On Tue, 2015-12-01 at 20:30 +, Andrew Cooper wrote:
> > +#include
>
> I can see why you need xstate.h, but I why do you need i387.h ?
Use vcpu_save_fpu functions.
> > +
> > if ( pse2M )
> > {
> > /* Special case: this guest VA is in a PSE superpage, so
> > there's
> > @@ -
On Sat, Nov 28, 2015 at 03:46:05PM -0500, Eric Shelton wrote:
hi eric:
I test this on my skylake machine. Result is follow
> Not enabling x2APIC (upon firmware request)
I got the message too.
> ...
> mwait-idle: does not run on family 6 model 94
I got the message too.
> ...
> [VT-D] iommu.c:875:
On Wed, Dec 02, 2015 at 04:47:17PM +0800, Shuai Ruan wrote:
> On Sat, Nov 28, 2015 at 03:46:05PM -0500, Eric Shelton wrote:
>
> hi eric:
>
> I test this on my skylake machine. Result is follow
> > Not enabling x2APIC (upon firmware request)
> I got the message too.
According to Andrew's comments.
Am Mittwoch 02 Dezember 2015, 02:20:49 schrieb Tian, Kevin:
> > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> > Sent: Wednesday, December 02, 2015 12:50 AM
> >
> > * Limit VPMU support to PMU versions 2, 3 and 4 (emulated at version 3
> > level)
> > * Always implement family 6 VPMU
On Tue, 2015-12-01 at 09:44 -0700, Jan Beulich wrote:
> > > > On 01.12.15 at 17:34, wrote:
> > > On Dec 1, 2015, at 10:07 AM, Jan Beulich wrote:
> > >
> > > For one build run, yes. But then you can (a) build individual object
> > > files and (b) as mentioned above change configuration (implying
On Tue, 2015-12-01 at 17:21 +, Wei Liu wrote:
>
> > In dom0 we have next issue:
> > /libxl: error: libxl_device.c:283:libxl__device_disk_set_backend: Disk
> > vdev=xvda10 failed to stat: /dev/sda1: No such file or directory//-
> > /this issue occurs due to missing /dev/sda1 device (all hardwar
On Tue, 2015-12-01 at 18:52 +0100, Roger Pau Monné wrote:
> El 01/12/15 a les 17.48, Iurii Mykhalskyi ha escrit:
> > > Does something like the following work? If not, could you paste the
> > > error when running it with -vvv.
> > >
> > > xl block-attach DomU
> > > format=raw,vdev=hdc,access=rw,bac
On Tue, 2015-12-01 at 15:03 -0600, Doug Goldstein wrote:
> This works, but might have problems in Xen 4.5. If you're using running
> on Linux 3.14 or newer then you will have a problem. You need to
> backport commit 9c89dc95201ffed5fead17b35754bf9440fdbdc0 if you're using
> the C based xenstore and
>>> On 01.12.15 at 20:26, wrote:
> On 01/12/15 17:26, Jan Beulich wrote:
> On 01.12.15 at 17:57, wrote:
>>> When EFI is used, don't use EFI's GetTime() to get the time, because it
>>> is broken on many platforms. From Linux commit 7efe665903d0 ("rtc:
>>> Disable EFI rtc for x86"):
>>> "Disabl
>>> On 01.12.15 at 21:04, wrote:
> On 11/30/15 11:19 AM, Ian Campbell wrote:
>> On Mon, 2015-11-30 at 11:00 -0600, Doug Goldstein wrote:
>>> Since there is a request to have KEXEC and the UARTs
>>> configurable by the user
>>
>> Who asked for this?
>>
>> I have quite a strong preference for not
On Tue, 2015-12-01 at 14:04 -0600, Doug Goldstein wrote:
> On 11/30/15 11:19 AM, Ian Campbell wrote:
> > On Mon, 2015-11-30 at 11:00 -0600, Doug Goldstein wrote:
> > > Since there is a request to have KEXEC and the UARTs
> > > configurable by the user
> >
> > Who asked for this?
> >
> > I have qu
On 02/12/15 02:51, Eric Shelton wrote:
> ASRock Z170 Extreme 4 with BIOS version 2.30 was motherboard #1
> Gigabyte GA-Z170XP-SLI with BIOS version F5 was motherboard #2
>
> As I initially reported, both were reporting the error involving f0:1f.0
>
> Not surprisingly, there are no f0:xx.y devices.
