flight 60705 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60705/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 5dd08a463d5ca40b2ee3a8a0639c846e68265b92
baseline version:
ovmf 0cd1ecea673160417e30e46009a54d361a1
Saturday, August 15, 2015, 12:39:25 AM, you wrote:
> On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
>> On 2015-08-13 00:41, Eric Dumazet wrote:
>> > On Wed, 2015-08-12 at 23:46 +0200, Sander Eikelenboom wrote:
>> >
>> >> Thanks for the reminder, but luckily i was aware of that,
>>
branch xen-unstable
xen branch xen-unstable
job build-i386-libvirt
test libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstr
El 11/08/15 a les 16.19, Ian Campbell ha escrit:
> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
>> This document is going to explain the design details of Xen booting with
>> ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are
>> welcome.
>
> Some small subsets of thi
flight 60704 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60704/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-win7-amd64 17 guest-stop fail like 58892
test-amd64-amd64-xl-qemut-
>>> On 16.08.15 at 11:14, wrote:
> On Fri, 2015-08-14 at 04:07 -0600, Jan Beulich wrote:
>> If so, I'd be inclined to suggest a force push based on this flight.
>
> Overall I think I'm inclined to agree, I suppose your motive is that
> you want to get 4.4.x+1 out the door and I don't think we sh
On 2015/8/14 23:17, Julien Grall wrote:
On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
--
The minimal DT mainly passes Dom0 bootargs, address and size of initrd
(if available), address and
On Mon, 2015-08-17 at 11:09 +0200, Sander Eikelenboom wrote:
> Saturday, August 15, 2015, 12:39:25 AM, you wrote:
>
> > On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
> >> On 2015-08-13 00:41, Eric Dumazet wrote:
> >> > On Wed, 2015-08-12 at 23:46 +0200, Sander Eikelenboom wrote:
> >
Monday, August 17, 2015, 3:37:13 PM, you wrote:
> On Mon, 2015-08-17 at 11:09 +0200, Sander Eikelenboom wrote:
>> Saturday, August 15, 2015, 12:39:25 AM, you wrote:
>>
>> > On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
>> >> On 2015-08-13 00:41, Eric Dumazet wrote:
>> >> > On Wed,
On 08/16/2015 08:46 PM, Jonathan Creekmore wrote:
On Aug 16, 2015, at 1:59 AM, Ian Campbell wrote:
On Thu, 2015-08-13 at 16:44 -0500, Jonathan Creekmore wrote:
With the addition of FMODE_ATOMIC_POS in the Linux 3.14 kernel,
concurrent blocking file accesses to a single open file descriptor can
On 12/08/15 14:33, Andrew Cooper wrote:
On 12/08/15 14:29, Andrew Cooper wrote:
On 11/08/15 19:29, Boris Ostrovsky wrote:
On 08/11/2015 01:19 PM, Andrew Cooper wrote:
On 11/08/15 18:05, Tim Deegan wrote:
* Under this model, PV exception handlers should copy themselves
onto
the privileged ex
On 11/08/15 11:33, Ben Catterall wrote:
On 10/08/15 11:07, Tim Deegan wrote:
Hi,
@@ -685,8 +685,17 @@ static int hap_page_fault(struct vcpu *v,
unsigned long va,
{
struct domain *d = v->domain;
+/* If we get a page fault whilst in HVM security user mode */
+if( v->user_mod
On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
> This is very similar to the behavior I am seeing in this bug:
>
> https://bugzilla.kernel.org/show_bug.cgi?id=102911
OK, but have you applied the fix ?
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=83fccfc3940c
Monday, August 17, 2015, 4:21:47 PM, you wrote:
> On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
>> This is very similar to the behavior I am seeing in this bug:
>>
>> https://bugzilla.kernel.org/show_bug.cgi?id=102911
> OK, but have you applied the fix ?
