This run is configured for baseline tests only.
flight 67864 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67864/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4b8234d05400a852a42688fea14acc7ddeeebad4
baseline v
rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
execution debugger, would like to trap and emulate the CPUID instruction.
This would allow us to a) mask away certain hardware features that rr does
not support (e.g. RDRAND) and b) enable trace portability across machines
by
This run is configured for baseline tests only.
flight 67863 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67863/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 10 guest-start
flight 101381 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101381/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4b8234d05400a852a42688fea14acc7ddeeebad4
baseline version:
ovmf a4bcf0bcdd81285e2ae88
flight 101379 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101379/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 7 host-ping-check-xen fail REGR. vs. 101372
test-armhf-armhf-x
Sorry to be pushy - any feedback on this simple little patch?
Cheers.
Jun
On Mon, Oct 10, 2016 at 12:27 PM, Jun Sun wrote:
> Currently function p2m_restore_state() would clear HCR_VM bit, i.e.,
> disabling stage2 translation, before updating VTTBR register. After
> some research and talking to
This makes the code a little easier to read.
Moving hvm_altp2m_supported() check into functions that use it
for better readability.
Got rid of stray blanks after open paren after function names.
Defining _XEN_ASM_X86_P2M_H instead of _XEN_P2M_H for
xen/include/asm-x86/p2m.h.
Signed-off-by: Paul La
Signed-off-by: Paul Lai
Reviewed-by: Konrad Rzeszutek Wilk
---
v10
Added Reviewed-by stamp
---
xen/arch/x86/mm/p2m-ept.c | 39 +++
xen/arch/x86/mm/p2m.c | 43 ++-
2 files changed, 41 insertions(+), 41 deletions(-)
d
The altp2m clean work is motivated by the following URLs:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04454.html
Most of the work has been:
Lots of white space, indentation, and other coding style preference
corrections.
Lots of moving altp2m functions to the altp2m file.
Lo
On Wed, 28 Sep 2016, Konrad Rzeszutek Wilk wrote:
> On Wed, Sep 14, 2016 at 04:45:01PM -0700, Stefano Stabellini wrote:
> > Hi all,
>
> Hey!
>
> I took a look at the spec. It overall looks good with a detail
> of how each of the sub-commands works in exhaustive detail (which
> is awesome!).
Than
On 11/10/2016 22:11, Andrew Cooper wrote:
>
>>> Another interesting new warning that is fatal with -Werror is
>>> if(a)
>>> foo();
>>> bar();
>>>
>>> gcc warns that bar() is indented and maybe braces are needed.
>> Do we actually have cases like this ?
> Yes
>
>> Are they real
On 11/10/2016 14:32, Ian Jackson wrote:
> Boris Ostrovsky writes ("Re: [Xen-devel] [PATCH for-4.8] ipxe: update to
> newer commit"):
>> On 10/11/2016 05:52 AM, Ian Jackson wrote:
>>> Maybe we could consider these as backports to earlier releases.
>>> However, I looked at the patch and it mostly se
On 11/10/16 20:48, Konrad Rzeszutek Wilk wrote:
> On Tue, Oct 11, 2016 at 12:28:56PM -0700, Dan Williams wrote:
>> On Tue, Oct 11, 2016 at 11:33 AM, Konrad Rzeszutek Wilk
>> wrote:
>>> On Tue, Oct 11, 2016 at 10:51:19AM -0700, Dan Williams wrote:
>> [..]
Right, but why does the libnvdimm core
On Tue, Oct 11, 2016 at 12:48 PM, Konrad Rzeszutek Wilk
wrote:
> On Tue, Oct 11, 2016 at 12:28:56PM -0700, Dan Williams wrote:
>> On Tue, Oct 11, 2016 at 11:33 AM, Konrad Rzeszutek Wilk
>> wrote:
>> > On Tue, Oct 11, 2016 at 10:51:19AM -0700, Dan Williams wrote:
>> [..]
>> >> Right, but why does
On Tue, Oct 11, 2016 at 12:28:56PM -0700, Dan Williams wrote:
> On Tue, Oct 11, 2016 at 11:33 AM, Konrad Rzeszutek Wilk
> wrote:
> > On Tue, Oct 11, 2016 at 10:51:19AM -0700, Dan Williams wrote:
> [..]
