This run is configured for baseline tests only.
flight 38225 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38225/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf d26a7a3fa251e1c2e93bdb834207643eabb847de
baseline version:
ovm
flight 63351 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63351/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 6 xen-boot fail REGR. vs. 62277
test-amd64-i386-xl-qemu
This run is configured for baseline tests only.
flight 38224 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38224/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 20 guest-start
On 10/30/2015 12:59 AM, Dario Faggioli wrote:
On Fri, 2015-10-30 at 00:04 +0100, Dario Faggioli wrote:
schedule_cpu_switch() is meant to be only used for moving
pCPUs from a cpupool to no cpupool, and from there back
to a cpupool, *not* to move them directly from one cpupool
to another.
This is
flight 63354 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63354/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate
fail REGR. vs. 59254
tes
flight 63355 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63355/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf d26a7a3fa251e1c2e93bdb834207643eabb847de
baseline version:
ovmf ae658d9163afd6053db7d37d46f54388e33
This run is configured for baseline tests only.
flight 38223 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38223/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-credit2 21 guest-start/debian.re
On 2015年10月28日 21:29, Konrad Rzeszutek Wilk wrote:
On Wed, Oct 28, 2015 at 04:18:56PM +0800, Yang Hongyang wrote:
On 2015年10月28日 00:26, Konrad Rzeszutek Wilk wrote:
Hey,
Way back in Shenghai we had a chat about what needs to be done
in tmem for the 4.6 release. Things got done, but there are o
On Fri, 2015-10-30 at 00:04 +0100, Dario Faggioli wrote:
> schedule_cpu_switch() is meant to be only used for moving
> pCPUs from a cpupool to no cpupool, and from there back
> to a cpupool, *not* to move them directly from one cpupool
> to another.
>
> This is something that is reflected in the w
Document the multi-queue/ring feature in terms of XenStore keys to be written
by the backend and by the frontend.
Signed-off-by: Bob Liu
--
v2: Comments from Konrad
---
xen/include/public/io/blkif.h | 48 +
1 file changed, 48 insertions(+)
diff --git a/
Idle vCPUs are set to run immediately, as a part of their
own initialization, so we shouldn't even try to put them
in a runqueue. In fact, actual schedulers don't do that,
even when asked to (that is rather explicit in Credit2
and RTDS, a bit less evident in Credit1).
Let's make things look as fol
As, curently, there is no reason for bothering having
it and keeping it updated.
In fact, it is only used for dumping and changing
vCPUs parameters, but that can be achieved easily with
for_each_vcpu.
While there, improve alignment of comments, ad
add a const qualifier to a pointer, making things
As, curently, there is no reason for bothering having
it and keeping it updated.
In fact, it is only used for dumping and changing
vCPUs parameters, but that can be achieved easily with
for_each_vcpu.
While there, take care of the case when
XEN_DOMCTL_SCHEDOP_getinfo is called but no vCPUs have
b
In fact, csched_vcpu_remove() (i.e., the credit1
implementation of remove_vcpu()) manipulates runqueues,
so holding the runqueue lock is necessary.
Also, while there, *_lock_irq() (for the private lock) is
enough, there is no need to *_lock_irqsave().
Signed-off-by: Dario Faggioli
Reviewed-by: A
schedule_cpu_switch() is meant to be only used for moving
pCPUs from a cpupool to no cpupool, and from there back
to a cpupool, *not* to move them directly from one cpupool
to another.
This is something that is reflected in the way it is
implemented, and should be kept in mind when looking at
it.
Hi,
Take 3 of this series, improving how inserting vCPUs in schedulers runqueues is
done, including fixing a couple of bugs, and paving the way for more
improvement in Credit2 runqueue handling (will be submitted as a separate
series).
v2 is here:
http://lists.xen.org/archives/html/xen-devel/2015
The insert_vcpu() hook is handled with inconsistent locking.
In fact, schedule_cpu_switch() calls the hook with runqueue
lock held, while sched_move_domain() relies on the hook
implementations to take the lock themselves (and, since that
is not done in Credit1 and RTDS, such operation is not safe
i
flight 63352 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63352/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 63340
Tests which did not succe
flight 63348 linux-3.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63348/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 5 kernel-build fail REGR. vs. 62648
Tests which are failin
This run is configured for baseline tests only.
flight 38222 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38222/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 21 guest-start/debian.repea
29.10.2015 18:25, Vladimir 'φ-coder/phcoder' Serbinenko пишет:
+if [ "x$machine" != xaarch64 ]; then
+ multiboot_cmd="multiboot"
+ module_linux_cmd="module"
+ module_initrd_cmd="module --nounzip"
+else
+ multiboot_cmd="xen_hypervisor"
+ module_linux_cmd="xen_linux"
+
On Thu, Oct 29, 2015 at 10:37:39AM +0800, Bob Liu wrote:
> Document the multi-queue/ring feature in terms of XenStore keys to be written
> by the backend and by the frontend.