>>> On 01.12.15 at 19:47, wrote:
> On Tue, 1 Dec 2015, Jan Beulich wrote:
>> I.e. there must be something different in how make gets invoked or
>> the environment set up.
>
> It happens if CFLAGS is set to anything as a environment variable, eg.
> export CFLAGS=" "
> make dist-xen
Ugly, but I th
On 2015-12-02 00:41, Boris Ostrovsky wrote:
On 12/01/2015 06:30 PM, Sander Eikelenboom wrote:
On 2015-12-02 00:19, Boris Ostrovsky wrote:
On 12/01/2015 06:00 PM, Sander Eikelenboom wrote:
On 2015-12-01 23:47, Boris Ostrovsky wrote:
On 11/30/2015 05:55 PM, Sander Eikelenboom wrote:
On 2015-11
flight 65283 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65283/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 16
guest-localmigrate/x10 fail in 65210 RE
On 01/12/2015 18:53, Anthony PERARD wrote:
> The problem is in qemu_ram_alloc_internal() where 'size' and 'maxsize' are
> now been truncate to 32bit, due to 'qemu_host_page_size' been an uintptr_t
> in the HOST_PAGE_ALIGN macro.
Isn't it qemu_host_page_mask that causes the problem?
This should
On 26/11/15 20:32, Doug Goldstein wrote:
> When allocating a pciback device fails, avoid the possibility of a
> use after free.
We should not require clearing drvdata for correctness. We should
ensure we retain drvdata for as long as it is needed.
I note that pcistub_device_release() has:
On Mon, 2015-11-30 at 05:35 +, Hu, Robert wrote:
Also adding Vt-x maintainers (Kevin and Jun) for their help/input, I'm not
sure if there is a dedicated nested-vmx maintainer. This failure has been
blocking the xen-unstable push gate for a week now so it really does need
looking into.
Also CC
On Tue, 2015-12-01 at 04:00 -0700, Jan Beulich wrote:
> But not forking doesn't mean importing the whole directory. Some
> Makefile adjustments will be necessary anyway, so removing some
> of the frontends wouldn't make things worse. We indeed should
> avoid editing files we import, but I don't see
Hi everyone,
I am putting together the Advisory Board budget for 2016. Besides items that
are operational and spending on a new HW for the Test Lab, are there any items
which I should add that help the developer community. Things that have been
raised in the past, were
* Easier hosting of person
* Paolo Bonzini (pbonz...@redhat.com) wrote:
>
>
> On 01/12/2015 18:53, Anthony PERARD wrote:
> > The problem is in qemu_ram_alloc_internal() where 'size' and 'maxsize' are
> > now been truncate to 32bit, due to 'qemu_host_page_size' been an uintptr_t
> > in the HOST_PAGE_ALIGN macro.
>
> Isn't
>>> On 02.12.15 at 03:51, wrote:
> ASRock Z170 Extreme 4 with BIOS version 2.30 was motherboard #1
> Gigabyte GA-Z170XP-SLI with BIOS version F5 was motherboard #2
>
> As I initially reported, both were reporting the error involving f0:1f.0
>
> Not surprisingly, there are no f0:xx.y devices. Th
>>> On 02.12.15 at 11:34, wrote:
> On Mon, 2015-11-30 at 05:35 +, Hu, Robert wrote:
>
> Also adding Vt-x maintainers (Kevin and Jun) for their help/input, I'm not
> sure if there is a dedicated nested-vmx maintainer. This failure has been
> blocking the xen-unstable push gate for a week now s
On Tue, Dec 01, 2015 at 11:54:14PM -0600, Meng Xu wrote:
> Hi Lars and Dario,
>
> 2015-12-01 4:11 GMT-06:00 Lars Kurth :
> >
> > I wonder whether we need to add some health warnings and recommended
> > background reading to http://wiki.xenproject.org/wiki/RTDS-Based-Scheduler
>
>
> Maybe we cou
On 02/12/15 10:52, Jan Beulich wrote:
On 02.12.15 at 11:34, wrote:
>> On Mon, 2015-11-30 at 05:35 +, Hu, Robert wrote:
>>
>> Also adding Vt-x maintainers (Kevin and Jun) for their help/input, I'm not
