flight 107526 linux-arm-xen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107526/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 6 xen-boot fail REGR. vs. 107176
Tests which are f
According to SDM "ADVANCED PROGRAMMABLE INTERRUPT CONTROLLER (APIC) ->
"EXTENDED XAPIC (X2APIC)" -> "x2APIC State Transitions", the APIC mode
and APIC ID are preserved when handling INIT signal, no matter the
current mode is x2APIC mode or xAPIC. All the other APIC registers are
initialized, exactl
On 19/04/17 03:02, Glenn Enright wrote:
> On 18/04/17 20:36, Juergen Gross wrote:
>> On 12/04/17 00:45, Glenn Enright wrote:
>>> On 12/04/17 10:23, Andrew Cooper wrote:
On 11/04/2017 23:13, Glenn Enright wrote:
> On 11/04/17 21:49, Dietmar Hahn wrote:
>> Am Dienstag, 11. April 2017, 20
flight 107524 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107524/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 15
guest-localmigrate/x10 fail REGR. vs. 1056
On 18/04/17 20:36, Juergen Gross wrote:
On 12/04/17 00:45, Glenn Enright wrote:
On 12/04/17 10:23, Andrew Cooper wrote:
On 11/04/2017 23:13, Glenn Enright wrote:
On 11/04/17 21:49, Dietmar Hahn wrote:
Am Dienstag, 11. April 2017, 20:03:14 schrieb Glenn Enright:
On 11/04/17 17:59, Juergen Gro
flight 107502 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107502/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358
Regressions which are
On Thu, 13 Apr 2017, Wei Liu wrote:
> On Thu, Apr 13, 2017 at 02:07:54PM +0530, Bhupinder Thakur wrote:
> > Hi Wei,
> >
> >
> > >> /* --- pluggable kernel loader - */
> > >> diff --git a/tools/libxc/xc_dom_arm.c b/tools/libxc/xc_dom_arm.c
> > >> index a7e839e.
On Thu, 13 Apr 2017, Wei Liu wrote:
> On Thu, Apr 13, 2017 at 01:49:51PM +0530, Bhupinder Thakur wrote:
> > Hi Wei,
> >
> > >> diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> > >> index a612d1f..fe7f795 100644
> > >> --- a/tools/libxl/libxl_types.idl
> > >> +++ b/tools/lib
On Mon, 3 Apr 2017, Bhupinder Thakur wrote:
> Vpl011 emulation is enabled for a guest domain in Xen only when it is
> enabled through an option in libxl provided by the user through
> guest configuration.
>
> The pl011 enable/disable knob in libxl is introduced in the following
> patch:
> xen/arm:
On Mon, 3 Apr 2017, Bhupinder Thakur wrote:
> 1. Add two new HVM param handlers for:
> - Allocate a new event channel for sending/receiving events to/from Xen.
> - Map the PFN allocted by the toolstack to be used as IN/OUT ring buffers.
>
> 2. Add validation to disallow get/set of these HV
On Mon, 3 Apr 2017, Bhupinder Thakur wrote:
> Add emulation code to emulate read/write access to pl011 registers
> and pl011 interrupts:
>
> - Emulate DR read/write by reading and writing from/to the IN
> and OUT ring buffers and raising an event to the backend when
> there is data
flight 107501 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107501/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 107378
test-amd64-i386-xl-qemuu-w
flight 107497 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107497/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
flight 107527 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107527/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 5 ker
This run is configured for baseline tests only.
