>>> On 19.11.15 at 20:51, wrote:
> In terms of non-standard options passed to gcc I have tried to make sense of
> what flags are actually being used during the build process. I am not
> absolutely sure, but I think the options passed to gcc are as follows:
>
> I do have system wide flags which
flight 64766 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64766/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-raw 7 host-ping-check-xen fail REGR. vs. 64150
test-armhf-armhf-xl-multiv
> From: Alex Williamson [mailto:alex.william...@redhat.com]
> Sent: Friday, November 20, 2015 4:03 AM
>
> > >
> > > The proposal is therefore that GPU vendors can expose vGPUs to
> > > userspace, and thus to QEMU, using the VFIO API. For instance, vfio
> > > supports modular bus drivers and IOMMU
> From: Gerd Hoffmann [mailto:kra...@redhat.com]
> Sent: Thursday, November 19, 2015 4:41 PM
>
> Hi,
>
> > > Another area of extension is how to expose a framebuffer to QEMU for
> > > seamless integration into a SPICE/VNC channel. For this I believe we
> > > could use a new region, much like w
> From: Song, Jike
> Sent: Friday, November 20, 2015 1:52 PM
>
> On 11/20/2015 12:22 PM, Alex Williamson wrote:
> > On Fri, 2015-11-20 at 10:58 +0800, Jike Song wrote:
> >> On 11/19/2015 11:52 PM, Alex Williamson wrote:
> >>> On Thu, 2015-11-19 at 15:32 +, Stefano Stabellini wrote:
> On T
On 11/20/2015 12:22 PM, Alex Williamson wrote:
On Fri, 2015-11-20 at 10:58 +0800, Jike Song wrote:
On 11/19/2015 11:52 PM, Alex Williamson wrote:
On Thu, 2015-11-19 at 15:32 +, Stefano Stabellini wrote:
On Thu, 19 Nov 2015, Jike Song wrote:
Hi Alex, thanks for the discussion.
In addition
flight 64765 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64765/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-migrupgrade 21 guest-migrate/src_host/dst_host fail like 64434
test-amd64-amd64-xl-qemuu
On Fri, 2015-11-20 at 10:58 +0800, Jike Song wrote:
> On 11/19/2015 11:52 PM, Alex Williamson wrote:
> > On Thu, 2015-11-19 at 15:32 +, Stefano Stabellini wrote:
> >> On Thu, 19 Nov 2015, Jike Song wrote:
> >>> Hi Alex, thanks for the discussion.
> >>>
> >>> In addition to Kevin's replies, I ha
On 11/19/2015 11:52 PM, Alex Williamson wrote:
On Thu, 2015-11-19 at 15:32 +, Stefano Stabellini wrote:
On Thu, 19 Nov 2015, Jike Song wrote:
Hi Alex, thanks for the discussion.
In addition to Kevin's replies, I have a high-level question: can VFIO
be used by QEMU for both KVM and Xen?
N
On 11/19/2015 07:09 PM, Paolo Bonzini wrote:
On 19/11/2015 09:40, Gerd Hoffmann wrote:
But this code should be
minor to be maintained in libvirt.
As far I know libvirt only needs to discover those devices. If they
look like sr/iov devices in sysfs this might work without any changes to
libvirt
flight 64755 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64755/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-prev 5 xen-buildfail in 64352 REGR. vs. 63449
build-amd64-prev
flight 64762 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64762/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 63340
Tests which did not succe
Xen staging-4.6 crashes when booting on VMware Fusion 8.0.2 (with VT-x/EPT
enabled), with 4 virtual CPUs:
Loading xen-4.6-amd64.gz... ok
Loading vmlinuz-3.14.51-grsec-dock... ok
Loading initrd.img-3.14.51-grsec-dock... ok
(XEN) Xen version 4.6.1-pre (Debian 4.6.1~pre-1skyport1) (
eswi...@skyportsy
From: Shuai Ruan
Changes in v11:
* Address comments from Jan:
* Using alternative asm on xrstor side.
