flight 102718 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102718/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 11 guest-start fail REGR. vs. 102521
test-amd64-i386
ii xen-hypervisor-4.8-amd644.8.0~rc5-1 amd64
Xen Hypervisor on AMD64
xentop shows: Xen 4.8.0-rc
We could not fix this with stable packages, so we are trying now to catch it by
using latest software and
the help of xen-devel. Symptoms are the same in
On 23/11/16 13:38, Vitaly Kuznetsov wrote:
> EVTCHNOP_status hypercall returns Xen's idea of vcpu id so we need to
> compare it against xen_vcpu_id mapping, not the Linux cpu id.
>
> Suggested-by: Radim Krcmar
> Signed-off-by: Vitaly Kuznetsov
Applied to xen/tip.git for-linus-4.10
Juergen
__
* Alex Thorlton wrote:
> It's really not necessary to limit E820_X_MAX to 128 in the non-EFI
> case. This commit drops E820_X_MAX's dependency on CONFIG_EFI, so that
> E820_X_MAX is always at least slightly larger than E820MAX.
>
> The real motivation behind this is actually to prevent some is
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: Tuesday, November 29, 2016 8:58 PM
>
> On Tue, Nov 29, 2016 at 05:47:42AM -0700, Jan Beulich wrote:
> > >>> On 29.11.16 at 13:33, wrote:
> > > On Thu, Nov 03, 2016 at 07:54:24AM -0400, Boris Ostrovsky wrote:
> > >>
> > >>
> > >> On 11/
Hi Thomas,
On Wed, Nov 30, 2016 at 01:42:25AM +0100, Thomas Deutschmann wrote:
> Hi,
>
> the patch set from XSA-157 [1] is missing from
>
> - linux-3.10
(...)
Thank you for both of these, I'm queueing these for the next 3.10.
Willy
___
Xen-devel mai
flight 102714 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102714/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 3 host-install(3) broken REGR. vs. 99725
test-
On 30/11/16 04:24, Alex Thorlton wrote:
> On systems with sufficiently large e820 tables, and several IOAPICs, it
> is possible for the XENMEM_machine_memory_map callback (and its
> counterpart, XENMEM_memory_map) to attempt to return an e820 table with
> more than 128 entries. This callback adds
The dma_alloc_coherent() API specifies that:
[...]
The CPU virtual address and the DMA address are both guaranteed to be
aligned to the smallest PAGE_SIZE order which is greater than or equal
to the requested size. This invariant exists (for example) to guarantee
that if you allocate a chunk whic
This is to support the requirement that exists in PV dom0
when doing DMA requests:
"dma_alloc_coherent()
[...]
The CPU virtual address and the DMA address are both guaranteed to be
aligned to the smallest PAGE_SIZE order which is greater than or equal
to the requested size. This invariant exists
Hey!
Please see the two RFC patches to add in the XENMEM_exchange hypercall
another argument to get MFNs which are size aligned.
The use case is also attached - which is to provide the framework
for dma_alloc_coherent which sets certain guarantees that were not
provided by Linux Xen-SWIOTLB lead
flight 102715 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102715/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ff9a1358b3ff98b1c3a9b4b584fca71653a1c9fe
baseline version:
ovmf 2b2efe33eaceb3fd2b5c6
On systems with sufficiently large e820 tables, and several IOAPICs, it
is possible for the XENMEM_machine_memory_map callback (and its
counterpart, XENMEM_memory_map) to attempt to return an e820 table with
more than 128 entries. This callback adds entries to the BIOS-provided
e820 table to accou
It's really not necessary to limit E820_X_MAX to 128 in the non-EFI
case. This commit drops E820_X_MAX's dependency on CONFIG_EFI, so that
E820_X_MAX is always at least slightly larger than E820MAX.
The real motivation behind this is actually to prevent some issues in
the Xen kernel, where the XE
Here's the second round of my patches to fix up the problems that we're
seeing with the XENMEM_machine_memory_map hypercall. These few simple
changes, to give xen_e820_map some extra space, get things working fine
on our large machine.
This version of the patchset adds a patch to remove the #ifde
This run is configured for baseline tests only.
flight 68123 qemu-upstream-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68123/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pygrub 6 xe
flight 102711 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102711/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 9 debian-hvm-install fail REGR. vs.