flight 71202 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71202/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build
On 18/04/17 20:46, Stefano Stabellini wrote:
> On Tue, 18 Apr 2017, Juergen Gross wrote:
>> On 18/04/17 20:37, Stefano Stabellini wrote:
>>> On Thu, 6 Apr 2017, Juergen Gross wrote:
On 06/04/17 18:43, Daniel Kiper wrote:
> On Thu, Apr 06, 2017 at 06:22:44PM +0200, Juergen Gross wrote:
On Tue, 18 Apr 2017, Juergen Gross wrote:
> On 18/04/17 20:37, Stefano Stabellini wrote:
> > On Thu, 6 Apr 2017, Juergen Gross wrote:
> >> On 06/04/17 18:43, Daniel Kiper wrote:
> >>> On Thu, Apr 06, 2017 at 06:22:44PM +0200, Juergen Gross wrote:
> On 06/04/17 18:06, Daniel Kiper wrote:
>
On 18/04/17 20:37, Stefano Stabellini wrote:
> On Thu, 6 Apr 2017, Juergen Gross wrote:
>> On 06/04/17 18:43, Daniel Kiper wrote:
>>> On Thu, Apr 06, 2017 at 06:22:44PM +0200, Juergen Gross wrote:
On 06/04/17 18:06, Daniel Kiper wrote:
> Hi Julien,
>
> On Thu, Apr 06, 2017 at 04:39
On Thu, 6 Apr 2017, Juergen Gross wrote:
> On 06/04/17 18:43, Daniel Kiper wrote:
> > On Thu, Apr 06, 2017 at 06:22:44PM +0200, Juergen Gross wrote:
> >> On 06/04/17 18:06, Daniel Kiper wrote:
> >>> Hi Julien,
> >>>
> >>> On Thu, Apr 06, 2017 at 04:39:13PM +0100, Julien Grall wrote:
> Hi Danie
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.12
which is based on your 'for-4.12/block' branch. It has one fix - to emit an
uevent whenever the size of the guest disk image changes.
Please pull!
drivers/block/x
Wei Liu writes ("Re: [PATCH RFC 07/20] migration: defer precopy policy to
libxl"):
> On Thu, Mar 30, 2017 at 01:19:41AM -0400, Joshua Otto wrote:
> > Is the memcpy() really significant here? If this were a tight
> > loop, sure, but every invocation of the policy callback implies
> > both a 4MB ne
Hey,
So, because of this issue/thread, I started having a look at the RCU
implementation in our tree:
[Xen-devel] xen/arm: Domain not fully destroyed when using credit2
https://lists.xenproject.org/archives/html/xen-devel/2017-01/msg02454.html
https://lists.xenproject.org/archives/html/xen-deve
On Tue, 18 Apr 2017, Paul Durrant wrote:
> > -Original Message-
> > From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> > Sent: 15 April 2017 01:40
> > To: Stefano Stabellini
> > Cc: Paul Durrant ; qemu-de...@nongnu.org;
> > Anthony Perard ; Wei Liu
> > ; jgr...@suse.com; julien.gr.
CALL FOR PAPERS
12th Workshop on Virtualization in High-Performance Cloud Computing (VHPC
'17)
held in conjunction with the International Supercomputing Conference - High
Performance,
June 18-22, 2017, Frankfurt, Germany.
On Tue, 18 Apr 2017, Juergen Gross wrote:
> On 14/04/17 19:52, Stefano Stabellini wrote:
> > On Fri, 14 Apr 2017, Juergen Gross wrote:
> >> On 14/04/17 08:06, Oleksandr Andrushchenko wrote:
> >>> On 04/14/2017 03:12 AM, Stefano Stabellini wrote:
> On Tue, 11 Apr 2017, Oleksandr Andrushchenko w
flight 107499 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107499/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f76bc44362e5f0a2ea509c07b2f6846bd9833ee8
baseline version:
ovmf 51de5c302fed13b110963
flight 107494 linux-arm-xen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107494/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 6 xen-boot fail REGR. vs. 107176
Tests which are f
Add name=value parsing options for com1 and com2 to add flexibility
in setting register values for MMIO UART devices.
