an
> attribute somehow that the OS has such capability to not use MTRR?
And if that's not possible how about a new platform setting that would
Hi Ross,
On my dom0 with a linux 4.2-rc5 kernel i encoutered the splat below.
It's probably related to your patch that went in just for 4.2-rc5:
"xen/events/fifo: Handle linked events when closing a port"
--
Sander
[ 49.020173] [ cut here ]
[ 49.020187] WARNING: CPU:
On Fri, Jun 12, 2015 at 9:58 AM, Toshi Kani wrote:
> On Fri, 2015-06-12 at 08:59 +0100, Jan Beulich wrote:
>> >>> On 12.06.15 at 01:23, wrote:
>> > There are two usages on MTRRs:
>> > 1) MTRR entries set by firmware
>> > 2) MTRR entries set by OS drivers
>> >
>> > We can obsolete 2), but we hav
On 06/08/15 17:45, Ben Catterall wrote:
> The paging structure mappings for the deprivileged mode are added
> to the monitor page table for HVM guests. The entries are generated by
> walking the page tables and mapping in new pages. If a higher-level page table
> mapping exists, we attempt to trave
On 06/08/15 17:45, Ben Catterall wrote:
> This allocation function is used by the deprivileged mode initialisation code
> to allocate pages for the new page table mappings and page frames on the HAP
> page heap.
>
> Signed-off-by: Ben Catterall
This is fine for your test box, but isn't fine for s
flight 60584 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60584/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are failing
setup_frametable_mappings() rounds frametable_size up to a multiple
of 32MB. This is wasteful on systems with less than 4GB of RAM,
although it does allow the "contig" bit to be set in the PTEs.
Where the frametable is less than 32MB in size, instead round up
to a multiple of 2MB, not setting the
On 08/06/2015 01:04 PM, Robert Richter wrote:
Boris,
we are working on acpi pci support for arm64. For this we are enabling
PCI_MMCONFIG on arm64 which breaks compiling drivers/xen/pci.c.
Looking into it there is x86 code in generic driver code introduced
with:
8deb3eb1461e xen/mcfg: Call PH
On 08/06/2015 04:11 AM, Chun Yan Liu wrote:
> As 4.6 goes to bug fixing stage, maybe we can pick up this thread? :-)
>
> Beside to call for your precious review comments and suggestions so that we
> can
> make progress, I also want to confirm about the previous discussed two TODO
> things:
> 1) u
OpenStack Tempest is using aes-xts-plain64 cipher with cryptsetup to test
encrypted volumes and this is not configurable.
Signed-off-by: Anthony PERARD
---
ts-kernel-build | 3 +++
1 file changed, 3 insertions(+)
diff --git a/ts-kernel-build b/ts-kernel-build
index d5defaa..a16527b 100755
--- a
This script also install packages needed and clone every OpenStack trees to
be use by devstack to deploy OpenStack.
Signed-off-by: Anthony PERARD
---
sg-run-job| 5 +
ts-openstack-devstack | 304 ++
2 files changed, 309 insertions(+)
Hi,
I have looked into getting OpenStack been tested on the latest Xen via
osstest. There is an adjustement in common code to accomodate OpenStack,
this is a few extra Linux config option.
The ts-openstack-devstack script does prepare a bit more the host, clone
devstack and other OpenStack trees,
This iptables target CHECKSUM is used by OpenStack.
Signed-off-by: Anthony PERARD
Acked-by: Ian Campbell
---
ts-kernel-build | 5 +
1 file changed, 5 insertions(+)
diff --git a/ts-kernel-build b/ts-kernel-build
index 28bead4..d5defaa 100755
--- a/ts-kernel-build
+++ b/ts-kernel-build
@@ -2
Signed-off-by: Anthony PERARD
---
sg-run-job | 1 +
ts-openstack-tempest | 35 +++
2 files changed, 36 insertions(+)
create mode 100755 ts-openstack-tempest
diff --git a/sg-run-job b/sg-run-job
index 5320d62..0b2184b 100755
--- a/sg-run-job
+++ b/sg-ru
Signed-off-by: Anthony PERARD
---
ts-xen-install | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/ts-xen-install b/ts-xen-install
index 0f53382..17edfb7 100755
--- a/ts-xen-install
+++ b/ts-xen-install
@@ -153,7 +153,8 @@ sub setupboot () {
logm("No Xen console device
Signed-off-by: Anthony PERARD
---
ap-common| 9 +
ap-fetch-version | 4
ap-fetch-version-old | 5 +
ap-print-url | 3 +++
cri-common | 1 +
make-flight | 42 +-
mfi-common | 5 +
Added trap handlers to catch exceptions such as a page fault, general
protection fault, etc. These handlers will crash the domain as such exceptions
would indicate that either there is a bug in deprivileged mode or it has been
compromised by an attacker.
