On 02/12/2016 02:22 AM, Tamas K Lengyel wrote:
> Sending the dr7 register during vm_events is useful for various applications,
> but the current way the register value is gathered is incorrent. In this patch
> we extend vmx_vmcs_save so that we get the correct value.
>
> Suggested-by: Andrew Coope
On 02/12/2016 02:22 AM, Tamas K Lengyel wrote:
> Currently the registers saved in the request depend on which type of event
> is filling in the registers. In this patch we consolidate the two versions
> of register filling function as to return a fix set of registers irrespective
> of the underlyin
On 11/02/16 18:09, Daniel Kiper wrote:
> On Thu, Feb 11, 2016 at 01:38:10PM +0100, Juergen Gross wrote:
>> On 11/02/16 13:19, Daniel Kiper wrote:
>>> On Thu, Feb 11, 2016 at 08:53:21AM +0100, Juergen Gross wrote:
Do the p2m list allocation of the to be loaded kernel in a separate
function
On 11/02/16 18:14, Daniel Kiper wrote:
> On Thu, Feb 11, 2016 at 01:53:51PM +0100, Juergen Gross wrote:
>> On 11/02/16 13:27, Daniel Kiper wrote:
>>> On Thu, Feb 11, 2016 at 08:53:23AM +0100, Juergen Gross wrote:
Do the allocation of page tables in a separate function. This will
allow to
On 11/02/16 18:25, Daniel Kiper wrote:
> On Thu, Feb 11, 2016 at 03:13:40PM +0100, Juergen Gross wrote:
>> On 11/02/16 13:33, Daniel Kiper wrote:
>>> On Thu, Feb 11, 2016 at 08:53:24AM +0100, Juergen Gross wrote:
Modern pvops linux kernels support an initrd not covered by the initial
mapp
On 2/11/2016 5:44 PM, Tamas K Lengyel wrote:
* the #ifdefs make it possible for that code to be put in common
=> that makes it *clear* that those code parts are NOT
architecture specific and their implementation can be safely used
for all architectures.
The current practice has
flight 81763 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81763/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 15 guest-localmigrate/x10 fail
REGR. vs. 81424
test-ar
c/s 361b4f9f0f0d4adc19df428e224a7b8fa62cd392
"build: save generated xen .config" forgot to remove
the config file when uninstalling.
CC: ian.campb...@citrix.com
CC: jbeul...@suse.com
CC: car...@cardoe.com
CC: ian.jack...@eu.citrix.com
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/Makefile | 1 +
Otherwise any code that tries to use Elf_* macros instead of
Elf32_ or Elf_64 fails to compile.
CC: ian.campb...@citrix.com
CC: wei.l...@citrix.com
CC: stefano.stabell...@citrix.com
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/include/asm-arm/config.h | 2 ++
1 file changed, 2 insertions(+)
dif
While we are operating here we may as well fix some of the
file descriptor leaks.
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/arch/x86/boot/mkelf32.c | 28
1 file changed, 16 insertions(+), 12 deletions(-)
diff --git a/xen/arch/x86/boot/mkelf32.c b/xen/arch/x86/boo
We do not compile 32-bit hypervisor anymore so the code for
the ELFCLASS32 is effectively dead.
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/arch/x86/boot/mkelf32.c | 88 +++--
1 file changed, 28 insertions(+), 60 deletions(-)
diff --git a/xen/arch/x86/bo
This mismatch of patches came about as I was redoing the
xSplice patches based on reviews and splitting and/or doing some
extra things.
The first patch:
[PATCH v3 1/5] hypervisor/arm/keyhandler: Declare struct
Allows one to include the keyhandler.h (ARM one) file without having
extra header fi
in the keyhandler.h file. Otherwise on ARM builds if we
just use the keyhandler file - the compile will fail.
CC: ian.campb...@citrix.com
CC: wei.l...@citrix.com
CC: stefano.stabell...@citrix.com
Signed-off-by: Konrad Rzeszutek Wilk
---
xen/include/xen/keyhandler.h | 1 +
1 file changed, 1 inser
flight 81734 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81734/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 59254
build-i386-rumpuserxe
Currently the registers saved in the request depend on which type of event
is filling in the registers. In this patch we consolidate the two versions
of register filling function as to return a fix set of registers irrespective
of the underlying event.
