flight 66510 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66510/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 66415
build-i386-xsm
flight 66525 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66525/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 65543
test-amd64-i386-
flight 66520 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66520/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 5 xen-build fail REGR. vs. 66458
build-i386-prev
On Fri, Dec 18, 2015 at 11:24 PM, quizyjones wrote:
> Is there any progress?
Hey
I did look into this and I could not find the trace of what I have
done before. So I decided to ytu and port it to current version from
this Mukesh patch:
http://lists.xen.org/archives/html/xen-devel/2014-04/msg
Is there any progress?
> Date: Wed, 16 Dec 2015 09:42:47 -0500
> From: ufimts...@gmail.com
> To: konrad.w...@oracle.com
> CC: elena.ufimts...@oracle.com; quizy_jo...@outlook.com; t...@xen.org;
> xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] how to enable kdb for xen
>
> On Wed, Dec 16, 2015
How can the techniques gdbsx uses be adapted to a real-time monitoring of
nested hypercalls? I handled the breakpoints in L1 dom0, instead of the L1 xen
itself, just like dom0 handles the interrupt of domU. So it's not letting the
guest dealing with themselves, right?
To: quizy_jo...@outlook.com
On Wed, Dec 16, 2015 at 12:31:08PM +, Ian Campbell wrote:
> ... rather than in the libxc rule.
>
> This puts all the header dependencies in one place and will allow us
> to avoid races when more libraries which need these headers are
> introduced. I observed issues with the xen-foreign/tmp.siz
On Mon, Dec 14, 2015 at 11:55:45AM +, Ian Campbell wrote:
> Allows:
>
> (XEN) avc: denied { pcilevel } for domid=2 target=1
> scontext=system_u:system_r:dm_dom_t tcontext=system_u:system_r:domU_t_target
> tclass=hvm
>
Nice work fixing this. :-)
I did notice this when I first started, I
flight 66500 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66500/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 63732
Regressions which are
On 12/18/2015 04:47 AM, Michal Privoznik wrote:
> On 15.12.2015 23:20, Jim Fehlig wrote:
>> From: Ian Campbell
>>
>> xend prior to 4.0 understands vcpus as maxvcpus and vcpu_avail
>> as a bit map of which cpus are online (default is all).
>>
>> xend from 4.0 onwards understands maxvcpus as maxvcpu
flight 66479 linux-3.16 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66479/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 64969
Tests which are failin
On 18/12/2015 21:49, Doug Goldstein wrote:
> On 12/18/15 3:35 PM, Andrew Cooper wrote:
>> On 18/12/2015 20:06, Doug Goldstein wrote:
>>> Use the Kconfig generated CONFIG_COMPAT defines in the code base.
>>>
>>> CC: Keir Fraser
>>> CC: Jan Beulich
>>> CC: Andrew Cooper
>>> Signed-off-by: Doug Gol
On 12/18/15 3:35 PM, Andrew Cooper wrote:
> On 18/12/2015 20:06, Doug Goldstein wrote:
>> Use the Kconfig generated CONFIG_COMPAT defines in the code base.
>>
>> CC: Keir Fraser
>> CC: Jan Beulich
>> CC: Andrew Cooper
>> Signed-off-by: Doug Goldstein
>
> Reviewed-by: Andrew Cooper , although I
flight 66498 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66498/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-libvirt-vhd 9 debian-di-installfail like 66450
Tests which did not succeed, but a
On 18/12/2015 21:41, Jonathan Creekmore wrote:
> Instead of having a manually-curated list of schedulers, use the array
> that was auto-generated simply by compiling in the scheduler files as
> the sole source of truth of the available schedulers.
>
> CC: George Dunlap
> CC: Dario Faggioli
> Sign
Allow the schedulers to be independently enabled or disabled at
compile-time. To match existing behavior, all four schedulers are
compiled in by default, although the Credit2, RTDS, and ARINC653 are
marked EXPERIMENTAL to match their not currently supported status.
CC: George Dunlap
CC: Dario Fag
Add machinery to allow the schedulers to be individually selectable
through the Kconfig interface. The first patch in the series sets up
the Kconfig options for the schedulers and places the appropriate CONFIG_
options around the scheduler list. The second, third, and fourth patches
rework the sche
Instead of having a manually-curated list of schedulers, use the array
that was auto-generated simply by compiling in the scheduler files as
the sole source of truth of the available schedulers.