102536
test-amd6
On 16-11-29 13:22:41, Dario Faggioli wrote:
> On Tue, 2016-11-29 at 12:52 +0800, Yi Sun wrote:
> > On 16-11-25 18:39:41, Dario Faggioli wrote:
> > > On Tue, 2016-10-25 at 11:40 +0800, Yi Sun wrote:
> > > > +* xl interfaces:
> > > > +
> > > > + 1. `psr-cat-show [OPTIONS] domain-id`:
> > > > +
> > >
On Tue, Nov 29, 2016 at 4:18 AM, Ronald Rojas wrote:
> Created basic Makfele for the Golang xenlight
> project so that the project is built and
> installed. A template template is alo added.
Thanks Ronald! Not a bad first submission, but a lot of things that
need tightening up.
First, the norma
flight 102712 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102712/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 15 guest-start/debian.repeat fail blocked in 102551
test-armhf-armhf-libvirt
Hi,
the patch set from XSA-155 [1] is missing from
- linux-3.10
and is incomplete in
- linux-3.18
- linux-4.1
See XSA-155 [1] or linux-4.4. for a complete list:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/log/?qt=grep&q=XSA155&h=linux-4.4.y
Compare against linux-3.18
Hi,
the patch set from XSA-157 [1] is missing from
- linux-3.10
and is incomplete in
- linux-3.18
- linux-4.1
See XSA-157 [1] or linux-4.4. for a complete list:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/log/?qt=grep&q=XSA-157&h=linux-4.4.y
Compare against linux-3.1
This run is configured for baseline tests only.
flight 68122 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68122/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-xtf-amd64-amd64-3 20 xtf/test-hvm32-invlpg~shad
# Xen transport for 9pfs version 1
## Background
9pfs is a network filesystem protocol developed for Plan 9. 9pfs is very
simple and describes a series of commands and responses. It is
completely independent from the communication channels, in fact many
clients and servers support multiple chann
On 11/29/2016 02:26 PM, Boris Ostrovsky wrote:
> On 11/29/2016 01:55 PM, Laura Abbott wrote:
>> __pa_symbol is the correct macro to use on kernel
>> symbols. Switch to this from __pa.
>>
>> Signed-off-by: Laura Abbott
>> ---
>> Found during a sweep of the kernel. Untested.
>> ---
>> drivers/xen/x
On Tue, Nov 29, 2016 at 6:19 PM, Wei Liu wrote:
> On Mon, Nov 28, 2016 at 12:18:03PM -0500, Ronald Rojas wrote:
>> diff --git a/tools/Makefile b/tools/Makefile
>> index 71515b4..b89f06b 100644
>> --- a/tools/Makefile
>> +++ b/tools/Makefile
>> @@ -11,6 +11,7 @@ SUBDIRS-y += misc
>> SUBDIRS-y += e
flight 102710 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102710/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt13 saverestore-support-check fail REGR. vs. 101275
Tests which are
On 11/29/2016 01:55 PM, Laura Abbott wrote:
> __pa_symbol is the correct macro to use on kernel
> symbols. Switch to this from __pa.
>
> Signed-off-by: Laura Abbott
> ---
> Found during a sweep of the kernel. Untested.
> ---
> drivers/xen/xenbus/xenbus_dev_backend.c | 2 +-
> drivers/xen/xenfs/xe
flight 102719 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102719/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
>
>
> xenversion: It happened with 4.4.1 from Debian Jessie, then we upgraded the
> Hypervisor to 4.8-rc from Debian Stretch. Symptoms are the same.
>
> So now its
>
> (d11) HVM Loader
>
> (d11) Detected Xen v4.8.0-rc
>
>
Debian Strech has now 4.8.0.rc5-1 and I think it's very stable
Am 29.11.2016 um 10:08 schrieb Wei Liu :
>> http://paste.debian.net/895464/
> Entry not found -- maybe it expired... Sorry.