>
> Signed-off-by: Bob Liu
> ---
> xen/include/public/io/blkif.h | 48
> +
> 1
On Thu, Oct 29, 2015 at 02:55:25AM -0600, Jan Beulich wrote:
> >>> On 28.10.15 at 20:00, wrote:
> > On Wed, Oct 28, 2015 at 11:42:41AM -0400, Konrad Rzeszutek Wilk wrote:
> >> Perhaps an another option would be to return success and fill out the
> >> value with an empty string?
> >>
> >> That act
flight 63347 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63347/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 5 kernel-build fail REGR. vs. 62642
Tests which are failin
flight 63364 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63364/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Hi Daniel,
On 29/10/15 16:36, Daniel Kiper wrote:
> On Wed, Oct 28, 2015 at 05:32:54PM +, Julien Grall wrote:
>> (Adding David and Daniel)
>>
>> On 23/10/15 16:45, Ian Campbell wrote:
>>> On Fri, 2015-10-23 at 15:58 +0100, Julien Grall wrote:
Is there any way we could register the IO regi
>>> On 29.10.15 at 18:01, wrote:
> On Thu, Oct 29, 2015 at 10:08:02AM -0600, Jan Beulich wrote:
>> >>> On 29.10.15 at 16:36, wrote:
>> > What does the hypervisor do when PTs are shared but it still hits the
>> > boundary? I presume the current default value never triggers such
>> > situation?
>>
On Thu, Oct 29, 2015 at 10:08:02AM -0600, Jan Beulich wrote:
> >>> On 29.10.15 at 16:36, wrote:
> > On Tue, Sep 22, 2015 at 03:41:47AM -0600, Jan Beulich wrote:
> >> it looks as if changes in the memory requirements of the hypervisor
> >> have pushed things over the border of not working anymore w
flight 63350 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63350/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 60684
build-i386
On 10/27/2015 12:05 PM, Ross Lagerwall wrote:
On 06/12/2015 12:39 PM, Martin Pohlack wrote:
On 15.05.2015 21:44, Konrad Rzeszutek Wilk wrote:
[...]
## Hypercalls
We will employ the sub operations of the system management hypercall
(sysctl).
There are to be four sub-operations:
* upload the
On Wed, Oct 28, 2015 at 05:32:54PM +, Julien Grall wrote:
> (Adding David and Daniel)
>
> On 23/10/15 16:45, Ian Campbell wrote:
> > On Fri, 2015-10-23 at 15:58 +0100, Julien Grall wrote:
> >> Is there any way we could register the IO region used on ARM without
> >> having to enforce it in all
On Wed, Oct 21, 2015 at 04:23:26PM +0100, Ian Campbell wrote:
> Signed-off-by: Ian Campbell
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, Oct 21, 2015 at 04:23:29PM +0100, Ian Campbell wrote:
> This means adding -L for libxen{evtchn,gnttab,foreignmemory} so that
> it can link them directly (rather than using the libxenctrl compat
> layer exposed via -rpath-link). Also add -I for libxenforeignmemory.
>
> Signed-off-by: Ian Ca
On Wed, Oct 21, 2015 at 04:23:28PM +0100, Ian Campbell wrote:
> Signed-off-by: Ian Campbell
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, Oct 21, 2015 at 04:23:17PM +0100, Ian Campbell wrote:
> On Solaris and NetBSD xc_map_foreign_bulk is implemented by calling
> xc_map_foreign_bulk_compat and xc_map_foreign_bulk_compat is exposed
> as a symbol by libxenctrl.so.
>
> Remove these wrappers and turn the compat function into the
On Wed, Oct 21, 2015 at 04:23:23PM +0100, Ian Campbell wrote:
> Remove the reference to pre-4.1, since this is now a new library.
>
> Fixup references to xc.