Signed-off-by: Ben Catterall
---
xen/arch
Hi all,
I have a working base for this and would appreciate feedback at this point to
evaluate if it is moving in the right direction.
Many thanks in advance,
Ben
The aim of this work is to create a proof-of-concept to establish if it is
feasible to move certain Xen operations into a deprivilege
The process to switch into and out of deprivileged mode can be likened to
setjmp/longjmp.
To enter deprivileged mode, we take a copy of the stack from the guest's
registers up to the current stack pointer. This allows us to restore the stack
when we have finished the deprivileged mode operation, m
This allocation function is used by the deprivileged mode initialisation code
to allocate pages for the new page table mappings and page frames on the HAP
page heap.
Signed-off-by: Ben Catterall
---
xen/arch/x86/mm/hap/hap.c| 23 +++
xen/include/asm-x86/domain.h | 1 +
x
The paging structure mappings for the deprivileged mode are added
to the monitor page table for HVM guests. The entries are generated by
walking the page tables and mapping in new pages. If a higher-level page table
mapping exists, we attempt to traverse all the way down to a leaf page and add
the
It turns out that domU also requires the Xen APIC driver. Otherwise we
get stuck in busy loops that never exit, such as in this stack trace:
(gdb) target remote localhost:
Remote debugging using localhost:
__xapic_wait_icr_idle () at ./arch/x86/include/asm/ipi.h:56
56 while (n
It turns out that domU also requires the Xen APIC driver. Otherwise we
get stuck in busy loops that never exit, such as in this stack trace:
(gdb) target remote localhost:
Remote debugging using localhost:
__xapic_wait_icr_idle () at ./arch/x86/include/asm/ipi.h:56
56 while (n
On Tue, Aug 4, 2015 at 5:29 PM, Julien Grall wrote:
> Based on 8.1.3 (IHI 0069A), unless stated otherwise, the 64-bit registers
> supports both 32-bit and 64-bits access.
>
> All the registers we properly emulate (i.e not RAZ/WI) supports 32-bit access.
>
> For RAZ/WI, it's also seems to be the ca
flight 60583 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60583/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 59059
Regressions which
In that case, it doesn't compile.
arch/x86/xen/apic.c:204:13: error: redefinition of ‘xen_init_apic’
void __init xen_init_apic(void)
^
In file included from arch/x86/xen/apic.c:9:0:
arch/x86/xen/xen-ops.h:110:27: note: previous definition of
‘xen_init_apic’ was here
static inline vo
On Thu, 2015-08-06 at 14:50 +0100, Ian Campbell wrote:
> On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
> > Use the correct API sd_listen_fds to determine whether the process is
> > started by systemd.
> >
> > Change sd_booted to booted_by_systemd to avoid confusion with systemd's
> > API.
>
>
On 06/08/15 16:58, Jason A. Donenfeld wrote:
> On Thu, Aug 6, 2015 at 12:02 PM, David Vrabel wrote:
>> Linux PV guests must use the "Xen PV" APIC driver. You need to
>> investigate why your PV guest is not using this (although I'm surprised
>> it works at all with the wrong one).
>
> Actually it
Although I’m not familiar with systemd, this also looks fine:
Acked-by: David Scott
> On 6 Aug 2015, at 14:38, Wei Liu wrote:
>
> Oxenstored only needs to notify systemd its readiness state once. Move
> sd_notify_ready out of main loop.
>
> Signed-off-by: Wei Liu
> ---
> Cc: Dave Scott
>
On Thu, Aug 6, 2015 at 12:02 PM, David Vrabel wrote:
> Linux PV guests must use the "Xen PV" APIC driver. You need to
> investigate why your PV guest is not using this (although I'm surprised
> it works at all with the wrong one).