> http://git.kernel.org/
This is very similar to the behavior I am seeing in this bug:
https://bugzilla.kernel.org/show_bug.cgi?id=102911
-Jon
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
At 14:59 +0100 on 17 Aug (1439823550), Ben Catterall wrote:
> On 11/08/15 11:33, Ben Catterall wrote:
> > On 10/08/15 11:07, Tim Deegan wrote:
> >> This should happen in paging_fault() so it can guard the
> >> shadow-pagetable paths too. Once it's there, it'll need a check for
> >> is_hvm_vcpu() a
At 14:53 +0100 on 17 Aug (1439823232), Ben Catterall wrote:
> On 12/08/15 14:33, Andrew Cooper wrote:
> > On 12/08/15 14:29, Andrew Cooper wrote:
> >> On 11/08/15 19:29, Boris Ostrovsky wrote:
> >>> Would switching TR only when we know that we need to enter this
> >>> deprivileged mode help?
> >> T
>>> On 17.08.15 at 16:58, wrote:
> At 14:59 +0100 on 17 Aug (1439823550), Ben Catterall wrote:
>> On 11/08/15 11:33, Ben Catterall wrote:
>> > On 10/08/15 11:07, Tim Deegan wrote:
>> >> I wonder whether it would be better to switch to an IDT with all
>> >> unacceptable traps stubbed out, rather th
>>> On 17.08.15 at 17:07, wrote:
> At 14:53 +0100 on 17 Aug (1439823232), Ben Catterall wrote:
>> So, have we arrived at a decision for this? Thanks!
>
> Seems to have stalled a bit. OK, I propose that:
> - we use TR/IST to make Xen take interrupts/exceptions at a different SP;
> - we make tha
>>> On 14.08.15 at 16:59, wrote:
> 1. Copy and change some EFI and ACPI tables
> ---
While some explanation on the reasons for this was given in the past
discussion, I'm still missing a word on the "why" for each of these here.
> a) Copy EFI_SYSTEM_TABLE a
>>> On 28.07.15 at 15:28, wrote:
> x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq
> servers and and replaces the shared_info frame with an empty page to support
> subsequent XENMAPSPACE_shared_info call.
>
> ARM-specific hook is -ENOSYS for now.
>
> Signed-off-by: Vital
>>> On 20.07.15 at 16:28, wrote:
An empty description leaves us guess at the "why".
> --- a/xen/arch/x86/boot/reloc.c
> +++ b/xen/arch/x86/boot/reloc.c
> @@ -10,15 +10,27 @@
> *Keir Fraser
> */
>
> -/* entered with %eax = BOOT_TRAMPOLINE */
> +/*
> + * This entry point is entered from
>>> On 20.07.15 at 16:29, wrote:
> Create generic alloc and copy functions. We need
> separate tools for memory allocation and copy to
> provide multiboot2 protocol support.
>
> Signed-off-by: Daniel Kiper
> Reviewed-by: Andrew Cooper
> ---
> v2 - suggestions/fixes:
>- generalize new functi
>>> On 20.07.15 at 16:29, wrote:
> Rename mbi and mbi_old variables and rearrange code a bit to make
> it more readable. Additionally, this way multiboot (v1) protocol
> implementation and future multiboot2 protocol implementation will
> use the same variable naming convention.
>
> Signed-off-by:
El 07/08/15 a les 18.36, Andrew Cooper ha escrit:
> On 07/08/15 11:18, Roger Pau Monne wrote:
>> @@ -1336,7 +1343,8 @@ static int meminit_hvm(struct xc_dom_image *dom)
>> * tot_pages will be target_pages - VGA_HOLE_SIZE after
>> * this call.
>> */
>> -rc = xc_d
Hi,
On 17/08/2015 06:01, Shannon Zhao wrote:
On 2015/8/14 23:17, Julien Grall wrote:
On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
--
The minimal DT mainly passes Dom0 bootargs, address
On 17/08/2015 08:33, Jan Beulich wrote:
On 14.08.15 at 16:59, wrote:
1. Copy and change some EFI and ACPI tables
---
While some explanation on the reasons for this was given in the past
discussion, I'm still missing a word on the "why" for each of the
From: Eric Dumazet
On Mon, 2015-08-17 at 16:25 +0200, Sander Eikelenboom wrote:
> Monday, August 17, 2015, 4:21:47 PM, you wrote:
>
> > On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
> >> This is very similar to the behavior I am seeing in this bug:
> >>
> >> https://bugzilla.kern
Hi Wei,
Thanks for CCing me, for me, I prefer option 2, it won't affect the normal
development release cycle, if the contributor wants to contribute to
-unstable, then it is his responsibility to resolve the confilicts on the
main branch. but I think it depends on the maintainers who will make th
On 14/08/2015 14:41, Chris (Christopher) Brand wrote:
Hi,
Hi Chris,
Thank you for the patch.
