flight 106229 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106229/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-buildfail REGR. vs. 105963
build-i386
On 02/28/2017 12:17 AM, Stefano Stabellini wrote:
On Mon, 27 Feb 2017, Oleksandr Andrushchenko wrote:
On 02/23/2017 08:45 PM, Stefano Stabellini wrote:
On Thu, 23 Feb 2017, Oleksandr Andrushchenko wrote:
Hi, Stefano!
On 02/22/2017 07:10 PM, Stefano Stabellini wrote:
On Wed, 22 Feb 2017, Olek
flight 106217 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106217/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-amd64-xl-qemuu-
flight 106216 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106216/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 106141
test-amd64-amd64-xl-qemuu-
flight 106209 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106209/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
On Tue, 21 Feb 2017 03:29:43 +, Tian, Kevin wrote:
> MAINTAINERS: Update VT-d maintainers
>
> Feng just left Intel. So remove him from the list.
>
> Signed-off-by: Kevin Tian
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 6f7ffeb..f14f844 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @
flight 106198 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106198/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-qemut-winxpsp3 15 guest-localmigrate/x10 fail in 106051
REGR. vs. 105835
The default dom0_mem is 128M which is not sufficient to boot a Ubuntu
based Dom0. It is not clear what a better default value could be.
Instead, loudly warn the user when dom0_mem is unspecified and wait 3
secs. Then use 512M.
Update the docs to specify that dom0_mem is required on ARM. (The
curr
flight 106186 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106186/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 6 xen-boot fail REGR. vs. 105933
test-amd64-i386-xl
On Tue, 21 Feb 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 21/02/17 17:26, Stefano Stabellini wrote:
> > On Tue, 21 Feb 2017, Wei Liu wrote:
> > > On Mon, Feb 20, 2017 at 10:22:06AM -0800, Stefano Stabellini wrote:
> > > > The default dom0_mem is 128M which is not sufficient to boot a Ubuntu
>
On Wed, 22 Feb 2017, Géza Gémes wrote:
> On 2017-02-21 23:10, Stefano Stabellini wrote:
> > On Tue, 21 Feb 2017, Géza Gémes wrote:
> > > Hi,
> > >
> > > I've tried to run the raisin test suite, while pv tests pass the hvm tests
> > > fail. I've identified a number of problems, starting with two sm
flight 106206 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106206/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-i386-xl-qemuu-
flight 106195 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106195/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 14 guest-saverestore.2 fail REGR.
vs. 106141
Regressi
On Mon, 27 Feb 2017, Oleksandr Andrushchenko wrote:
> On 02/23/2017 08:45 PM, Stefano Stabellini wrote:
> > On Thu, 23 Feb 2017, Oleksandr Andrushchenko wrote:
> > > Hi, Stefano!
> > >
> > > On 02/22/2017 07:10 PM, Stefano Stabellini wrote:
> > > > On Wed, 22 Feb 2017, Oleksandr Andrushchenko wrot
flight 106193 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106193/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 106172
Regressi
On 02/26/2017 12:36 PM, Boris Ostrovsky wrote:
>
>
> On 02/26/2017 10:32 AM, osstest service owner wrote:
>> flight 106139 linux-linus real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/106139/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> including tests
This turned out to be a xen install problem. The default install
location for the build was /usr/local but my system was using /usr. The
root cause was hvmloader created by the new build was not actually the
one being used.
On 2017-02-27 11:59, Konrad Rzeszutek Wilk wrote:
On Wed, Feb 22, 2
flight 106208 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106208/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On Wed, 2017-02-15 at 14:42 +, George Dunlap wrote:
> Most of the motion makes sense, but moving the option parser along
> too
> seems a bit strange. Wouldn't it make more sense to leave it with
> the
> other option parsers?