Maintain backward compatibility with previous positional parameter
specfications.
eg. com1=115200,8n1,0x3f8,4
eg. com1=115200,8n1,0x3f8,4,reg_width=4,reg_shift=2
eg. com1=baud=115
On 18/04/17 09:50 AM, Konrad Rzeszutek Wilk wrote:
> I am not sure if you know, but you can add on each patch the respective
> maintainer via 'CC'. That way you can have certain maintainers CCed only
> on the subsystems they cover. You put it after (or before) your SoB and
> git send-email happil
On 18/04/17 08:27 AM, Konrad Rzeszutek Wilk wrote:
> Interesting that you didn't CC any of the maintainers. Could you
> do that in the future please?
Please read the cover letter. The distribution list for the patchset
would have been way too large to cc every maintainer (even as limited as
it
Signed-off-by: Ian Jackson
---
mg-execute-flight | 7 +++
1 file changed, 7 insertions(+)
diff --git a/mg-execute-flight b/mg-execute-flight
index bd09df3..5a861b0 100755
--- a/mg-execute-flight
+++ b/mg-execute-flight
@@ -35,6 +35,8 @@ publish=false
badusage () { echo >&2 "bad usage"; us
"proxy config: Add ability to install MITM TLS cert" sets this up on
the test hosts, but not the controller.
We don't really want this odd configuration globally on the
controller. Instead, we have to pass it where it is needed.
Signed-off-by: Ian Jackson
---
ts-coverity-upload | 5 +
1 fi
No functional change.
Signed-off-by: Ian Jackson
---
sg-run-job | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/sg-run-job b/sg-run-job
index cc24b73..8f7c36f 100755
--- a/sg-run-job
+++ b/sg-run-job
@@ -133,6 +133,15 @@ proc setstatus {st} {
jobdb::j
This documentation was omitted from
"mg-repro-setup: Provide useful info for allocation system"
Signed-off-by: Ian Jackson
---
mg-allocate | 2 ++
1 file changed, 2 insertions(+)
diff --git a/mg-allocate b/mg-allocate
index 803abb6..87a4e71 100755
--- a/mg-allocate
+++ b/mg-allocate
@@ -55,6 +
This works like truncate_testids, except that the steps which match
are never run (truncate_testids skips steps *after* matching steps,
and also doesn't skip some things like log capture).
If the programmed testid for a step ends in `(*)' to request
substitutions of the stepno, the skip matching t
We are going to want to process the nearly-finished testid. So
allocate a stepno at the last possible moment.
No overall functional chagne.
Signed-off-by: Ian Jackson
---
sg-run-job | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/sg-run-job b/sg-run-job
index 8f7c36f..8
This should hopefully actually fix the coverity upload failures.
Also, I tripped over some infelicities in mg-repro-setup.
I'm going to push this to pretest now.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Rename the variable to truncate_testids. It contains glob patterns as
for Tcl `string match', space-separated.
Adjust the two places which set it: cs-bisection-step (which needs to
quote any special characters) and mg-repro-setup (which does not
really process the value, but ought to be able to c
Signed-off-by: Ian Jackson
---
mg-repro-setup | 5 +
1 file changed, 5 insertions(+)
diff --git a/mg-repro-setup b/mg-repro-setup
index bb429b4..af679d0 100755
--- a/mg-repro-setup
+++ b/mg-repro-setup
@@ -34,6 +34,7 @@ usage () { cat < estimated duration (default = 28d)
--rogue
Signed-off-by: Ian Jackson
---
mg-allocate | 14 ++
1 file changed, 14 insertions(+)
diff --git a/mg-allocate b/mg-allocate
index 87a4e71..2dfbdb1 100755
--- a/mg-allocate
+++ b/mg-allocate
@@ -57,6 +57,8 @@
#
# --info-base= Replaces `manual' at start of info put into plan.
#
+
Like target_putfilecontents_* but for files on controller.
No callers yet.
Signed-off-by: Ian Jackson
---
Osstest/TestSupport.pm | 11 +++
1 file changed, 11 insertions(+)
diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm
index 2b4a1f4..d482e1d 100644
--- a/Osstest/TestSuppo
Also, print a sensible message if allocation fails.
