>>> On 21.05.15 at 21:30, wrote:
> flight 56898 xen-4.5-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/56898/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-xl-qemut-win7-amd64 16 guest-s
Hi, all
Recently, we encountered the problem that Windows 2008 R2 virtual machines blue
screen when running on xen4.1.2, Mircrosoft engineer said it's a known issue
with Intel Xeon processors:
. Intel Xeon Processor E5 v2 Product Family: CA135 May 2014 -"Incorrect Page
Translation when EPT is e
On Fri, 2015-05-22 at 08:11 +0100, Jan Beulich wrote:
> >>> On 21.05.15 at 21:30, wrote:
> > flight 56898 xen-4.5-testing real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/56898/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
> > including tests whi
>>> On 21.05.15 at 15:00, wrote:
> --- a/xen/arch/x86/hvm/event.c
> +++ b/xen/arch/x86/hvm/event.c
> @@ -88,55 +88,29 @@ static int hvm_event_traps(uint8_t sync,
> vm_event_request_t *req)
> return 1;
> }
>
> -static inline
> -void hvm_event_cr(uint32_t reason, unsigned long value,
> -
>>> On 21.05.15 at 15:03, wrote:
> Would it be possible to send out a pre-disclosure notice as soon as
> permission is granted from the discoverer and the vulnerability is verified
> as valid? In other words, could a pre-disclosure email be sent to parties on
> the pre-disclosure list *PRIOR*
On 22/05/2015 07:29, Jan Beulich wrote:
> Commit bd1b4a71b3 ("x86/shadow: fix shadow_track_dirty_vram to work on
> hvm guests"), trying to mirror its HAP counterpart, deleted a couple of
> assignments to rc without making sure rc is initialized on all paths.
>
> Coverity ID: 1299410
> Signed-off-by
At 07:29 +0100 on 22 May (1432279746), Jan Beulich wrote:
> Commit bd1b4a71b3 ("x86/shadow: fix shadow_track_dirty_vram to work on
> hvm guests"), trying to mirror its HAP counterpart, deleted a couple of
> assignments to rc without making sure rc is initialized on all paths.
>
> Coverity ID: 1299
>>> On 22.05.15 at 09:08, wrote:
> Recently, we encountered the problem that Windows 2008 R2 virtual machines
> blue screen when running on xen4.1.2, Mircrosoft engineer said it's a known
> issue with Intel Xeon processors:
> . Intel Xeon Processor E5 v2 Product Family: CA135 May 2014 -"Incorrec
>>> On 22.05.15 at 09:19, wrote:
> On Fri, 2015-05-22 at 08:11 +0100, Jan Beulich wrote:
>> >>> On 21.05.15 at 21:30, wrote:
>> > flight 56898 xen-4.5-testing real [real]
>> > http://logs.test-lab.xenproject.org/osstest/logs/56898/
>> >
>> > Regressions :-(
>> >
>> > Tests which did not succee
On 05/22/2015 10:36 AM, Jan Beulich wrote:
On 21.05.15 at 15:00, wrote:
>> --- a/xen/arch/x86/hvm/event.c
>> +++ b/xen/arch/x86/hvm/event.c
>> @@ -88,55 +88,29 @@ static int hvm_event_traps(uint8_t sync,
>> vm_event_request_t *req)
>> return 1;
>> }
>>
>> -static inline
>> -void hvm_
flight 56936 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56936/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 56492
test-amd64-i386-xl-qemuu-win
>>> On 14.05.15 at 17:06, wrote:
> @@ -3584,12 +3591,8 @@ int shadow_track_dirty_vram(struct domain *d,
> rc = -ENODATA;
> }
> else if (dirty_vram->last_dirty == -1)
> -{
> /* still completely clean, just copy our empty bitmap */
> -rc = -EFAULT;
> -
>>> On 22.05.15 at 09:50, wrote:
> On 05/22/2015 10:36 AM, Jan Beulich wrote:
> On 21.05.15 at 15:00, wrote:
> Should I drop the introduction of the XR0 event from this patch and come
> back to it in the following iteration of the series?
Or simply adjust the title of the patch.
>> Also, fo
Hello Sander,
Friday, May 15, 2015, 12:47:27 AM, you wrote:
> Sorry for the resend, i messed up the to's en from's.