Here it is:
Nov 14 09:19:52 31.172.31.251 [39677.027813] BUG: unable to handle kernel
Nov 14 09:19:52 31.172.31.251 at 880002b4c06e
Nov 14 09:19:52 31.172.31.251 [396
On 29/11/16 12:09, Roger Pau Monne wrote:
> On Tue, Nov 29, 2016 at 04:44:18AM -0700, Jan Beulich wrote:
> On 29.11.16 at 12:38, wrote:
>>> On Tue, Nov 29, 2016 at 03:40:37AM -0700, Jan Beulich wrote:
>>> On 29.11.16 at 03:59, wrote:
> Either we have to hide the watchdog timer section
Hi,
vps_stop.sh does:
- Get vserver ids from db and then stops this in a for loop
- then:
for id in $vserver; do
xl destroy vmanager"$id"
done
xenversion: It happened with 4.4.1 from Debian Jessie, then we upgraded the
Hypervisor to 4.8-rc from Debian Stretch. Symptoms are the same.
So now its
flight 102717 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102717/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Another try:
root@v34:~# xl list
NameID Mem VCPUs State Time(s)
Domain-0 0 2048 2 r- 600.6
(null) 37 0 1 --p--d 6.6
(null)
Sorry for html mail again.. Next will be plain text..
Mit freundlichen Grüßen
Thomas Toka
- Second Level Support -
IP-Projects GmbH & Co. KG
Am Vogelherd 14
D - 97295 Waldbrunn
Telefon: 09306 - 76499-0
FAX: 09306 - 76499-15
E-Mail: i...@ip-projects.de
Geschäftsführer: Michael Schinzel
Regis
flight 68120 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68120/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-armhf-daily-netboot-pygrub 9 debian-di-install fail like 68078
test-amd64-am
Hi Julien,
On 29 November 2016 at 20:55, Julien Grall wrote:
> Hi Volodymyr,
>
> On 29/11/16 17:40, Volodymyr Babchuk wrote:
>>
>> On 29 November 2016 at 18:02, Julien Grall wrote:
>>>
>>> On 29/11/16 15:27, Volodymyr Babchuk wrote:
On 28 November 2016 at 22:10, Julien Grall wrote:
On Tue, 29 Nov 2016, Juergen Gross wrote:
> On 29/11/16 08:34, Wei Liu wrote:
> > On Mon, Nov 28, 2016 at 02:53:57PM +0100, Cédric Bosdonnat wrote:
> >> Resume is sometimes silently failing for HVM guests. Getting the
> >> xc_domain_resume() and libxl__domain_resume_device_model() in the
> >> rever
flight 102709 qemu-upstream-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102709/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt13 saverestore-support-check fail REGR. vs. 100711
test-
On Mon, 28 Nov 2016, Shanker Donthineni wrote:
> Either we have to hide the watchdog timer section in GTDT or emulate
> watchdog timer block for dom0. Otherwise, system gets panic when
> dom0 accesses its MMIO registers. The current XEN doesn't support
> virtualization of watchdog timer, so hide th
On Tue, 29 Nov 2016, Roger Pau Monne wrote:
> On Tue, Nov 29, 2016 at 06:07:36AM -0700, Jan Beulich wrote:
> > >>> On 29.11.16 at 13:09, wrote:
> > > On Tue, Nov 29, 2016 at 04:44:18AM -0700, Jan Beulich wrote:
> > >> >>> On 29.11.16 at 12:38, wrote:
> > >> > On Tue, Nov 29, 2016 at 03:40:37AM -0
Hi Volodymyr,
On 29/11/16 17:40, Volodymyr Babchuk wrote:
On 29 November 2016 at 18:02, Julien Grall wrote:
On 29/11/16 15:27, Volodymyr Babchuk wrote:
On 28 November 2016 at 22:10, Julien Grall wrote:
On 28/11/16 18:09, Volodymyr Babchuk wrote:
On 28 November 2016 at 18:14, Julien Grall
__pa_symbol is the correct macro to use on kernel
symbols. Switch to this from __pa.
Signed-off-by: Laura Abbott
---
Found during a sweep of the kernel. Untested.
---
drivers/xen/xenbus/xenbus_dev_backend.c | 2 +-
drivers/xen/xenfs/xenstored.c | 2 +-
2 files changed, 2 insertions(+),
Hi,
This is v4 of the series to add CONFIG_DEBUG_VIRTUAL for arm64. This mostly
expanded on __pa_symbol conversion with a few new sites found. There's also
some reworking done to avoid calling __va too early. __va relies on having
memstart_addr set so very early code in early_fixmap_init and earl
On 11/29/2016 08:30 PM, Dario Faggioli wrote:
On Tue, 2016-11-29 at 19:27 +0200, Oleksandr Andrushchenko wrote:
On 11/29/2016 07:05 PM, Jan Beulich wrote:
If you document it as padding, you can't easily use it later on for
some extension.