Signed-off-by: Ian Jackson
---
mg-repro-setup | 11 ---
1 file changed, 8 insertions(+), 3 deletions(-)
diff --git a/mg-repro-setup b/mg-repro-setup
index af679d0..0b3137a 100755
--- a/mg-repro-setup
+++ b/mg-repro-setup
@@ -48,6 +48,8
On Tue, Apr 18, 2017 at 09:42:20AM -0600, Logan Gunthorpe wrote:
>
>
> On 18/04/17 08:27 AM, Konrad Rzeszutek Wilk wrote:
> > Interesting that you didn't CC any of the maintainers. Could you
> > do that in the future please?
>
> Please read the cover letter. The distribution list for the patchs
Move microcode loading earlier for the boot CPU and secondary CPUs so
that it takes place before identify_cpu() is called for each CPU.
Without this, the detected features may be wrong if the new microcode
loading adjusts the feature bits. That could mean that some fixes (e.g.
d6e9f8d4f35d ("x86/vm
Ishani,
> On 12 Apr 2017, at 16:38, Ishani wrote:
>
> Hello,
>
> I seemed to have overwritten the correct file by the output of the
> clang-format tool. My main idea is to compare output file and correct file
> and take their comparison. Since there are features which are partially
> impleme
The default values are Linux device names. No users yet.
Signed-off-by: Wei Liu
---
Rerun autogen.sh
---
m4/paths.m4 | 12
1 file changed, 12 insertions(+)
diff --git a/m4/paths.m4 b/m4/paths.m4
index 93ce89ab40..f208b7e39f 100644
--- a/m4/paths.m4
+++ b/m4/paths.m4
@@ -147,3 +147,
Signed-off-by: Wei Liu
---
tools/hotplug/FreeBSD/rc.d/xencommons.in | 8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/tools/hotplug/FreeBSD/rc.d/xencommons.in
b/tools/hotplug/FreeBSD/rc.d/xencommons.in
index 2fcd84ab6d..ccd5a9b055 100644
--- a/tools/hotplug/FreeBSD/rc.d
Wei Liu (3):
paths.m4: provide XENSTORED_{KVA,PORT}
oxenstored: provide options to define xenstored devices
hotplug/FreeBSD: configure xenstored
m4/paths.m4 | 12
tools/hotplug/FreeBSD/rc.d/xencommons.in | 8 +---
tools/ocaml/xenstored/define.m
Signed-off-by: Wei Liu
---
tools/ocaml/xenstored/define.ml | 3 ---
tools/ocaml/xenstored/domains.ml | 7 +--
tools/ocaml/xenstored/oxenstored.conf.in | 3 +++
tools/ocaml/xenstored/xenstored.ml | 4 +++-
4 files changed, 11 insertions(+), 6 deletions(-)
diff --git a/t
flight 107495 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107495/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 15
guest-localmigrate/x10 fail REGR. vs. 1056
On Tue, Apr 18, 2017 at 06:13:54AM -0600, Jan Beulich wrote:
> >>> On 27.03.17 at 12:44, wrote:
> > --- a/xen/include/xen/hvm/irq.h
> > +++ b/xen/include/xen/hvm/irq.h
> > @@ -81,14 +81,16 @@ struct hvm_girq_dpci_mapping {
> >
> > /* Protected by domain's event_lock */
> > struct hvm_irq_dpci
On Tue, Apr 18, 2017 at 02:13:59PM +, David Laight wrote:
> From: Logan Gunthorpe
> > Sent: 13 April 2017 23:05
> > Straightforward conversion to the new helper, except due to
> > the lack of error path, we have to warn if unmapable memory
> > is ever present in the sgl.