CC: George Dunlap
CC: Dario Faggioli
Signed-off-by: Jonathan Creekmore
Acked-by: Dario Faggioli
--
Adds a simple macro to place a pointer to a scheduler into an array
section at compile time. Also, goes ahead and generates the array
entries with each of the schedulers.
CC: George Dunlap
CC: Dario Faggioli
CC: Josh Whitehead
CC: Robert VanVossen
Signed-off-by: Jonathan Creekmore
Acked-by: D
Creates a section to contain scheduler entry pointers that are gathered
together into an array. This will allow, in a follow-on patch, scheduler
entries to be automatically gathered together into the array for
automatic parsing.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Be
We have split the setting up of all the resources in two steps:
1) talk_to_blkback - which figures out the num_ring_pages (from
the default value of zero), sets up shadow and so
2) blkfront_connect - does the real part of filling out the
internal structures.
The problem is if we bypass the
Since we now support changing Xen options with Kconfig, we should save
the configuration that was used to build up Xen. This will save it in
/boot alongside the installed xen.gz and call it
xen-$(FULLVERSION).config
Suggested-by: Ian Campbell
Signed-off-by: Doug Goldstein
---
xen/Makefile | 1 +
On 18/12/2015 20:06, Doug Goldstein wrote:
> Use the Kconfig generated CONFIG_COMPAT defines in the code base.
>
> CC: Keir Fraser
> CC: Jan Beulich
> CC: Andrew Cooper
> Signed-off-by: Doug Goldstein
Reviewed-by: Andrew Cooper , although I have
a slight quibble.
> ---
> This was previously A
On 18/12/2015 20:46, Konrad Rzeszutek Wilk wrote:
> Those two allow the OS pinned dom0 to change the T-state
> (throttling) behind the Xen cpufreq code.
>
> The patch that introduced this: f78e2193b6409577314167ed9e077de7ac3e652f
>
> x86: Enable THERM_CONTROL_MSR write for dom0 even when cpufre
On 18/12/2015 21:09, Boris Ostrovsky wrote:
> The tables are almost identical and therefore there is little reason to
> keep both sets.
>
> PVH needs 3 extra hypercalls:
> * mmuext_op. MMUEXT_PIN_L_TABLE are required by control domain (dom0)
> when building guests. We add MMUEXT_UNPIN_TABLE for c
The tables are almost identical and therefore there is little reason to
keep both sets.
PVH needs 3 extra hypercalls:
* mmuext_op. MMUEXT_PIN_L_TABLE are required by control domain (dom0)
when building guests. We add MMUEXT_UNPIN_TABLE for completeness.
* platform_op. These are only available to
flight 66473 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66473/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 3 host-install(3) broken REGR. vs.
66426
test-amd64-i3
This will allow OSSTest to run `make dist` for XEN_TARGET_ARCH=x86_32
but will still not build the hypervisor for x86_32.
Fixes: http://logs.test-lab.xenproject.org/osstest/logs/66454/
Signed-off-by: Doug Goldstein
---
xen/arch/x86/configs/x86_32_defconfig | 0
1 file changed, 0 insertions(+), 0
Those two allow the OS pinned dom0 to change the T-state
(throttling) behind the Xen cpufreq code.
The patch that introduced this: f78e2193b6409577314167ed9e077de7ac3e652f
x86: Enable THERM_CONTROL_MSR write for dom0 even when cpufreq=xen
Signed-off-by: Wei Gang
Signed-off-by: Keir
Hey,
I've gotten feedback from some of the internal BIOS folks who had
noticied some issues (the machine is running very slowly) which we found
out was due to the ACPI DSDT being busted and the Linux kernel (dom0)
programming the _wrong_ values in the T-state MSR.