Why not? I would be more careful about reserved, rather
On Tue, 2016-11-29 at 19:27 +0200, Oleksandr Andrushchenko wrote:
> On 11/29/2016 07:05 PM, Jan Beulich wrote:
> > If you document it as padding, you can't easily use it later on for
> > some extension.
> Why not? I would be more careful about reserved, rather than padding.
> Reserved means that it
This run is configured for baseline tests only.
flight 68121 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68121/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 2b2efe33eaceb3fd2b5c6859dcb5151970dc797b
baseline v
On Tue, 29 Nov 2016, Artem Mygaiev wrote:
> Hi Julien
>
> On 29.11.16 16:27, Julien Grall wrote:
> > Hi Artem,
> >
> > On 29/11/16 14:21, Artem Mygaiev wrote:
> >> Lars, the project is approved by Coverity. Scan has found some issues in
> >> xen/arch/arm on master, part of them are false positives
flight 102708 qemu-upstream-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102708/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 13 saverestore-support-check fail REGR. vs. 99723
test-
On Tue, 2016-11-29 at 13:34 +, IP-Projects - Support wrote:
> Hello,
>
> we see this i think when the vms are stopped or restarted by
> customers (xl destroy vm and then recreating) or I can reprdoce this
> when I stop them all by
> script with a for loop with xl destroy $i .
>
Ok, that makes
flight 102713 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102713/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 host-build-prep fail REGR. vs. 102693
Tests which
On 29 November 2016 at 18:02, Julien Grall wrote:
> Hello Volodymyr,
>
> On 29/11/16 15:27, Volodymyr Babchuk wrote:
>>
>> On 28 November 2016 at 22:10, Julien Grall wrote:
>>>
>>> On 28/11/16 18:09, Volodymyr Babchuk wrote:
On 28 November 2016 at 18:14, Julien Grall wrote:
>
>
On 11/29/2016 07:05 PM, Jan Beulich wrote:
On 29.11.16 at 17:55, wrote:
On 11/29/2016 06:09 PM, Jan Beulich wrote:
On 29.11.16 at 16:24, wrote:
+struct xensnd_req {
+uint16_t id;
+uint8_t operation;
+uint8_t stream_idx;
+uint32_t reserved;
+union {
+struct xensnd_
Hi all
Xen 4.8 RC7 is tagged. You can check it out from xen.git:
git://xenbits.xen.org/xen.git 4.8.0-rc7
For you convenience, please find tarball and signature at:
https://downloads.xenproject.org/release/xen/4.8.0-rc7/
Please send bug reports and test reports to
xen-de...@lists.xenproject.o
The old rumpuserxen allow file (which wants to override the global
ignore for the xenstorels.repeat failure) was no longer effective
because the branch name (in the filename) was out of date. Fix that.
Also no longer ignore one-off xenstorels failures in the primary
branches. The failure probabi
>>> On 29.11.16 at 17:58, wrote:
> On 11/29/2016 06:06 PM, Jan Beulich wrote:
> On 29.11.16 at 16:24, wrote:
>>> From: Oleksandr Andrushchenko
>>>
>>> Hi, all!
>>>
>>> Please find the next version of the ABI for the PV sound
>>> after addressing review comments.
>> You've been asked before,
>>> On 29.11.16 at 17:55, wrote:
> On 11/29/2016 06:09 PM, Jan Beulich wrote:
> On 29.11.16 at 16:24, wrote:
>>> +struct xensnd_req {
>>> +uint16_t id;
>>> +uint8_t operation;
>>> +uint8_t stream_idx;
>>> +uint32_t reserved;
>>> +union {
>>> +struct xensnd_open_req
On 11/29/2016 06:06 PM, Jan Beulich wrote:
On 29.11.16 at 16:24, wrote:
From: Oleksandr Andrushchenko
Hi, all!
Please find the next version of the ABI for the PV sound
after addressing review comments.