Interesting that you d
On Thu, Apr 13, 2017 at 02:04:21PM -0700, Stefano Stabellini wrote:
> The following commit:
>
> commit 815dd18788fe0d41899f51b91d0560279cf16b0d
> Author: Bart Van Assche
> Date: Fri Jan 20 13:04:04 2017 -0800
>
> treewide: Consolidate get_dma_ops() implementations
>
> rearranges g
> -Original Message-
[snip]
> >
> > Not quite sure I understand this. The QEMu device model does not 'pass
> DMA requests' as such, it maps guest RAM and reads or writes to emulate
> DMA, right? So, what's needed is a mechanism to map guest RAM by 'bus
> address'... i.e. an address that wil
>>> On 18.04.17 at 15:44, wrote:
> On Tue, Apr 18, 2017 at 06:35:57AM -0600, Jan Beulich wrote:
>> >>> On 27.03.17 at 12:44, wrote:
>> > --- a/xen/arch/x86/hvm/vioapic.c
>> > +++ b/xen/arch/x86/hvm/vioapic.c
>> > @@ -199,6 +199,34 @@ static void vioapic_write_redirent(
>> > unmasked = un
On 18/04/17 15:52, Greg KH wrote:
> On Thu, Apr 13, 2017 at 06:55:54PM +0200, Greg KH wrote:
>> On Thu, Apr 13, 2017 at 06:28:33PM +0200, Juergen Gross wrote:
>>> On 13/04/17 18:24, Greg KH wrote:
On Thu, Apr 13, 2017 at 04:49:49PM +0200, Juergen Gross wrote:
> Revert commit 72a9b186292 ("
On Thu, Apr 13, 2017 at 06:55:54PM +0200, Greg KH wrote:
> On Thu, Apr 13, 2017 at 06:28:33PM +0200, Juergen Gross wrote:
> > On 13/04/17 18:24, Greg KH wrote:
> > > On Thu, Apr 13, 2017 at 04:49:49PM +0200, Juergen Gross wrote:
> > >> Revert commit 72a9b186292 ("xen: Remove event channel notificat
On Thu, 06 Apr, at 04:55:11PM, Mark Rutland wrote:
>
> Please, let's keep the Xen knowledge constrained to the Xen EFI wrapper,
> rather than spreading it further.
>
> IMO, given reset_system is a *mandatory* function, the Xen wrapper
> should provide an implementation.
>
> I don't see why you c
On Tue, Apr 18, 2017 at 06:35:57AM -0600, Jan Beulich wrote:
> >>> On 27.03.17 at 12:44, wrote:
> > --- a/xen/arch/x86/hvm/vioapic.c
> > +++ b/xen/arch/x86/hvm/vioapic.c
> > @@ -199,6 +199,34 @@ static void vioapic_write_redirent(
> > unmasked = unmasked && !ent.fields.mask;
> > }
>
On Tue, Apr 18, 2017 at 04:34:52PM +0800, Lan Tianyu wrote:
> On 2017年04月17日 22:43, Konrad Rzeszutek Wilk wrote:
> > On Fri, Mar 17, 2017 at 07:27:15PM +0800, Lan Tianyu wrote:
> >> From: Chao Gao
> >>
> >> When irq remapping enabled, IOAPIC Redirection Entry maybe is in remapping
> >> format. If
On Tue, Apr 18, 2017 at 04:18:52PM +0800, Lan Tianyu wrote:
> On 2017年04月17日 22:39, Konrad Rzeszutek Wilk wrote:
> > On Fri, Mar 17, 2017 at 07:27:03PM +0800, Lan Tianyu wrote:
> >> This patch is to add irq request callback for platform implementation
> >> to deal with irq remapping request.
> >>
>
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, April 18, 2017 6:33 PM
>
> This is an optional feature and hence we should check for it before
> use.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Kevin Tian
___
Xen-devel mailing list
X
On Tue, Apr 18, 2017 at 03:24:35PM +0800, Lan Tianyu wrote:
> Hi Konrad:
> Thanks for your review.
