flight 94559 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94559/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 81c1460695f783a3f91431b2babea623556a7f5d
baseline version:
ovmf 720eea6aa80b48acb05c1adc0f835e849d7
Hi Jan,
On 05/17/2016 09:25 AM, Jan Beulich wrote:
On 13.05.16 at 21:54, wrote:
--- a/xen/drivers/passthrough/amd/iommu_acpi.c
+++ b/xen/drivers/passthrough/amd/iommu_acpi.c
[...]
@@ -901,7 +911,7 @@ static int __init parse_ivhd_block(const struct
acpi_ivrs_hardware *ivhd_block)
>>> "Xu, Quan" 05/19/16 3:35 AM >>>
>On May 19, 2016 8:33 AM, Tian, Kevin wrote:
>> > From: Jan Beulich [mailto:jbeul...@suse.com]
>> > Sent: Wednesday, May 18, 2016 11:05 PM
>> > >>> On 18.05.16 at 14:53, wrote:
>> > The patch can imo remain as is only if the new default timeout is
>> > large e
>>> Suravee Suthikulpanit 05/19/16 7:22 AM >>>
>On 05/16/2016 03:19 AM, Paul Durrant wrote:
>> >From:suravee.suthikulpa...@amd.com
>> >Sent: 13 May 2016 20:37
>>> >The guest_iommu_init() is currently called by the following code path:
>>> >
>>> > arch/x86/domain.c: arch_domain_create()
>>> >
The pv_time_ops structure contains a function pointer for the
"steal_clock" functionality used only by KVM and Xen on ARM. Xen on x86
uses its own mechanism to account for the "stolen" time a thread wasn't
able to run due to hypervisor scheduling.
Add support in Xen arch independent time handling
On 18/05/16 18:13, Boris Ostrovsky wrote:
> On 05/18/2016 12:00 PM, Juergen Gross wrote:
>> On 18/05/16 17:53, Boris Ostrovsky wrote:
>>> On 05/18/2016 11:45 AM, David Vrabel wrote:
On 18/05/16 16:42, Juergen Gross wrote:
> On 18/05/16 17:25, Boris Ostrovsky wrote:
>> On 05/18/2016 10:
+ Keir (since he added this code originally).
On 05/16/2016 03:19 AM, Paul Durrant wrote:
-Original Message-
>From:suravee.suthikulpa...@amd.com
>[mailto:suravee.suthikulpa...@amd.com]
>Sent: 13 May 2016 20:37
>To:xen-devel@lists.xen.org; George Dunlap;jbeul...@suse.com
>Cc: Paul Durrant
flight 94548 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94548/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds15 guest-start/debian.repeat fail blocked in 93932
test-amd64-i386-xl-qemuu-w
flight 94555 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94555/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REG
in dump mode, when tracing context switches.
Signed-off-by: Dario Faggioli
---
Cc: George Dunlap
Cc: Ian Jackson
Cc: Wei Liu
---
tools/xentrace/xenalyze.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/xentrace/xenalyze.c b/tools/xentrace/xenalyze.c
index b949986
Hey Wei,
I know where we stand in the release process, but the patch is so trivial and
free of risks, and the trace output, with the spurious newline, so disturbing,
that I think this should go in.