For xsave side(alternative asm), I will send a seperate patch to do this.
Changes in v10:
* Address comments from Jan:
* Add two new macros to handle alternative asm with fixup code in patch
This patch enables xsaves for hvm guest, includes:
1.handle xsaves vmcs init and vmexit.
2.add logic to write/read the XSS msr.
Add IA32_XSS_MSR save/rstore support.
Signed-off-by: Shuai Ruan
Reviewed-by: Jan Beulich
---
xen/arch/x86/hvm/hvm.c | 27 +++
xen/
This patch uses xsaves/xrstors/xsavec instead of xsaveopt/xrstor
to perform the xsave_area switching so that xen itself
can benefit from them when available.
For xsaves/xrstors/xsavec only use compact format. Add format conversion
support when perform guest os migration. Also, pv guest will not su
From: Shuai Ruan
This patch exposes xsaves/xgetbv1/xsavec to hvm guest.
The reserved bits of eax/ebx/ecx/edx must be cleaned up
when call cpuid(0dh) with leaf 1 or 2..63.
According to the spec the following bits must be reserved:
For leaf 1, bits 03-04/08-31 of ecx is reserved. Edx is reserved.
> -Original Message-
> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
> boun...@lists.xen.org] On Behalf Of Huaitong Han
> Sent: Monday, November 16, 2015 6:32 PM
> To: jbeul...@suse.com; andrew.coop...@citrix.com; Nakajima, Jun
> ; Dong, Eddie ; Tian,
> Kevin ; george.dun...@eu
On 2015-11-19 12:46, Juan Rossi wrote:
Hi
I am sending this due the change of behaviour in some parts, and
perhaps it needs some code amendments, unsure if the devel list is the
best place, fell free to point me to the right place for this. Let me
know if I should load a bug instead.
I'm track
On 2015年11月19日 20:16, Ian Campbell wrote:
On Thu, 2015-11-19 at 11:55 +, Ian Campbell wrote:
On Thu, 2015-11-19 at 11:48 +, Ian Campbell wrote:
On Thu, 2015-11-19 at 11:33 +, Andrew Cooper wrote:
The majority of those are cases are not appropriate uses of exit().
AFAIIR, the *only
On 19/11/2015 20:02, Atom2 wrote:
> Am 19.11.15 um 02:06 schrieb Andrew Cooper:
>> Thanks! That is what I was looking for.
>>
>> Sadly, it is less useful than I was hoping. The guest is not appearing
>> to do anything interesting which causes the bad state; it is almost a
>> full second between th
Introduce support for domainInterfaceStats API call for querying
network interface statistics. Consequently it also enables the
use of `virsh domifstat ` command plus
seeing the interfaces names instead of "-" when doing
`virsh domiflist `.
After succesful guest creation we fill the network
inter
This new field in libxlDomainObjPrivate is named "config"
and is kept while the domain is active. For now, "config"
will be used in libxlDomainStartCallback to set
network interface names based on domid and
libxl_device_nic devid that is set in the config on domain
create.
Signed-off-by: Joao Mart
. to a more generic name i.e. libxlDomainStartCallback,
since it will now cover another case other than the console.
Signed-off-by: Joao Martins
---
src/libxl/libxl_domain.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/libxl/libxl_domain.c b/src/libxl/libxl_domain.
Hey,
As discussed yesterday, this patch series implements virDomainInterfaceStats
but based on "ConsoleCallback" as opposed of doing it in libxlDomainStart.