> >> Right, but why does the libnvdimm core need to know about this
> >> specific Xen reservatio
On Tue, Oct 11, 2016 at 08:31:31PM +0100, Juergen Schinker wrote:
>
>
> >
> > We're going to tag rc2 some time this week. Thanks for help testing Xen!
> >
> > Wei.
> >
> >> J
> >>
> >> - On 11 Oct, 2016, at 09:37, Wei Liu wei.l...@citrix.com wrote:
> >>
> >> > No, you can try to work ar
> Andrew, why are you providing input to this so late?
First of sorry for this outburst. It was quite uncalled for and quite
unprofessional. You of all people have so much on your plate that I am
astonished that you are able to operate with some many pokers in the
fire.
Again, my sincere apology.
>
> We're going to tag rc2 some time this week. Thanks for help testing Xen!
>
> Wei.
>
>> J
>>
>> - On 11 Oct, 2016, at 09:37, Wei Liu wei.l...@citrix.com wrote:
>>
>> > No, you can try to work around this issue by appending --disable-rombios
>> > to your ./configure invocation. You ca
On 10/10/16 01:32, Haozhong Zhang wrote:
> Xen hypervisor does not include a pmem driver. Instead, it relies on the
> pmem driver in Dom0 to report the PFN ranges of the entire pmem region,
> its reserved area and data area via XENPF_pmem_add. The reserved area is
> used by Xen hypervisor to place
On Tue, Oct 11, 2016 at 11:33 AM, Konrad Rzeszutek Wilk
wrote:
> On Tue, Oct 11, 2016 at 10:51:19AM -0700, Dan Williams wrote:
[..]
>> Right, but why does the libnvdimm core need to know about this
>> specific Xen reservation? For example, if Xen wants some in-kernel
>
> Let me turn this around -
On Tue, Oct 11, 2016 at 03:20:49PM -0400, Konrad Rzeszutek Wilk wrote:
> On Tue, Oct 11, 2016 at 10:41:24AM -0700, Paul Lai wrote:
[snip]
> > +
> > +for ( i = 0; i < MAX_ALTP2M; i++ )
> > +{
> > +rc = p2m_alloc_table(d->arch.altp2m_p2m[i]);
> > +if ( rc != 0 ) {
>
> { shoul
On Tue, Oct 11, 2016 at 10:41:25AM -0700, Paul Lai wrote:
someting is off with your title. I think you need to add
an extra newline.
> Signed-off-by: Paul Lai
Patch wise:
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> v9
> Per request:
> o seperate patch for moving functions around
> o function na
On Tue, Oct 11, 2016 at 10:41:24AM -0700, Paul Lai wrote:
> This makes the code a little easier to read.
> Moving hvm_altp2m_supported() check into functions that use it
> for better readability.
> Got rid of stray blanks after open paren after function names.
> Defining _XEN_ASM_X86_P2M_H instead
This run is configured for baseline tests only.
flight 67862 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67862/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a4bcf0bcdd81285e2ae881db7a51a454f8ab0951
baseline v
On Tue, Oct 11, 2016 at 07:37:09PM +0100, Andrew Cooper wrote:
> On 11/10/16 06:52, Haozhong Zhang wrote:
> > On 10/10/16 17:43, Andrew Cooper wrote:
> >> On 10/10/16 01:35, Haozhong Zhang wrote:
> >>> Overview
> >>>
> >>> This RFC kernel patch series along with corresponding patch series
On Tue, Oct 11, 2016 at 07:37:09PM +0100, Andrew Cooper wrote:
> On 11/10/16 06:52, Haozhong Zhang wrote:
> > On 10/10/16 17:43, Andrew Cooper wrote:
> >> On 10/10/16 01:35, Haozhong Zhang wrote:
> >>> Overview
> >>>
> >>> This RFC kernel patch series along with corresponding patch series
flight 101372 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101372/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-xsm 18 leak-check/check fail in 101364 pass in 101372
test-armhf-armhf-xl-cubietruck 1
On Tue, Oct 11, 2016 at 07:15:42PM +0100, Andrew Cooper wrote:
> On 11/10/16 18:51, Dan Williams wrote:
> > On Tue, Oct 11, 2016 at 9:58 AM, Konrad Rzeszutek Wilk
> > wrote:
> >> On Tue, Oct 11, 2016 at 08:53:33AM -0700, Dan Williams wrote:
> >>> On Tue, Oct 11, 2016 at 6:08 AM, Jan Beulich wrote
On 11/10/16 06:52, Haozhong Zhang wrote:
> On 10/10/16 17:43, Andrew Cooper wrote:
>> On 10/10/16 01:35, Haozhong Zhang wrote:
>>> Overview
>>>
>>> This RFC kernel patch series along with corresponding patch series of
>>> Xen, QEMU and ndctl implements Xen vNVDIMM, which can map the host
>
On Tue, Oct 11, 2016 at 10:51:19AM -0700, Dan Williams wrote:
> 260sn3756f-1
> (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT)
> for ; Tue, 11 Oct 2016 17:51:21 +
> Received: by mail-oi0-f43.google.com with SMTP id d132so32700570oib.2
> for ; Tue, 11
On 11/10/16 18:51, Dan Williams wrote:
> On Tue, Oct 11, 2016 at 9:58 AM, Konrad Rzeszutek Wilk
> wrote:
>> On Tue, Oct 11, 2016 at 08:53:33AM -0700, Dan Williams wrote:
>>> On Tue, Oct 11, 2016 at 6:08 AM, Jan Beulich wrote:
>>> Andrew Cooper 10/10/16 6:44 PM >>>
> On 10/10/16 01:35, Ha
On Tue, Oct 11, 2016 at 9:58 AM, Konrad Rzeszutek Wilk
wrote:
> On Tue, Oct 11, 2016 at 08:53:33AM -0700, Dan Williams wrote:
>> On Tue, Oct 11, 2016 at 6:08 AM, Jan Beulich wrote:
>> Andrew Cooper 10/10/16 6:44 PM >>>
>> >>On 10/10/16 01:35, Haozhong Zhang wrote:
>> >>> Xen hypervisor need
The altp2m clean work is motivated by the following URLs:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04454.html
Most of the work has been:
Lots of white space, indentation, and other coding style preference
corrections.
Lots of moving altp2m functions to the altp2m file.
Lo
Signed-off-by: Paul Lai
---
v9
Per request:
o seperate patch for moving functions around
o function name to p2m_init_altp2m_ept() from p2m_init_altp2m_helper()
---
xen/arch/x86/mm/p2m-ept.c | 39 +++
xen/arch/x86/mm/p2m.c | 43 ++
This makes the code a little easier to read.
Moving hvm_altp2m_supported() check into functions that use it
for better readability.
Got rid of stray blanks after open paren after function names.
Defining _XEN_ASM_X86_P2M_H instead of _XEN_P2M_H for
xen/include/asm-x86/p2m.h.
Signed-off-by: Paul La
On 10/11/2016 10:54 AM, Ian Jackson wrote:
> Boris Ostrovsky writes ("Re: [Xen-devel] [PATCH for-4.8] ipxe: update to
> newer commit"):
>> We could but what if an old compiler doesn't support that option?
>> Although it looks like -Wno-, which is what we'd use, may be OK:
>>
>> ostr@workbase> gcc
On Tue, Oct 11, 2016 at 08:53:33AM -0700, Dan Williams wrote:
> On Tue, Oct 11, 2016 at 6:08 AM, Jan Beulich wrote:
> Andrew Cooper 10/10/16 6:44 PM >>>
> >>On 10/10/16 01:35, Haozhong Zhang wrote:
> >>> Xen hypervisor needs assistance from Dom0 Linux kernel for following
> >>> tasks:
> >>>
flight 101377 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101377/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a4bcf0bcdd81285e2ae881db7a51a454f8ab0951
baseline version:
ovmf b3b58d4da79639ffb02e9
flight 101374 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101374/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf 67a53d29ac26348ae56cbee924b411127ad7cc7b
baseline version:
xtf 37aadcc016ad2851a8ccd2
On Tue, Oct 11, 2016 at 10:29:52AM +0100, Wei Liu wrote:
> On Tue, Oct 11, 2016 at 03:41:16PM +0800, Haozhong Zhang wrote:
> > Hi Paul,
> >
> > On 10/10/16 13:31, Lai, Paul wrote:
> > > Hi Shannon:
> > >
> > > I’m reporting that commit 38cd0664a6bf1c3b887992ea029d2bb516f52c59 is
> > > causing a
This run is configured for baseline tests only.
flight 67861 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67861/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b3b58d4da79639ffb02e9a0556e21962bf918d1e
baseline v
This run is configured for baseline tests only.