Actually it appears this PV Guest is using the "flat" APIC driver
I’m not familiar with the systemd side of things, but the OCaml stub changes
look ok:
Acked-by: David Scott
> On 6 Aug 2015, at 14:38, Wei Liu wrote:
>
> Use the correct API sd_listen_fds to determine whether the process is
> started by systemd.
>
> Change sd_booted to booted_by_systemd to
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
Acked-by: Ian Campbell
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi David,
On 24/07/15 11:36, David Vrabel wrote:
> On 09/07/15 21:42, Julien Grall wrote:
>> Only use the first 4KB of the page to store the events channel info. It
>> means that we will wast 60KB every time we allocate page for:
>> * control block: a page is allocating per CPU
>> * even
flight 60587 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60587/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 8ca1489ba63753f3dfd6552fd7a2c1f4f64e296a
baseline version:
ovmf 7669f7349829f0e472ba0d6e600492f
Queued for nightly.
Note though that I don't have anything even close to 512GB in the test farm.
-Original Message-
From: David Vrabel [david.vra...@citrix.com]
Received: Thursday, 06 Aug 2015, 9:59AM
To: Juergen Gross [jgr...@suse.com]; linux-ker...@vger.kernel.org
[linux-ker...@vger.
On Thu, 6 Aug 2015, Julien Grall wrote:
> On 06/08/15 12:06, Stefano Stabellini wrote:
> > On Thu, 6 Aug 2015, Julien Grall wrote:
> >> Hi,
> >>
> >>
> >> On 04/08/15 19:12, Julien Grall wrote:
> >>> diff --git a/include/xen/page.h b/include/xen/page.h
> >>> index c5ed20b..e7e1425 100644
> >>> ---
flight 37793 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/37793/
Failures :-/ but no regressions.
Tests which did not succeed,
including tests which could not be run:
test-armhf-armhf-armhf-jessie-netboot-pygrub 9 debian-di-install fail never
pass
job
On 17/07/15 05:51, Juergen Gross wrote:
> Support 64 bit pv-domains with more than 512GB of memory.
Applied to for-linus-4.3, thanks.
Boris, can we get a test run with this branch, please?
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http:
On 08/05/2015 07:19 PM, Wei Liu wrote:
> On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote:
> [...]
>>>
>>
>> Right. I misinterpreted sd_boot.
>>
>> You patch, however, has the undesirable effect that it fails to report
>> error if xenstored is started by systemd but couldn't claim the
>> soc
On Thu, Aug 06, 2015 at 02:49:28PM +0100, Ian Campbell wrote:
> On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > For 4.6: remove dead code, risk free.
>
> I'm pretty sure this isn't actually dead:
>
> The 'm' option is handled by option parsing, setting th
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
> Use the correct API sd_listen_fds to determine whether the process is
> started by systemd.
>
> Change sd_booted to booted_by_systemd to avoid confusion with systemd's
> API.
launched_by_systemd seems like a more conventional name for this.One
d
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> For 4.6: remove dead code, risk free.
I'm pretty sure this isn't actually dead:
The 'm' option is handled by option parsing, setting the dom0_domid global.
xenbus_master_domid() returns dom0_domid and that is cal
Signed-off-by: Wei Liu
---
For 4.6: remove dead code, risk free.
---
tools/xenstore/xenstored_core.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c
index 72f531b..100f59e 100644
--- a/tools/xenstore/xenstored_core.c
+++ b/tools
Oxenstored only needs to notify systemd its readiness state once. Move
sd_notify_ready out of main loop.
Signed-off-by: Wei Liu
---
Cc: Dave Scott
For 4.6: avoid wasting CPU cycles, easy to reason its correctness.
There is a small risk that either I wrote the wrong code or I
misunderstand the
Use the correct API sd_listen_fds to determine whether the process is
started by systemd.
Change sd_booted to booted_by_systemd to avoid confusion with systemd's
API.
Signed-off-by: Wei Liu
---
Cc: Dave Scott
For 4.6: without this oxenstored is broken when running on a system with
systemd but
Wei Liu (5):
cxenstored: fix systemd socket activation
cxenstored: document a bunch of short options in help string
cxenstored: remove dead option
oxenstored: fix systemd socket activation
oxenstored: move sd_notify_ready out of main loop
tools/ocaml/xenstored/systemd.ml | 2 +-
t
There were two problems with original code:
1. sd_booted() was used to determined if the process was started by
systemd, which was wrong.