>
Well, it's a runqueue related parameter, so it's runqueue related
flight 106190 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106190/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
On Mon, Feb 27, 2017 at 12:42:47PM -0500, Konrad Rzeszutek Wilk wrote:
> On Mon, Feb 20, 2017 at 03:49:31PM +, Anthony PERARD wrote:
> > On Wed, Feb 15, 2017 at 08:37:44PM -0500, Konrad Rzeszutek Wilk wrote:
> > > Hey,
> > >
> > > I just built today Xen based on 93e1435290867703c50acad1f54b92
Hi guys,
Do you know when *recognized* Virtual Interrupt on VM-Entry will be
delivered if Virtual-Interrupt Delivery is enabled and interrupt delivery
is blocking by STI?
Previously, VMM used Interrupt-Window, but as I see in XEN code,
Interrupt-Window
is not used when Virtual Interrupt Delivery
Wei Liu writes ("[PATCH 2/2] xl: split out vnc and console related code"):
> The new file also contains code for channel, which is just a console
> in disguise.
Good. Except that...
> Replace the call to vncviewer() with libxl_vncviewer_exec() directly in
> main_vncviewer.
... you forgot to rem
On Wed, 2017-02-15 at 15:40 +, George Dunlap wrote:
> On Thu, Feb 9, 2017 at 1:59 PM, Dario Faggioli
> wrote:
> xen: Report next slice time when continuing as well as switching
>
> We record trace information about the next timeslice when switching
> to
> a different vcpu, but not when contin
Wei Liu writes ("[PATCH 1/2] xl: call libxl_vncviewer_exec in main_vncviewer"):
> We will need to move main_vncviewer to a different file where it has no
> access to the helper vncviewer.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists
Hi guys,
Do you know when *recognized* Virtual Interrupt on VM-Entry will be
delivered if Virtual-Interrupt Delivery is enabled and interrupt delivery
is blocking by STI?
Previously, VMM used Interrupt-Window, but as I see in XEN code,
Interrupt-Window is not used when Virtual Interrupt Delivery
On 02/27/2017 04:58 PM, Shanker Donthineni wrote:
Hi Julien,
Hi Shanker,
Please don't drop people in CC. In my case, any e-mail I am not CCed are
skipping my inbox and I may not read them for a while.
On 02/27/2017 08:12 AM, Julien Grall wrote:
On 27/02/17 13:23, Vijay Kilari wrote:
H
Wei Liu writes ("[PATCH 3/3] xl: split out xl_parse.[ch]"):
> Move all parsing code into xl_parse.c. Export the ones needed in
> xl_parse.h.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 1/3] xl: rename cpurange_parse to parse_cpurange"):
> We want to consistently prefix functions to parse input with "parse_".
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-deve
Wei Liu writes ("[PATCH 2/3] xl: introduce a function to get shutdown action
name"):
> The array to map libxl_shutdown_action_to_shutdown to string is going to
> be moved to a dedicated file.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@
On 27/02/17 17:06, Boris Ostrovsky wrote:
>>> This series adds support for scrubbing released pages from idle loop,
>>> making guest destruction significantly faster. For example, destroying a
>>> 1TB guest can now be completed in slightly over 1 minute as opposed to
>>> about 9 minutes using exist
We want to consistently prefix functions to parse input with "parse_".
No functional change.
Signed-off-by: Wei Liu
---
tools/xl/xl_cmdimpl.c | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/tools/xl/xl_cmdimpl.c b/tools/xl/xl_cmdimpl.c
index 2721af317b..86c7
The new file also contains code for channel, which is just a console
in disguise.
Replace the call to vncviewer() with libxl_vncviewer_exec() directly in
main_vncviewer.
Signed-off-by: Wei Liu
---
tools/xl/Makefile | 2 +-
tools/xl/xl_cmdimpl.c | 99 --
We will need to move main_vncviewer to a different file where it has no
access to the helper vncviewer.
Call libxl_vncviewer_exec directly.
Signed-off-by: Wei Liu
---
tools/xl/xl_cmdimpl.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/tools/xl/xl_cmdimpl.c b/tools/x
The array to map libxl_shutdown_action_to_shutdown to string is going to
be moved to a dedicated file.
Provide a function to do the translation so that we don't need to make
the array globally visible.
Signed-off-by: Wei Liu
---
tools/xl/xl_cmdimpl.c | 7 ++-
1 file changed, 6 insertions(+)
Move some commonly used functions to a new file.
find_domain requires access to global variable common_domname. Make that
non-static.