You've been asked before, and I feel the need to repeat: Please
slow down with sending ne
On 11/29/2016 11:43 AM, Jan Beulich wrote:
On 29.11.16 at 17:40, wrote:
>> On 11/29/2016 11:11 AM, Jan Beulich wrote:
>> On 29.11.16 at 16:33, wrote:
This series adds support for ACPI-based VCPU hotplug for unprivileged
PVH guests.
Changes in v4:
* Replaced XEN_D
I have force pushed all four of the trees below. This is the expected
libvirt regression.
Ian.
osstest service owner writes ("[qemu-upstream-4.5-testing test] 102705:
regressions - FAIL"):
> flight 102705 qemu-upstream-4.5-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/1
On 11/29/2016 06:09 PM, Jan Beulich wrote:
On 29.11.16 at 16:24, wrote:
+struct xensnd_req {
+uint16_t id;
+uint8_t operation;
+uint8_t stream_idx;
+uint32_t reserved;
+union {
+struct xensnd_open_req open;
+struct xensnd_rw_req rw;
+uint8_t padding[2
On 29/11/16 16:00, Jan Beulich wrote:
On 28.11.16 at 12:13, wrote:
>> The existing propagate_page_fault() is fairly similar to
>> pv_inject_page_fault(), although it has a return value. Only a single caller
>> makes use of the return value, and non-NULL is only returned if the passed
>> cr2
>>> On 29.11.16 at 17:40, wrote:
> On 11/29/2016 11:11 AM, Jan Beulich wrote:
> On 29.11.16 at 16:33, wrote:
>>> This series adds support for ACPI-based VCPU hotplug for unprivileged
>>> PVH guests.
>>>
>>> Changes in v4:
>>> * Replaced XEN_DOMCTL_set_avail_vcpus with XEN_DOMCTL_acpi_access,
On 29/11/16 16:36, Jan Beulich wrote:
On 29.11.16 at 17:30, wrote:
>> On 29/11/16 16:24, Jan Beulich wrote:
>> On 28.11.16 at 12:13, wrote:
@@ -3012,7 +3018,10 @@ void hvm_task_switch(
&tss.back_link,
sizeof(tss.back_link),
>> 0,
>>
On 11/29/2016 11:11 AM, Jan Beulich wrote:
On 29.11.16 at 16:33, wrote:
>> This series adds support for ACPI-based VCPU hotplug for unprivileged
>> PVH guests.
>>
>> Changes in v4:
>> * Replaced XEN_DOMCTL_set_avail_vcpus with XEN_DOMCTL_acpi_access,
>> toolstack is expected to issue two AC
>>> On 29.11.16 at 17:30, wrote:
> On 29/11/16 16:24, Jan Beulich wrote:
> On 28.11.16 at 12:13, wrote:
>>> @@ -3012,7 +3018,10 @@ void hvm_task_switch(
>>>&tss.back_link,
>>> sizeof(tss.back_link),
> 0,
>>>&pfi
On 29/11/16 16:24, Jan Beulich wrote:
On 28.11.16 at 12:13, wrote:
>> @@ -3012,7 +3018,10 @@ void hvm_task_switch(
>>&tss.back_link,
>> sizeof(tss.back_link), 0,
>>&pfinfo);
>> if ( rc == HVMCOPY_bad_gva
>>> On 28.11.16 at 12:13, wrote:
> @@ -3012,7 +3018,10 @@ void hvm_task_switch(
>&tss.back_link, sizeof(tss.back_link),
> 0,
>&pfinfo);
> if ( rc == HVMCOPY_bad_gva_to_gfn )
> +{
> +hvm_in
flight 102707 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102707/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 2b2efe33eaceb3fd2b5c6859dcb5151970dc797b
baseline version:
ovmf 8ae17140476861efa642d
>>> On 29.11.16 at 16:33, wrote:
> This series adds support for ACPI-based VCPU hotplug for unprivileged
> PVH guests.
>
> Changes in v4:
> * Replaced XEN_DOMCTL_set_avail_vcpus with XEN_DOMCTL_acpi_access,
> toolstack is expected to issue two ACPI "writes" to trigger the hotplug
> * Moved pm1a
On 29/11/16 15:09, Artem Mygaiev wrote:
Hi Julien
On 29.11.16 16:27, Julien Grall wrote:
Hi Artem,
On 29/11/16 14:21, Artem Mygaiev wrote:
Lars, the project is approved by Coverity. Scan has found some issues in
xen/arch/arm on master, part of them are false positives.