Regards,
Dario
---
Dario Faggioli (1):
xenalyze: fix a spurious newline
tools/xentrace/xen
On Wed, 2016-05-18 at 12:03 -0600, Tony S wrote:
> On Wed, May 18, 2016 at 11:59 AM, Tony S
> wrote:
> > On Wed, May 18, 2016 at 11:20 AM, Boris Ostrovsky
> > wrote:
> > > Tony narrowed the problem down to update_curr() where vruntime is
> > > calculated, based on runqueue's clock_task value. Tha
On 5/17/16 4:08 PM, Konrad Rzeszutek Wilk wrote:
> On Tue, Apr 26, 2016 at 09:57:12AM +0100, Lars Kurth wrote:
>> Also adding Steve Maresca to the thread, who has been using XSM extensively
>> and also documenting XSM and can provide some user perspective
>> Lars
>>
>>> On 25 Apr 2016, at 20:51,
flight 94543 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94543/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-vhd 13 guest-saverestore fail REGR. vs. 93989
test-amd64-i386-x
On May 19, 2016 8:33 AM, Tian, Kevin wrote:
> > From: Jan Beulich [mailto:jbeul...@suse.com]
> > Sent: Wednesday, May 18, 2016 11:05 PM
> >
> > >>> On 18.05.16 at 14:53, wrote:
> > > On May 17, 2016 3:48 PM, Jan Beulich wrote:
> > >> >>> On 17.05.16 at 05:19, wrote:
> > >> >> From: Xu, Quan
>
On 2016-05-09 14:22, Steven Haigh wrote:
On 2016-05-05 15:52, Steven Haigh wrote:
On 2016-05-05 12:32, Steven Haigh wrote:
Overview
If you're using iSCSI, you can mount a target by multiple Dom0
machines on the same target. For non-cluster aware filesystems, this
can lead to disk corruption an
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, May 18, 2016 11:05 PM
>
> >>> On 18.05.16 at 14:53, wrote:
> > On May 17, 2016 3:48 PM, Jan Beulich wrote:
> >> >>> On 17.05.16 at 05:19, wrote:
> >> >> From: Xu, Quan
> >> >> Sent: Monday, May 16, 2016 11:26 PM
> >> >>
> >> >>
flight 94536 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94536/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail REGR. vs. 94487
Regressions which ar
This run is configured for baseline tests only.
flight 44430 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44430/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 720eea6aa80b48acb05c1adc0f835e849d71da97
baseline version:
ovm
flight 94557 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94557/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
flight 94541 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94541/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 720eea6aa80b48acb05c1adc0f835e849d71da97
baseline version:
ovmf b41ef32518095f783d0c2343b496cc857c6
On Wed, May 18, 2016 at 03:13:44PM -0400, Konrad Rzeszutek Wilk wrote:
> On Wed, May 18, 2016 at 08:43:02PM +0200, Peter Zijlstra wrote:
> >
> > We've unconditionally used the queued spinlock for many releases now.
>
> Like since 4.2?
Yeah, that seems to be the right number.
> I don't know of a
Hi Andrii,
On Wed, May 18, 2016 at 12:32 PM, Andrii Anisov
wrote:
> This series RFC patches from the currently ongoing production project.
> This patch series presents changes needed to fit the system into
> customer requirements as well as workaround limitations of the
> Jacinto6 SoC.
IMHO, it
On Wed, May 18, 2016 at 08:43:02PM +0200, Peter Zijlstra wrote:
>
> We've unconditionally used the queued spinlock for many releases now.
Like since 4.2? I don't know of any enterprise distro that is shipping anything
more modern than 4.1? Perhaps it would be good to wait until they
at least ship
flight 94539 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94539/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 guest-saverestorefail never pass
test-armhf-armhf-libvirt 12 migrate-sup
We've unconditionally used the queued spinlock for many releases now.
Its time to remove the old ticket lock code.
Cc: Waiman Long
Signed-off-by: Peter Zijlstra (Intel)
---
arch/x86/Kconfig | 3 +-
arch/x86/include/asm/paravirt.h | 18 ---
arch/x86/include/asm/pa
flight 94556 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94556/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Wed, May 18, 2016 at 11:59 AM, Tony S wrote:
> On Wed, May 18, 2016 at 11:20 AM, Boris Ostrovsky
> wrote:
>> On 05/18/2016 12:10 PM, Dario Faggioli wrote:
>>> On Wed, 2016-05-18 at 16:53 +0200, Juergen Gross wrote:
On 18/05/16 16:46, Boris Ostrovsky wrote:
>
> Won't we be accounti
On Wed, May 18, 2016 at 11:20 AM, Boris Ostrovsky
wrote:
> On 05/18/2016 12:10 PM, Dario Faggioli wrote:
>> On Wed, 2016-05-18 at 16:53 +0200, Juergen Gross wrote:
>>> On 18/05/16 16:46, Boris Ostrovsky wrote:
Won't we be accounting for stolen cycles twice now --- once from
steal_ac
Hello Andrii,
Thank you for your series. For the next version, can you CC the relevant
maintainers using scripts/get_maintainer.pl for each patch?