flight 67860 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67860/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-build
flight 101376 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101376/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
> -Original Message-
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: 11 October 2016 16:48
> To: net...@vger.kernel.org
> Cc: David Vrabel ; xen-de...@lists.xenproject.org;
> Paul Durrant ; Wei Liu
> Subject: [PATCHv1 net] xen-netback: fix guest Rx stall detection (after gues
On Tue, Oct 11, 2016 at 6:08 AM, Jan Beulich wrote:
Andrew Cooper 10/10/16 6:44 PM >>>
>>On 10/10/16 01:35, Haozhong Zhang wrote:
>>> Xen hypervisor needs assistance from Dom0 Linux kernel for following tasks:
>>> 1) Reserve an area on NVDIMM devices for Xen hypervisor to place
>>>memory
If a VIF has been ready for rx_stall_timeout (60s by default) and an
Rx ring is drained of all requests an Rx stall will be incorrectly
detected. When this occurs and the guest Rx queue is empty, the Rx
ring's event index will not be set and the frontend will not raise an
event when new requests a
Dear Outreachy mentors,
if you are working with one or several Outreachy acandidates, please make sure
you sign up to https://outreachy.gnome.org under Xen Project as a mentor. You
may also want to remind your applicants that the proposal submission deadline
is coming up. Note that applicants c
On Thu, Oct 06, 2016 at 09:14:18AM -0600, Jan Beulich wrote:
> >>> On 27.09.16 at 17:57, wrote:
> > +start_info.modlist_paddr = last_addr;
> > +start_info.nr_modules = 1;
> > +last_addr += sizeof(mod);
>
> How can this be unconditionally 1? It is certainly possible to boot
> without i
Boris Ostrovsky writes ("Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer
commit"):
> We could but what if an old compiler doesn't support that option?
> Although it looks like -Wno-, which is what we'd use, may be OK:
>
> ostr@workbase> gcc foo.c
> ostr@workbase> gcc -Wfoo foo.c
> gcc: erro
Lars Kurth writes ("Re: Proposed plan and URL name for new VM to download xen
tarballs (ftp.xenproject.org)"):
> > On 4 Oct 2016, at 16:20, Ian Jackson wrote:
> > See https://downloads.xenproject.org/ for the result.
>
> As far as I can see, these are at https://downloads.xenproject.org/release/
On 10/11/2016 03:22 AM, Markus Armbruster wrote:
> query-memory-devices returns a list of MemoryDeviceInfo:
>
> ##
> # @MemoryDeviceInfo:
> #
> # Union containing information about a memory device
> #
> # Since: 2.1
> ##
> { 'union': 'MemoryDeviceInfo', 'data': {'d
On Tue, Oct 04, 2016 at 09:43:32AM +0300, Emil Condrea wrote:
> The purpose of the new file is to store generic functions shared by frontend
> and backends such as xenstore operations, xendevs.
>
> Signed-off-by: Quan Xu
> Signed-off-by: Emil Condrea
Looks good, once the comments on the previou
On 10/11/2016 09:32 AM, Ian Jackson wrote:
> Boris Ostrovsky writes ("Re: [Xen-devel] [PATCH for-4.8] ipxe: update to
> newer commit"):
>> On 10/11/2016 05:52 AM, Ian Jackson wrote:
>>> Maybe we could consider these as backports to earlier releases.
>>> However, I looked at the patch and it mostly
On Tue, Oct 04, 2016 at 09:43:31AM +0300, Emil Condrea wrote:
> Fixes:
> * WARNING: line over 80 characters
>
> Signed-off-by: Emil Condrea
> ---
> hw/block/xen_disk.c | 3 ++-
> hw/char/xen_console.c| 6 --
> hw/display/xenfb.c | 30
Ian,
thank you!
> On 4 Oct 2016, at 16:20, Ian Jackson wrote:
>
> Lars Kurth writes ("Re: Proposed plan and URL name for new VM to download xen
> tarballs (ftp.xenproject.org)"):
>> Using downloads.xenproject.org seems to be the best way then.
>
> I have:
>
> * Used cvs-repomove to move the
flight 101370 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101370/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b3b58d4da79639ffb02e9a0556e21962bf918d1e
baseline version:
ovmf 3643e8e70d3053476aeec
It seems like I've forgotten to answer one of your comments in a previous
email, sorry.
On Fri, Sep 30, 2016 at 09:52:56AM -0600, Jan Beulich wrote:
> >>> On 27.09.16 at 17:57, wrote:
> > + * VM86 TSS. Note that after this not all e820 regions will be aligned
> > + * to PAGE_SIZE.