Signed-off-by: Tamas K Lengyel
Cc: Razvan Co
Sending the dr7 register during vm_events is useful for various applications,
but the current way the register value is gathered is incorrent. In this patch
we extend vmx_vmcs_save so that we get the correct value.
Suggested-by: Andrew Cooper
Signed-off-by: Tamas K Lengyel
Cc: Jun Nakajima
Cc:
flight 81760 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81760/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-build fail REGR. vs. 79947
build-i386
On Thu, Feb 11, 2016 at 3:30 PM, Andrew Cooper
wrote:
> On 11/02/2016 22:25, Lengyel, Tamas wrote:
>
>
>
> On Thu, Feb 11, 2016 at 2:58 PM, Andrew Cooper
> wrote:
>
>> On 11/02/2016 21:49, Razvan Cojocaru wrote:
>> > On 02/11/2016 11:35 PM, Andrew Cooper wrote:
>> >> On 11/02/2016 21:05, Tamas K
On 11/02/2016 22:25, Lengyel, Tamas wrote:
>
>
> On Thu, Feb 11, 2016 at 2:58 PM, Andrew Cooper
> mailto:andrew.coop...@citrix.com>> wrote:
>
> On 11/02/2016 21:49, Razvan Cojocaru wrote:
> > On 02/11/2016 11:35 PM, Andrew Cooper wrote:
> >> On 11/02/2016 21:05, Tamas K Lengyel wrote:
>
On Thu, Feb 11, 2016 at 2:58 PM, Andrew Cooper
wrote:
> On 11/02/2016 21:49, Razvan Cojocaru wrote:
> > On 02/11/2016 11:35 PM, Andrew Cooper wrote:
> >> On 11/02/2016 21:05, Tamas K Lengyel wrote:
> >>
> >>> diff --git a/xen/arch/x86/vm_event.c b/xen/arch/x86/vm_event.c
> >>> index 08d678a..fa5d
On Thursday, February 11, 2016 04:04:14 PM Stefano Stabellini wrote:
> On Wed, 10 Feb 2016, Rafael J. Wysocki wrote:
> > On Tuesday, February 09, 2016 11:19:02 AM Stefano Stabellini wrote:
> > > On Mon, 8 Feb 2016, Rafael J. Wysocki wrote:
> > > > On Monday, February 08, 2016 10:57:01 AM Stefano St
On 2/11/16 1:25 PM, Andrew Cooper wrote:
> CentOS 7 gets into trouble when compiling Xen citing:
>
> flushtlb.c: Assembler messages:
> flushtlb.c:149: Error: value of 256 too large for field of 1 bytes at 1
>
> The line number is wrong, and the error message not helpful. It turns out
> that
On 11/02/2016 21:49, Razvan Cojocaru wrote:
> On 02/11/2016 11:35 PM, Andrew Cooper wrote:
>> On 11/02/2016 21:05, Tamas K Lengyel wrote:
>>
>>> diff --git a/xen/arch/x86/vm_event.c b/xen/arch/x86/vm_event.c
>>> index 08d678a..fa5d154 100644
>>> --- a/xen/arch/x86/vm_event.c
>>> +++ b/xen/arch/x86/
On 02/11/2016 11:35 PM, Andrew Cooper wrote:
> On 11/02/2016 21:05, Tamas K Lengyel wrote:
>
>> diff --git a/xen/arch/x86/vm_event.c b/xen/arch/x86/vm_event.c
>> index 08d678a..fa5d154 100644
>> --- a/xen/arch/x86/vm_event.c
>> +++ b/xen/arch/x86/vm_event.c
>> @@ -122,6 +122,64 @@ void vm_event_se
On 11/02/2016 21:05, Tamas K Lengyel wrote:
> diff --git a/xen/arch/x86/vm_event.c b/xen/arch/x86/vm_event.c
> index 08d678a..fa5d154 100644
> --- a/xen/arch/x86/vm_event.c
> +++ b/xen/arch/x86/vm_event.c
> @@ -122,6 +122,64 @@ void vm_event_set_registers(struct vcpu *v,
> vm_event_response_t *rs
On 02/11/2016 11:12 PM, Tamas K Lengyel wrote:
>
>
> On Thu, Feb 11, 2016 at 2:11 PM, Tamas K Lengyel
> mailto:tamas.k.leng...@gmail.com>> wrote:
>
>
>
> On Thu, Feb 11, 2016 at 1:59 PM, Razvan Cojocaru