No functional change.
Signed-off-by: Wei Liu
---
tools/xl/Makefile | 2 +-
tools/xl/xl_cmdimpl.c | 221 +-
tools/x
On Mon, Feb 20, 2017 at 03:49:31PM +, Anthony PERARD wrote:
> On Wed, Feb 15, 2017 at 08:37:44PM -0500, Konrad Rzeszutek Wilk wrote:
> > Hey,
> >
> > I just built today Xen based on 93e1435290867703c50acad1f54b9208df473562
> > Author: Oleksandr Tyshchenko
> > Date: Wed Feb 15 12:20:01 2017
On Mon 27-02-17 11:28:52, Reza Arbab wrote:
> On Mon, Feb 27, 2017 at 10:28:17AM +0100, Michal Hocko wrote:
> >diff --git a/include/linux/memory_hotplug.h b/include/linux/memory_hotplug.h
> >index 134a2f69c21a..a72f7f64ee26 100644
> >--- a/include/linux/memory_hotplug.h
> >+++ b/include/linux/memor
On Mon, Feb 27, 2017 at 10:28:17AM +0100, Michal Hocko wrote:
diff --git a/include/linux/memory_hotplug.h b/include/linux/memory_hotplug.h
index 134a2f69c21a..a72f7f64ee26 100644
--- a/include/linux/memory_hotplug.h
+++ b/include/linux/memory_hotplug.h
@@ -100,8 +100,6 @@ extern void __online_pag
Hi,
On 24/02/17 19:57, Shanker Donthineni wrote:
> Hi Julien,
>
>
> On 01/31/2017 10:18 AM, Julien Grall wrote:
>>
>>
>> On 31/01/17 16:02, Jaggi, Manish wrote:
>>>
>>>
>>> On 1/31/2017 8:47 PM, Julien Grall wrote:
On 31/01/17 14:08, Jaggi, Manish wrote:
> Hi Julien,
>
>>>
On 02/27/2017 11:29 AM, Dario Faggioli wrote:
> On Sun, 2017-02-26 at 19:37 -0500, Boris Ostrovsky wrote:
>> This is needed for subsequent changes to memory scrubbing.
>>
> So, this is "just" code motion and factorization, right?
>
> If yes, I think the changelog should say so.
Right, there is no
>> This series adds support for scrubbing released pages from idle loop,
>> making guest destruction significantly faster. For example, destroying a
>> 1TB guest can now be completed in slightly over 1 minute as opposed to
>> about 9 minutes using existing scrubbing algorithm.
> What is this 1m no
On Wed, Feb 22, 2017 at 03:50:28PM -0500, Jason Dickens wrote:
> I'm trying to find a solution to an immediate VM crash which occurs by
> simply adding "bios='ovmf' to my configuration?
>
> I started with a standard Ubuntu install which contained Xen 4.6.0 and had
> the crash. The VM works fine bo
Hi Julien,
On 02/27/2017 08:12 AM, Julien Grall wrote:
On 27/02/17 13:23, Vijay Kilari wrote:
Hi Julien,
Hello Vijay,
On Wed, Feb 22, 2017 at 7:40 PM, Julien Grall
wrote:
Hello,
There was few discussions recently about hiding SMMUs from DOM0 when
using
ACPI. I thought it would be go
On Mon, Feb 27, 2017 at 04:44:53PM +, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH 20/29] xl: split out cd related code"):
> > On Mon, Feb 27, 2017 at 04:36:16PM +, Ian Jackson wrote:
> > > Yes, indeed, that was the only reason I didn't ack it.
> >
> > Thanks. I want to avoid repostin
Wei Liu writes ("Re: [PATCH 20/29] xl: split out cd related code"):
> On Mon, Feb 27, 2017 at 04:36:16PM +, Ian Jackson wrote:
> > Yes, indeed, that was the only reason I didn't ack it.
>
> Thanks. I want to avoid reposting as much as possible because this
> series is really long and tedious.