While this got fixed in the BIOS
flight 66497 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66497/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 5 kernel-build fail REGR. vs. 60684
build-amd6
Use the Kconfig generated CONFIG_COMPAT defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
---
This was previously Acked-by: Jan Beulich but then
there was a request to change it to xen/common/Kconfig from
xen/arch/x86/Kconfig. Unfortunat
On 12/16/15 9:33 AM, Ian Campbell wrote:
> On Wed, 2015-12-16 at 15:06 +, Ian Campbell wrote:
>> -XENFIRMWAREDIR=`eval echo $libexecdir/$PACKAGE_TARNAME/boot`
>> +dnl These variables will be substituted in various .in files
>> +LIBEXEC_BIN=${LIBEXEC}/bin
>> +AC_SUBST(LIBEXEC_BIN)
>> +LIBEXEC_LI
This is provided explicitly in SVM and implicitly in VMX (when neither of
the three EPT_EFFECTIVE_* bits is set).
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
Cc: kevin.t...@intel.com
Cc: jun.nakaj...@intel.com
Cc: suravee.suthikulpa...@amd.com
Cc: aravind.gopalakrish...@amd.com
---
Commit 9256f66c1606 ("x86/PCI: intercept all PV Dom0 MMCFG writes")
added intercepts for writes to RO MMCFG space from PV dom0.
Similar functionality, including access to RO non-MMCFG addresses, is
needed by dom0s in HVM containers (such as PVH and, in the future,
HVMlite).
Signed-off-by: Boris O
v3 (patch 2 changes):
* Added handling of non-MMCFG addresses
* Factored out RO MMCFG test into pci_ro_mmcfg_decode()
* Renamed and changed arguments to hvm_emulate_one_mmio()
* Style/naming changes
Boris Ostrovsky (2):
x86/mm: Add information about faulted page's presence to npfec
struc
On December 18, 2015 10:50:40 AM PST, "Luis R. Rodriguez"
wrote:
>On Thu, Dec 17, 2015 at 08:25:19PM -0800, H. Peter Anvin wrote:
>> On 12/17/15 15:46, Luis R. Rodriguez wrote:
>> >
>> > I explain why I do that there but the gist of it is that on Linux
>we may also
>> > want stronger semantics f
On Thu, Dec 17, 2015 at 08:25:19PM -0800, H. Peter Anvin wrote:
> On 12/17/15 15:46, Luis R. Rodriguez wrote:
> >
> > I explain why I do that there but the gist of it is that on Linux we may
> > also
> > want stronger semantics for specific linker table solutions, and solutions
> > such
> > as t
This run is configured for baseline tests only.
flight 38534 xen-4.4-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38534/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 15 gues
On 18/12/15 17:56, Doug Goldstein wrote:
> On 12/18/15 4:45 AM, Ian Campbell wrote:
>> On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
>>> Add machinery to allow the schedulers to be individually selectable
>>> through the Kconfig interface.
>> So I don't want to pick on this series or
On 12/18/15 4:45 AM, Ian Campbell wrote:
> On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
>> Add machinery to allow the schedulers to be individually selectable
>> through the Kconfig interface.
>
> So I don't want to pick on this series or schedulers specifically here, but
> instead
On 18/12/15 17:33, Boris Ostrovsky wrote:
> On 12/18/2015 12:16 PM, Andrew Cooper wrote:
>> On 18/12/15 17:10, Jan Beulich wrote:
>> On 18.12.15 at 17:59, wrote:
On 18/12/15 16:37, Jan Beulich wrote:
On 18.12.15 at 17:28, wrote:
>> On 17/12/15 23:00, Boris Ostrovsky wrote:
>
On 12/18/2015 12:16 PM, Andrew Cooper wrote:
On 18/12/15 17:10, Jan Beulich wrote:
On 18.12.15 at 17:59, wrote:
On 18/12/15 16:37, Jan Beulich wrote:
On 18.12.15 at 17:28, wrote:
On 17/12/15 23:00, Boris Ostrovsky wrote:
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index a7767f8..871
On 18/12/15 17:24, Jonathan Creekmore wrote:
>> On Dec 18, 2015, at 10:43 AM, Jan Beulich wrote:
>>
> On 18.12.15 at 17:00, wrote:
>>> Jan Beulich writes:
>>> On 17.12.15 at 21:59, wrote:
> +extern const struct scheduler *__schedulers_start[], *__schedulers_end[];
> +#define NUM_
> On Dec 18, 2015, at 10:43 AM, Jan Beulich wrote:
>
On 18.12.15 at 17:00, wrote:
>> Jan Beulich writes:
>> On 17.12.15 at 21:59, wrote:
+extern const struct scheduler *__schedulers_start[], *__schedulers_end[];
+#define NUM_SCHEDULERS
>> (((uintptr_t)__schedulers_end-(uint
On 18/12/15 17:11, Jonathan Creekmore wrote:
>> On Dec 18, 2015, at 11:07 AM, Jan Beulich wrote:
>>
> On 18.12.15 at 17:48, wrote:
>>> On 18/12/15 16:40, Jonathan Creekmore wrote:
> On Dec 18, 2015, at 3:01 AM, Andrew Cooper
> wrote:
>
> On 17/12/2015 20:59, Jonathan Creekmo
On 18/12/15 17:10, Jan Beulich wrote:
On 18.12.15 at 17:59, wrote:
>> On 18/12/15 16:37, Jan Beulich wrote:
>> On 18.12.15 at 17:28, wrote:
On 17/12/15 23:00, Boris Ostrovsky wrote:
> diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
> index a7767f8..871aca0 100644
> --
> On Dec 18, 2015, at 11:07 AM, Jan Beulich wrote:
>
On 18.12.15 at 17:48, wrote:
>> On 18/12/15 16:40, Jonathan Creekmore wrote:
On Dec 18, 2015, at 3:01 AM, Andrew Cooper
wrote:
On 17/12/2015 20:59, Jonathan Creekmore wrote:
> Creates a section to contain sched
On 18/12/15 17:07, Jan Beulich wrote:
On 18.12.15 at 17:48, wrote:
>> On 18/12/15 16:40, Jonathan Creekmore wrote:
On Dec 18, 2015, at 3:01 AM, Andrew Cooper
wrote:
On 17/12/2015 20:59, Jonathan Creekmore wrote:
> Creates a section to contain scheduler entry pointers
>>> On 18.12.15 at 17:59, wrote:
> On 18/12/15 16:37, Jan Beulich wrote:
> On 18.12.15 at 17:28, wrote:
>>> On 17/12/15 23:00, Boris Ostrovsky wrote:
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index a7767f8..871aca0 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86
>>> On 18.12.15 at 17:48, wrote:
> On 18/12/15 16:40, Jonathan Creekmore wrote:
>>> On Dec 18, 2015, at 3:01 AM, Andrew Cooper
>>> wrote:
>>>
>>> On 17/12/2015 20:59, Jonathan Creekmore wrote:
Creates a section to contain scheduler entry pointers that are gathered
together into an arra
On 18/12/15 16:37, Jan Beulich wrote:
On 18.12.15 at 17:28, wrote:
>> On 17/12/15 23:00, Boris Ostrovsky wrote:
>>> diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
>>> index a7767f8..871aca0 100644
>>> --- a/xen/arch/x86/mm.c
>>> +++ b/xen/arch/x86/mm.c
>>> @@ -3019,6 +3019,25 @@ long do_m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.4-rc5-tag
xen: bug fixes for 4.4-rc5
- - XSA-155 security fixes to backend drivers.
- - XSA-157 security fixes to pciback.
Thanks.
Da
>>> On 18.12.15 at 15:09, wrote:
> atomic_compareandswap() used atomic_t as the new, old and returned
> values which is less convinient than using just int.
>
> Signed-off-by: David Vrabel
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-dev
On 12/18/2015 11:51 AM, Jan Beulich wrote:
For one, loading the MSR with a possibly non-canonical address was
possible since the verification is conditional, while the MSR load
wasn't. And then for PV guests we need to further limit the range of
valid addresses to exclude the hypervisor range.
S
>>> On 18.12.15 at 15:09, wrote:
> --- a/xen/common/spinlock.c
> +++ b/xen/common/spinlock.c
> @@ -16,7 +16,7 @@ static atomic_t spin_debug __read_mostly = ATOMIC_INIT(0);
>
> static void check_lock(struct lock_debug *debug)
> {
> -int irq_safe = !local_irq_is_enabled();
> +s16 irq_sa
On 12/18/2015 11:37 AM, Jan Beulich wrote:
On 18.12.15 at 17:28, wrote:
On 17/12/15 23:00, Boris Ostrovsky wrote:
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index a7767f8..871aca0 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -3019,6 +3019,25 @@ long do_mmuext_op(
flight 66531 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66531/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
osstest service owner writes ("[xen-4.6-testing test] 66466: trouble:
broken/fail/pass"):
> flight 66466 xen-4.6-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/66466/
>
> Failures and problems with tests :-(
>
> Tests which did not succeed and are blocking,
> including te
For one, loading the MSR with a possibly non-canonical address was
possible since the verification is conditional, while the MSR load
wasn't. And then for PV guests we need to further limit the range of
valid addresses to exclude the hypervisor range.