The series is divided as following: Patch 1 adds up domain config to
libxlDomainObjPrivate, Patch 2 renames console callback to something mor
On Fri, Oct 9, 2015 at 12:34 AM, Jan Beulich wrote:
On 08.10.15 at 21:36, wrote:
>> Signed-off-by: Mark Pryor
>
> Without any description I cannot see what is being fixed here, or why
> there are _different_ comment changes on the inclusion of the same
> comment. Since I assume that whateve
On Thu, Nov 19, 2015 at 04:55:44PM -0500, Boris Ostrovsky wrote:
> The first patch fixes Xen PV regression introduced by 32-bit rewrite. Unlike
> the
> earlier version it uses ALTERNATIVE instruction and avoids using xen_sysexit
> (and sysret32 in compat mode) pv ops, as suggested by Andy.
>
> As
flight 64750 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64750/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 64035
test-amd64-amd64-i38
On Thu, Nov 19, 2015 at 1:55 PM, Boris Ostrovsky
wrote:
> The first patch fixes Xen PV regression introduced by 32-bit rewrite. Unlike
> the
> earlier version it uses ALTERNATIVE instruction and avoids using xen_sysexit
> (and sysret32 in compat mode) pv ops, as suggested by Andy.
>
> As result o
After 32-bit syscall rewrite, and specifically after commit 5f310f739b4c
("x86/entry/32: Re-implement SYSENTER using the new C path"), the stack
frame that is passed to xen_sysexit is no longer a "standard" one (i.e.
it's not pt_regs).
Since we end up calling xen_iret from xen_sysexit we don't nee
As result of commit "x86/xen: Avoid fast syscall path for Xen PV guests"
irq_enable_sysexit pv op is not called by Xen PV guests anymore and since
they were the only ones who used it we can safely remove it.
Signed-off-by: Boris Ostrovsky
---
arch/x86/entry/entry_32.S | 8 ++--
As result of commit "x86/xen: Avoid fast syscall path for Xen PV guests"
usergs_sysret32 pv op is not called by Xen PV guests anymore and
since they were the only ones who used it we can safely remove it.
Signed-off-by: Boris Ostrovsky
---
arch/x86/entry/entry_64_compat.S | 10 ++
a
The first patch fixes Xen PV regression introduced by 32-bit rewrite. Unlike the
earlier version it uses ALTERNATIVE instruction and avoids using xen_sysexit
(and sysret32 in compat mode) pv ops, as suggested by Andy.
As result of this patch irq_enable_sysexit and usergs_sysret32 pv ops are not
us
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-pvh-amd
testid xen-boot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Hi Kevin,
On Thu, 2015-11-19 at 04:06 +, Tian, Kevin wrote:
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Thursday, November 19, 2015 2:12 AM
> >
> > [cc +qemu-devel, +paolo, +gerd]
> >
> > On Tue, 2015-10-27 at 17:25 +0800, Jike Song wrote:
> > > Hi all,
> > >
> >
Am 19.11.15 um 02:06 schrieb Andrew Cooper:
Thanks! That is what I was looking for.
Sadly, it is less useful than I was hoping. The guest is not appearing
to do anything interesting which causes the bad state; it is almost a
full second between the previous action of note, and the crash.
Can y
Am 19.11.15 um 11:38 schrieb Andrew Cooper:
On 19/11/15 10:24, Jan Beulich wrote:
On 19.11.15 at 00:17, wrote:
The disassembly of do_IRQ now looks like a plausible function, but the
consistently faulting address has no plausible way of generating a
double fault. I suspect therefore that somet
flight 64861 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64861/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
flight 64733 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64733/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 3 host-install(3) broken REGR. vs. 59254
build-amd64-rumpuserx
On 11/19/2015 11:45 AM, Wei Liu wrote:
On Thu, Nov 19, 2015 at 05:11:08PM +0100, Juergen Gross wrote:
Commit 81a76e4b12961a9f54f5021809074196dfe6dbba ("libxc: rework of
domain builder's page table handler") dropped a special case for pvh
resulting in page tables being mapped read-only. This led
On 19/11/15 17:34, Andrew Cooper wrote:
> A sample Gentoo compliation of Xen contains
>
> lea-0x1058(%rsp),%rsp
> orq$0x0,(%rsp)
> lea0x1020(%rsp),%rsp
>
> Whatever the reason for silly code like this, it fools the current stack
> overflow detection logic in the #DF handler
A sample Gentoo compliation of Xen contains
lea-0x1058(%rsp),%rsp
orq$0x0,(%rsp)
lea0x1020(%rsp),%rsp
Whatever the reason for silly code like this, it fools the current stack
overflow detection logic in the #DF handler (which triggers reliably on the
'orq' instruction).