Perfect. It would b
>>> On 29.11.16 at 16:24, wrote:
> +struct xensnd_req {
> +uint16_t id;
> +uint8_t operation;
> +uint8_t stream_idx;
> +uint32_t reserved;
> +union {
> +struct xensnd_open_req open;
> +struct xensnd_rw_req rw;
> +uint8_t padding[24];
> +} op;
> +};
>
>>> On 29.11.16 at 16:24, wrote:
> From: Oleksandr Andrushchenko
>
> Hi, all!
>
> Please find the next version of the ABI for the PV sound
> after addressing review comments.
You've been asked before, and I feel the need to repeat: Please
slow down with sending new versions. Give people time t
Hello Volodymyr,
On 29/11/16 15:27, Volodymyr Babchuk wrote:
On 28 November 2016 at 22:10, Julien Grall wrote:
On 28/11/16 18:09, Volodymyr Babchuk wrote:
On 28 November 2016 at 18:14, Julien Grall wrote:
On 24/11/16 21:10, Volodymyr Babchuk wrote:
I mean, is there any command that will af
>>> On 28.11.16 at 12:13, wrote:
> Introduce a new x86_emul_pagefault() similar to x86_emul_hw_exception(), and
> use this instead of hvm_inject_page_fault() from emulation codepaths.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
___
Xe
>>> On 28.11.16 at 12:13, wrote:
> The existing propagate_page_fault() is fairly similar to
> pv_inject_page_fault(), although it has a return value. Only a single caller
> makes use of the return value, and non-NULL is only returned if the passed cr2
> is non-canonical. Opencode this single cas
Hi Julien
On 29.11.16 16:27, Julien Grall wrote:
> Hi Artem,
>
> On 29/11/16 14:21, Artem Mygaiev wrote:
>> Lars, the project is approved by Coverity. Scan has found some issues in
>> xen/arch/arm on master, part of them are false positives.
>
> Perfect. It would be interesting to know the list of
flight 102705 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102705/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 13 saverestore-support-check fail REGR. vs. 99725
Tests
On Tue, Nov 29, 2016 at 06:00:47AM -0700, Jan Beulich wrote:
> >>> On 29.11.16 at 13:41, wrote:
> > On Fri, Nov 11, 2016 at 09:58:44AM -0700, Jan Beulich wrote:
> >> >>> On 29.10.16 at 10:59, wrote:
> >> > Current {un}map_mmio_regions implementation has a maximum number of
> >> > loops
> > to
>
PM timer is not supported by PVH guests.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
---
tools/firmware/hvmloader/util.c | 3 ++-
tools/libacpi/build.c | 5 +
tools/libacpi/libacpi.h | 1 +
3 files changed, 8 insertions(+), 1 de
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* New patch
xen/arch/x86/hvm/acpi.c | 61 +++--
1 file changed, 54 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/hvm/acpi.c b/xen/arch/x86/hvm/acpi.c
index c80c464..1c205eb 100644
--- a/xen/a
ACPI builder marks VCPUS set in vcpu_online map as enabled in MADT.
With ACPI-based CPU hotplug we only want VCPUs that are started by
the guest to be marked as such. Remaining VCPUs will be set to
"enable" by AML code during hotplug.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Konrad Rzeszutek W
Provide libxc interface for accessing ACPI via XEN_DOMCTL_acpi_access.
When a VCPU is hot-(un)plugged to/from a PVH guest update VCPU map
by writing to ACPI's XEN_ACPI_CPU_MAP register and then set GPE0
status bit in GPE0.status.
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* New patch
to
This is the method that will get invoked on an SCI.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
tools/libacpi/mk_dsdt.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/tools/libacpi/mk_dsdt.c b/tools/libacpi/mk_dsdt.c
index 16320a9..5765822 100644
---
Signed-off-by: Boris Ostrovsky
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
---
tools/firmware/hvmloader/util.c | 3 ++-
tools/libacpi/build.c | 2 ++
tools/libacpi/libacpi.h | 1 +
3 files changed, 5 insertions(+), 1 deletion(-)
diff --git a/tools/firmware/hvmloa
This domctl will allow toolstack to read and write some
ACPI registers. It will be available to both x86 and ARM
but will be implemented first only for x86
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* New patch
xen/arch/x86/domctl.c| 9 +
xen/arch/x86/hvm/Makefile
PVH guests will have ACPI accesses emulated by the hypervisor as
opposed to QEMU (as is the case for HVM guests). This patch installs
handler for accesses to PM1A, GPE0 (which is added to struct
hvm_hw_acpi) and VCPU map. Logic for the handler will be provided
by a later patch.