Regards,
On 18/05/2016 17:32, Andrii Anisov wrote:
This series RFC patches from the currently ongoing production project.
This patch series prese
On 05/18/2016 12:10 PM, Dario Faggioli wrote:
> On Wed, 2016-05-18 at 16:53 +0200, Juergen Gross wrote:
>> On 18/05/16 16:46, Boris Ostrovsky wrote:
>>>
>>> Won't we be accounting for stolen cycles twice now --- once from
>>> steal_account_process_tick()->steal_clock() and second time from
>>> do
This series RFC patches from the currently ongoing production project.
This patch series presents changes needed to fit the system into
customer requirements as well as workaround limitations of the
Jacinto6 SoC.
This patch series is not a full production branch upstream. Lacks of
the board specifi
From: Iurii Mykhalskyi
Looks like that from 4.6 version, Xen didn't allow irq forwarding
into DomU domains - in our setup we forward list of them, so we need
to changed the policy.
Signed-off-by: Iurii Mykhalskyi
---
tools/flask/policy/policy/modules/xen/xen.te | 1 +
1 file changed, 1 inserti
From: Iurii Mykhalskyi
This option enables separate memory allocation in
low & over 4GB address space.
With this option enabled in domain config files
"memory" parameter are used to specify domain low memory
"memory_high" - to specify over 4GB allocated memory
If you didn't specify high memory w
From: Iurii Konovalenko
For Dom0 with non-power-two memory size less then 128M allocation
of first memory bank fails. This patch fix it.
Signed-off-by: Iurii Konovalenko
---
xen/arch/arm/domain_build.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/arm/domain_buil
From: Iurii Konovalenko
Add abiliyty to allocate Xen heap in 32-bit address range for ARM32.
Due to architecture features some ARM32 platforms require Xen heap
to be allocated in lowmem.
Signed-off-by: Iurii Konovalenko
---
xen/Rules.mk | 1 +
xen/arch/arm/setup.c | 14 ++
From: Iurii Mykhalskyi
Add support of custom allocation of over 4GB memory for Dom0. Requested
memory size might be specified by passing dom0_mem_high option in Xen
cmdline
Signed-off-by: Iurii Mykhalskyi
---
xen/Rules.mk| 1 +
xen/arch/arm/domain_build.c | 189 ++
From: Oleksandr Dmytryshyn
This setting is used to adjust starting memory address allocated
for kernel Dom0. To use 'rambase_pfn' setting just add for example
'dom0_rambase_pfn=0x8' to the hypervisor command line. Note that
'dom0_rambase_pfn' should be aligned with the smallest memory chunk
w
From: Oleksandr Dmytryshyn
Signed-off-by: Oleksandr Dmytryshyn
Signed-off-by: Iurii Konovalenko
---
xen/arch/arm/mm.c | 33 +
xen/include/public/memory.h | 12 +++-
2 files changed, 44 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/mm.
From: Viktor Kleinik
During domain destroy we should change its state from "alive"
to "dying" to prevent reboot because of watchdog timeout.
Signed-off-by: Viktor Kleinik
---
tools/libxl/libxl.c | 4
1 file changed, 4 insertions(+)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
i
From: Andrii Tseglytskyi
This is done to allow possibility of having 1 to 1 memory mapping chunks
with size 1/128/256/512 Mb what can sagnificantly decrease time of memory
allocation and fragmentation for 1-to-1 mapped domains.