Signed-off-by: Jan Beulich
---
v2: Also alter
>>> On 18.12.15 at 17:00, wrote:
> Jan Beulich writes:
> On 17.12.15 at 21:59, wrote:
>>> +extern const struct scheduler *__schedulers_start[], *__schedulers_end[];
>>> +#define NUM_SCHEDULERS
> (((uintptr_t)__schedulers_end-(uintptr_t)__schedulers_start) \
>>> +/ siz
On 18/12/15 16:40, Jonathan Creekmore wrote:
>> On Dec 18, 2015, at 3:01 AM, Andrew Cooper wrote:
>>
>> On 17/12/2015 20:59, Jonathan Creekmore wrote:
>>> Creates a section to contain scheduler entry pointers that are gathered
>>> together into an array. This will allow, in a follow-on patch, sche
Andrew Cooper writes:
> On 17/12/2015 20:59, Jonathan Creekmore wrote:
>> Instead of having a manually-curated list of schedulers, use the array
>> that was auto-generated simply by compiling in the scheduler files as
>> the sole source of truth of the available schedulers.
>>
>> CC: George Dunla
Andrew Cooper writes:
> On 17/12/2015 20:59, Jonathan Creekmore wrote:
>> Allow the schedulers to be independently enabled or disabled at
>> compile-time instead of just allowing the scheduler to be selected on
>> the command line. To match existing behavior, all four schedulers are
>> compiled i
>>> On 18.12.15 at 17:08, wrote:
> The per domain grant table read lock suffers from significant contention when
> performance multi-queue block or network IO due to the parallel
> grant map/unmaps/copies occurring on the DomU's grant table.
>
> On multi-socket systems, the contention results in
> On Dec 18, 2015, at 3:01 AM, Andrew Cooper wrote:
>
> On 17/12/2015 20:59, Jonathan Creekmore wrote:
>> Creates a section to contain scheduler entry pointers that are gathered
>> together into an array. This will allow, in a follow-on patch, scheduler
>> entries to be automatically gathered to
>>> On 18.12.15 at 17:08, wrote:
> Per-cpu read-write locks allow for the fast path read case to have
> low overhead by only setting/clearing a per-cpu variable for using
> the read lock. The per-cpu read fast path also avoids locked
> compare swap operations which can be particularly slow on cohe
>>> On 18.12.15 at 17:28, wrote:
> On 17/12/15 23:00, Boris Ostrovsky wrote:
>> diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
>> index a7767f8..871aca0 100644
>> --- a/xen/arch/x86/mm.c
>> +++ b/xen/arch/x86/mm.c
>> @@ -3019,6 +3019,25 @@ long do_mmuext_op(
>> break;
>>
On 17/12/15 23:00, Boris Ostrovsky wrote:
> diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
> index a7767f8..871aca0 100644
> --- a/xen/arch/x86/mm.c
> +++ b/xen/arch/x86/mm.c
> @@ -3019,6 +3019,25 @@ long do_mmuext_op(
> break;
> }
>
> +if ( has_hvm_container_dom
flight 66475 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66475/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm5 xen-build fail REGR. vs. 66433
build-amd64
The per domain p2m read lock suffers from significant contention when
performance multi-queue block or network IO due to the parallel
grant map/unmaps/copies occuring on the DomU's p2m.
On multi-socket systems, the contention results in the locked compare swap
operation failing frequently which re
Per-cpu read-write locks allow for the fast path read case to have
low overhead by only setting/clearing a per-cpu variable for using
the read lock. The per-cpu read fast path also avoids locked
compare swap operations which can be particularly slow on coherent
multi-socket systems, particularly if
The per domain grant table read lock suffers from significant contention when
performance multi-queue block or network IO due to the parallel
grant map/unmaps/copies occurring on the DomU's grant table.