> Hi Konrad / David,
> One big snip on this thread, got some more debug info, hopefully this will
> lead to something:
> On a working kernel (with the two seemingly non related
Signed-off-by: Olaf Hering
Acked-by: George Dunlap
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xentrace/xenalyze.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/xentrace/xenalyze.c b/tools/xentrace/xenalyze.c
in
Signed-off-by: Olaf Hering
Acked-by: George Dunlap
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xentrace/xenalyze.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/xentrace/xenalyze.c b/tools/xentrace/xenalyze.c
in
Having xenalyze in the source tree makes it much easier to keep private
debug code in hypervisor and xenalyze in sync. It helped alot while
debugging the root cause for commit 607e8494c42397fb249191904066cace6ac9a880.
changes between v2 and v3:
- move to tools/xentrace
changes between v1 and v2:
To match the hypervisor default which was introduced in
9da0c5b63933b9912e3903190601661813954d0d, bump the limit.
Signed-off-by: Olaf Hering
Acked-by: George Dunlap
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xentrace/analyze.h | 2 +-
1
Result of "sed -i 's@[[:blank:]]\+$@@' tools/xentrace/xenalyze.c"
Signed-off-by: Olaf Hering
Acked-by: George Dunlap
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xentrace/xenalyze.c | 350 +++---
1 f
Since xenalyze is now upstream its Open Source and part of the given
release.
Signed-off-by: Olaf Hering
Acked-by: George Dunlap
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xentrace/xenalyze.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/tools/xentrac
Signed-off-by: Olaf Hering
Acked-by: George Dunlap
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xentrace/xenalyze.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/xentrace/xenalyze.c b/tools/xentrace/xenalyze.c
index 58e8456..0
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xentrace/xenalyze.c | 75 ++-
1 file changed, 68 insertions(+), 7 deletions(-)
diff --git a/tools/xentrace/xenalyze.c b/tools/xentrace/xenalyze
>>> On 21.05.15 at 13:48, wrote:
On 21.05.15 at 13:08, wrote:
>> On 21/05/15 11:15, Jan Beulich wrote:
>>> This is needed as stacks are going to become non-executable. Use
>>> separate stub pages (shared among suitable CPUs on the same node)
>>> instead.
>>>
>>> Stub areas (currently 128 byt
> -Original Message-
> From: Bob Liu [mailto:bob@oracle.com]
> Sent: 22 May 2015 01:00
> To: xen-devel@lists.xen.org
> Cc: David Vrabel; just...@spectralogic.com; konrad.w...@oracle.com; Roger
> Pau Monne; Paul Durrant; Julien Grall; boris.ostrov...@oracle.com; linux-
> ker...@vger.kern
>>> On 22.05.15 at 10:25, wrote:
On 21.05.15 at 13:48, wrote:
> On 21.05.15 at 13:08, wrote:
>>> It might be wise to have a BUILD_BUG_ON() which confirms that
>>> STUBS_PER_PAGE is a power of two, which is a requirement given the way
>>> it is used.
>>
>> Good idea.
>
> Sadly this can
On 22/05/2015 09:25, Jan Beulich wrote:
On 21.05.15 at 13:48, wrote:
> On 21.05.15 at 13:08, wrote:
>>> On 21/05/15 11:15, Jan Beulich wrote:
This is needed as stacks are going to become non-executable. Use
separate stub pages (shared among suitable CPUs on the same node)
flight 56967 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56967/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
In osstest self gate flight 56412 a change to make HVM guests
configurably use "xl shutdown -F" (-F == use ACPI fallback if PV drivers
absent) and apply the option to the win7 and winxpsp3 tests went into
production.
On winxpsp3 this appears to have been a success and things are working
pretty wel
On 22/05/15 07:37, Jan Beulich wrote:
On 21.05.15 at 17:16, wrote:
>> On 21/05/15 15:53, Jan Beulich wrote:
>> On 21.05.15 at 15:36, wrote:
On 21/05/15 11:32, Jan Beulich wrote:
On 20.05.15 at 17:54, wrote:
>> @@ -827,9 +828,11 @@ __gnttab_map_grant_ref(
>>
On 22/05/15 09:54, Ian Campbell wrote:
> In osstest self gate flight 56412 a change to make HVM guests
> configurably use "xl shutdown -F" (-F == use ACPI fallback if PV drivers
> absent) and apply the option to the win7 and winxpsp3 tests went into
> production.