Signed-off-by: Andrii Tseglytskyi
Signed-off-by: Iurii Konovalenko
From: Viktor Kleinik
We need to parse config data during domain reboot
to get correct I/O memory regions for mapping.
Signed-off-by: Viktor Kleinik
---
tools/libxl/xl_cmdimpl.c | 15 +++
1 file changed, 15 insertions(+)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimp
This patch makes virtual disks helper scripts be functional
in busybox environment. Actually we call sh insteand of bash and
rewrite loop with counter to be properly parsed by ash.
Signed-off-by: Andrii Anisov
Signed-off-by: Andrii Tseglytskyi
---
tools/hotplug/Linux/block|
From: Iurii Konovalenko
Move Xen to the end of physical memory
Signed-off-by: Iurii Konovalenko
---
xen/Rules.mk | 1 +
xen/arch/arm/arm32/head.S | 21 -
xen/arch/arm/domain_build.c| 2 +-
xen/arch/arm/platforms/omap5.c | 17 ++---
x
From: Viktor Kleinik
Signed-off-by: Viktor Kleinik
---
tools/misc/xenwatchdogd.c | 4
1 file changed, 4 insertions(+)
diff --git a/tools/misc/xenwatchdogd.c b/tools/misc/xenwatchdogd.c
index 4b27628..fcf7d16 100644
--- a/tools/misc/xenwatchdogd.c
+++ b/tools/misc/xenwatchdogd.c
@@ -61,6 +
From: Andrii Tseglytskyi
Patch allows reassigning of hardware interrupts from dom0 to
other guest domain.
Signed-off-by: Andrii Tseglytskyi
Signed-off-by: Iurii Konovalenko
---
xen/arch/arm/irq.c | 19 +++
1 file changed, 15 insertions(+), 4 deletions(-)
diff --git a/xen/arch
From: Viktor Kleinik
This change allows watchdog daemon to work thru watchdog device
on the file system.
Signed-off-by: Viktor Kleinik
---
tools/misc/xenwatchdogd.c | 52 +++
1 file changed, 12 insertions(+), 40 deletions(-)
diff --git a/tools/misc/
From: Oleksandr Tyshchenko
In case of missing required property in cfg file
the default value (0x4) should be used.
Signed-off-by: Oleksandr Tyshchenko
Signed-off-by: Iurii Konovalenko
Signed-off-by: Iurii Mykhalskyi
---
tools/libxc/xc_dom_arm.c | 13 +++--
tools/libxl/libxl_
From: Sergiy Kibrik
xenkbd_raw carries raw linux event structure -- type, code & value,
which allows support of more devices (e.g. touchscreens).
Signed-off-by: Sergiy Kibrik
---
xen/include/public/io/kbdif.h | 10 ++
1 file changed, 10 insertions(+)
diff --git a/xen/include/public/io
From: Oleksandr Dmytryshyn
Signed-off-by: Oleksandr Dmytryshyn
Signed-off-by: Iurii Konovalenko
---
tools/xenstat/Makefile | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/tools/xenstat/Makefile b/tools/xenstat/Makefile
index 901be4a..440b1b7 100644
--- a/tools/xenstat/Ma
On 5/18/16 9:34 AM, Konrad Rzeszutek Wilk wrote:
> On Tue, May 17, 2016 at 09:01:00PM -0500, Doug Goldstein wrote:
>> On 5/17/16 8:57 PM, Doug Goldstein wrote:
>>> On 5/16/16 10:58 AM, Konrad Rzeszutek Wilk wrote:
And adjust the macro: atomic_inc_and_max to update the structure.