>> sure if there is a dedicated nested-vmx maintainer. This failure has been
>> blocking
> On 2 Dec 2015, at 05:54, Meng Xu wrote:
>
> Hi Lars and Dario,
>
> 2015-12-01 4:11 GMT-06:00 Lars Kurth :
>>
>> I wonder whether we need to add some health warnings and recommended
>> background reading to http://wiki.xenproject.org/wiki/RTDS-Based-Scheduler
>
>
> Maybe we could add some
On Tue, 2015-12-01 at 23:54 -0600, Meng Xu wrote:
> Hi Lars and Dario,
>
> 2015-12-01 4:11 GMT-06:00 Lars Kurth :
> >
> > I wonder whether we need to add some health warnings and recommended
> > background reading to http://wiki.xenproject.org/wiki/RTDS-Based-Schedu
> > ler
>
>
> Maybe we could
>>> On 01.12.15 at 21:03, wrote:
> On 27/11/15 09:51, Huaitong Han wrote:
>> --- a/xen/arch/x86/hvm/hvm.c
>> +++ b/xen/arch/x86/hvm/hvm.c
>> @@ -4582,6 +4582,18 @@ void hvm_cpuid(unsigned int input, unsigned int *eax,
>> unsigned int *ebx,
>> /* Don't expose INVPCID to non-hap hvm. */
>>
On Wed, 2015-12-02 at 03:52 -0700, Jan Beulich wrote:
> > > > On 02.12.15 at 11:34, wrote:
> > On Mon, 2015-11-30 at 05:35 +, Hu, Robert wrote:
> >
> > Also adding Vt-x maintainers (Kevin and Jun) for their help/input, I'm
> > not
> > sure if there is a dedicated nested-vmx maintainer. This f
>>> On 02.12.15 at 09:23, wrote:
> On Tue, 2015-12-01 at 20:30 +, Andrew Cooper wrote:
>> > +#include
>>
>> I can see why you need xstate.h, but I why do you need i387.h ?
> Use vcpu_save_fpu functions.
Which is bogus by itself: That function isn't meant to be used for
purposes like the one
>>> On 27.11.15 at 10:52, wrote:
> @@ -90,6 +92,53 @@ static uint32_t set_ad_bits(void *guest_p, void *walk_p,
> int set_dirty)
> return 0;
> }
>
> +#if GUEST_PAGING_LEVELS >= 4
> +uint32_t leaf_pte_pkeys_check(struct vcpu *vcpu, uint32_t pfec,
> +uint32_t pte_access, uint
>>> On 27.11.15 at 10:51, wrote:
> --- a/tools/libxc/xc_cpuid_x86.c
> +++ b/tools/libxc/xc_cpuid_x86.c
> @@ -421,9 +421,11 @@ static void xc_cpuid_hvm_policy(xc_interface *xch,
> bitmaskof(X86_FEATURE_ADX) |
> bitmaskof(X86_FEATURE_SMAP) |
>
On Wed, 2015-12-02 at 11:03 +, Lars Kurth wrote:
> > On 2 Dec 2015, at 05:54, Meng Xu wrote:
> >
> > Maybe we could add some health warning and add a link to this
> > discussion?
> > Misconfiguration of the system will usually cause performance
> > degradation, even for the other schedulers,
>>> On 27.11.15 at 10:51, wrote:
> @@ -1307,6 +1311,9 @@ void __init noreturn __start_xen(unsigned long mbi_p)
> if ( cpu_has_smap )
> set_in_cr4(X86_CR4_SMAP);
>
> +if ( !opt_pku )
> +setup_clear_cpu_cap(X86_FEATURE_PKU);
> +
> if ( cpu_has_fsgsbase )
> s
>>> On 27.11.15 at 10:51, wrote:
> --- a/xen/include/asm-x86/x86_64/page.h
> +++ b/xen/include/asm-x86/x86_64/page.h
> @@ -134,6 +134,25 @@ typedef l4_pgentry_t root_pgentry_t;
> #define get_pte_flags(x) (((int)((x) >> 40) & ~0xFFF) | ((int)(x) & 0xFFF))
> #define put_pte_flags(x) (((intpte_t)((
On Wed, 2015-12-02 at 11:01 +, Ian Campbell wrote:
> On Tue, 2015-12-01 at 23:54 -0600, Meng Xu wrote:
> >
> > What do you guys think which type of information we should include?
>
> I think there is an important distinction between credit2/credit and
> RT
> schedulers such as arinc/rtds etc,
>>> On 27.11.15 at 10:52, wrote:
> @@ -90,6 +92,53 @@ static uint32_t set_ad_bits(void *guest_p, void *walk_p,
> int set_dirty)
> return 0;
> }
>
> +#if GUEST_PAGING_LEVELS >= 4
> +uint32_t leaf_pte_pkeys_check(struct vcpu *vcpu, uint32_t pfec,
> +uint32_t pte_access, uint
>>> On 02.12.15 at 08:20, wrote:
>> Does this even compile? There is already
>>
>> static void *get_xsave_addr(void *xsave, unsigned int xfeature_idx)
>>
>> higher in the same file.