> mailto:rcojoc...@bitdefender.com>> wrote:
>
> On 02/11/2016 10:38 PM, Ta
On Thu, Feb 11, 2016 at 2:11 PM, Tamas K Lengyel
wrote:
>
>
> On Thu, Feb 11, 2016 at 1:59 PM, Razvan Cojocaru <
> rcojoc...@bitdefender.com> wrote:
>
>> On 02/11/2016 10:38 PM, Tamas K Lengyel wrote:
>> >
>> >
>> > On Thu, Feb 11, 2016 at 1:13 PM, Razvan Cojocaru
>> > mailto:rcojoc...@bitdefende
On Thu, Feb 11, 2016 at 1:59 PM, Razvan Cojocaru
wrote:
> On 02/11/2016 10:38 PM, Tamas K Lengyel wrote:
> >
> >
> > On Thu, Feb 11, 2016 at 1:13 PM, Razvan Cojocaru
> > mailto:rcojoc...@bitdefender.com>> wrote:
> >
> > On 02/11/2016 10:04 PM, Andrew Cooper wrote:
> > > On 11/02/16 20:00,
The messages should be different depending on the type of error.
Signed-off-by: Konrad Rzeszutek Wilk
---
arch/x86/include/asm/xen/pci.h | 4 ++--
arch/x86/pci/xen.c | 5 -
2 files changed, 6 insertions(+), 3 deletions(-)
diff --git a/arch/x86/include/asm/xen/pci.h b/arch/x86/in
c/s 8135cf8b092723dbfcc611fe6fdcb3a36c9951c5
"xen/pciback: Save xen_pci_op commands before processing it"
would copyback the processed values - which was great.
However it missed the case that xen_pcibk_enable_msix - when
completing would overwrite op->value (which had the number
of MSI-X vectors
c/s 408fb0e5aa7fda0059db282ff58c3b2a4278baa0
"xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set."
would check the device for PCI_COMMAND_MEMORY which is great.
Except that VF devices are unique - for example they have no
legacy interrupts, and also any writes to PCI_COMMAND_MEMORY
Occasionaly PV guests would crash with:
pciback :00:00.1: Xen PCI mapped GSI0 to IRQ16
BUG: unable to handle kernel paging request at 000d1a8c0be0
.. snip..
] find_next_bit+0xb/0x10
[] cpumask_next_and+0x22/0x40
[] pci_device_probe+0xb8/0x120
[] ? driver_sysfs_add+0x77/0xa0
[] dr
Hey,
These are patches that were developed for the Debian bug
810379 which san Tommi had openned.
The issue around from the two XSA fixes - which introduced
this regression.
I am the person who developed them and my explanation for this
regression oversight is that I tested for the 'exploit use-
Currently the registers saved in the request depend on which type of event
is filling in the registers. In this patch we consolidate the two versions
of register filling function as to return a fix set of registers irrespective
of the underlying event.
Signed-off-by: Tamas K Lengyel
Cc: Razvan Co
On 02/11/2016 10:38 PM, Tamas K Lengyel wrote:
>
>
> On Thu, Feb 11, 2016 at 1:13 PM, Razvan Cojocaru
> mailto:rcojoc...@bitdefender.com>> wrote:
>
> On 02/11/2016 10:04 PM, Andrew Cooper wrote:
> > On 11/02/16 20:00, Razvan Cojocaru wrote:
> >> On 02/11/2016 09:55 PM, Andrew Cooper
flight 82022 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/82022/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Thu, Jan 21, 2016 at 4:42 PM, H. Peter Anvin wrote:
> On 01/21/16 16:25, Luis R. Rodriguez wrote:
>>>
>>> Basically, if the hardware is enumerable using standard PC mechanisms (PCI,
>>> ACPI) and doesn't need a special boot flow it should use type 0.