Sadl
On 18/05/16 18:09, Tony S wrote:
> On Wed, May 18, 2016 at 8:57 AM, Dario Faggioli
> wrote:
>> On Wed, 2016-05-18 at 14:24 +0200, Juergen Gross wrote:
>>> On 17/05/16 11:33, George Dunlap wrote:
> Looks like CONFIG_PARAVIRT_TIME_ACCOUNTING is used for adjusting
> process
> times. KVM u
On 05/18/2016 12:00 PM, Juergen Gross wrote:
> On 18/05/16 17:53, Boris Ostrovsky wrote:
>> On 05/18/2016 11:45 AM, David Vrabel wrote:
>>> On 18/05/16 16:42, Juergen Gross wrote:
On 18/05/16 17:25, Boris Ostrovsky wrote:
> On 05/18/2016 10:53 AM, Juergen Gross wrote:
>> On 18/05/16 16
On Wed, 2016-05-18 at 16:53 +0200, Juergen Gross wrote:
> On 18/05/16 16:46, Boris Ostrovsky wrote:
> >
> > Won't we be accounting for stolen cycles twice now --- once from
> > steal_account_process_tick()->steal_clock() and second time from
> > do_stolen_accounting()?
> Uuh, yes.
>
> I guess I s
On Wed, May 18, 2016 at 8:57 AM, Dario Faggioli
wrote:
> On Wed, 2016-05-18 at 14:24 +0200, Juergen Gross wrote:
>> On 17/05/16 11:33, George Dunlap wrote:
>> > > Looks like CONFIG_PARAVIRT_TIME_ACCOUNTING is used for adjusting
>> > > process
>> > > times. KVM uses it but Xen doesn't.
>> > Is some
On 18/05/16 17:53, Boris Ostrovsky wrote:
> On 05/18/2016 11:45 AM, David Vrabel wrote:
>> On 18/05/16 16:42, Juergen Gross wrote:
>>> On 18/05/16 17:25, Boris Ostrovsky wrote:
On 05/18/2016 10:53 AM, Juergen Gross wrote:
> On 18/05/16 16:46, Boris Ostrovsky wrote:
>> On 05/18/2016 08:
On 18/05/16 16:51, Juergen Gross wrote:
> On 18/05/16 17:45, David Vrabel wrote:
>> On 18/05/16 16:42, Juergen Gross wrote:
>>> On 18/05/16 17:25, Boris Ostrovsky wrote:
On 05/18/2016 10:53 AM, Juergen Gross wrote:
> On 18/05/16 16:46, Boris Ostrovsky wrote:
>> On 05/18/2016 08:15 AM,
On 05/18/2016 11:45 AM, David Vrabel wrote:
> On 18/05/16 16:42, Juergen Gross wrote:
>> On 18/05/16 17:25, Boris Ostrovsky wrote:
>>> On 05/18/2016 10:53 AM, Juergen Gross wrote:
On 18/05/16 16:46, Boris Ostrovsky wrote:
> On 05/18/2016 08:15 AM, Juergen Gross wrote:
>> }
>>
>>
On 18/05/16 17:45, David Vrabel wrote:
> On 18/05/16 16:42, Juergen Gross wrote:
>> On 18/05/16 17:25, Boris Ostrovsky wrote:
>>> On 05/18/2016 10:53 AM, Juergen Gross wrote:
On 18/05/16 16:46, Boris Ostrovsky wrote:
> On 05/18/2016 08:15 AM, Juergen Gross wrote:
>> }
>>
>>
On 18/05/16 16:42, Juergen Gross wrote:
> On 18/05/16 17:25, Boris Ostrovsky wrote:
>> On 05/18/2016 10:53 AM, Juergen Gross wrote:
>>> On 18/05/16 16:46, Boris Ostrovsky wrote:
On 05/18/2016 08:15 AM, Juergen Gross wrote:
> }
>
> +void __init xen_time_setup_guest(void)
> +{
On 18/05/16 17:25, Boris Ostrovsky wrote:
> On 05/18/2016 10:53 AM, Juergen Gross wrote:
>> On 18/05/16 16:46, Boris Ostrovsky wrote:
>>> On 05/18/2016 08:15 AM, Juergen Gross wrote:
}
+void __init xen_time_setup_guest(void)
+{
+ pv_time_ops.steal_clock = xen_steal_cloc
On Wed, May 18, 2016 at 03:55:42PM +0100, Paul Durrant wrote:
> A domain with a frontend that does not implement a control ring has been
> seen to cause a crash during domain save. This was apparently because
> the call to xenvif_deinit_hash() in xenvif_disconnect_ctrl() is made
> regardless of whe
In commit 31268fea (libxl: fix passing the type argument to xc_psr_*),
casting to xc psr type was done at each call site.