U
On 09/11/15 14:52, Jan Beulich wrote:
> As noted regarding the mixture of checks in p2m_pt_set_entry(),
> introduce an new P2M type group allowing to be used everywhere we
> just care about accepting operations with either a valid MFN or a type
> permitting to be used without (valid) MFN.
>
> Note
On 09/11/15 14:48, Jan Beulich wrote:
> Since calling the function isn't cheap, try to avoid the call when we
> know up front it won't help; see the code comment for details on those
> conditions.
>
> Signed-off-by: Jan Beulich
Reviewed-by: George Dunlap
Sorry for the delay.
___
On 19/11/15 16:57, Paul Durrant wrote:
>> -Original Message-
>> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
>> Sent: 19 November 2015 16:07
>> To: Paul Durrant; xen-de...@lists.xenproject.org
>> Cc: Ian Jackson; Stefano Stabellini; Ian Campbell; Wei Liu; Keir (Xen.org);
>> Jan
>
The Microsoft Hypervisor Top Level Functional Spec. (section 3.4) defines
two bits in CPUID leaf 0x4004:EAX for the hypervisor to recommend
whether or not to issue a hypercall for local or remote TLB flush.
Whilst it's doubtful whether using a hypercall for local TLB flush would
be any more ef
On 19/11/15 16:50, Wei Liu wrote:
> On Thu, Nov 19, 2015 at 02:45:41PM +, Andrew Cooper wrote:
>> c/s abdf3c5b "libxc: create p2m list outside of kernel mapping if supported"
>> introduces a use which Coverity objects to; an int used to mask a uint64_t.
>>
>> The result needs to be signed to al
On Thu, 2015-11-19 at 16:20 +, Stefano Stabellini wrote:
I'll just answer this bit, since it ties into your other answers, I think.
> Does the Xen<->libxc interface need to be stable for libxendevicemodel
> to have a stable ABI?
We could:
1) support multiple versions of Xen in a single libr
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 19 November 2015 16:07
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Cc: Ian Jackson; Stefano Stabellini; Ian Campbell; Wei Liu; Keir (Xen.org);
> Jan
> Beulich
> Subject: Re: [PATCH v3] x86/hvm/vi
On Thu, Nov 19, 2015 at 02:45:41PM +, Andrew Cooper wrote:
> c/s abdf3c5b "libxc: create p2m list outside of kernel mapping if supported"
> introduces a use which Coverity objects to; an int used to mask a uint64_t.
>
> The result needs to be signed to allow ~XC_DOM_PAGE_SIZE() to function
$
On Thu, Nov 19, 2015 at 05:11:08PM +0100, Juergen Gross wrote:
> Commit 81a76e4b12961a9f54f5021809074196dfe6dbba ("libxc: rework of
> domain builder's page table handler") dropped a special case for pvh
> resulting in page tables being mapped read-only. This led to a panic
> of the domain in early
Hi Wei,
On 11/19/2015 8:03 AM, Wei Liu wrote:
On Thu, Nov 19, 2015 at 09:55:00AM -0500, Neil Sikka wrote:
Is there any documentation about planned interfaces and API contracts for
people building around the virtio/9pfs layers? For example, while this is
I assume that you're interested in getti
On Wed, 21 Oct 2015, Ian Campbell wrote:
> (Trimming CCs a bit)
>
> On Wed, 2015-10-21 at 16:22 +0100, Ian Campbell wrote:
> >
> [...]