>
> On winxpsp3 this appears to hav
>>> On 22.05.15 at 10:54, wrote:
> May 22 01:28:33.149028 (XEN) VCPU information and callbacks for
> domain 18:
> May 22 01:28:33.156972 (XEN) VCPU0: CPU2 [has=F] poll=0
> upcall_pend=00 upcall_mask=00 dirty_cpus={2}
> May 22 01:28:33.165038 (XEN) cpu_hard_affinit
On 05/22/2015 04:31 PM, Paul Durrant wrote:
>> -Original Message-
>> From: Bob Liu [mailto:bob@oracle.com]
>> Sent: 22 May 2015 01:00
>> To: xen-devel@lists.xen.org
>> Cc: David Vrabel; just...@spectralogic.com; konrad.w...@oracle.com; Roger
>> Pau Monne; Paul Durrant; Julien Grall; bo
On Fri, 2015-05-22 at 08:48 +0100, Jan Beulich wrote:
> >>> On 22.05.15 at 09:19, wrote:
> > On Fri, 2015-05-22 at 08:11 +0100, Jan Beulich wrote:
> >> >>> On 21.05.15 at 21:30, wrote:
> >> > flight 56898 xen-4.5-testing real [real]
> >> > http://logs.test-lab.xenproject.org/osstest/logs/56898/
On Fri, 2015-05-22 at 09:59 +0100, Andrew Cooper wrote:
> On 22/05/15 09:54, Ian Campbell wrote:
> > In osstest self gate flight 56412 a change to make HVM guests
> > configurably use "xl shutdown -F" (-F == use ACPI fallback if PV drivers
> > absent) and apply the option to the win7 and winxpsp3 t
FreeBSD blkback uses the path xenstore node in order to fetch the path to
the underlying backing storage (either a block device or raw image). This
node is set by the hotplug scripts.
Signed-off-by: Roger Pau Monné
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Tim Deegan
---
xen/inclu
Allow FreeBSD to execute hotplug scripts when attaching disk devices.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl/libxl_freebsd.c | 114
1 file changed, 83 insertions(+), 31 deletions(-)
diff --git a
FreeBSD blkback doesn't use the physical-device xenstore node because it
can handle both block devices and raw files directly. Instead introduce a
new xenstore blkback node that is used by hotplug scripts to write the path
to the block device or raw image.
Signed-off-by: Roger Pau Monné
Cc: Ian J
This series enables the execution of disk hotplug scripts on FreeBSD. In
order for this to work a patch for the FreeBSD kernel is also needed, which
can be found at:
https://people.freebsd.org/~royger/freebsd-hotplug/
This series introduces a new xenstore blkback node, called "path" that's
use
physical-device is only used by Linux and NetBSD blkback, there's no need to
write it when the host is using a different OS.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl/libxl.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/libxl/li
This is the default hotplug script for block devices. Its only job is to
copy the "params" blkback xenstore node to "path".
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Wei Liu
---
tools/hotplug/FreeBSD/Makefile | 2 +-
tools/hotplug/FreeBSD/block| 25 +
Hi Jan,
On 22/05/2015 07:53, Jan Beulich wrote:
On 22.05.15 at 01:16, wrote:
--- a/xen/arch/x86/apic.c
+++ b/xen/arch/x86/apic.c
@@ -992,7 +992,7 @@ void __init init_apic_mappings(void)
apic_phys = mp_lapic_addr;
set_fixmap_nocache(FIX_APIC_BASE, apic_phys);
-apic_printk(A
We will create this sort of identity mapping as follows:
If the gfn space is unoccupied, we just set the mapping. If the space
is already occupied by 1:1 mappings, do nothing. Failed for any
other cases.
Signed-off-by: Tiejun Chen
---
xen/arch/x86/mm/p2m.c | 30 +
v2:
* Instead of that fixed predefined rdm memory boundary, we'd like to
introduce a parameter, "rdm_mem_boundary", to set this threshold value.
* Remove that existing USB hack.