> > +
On Tue, Oct 04, 2016 at 05:16:09AM -0600, Jan Beulich wrote:
> >>> On 04.10.16 at 11:12, wrote:
> > On Fri, Sep 30, 2016 at 09:52:56AM -0600, Jan Beulich wrote:
> >> >>> On 27.09.16 at 17:57, wrote:
> >> > @@ -336,7 +343,8 @@ static unsigned long __init compute_dom0_nr_pages(
> >> > avai
On 04/07/16 12:53, Daniel Kiper wrote:
> On Mon, Jul 04, 2016 at 12:33:17PM +0200, Juergen Gross wrote:
>> On 12/05/16 07:35, Juergen Gross wrote:
>>> Gentle ping...
>>
>> Okay, now 4 months since posting the last version. Could it please be
>> included in a more timely manner?
>
> Juergen and oth
On Tue, Oct 04, 2016 at 09:43:30AM +0300, Emil Condrea wrote:
> Fixes the following errors:
> * ERROR: line over 90 characters
It's 80 ;), and there are a few more left in this patch.
> * ERROR: code indent should never use tabs
> * ERROR: space prohibited after that open square bracket '['
>
Julien Grall writes ("Re: [OSSTEST PATCH 1/2] libvirt: Check migration
capabilities using proper XML parser"):
> live migration is not currently the supported but will be in the future.
> FWIW, there is a patch series on xen-devel to support dead migration
> (first step for live migration) [1].
Hi Ian,
On 06/10/16 11:00, Ian Jackson wrote:
Julien Grall writes ("Re: [OSSTEST PATCH 1/2] libvirt: Check migration capabilities
using proper XML parser"):
On 04/10/2016 10:05, Ian Jackson wrote:
Missing _. I didn't test this again before sending it. I'd still
like a review from libvirt (a
Hello Jan,
On 06/10/16 13:21, Jan Beulich wrote:
On 05.10.16 at 20:30, wrote:
On 30/09/2016 02:46, Jan Beulich wrote:
On 29.09.16 at 23:42, wrote:
+#else
+static void __init free_ebmalloc_unused_mem(void)
+{
+}
+#endif
Did you build test this for ARM? The function ought to be unused,
as .
Boris Ostrovsky writes ("Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer
commit"):
> On 10/11/2016 05:52 AM, Ian Jackson wrote:
> > Maybe we could consider these as backports to earlier releases.
> > However, I looked at the patch and it mostly seems to be removing null
> > pointer checks.
>>> Andrew Cooper 10/10/16 6:44 PM >>>
>On 10/10/16 01:35, Haozhong Zhang wrote:
>> Xen hypervisor needs assistance from Dom0 Linux kernel for following tasks:
>> 1) Reserve an area on NVDIMM devices for Xen hypervisor to place
>>memory management data structures, i.e. frame table and M2P tabl
On 10/11/2016 05:52 AM, Ian Jackson wrote:
> Boris Ostrovsky writes ("Re: [Xen-devel] [PATCH for-4.8] ipxe: update to
> newer commit"):
>> On 10/10/2016 12:33 PM, Wei Liu wrote:
>>> Sure. I will check ipxe mailing list in one week.
>> FWIW, here is the patch that I used to pacify gcc.
> Thanks. I
>>> Maciek 10/10/16 10:17 PM >>>
First of all - please don't top post.
>In driver initialization we can call sriov_configure to turn on SRIOV
>and enable VFs.
>To be able to run on VM using VF we need IOMMU enabled (currently we
>recommend our
>customers to add parameter to kernel intel_iommu=
>>> He Chen 10/11/16 4:24 AM >>>
>Apologies for sending out a patch without testing it entirely.
>To be honest, I am not so fimilar with 32-bit PV guest...
>I create a HVM guest and then compile linux kernel with the configuration
>suggested by https://wiki.xen.org/wiki/Mainline_Linux_Kernel_Confi
flight 101373 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101373/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf 37aadcc016ad2851a8ccd23436c5436fce75b3e6
baseline version:
xtf 50b7556924ad173285f411
> -Original Message-
> From: Juergen Gross [mailto:jgr...@suse.com]
> Sent: 11 October 2016 12:34
> To: linux-ker...@vger.kernel.org; xen-devel@lists.xen.org
> Cc: David Vrabel ; boris.ostrov...@oracle.com;
> Paul Durrant ; Juergen Gross
> Subject: [PATCH v2] xenbus: advertise control feat
> -Original Message-
> From: Tian, Kevin
> Sent: Tuesday, October 11, 2016 4:38 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: jbeul...@suse.com; andrew.coop...@citrix.com;
> george.dun...@eu.citrix.com; dario.faggi...@citrix.com
> Subject: RE: [PATCH v5 7/7] VMX: Fixup PI descriptor w
The Xen docs specify several flags which a guest can set to advertise
which values of the xenstore control/shutdown key it will recognize.