>>
>> I can extend the documentation as par
On Thu, Feb 11, 2016 at 1:13 PM, Razvan Cojocaru
wrote:
> On 02/11/2016 10:04 PM, Andrew Cooper wrote:
> > On 11/02/16 20:00, Razvan Cojocaru wrote:
> >> On 02/11/2016 09:55 PM, Andrew Cooper wrote:
> >>> On 11/02/16 19:54, Razvan Cojocaru wrote:
> On 02/11/2016 09:51 PM, Tamas K Lengyel wro
On 02/11/2016 10:04 PM, Andrew Cooper wrote:
> On 11/02/16 20:00, Razvan Cojocaru wrote:
>> On 02/11/2016 09:55 PM, Andrew Cooper wrote:
>>> On 11/02/16 19:54, Razvan Cojocaru wrote:
On 02/11/2016 09:51 PM, Tamas K Lengyel wrote:
> While the public vm_event header specifies fs_base/gs_base
On 11/02/16 20:00, Razvan Cojocaru wrote:
> On 02/11/2016 09:55 PM, Andrew Cooper wrote:
>> On 11/02/16 19:54, Razvan Cojocaru wrote:
>>> On 02/11/2016 09:51 PM, Tamas K Lengyel wrote:
While the public vm_event header specifies fs_base/gs_base as registers
that
should be recorded fo
On 02/11/2016 09:55 PM, Andrew Cooper wrote:
> On 11/02/16 19:54, Razvan Cojocaru wrote:
>> On 02/11/2016 09:51 PM, Tamas K Lengyel wrote:
>>> While the public vm_event header specifies fs_base/gs_base as registers that
>>> should be recorded for each event, that hasn't actually been the case. In
>
On Wed, Jan 20, 2016 at 1:41 PM, Luis R. Rodriguez
wrote:
> On Wed, Jan 20, 2016 at 1:14 PM, Konrad Rzeszutek Wilk
> wrote:
>> On Tue, Dec 15, 2015 at 02:16:35PM -0800, Luis R. Rodriguez wrote:
>>> From: "Luis R. Rodriguez"
>>>
>>> This also annotates this is only used for PC and
>>> lguest hard
On 11/02/16 19:54, Razvan Cojocaru wrote:
> On 02/11/2016 09:51 PM, Tamas K Lengyel wrote:
>> While the public vm_event header specifies fs_base/gs_base as registers that
>> should be recorded for each event, that hasn't actually been the case. In
>> this patch we remedy the issue.
>>
>> Signed-off
On 02/11/2016 09:51 PM, Tamas K Lengyel wrote:
> While the public vm_event header specifies fs_base/gs_base as registers that
> should be recorded for each event, that hasn't actually been the case. In
> this patch we remedy the issue.
>
> Signed-off-by: Tamas K Lengyel
> Cc: Razvan Cojocaru
> C
Otherwise, debug code such as "void __attribute__((noreturn)) foobar()" fails
to compile when the noreturn itself gets expanded, resulting in
__attribute__((__attribute__((noreturn.
No function change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: Ian Campbell
---
x
While the public vm_event header specifies fs_base/gs_base as registers that
should be recorded for each event, that hasn't actually been the case. In
this patch we remedy the issue.
Signed-off-by: Tamas K Lengyel
Cc: Razvan Cojocaru
Cc: Keir Fraser
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/
On 11/02/16 19:25, Andrew Cooper wrote:
> CentOS 7 gets into trouble when compiling Xen citing:
>
> flushtlb.c: Assembler messages:
> flushtlb.c:149: Error: value of 256 too large for field of 1 bytes at 1
>
> The line number is wrong, and the error message not helpful. It turns out
> that the
Nothing in the codebase uses them, and clang falls into the #error case
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/include/asm-x86/x86_64/efibind.h | 11 ---
1 file changed, 11 deletions(-)
diff --git a/xen/include/asm-x86/x86_64/efibind.h
b/xen/include/asm-x86/x86_64/ef
CentOS 7 gets into trouble when compiling Xen citing:
flushtlb.c: Assembler messages:
flushtlb.c:149: Error: value of 256 too large for field of 1 bytes at 1
The line number is wrong, and the error message not helpful. It turns out
that the intermediate generated assembly was
# 139 "arch/
flight 81646 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81646/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 60684
build-amd6
On Thu, Feb 11, 2016 at 10:13:18AM -0500, Boris Ostrovsky wrote:
> Commit a18a0f6850d4 ("x86, microcode: Don't initialize microcode code on
> paravirt") added a paravirt test in microcode_init(), primarily to avoid
> making mc_bp_resume()->load_ucode_ap()->check_loader_disabled_ap() calls
> On 32-b
This run is configured for baseline tests only.