> > Still to come would be libraries for specific out of tree purposes
> > (device model, kexec), which would be adding new library at the same
> > level as libxc
On Thu, 19 Nov 2015, Paolo Bonzini wrote:
> On 19/11/2015 16:32, Stefano Stabellini wrote:
> > > In addition to Kevin's replies, I have a high-level question: can VFIO
> > > be used by QEMU for both KVM and Xen?
> >
> > No. VFIO cannot be used with Xen today. When running on Xen, the IOMMU
> > is
Commit 81a76e4b12961a9f54f5021809074196dfe6dbba ("libxc: rework of
domain builder's page table handler") dropped a special case for pvh
resulting in page tables being mapped read-only. This led to a panic
of the domain in early boot.
Correct this error.
Signed-off-by: Juergen Gross
---
tools/li
On 19/11/15 13:19, Paul Durrant wrote:
> @@ -561,10 +584,81 @@ int viridian_hypercall(struct cpu_user_regs *regs)
> switch ( input.call_code )
> {
> case HvNotifyLongSpinWait:
> +/*
> + * See Microsoft Hypervisor Top Level Spec. section 18.5.1.
> + */
>
Today mini-os is making assumptions how the page tables it is started
with are being allocated. Especially it is using the number of page
table frames to calculate which is the first unmapped pfn.
Instead of relying on page table number assumptions just look into the
page tables to find the first
On Thu, 2015-11-19 at 15:32 +, Stefano Stabellini wrote:
> On Thu, 19 Nov 2015, Jike Song wrote:
> > Hi Alex, thanks for the discussion.
> >
> > In addition to Kevin's replies, I have a high-level question: can VFIO
> > be used by QEMU for both KVM and Xen?
>
> No. VFIO cannot be used with Xe
On 19/11/2015 16:32, Stefano Stabellini wrote:
> > In addition to Kevin's replies, I have a high-level question: can VFIO
> > be used by QEMU for both KVM and Xen?
>
> No. VFIO cannot be used with Xen today. When running on Xen, the IOMMU
> is owned by Xen.
I don't think QEMU command line compa
George,
could I please get an ack or otherwise on
http://lists.xenproject.org/archives/html/xen-devel/2015-11/msg00764.html
http://lists.xenproject.org/archives/html/xen-devel/2015-11/msg00765.html
? While the latter has been reviewed by Andrew, it would feel wrong
to commit it without your ack, e
>>> On 19.11.15 at 14:19, wrote:
> The Microsoft Hypervisor Top Level Functional Spec. (section 3.4) defines
> two bits in CPUID leaf 0x4004:EAX for the hypervisor to recommend
> whether or not to issue a hypercall for local or remote TLB flush.
>
> Whilst it's doubtful whether using a hyperc
On Thu, Nov 19, 2015 at 11:23 AM, Ian Campbell wrote:
> create !
> title it libxl exit() on ENOMEM incompatible with gc'd languages
> thanks
Actually, can I suggest that someone send a new thread with an
appropriate title, so that people who aren't directly following the
thread know what kinds of
On Thu, 19 Nov 2015, Jike Song wrote:
> Hi Alex, thanks for the discussion.
>
> In addition to Kevin's replies, I have a high-level question: can VFIO
> be used by QEMU for both KVM and Xen?
No. VFIO cannot be used with Xen today. When running on Xen, the IOMMU
is owned by Xen.
_
On Mon, Nov 16, 2015 at 08:02:35PM -0700, Linda wrote:
> Hi Wei,
>
> On 11/16/2015 10:35 AM, Wei Liu wrote:
> >On Mon, Nov 16, 2015 at 10:22:41AM -0700, Linda wrote:
> ...
> >>
> >>The bug is a timing issue: During virtio's probe step, on the front end, it
> >>initialized the mount path. Since a
On Thu, Nov 19, 2015 at 09:55:00AM -0500, Neil Sikka wrote:
> Is there any documentation about planned interfaces and API contracts for
> people building around the virtio/9pfs layers? For example, while this is
I assume that you're interested in getting 9pfs to work but don't care
much about how
Hi Dario,
2015-11-19 4:51 GMT-05:00 Dario Faggioli :
> Hi,
>
> Thanks Tianyang for the report and for the patch, and Meng for helping
> getting the patch itself on the list and to me, and for commenting.