>>
>> That function should be augmented to take a struct xsave_struct
>> *xsave,
>> look at whether the represen
>>> On 27.11.15 at 10:52, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4304,7 +4304,8 @@ static enum hvm_copy_result __hvm_clear(paddr_t addr,
> int size)
> p2m_type_t p2mt;
> char *p;
> int count, todo = size;
> -uint32_t pfec = PFEC_page_present
On Wed, Dec 02, 2015 at 08:42:17AM +0100, Juergen Gross wrote:
> For migration the last used pfn of a guest is needed to size the
> logdirty bitmap and as an upper bound of the page loop. Unfortunately
> there are pv-kernels advertising a much higher maximum pfn as they
> are really using in order
On Tue, Dec 01, 2015 at 01:27:53PM -0600, Doug Goldstein wrote:
> Prefer using the character device over the proc file if the character
> device exists. This follows similar conversions of xenbus to avoid
> issues with FMODE_ATOMIC_POS added in Linux 3.14 and newer.
>
> CC: Ian Jackson
> CC: Stef
On Tue, Dec 01, 2015 at 06:14:53PM +0100, Juergen Gross wrote:
> INVALID_P2M_ENTRY is defined as (xen_pfn_t)-1 and is often used
> according to it's type for an invalid pfn. Change the name of the
> macro to INVALID_PFN.
>
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
__
On Tue, Dec 01, 2015 at 06:14:54PM +0100, Juergen Gross wrote:
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 02/12/2015 11:30, Paolo Bonzini wrote:
> diff --git a/include/exec/cpu-all.h b/include/exec/cpu-all.h
> index f9998b9..87a4145 100644
> --- a/include/exec/cpu-all.h
> +++ b/include/exec/cpu-all.h
> @@ -174,11 +174,10 @@ extern unsigned long reserved_va;
> #define TARGET_PAGE_MASK ~(TARGET_PAG
* Paolo Bonzini (pbonz...@redhat.com) wrote:
>
>
> On 02/12/2015 11:30, Paolo Bonzini wrote:
> > diff --git a/include/exec/cpu-all.h b/include/exec/cpu-all.h
> > index f9998b9..87a4145 100644
> > --- a/include/exec/cpu-all.h
> > +++ b/include/exec/cpu-all.h
> > @@ -174,11 +174,10 @@ extern unsign
Paolo Bonzini wrote:
> On 02/12/2015 11:30, Paolo Bonzini wrote:
>> diff --git a/include/exec/cpu-all.h b/include/exec/cpu-all.h
>> index f9998b9..87a4145 100644
>> --- a/include/exec/cpu-all.h
>> +++ b/include/exec/cpu-all.h
>> @@ -174,11 +174,10 @@ extern unsigned long reserved_va;
>> #define T
On 02/12/15 07:42, Juergen Gross wrote:
> diff --git a/tools/libxc/xc_sr_save_x86_hvm.c
> b/tools/libxc/xc_sr_save_x86_hvm.c
> index cdee774..3c879ed 100644
> --- a/tools/libxc/xc_sr_save_x86_hvm.c
> +++ b/tools/libxc/xc_sr_save_x86_hvm.c
> @@ -135,6 +135,20 @@ static int x86_hvm_normalise_page(st
On 12/02/2015 12:45 AM, Jim Fehlig wrote:
> On 11/23/2015 11:57 AM, Joao Martins wrote:
>> Introduce support for domainInterfaceStats API call for querying
>> network interface statistics. Consequently it also enables the
>> use of `virsh domifstat ` command plus
>> seeing the interfaces names i
On 12/02/2015 12:08 AM, Jim Fehlig wrote:
> On 11/23/2015 11:56 AM, Joao Martins wrote:
>> . to a more generic name i.e. libxlDomainStartCallback,
>> since it will now cover another case other than the console.