This is more-or-less what Julien requested. He noted that pt.contig was never
set to zero. When I looked further, I found other bits that were also never
given a value. Looking at the callsites, th
Hi Chris,
On 14/08/2015 14:41, Chris (Christopher) Brand wrote:
Shuffle lines around so that the assignments in mfn_to_xen_entry()
occur in the same order as the bits are declared in lpae_pt_t.
This makes it easier to see which ones are never given a value.
No change in behaviour.
Also fix a mi
On 2015-08-17 19:18, Eric Dumazet wrote:
From: Eric Dumazet
On Mon, 2015-08-17 at 16:25 +0200, Sander Eikelenboom wrote:
Monday, August 17, 2015, 4:21:47 PM, you wrote:
> On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
>> This is very similar to the behavior I am seeing in this b
On Sun, Aug 16, 2015 at 09:51:53AM +0100, Ian Campbell wrote:
> On Fri, 2015-08-14 at 00:38 +0100, Wei Liu wrote:
> > > In fact, if b_info->max_vcpus is 0, the elements of vcpu_parsed are
> > > sized against the host pcpus, and we risk to call libxl_bitmap_set() for
> > > vcpus beyond that limit, w
Hi Chris,
On 14/08/2015 14:42, Chris (Christopher) Brand wrote:
Ensure that every bit has a specific value.
Reported-by: Julien Grall
Signed-off-by: Chris Brand
---
xen/include/asm-arm/page.h | 5 +
1 file changed, 5 insertions(+)
diff --git a/xen/include/asm-arm/page.h b/xen/include/
Only 4KB allocation was using new_memflags. We should use new_memflags
in for 2MB and 1GB allocation as well because that variable contains
node information.
Without this patch, when creating a HVM guest with vNUMA, because the
node information was not present in the flags passed to libxc, actual
... but allow user to override that check by specifying maxvcpus= in xl
configuration file.
Note that the code is constructed such that the fallout is dealt with
after parsing. We can live with that because though it wastes a bit of
cpu cycles but it is still functionally correct and I would like
We should parse the output from splitting function, not the original
string, otherwise the parsed result is wrong.
For example:
vnuma = [ [...,"vdistance=10,20",...],
[...,"vdistance=20,10",...] ]
Before this change, vdistance from node 0 to all nodes (including
itself) was 10 and vdis
Hi Vijay,
This patch doesn't only do initialization but also destruction of vGIC info.
Although, a part of the domain initialization is done in part in #8 and
#8. It's very confusing to see the initialization split in 3 different
patch.
I would prefer to see the initialization/destruction in
Wei Liu (3):
xl: fix vNUMA vdistance parsing
xl: error out if vNUMA specifies more vcpus than pcpus
libxc: fix vNUMA memory allocation
tools/libxc/xc_hvm_build_x86.c | 6 --
tools/libxl/xl_cmdimpl.c | 34 +-
2 files changed, 33 insertions(+), 7 del
Hi Julien,
Thanks for the review.
> > +.pxn = 0,
>
> I would add a comment to explain that this bit is reserved for PL2 stage
> 1 page table.
Will do.
> > +.avail = 0,
>
> I don't think this one is necessary. avail is not used by the hardware neither
> Xen.
"grep -rF
Hi Vijay,
On 27/07/2015 04:11, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Initialize physical ITS driver from GIC v3 driver
if LPIs are supported by hardware
Signed-off-by: Vijaya Kumar K
---
v5: Made check of its dt node availability before
setting lpi_supported flag
---
xen/
On 17/08/2015 11:58, Chris (Christopher) Brand wrote:
Hi Julien,
Thanks for the review.