This patch adds code to write all the relevant feature-flag keys.
Based-on-patch-by: Paul Durrant
Signed-off-by: Juergen Gross
Reviewed-by: David Vrabel
---
On 11/10/16 11:53, Juergen Gross wrote:
> On 10/10/16 12:13, Paul Durrant wrote:
>> The Xen docs specify several flags which a guest can set to advertize
>> which values of the xenstore control/shutdown key it will recognize.
>> This patch adds code to write all the relevant feature-flag keys.
>>
>
On October 11, 2016 3:49 PM, Tian, Kevin
>> From: Xuquan (Quan Xu) [mailto:xuqu...@huawei.com]
>> Sent: Monday, October 10, 2016 6:49 PM
>>
>> On October 10, 2016 5:40 PM, Jan Beulich < jbeul...@suse.com > wrote:
>> >> >>> On 20.09.16 at 15:30, wrote:
>> >> > --- a/xen/arch/x86/hvm/vlapic
This run is configured for baseline tests only.
flight 67859 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67859/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 3643e8e70d3053476aeecd01b3053918f7c74b61
baseline v
flight 101365 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101365/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail like 101358
test-amd64-i386-xl-qemuu-w
flight 101364 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101364/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 18 leak-check/check fail REGR. vs. 101347
Regressions which
flight 101368 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101368/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-xsm 14 guest-sav
On 10/10/16 12:13, Paul Durrant wrote:
> The Xen docs specify several flags which a guest can set to advertize
> which values of the xenstore control/shutdown key it will recognize.
> This patch adds code to write all the relevant feature-flag keys.
>
> Signed-off-by: Paul Durrant
> Cc: Boris Ost
On Tue, Sep 27, 2016 at 05:57:08PM +0200, Roger Pau Monne wrote:
> Introduce a new %pB format specifier to print sizes (in bytes) in a
> human-readable form.
Since this was intended to be used to print the sizes of the memory
allocations, and it has been requested to remove this information, I wi
A new sysctl interface for passing gcov data back to userspace. The new
interface uses a customised record file format. The new sysctl reuses
original sysctl number but renames the op to gcov_op.
Both gcc 3.4 and 4.7 format are supported. The code is rewritten so that
a new format can be easily ad
flight 67858 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67858/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-amd64-weekly-netinst-pygrub 9 debian-di-install fail blocked
in 67794
test-
On 10/11/16 10:22, Markus Armbruster wrote:
> Haozhong Zhang writes:
>
> > On 10/10/16 14:16, Eric Blake wrote:
> >> On 10/09/2016 07:34 PM, Haozhong Zhang wrote:
> >> > Xen uses this command to get the backend resource, guest SPA and size of
> >> > NVDIMM devices so as to map them to guest.
> >>
Boris Ostrovsky writes ("Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer
commit"):
> On 10/10/2016 12:33 PM, Wei Liu wrote:
> > Sure. I will check ipxe mailing list in one week.
>
> FWIW, here is the patch that I used to pacify gcc.
Thanks. I don't think we would want to add more private
On Tue, Oct 11, 2016 at 10:42:21AM +0100, Juergen Schinker wrote:
>
> yeah I got it compilin' with the patch from Boris and made a deb
>
> but this is only useful on other machines...
>
> However booting with xen-4.8-rc1 works fine but the xen-tools didn't work ,
> so booting a given guest was
yeah I got it compilin' with the patch from Boris and made a deb
but this is only useful on other machines...
However booting with xen-4.8-rc1 works fine but the xen-tools didn't work , so
booting a given guest was not possible
i even had live-patching enabled yay
will try again Friday with r
On Mon, Oct 10, 2016 at 01:38:48PM -0400, Boris Ostrovsky wrote:
> On 10/10/2016 12:33 PM, Wei Liu wrote:
> > On Mon, Oct 10, 2016 at 04:51:13PM +0100, Ian Jackson wrote:
> >> Wei Liu writes ("Re: [PATCH for-4.8] ipxe: update to newer commit"):
> >>> On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Ja
On Mon, Oct 10, 2016 at 07:28:22PM +0100, Juergen Schinker wrote:
>
> and where have you applied that patch ? is it xen-4.8-rc1 ?