>
> On Wed, 2015-11-18 at 22:38 -0500, Meng Xu wrote:
>> [cc. Dario...]
>>
>> 2015-11-18 22:24
Is there any documentation about planned interfaces and API contracts for
people building around the virtio/9pfs layers? For example, while this is
still getting debugged/checked in, in order to build DomU support for these
devices, the expected API contracts/interfaces would need to be known.
On
Following on from IRC conversation regarding an issue similar to [0] (which
was reported by someone else).
I've implemented the missing hypercall support in valgrind, see attached
which applies to SVN r15732. This is migrating cleanly (i.e. no
"README_MISSING_SYSCALL_OR_IOCTL" spew) for me with th
c/s abdf3c5b "libxc: create p2m list outside of kernel mapping if supported"
introduces a use which Coverity objects to; an int used to mask a uint64_t.
The result needs to be signed to allow ~XC_DOM_PAGE_SIZE() to function
correctly, and long long to function properly in 32bit builds.
Signed-off
> -Original Message-
> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
> boun...@lists.xen.org] On Behalf Of Andrew Cooper
> Sent: Monday, November 16, 2015 8:01 PM
> To: Han, Huaitong ; jbeul...@suse.com; Nakajima,
> Jun ; Dong, Eddie ; Tian,
> Kevin ; george.dun...@eu.citrix.co
On 19/11/15 09:46, Jan Beulich wrote:
> In commit a85da715cf ("x86/IO-APIC: adjust setting of destinations") I
> made a pretty blatant mistake: get_apic_id() can be used there only
> when running APICs in physical mode. For both flat and clustered modes
> the change was wrong, causing different kin
On 11/19/2015 04:46 AM, Jan Beulich wrote:
In commit a85da715cf ("x86/IO-APIC: adjust setting of destinations") I
made a pretty blatant mistake: get_apic_id() can be used there only
when running APICs in physical mode. For both flat and clustered modes
the change was wrong, causing different kind
On 11/18/2015 10:03 PM, Jim Fehlig wrote:
> On 11/13/2015 06:14 AM, Joao Martins wrote:
>> Introduce support for connectGetAllDomainStats call that
>> allow us to _all_ domain(s) statistics including network, block,
>
> allows us to get
>
>> cpus and memory. Changes are rather mechanical and mo
On 11/18/2015 07:01 PM, Jim Fehlig wrote:
> On 11/13/2015 06:14 AM, Joao Martins wrote:
>> Introduce initial support for domainBlockStats API call that
>> allow us to query block device statistics. openstack nova
>> uses this API call to query block statistics, alongside
>> virDomainMemoryStats a
On 11/19/2015 01:09 AM, Juergen Gross wrote:
On 18/11/15 17:21, Boris Ostrovsky wrote:
On 11/18/2015 11:16 AM, Wei Liu wrote:
On Wed, Nov 18, 2015 at 11:11:16AM -0500, Boris Ostrovsky wrote:
On 11/12/2015 08:43 AM, Juergen Gross wrote:
In order to prepare a p2m list outside of the initial ker
The Microsoft Hypervisor Top Level Functional Spec. (section 3.4) defines
two bits in CPUID leaf 0x4004:EAX for the hypervisor to recommend
whether or not to issue a hypercall for local or remote TLB flush.