On 02/27/2017 02:56 AM, Juergen Gross wrote:
> On 26/02/17 08:15, Masanari Iida wrote:
>> This patch remove duplicate inclusion of linux/init.h in
>> xenbus_dev_frontend.c.
>> Confirm successfully compile after remove the line.
>>
>> Signed-off-by: Masanari Iida
> Reviewed-by: Juergen Gross
App
On Mon, Feb 27, 2017 at 04:36:16PM +, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH 20/29] xl: split out cd related code"):
> > On Mon, Feb 27, 2017 at 03:56:21PM +, Ian Jackson wrote:
> > > Wei Liu writes ("[PATCH 20/29] xl: split out cd related code"):
> > > > Signed-off-by: Wei Liu
>
Wei Liu writes ("Re: [PATCH 20/29] xl: split out cd related code"):
> On Mon, Feb 27, 2017 at 03:56:21PM +, Ian Jackson wrote:
> > Wei Liu writes ("[PATCH 20/29] xl: split out cd related code"):
> > > Signed-off-by: Wei Liu
> > > ---
> > > tools/xl/Makefile | 2 +-
> > > tools/xl/xl_cd.
Wei Liu writes ("[PATCH] libs/devicemodel: free xencall handle in error path in
_open()"):
> Change the allocation to use calloc to get zeroed structure. Free
> xencall handler in error path.
>
> Spotted by Coverity.
Acked-by: Ian Jackson
___
Xen-dev
On Sun, 2017-02-26 at 19:37 -0500, Boris Ostrovsky wrote:
> This is needed for subsequent changes to memory scrubbing.
>
So, this is "just" code motion and factorization, right?
If yes, I think the changelog should say so.
Regards,
Dario
--
<> (Raistlin Majere)
-
On 27/02/17 00:37, Boris Ostrovsky wrote:
> (Resending with corrected Tim's address, sorry)
>
> When a domain is destroyed the hypervisor must scrub domain's pages before
> giving them to another guest in order to prevent leaking the deceased
> guest's data. Currently this is done during guest's de
On Mon, Feb 27, 2017 at 03:56:21PM +, Ian Jackson wrote:
> Wei Liu writes ("[PATCH 20/29] xl: split out cd related code"):
> > Signed-off-by: Wei Liu
> > ---
> > tools/xl/Makefile | 2 +-
> > tools/xl/xl_cd.c | 114
> > ++
>
> Would
Wei Liu writes ("[PATCH 19/29] xl: split out vcpu related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 15/29] xl: split out network related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 12/29] xl: split out flask related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 18/29] xl: split out pci related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 27/29] xl: split out save/restore related code"):
> Add some function declarations to xl.h because they are now needed in
> multiple files.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.x
Wei Liu writes ("[PATCH 21/29] xl: split out memory related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 23/29] xl: split out functions to print out
information"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 26/29] xl: split out vm lifecycle control functions"):
> Including create, reboot, shutdown, pause, unpause and destroy.
>
> Lift a bunch of core data structures and function declarations to xl.h
> because they are needed in both xl_cmdimpl.c and xl_vmcontrol.c.
Acked-by:
Wei Liu writes ("[PATCH 16/29] xl: split out usb related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 11/29] xl: split out cpupool related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 28/29] xl: split out migration related code"):
> Include COLO / Remus code because they are built on top of the existing
> migration protocol.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://list
Wei Liu writes ("[PATCH 24/29] xl: split out vnc and console related code"):
> The new file also contains code for channel, which is just a console
> in disguise.
>
> Replace the call to vncviewer() with libxl_vncviewer_exec() directly in
> main_vncviewer.
Again, please separate out the non-code-
Wei Liu writes ("[PATCH 29/29] xl: merge xl_cmdimpl.c into xl.c"):
> After splitting out all the meaty bits, xl_cmdimpl.c doesn't contain
> much. Merge the rest into xl.c and delete the file.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@l
Wei Liu writes ("[PATCH 25/29] xl: split out miscellaneous functions"):
> A collections of functions that don't warrant their own files.
>
> Moving main_devd there requires lifting do_daemonize to xl_utils.c.