* Make sure the MMIO regions all fit in the available resource window
* Rename our policy, "force/try" -> "strict/r
This patch introduces user configurable parameters to specify RDM
resource and according policies,
Global RDM parameter:
rdm = [ 'type=none/host, reserve=strict/relaxed' ]
Per-device RDM parameter:
pci = [ 'sbdf, rdm_reserve=strict/relaxed' ]
Global RDM parameter, "type", allows user to s
We will introduce the hypercall xc_reserved_device_memory_map
approach to libxc. This helps us get rdm entry info according to
different parameters. If flag == PCI_DEV_RDM_ALL, all entries
should be exposed. Or we just expose that rdm entry specific to
a SBDF.
Signed-off-by: Tiejun Chen
---
tool
From: Jan Beulich
This is a prerequisite for punching holes into HVM and PVH guests' P2M
to allow passing through devices that are associated with (on VT-d)
RMRRs.
Signed-off-by: Jan Beulich
Signed-off-by: Tiejun Chen
---
xen/common/compat/memory.c | 66 +
RMRR reserved regions must be setup in the pfn space with an identity
mapping to reported mfn. However existing code has problem to setup
correct mapping when VT-d shares EPT page table, so lead to problem
when assigning devices (e.g GPU) with RMRR reported. So instead, this
patch aims to setup ide
This patch extends the existing hypercall to support rdm reservation policy.
We return error or just throw out a warning message depending on whether
the policy is 'force' or 'try'. And in some cases, e.g. add a device to
hwdomain, and remove a device from user domain, 'try' is fine enough since
th
While building a VM, HVM domain builder provides struct hvm_info_table{}
to help hvmloader. Currently it includes two fields to construct guest
e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should
check them to fix any conflict with RAM.
RMRR can reside in address space beyond 4
When allocating mmio address for PCI bars, we need to make
sure they don't overlap with reserved regions.
Signed-off-by: Tiejun Chen
---
tools/firmware/hvmloader/pci.c | 36 ++--
1 file changed, 34 insertions(+), 2 deletions(-)
diff --git a/tools/firmware/hvmload
This patch enables XENMEM_memory_map in hvm. So we can use it to
setup the e820 mappings.
Signed-off-by: Tiejun Chen
Reviewed-by: Tim Deegan
---
xen/arch/x86/hvm/hvm.c | 2 --
xen/arch/x86/mm.c | 6 --
2 files changed, 8 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/
Now we get this map layout by call XENMEM_memory_map then
save them into one global variable memory_map[]. It should
include lowmem range, rdm range and highmem range. Note
rdm range and highmem range may not exist in some cases.
And here we need to check if any reserved memory conflicts with
[RES
Here we'll construct a basic guest e820 table via
XENMEM_set_memory_map. This table includes lowmem, highmem
and RDMs if they exist. And hvmloader would need this info
later.
Signed-off-by: Tiejun Chen
---
tools/libxl/libxl_dom.c | 87 +
1 file cha
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning devices to a VM.
Signed-off-by: Tiejun Chen
---
tools/libxc/include/xenctrl.h | 3 ++-
tools/libxc/xc_domain.c | 4 +++-
tools/libxl/libxl_pci.c | 11 ++-
Before we refine RMRR mechanism, USB RMRR may conflict with guest bios
region so we always ignore USB RMRR. Now this can be gone when we enable
pci_force to check/reserve RMRR.
Signed-off-by: Tiejun Chen
---
xen/drivers/passthrough/vtd/dmar.h | 1 -
xen/drivers/passthrough/vtd/iommu.c | 11 ++-
>>> On 13.05.15 at 11:49, wrote:
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -580,6 +580,234 @@ static long
> memory_exchange(XEN_GUEST_HANDLE_PARAM(xen_memory_exchange_t) arg)
> return rc;
> }
>
> +static long
> memory_soft_reset(XEN_GUEST_HANDLE_PARAM(xen_memory_soft_r
Now we can use that memory map to build our final
e820 table but it may need to reorder all e820
entries.