>
> Signed-off-by: Ian Campbell
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@list
On Wed, Oct 21, 2015 at 04:23:16PM +0100, Ian Campbell wrote:
> libxencall will provide a stable API and ABI for calling hypercalls
> (although those hypercalls themselves may not have a stable API). As
> well as the hypercall buffer infrastructure needed in order to safely
> provide pointer argume
On Wed, Oct 21, 2015 at 04:23:27PM +0100, Ian Campbell wrote:
> These are already arch specific, so just use the appropriate
> interfaces (as determined by looking at the xc_memalign backend).
>
> Signed-off-by: Ian Campbell
Acked-by: Wei Liu
> ---
> tools/libs/call/netbsd.c | 4 ++--
> tool
On Wed, Oct 21, 2015 at 04:23:24PM +0100, Ian Campbell wrote:
> These were wrong in the context of libxc before this code was
> extracted, clean them up.
>
> Also add some emacs magic blocks
>
> Signed-off-by: Ian Campbell
Acked-by: Wei Liu
___
Xen-
On Wed, Oct 21, 2015 at 04:23:20PM +0100, Ian Campbell wrote:
> libxenforeignmemory will provide a stable API and ABI for mapping
> foreign domain memory (subject to appropriate privileges).
>
> The new library exposes an interface equivalent to
> xc_map_foreign_memory_bulk, which all the other
>
On Wed, Oct 21, 2015 at 04:23:19PM +0100, Ian Campbell wrote:
> Both Linux and FreeBSD already implemented these functions using
> identical helpers based on xc_map_foreign_pages. Make one copy of
> these common helpers and switch all OSes to use them, even those which
> previously had a specific l
On Wed, Oct 21, 2015 at 04:23:15PM +0100, Ian Campbell wrote:
> The alternative backend (a xen-api/xapi shim) is no longer around and
> so this stuff is now just baggage which is getting in the way of
> refactoring libxenctrl.
>
> Nested virt probably suffices for this use case now.
>
> This was
On Wed, Oct 21, 2015 at 04:23:21PM +0100, Ian Campbell wrote:
> And require it be used instead of direct munmap.
>
> This will allow e.g. Valgrind hooks to help track incorrect use of
> foreign mappings.
>
> Switch all uses of xenforeignmemory_map to use
> xenforeignmemory_unmap, not that foreign
On Wed, Oct 21, 2015 at 04:23:22PM +0100, Ian Campbell wrote:
> Surprisingly it appears no callers need updating.
>
> Signed-off-by: Ian Campbell
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, Oct 21, 2015 at 04:23:18PM +0100, Ian Campbell wrote:
> It can trivially be replaced by xc_map_foreign_bulk which is the
> interface I want to move to going forward. All in tree users are
> trivially converted by supplying the appropriate error array and
> adjusting the what error handling
On Wed, Oct 21, 2015 at 04:23:25PM +0100, Ian Campbell wrote:
> Remove some stray xc references.
>
> While I'm not convinced by javadoc/doxygen cause the existing comments
> which appear to use that syntax to have the appropriate /** marker.
>
> Also fix a typo in a code comment.
>
> Signed-off-
On Wed, Oct 21, 2015 at 04:23:11PM +0100, Ian Campbell wrote:
> libxenevtchn will provide a stable API and ABI for accessing the
> evtchn device.
>
> The functions are moved into the xenevtchn namespace to make a clean
> break from libxc and avoid ambiguity regarding which interfaces are
> stable.
On Wed, Oct 21, 2015 at 04:23:09PM +0100, Ian Campbell wrote:
> In attempting to disaggregate libxenctrl I found that many of the
> pieces were going to want access to this library, so split it out (as
> it probably should always have been).
>
> Various build adjustments are needed. In particular
On Wed, Oct 21, 2015 at 04:23:08PM +0100, Ian Campbell wrote:
> In tree libraries which link against other in tree libraries in a way
> which is opaque to their callers need special handling, specifically
> correct use of -Wl,-rpath-link for the recusively used libraries.
>
> Currently this is rat
On Wed, Oct 21, 2015 at 04:23:14PM +0100, Ian Campbell wrote:
> libxengnttab will provide a stable API and ABI for accessing the
> grant table devices.
>
> The functions are moved into the xengnt{tab,shr} namespace to make a
> clean break from libxc and avoid ambiguity regarding which interfaces
>
On Wed, Oct 21, 2015 at 04:23:13PM +0100, Ian Campbell wrote:
> The alternative backend (a xen-api/xapi shim) is no longer around and
> so this stuff is now just baggage which is getting in the way of
> refactoring libxenctrl.