Acked-by: Ian Jackson
___
Xen-devel mailin
Wei Liu writes ("[PATCH 14/29] xl: split out block related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 17/29] xl: split out scheduler related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
BTW, for all of these code motion patches: it would be nice if the
comment said `code motion only, apart from the obvious Makefile
change' or something.
Ian.
_
Wei Liu writes ("[PATCH 10/29] xl: split out xl_parse.[ch]"):
> Some notable changes other than code movement:
> 1. rename cpurange_parse to parse_cpurange;
> 2. provide a function to return shutdown action name.
Can you split that out so that I can review it separately from the
code motion ?
Tha
Wei Liu writes ("[PATCH 20/29] xl: split out cd related code"):
> Signed-off-by: Wei Liu
> ---
> tools/xl/Makefile | 2 +-
> tools/xl/xl_cd.c | 114
> ++
Would you mind calling this `libxl_cdrom.c' rather than `_cd' ?
The latter makes me
Wei Liu writes ("[PATCH 22/29] xl: split out psr related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 13/29] xl: split out vtpm related code"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 07/29] xl: lift a bunch of macros to xl_utils.h"):
> We're going to split xl_cmdimpl.c into multiple files. Lift the commonly
> used macros to xl_utils.h.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
Wei Liu writes ("[PATCH 09/29] xl: split out tmem related code to xl_tmem.c"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 06/29] xl: remove trailing spaces in xl_cmdimpl.c"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 02/29] xl: update copyright information"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Wei Liu writes ("[PATCH 01/29] xl: remove accidentally committed hunk from
Makefile"):
> It was never intended to be committed. Lucky the high level Makefile was
> correct so it didn't cause us problem when building xl.
Acked-by: Ian Jackson
___
Xen-d
Wei Liu writes ("[PATCH 03/29] xl: remove inclusion of libxl_osdeps.h"):
> There is no reason for a client to include a private header from libxl.
> Remove the inclusion and define _GNU_SOURCE for {v,}asprintf in
> xl_cmdimpl.c.
Acked-by: Ian Jackson
_
Wei Liu writes ("[PATCH 04/29] xl: use <> variant to include Xen tools library
headers"):
> They should be treated like any other libraries installed on the build
> host. Compiler options are set correctly to point to their locations.
Acked-by: Ian Jackson
__
Wei Liu writes ("[PATCH 05/29] xl: generate _paths.h"):
> It is included by xl.h. Previously it was using _paths.h from some other
> place. We'd better generate one for xl as well.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.or
Wei Liu writes ("[PATCH 08/29] xl: move some helper functions to xl_utils.c"):
> Move some commonly used functions to a new file. Prepend "x" to
> function names to stick to consistent naming scheme.
The `xfoo' naming scheme is a reference to `xmalloc' et al, which
conventionally crash the program
>>
>> static void merge_chunks(struct page_info *pg, unsigned int node,
>> - unsigned int zone, unsigned int order)
>> + unsigned int zone, unsigned int order,
>> + bool_t need_scrub)
> Can't you calculate need_scrub from *
flight 106187 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106187/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-i386-xl-qemuu-
On Mon 27-02-17 12:25:10, Heiko Carstens wrote:
> On Mon, Feb 27, 2017 at 11:02:09AM +0100, Vitaly Kuznetsov wrote:
> > A couple of other thoughts:
> > 1) Having all newly added memory online ASAP is probably what people
> > want for all virtual machines.
>
> This is not true for s390. On s390 we
On 27/02/17 00:37, Boris Ostrovsky wrote:
> . so that it's easy to find pages that need to be scrubbed (those pages are
> now marked with _PGC_need_scrub bit).
>
> Signed-off-by: Boris Ostrovsky
> ---
> xen/common/page_alloc.c | 97 +++--
> xen/include/a
On Sun, 2017-02-26 at 16:53 +0100, Dario Faggioli wrote:
> On Fri, 2017-02-24 at 17:14 +0100, Dario Faggioli wrote:
> > On Wed, 2017-02-22 at 01:46 -0700, Jan Beulich wrote:
> > >
> > > However, comparing with the staging version of the file
> > > (which is heavily different), the immediate code i
On 27/02/17 00:37, Boris Ostrovsky wrote:
> +static void merge_chunks(struct page_info *pg, unsigned int node,
> + unsigned int zone, unsigned int order)
> +{
> +ASSERT(spin_is_locked(&heap_lock));
> +
> +/* Merge chunks as far as possible. */
> +while ( order <
On Fri, 2017-02-24 at 15:54 -0600, Haoran Li wrote:
> From: naroahlee
>
> Bug Analysis:
>
Just kill this line above.