2. Exit with error if pidfile was specified, which was too harsh.
These two combined made cxenstored unable to start by hand if it ran
on a system which had
Signed-off-by: Wei Liu
---
For 4.6: pure doc changes, risk free.
---
tools/xenstore/xenstored_core.c | 30 +++---
1 file changed, 15 insertions(+), 15 deletions(-)
diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c
index 57581e0..72f531b 100644
> -Original Message-
> From: Stefano Stabellini [mailto:stefano.stabell...@eu.citrix.com]
> Sent: Thursday, August 06, 2015 6:43 PM
> To: Wu, Feng
> Cc: stefano.stabell...@eu.citrix.com; xen-de...@lists.xensource.com;
> qemu-de...@nongnu.org
> Subject: Re: [PATCH v1] xenpt: Properly handl
On 08/06/2015 03:02 PM, Juergen Gross wrote:
On 08/06/2015 02:46 PM, Vlastimil Babka wrote:
On 07/17/2015 06:51 AM, Juergen Gross wrote:
... and here for !CONFIG_MMU.
So, what about CONFIG_MMU && !FIXMAP_PAGE_RO combinations? Which
translates to CONFIG_MMU && !PAGE_KERNEL_RO. Maybe they don't
On 08/06/2015 02:46 PM, Vlastimil Babka wrote:
On 07/17/2015 06:51 AM, Juergen Gross wrote:
During early boot as Xen pv domain the kernel needs to map some page
tables supplied by the hypervisor read only. This is needed to be
able to relocate some data structures conflicting with the physical
m
On Thu, 2015-08-06 at 12:10 +0100, Wei Liu wrote:
> On Thu, Aug 06, 2015 at 11:55:57AM +0100, Ian Campbell wrote:
> > We need to use libxl__domain_build_state.pv_cmdline in order to pickup
> > the correct args when using pygrub. libxl_domain_build_info.cmdline is
> > any args statically configured
On 07/17/2015 06:51 AM, Juergen Gross wrote:
During early boot as Xen pv domain the kernel needs to map some page
tables supplied by the hypervisor read only. This is needed to be
able to relocate some data structures conflicting with the physical
memory map especially on systems with huge RAM (a
This is the pygrub debug log.
Signed-off-by: Ian Campbell
---
ts-logs-capture | 1 +
1 file changed, 1 insertion(+)
diff --git a/ts-logs-capture b/ts-logs-capture
index 0081372..b99b1db 100755
--- a/ts-logs-capture
+++ b/ts-logs-capture
@@ -143,6 +143,7 @@ sub fetch_logs_host () {
The armhf tests in distros-debian-* have always failed since they did not
shutdown at the end of installation. I've now investigated that and the fix
is patch #2 in this series.
The remainder of the series consists of various fixes, extensions to
existing quirks and workarounds, mainly to the use
always_halt results in d-i calling "halt", which does not necessarily
poweroff the host (it seems to for x86/PV Xen guests, but does not for
ARM). Using exit/poweroff calls "poweroff" which is equivalent to
"halt -p", doing so results in ARM guests powering off as desired.
Signed-off-by: Ian Campb
Signed-off-by: Ian Campbell
---
ts-debian-di-install | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/ts-debian-di-install b/ts-debian-di-install
index 612e0fa..0e778e3 100755
--- a/ts-debian-di-install
+++ b/ts-debian-di-install
@@ -190,9 +190,18 @@ END
$
Realistically this isn't going to change until we have either u-boot
or UEFI in an arm32 guest.
Signed-off-by: Ian Campbell
---
Osstest/Debian.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index ff7975e..7a0ead4 100644
--- a/Osstest/
Signed-off-by: Ian Campbell
---
Osstest/Debian.pm | 8
1 file changed, 8 insertions(+)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 7a0ead4..07a71e2 100644
--- a/Osstest/Debian.pm
+++ b/Osstest/Debian.pm
@@ -923,7 +923,15 @@ END
# that as a "bootloader".
$pre
This is more useful in standalone mode than having everything be
"debian".