>
> On 2017年04月17日 22:36, Konrad Rzeszutek Wilk wrote:
> > On Fri, Mar 17, 2017 at 07:27:02PM +0800, Lan Tianyu wrote:
> >> This patch is to introduce create, destroy and query capabilities
> >
Alistair Francis writes ("[PATCH 2/2] tools: Use POSIX signal.h instead of
sys/signal.h"):
> The POSIX spec specifies to use:
> #include
> instead of:
> #include
> as seen here:
>http://pubs.opengroup.org/onlinepubs/009695399/functions/signal.html
Both:
Acked-by: Ian Jackson
Juli
On 18/04/17 14:16, Jan Beulich wrote:
> Commit b988e88cc0 ("x86/emul: Add feature check for clzero") added a
> feature check to the emulator, which breaks the harness without this
> flag being forced to true.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
Commit b988e88cc0 ("x86/emul: Add feature check for clzero") added a
feature check to the emulator, which breaks the harness without this
flag being forced to true.
Signed-off-by: Jan Beulich
--- a/tools/tests/x86_emulator/x86_emulate.c
+++ b/tools/tests/x86_emulator/x86_emulate.c
@@ -89,6 +89,1
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 18 April 2017 11:34
> To: xen-devel
> Cc: Suravee Suthikulpanit ; Julien Grall
> ; Andrew Cooper ;
> Paul Durrant ; Jun Nakajima
> ; Kevin Tian ; Boris
> Ostrovsky
> Subject: [PATCH v2 4/4] x86/HVM: don't uniforml
This run is configured for baseline tests only.
flight 71201 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71201/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 51de5c302fed13b110963b3863fe69d6e2a51079
baseline v
On 04/18/2017 08:43 AM, Jan Beulich wrote:
On 18.04.17 at 14:32, wrote:
>> On 04/18/2017 02:49 AM, Jan Beulich wrote:
>> On 13.04.17 at 18:55, wrote:
On 04/13/2017 11:46 AM, Jan Beulich wrote:
On 03.04.17 at 18:50, wrote:
>> While waiting for a lock we may want to peri
On Tue, Apr 18, 2017 at 11:11:20AM +0100, Christian Lindig wrote:
>
> > On 18. Apr 2017, at 10:59, Wei Liu wrote:
> >
> > Forgive my ignorance for the Ocaml ecosystem, but I can't seem to find a
> > way to conditionally compile ocaml source code easily.
> >
> > Presumably you mean "Determine th
flight 107493 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107493/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 3 host-install(3)broken REGR. vs. 107442
test-armhf-armhf-libvir
flight 107491 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107491/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 4 host-build-prep fail REGR. vs. 107358
test-armhf-armhf-xl-c
On Tue, Apr 11, 2017 at 11:03:56AM +0100, Roger Pau Monne wrote:
> Hello,
>
> The following series contain an implementation of handlers for the PCI
> configuration space inside of Xen. This allows Xen to detect accesses to the
> PCI configuration space and react accordingly.
>
> I'm still not su
>>> On 18.04.17 at 14:32, wrote:
> On 04/18/2017 02:49 AM, Jan Beulich wrote:
> On 13.04.17 at 18:55, wrote:
>>> On 04/13/2017 11:46 AM, Jan Beulich wrote:
>>> On 03.04.17 at 18:50, wrote:
> While waiting for a lock we may want to periodically run some
> code. We could use spin_t
On Tue, Apr 18, 2017 at 12:42:07PM +0100, Roger Pau Monne wrote:
>The current vIO APIC for PVH Dom0 doesn't allow non-contiguous GSIs, which
>means that all GSIs must belong to an IO APIC. This doesn't match reality,
>where there are systems with non-contiguous GSIs.