Signed-off-by: Tiejun Chen
---
tools/firmware/hvmloader/e820.c | 62 +++--
1 file changed, 48 insertions(+), 14 deletions(-)
diff --git a/tools/firmware/
>>> On 13.05.15 at 11:49, wrote:
> --- a/xen/include/xsm/dummy.h
> +++ b/xen/include/xsm/dummy.h
> @@ -193,6 +193,13 @@ static XSM_INLINE int
> xsm_memory_exchange(XSM_DEFAULT_ARG struct domain *d)
> return xsm_default_action(action, current->domain, d);
> }
>
> +static XSM_INLINE int xsm
>>> On 22.05.15 at 11:35, wrote:
> As you know all devices are owned by Dom0 firstly before we create any
> DomU, right? Do we allow Dom0 still own a group device while assign another
> device in the same group?
Clearly not, or - just like anything else putting the security of a system
at risk -
On Thu, 2015-05-21 at 19:30 +, osstest service user wrote:
> flight 56898 xen-4.5-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/56898/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-xl
flight 56937 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56937/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect
test-amd64-amd64-pair
the SEDF scheduler is about to be deprecated and go
away (see [1]). OTOH, the RTDS scheduler is here to
stay.
It therefore makes sense to stop smoke testing the
former in favour of the latter. Note that the
-sedf-pin jobs where only added in order to try to
debug a long standing issue with SEDF; i
Hi Robert and Longtao,
On Fri, 2015-05-22 at 02:08 +, osstest service user wrote:
> flight 56922 osstest real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/56922/
>
> Regressions :-(
This flight was testing:
477a9aa grub: remove patch to disable submenu from 20_linux_xen overla
On Fri, 2015-05-22 at 11:55 +0200, Dario Faggioli wrote:
> the SEDF scheduler is about to be deprecated and go
> away (see [1]). OTOH, the RTDS scheduler is here to
> stay.
>
> It therefore makes sense to stop smoke testing the
> former in favour of the latter. Note that the
> -sedf-pin jobs where
On Fri, 2015-05-22 at 07:28 +0200, Olaf Hering wrote:
> On Thu, May 21, Ian Campbell wrote:
>
> > OOI what version of pod2text are you both using which exposes this?
>
> perl 5.10 as included in SLE11 and 5.12 as included in 11.4 accept this.
> But perl 5.18 as included in SLE12 and 13.1 reject i
On Fri, 2015-05-22 at 11:02 +0100, Ian Campbell wrote:
> On Fri, 2015-05-22 at 11:55 +0200, Dario Faggioli wrote:
> > the SEDF scheduler is about to be deprecated and go
> > away (see [1]). OTOH, the RTDS scheduler is here to
> > stay.
> >
> > It therefore makes sense to stop smoke testing the
> >
On 32bit, GB(4) doesn't fit on an unsigned long. Modify MB to avoid
further issue.
Also, fix a couple of printf format in x86 which breaks after using
unsigned long long.
Signed-off-by: Julien Grall
---
Changes in v2:
- Use %Lx rather than %llx
- Use ULL in the MB macro too
On Fri, 2015-05-22 at 12:13 +0200, Dario Faggioli wrote:
> On Fri, 2015-05-22 at 11:02 +0100, Ian Campbell wrote:
> > On Fri, 2015-05-22 at 11:55 +0200, Dario Faggioli wrote:
> > > the SEDF scheduler is about to be deprecated and go
> > > away (see [1]). OTOH, the RTDS scheduler is here to
> > > st
[ Adding to Cc the people that I though I added when sending the patch,
but that apparently I haven't...sorry :-( ]
On Fri, 2015-05-22 at 11:55 +0200, Dario Faggioli wrote:
> the SEDF scheduler is about to be deprecated and go
> away (see [1]). OTOH, the RTDS scheduler is here to
> stay.
>
> It
On 19 May 2015, at 17:19, Wei Liu wrote:
> On Tue, May 12, 2015 at 07:18:26PM +0200, Joao Martins wrote:
>> Checks for "feature-persistent" that indicates persistent grants
>> support. Adds max_persistent_grants module param that specifies the max
>> number of persistent grants, which if set to
Hi,
On 22/05/2015 10:35, Tiejun Chen wrote:
Here we'll construct a basic guest e820 table via
XENMEM_set_memory_map. This table includes lowmem, highmem
and RDMs if they exist. And hvmloader would need this info
later.