This patch consolidates casting into a function to avoid casting at each
conversion point. Each call site remains more type safe.
Signed-off-by: Wei Liu
Acked-by: Ian Jackson
On 05/18/2016 10:53 AM, Juergen Gross wrote:
> On 18/05/16 16:46, Boris Ostrovsky wrote:
>> On 05/18/2016 08:15 AM, Juergen Gross wrote:
>>> }
>>>
>>> +void __init xen_time_setup_guest(void)
>>> +{
>>> + pv_time_ops.steal_clock = xen_steal_clock;
>>> +
>>> + static_key_slow_inc(¶virt_steal_e
>>> On 18.05.16 at 16:41, wrote:
> On 13/05/16 10:32, Jan Beulich wrote:
>> Hi George,
>>
>> after quite a bit of debugging on 4.6.1 I learned that said commit
>> ("x86/P2M: consolidate handling of types not requiring a valid MFN")
>> is more than just cleanup: Since p2m_set_entry() happily perfo
>>> On 18.05.16 at 16:39, wrote:
> On 17.05.2016 17:34, Jan Beulich wrote:
>>> We use xenified kernels based on kernel 3.4 for years and benchmarks
>>> showed that they are faster than the pvops (vanilla) kernels.
>>> But what is the current state in terms of performance and features?
>> I'm not s
On Wed, May 18, 2016 at 08:49:01AM -0600, Jan Beulich wrote:
> This in particular prevents updating guest IP when handling the retry
> needed to forward the memory access to qemu.
>
> Signed-off-by: Jan Beulich
Release-acked-by: Wei Liu
>
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b
A domain with a frontend that does not implement a control ring has been
seen to cause a crash during domain save. This was apparently because
the call to xenvif_deinit_hash() in xenvif_disconnect_ctrl() is made
regardless of whether a control ring was connected, and hence
xenvif_hash_init() was ca
On Wed, May 18, 2016 at 03:45:22PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH v2 for-4.7 12/14] libxl: fix passing the type
> argument to xc_psr_*"):
> > On Thu, Apr 28, 2016 at 06:29:03PM +0100, Ian Jackson wrote:
> > > I'm very much against introducing casts which are not absolutely
>>> On 18.05.16 at 14:53, wrote:
> On May 17, 2016 3:48 PM, Jan Beulich wrote:
>> >>> On 17.05.16 at 05:19, wrote:
>> >> From: Xu, Quan
>> >> Sent: Monday, May 16, 2016 11:26 PM
>> >>
>> >> On May 13, 2016 11:28 PM, Jan Beulich wrote:
>> >> > >>> On 22.04.16 at 12:54, wrote:
>> >> > > --- a/d
> -Original Message-
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: 18 May 2016 15:57
> To: Paul Durrant; xen-devel
> Subject: Re: Saving a guest crashes dom0
>
> On 05/18/2016 10:27 AM, Paul Durrant wrote:
> > This should fix the problem for you:
>
>
> Yes, that doe
On 18/05/16 15:49, Jan Beulich wrote:
> This in particular prevents updating guest IP when handling the retry
> needed to forward the memory access to qemu.
>
> Signed-off-by: Jan Beulich
Oops.
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xe
flight 94551 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94551/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 05/18/2016 10:27 AM, Paul Durrant wrote:
> This should fix the problem for you:
Yes, that does it. Thanks.