On multi-socket systems, the contention results in the locked compare swap
operation failing fr
This patch series adds per-cpu reader-writer locks as a generic lock
implementation and then converts the grant table and p2m rwlocks to
use the percpu rwlocks, in order to improve multi-socket host performance.
CPU profiling has revealed the rwlocks themselves suffer from severe cache
line bounci
flight 66466 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66466/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-amd 3 host-install(3) broken REGR. vs. 656
On 18 December 2015 at 15:17, Stefano Stabellini
wrote:
> The following changes since commit 18f49881cf8359e89396aac12f5d3cf3f8a632ba:
>
> configure: Fix shell syntax to placate OpenBSD's pdksh (2015-12-18 13:32:49
> +)
>
> are available in the git repository at:
>
> git://xenbits.xen.org
Jan Beulich writes:
On 17.12.15 at 21:59, wrote:
>> +extern const struct scheduler *__schedulers_start[], *__schedulers_end[];
>> +#define NUM_SCHEDULERS
>> (((uintptr_t)__schedulers_end-(uintptr_t)__schedulers_start) \
>> +/ sizeof(struct scheduler *))
>> +static c
flight 66463 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66463/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
65650
Regressions
On 18/12/15 15:47, Ian Campbell wrote:
> On Fri, 2015-12-18 at 14:09 +, David Vrabel wrote:
>> This series adds the qrwlocks from Linux.
>
> This really means "replace existing rwlock implementation with qrwlocks",
> right? i.e. you aren't actually adding a new set of rwlock primitives here,
>
On Fri, 2015-12-18 at 14:09 +, David Vrabel wrote:
> This series adds the qrwlocks from Linux.
This really means "replace existing rwlock implementation with qrwlocks",
right? i.e. you aren't actually adding a new set of rwlock primitives here,
you are just switching out the implementation beh
Michael, could you please backport these two patches? They should apply
fine.
On Fri, 18 Dec 2015, Stefano Stabellini wrote:
> The following changes since commit 18f49881cf8359e89396aac12f5d3cf3f8a632ba:
>
> configure: Fix shell syntax to placate OpenBSD's pdksh (2015-12-18 13:32:49
> +)
>
On 12/18/2015 10:19 AM, Jan Beulich wrote:
On 18.12.15 at 16:12, wrote:
On 12/18/2015 01:21 AM, Tian, Kevin wrote:
From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
Sent: Thursday, December 17, 2015 10:42 PM
On 12/17/2015 09:29 AM, Jan Beulich wrote:
On 17.12.15 at 15:26, wrote:
On
On 17/12/15 01:35, quizyjones wrote:
> Sorry for the late reply, there is something wrong in network which
> makes the email not delivered successfully.
> The inject method is by using xc_map_foreign_range to map the address
> of the nested xen and memcpy the trap to the specific location. If
> the
>>> On 18.12.15 at 16:12, wrote:
> On 12/18/2015 01:21 AM, Tian, Kevin wrote:
>>> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
>>> Sent: Thursday, December 17, 2015 10:42 PM
>>>
>>> On 12/17/2015 09:29 AM, Jan Beulich wrote:
>>> On 17.12.15 at 15:26, wrote:
> On 12/17/2015 09
Reading twice the same field could give the guest an attack of
opportunity. In the case of event->type, gcc could compile the switch
statement into a jump table, effectively ending up reading the type
field multiple times.
This is part of XSA-155.
Signed-off-by: Stefano Stabellini
---
hw/displa
src is stored in shared memory and src->nr_segments is dereferenced
twice at the end of the function. If a compiler decides to compile this
into two separate memory accesses then the size limitation could be
bypassed.
Fix it by removing the double access to src->nr_segments.
This is part of XSA-
The following changes since commit 18f49881cf8359e89396aac12f5d3cf3f8a632ba:
configure: Fix shell syntax to placate OpenBSD's pdksh (2015-12-18 13:32:49
+)
are available in the git repository at:
git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xsa155
for you to fetch changes
On 18/12/15 07:50, Jan Beulich wrote:
> ... since we don't need its virtual address anywhere (it's a
> placeholder page only after all). For this to work (and possibly be
> done elsewhere too) share_xen_page_with_guest() needs to mark pages
> handed to it as Xen heap ones.