flight 38738 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38738/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 9 debian-di-in
flight 81996 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81996/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 host-build-prep fail REGR. vs. 81826
Tests which di
On Thu, Feb 11, 2016 at 03:35:45PM +0100, Juergen Gross wrote:
> On 11/02/16 13:47, Daniel Kiper wrote:
> > On Thu, Feb 11, 2016 at 08:53:25AM +0100, Juergen Gross wrote:
> >> Modify the page table construction to allow multiple virtual regions
> >> to be mapped. This is done as preparation for rem
On 2/7/16 8:45 PM, Doug Goldstein wrote:
> This is just suppose to do a simple compile test on Travis CI. Currently
> due to linux86 (bcc/bin86/dev86) not being whitelisted the tools cannot
> be built.
>
> Signed-off-by: Doug Goldstein
ping?
--
Doug Goldstein
signature.asc
Description: Open
On Thu, 2016-02-11 at 06:24 -0700, Jan Beulich wrote:
> > > > On 11.02.16 at 12:38, wrote:
> > --- a/xen/include/xen/sched-if.h
> > +++ b/xen/include/xen/sched-if.h
> > @@ -144,7 +144,8 @@ struct scheduler {
> > void (*remove_vcpu)(const struct scheduler *,
> > struct vcpu *);
> >
On Thu, 2016-02-11 at 06:30 -0700, Jan Beulich wrote:
> > > > On 11.02.16 at 12:39, wrote:
> > --- a/xen/common/sched_credit.c
> > +++ b/xen/common/sched_credit.c
> > @@ -1022,11 +1022,14 @@ csched_vcpu_wake(const struct scheduler
> > *ops, struct vcpu *vc, unsigned wf)
> > * more CPU resour
On 2/9/16 6:33 PM, Dario Faggioli wrote:
> On Tue, 2016-02-09 at 17:09 +, Andrew Cooper wrote:
>> On 08/02/16 02:45, Doug Goldstein wrote:
>>> This is just suppose to do a simple compile test on Travis CI.
>>> Currently
>>> due to linux86 (bcc/bin86/dev86) not being whitelisted the tools
>>> ca
On Thu, Feb 11, 2016 at 03:13:40PM +0100, Juergen Gross wrote:
> On 11/02/16 13:33, Daniel Kiper wrote:
> > On Thu, Feb 11, 2016 at 08:53:24AM +0100, Juergen Gross wrote:
> >> Modern pvops linux kernels support an initrd not covered by the initial
> >> mapping. This capability is flagged by an elf-
On Thu, Feb 11, 2016 at 01:53:51PM +0100, Juergen Gross wrote:
> On 11/02/16 13:27, Daniel Kiper wrote:
> > On Thu, Feb 11, 2016 at 08:53:23AM +0100, Juergen Gross wrote:
> >> Do the allocation of page tables in a separate function. This will
> >> allow to do the allocation at different times of th
On Thu, 2016-02-11 at 16:30 +, Wei Liu wrote:
> On Thu, Feb 11, 2016 at 12:11:21PM +, Ian Campbell wrote:
> > QEMU upstream commit ed7f5f1d8db0 ("trace: convert stderr backend to
> > log") renamed the "stderr" trace backend to "log", which breaks the
> > xen build when pointed at a QEMU tre
On Thu, Feb 11, 2016 at 01:38:10PM +0100, Juergen Gross wrote:
> On 11/02/16 13:19, Daniel Kiper wrote:
> > On Thu, Feb 11, 2016 at 08:53:21AM +0100, Juergen Gross wrote:
> >> Do the p2m list allocation of the to be loaded kernel in a separate
> >> function. This will allow doing the p2m list alloc
On Thu, 2016-02-11 at 16:03 +, Ian Campbell wrote:
> On Thu, 2016-02-11 at 15:38 +, Olaf Hering wrote:
> > Correct dependencies for _paths.h to avoid build failure with make -j.