>
> Nested virt probably suffices for this use case now.
>
> It is now
On Wed, Oct 21, 2015 at 04:23:10PM +0100, Ian Campbell wrote:
> The alternative backend (a xen-api/xapi shim) is no longer around and
> so this stuff is now just baggage which is getting in the way of
> refactoring libxenctrl.
>
> Note that the intention is to move this into a separate library
> s
On Wed, Oct 21, 2015 at 04:23:12PM +0100, Ian Campbell wrote:
> Using the same rune as we use for the Xen public headers, except we do
> not need stdint.h here and we use -pedantic too.
>
> Signed-off-by: Ian Campbell
Acked-by: Wei Liu
___
Xen-devel
>>> On 29.10.15 at 16:36, wrote:
> On Tue, Sep 22, 2015 at 03:41:47AM -0600, Jan Beulich wrote:
>> it looks as if changes in the memory requirements of the hypervisor
>> have pushed things over the border of not working anymore when
>> passing through a device and not sharing page tables (between
On 29/10/15 15:57, Ian Jackson wrote:
> This may seem redundant, however:
>
> git does not track empty directories. So it can happen that a
> directory is created as part of `git clone', but is empty in the
> revision switched to with `git checkout'.
>
> In this situation, the tree we are going to
This may seem redundant, however:
git does not track empty directories. So it can happen that a
directory is created as part of `git clone', but is empty in the
revision switched to with `git checkout'.
In this situation, the tree we are going to build ought not to contain
this directory, becaus
On Mon, 2015-10-12 at 16:54 +0800, Feng Wu wrote:
> diff --git a/docs/misc/vtd-pi.txt b/docs/misc/vtd-pi.txt
> new file mode 100644
> index 000..af5409a
> --- /dev/null
> +++ b/docs/misc/vtd-pi.txt
> @@ -0,0 +1,332 @@
> +Authors: Feng Wu
> +
> +VT-d Posted-interrupt (PI) design for XEN
> +
And
flight 63362 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63362/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Sorry for the late reply. This fell through the crack.
On Tue, Sep 22, 2015 at 03:41:47AM -0600, Jan Beulich wrote:
> Tools maintainers,
>
> it looks as if changes in the memory requirements of the hypervisor
> have pushed things over the border of not working anymore when
> passing through a dev
flight 63346 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63346/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 5 xen-install fail REGR. vs. 63304
test-armhf-armhf-xl-rtds
On 10/29/2015 04:03 PM, Wei Liu wrote:
On Thu, Oct 29, 2015 at 03:13:30PM +0100, Juergen Gross wrote:
On 10/29/2015 03:02 PM, Wei Liu wrote:
On Thu, Oct 29, 2015 at 02:18:31PM +0100, Juergen Gross wrote:
On 10/29/2015 01:48 PM, Wei Liu wrote:
On Tue, Oct 13, 2015 at 03:11:17PM +0200, Juergen
> +if [ "x$machine" != xaarch64 ]; then
> + multiboot_cmd="multiboot"
> + module_linux_cmd="module"
> + module_initrd_cmd="module --nounzip"
> +else
> + multiboot_cmd="xen_hypervisor"
> + module_linux_cmd="xen_linux"
> + module_initrd_cmd="xen_initrd"
> +fi
> +
Please do not
Ian Campbell writes ("Re: [Xen-devel] [PATCH OSSTEST] Switch to merged
qemu-xen{, -traditional}.git trees"):
> Copied from xen.git/config. I also copied xen.git/hooks/pre-receive which
> prevents pushes to non-staging branches (except by osstest) and prevents
> pushes of unannottated tags.
This p
On 12/10/15 18:32, Wei Liu wrote:
> Hi all
>
>
>
> Please express your preference with -2 (strongly argue against), -1
> (not happy but not against), +1 (happy but won't argue for) and +2
> (happy and argue for).
With my XenServer hat on, the precise release doesn't matter too much.