Signed-off-by: Ian Campbell
---
ts-debian-di-install | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-debian-di-install b/ts-debian-di-install
index 0e778e3..95a9215 100755
--- a/ts-debian-di-install
This workaround is only necessary because of how pv-menu-list works,
so we should only apply both or neither of them.
This results in a long line and I'm about to add a second workaround
to this block, so switch to a regular if block instead of postfixing
on the one command. Move the comment insid
On Wed, Aug 05, 2015 at 10:22:13AM +0100, Lars Kurth wrote:
> This is one item of feedback, which I believe is a quick win for us.
> This is one piece of feedback from a list of items that have during
> the last few weeks been raised with me personally, either during
> face-2-face conversations in
On 06/08/15 12:06, Stefano Stabellini wrote:
> On Thu, 6 Aug 2015, Julien Grall wrote:
>> Hi,
>>
>>
>> On 04/08/15 19:12, Julien Grall wrote:
>>> diff --git a/include/xen/page.h b/include/xen/page.h
>>> index c5ed20b..e7e1425 100644
>>> --- a/include/xen/page.h
>>> +++ b/include/xen/page.h
>>> @@ -
On Thu, Aug 06, 2015 at 11:55:57AM +0100, Ian Campbell wrote:
> We need to use libxl__domain_build_state.pv_cmdline in order to pickup
> the correct args when using pygrub. libxl_domain_build_info.cmdline is
> any args statically configured by the user.
>
> This is consistent with the call to xc_d
flight 60577 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60577/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 15 guest-start/debian.repeat fail REGR. vs. 60214
test-armhf-armhf
On Thu, 6 Aug 2015, Julien Grall wrote:
> Hi,
>
>
> On 04/08/15 19:12, Julien Grall wrote:
> > diff --git a/include/xen/page.h b/include/xen/page.h
> > index c5ed20b..e7e1425 100644
> > --- a/include/xen/page.h
> > +++ b/include/xen/page.h
> > @@ -3,9 +3,9 @@
> >
> > #include
> >
> > -stati
On Thu, 2015-08-06 at 11:56 +0100, Wei Liu wrote:
> On Thu, Aug 06, 2015 at 11:48:15AM +0100, Ian Campbell wrote:
> > On Thu, 2015-08-06 at 11:17 +0100, Wei Liu wrote:
> > >
> > > I don't think so. Though the doc is not clear on how we should use
> > > those
> > > APIs, I got my idea from
> > >
Hi,
On 04/08/15 19:12, Julien Grall wrote:
> diff --git a/include/xen/page.h b/include/xen/page.h
> index c5ed20b..e7e1425 100644
> --- a/include/xen/page.h
> +++ b/include/xen/page.h
> @@ -3,9 +3,9 @@
>
> #include
>
> -static inline unsigned long page_to_mfn(struct page *page)
> +static in
On Thu, Aug 06, 2015 at 11:48:15AM +0100, Ian Campbell wrote:
> On Thu, 2015-08-06 at 11:17 +0100, Wei Liu wrote:
> >
> > I don't think so. Though the doc is not clear on how we should use those
> > APIs, I got my idea from
> >
> > http://0pointer.de/public/cups-patch-core.txt
> >
> > which doe
We need to use libxl__domain_build_state.pv_cmdline in order to pickup
the correct args when using pygrub. libxl_domain_build_info.cmdline is
any args statically configured by the user.
This is consistent with the call to xc_domain_allocate, which takes
the cmdline too (in that case for x86/PV usa
On Wed, 5 Aug 2015, Lars Kurth wrote:
> This is one item of feedback, which I believe is a quick win for us. This is
> one piece of feedback from a list of
> items that have during the last few weeks been raised with me personally,
> either during face-2-face conversations
> in a private e-mail t
On Thu, 2015-08-06 at 11:17 +0100, Wei Liu wrote:
>
> I don't think so. Though the doc is not clear on how we should use those
> APIs, I got my idea from
>
> http://0pointer.de/public/cups-patch-core.txt
>
> which doesn't call sd_booted.
OK, FM then: Acked-by: Ian Campbell
As a future cleanu
On Wed, 5 Aug 2015, Feng Wu wrote:
> This patch corrects a logic error when handling 64-bt bar with
> more than 4G size.