> > Only main.c requires _paths.h. This fixes commit 8398ec70 ("xenconsole:
> > Ensure exclusive access to consol
On 11/02/16 16:25, Carl Patenaude Poulin wrote:
> Hey folks,
>
> With gdbsx running, Running `gdb -ex "target remote localhost:"
> crashes Xen and reboots the server.
>
> Example session: http://i.imgur.com/UXh3RCy.png
>
> Minimal reproduction: https://github.com/lilred/xen-crash-repro
>
> Top
On Thu, Feb 11, 2016 at 12:11:21PM +, Ian Campbell wrote:
> QEMU upstream commit ed7f5f1d8db0 ("trace: convert stderr backend to
> log") renamed the "stderr" trace backend to "log", which breaks the
> xen build when pointed at a QEMU tree after that point:
>
> ./configure of QEMU fail with:
>
Hey folks,
With gdbsx running, Running `gdb -ex "target remote localhost:"
crashes Xen and reboots the server.
Example session: http://i.imgur.com/UXh3RCy.png
Minimal reproduction: https://github.com/lilred/xen-crash-repro
Top line of `xl dmesg`:
Xen version 4.6.0 (r...@cs.mcgill.ca) (
On Thu, 11 Feb 2016, Ian Campbell wrote:
> QEMU upstream commit ed7f5f1d8db0 ("trace: convert stderr backend to
> log") renamed the "stderr" trace backend to "log", which breaks the
> xen build when pointed at a QEMU tree after that point:
>
> ./configure of QEMU fail with:
> "ERROR: invalid trace
On Thu, 2016-02-11 at 15:38 +, Olaf Hering wrote:
> Correct dependencies for _paths.h to avoid build failure with make -j.
> Only main.c requires _paths.h. This fixes commit 8398ec70 ("xenconsole:
> Ensure exclusive access to console using locks")
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jack
On Wed, 10 Feb 2016, Rafael J. Wysocki wrote:
> On Tuesday, February 09, 2016 11:19:02 AM Stefano Stabellini wrote:
> > On Mon, 8 Feb 2016, Rafael J. Wysocki wrote:
> > > On Monday, February 08, 2016 10:57:01 AM Stefano Stabellini wrote:
> > > > On Sat, 6 Feb 2016, Rafael J. Wysocki wrote:
> > > >
On Thu, 2016-02-11 at 11:18 +, Wei Liu wrote:
> On Wed, Feb 10, 2016 at 04:26:24PM +, Ian Campbell wrote:
> > Otherwise the fd is leaked. NB the mmap'd memory in the global
> > cpu_qos_data[n] is not affected by closing the underlying fd.
> >
> > Compile tested only.
> >
> > CID: 1055930
On Thu, 2016-02-11 at 11:37 +, Wei Liu wrote:
> On Thu, Feb 11, 2016 at 09:23:54AM +, Ian Campbell wrote:
> > That is, if gc is not NOGC and ptr is not NULL then ptr must be
> > associated gc.
> >
>
> "associated with gc"?
>
> Anyway, I get the idea.
Yeah, apparently I was having langua
Correct dependencies for _paths.h to avoid build failure with make -j.
Only main.c requires _paths.h. This fixes commit 8398ec70 ("xenconsole:
Ensure exclusive access to console using locks")
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
S
On Thu, 2016-02-11 at 09:53 +, Ian Campbell wrote:
> On Wed, 2016-02-10 at 16:49 +, Paul Durrant wrote:
> > Unfortunately my patch 162a81ab "document control ring and toeplitz
> > hashing" contained a couple of typos. This patch fixes them.