>
> do I have to apply that patch ?
>
> do I need to check out another tag ?
>
> do I have to wait a week?
>
No, you can try to work around this issue by appending
On Tue, Oct 11, 2016 at 03:41:16PM +0800, Haozhong Zhang wrote:
> Hi Paul,
>
> On 10/10/16 13:31, Lai, Paul wrote:
> > Hi Shannon:
> >
> > I’m reporting that commit 38cd0664a6bf1c3b887992ea029d2bb516f52c59 is
> > causing a
> > hang in the `xl create windows7` command on my skylake desktop. This
flight 101366 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101366/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 3643e8e70d3053476aeecd01b3053918f7c74b61
baseline version:
ovmf 87c04781d5a7d13ba3cae
> From: Wu, Feng
> Sent: Tuesday, October 11, 2016 8:58 AM
>
> When cpu is offline, we need to move all the vcpus in its blocking
> list to another online cpu, this patch handles it.
>
> Signed-off-by: Feng Wu
> ---
> v5:
> - Add some comments to explain why it doesn't cause deadlock
> for the A
Haozhong Zhang writes:
> On 10/10/16 14:16, Eric Blake wrote:
>> On 10/09/2016 07:34 PM, Haozhong Zhang wrote:
>> > Xen uses this command to get the backend resource, guest SPA and size of
>> > NVDIMM devices so as to map them to guest.
>> >
>> > Signed-off-by: Haozhong Zhang
>> > ---
>> > Cc:
> From: Wu, Feng
> Sent: Tuesday, October 11, 2016 8:58 AM
>
> This patch handles some concern cases when the last assigned device
concern -> corner
> is removed from the domain. In this case we should carefully handle
> pi descriptor and the per-cpu blocking list, to make sure:
> - all the PI d
> -Original Message-
> From: Tian, Kevin
> Sent: Tuesday, October 11, 2016 4:08 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: jbeul...@suse.com; andrew.coop...@citrix.com;
> george.dun...@eu.citrix.com; dario.faggi...@citrix.com
> Subject: RE: [PATCH v5 0/7] VMX: Properly handle pi de
> From: Wu, Feng
> Sent: Tuesday, October 11, 2016 8:58 AM
>
> PI hooks: vmx_pi_switch_from() and vmx_pi_switch_to() are
> needed even when any previously assigned device is detached
> from the domain. Since 'SN' bit is also used to control the
> CPU side PI and we change the state of SN bit in th
> From: Wu, Feng
> Sent: Tuesday, October 11, 2016 8:58 AM
>
> The current VT-d PI related code may operate incorrectly in the
> following scenarios:
> 1. When the last assigned device is dettached from the domain, all
> the PI related hooks are removed then, however, the vCPU can be
> blocked, sw
This run is configured for baseline tests only.
flight 67857 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67857/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 3 host-install(
> From: Xuquan (Quan Xu) [mailto:xuqu...@huawei.com]
> Sent: Monday, October 10, 2016 6:49 PM
>
> On October 10, 2016 5:40 PM, Jan Beulich < jbeul...@suse.com > wrote:
> >> >>> On 20.09.16 at 15:30, wrote:
> >> > --- a/xen/arch/x86/hvm/vlapic.c
> >> > +++ b/xen/arch/x86/hvm/vlapic.c
>
Hi Paul,
On 10/10/16 13:31, Lai, Paul wrote:
> Hi Shannon:
>
> I’m reporting that commit 38cd0664a6bf1c3b887992ea029d2bb516f52c59 is causing
> a
> hang in the `xl create windows7` command on my skylake desktop. This is a
> regression from previous behavior.
>
I think it has been fixed by commi
On 10/10/16 09:24, Dan Williams wrote:
> On Sun, Oct 9, 2016 at 11:32 PM, Haozhong Zhang
> wrote:
> > On 10/09/16 20:45, Dan Williams wrote:
> >> On Sun, Oct 9, 2016 at 5:35 PM, Haozhong Zhang
> >> wrote:
> >> > Overview
> >> >
> >> > This RFC kernel patch series along with correspondin
100 matches
Mail list logo