Whether or not the
These registers (pm1a specifically) are not all specific to pm timer
and are accessed by non-pmtimer code (for example, sleep/power button
emulation).
In addition to moving those regsters to struct hvm_domain rename
HVM save state structures and routines as well.
No functional changes are introdu
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* Registers are now explicitly split into 2-byte status and enable.
xen/arch/x86/hvm/acpi.c | 122 +++-
xen/common/domctl.c | 5 ++
xen/include/xen/sched.h | 3 ++
3 files changed, 129 insertion
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* New patch
(This should eventually be moved in acpi.c)
xen/arch/x86/hvm/pmtimer.c | 8
1 file changed, 8 insertions(+)
diff --git a/xen/arch/x86/hvm/pmtimer.c b/xen/arch/x86/hvm/pmtimer.c
index 5144928..a810f2b 100644
--- a/xen/arch/x
PVH guests do not have IOAPIC which typically generates an SCI. For
those guests SCI will be provided as a virtual interrupt.
Copy VIRQ_MCA definition from of xen-mca.h to xen.h to keep all
x86-specific VIRQ_ARCH_* in one place. (However, because we don't
want to require inclusion of xen.h in xen-
Signed-off-by: Boris Ostrovsky
---
CC: George Dunlap
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
---
Changes in v4:
* Updated text to reflect new interfaces.
docs/misc/hvmlite.markdown | 13 +
1 file changed, 13 insertions(+)
diff --git a/docs/misc/hvmlite.ma
Define VCPU available map address (used by AML's PRSC method)
and GPE0 CPU hotplug event number. Use these definitions in mk_dsdt
instead hardcoded values.
These definitions will later be used by both the hypervisor and
the toolstack (initially for PVH guests only), thus they are
placed in public
This series adds support for ACPI-based VCPU hotplug for unprivileged
PVH guests.
Changes in v4:
* Replaced XEN_DOMCTL_set_avail_vcpus with XEN_DOMCTL_acpi_access,
toolstack is expected to issue two ACPI "writes" to trigger the hotplug
* Moved pm1a registers from PMTState to hvm_domain. gpe0 reg
When GPE0 status register gets a bit set (currently XEN_GPE0_CPUHP_BIT
only) send an SCI to the guest.
Also update send_guest_global_virq() to handle cases when VCPU0
is offlined.
Signed-off-by: Boris Ostrovsky
---
Changes in v4:
* Generate SCI only when needed (i.e. when status changes)
* Deal
On Tue, Nov 29, Wei Liu wrote:
> On Mon, Nov 28, 2016 at 10:28:21AM -0800, Stefano Stabellini wrote:
> > Anthony, are you going to take care of this?
> > However, given the state of the release, they'll need a release-ack to
> > be applied.
> I think these patches will need to wait to be backporte
>>> On 28.11.16 at 12:13, wrote:
> X86EMUL_CMPXCHG_FAILED was introduced in c/s d430aae25 in 2005. Even at the
> time it alised what is now X86EMUL_RETRY (as well as what is now
> X86EMUL_EXCEPTION). I am not sure why the distinction was considered useful
> at the time.
I have always guessed th
On 28 November 2016 at 22:10, Julien Grall wrote:
>
>
> On 28/11/16 18:09, Volodymyr Babchuk wrote:
>>
>> Hello,
>
>
> Hello Volodymyr,
>
>> On 28 November 2016 at 18:14, Julien Grall wrote:
>>>
>>> On 24/11/16 21:10, Volodymyr Babchuk wrote:
My name is Volodymyr Babchuk, I'm working on
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Grytsov
Signed-off-by: Oleksandr Dmytryshyn
Signed-off-by: Iurii Konovalenko
---
Changes since v1:
* removed __attribute__((__packed__)) from all structures definitions
Changes since v2:
* remove
1 - 100 of 158 matches
Mail list logo