> >
> > Signed-off-by: Paul Durrant
> > Cc: Ian
On Thu, 2016-02-11 at 06:32 -0700, Jan Beulich wrote:
> > > > On 11.02.16 at 14:21, wrote:
> > On Thu, 2016-02-11 at 12:31 +, Andrew Cooper wrote:
> > > On 11/02/16 12:23, Ian Campbell wrote:
> > > > From: Doug Goldstein
> > > >
> > > > To help people avoid having to figure out what versions
>
> * the #ifdefs make it possible for that code to be put in common => that
> makes it *clear* that those code parts are NOT
> architecture specific and their implementation can be safely used for all
> architectures.
>
The current practice has been to put empty static inline functions into
archi
Port vscsi=[] and scsi-{attach,detach,list} commands from xend to libxl.
libvirt uses its existing SCSI support:
http://lists.xenproject.org/archives/html/xen-devel/2015-04/msg02963.html
targetcli/rtslib has to be aware of xen-scsiback (upstream unresponsive):
http://article.gmane.org/gmane.linux
Signed-off-by: Olaf Hering
Acked-by: Ian Campbell
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
---
xen/include/public/io/vscsiif.h | 68 +
1 file changed, 68 insertions(+)
diff --git a/xen/include/public/io/vscsiif.
Just to make them public, not meant for merging:
The scripts used during development to create a bunch of SCSI devices in
dom0 using the Linux target framework. targetcli3 and rtslib3 is used.
A patch is required for python-rtslib:
http://article.gmane.org/gmane.linux.scsi.target.devel/8146
Signe
The pvops kernel expects either "naa.WWN:LUN" or "h:c:t:l" in the p-dev
property. Add the missing :LUN part to the comment.
Signed-off-by: Olaf Hering
Acked-by: Ian Campbell
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
---
xen/include/public/io/vscsiif.h
Port pvscsi support from xend to libxl:
vscsi=['pdev,vdev{,options}']
xl scsi-attach
xl scsi-detach
xl scsi-list
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
docs/man/xl.cfg.pod.5| 55 +++
docs/man/xl.pod.1
Signed-off-by: Olaf Hering
Acked-by: Ian Campbell
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
---
docs/misc/xenstore-paths.markdown | 10 ++
1 file changed, 10 insertions(+)
diff --git a/docs/misc/xenstore-paths.markdown
b/docs/misc/xenstore-pat
On Thu, 2016-02-11 at 11:27 +, Wei Liu wrote:
> On Wed, Feb 10, 2016 at 04:56:22PM +, Ian Campbell wrote:
> > Previously xs_fd would be left open, which is CID 1055993 (previously
> > partially fixed by 3bca826aae5eb).
> >
> > Instead arrange for both success and error cases to cleanup eve
On Wed, 2016-02-10 at 11:51 +, Ian Jackson wrote:
> Harmandeep Kaur writes ("[PATCH v2] libxc: fix leak in xc_offline_page
> error path"):
> > Avoid leaking the mapping of the m2p in one of the possible failure
> > cases.
> >
> > Coverity CID 1351225
> >
> > Signed-off-by: Harmandeep Kaur
>
Commit a18a0f6850d4 ("x86, microcode: Don't initialize microcode code on
paravirt") added a paravirt test in microcode_init(), primarily to avoid
making mc_bp_resume()->load_ucode_ap()->check_loader_disabled_ap() calls
On 32-bit kernels this callchain ends up using __pa_nodebug() macro
which is inv
On Thu, Feb 11, Olaf Hering wrote:
> I'm in the process to move the counter to the backend path.
... which fails due to libxl__device_exists(). So, back to /libxl
Olaf
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Fri, Feb 05, Olaf Hering wrote:
> +static int libxl__vscsictrl_next_vscsidev_id(libxl__gc *gc, uint32_t domid,
> + libxl_device_vscsictrl *vscsi,
> + libxl_devid *vscsidev_id)
> +{
> +path = GCSPRINTF("
On 11/02/16 13:47, Daniel Kiper wrote:
> On Thu, Feb 11, 2016 at 08:53:25AM +0100, Juergen Gross wrote:
>> Modify the page table construction to allow multiple virtual regions
>> to be mapped. This is done as preparation for removing the p2m list
>> from the initial kernel mapping in order to suppo
For first pass triage of crashes, it is useful to have the instruction
stream present, especially now that Xen binary patches itself.