Whilst it's doubtful whether using a hypercall for local TLB flush would
be any more ef
flight 64729 linux-3.16 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64729/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 12 guest-start/redhat.repeat fail REGR.
vs. 63429
test-amd64-i3
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 19 November 2015 12:55
> To: Paul Durrant
> Cc: Andrew Cooper; Ian Campbell; Wei Liu; Ian Jackson; Stefano Stabellini;
> xen-de...@lists.xenproject.org; Keir (Xen.org)
> Subject: Re: [PATCH v2] x86/hvm/viridian: flu
>>> On 19.11.15 at 13:33, wrote:
> +case HvFlushVirtualAddressSpace:
> +case HvFlushVirtualAddressList:
> +{
> +cpumask_var_t pcpu_mask;
cpumask_t * (or else ... [skip next comment]
> +struct vcpu *v;
> +
> +struct {
Stray blank line.
> +uint64_t
This is a follow of commit 90f2e2a307fc6a6258c39cc87b3b2bf9441c0fa7 "use
masking operation instead of test_bit for MCSF bits" where the ARM
changes were missing.
Signed-off-by: Julien Grall
---
xen/arch/arm/domain.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch
libxl__exec() doesn't ever return. Inform the compiler of this, and
remove all dead code.
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
---
tools/libxl/libxl.c| 1 -
tools/libxl/libxl_aoutils.c| 2 --
tools/libxl/libxl_bo
On Thu, Nov 19, 2015 at 01:29:01PM +0100, Juergen Gross wrote:
[...]
> > To be precise, the problem is in mini-os, which is used by rump kernel
> > as well. :-(
> >
> >> pvgrub is making assumptions about the page table allocation scheme
> >> of the toolset starting pvgrub. It is calculating the f
The Microsoft Hypervisor Top Level Functional Spec. (section 3.4) defines
two bits in CPUID leaf 0x4004:EAX for the hypervisor to recommend
whether or not to issue a hypercall for local or remote TLB flush.
Whilst it's doubtful whether using a hypercall for local TLB flush would
be any more ef
On 19/11/15 13:19, Wei Liu wrote:
> On Thu, Nov 19, 2015 at 12:47:41PM +0100, Juergen Gross wrote:
>> On 19/11/15 11:30, Ian Campbell wrote:
>>> On Thu, 2015-11-19 at 11:24 +0100, Juergen Gross wrote:
On 18/11/15 15:49, Wei Liu wrote:
> Hi Juergen
>
> Looks like there is something
On Thu, 2015-11-19 at 11:55 +, Ian Campbell wrote:
> On Thu, 2015-11-19 at 11:48 +, Ian Campbell wrote:
> > On Thu, 2015-11-19 at 11:33 +, Andrew Cooper wrote:
> > >
> > > The majority of those are cases are not appropriate uses of exit().
> > > AFAIIR, the *only* valid use of exit()
On Thu, Nov 19, 2015 at 12:47:41PM +0100, Juergen Gross wrote:
> On 19/11/15 11:30, Ian Campbell wrote:
> > On Thu, 2015-11-19 at 11:24 +0100, Juergen Gross wrote:
> >> On 18/11/15 15:49, Wei Liu wrote:
> >>> Hi Juergen
> >>>
> >>> Looks like there is something we missed after all.
> >>>
> >>> On W
On Wed, Nov 18, 2015 at 03:06:16PM -0500, Boris Ostrovsky wrote:
> The first patch fixes Xen PV regression introduced by 32-bit rewrite. Unlike
> the
> earlier version it uses ALTERNATIVE instruction and avoids using xen_sysexit
> (and sysret32 in compat mode) pv ops, as suggested by Andy. (I ende
On Wed, Nov 18, 2015 at 12:21:56PM -0800, Andy Lutomirski wrote:
> Could we make this a little less subtle:
>
> ALTERNATIVE "testl %eax, %eax; lz .Lsyscall_32_done", "jmp
> .Lsyscasll_32_done", X86_FEATURE_XENPV
>
> Borislav, what do you think?
I don't mind either.
I would've said your version
On Thu, 2015-11-19 at 11:48 +, Ian Campbell wrote:
> On Thu, 2015-11-19 at 11:33 +, Andrew Cooper wrote:
> >
> > The majority of those are cases are not appropriate uses of exit().