For a XenSer
On Thu, Oct 29, 2015 at 03:13:30PM +0100, Juergen Gross wrote:
> On 10/29/2015 03:02 PM, Wei Liu wrote:
> >On Thu, Oct 29, 2015 at 02:18:31PM +0100, Juergen Gross wrote:
> >>On 10/29/2015 01:48 PM, Wei Liu wrote:
> >>>On Tue, Oct 13, 2015 at 03:11:17PM +0200, Juergen Gross wrote:
> In order to
On 29 October 2015 at 15:41, Dario Faggioli
wrote:
> On Thu, 2015-10-29 at 10:07 +, Wei Liu wrote:
> > On Thu, Oct 29, 2015 at 12:42:18AM +0530, Lasya Venneti wrote:
>
> > > I must also add errno.h header to the file, I forgot to do that. I
> > > shall
> > > do so in the next version.
> > >
>
Committed without the xen_module command. Its argument parsing was
non-trivial and I don't quite get what its intent is. Can you resubmit?
On 23.07.2015 07:16, fu@linaro.org wrote:
> From: Fu Wei
>
> grub-core/loader/arm64/xen_boot.c
>
> - This adds support for the Xen boot on ARM specific
flight 38221 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38221/
Perfect :-)
All tests in this flight passed
baseline version:
flight 38197
jobs:
build-amd64 pass
build-armhf
This run is configured for baseline tests only.
flight 38220 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38220/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-xsm 21 guest-start/debian
On 10/29/2015 03:02 PM, Wei Liu wrote:
On Thu, Oct 29, 2015 at 02:18:31PM +0100, Juergen Gross wrote:
On 10/29/2015 01:48 PM, Wei Liu wrote:
On Tue, Oct 13, 2015 at 03:11:17PM +0200, Juergen Gross wrote:
In order to prepare a p2m list outside of the initial kernel mapping
do a rework of the do
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Thursday, October 29, 2015 5:27 PM
> To: Wu, Feng ; Jan Beulich
> Cc: Tian, Kevin ; Keir Fraser ;
> GeorgeDunlap ; Andrew Cooper
> ; xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] [PATCH v8 15/17]
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Thursday, October 29, 2015 6:52 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] [PATCH v8 00/17] Add VT-d Posted-Interrupts support
>
> So, I (super-super-super-quickly) skimmed
On Thu, Oct 29, 2015 at 02:18:31PM +0100, Juergen Gross wrote:
> On 10/29/2015 01:48 PM, Wei Liu wrote:
> >On Tue, Oct 13, 2015 at 03:11:17PM +0200, Juergen Gross wrote:
> >>In order to prepare a p2m list outside of the initial kernel mapping
> >>do a rework of the domain builder's page table handl
>>> On 05.10.15 at 16:04, wrote:
> Daniel,
>
> now that we have MMCFG write intercepts in place, wouldn't it make
> sense to move that hook invocation into pci_conf_write_intercept()
> for the write case, so that it also covers MMCFG-based writes?
>
> Thanks, Jan
>
>
>
All,
in the course of auditing other code in the context of that
security issue my attention was caught by the various printk()s
issued by domain_crash() or around and alike. Within the security
team we discussed this and decided that a few not rate limited
messages per second (resulting from a po
>>> On 23.10.15 at 19:52, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -1588,21 +1588,14 @@ void vmx_destroy_vmcs(struct vcpu *v)
> free_xenheap_page(v->arch.hvm_vmx.msr_bitmap);
> }
>
> -void vm_launch_fail(void)
> -{
> -unsigned long error;
> -
flight 63357 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63357/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 10/29/2015 02:07 PM, Wei Liu wrote:
On Tue, Oct 13, 2015 at 03:11:18PM +0200, Juergen Gross wrote:
[...]
err:
diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
index 333ef6b..0847761 100644
--- a/tools/libxc/xc_dom_x86.c
+++ b/tools/libxc/xc_dom_x86.c
@@ -68,6 +68,8 @@
#de
On 10/29/2015 01:48 PM, Wei Liu wrote:
On Tue, Oct 13, 2015 at 03:11:17PM +0200, Juergen Gross wrote:
In order to prepare a p2m list outside of the initial kernel mapping
do a rework of the domain builder's page table handler. The goal is
to be able to use common helpers for page table allocatio
On Tue, Oct 13, 2015 at 03:11:18PM +0200, Juergen Gross wrote:
[...]