A sample output now looks like:
(XEN) [ Xen-4.7-unstable x86_64 debug=y Not tainted ]
(XEN) CPU:0
(XEN) RIP:e008:[] default_idle+0x76/0x7b
(XEN)
On 11/02/16 13:33, Daniel Kiper wrote:
> On Thu, Feb 11, 2016 at 08:53:24AM +0100, Juergen Gross wrote:
>> Modern pvops linux kernels support an initrd not covered by the initial
>> mapping. This capability is flagged by an elf-note.
>>
>> In case the elf-note is set by the kernel don't place the i
>>> On 11.02.16 at 14:41, wrote:
> Wherever %rip is pointing, the code under %rip is directly relevant to
> the exact values of the registers and stack dump printed.
>
> It will be obvious from the numeric value of %rip whether it is bad
> (also, whether symbol information is found), and making i
flight 81641 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81641/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops3 host-install(3) broken in 81339 REGR. vs. 66399
build-amd64-rumpuserxen
On 11/02/16 12:52, Jan Beulich wrote:
On 11.02.16 at 13:12, wrote:
>> On 11/02/16 11:16, Jan Beulich wrote:
>> On 11.02.16 at 11:52, wrote:
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -114,6 +114,56 @@ boolean_param("ler", opt_ler);
#define stack_words_p
>>> On 11.02.16 at 14:21, wrote:
> On Thu, 2016-02-11 at 12:31 +, Andrew Cooper wrote:
>> On 11/02/16 12:23, Ian Campbell wrote:
>> > From: Doug Goldstein
>> >
>> > To help people avoid having to figure out what versions of gcc and
>> > binutils need to be supported document them explicitly.
>>> On 11.02.16 at 12:39, wrote:
> --- a/xen/common/sched_credit.c
> +++ b/xen/common/sched_credit.c
> @@ -1022,11 +1022,14 @@ csched_vcpu_wake(const struct scheduler *ops, struct
> vcpu *vc, unsigned wf)
> * more CPU resource intensive VCPUs without impacting overall
> * system fair
>>> On 11.02.16 at 12:38, wrote:
> --- a/xen/include/xen/sched-if.h
> +++ b/xen/include/xen/sched-if.h
> @@ -144,7 +144,8 @@ struct scheduler {
> void (*remove_vcpu)(const struct scheduler *, struct vcpu *);
>
> void (*sleep) (const struct scheduler *, stru
On Thu, 2016-02-11 at 12:31 +, Andrew Cooper wrote:
> On 11/02/16 12:23, Ian Campbell wrote:
> > From: Doug Goldstein
> >
> > To help people avoid having to figure out what versions of gcc and
> > binutils need to be supported document them explicitly.
> >
> > Signed-off-by: Doug Goldstein
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: 11 February 2016 12:11
> To: Ian Jackson; Wei Liu; xen-devel@lists.xen.org; Stefano Stabellini
> Cc: Ian Campbell; Paul Durrant; Anthony Perard
> Subject: [PATCH v2] tools: probe for existence of qemu-xen std
flight 81645 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/81645/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 4 host-ping-check-native fail REGR. vs. 80121
Tests which did not succe
On 11/02/16 13:27, Daniel Kiper wrote:
> On Thu, Feb 11, 2016 at 08:53:23AM +0100, Juergen Gross wrote:
>> Do the allocation of page tables in a separate function. This will
>> allow to do the allocation at different times of the boot preparations
>> depending on the features the kernel is supporti
>>> On 11.02.16 at 13:12, wrote:
> On 11/02/16 11:16, Jan Beulich wrote:
> On 11.02.16 at 11:52, wrote:
>>> --- a/xen/arch/x86/traps.c
>>> +++ b/xen/arch/x86/traps.c
>>> @@ -114,6 +114,56 @@ boolean_param("ler", opt_ler);
>>> #define stack_words_per_line 4
>>> #define ESP_BEFORE_EXCEPTION(r
1 - 100 of 152 matches
Mail list logo