>
>In order to fix this add a b
>>> On 27.03.17 at 12:44, wrote:
> --- a/xen/arch/x86/hvm/vioapic.c
> +++ b/xen/arch/x86/hvm/vioapic.c
> @@ -199,6 +199,34 @@ static void vioapic_write_redirent(
> unmasked = unmasked && !ent.fields.mask;
> }
>
> +if ( is_hardware_domain(d) && unmasked )
> +{
> +xen
On 04/18/2017 02:49 AM, Jan Beulich wrote:
On 13.04.17 at 18:55, wrote:
>> On 04/13/2017 11:46 AM, Jan Beulich wrote:
>> On 03.04.17 at 18:50, wrote:
While waiting for a lock we may want to periodically run some
code. We could use spin_trylock() but since it doesn't take lock
>
>>> On 27.03.17 at 12:44, wrote:
> So they can be called outside of the physdev.c file.
But they aren't meant to be, which is the entire reason the
declarations aren't in a header. Hence the rationale needs to be
extended here.
Jan
___
Xen-devel mail
>>> On 27.03.17 at 12:44, wrote:
> --- a/xen/arch/x86/io_apic.c
> +++ b/xen/arch/x86/io_apic.c
> @@ -2261,6 +2261,28 @@ int io_apic_set_pci_routing (int ioapic, int pin, int
> irq, int edge_level, int a
> return 0;
> }
>
> +unsigned int io_apic_get_gsi_trigger(unsigned int gsi)
bool
> +
>>> On 27.03.17 at 12:44, wrote:
> --- a/xen/include/xen/hvm/irq.h
> +++ b/xen/include/xen/hvm/irq.h
> @@ -81,14 +81,16 @@ struct hvm_girq_dpci_mapping {
>
> /* Protected by domain's event_lock */
> struct hvm_irq_dpci {
> -/* Guest IRQ to guest device/intx mapping. */
> -struct list_h
>>> On 18.04.17 at 13:55, wrote:
> On Tue, Apr 18, 2017 at 05:52:47AM -0600, Jan Beulich wrote:
>> >>> On 18.04.17 at 13:42, wrote:
>> > @@ -538,7 +523,8 @@ void vioapic_reset(struct domain *d)
>> > for ( i = 0; i < d->arch.hvm_domain.nr_vioapics; i++ )
>> > {
>> > struct hvm_v
On 18/04/17 12:02, Andrew Cooper wrote:
> On 18/04/17 07:31, Juergen Gross wrote:
>> @@ -281,22 +274,24 @@ static bool __init xen_check_mwait(void)
>> return false;
>> #endif
>> }
>> -static void __init xen_init_cpuid_mask(void)
>> +
>> +static bool __init xen_check_xsave(void)
>> {
>> -
On Tue, Apr 18, 2017 at 05:52:47AM -0600, Jan Beulich wrote:
> >>> On 18.04.17 at 13:42, wrote:
> > @@ -538,7 +523,8 @@ void vioapic_reset(struct domain *d)
> > for ( i = 0; i < d->arch.hvm_domain.nr_vioapics; i++ )
> > {
> > struct hvm_vioapic *vioapic = domain_vioapic(d, i);
>
flight 107490 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107490/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-ovmf-amd64 15 guest-localmigrate/x10 fail in 107481
pass in 107490
test-amd64-i386-r
>>> On 18.04.17 at 13:42, wrote:
> @@ -538,7 +523,8 @@ void vioapic_reset(struct domain *d)
> for ( i = 0; i < d->arch.hvm_domain.nr_vioapics; i++ )
> {
> struct hvm_vioapic *vioapic = domain_vioapic(d, i);
> -unsigned int pin, nr_pins = vioapic->nr_pins;
> +unsi
>>> On 18.04.17 at 12:55, wrote:
> I made a test patch based on v10 and attached it in mail. Could you please
> help to check it? Thanks!
This looks reasonable at the first glance, albeit I continue to be
unconvinced that this is the only (reasonable) way of solving the
problem. After all we don'
> On 13 Apr 2017, at 14:56, Jason Long wrote:
>
> It is a good news and I hope Xen experts thinking about beginners like me.
> Xen is great but have some problems in documenting and easy to use. I hope to
> see this book on Xen Project website soon.
>
> Thank you Xen team.