>
> With 64-bit Bar, it has two items in PCIDevice: io_regions[x]
> and io_regions[x+1], io_regions[x] has all the informations for
> this BAR, while io_regions[x+1] contains no
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: Thursday, August 6, 2015 5:01 PM
> To: Hu, Robert; ian.jack...@eu.citrix.com; wei.l...@citrix.com
> Cc: xen-devel@lists.xen.org
> Subject: Re: OSSTEST -- nested test case development, RFC: ts-guest-destroy
>
Sorry I missed some inline comments.
On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote:
> > ---8<---
> > From a03eba6e258d8097b974366abb50b39af9e9abbf Mon Sep 17 00:00:00 2001
> > From: Wei Liu
> > Date: Wed, 5 Aug 2015 19:02:34 +0100
> > Subject: [PATCH] cxenstored: fix systemd socket
On 06/08/15 11:05, Julien Grall wrote:
>> But Ian suggested to export gicv3_host_irq_end instead of calling
>> gicv3_eoi_irq()
>
> And Ian said "Exposing those two gicv3 functions is a bit unfortunate,
> but I think it will do for now.".
>
> Which means he was opposed to the previous solution.
*
On 06/08/15 09:15, Vijay Kilari wrote:
> On Tue, Aug 4, 2015 at 7:15 PM, Julien Grall wrote:
>> Hi Vijay,
>>
>> On 27/07/15 12:11, vijay.kil...@gmail.com wrote:
>>> +
>>> +static const hw_irq_controller its_host_lpi_type = {
>>> +.typename = "gic-its",
>>> +.startup = its_irq_star
On 05/08/15 00:01, Jason A. Donenfeld wrote:
> Hey David,
>
> Sorry for the premature response on my phone earlier. Real reply follows.
>>> rcu_read_lock, when using Xen PV. Relevant excerpts of the
>> ^^ PV guest?
>
> Yes. The lockup occurs on a PV guest. Nothing
flight 60575 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60575/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Tests which are failin
On 06/08/15 10:46, big strong wrote:
> The old version of Xen contains information about hypercall page like:
>
> xl dmesg
> ..
> (XEN) HVM10: Allocated Xen hypercall page at 169ff000
> ...
>
> But the new edition seems to miss this information.
Correct. The information is not interesting
The old version of Xen contains information about hypercall page like:
xl dmesg
..
(XEN) HVM10: Allocated Xen hypercall page at 169ff000
...
But the new edition seems to miss this information. How can I get the
similar information then?
___
Xen-
On Thu, Aug 06, 2015 at 10:29:59AM +0100, Ian Campbell wrote:
> On Thu, 2015-08-06 at 10:20 +0100, Wei Liu wrote:
> > On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote:
> > > On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote:
> > > > On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote
On Thu, 2015-08-06 at 10:20 +0100, Wei Liu wrote:
> On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote:
> > On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote:
> > > On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote:
> > > [...]
> > > > >
> > > >
> > > > Right. I misinterpreted sd_b
On Wed, 2015-08-05 at 18:00 +0100, George Dunlap wrote:
> On Wed, Aug 5, 2015 at 4:47 PM, Andrew Cooper
> wrote:
> > From: Anshul Makkar
> >
> > A domain with sufficient shadow allocation can cause a watchdog timeout
> > during domain destruction. Expand the existing -ERESTART logic in
> > pag
On Thu, 2015-08-06 at 09:25 +0100, Wei Liu wrote:
> On Thu, Aug 06, 2015 at 12:49:51AM +, Tian, Kevin wrote:
> > > From: Ting-Wei Lan [mailto:lant...@gmail.com]
> > > Sent: Thursday, August 06, 2015 1:10 AM
> > >
> > > When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel
> > > Iron
On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote:
> On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote:
> > On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote:
> > [...]
> > > >
> > >
> > > Right. I misinterpreted sd_boot.
> > >
> > > You patch, however, has the undesirable effect
On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote:
> On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote:
> [...]
> > >
> >
> > Right. I misinterpreted sd_boot.
> >
> > You patch, however, has the undesirable effect that it fails to report
> > error if xenstored is started by systemd but coul
1 - 100 of 111 matches
Mail list logo