>>
>> Signed-off-by: Joao Martins
>> ---
>> src/libxl/libxl_domain.c | 4 ++--
>> 1
flight 65285 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65285/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-winxpsp3 6 xen-boot fail REGR. vs. 59254
test-amd64-i386-qemut
On 30/06/15 13:26, Boris Ostrovsky wrote:
> On 06/30/2015 05:51 AM, Ross Lagerwall wrote:
>> On 06/29/2015 02:32 PM, Boris Ostrovsky wrote:
>>> On 06/29/2015 06:19 AM, Ross Lagerwall wrote:
On 06/19/2015 05:06 PM, David Vrabel wrote:
> On 19/06/15 17:02, Boris Ostrovsky wrote:
>> On 06
Commit fc0c3fa2ad5c ("x86/IO-APIC: fix setup of Xen internally used IRQs
(take 2)") introduced a regression on some hardware where Xen would hang
during shutdown, repeating the following message:
APIC error on CPU0: 08(08), Receive accept error
This appears to be because an interrupt (in this case
>>> On 24.11.15 at 21:28, wrote:
> RFC. Boot tested on VMware Fusion, and on a 2-socket Xeon server.
Mind trying this one instead?
Jan
--- unstable.orig/xen/arch/x86/mpparse.c
+++ unstable/xen/arch/x86/mpparse.c
@@ -89,19 +89,14 @@ void __init set_nr_cpu_ids(unsigned int
void __init set_nr_s
While reviewing those patches I noticed a few types that could do with
tweaking.
Signed-off-by: Jan Beulich
---
For the AMD MWAIT change it would certainly be nice to get confirmation
on whether just Fam10 doesn't deep-sleep, or whether there's a wider
range (I'm pretty sure modern families don't
On Wed, 2015-12-02 at 10:34 +, Ian Campbell wrote:
>
[...]
> FWIW looking at the different branches in
>
> http://logs.test-lab.xenproject.org/osstest/results/history/test-amd64-amd64-qemuu-nested-intel/
>
> While xen-unstable has started failing on godello1 xen-4.6-testing does
> seem to b
Hello All,
I require logs of the Hypercalls made from Guest to the Hypervisor after
the boot, as xl dmesg provides me with the log messages during the
initialisation.
This would be a very great help!
Thanks in advance !!
Thanking you,
Kumar
___
Xen-de
On 02/12/15 13:46, Ross Lagerwall wrote:
> @@ -298,6 +299,13 @@ static void stop_this_cpu(void *dummy)
> void smp_send_stop(void)
> {
> int timeout = 10;
> +cpumask_t online;
> +
> +cpumask_clear(&online);
> +cpumask_set_cpu(smp_processor_id(), &online);
You can avoid this inter
On 19/06/15 16:15, Ross Lagerwall wrote:
> When a CPU is offlined, there may be unprocessed events on a port for
> that CPU. If the port is subsequently reused on a different CPU, it
> could be in an unexpected state with the link bit set, resulting in
> interrupts being missed. Fix this by consum
On 02/12/15 13:51, Jan Beulich wrote:
> While reviewing those patches I noticed a few types that could do with
> tweaking.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.or
>>> On 02.12.15 at 14:46, wrote:
> Commit fc0c3fa2ad5c ("x86/IO-APIC: fix setup of Xen internally used IRQs
> (take 2)") introduced a regression on some hardware where Xen would hang
> during shutdown, repeating the following message:
> APIC error on CPU0: 08(08), Receive accept error
>
> This ap
On Wed, Dec 2, 2015 at 1:49 PM, kumara rathnavel wrote:
> Hello All,
>
> I require logs of the Hypercalls made from Guest to the Hypervisor after the
> boot, as xl dmesg provides me with the log messages during the
> initialisation.
One thing you could look at is xentrace and xenalyze. You can f
On 28/11/15 15:47, Sander Eikelenboom wrote:
>
> -rtc_cmos rtc_cmos: hctosys: unable to read the hardware clock
> +hctosys: unable to open rtc device (rtc0)
>
> -genirq: Flags mismatch irq 8. (hvc_console) vs. (rtc0)
> -hvc_open: request_irq failed with rc -16.