You are welcome. T
On Tue, Apr 18, 2017 at 01:16:04PM +0300, Razvan Cojocaru wrote:
> On 04/18/2017 01:03 PM, Wei Liu wrote:
> > On Mon, Apr 17, 2017 at 02:33:11PM -0700, Alistair Francis wrote:
> >> The POSIX spec specifies to use:
> >> #include
> >> instead of:
> >> #include
> >> as seen here:
> >>htt
The current vIO APIC for PVH Dom0 doesn't allow non-contiguous GSIs, which
means that all GSIs must belong to an IO APIC. This doesn't match reality,
where there are systems with non-contiguous GSIs.
In order to fix this add a base_gsi field to each hvm_vioapic struct, in order
to store the base G
Hi Wei,
Release-acked-by: Julien Grall
Cheers,
On 18/04/17 11:13, Wei Liu wrote:
Really CC Julien. :-/
On Tue, Apr 18, 2017 at 11:10:59AM +0100, Wei Liu wrote:
Cc Julien
I think these two patches should be in 4.9.
On Mon, Apr 17, 2017 at 02:33:10PM -0700, Alistair Francis wrote:
The POSI
On 17-04-13 05:50:01, Jan Beulich wrote:
> >>> On 13.04.17 at 13:44, wrote:
> > On 17-04-13 05:31:41, Jan Beulich wrote:
> >> >>> On 13.04.17 at 13:11, wrote:
> >> > On 17-04-13 04:58:06, Jan Beulich wrote:
> >> >> >>> On 13.04.17 at 12:49, wrote:
> >> >> > How about a per socket array like this
flight 107492 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107492/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 51de5c302fed13b110963b3863fe69d6e2a51079
baseline version:
ovmf 51a1db9b24d850c785d24
flight 107489 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/107489/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
>>> On 18.04.17 at 05:41, wrote:
> On Tue, Apr 18, 2017 at 02:13:36AM -0600, Jan Beulich wrote:
> On 16.04.17 at 22:13, wrote:
>>> 3. Like what we do in struct irq_guest_action_t, can we limit the
>>> maximum of entry we support in the list. With this approach, during
>>> domain creation, we
>>> On 17.04.17 at 21:09, wrote:
> The spinlock in kexec_swap_images() was removed as
> this function is only reachable on the kexec hypercall, which is
> now protected at the top-level in do_kexec_op_internal(),
> thus the local spinlock is no longer necessary.
But perhaps leave an ASSERT() ther
>>> On 17.04.17 at 21:09, wrote:
> --- a/xen/common/kexec.c
> +++ b/xen/common/kexec.c
> @@ -50,9 +50,10 @@ static cpumask_t crash_saved_cpus;
>
> static struct kexec_image *kexec_image[KEXEC_IMAGE_NR];
>
> -#define KEXEC_FLAG_DEFAULT_POS (KEXEC_IMAGE_NR + 0)
> -#define KEXEC_FLAG_CRASH_POS
On 18/04/17 11:32, Jan Beulich wrote:
> This is an optional feature and hence we should check for it before
> use.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-d
On Tue, Apr 18, 2017 at 02:13:36AM -0600, Jan Beulich wrote:
On 16.04.17 at 22:13, wrote:
>> 3. Like what we do in struct irq_guest_action_t, can we limit the
>> maximum of entry we support in the list. With this approach, during
>> domain creation, we calculate the available entries and comp
On 04/18/2017 01:32 PM, Jan Beulich wrote:
> This is an optional feature and hence we should check for it before
> use.
>
> Signed-off-by: Jan Beulich
> ---
> v2: Re-do detection of availability, resulting in almost all of the
> changes done here being different than in v1.
Acked-by: Razvan
On 18/04/17 11:31, Jan Beulich wrote:
> While I did review d0a699a389 ("x86/monitor: add support for descriptor
> access events") it didn't really occur to me that someone could be this
> blunt and add unguarded emulation again just a few weeks after we
> guarded all special purpose emulator invoca
1 - 100 of 153 matches
Mail list logo