> > AFAIIR, the *only* valid use of exit() in a library is to clean up in a
> > child process from a librar
On Thu, 2015-11-19 at 11:33 +, Andrew Cooper wrote:
>
> The majority of those are cases are not appropriate uses of exit().
> AFAIIR, the *only* valid use of exit() in a library is to clean up in a
> child process from a library-initiated fork().
... or (in this case) in the libxl-save-helpe
On 19/11/15 11:30, Ian Campbell wrote:
> On Thu, 2015-11-19 at 11:24 +0100, Juergen Gross wrote:
>> On 18/11/15 15:49, Wei Liu wrote:
>>> Hi Juergen
>>>
>>> Looks like there is something we missed after all.
>>>
>>> On Wed, Nov 18, 2015 at 02:31:57PM +, osstest service owner wrote:
flight
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 19 November 2015 10:18
> To: Paul Durrant
> Cc: Andrew Cooper; Ian Campbell; Wei Liu; Ian Jackson; Stefano Stabellini;
> xen-de...@lists.xenproject.org; Keir (Xen.org)
> Subject: Re: [PATCH v1] x86/hvm/viridian: flu
On 19/11/15 11:23, Ian Campbell wrote:
> create !
> title it libxl exit() on ENOMEM incompatible with gc'd languages
> thanks
Can this be extended to "should not use exit() in general" ?
andrewcoop@andrewcoop:/local/xen.git/xen$ git grep exit\( --
:/tools/libxl/libxl*
../tools/libxl/libxl.c:1707:
> -Original Message-
> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
> boun...@lists.xen.org] On Behalf Of Olaf Hering
> Sent: 18 November 2015 09:45
> To: George Dunlap
> Cc: xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] missing block script support for qemu in libxl
>
> O
Processing commands for x...@bugs.xenproject.org:
> create !
Created new bug #51 rooted at `<1447932195.5647.46.ca...@citrix.com>'
Title: `Re: [Xen-devel] Current LibXL Status'
> title it libxl exit() on ENOMEM incompatible with gc'd languages
Set title for #51 to `libxl exit() on ENOMEM incompati
create !
title it libxl exit() on ENOMEM incompatible with gc'd languages
thanks
On Thu, 2015-11-19 at 10:55 +, Andrew Cooper wrote:
> On 19/11/15 09:20, Ian Campbell wrote:
> > On Wed, 2015-11-18 at 18:32 +, Martin Osterloh wrote:
> >
> > > I wanted to inquire about the current state of
On 19/11/2015 09:40, Gerd Hoffmann wrote:
>> > But this code should be
>> > minor to be maintained in libvirt.
> As far I know libvirt only needs to discover those devices. If they
> look like sr/iov devices in sysfs this might work without any changes to
> libvirt.
I don't think they will look
On 19/11/15 11:30, Ian Campbell wrote:
> On Thu, 2015-11-19 at 11:24 +0100, Juergen Gross wrote:
>> On 18/11/15 15:49, Wei Liu wrote:
>>> Hi Juergen
>>>
>>> Looks like there is something we missed after all.
>>>
>>> On Wed, Nov 18, 2015 at 02:31:57PM +, osstest service owner wrote:
flight
flight 38310 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38310/
Perfect :-)
All tests in this flight passed
baseline version:
flight 38270
jobs:
build-amd64 pass
build-armhf
On Thu, Nov 19, 2015 at 10:55:13AM +, Ian Campbell wrote:
> On Thu, 2015-11-19 at 10:50 +, Wei Liu wrote:
> > On Thu, Nov 19, 2015 at 10:30:30AM +, Ian Campbell wrote:
> > > On Thu, 2015-11-19 at 11:24 +0100, Juergen Gross wrote:
> > > > On 18/11/15 15:49, Wei Liu wrote:
> > > > > Hi Ju
1 - 100 of 125 matches
Mail list logo