I have reproduce
>>> On 01.12.15 at 17:50, wrote:
> @@ -746,6 +746,13 @@ static void core2_vpmu_do_cpuid(unsigned int input,
> if ( cpu_has(¤t_cpu_data, X86_FEATURE_DSCPL) )
> *ecx |= cpufeat_mask(X86_FEATURE_DSCPL);
> }
> +break;
> +
> +case 0xa:
> +/* Si
On 12/2/15 3:47 AM, Ian Campbell wrote:
> On Tue, 2015-12-01 at 14:04 -0600, Doug Goldstein wrote:
>> On 11/30/15 11:19 AM, Ian Campbell wrote:
>>> On Mon, 2015-11-30 at 11:00 -0600, Doug Goldstein wrote:
Since there is a request to have KEXEC and the UARTs
configurable by the user
>>>
>>
On 12/2/15 3:38 AM, Jan Beulich wrote:
On 01.12.15 at 21:04, wrote:
>> On 11/30/15 11:19 AM, Ian Campbell wrote:
>>> On Mon, 2015-11-30 at 11:00 -0600, Doug Goldstein wrote:
Since there is a request to have KEXEC and the UARTs
configurable by the user
>>>
>>> Who asked for this?
>>>
On Fri, 2015-11-13 at 15:49 +, Andrew Cooper wrote:
> On 09/11/15 12:00, Ian Campbell wrote:
> > diff --git a/tools/libs/call/linux.c b/tools/libs/call/linux.c
> > new file mode 100644
> > index 000..906ca7e
> > --- /dev/null
> > +++ b/tools/libs/call/linux.c
> > @@ -0,0 +1,132 @@
> > +/*
>
On 28/11/15 15:47, Sander Eikelenboom wrote:
> genirq: Flags mismatch irq 8. (hvc_console) vs. (rtc0)
We shouldn't register an rtc_cmos device because its legacy irq
conflicts with the irq needed for hvc0. For a multi VCPU guest irq 8 is
in use for the pv spinlocks and this gets
On 12/2/15 4:35 AM, David Vrabel wrote:
> On 26/11/15 20:32, Doug Goldstein wrote:
>> When allocating a pciback device fails, avoid the possibility of a
>> use after free.
>
> We should not require clearing drvdata for correctness. We should
> ensure we retain drvdata for as long as it is needed.
I have attached the output from 'xl dmesg' with iommu=debug
apic_verbosity=debug loglvl=all
This is with 4.6.0, with the recent patch enabling mwait-idle on Skylake
applied. My initial post was running the latest out of xen.git master. I
may be able to try to newer code again later this week.
E
On 12/02/2015 02:02 PM, Jan Beulich wrote:
On 02.12.15 at 14:46, wrote:
Commit fc0c3fa2ad5c ("x86/IO-APIC: fix setup of Xen internally used IRQs
(take 2)") introduced a regression on some hardware where Xen would hang
during shutdown, repeating the following message:
APIC error on CPU0: 08(08),
On Tue, 2015-12-01 at 13:55 +, Paul Durrant wrote:
> This patch adds a new libxl__xs_vprintf() which actually checks the
> success of the underlying call to xs_write() (logging if it fails) and
> then re-implements libxl__xs_printf() using this (and replacing the
> call to vasprintf() with a ca
On Wed, 2015-12-02 at 12:36 +, Andrew Cooper wrote:
> On 02/12/15 07:42, Juergen Gross wrote:
> > diff --git a/tools/libxc/xc_sr_save_x86_hvm.c
> > b/tools/libxc/xc_sr_save_x86_hvm.c
> > index cdee774..3c879ed 100644
> > --- a/tools/libxc/xc_sr_save_x86_hvm.c
> > +++ b/tools/libxc/xc_sr_save_x8
In commit 8b6ef9c152edceabecc7f90c811cd538a7b7a110, several files in
xen/common/compat were changed to be built using the Makefile in
xen/common, by appending the compat prefix to the object
files. Additionally, the xen/common/compat directory was removed from
the subdirs-y variable, so it is no lo
>>> On 02.12.15 at 16:09, wrote:
> On 12/02/2015 02:02 PM, Jan Beulich wrote:
> On 02.12.15 at 14:46, wrote:
>>> --- a/xen/arch/x86/smp.c
>>> +++ b/xen/arch/x86/smp.c
>>> @@ -286,6 +286,7 @@ void __stop_this_cpu(void)
>>>
>>> static void stop_this_cpu(void *dummy)
>>> {
>>> +fixup_eoi
On 02/12/15 16:28, Ian Campbell wrote:
> On Wed, 2015-12-02 at 12:36 +, Andrew Cooper wrote:
>> On 02/12/15 07:42, Juergen Gross wrote:
>>> diff --git a/tools/libxc/xc_sr_save_x86_hvm.c
>>> b/tools/libxc/xc_sr_save_x86_hvm.c
>>> index cdee774..3c879ed 100644
>>> --- a/tools/libxc/xc_sr_save_x86
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: 02 December 2015 15:21
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Cc: Ian Jackson; Stefano Stabellini; Wei Liu
> Subject: Re: [PATCH v1 2/2] libxl: re-implement libxl__xs_printf()
>
> On Tue, 2015-
>>> On 02.12.15 at 16:04, wrote:
> I have attached the output from 'xl dmesg' with iommu=debug
> apic_verbosity=debug loglvl=all
As of 4.6.0 it actually takes a debug hypervisor to get those
messages logged (which arguably is wrong, and which quite
certainly is wrong for messages accompanying err
>>> On 02.12.15 at 16:29, wrote:
> --- a/xen/Makefile
> +++ b/xen/Makefile
> @@ -91,7 +91,8 @@ _clean: delete-unfresh-files
> $(MAKE) -f $(BASEDIR)/Rules.mk -C xsm clean
> $(MAKE) -f $(BASEDIR)/Rules.mk -C crypto clean
> $(MAKE) -f $(BASEDIR)/Rules.mk -C arch/$(TARGET_ARCH) clean
I tested on VMware Fusion with 3, 4 and 8 CPUs, and it works in all cases.