> err:
> diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
> index 333ef6b..0847761 100644
> --- a/tools/libxc/xc_dom_x86.c
> +++ b/tools/libxc/xc_dom_x86.c
> @@ -68,6 +68,8 @@
> #define bits_to_mask(bits)
On Tue, Oct 13, 2015 at 03:11:17PM +0200, Juergen Gross wrote:
> In order to prepare a p2m list outside of the initial kernel mapping
> do a rework of the domain builder's page table handler. The goal is
> to be able to use common helpers for page table allocation and setup
> for initial kernel pag
flight 63345 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63345/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 6 xen-boot fail REGR. vs. 63099
test-armhf-armhf-xl-rtds
>>> On 29.10.15 at 13:18, wrote:
> On 27/10/15 08:04, Jan Beulich wrote:
>> --- a/xen/arch/x86/x86_64/cpu_idle.c
>> +++ b/xen/arch/x86/x86_64/cpu_idle.c
>> @@ -21,9 +21,6 @@
>> *
> ~~
>> */
>>
>> -#define __XEN_TOOLS__
On 27/10/15 08:04, Jan Beulich wrote:
> --- a/xen/arch/x86/x86_64/cpu_idle.c
> +++ b/xen/arch/x86/x86_64/cpu_idle.c
> @@ -21,9 +21,6 @@
> * ~~
> */
>
> -#define __XEN_TOOLS__ /* for using get_xen_guest_handle macro */
> -
Hi Jan,
On 27/10/15 08:04, Jan Beulich wrote:
> Its use in the tools (and its apparent abuse in the hypervisor) are
> long gone.
>
> Signed-off-by: Jan Beulich
FWIW:
Reviewed-by: Julien Grall
Regards,
--
Julien Grall
___
Xen-devel mailing list
X
On 23.07.2015 07:16, fu@linaro.org wrote:
> From: Fu Wei
>
> Add accessor functions of "loaded" flag in
> grub-core/loader/arm64/linux.c.
>
> Export accessor functions of "loaded" flag and
> grub_linux_get_fdt function in include/grub/arm64/linux.h.
>
> Purpose: Reuse the existing code of d
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7972 / XSA-153
version 3
x86: populate-on-demand balloon size inaccuracy can crash guests
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7969 / XSA-151
version 3
x86: leak of per-domain profiling-related vcpu pointer array
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7969 / XSA-149
version 3
leak of main per-domain vcpu pointer array
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7813 / XSA-146
version 3
arm: various unimplemented hypercalls log without rate limiting
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7812 / XSA-145
version 3
arm: Host crash when preempting a multicall
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7971 / XSA-152
version 3
x86: some pmu and profiling hypercalls log without rate limiting
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7970 / XSA-150
version 5
x86: Long latency populate-on-demand operation is not preemptible
UPDATES IN VERSION 5
Updated patch. Compared to the versi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7835 / XSA-148
version 4
x86: Uncontrolled creation of large page mappings by PV guests
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-7814 / XSA-147
version 3
arm: Race between domain destruction and memory allocation decrease
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
On Wed, 28 Oct 2015, Jan Beulich wrote:
> >>> On 28.10.15 at 16:44, wrote:
> > On 27/10/15 08:05, Jan Beulich wrote:
> > On 26.10.15 at 19:08, wrote:
> >>> However, IIUC, the get_xen_guest_handle is only exposed to the tools and
> >>> therefore possible to modify it in order to pass the type.
On Thu, Oct 29, 2015 at 11:02:54AM +, Olaf Hering wrote:
> xendomains will manage guests behind libvirts back:
> - libvirt starts a guest
> - that guest can be "managed" by libvirt and xl at the same time
> - when xendomains runs on shutdown it will save the guest using xl
> libvirt does not
In fact, when waking up a vCPU, __runq_tickle() is called
to allow the new vCPU to run on a pCPU (which one, depends
on the relationship between the priority of the new vCPU,
and the ones of the vCPUs that are already running).
If there is no idle processor on which the new vCPU can
run (e.g., bec
On Thu, Oct 29, 2015 at 11:07:22AM +, Andrew Cooper wrote:
> On 29/10/15 10:29, Wei Liu wrote:
> > On Thu, Oct 29, 2015 at 10:22:45AM +, Olaf Hering wrote:
> >> xendomains will manage guests behind libvirts back:
> >> - libvirt starts a guest
> >> - that guest can be "managed" by libvirt an
On 29/10/15 10:29, Wei Liu wrote:
> On Thu, Oct 29, 2015 at 10:22:45AM +, Olaf Hering wrote:
>> xendomains will manage guests behind libvirts back:
>> - libvirt starts a guest
>> - that guest can be "managed" by libvirt and xl at the same time
>> - when xendomains runs on shutdown it will save
1 - 100 of 127 matches
Mail list logo