+.pxn = 0,
I would add a comment to explain that this bit is reserved for PL2 stage
1 page table.
Will do.
+.avail = 0,
I don't think this one is necessary. avail is not us
> > P.S. Apologies for any threading issues - I have not yet managed to
> > get git send-email working properly.
>
> I'm usually using git format-patch to get a list of files (one per
> patch) and my cover letter (--cover-letter).
Thanks.
> Then I use git send-email *.patch which will send the p
On Mon, 17 Aug 2015, Eric Dumazet wrote:
> [PATCH] timer: fix a race in __mod_timer()
>
> lock_timer_base() can not catch following :
>
> CPU1 ( in __mod_timer()
> timer->flags |= TIMER_MIGRATING;
> spin_unlock(&base->lock);
> base = new_base;
> spin_lock(&base->lock);
> timer->flags &= ~TIMER_BA
Hi Vijay,
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
+for ( i = 0; i < dev->nr_lpis; i++ )
+{
+msi = xzalloc(struct msi_desc);
+/* Reserve pLPI */
+if ( its_alloc_device_irq(dev, &plpi) || !msi )
+{
+its_discard_lpis(dev, i);
+
Hi Vijay,
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
ITS translation space contains GITS_TRANSLATOR register
which is written by device to raise LPI. This space needs
to mapped to every domain address space for all physical
ITS available,so that device can access G
On Mon, 2015-08-17 at 00:55 +, Kun Cheng wrote:
>
>
> On Mon, Aug 17, 2015 at 12:16 AM Frediano Ziglio
>
> What I'm planing is adding page migration support for NUMA aware
> scheduling. In such a case the most time I'll be dealing with Xen's
> memory management & scheduling part to make re
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse host dt and generate ITS node for Dom0.
ITS node resides inside GIC node so when GIC node
is encountered look for ITS node.
Signed-off-by: Vijaya Kumar K
---
v5: - Moved ITS dt node generation to ITS driver
v4: -
On Sun, Aug 16, 2015 at 01:22:05PM -0400, Konrad Rzeszutek Wilk wrote:
> On August 16, 2015 9:48:05 AM EDT, George Diamantopoulos
> wrote:
> >Hello,
> >
> >I've been trying to compile xen with multiboot2 support, but building
> >has
> >been failing. Tried with both gcc-4.8.4 and gcc-5.2 on ivybri
flight 60706 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60706/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are failing
branch xen-unstable
xen branch xen-unstable
job build-armhf-libvirt
test libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git
***
On Mon, Aug 17, 2015 at 09:51:58AM -0600, Jan Beulich wrote:
> >>> On 20.07.15 at 16:29, wrote:
> > Create generic alloc and copy functions. We need
> > separate tools for memory allocation and copy to
> > provide multiboot2 protocol support.
> >
> > Signed-off-by: Daniel Kiper
> > Reviewed-by: A
flight 60709 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60709/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm 14 guest-saverestore fail REGR. vs. 59254
test-amd64-i386-xl
On Tue, Aug 18, 2015 at 3:25 AM Dario Faggioli
wrote:
> On Mon, 2015-08-17 at 00:55 +, Kun Cheng wrote:
> >
> >
> > On Mon, Aug 17, 2015 at 12:16 AM Frediano Ziglio
> >
> > What I'm planing is adding page migration support for NUMA aware
> > scheduling. In such a case the most time I'll be d
On 2015/8/17 18:36, Roger Pau Monné wrote:
> El 11/08/15 a les 16.19, Ian Campbell ha escrit:
>> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
>>> This document is going to explain the design details of Xen booting with
>>> ACPI on ARM. Maybe parts of it may not be appropriate. Any comme
>>> On 8/13/2015 at 05:09 PM, in message
<20150813090938.gi7...@zion.uk.xensource.com>, Wei Liu
wrote:
> On Tue, Aug 11, 2015 at 08:24:01PM -0600, Chun Yan Liu wrote:
> >
> >
> > >>> On 8/11/2015 at 07:27 PM, in message
> > <2015082702.gf7...@zion.uk.xensource.com>, Wei Liu
> >
> >
Hi Julien,
On 2015/8/18 0:10, Julien Grall wrote:
> Hi,
>
> On 17/08/2015 06:01, Shannon Zhao wrote:
>>
>>
>> On 2015/8/14 23:17, Julien Grall wrote:
>>> On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
Hi Jan,
On 2015/8/17 23:33, Jan Beulich wrote:
On 14.08.15 at 16:59, wrote:
>> 1. Copy and change some EFI and ACPI tables
>> ---
>
> While some explanation on the reasons for this was given in the past
> discussion, I'm still missing a word on the "w
>>> Julien Grall 08/17/15 6:27 PM >>>
>On 17/08/2015 08:33, Jan Beulich wrote:
> On 14.08.15 at 16:59, wrote:
>>> b) Create EFI_MEMORY_DESCRIPTOR table. This will add memory start and
>>> size information of Dom0. And Dom0 will get the memory information
>>> through this EFI table.