(XEN) Xen version 4.6.1-pre ( 4.6.1~pre-1skyport1)
(eswi...@skyportsystems.com) (gcc (Debian 5.2.1-19.1skyport1) 5.2.1
20150930) debug=n Wed Dec 2 07:22:20 PST 2015
(XEN) Bootloader: SYSLINUX 4.05 20140113
(XEN) Command li
> On Dec 2, 2015, at 9:36 AM, Jan Beulich wrote:
>
On 02.12.15 at 16:29, wrote:
>> --- a/xen/Makefile
>> +++ b/xen/Makefile
>> @@ -91,7 +91,8 @@ _clean: delete-unfresh-files
>> $(MAKE) -f $(BASEDIR)/Rules.mk -C xsm clean
>> $(MAKE) -f $(BASEDIR)/Rules.mk -C crypto clean
>> $
>>> On 02.12.15 at 16:37, wrote:
> On Dec 2, 2015, at 10:28 AM, Jan Beulich wrote:
>
> On 02.12.15 at 16:04, wrote:
>>> I have attached the output from 'xl dmesg' with iommu=debug
>>> apic_verbosity=debug loglvl=all
>>
>> As of 4.6.0 it actually takes a debug hypervisor to get those
>> mes
>>> On 02.12.15 at 16:41, wrote:
>> On Dec 2, 2015, at 9:36 AM, Jan Beulich wrote:
>>
> On 02.12.15 at 16:29, wrote:
>>> --- a/xen/Makefile
>>> +++ b/xen/Makefile
>>> @@ -91,7 +91,8 @@ _clean: delete-unfresh-files
>>> $(MAKE) -f $(BASEDIR)/Rules.mk -C xsm clean
>>> $(MAKE) -f $(BAS
> On Dec 2, 2015, at 9:46 AM, Jan Beulich wrote:
>
On 02.12.15 at 16:41, wrote:
>
>>> On Dec 2, 2015, at 9:36 AM, Jan Beulich wrote:
>>>
>> On 02.12.15 at 16:29, wrote:
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -91,7 +91,8 @@ _clean: delete-unfresh-files
$(MAK
On Dec 2, 2015, at 10:28 AM, Jan Beulich wrote:
On 02.12.15 at 16:04, wrote:
>> I have attached the output from 'xl dmesg' with iommu=debug
>> apic_verbosity=debug loglvl=all
>
> As of 4.6.0 it actually takes a debug hypervisor to get those
> messages logged (which arguably is wrong, and w
On Wed, 2015-12-02 at 11:42 +, Wei Liu wrote:
> On Tue, Dec 01, 2015 at 01:27:53PM -0600, Doug Goldstein wrote:
> > Prefer using the character device over the proc file if the character
> > device exists. This follows similar conversions of xenbus to avoid
> > issues with FMODE_ATOMIC_POS added
On Tue, 2015-12-01 at 18:14 +0100, Juergen Gross wrote:
> Add some more checks for having got allocated memory in the domain
> builder. Related to this add an INVALID_PFN macro to be able to do
> these checks.