Signed-off-by: Tiejun Chen
---
tools/libxl/libxl_dom.c | 87 +
On 19 May 2015, at 17:32, Wei Liu wrote:
> On Tue, May 12, 2015 at 07:18:28PM +0200, Joao Martins wrote:
>> It starts by doing a lookup in the tree for a gref. If no persistent
>> grant is found on the tree, it will do grant copy and prepare
>> the grant maps. Finally valides the grant map and a
On 19 May 2015, at 17:23, Wei Liu wrote:
> On Tue, May 12, 2015 at 07:18:27PM +0200, Joao Martins wrote:
>> Introduces persistent grants for TX path which follows similar code path
>> as the grant mapping.
>>
>> It starts by checking if there's a persistent grant available for header
>> and frag
On 19 May 2015, at 17:35, Wei Liu wrote:
> On Tue, May 12, 2015 at 07:18:30PM +0200, Joao Martins wrote:
>> By introducing persistent grants we speed up the RX thread with the
>> decreased copy cost, that leads to a throughput decrease of 20%.
>> It is observed that the rx_queue stays mostly at
On 19 May 2015, at 17:39, Wei Liu wrote:
> On Tue, May 12, 2015 at 07:18:24PM +0200, Joao Martins wrote:
>
>> There have been recently[3] some discussions and issues raised on
>> persistent grants for the block layer, though the numbers above
>> show some significant improvements specially on m
Hi,
On 22/05/2015 10:35, Tiejun Chen wrote:
diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
index 0c0ea4a..203c80e 100644
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -499,6 +499,11 @@ struct xen_domctl_assign_device {
XEN_GUEST_HAND
flight 56941 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56941/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail REGR. vs. 56728
Tests which are f
On Fri, May 22, 2015 at 08:19:39AM +, Olaf Hering wrote:
> Since xenalyze is now upstream its Open Source and part of the given
> release.
>
> Signed-off-by: Olaf Hering
> Acked-by: George Dunlap
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: Wei L
On Fri, May 22, 2015 at 08:19:37AM +, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists
Enabling posted interrupts requires the virtual interrupt delivery feature,
which is disabled for PVH guests, so make sure posted interrupts are also
disabled or else vmlaunch will fail.
Signed-off-by: Roger Pau Monné
Reported-and-Tested-by: Lars Eggert
Acked-by: Kevin Tian
Cc: Jun Nakajima
Cc
On Fri, May 22, 2015 at 08:19:32AM +, Olaf Hering wrote:
> This merges xenalyze.hg, changeset 150:24308507be1d,
> into tools/xentrace/xenalyze.c to have the tool and
> public/trace.h in one place.
>
> Signed-off-by: Olaf Hering
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
On Fri, May 22, Wei Liu wrote:
> On Fri, May 22, 2015 at 08:19:32AM +, Olaf Hering wrote:
> > BIN = xentrace xentrace_setsize
> > +SBIN = xenalyze
>
> Why is xenalyze not placed in the same directory as xentrace? My
> impression is that they are closely related. What did I miss?
>
On Fri, 2015-05-22 at 10:57 +0100, Ian Campbell wrote:
> Hi Robert and Longtao,
>
> On Fri, 2015-05-22 at 02:08 +, osstest service user wrote:
> > flight 56922 osstest real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/56922/
> >
> > Regressions :-(
>
> This flight was testing:
On Fri, May 22, 2015 at 01:32:01PM +0200, Olaf Hering wrote:
> On Fri, May 22, Wei Liu wrote:
>
> > On Fri, May 22, 2015 at 08:19:32AM +, Olaf Hering wrote:
> > > BIN = xentrace xentrace_setsize
> > > +SBIN = xenalyze
> >
> > Why is xenalyze not placed in the same directory as xentr
(I thought I'd hit send on this already, sorry if it is a repeat)
On Fri, 2015-05-22 at 10:17 +0100, Ian Campbell wrote:
> On Thu, 2015-05-21 at 18:05 +0100, Ian Campbell wrote:
> > Assuming this flight produces something useful (i.e. a pass) then I'll
> > look into a bisect.
>
> With this and a
Hi all,
I'm experiencing xen-netfront crash when doing xl network-detach while
some network activity is going on at the same time. It happens only when
domU has more than one vcpu. Not sure if this matters, but the backend
is in another domU (not dom0). I'm using Xen 4.2.2. It happens on kernel
3.