>>
>> To s
flight 60711 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60711/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 19 guest-start/debianhvm.repeat
fail REGR. vs. 60683
>>> Shannon Zhao 08/18/15 5:46 AM >>>
>On 2015/8/17 23:33, Jan Beulich wrote:
> On 14.08.15 at 16:59, wrote:
>>> 1. Copy and change some EFI and ACPI tables
>>> ---
>>
>> While some explanation on the reasons for this was given in the past
>> discussio
On 08/17/2015 12:18 PM, Eric Dumazet wrote:
From: Eric Dumazet
Then can you try following fix as well ?
Thanks !
[PATCH] timer: fix a race in __mod_timer()
I have been running the latest code from git with the 2 patches in this
thread applied. No issues so far.
-Jon
___
On 08/17/2015 09:25 AM, Sander Eikelenboom wrote:
> OK, but have you applied the fix ?
>
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=83fccfc3940c4a2db90fd7e7079f5b465cd8c6af
> It will be part of net iteration from David Miller to Linus Torvald.
I did not have that
On 8/14/2015 9:51 PM, Paul Durrant wrote:
-Original Message-
From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 14 August 2015 13:03
To: xen-devel@lists.xen.org; Paul Durrant; Ian Jackson; Stefano Stabellini; Ian
Campbell; Wei Liu; Keir (Xen.org); jbeul...@suse.com; Andrew Cooper
Hi,
Firstly, this patch is not ready at all and mostly here for collecting comment
about the way to do it. It's not clean so no need to complain about the coding
style.
The qdisk backend in QEMU is not supporting indirect grant, this is means that
a request can only support 11 * 4KB = 44KB.
W
I'd really like to see this fixed in 4.6, and it makes no sense to post the
final hypervisor patch before this one got applied. The upstream one
has been in our qemuu tree for a while now, but apparently didn't get
pushed upstream yet.
Jan
>>> On 23.07.15 at 09:00, wrote:
> The number of slots p
On 17/08/2015 20:19, Shannon Zhao wrote:
Yes, I think it's good to drop the "linux," too. But if we drop the
linux, would it impact the linux kernel booting with UEFI? And why we
don't do it to Xen since Xen still uses "linux,"?
I don't understand your second question.
I mean that Xen is us
Hi Jan,
On 17/08/2015 22:10, Jan Beulich wrote:
Julien Grall 08/17/15 6:27 PM >>>
On 17/08/2015 08:33, Jan Beulich wrote:
On 14.08.15 at 16:59, wrote:
b) Create EFI_MEMORY_DESCRIPTOR table. This will add memory start and
size information of Dom0. And Dom0 will get the memory information
thr
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: Thursday, June 25, 2015 6:22 PM
> To: Pang, LongtaoX
> Cc: Ian Campbell; Hu, Robert; xen-devel@lists.xen.org; wei.l...@citrix.com
> Subject: RE: [OSSTEST Nested PATCH v11 6/7] Compose the main recipe of
> ne
69 matches
Mail list logo