-boris
>
> diff --git a/drivers/net/xen-netback/interface.c
> b/drivers/net/xen-netback/interface.c
> index 1c7f49b..83deeeb 100644
> --- a/drivers/net/xen-netback/interface.c
> +++ b
On Wed, 2016-05-18 at 14:24 +0200, Juergen Gross wrote:
> On 17/05/16 11:33, George Dunlap wrote:
> > > Looks like CONFIG_PARAVIRT_TIME_ACCOUNTING is used for adjusting
> > > process
> > > times. KVM uses it but Xen doesn't.
> > Is someone on the Linux side going to put this on their to-do list
> >
On 18/05/16 16:46, Boris Ostrovsky wrote:
> On 05/18/2016 08:15 AM, Juergen Gross wrote:
>> }
>>
>> +void __init xen_time_setup_guest(void)
>> +{
>> +pv_time_ops.steal_clock = xen_steal_clock;
>> +
>> +static_key_slow_inc(¶virt_steal_enabled);
>> +/*
>> + * We can't set paravirt_
On Tue, May 17, 2016 at 09:01:00PM -0500, Doug Goldstein wrote:
> On 5/17/16 8:57 PM, Doug Goldstein wrote:
> > On 5/16/16 10:58 AM, Konrad Rzeszutek Wilk wrote:
> >> And adjust the macro: atomic_inc_and_max to update the structure.
> >>
> >> Sadly one entry: pool->pgp_count cannot use this macro a
This in particular prevents updating guest IP when handling the retry
needed to forward the memory access to qemu.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -4178,6 +4178,8 @@ x86_emulate(
if ( !rc && (b & 1)
George Dunlap writes ("Re: [Xen-devel] [PATCH] MAINTAINERS: put docs/man/ under
tool stack"):
> On Mon, May 9, 2016 at 10:57 AM, Jan Beulich wrote:
> > Right now there's only tool stack related documentation there.
> >
> > Signed-off-by: Jan Beulich
>
> Acked-by: George Dunlap
>
> But I guess
flight 94533 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94533/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REG
On 05/18/2016 08:15 AM, Juergen Gross wrote:
> }
>
> +void __init xen_time_setup_guest(void)
> +{
> + pv_time_ops.steal_clock = xen_steal_clock;
> +
> + static_key_slow_inc(¶virt_steal_enabled);
> + /*
> + * We can't set paravirt_steal_rq_enabled as this would require the
> +
On 18/05/16 16:39, Ed Swierk wrote:
> Nice implementation. I tested it and it fixes the problem on the
> affected system.
>
> Just a minor typo in a comment: "it's duty" should be "its duty".
Thanks. Corrected and sent to lkml.
Juergen
___
Xen-devel
Wei Liu writes ("Re: [PATCH v2 for-4.7 12/14] libxl: fix passing the type
argument to xc_psr_*"):
> On Thu, Apr 28, 2016 at 06:29:03PM +0100, Ian Jackson wrote:
> > I'm very much against introducing casts which are not absolutely
> > necessary. Casts are a big hammer which can suppress important
Instead of having two functions for cycling through the E820 map in
order to count to be remapped pages and remap them later, just use one
function with a caller supplied sub-function called for each region to
be processed. This eliminates the possibility of a mismatch between
both loops which show
On 13/05/16 10:32, Jan Beulich wrote:
> Hi George,
>
> after quite a bit of debugging on 4.6.1 I learned that said commit
> ("x86/P2M: consolidate handling of types not requiring a valid MFN")
> is more than just cleanup: Since p2m_set_entry() happily performs
> arithmetic on the passed in MFN, sh
Nice implementation. I tested it and it fixes the problem on the affected
system.
Just a minor typo in a comment: "it's duty" should be "its duty".
--Ed
On Wed, May 18, 2016 at 4:44 AM, Juergen Gross wrote:
> On 17/05/16 22:50, Ed Swierk wrote:
> > I added some more instrumentation and discov
On 17.05.2016 17:34, Jan Beulich wrote:
We use xenified kernels based on kernel 3.4 for years and benchmarks
showed that they are faster than the pvops (vanilla) kernels.