> When more than one idle VCPUs that have the same PCPU as their
> previous running core invoke runq_tickle(), they will tickle the same
> PCPU. The tickled PCPU will only pick at
On 22/02/17 10:10, Jan Beulich wrote:
On 22.02.17 at 11:00, wrote:
>> On 22/02/17 09:23, Jan Beulich wrote:
>> On 20.02.17 at 12:00, wrote:
The domain builder in libxc no longer depends on leaked CPUID information
to
properly construct HVM domains. Remove the control dom
On 22/02/17 10:37, Jan Beulich wrote:
On 22.02.17 at 11:22, wrote:
>> On 22/02/17 09:16, Jan Beulich wrote:
>> On 20.02.17 at 12:00, wrote:
Leaf 0xb is reserved by AMD, and uniformly hidden from guests by the
>> toolstack
logic and hypervisor PV logic.
The previous d
>>> Vijay Kilari 02/27/17 12:43 PM >>>
>On Thu, Feb 9, 2017 at 9:41 PM, Jan Beulich wrote:
> On 09.02.17 at 16:56, wrote:
>>> +struct node_data node_data[MAX_NUMNODES];
>>> +
>>> +/* Mapping from pdx to node id */
>>> +int memnode_shift;
>>> +unsigned long memnodemapsize;
>>> +u8 *memnodemap
On 22/02/17 09:26, Jan Beulich wrote:
On 22.02.17 at 10:12, wrote:
>> On 22/02/17 08:23, Andrew Cooper wrote:
>>> On 22/02/17 07:31, Jan Beulich wrote:
>>> On 21.02.17 at 18:40, wrote:
> On 21/02/17 17:25, Jan Beulich wrote:
> On 20.02.17 at 12:00, wrote:
>>> The PV MSR
flight 106199 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106199/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On 27/02/17 13:23, Vijay Kilari wrote:
Hi Julien,
Hello Vijay,
On Wed, Feb 22, 2017 at 7:40 PM, Julien Grall wrote:
Hello,
There was few discussions recently about hiding SMMUs from DOM0 when using
ACPI. I thought it would be good to have a separate thread for this.
When using ACPI, the
The shadow logic should never create a shadow of a guest PTE which contains
reserved bits from the guests point of view. Such a shadowed entry might not
cause #PF[RSVD] when walked by hardware, thus won't behave architecturally
from the guests point of view.
Signed-off-by: Andrew Cooper
---
CC:
The existing pagetable walker has complicated return semantics, which squeeze
multiple pieces of information into single integer. This would be fine if the
information didn't overlap, but it does.
Specifically, _PAGE_INVALID_BITS for 3-level guests alias _PAGE_PAGED and
_PAGE_SHARED. A guest whi
All actions which refer to the active ldt/gdt/idt or task register
(e.g. loading a new segment selector) are known as implicit supervisor
accesses, even when the access originates from user code.
The distinction is necessary in the pagewalk when SMAP is enabled. Refer to
Intel SDM Vol 3 "Access R
Some bits are unconditionally reserved in pagetable entries, or reserved
because of alignment restrictions. Other bits are reserved because of control
register configuration.
Introduce helpers which take an individual vcpu and guest pagetable entry, and
calculates whether any reserved bits are se
hap_p2m_ga_to_gfn() and sh_page_fault() currently use guest_l1e_get_gfn() to
obtain the translation of a pagewalk. This is conceptually wrong (the
semantics of gw.l1e is an internal detail), and will actually be wrong when
PSE36 superpage support is fixed. Switch them to using guest_walk_to_gfn()
1 - 100 of 157 matches
Mail list logo