On 05/22/2015 10:36 AM, Jan Beulich wrote:
>> @@ -1050,6 +1048,8 @@ struct xen_domctl_monitor_op {
>> */
>> union {
>> struct {
>> +/* Which control register */
>> +uint8_t index;
>
> Okay, 8 bits here (which is reasonable), but ...
>
>> @@ -156,7 +158,
On Tue, May 19, 2015 at 7:21 PM, Ian Campbell wrote:
> On Tue, 2015-05-19 at 14:37 +0100, Julien Grall wrote:
>> Hi Ian,
>>
>> On 19/05/15 13:10, Ian Campbell wrote:
>> > On Fri, 2015-05-15 at 15:55 +0100, Julien Grall wrote:
>> > [...]
>> >>> Translation of certain commands can be expensive (XXX
>>> On 22.05.15 at 14:15, wrote:
> While working on this I found the following in the vm_event.h header:
>
> 168 struct vm_event_debug {
> 169 uint64_t gfn;
> 170 uint32_t _pad;
> 171 };
>
> Is this supposed to be 64 + 32 bits padding?
I think I need to direct the question back to you.
On 21/05/15 10:39, Huaitong Han wrote:
> When checking the ACPI funciton of C-status, after 100 seconds sleep,
> the sampling value of C0 status from the xenpm tool decreases.
> Because C0=NOW()-C1-C2-C3-C4, when NOW() value is during idle time,
> NOW() value is bigger than last C-status update tim
The following makes a start on support for arm64 systems.
Since arm64 was only added in Debian Jessie this requires Wei's "Debian
Jessie patches" as a base line, but without the
"mg-debian-installer-update: use new url for armhf packages" patch which
is replaced here. (Wei, I cc'd you on that one)
For armhf and arm64 for Jessie we will need these in the normal case
as well as in the backports case. Arrange to download.
Signed-off-by: Ian Campbell
---
mg-debian-installer-update | 13 -
1 file changed, 12 insertions(+), 1 deletion(-)
diff --git a/mg-debian-installer-update b/mg
In mg-debian-installer-update:
- Expand the list of (suite,arch) combinations which don't exist and
move it to the top.
- Tweak the backports.org handling to allow it to be specified on a
per (suite,arch) basis, and specify it only for (wheezy,armhf)
since it is not currently need
(i.e. the bit before/after the -- marker). When abstracting over
different bootloaders in a future patch this will be convenient since
it allows the code to add to either.
Signed-off-by: Ian Campbell
---
ts-host-install | 21 +++--
1 file changed, 11 insertions(+), 10 deletions(-
AIUI the runes used will only result in an ESP if the system was
booted via UEFI. IOW I don't think there should be any change for
existing systems.
Signed-off-by: Ian Campbell
---
Osstest.pm| 1 +
Osstest/Debian.pm | 6 ++
2 files changed, 7 insertions(+)
diff --git a/Osstest.pm b/
Other bootloaders handle this with an explicit separate option rather
than parsing it out of the command line as pxelinux does. Prepare for
supporting these.
Signed-off-by: Ian Campbell
---
ts-host-install | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/ts-host-install
First arrange for bootloader to be installed to removable media path,
by using a new in Jessie preseed option. Then use that to chainload a
bootloader from the disk.
The removable media path is well known (part of the UEFI spec) which
saves us having to worry about which OS is on the host (so long
The story for PXE booting via UEFI (at least on arm64) is not so
straightforward as with pxelinux on x86. There seems to no good
bootloader to launch via UEFI+pxe, in fact all I could find was grub
(syslinux, and by extension pxelinux.efi, is x86 only).
Add mg-pxe-loader-update modelled on mg-debi
Runvars:
build-arm64 arch
arm64
build-arm64 build_lvextend_max
50
build-arm64 enable_ovmf
true
build-arm64
XXX fold somewhere?
---
ts-host-install | 3 +++
1 file changed, 3 insertions(+)
diff --git a/ts-host-install b/ts-host-install
index aab5241..2dad9f1 100755
--- a/ts-host-install
+++ b/ts-host-install
@@ -258,6 +258,9 @@ END
if -e "$ho->{Tftp}{Path}/$d_i/$kp-dtbs";
}
+$xop
1 - 100 of 171 matches
Mail list logo