>
> To be on the safe sid
>>> On 18.12.15 at 16:06, wrote:
> On 18/12/15 14:55, Juergen Gross wrote:
>> On 18/12/15 15:20, Doug Goldstein wrote:
>>> On 12/18/15 4:30 AM, Ian Campbell wrote:
On Tue, 2015-12-15 at 07:12 -0600, Doug Goldstein wrote:
> The following series is a follow on to the Kconfig conversion
On 18/12/15 15:03, Huaitong Han wrote:
> The check needs to be against the xsave header in the area, rather than Xen's
> maximum xfeature_mask. A guest might easily have a smaller xcr0 than the
> maximum Xen is willing to allow, causing the pointer below to be bogus.
>
> The get_xsave_addr() is mod
On 12/18/2015 01:21 AM, Tian, Kevin wrote:
From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
Sent: Thursday, December 17, 2015 10:42 PM
On 12/17/2015 09:29 AM, Jan Beulich wrote:
On 17.12.15 at 15:26, wrote:
On 12/17/2015 09:18 AM, Jan Beulich wrote:
On 17.12.15 at 15:12, wrote:
On
On Wed, 2 Dec 2015, Michael S. Tsirkin wrote:
> On Wed, Dec 02, 2015 at 05:16:18PM +, Stefano Stabellini wrote:
> > On Wed, 2 Dec 2015, Michael S. Tsirkin wrote:
> > > On Wed, Dec 02, 2015 at 04:56:21PM +, Stefano Stabellini wrote:
> > > > On Xen MSIs can be remapped into pirqs, which are a
On 18/12/15 14:55, Juergen Gross wrote:
> On 18/12/15 15:20, Doug Goldstein wrote:
>> On 12/18/15 4:30 AM, Ian Campbell wrote:
>>> On Tue, 2015-12-15 at 07:12 -0600, Doug Goldstein wrote:
The following series is a follow on to the Kconfig conversion
patch series.
>>> It occurred to me thi
On 18/12/15 15:47, Andrew Cooper wrote:
> On 18/12/15 14:34, Juergen Gross wrote:
>> xl list is currently limited to 1024 domains. Remove the limit.
>>
>> Signed-off-by: Juergen Gross
>
> libxl_list_vm() needs similar treatment. In fact, it looks as if it
> should be implemented in terms of libx
The check needs to be against the xsave header in the area, rather than Xen's
maximum xfeature_mask. A guest might easily have a smaller xcr0 than the
maximum Xen is willing to allow, causing the pointer below to be bogus.
The get_xsave_addr() is modified to support uncompressed xstate areas.
Sig
On 18/12/15 13:50, David Vrabel wrote:
> If a guest allocates a page and the tlbflush_timestamp on the page
> indicates that a TLB flush of the previous owner is required, only the
> linear and combined mappings are invalidated. The guest-physical
> mappings are not invalidated.
>
> This is curre
On 18/12/15 15:20, Doug Goldstein wrote:
> On 12/18/15 4:30 AM, Ian Campbell wrote:
>> On Tue, 2015-12-15 at 07:12 -0600, Doug Goldstein wrote:
>>> The following series is a follow on to the Kconfig conversion
>>> patch series.
>>
>> It occurred to me this morning that we probably ought to stash
>
On 18/12/15 15:42, Andrew Cooper wrote:
> On 18/12/15 13:14, Juergen Gross wrote:
>> When restarting or shutting down dom0 the xendomains script tries to
>> stop all other domains. Don't do this for the xenstore domain, as it
>> might survive a dom0 reboot in the future.
>>
>> The same applies to x
On 18/12/15 14:34, Juergen Gross wrote:
> xl list is currently limited to 1024 domains. Remove the limit.
>
> Signed-off-by: Juergen Gross
libxl_list_vm() needs similar treatment. In fact, it looks as if it
should be implemented in terms of libxl_list_domain(), rather than
opencoding similar sam
On Wed, Nov 04, 2015 at 10:57:35AM +, Ian Campbell wrote:
> On Mon, 2015-10-26 at 16:03 +, Anthony PERARD wrote:
> > The path to the ACPI tables blob can be override by xl's option
>
> "overridden"
>
> > acpi_table_override or by acpi_tables_filename in the domain_build_info
> > struct fo
1 - 100 of 202 matches
Mail list logo