>
> Juergen Gross (2):
> libxc: replace INVALID_P2M_ENTRY by INVALID_PFN
> libxc: do
Signed-off-by: Ian Campbell
---
cr-try-bisect-adhoc | 2 ++
1 file changed, 2 insertions(+)
diff --git a/cr-try-bisect-adhoc b/cr-try-bisect-adhoc
index 5f8b7e1..f451324 100755
--- a/cr-try-bisect-adhoc
+++ b/cr-try-bisect-adhoc
@@ -27,6 +27,8 @@ nope () { echo "nope: $*"; exit 0; }
if ! test
On Wed, 2015-12-02 at 16:30 +0100, Juergen Gross wrote:
> On 02/12/15 16:28, Ian Campbell wrote:
> > On Wed, 2015-12-02 at 12:36 +, Andrew Cooper wrote:
> > > On 02/12/15 07:42, Juergen Gross wrote:
> > > > diff --git a/tools/libxc/xc_sr_save_x86_hvm.c
> > > > b/tools/libxc/xc_sr_save_x86_hvm.c
Otherwise the testid is missing from the filename, resulting in e.g.
http://osstest.test-lab.xenproject.org/~osstest/pub/results-adhoc/bisect/xen-unstable/test-amd64-amd64-qemuu-nested-intel..svg
Instead of test-amd64-amd64-qemuu-nested-intel.debian-hvm-install-l1-l2.svg
Signed-off-by: Ian Campbe
Hi folks,
I just got off the phone with Bitergia and in the second phase of the study, we
will do the following.
1) More accurate matching of reviews to commits. This means
- Fix issues with capitalisation and white spaces, slashes, ...
- We do have a sizeable portion of patches that have the pr
At 07:25 + on 02 Dec (1449041100), Tian, Kevin wrote:
> > From: David Vrabel [mailto:david.vra...@citrix.com]
> > Sent: Saturday, November 14, 2015 2:50 AM
> >
> > If a page is freed without translations being invalidated, and the page is
> > subsequently allocated to another domain, a guest w
On 02/12/15 16:23, Tim Deegan wrote:
> At 07:25 + on 02 Dec (1449041100), Tian, Kevin wrote:
>>> From: David Vrabel [mailto:david.vra...@citrix.com]
>>> Sent: Saturday, November 14, 2015 2:50 AM
>>>
>>> If a page is freed without translations being invalidated, and the page is
>>> subsequently
flight 65307 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65307/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Ian Campbell writes ("[PATCH OSSTEST] cr-try-bisect-adhoc: Set laundered_testid
so graph URL is correct"):
> Otherwise the testid is missing from the filename, resulting in e.g.
> http://osstest.test-lab.xenproject.org/~osstest/pub/results-adhoc/bisect/xen-unstable/test-amd64-amd64-qemuu-nested-in
Ian Campbell writes ("[PATCH OSSTEST] cr-try-bisect-adhoc: Ensure tmp exists."):
> Signed-off-by: Ian Campbell
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 02.12.15 at 17:30, wrote:
> On 02/12/15 16:23, Tim Deegan wrote:
>> At 07:25 + on 02 Dec (1449041100), Tian, Kevin wrote:
From: David Vrabel [mailto:david.vra...@citrix.com]
Sent: Saturday, November 14, 2015 2:50 AM
If a page is freed without translations being inval
On 02/12/15 16:23, Tim Deegan wrote:
> At 07:25 + on 02 Dec (1449041100), Tian, Kevin wrote:
>>> From: David Vrabel [mailto:david.vra...@citrix.com]
>>> Sent: Saturday, November 14, 2015 2:50 AM
>>>
>>> If a page is freed without translations being invalidated, and the page is
>>> subsequently
At 16:30 + on 02 Dec (1449073841), George Dunlap wrote:
> On 02/12/15 16:23, Tim Deegan wrote:
> > At 07:25 + on 02 Dec (1449041100), Tian, Kevin wrote:
> >>> From: David Vrabel [mailto:david.vra...@citrix.com]
> >>> Sent: Saturday, November 14, 2015 2:50 AM
> >>>
> >>> If a page is freed w
Hello George,
Thanks a lot. One more question if I connect serial port will I be able to
see what is happening in xenwithout using xen trace
On 2 Dec 2015 19:34, "George Dunlap" wrote:
> On Wed, Dec 2, 2015 at 1:49 PM, kumara rathnavel
> wrote:
> > Hello All,
> >
> > I require logs of
On Tue, Dec 01, George Dunlap wrote:
> We have several outstanding patch series which add devices that have
> two levels: a controller and individual devices attached to that
> controller.
Will likely work for pvscsi. Thanks.
Acked-by: Olaf Hering
Olaf
1 - 100 of 158 matches
Mail list logo