But what is the current state in terms of performance and features?
I'm not sure what you expect here. Up to openSUSE 42.1 an
Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [PATCH for-qemu-trad] Fix build
with newer version of GNUTLS"):
> On Thu, May 05, 2016 at 11:14:44AM +0100, Wei Liu wrote:
> > Provide compatibility layer for QEMU traditional. This commit is in fact
> > backport of two upstream QEMU commits:
> > 1. f
On Tue, May 17, 2016 at 09:11:16PM -0500, Doug Goldstein wrote:
> On 5/16/16 10:58 AM, Konrad Rzeszutek Wilk wrote:
> > Hey,
> >
> > These four little cleanups move the bulk of tmem control ops
> > from tmem.c to tmem_control.c.
> >
> > Last release I moved the control tmem ops from being part of
> > -Original Message-
> > From: Paul Durrant
> > Sent: 18 May 2016 15:18
> > To: 'Boris Ostrovsky'; xen-devel
> > Subject: RE: Saving a guest crashes dom0
> >
> > > -Original Message-
> > > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> > > Sent: 18 May 2016 14:54
> >
flight 94530 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94530/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 7 host-ping-check-xen fail REGR. vs. 94506
test-armhf-armhf-xl
> -Original Message-
> From: Paul Durrant
> Sent: 18 May 2016 15:18
> To: 'Boris Ostrovsky'; xen-devel
> Subject: RE: Saving a guest crashes dom0
>
> > -Original Message-
> > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> > Sent: 18 May 2016 14:54
> > To: xen-devel; Pa
> -Original Message-
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: 18 May 2016 14:54
> To: xen-devel; Paul Durrant
> Subject: Saving a guest crashes dom0
>
> Saving a guest (xl save) crashes dom0, log below.
>
> Paul, this seems to be happening in the code that you m
This run is configured for baseline tests only.
flight 44429 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44429/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop
Saving a guest (xl save) crashes dom0, log below.
Paul, this seems to be happening in the code that you modified
recently. If you don't have time I can look at this but it will
probably have to wait until tomorrow.
-boris
[ 176.347760] BUG: unable to handle kernel NULL pointer dereference at
On Fri, May 13, 2016 at 06:25:41PM +0100, Andrew Cooper wrote:
> hostmode->p2m_ga_to_gfn() is a plain PT walker, and is not appropriate for a
> general L1 p2m walk. It is fine for AMD as NPT share the same format as
> normal pagetables. For Intel EPT however, it is wrong.
>
> The translation end
On Fri, May 13, 2016 at 6:25 PM, Andrew Cooper
wrote:
> hostmode->p2m_ga_to_gfn() is a plain PT walker, and is not appropriate for a
> general L1 p2m walk. It is fine for AMD as NPT share the same format as
> normal pagetables. For Intel EPT however, it is wrong.
>
> The translation ends up corr
The following libraries are checked:
1. libxc, version number bumped
2. libxl, version number bumped
3. libxlu, no development in 4.7 cycle, but depends on libxl, version
number bumped
4. libs/*, new in 4.7 cycle, version numbers not bumped
5. libxenstore, no development in 4.7 cycle, version nu
On Wed, May 18, 2016 at 02:32:15PM +0100, Wei Liu wrote:
> The following libraries are checked:
> 1. libxc, version number bumped
> 2. libxl, version number bumped
> 3. libxlu, no development in 4.7 cycle, version number not bumped
> 4. libs/*, new in 4.7 cycle, version number not bumped
> 5. libxe
The following libraries are checked:
1. libxc, version number bumped
2. libxl, version number bumped
3. libxlu, no development in 4.7 cycle, version number not bumped
4. libs/*, new in 4.7 cycle, version number not bumped
5. libxenstore, no development in 4.7 cycle, version number not bumped
6. lib
1 - 100 of 152 matches
Mail list logo