On 11.12.2015 at 3:28pm, wrote:
> > From: Xu, Quan
> > Sent: Thursday, December 10, 2015 5:33 PM
> >
> > If IOTLB/Context/IETC flush is timeout, we should think all devices
> > under this IOMMU cannot function correctly.
> > So for each device under this IOMMU we'll mark it as unassignable and
> >
On 12/10/2015 06:48 PM, Doug Goldstein wrote:
> Use the Kconfig generated CONFIG_HAS_MEM_ACCESS defines in the code base.
>
> CC: Ian Campbell
> CC: Stefano Stabellini
> CC: Keir Fraser
> CC: Jan Beulich
> CC: Andrew Cooper
> CC: Razvan Cojocaru
> CC: Tamas K Lengyel
> CC: Daniel De Graaf
On 11/12/2015 02:09, Xu, Quan wrote:
> On 11.12.2015 at 3:03pm, wrote:
>> On 10/12/15 09:33, Quan Xu wrote:
>>> Signed-off-by: Quan Xu
>>> ---
>>> xen/drivers/passthrough/vtd/qinval.c | 11 +--
>>> 1 file changed, 9 insertions(+), 2 deletions(-)
>>>
>>> diff --git a/xen/drivers/passthrou
On 11/12/2015 05:37, Xu, Quan wrote:
> On 11.12.2015 at 3:05pm, Andrew Cooper wrote:
>> On 10/12/15 09:33, Quan Xu wrote:
>>> diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index
>>> a5aef55..0bf6b1a 100644
>>> --- a/xen/include/xen/pci.h
>>> +++ b/xen/include/xen/pci.h
>>> @@ -41,6 +4
On 12/10/2015 06:48 PM, Doug Goldstein wrote:
> Use the Kconfig generated CONFIG_HAS_MEM_PAGING defines in the code base.
>
> CC: Keir Fraser
> CC: Jan Beulich
> CC: Andrew Cooper
> CC: Razvan Cojocaru
> CC: Tamas K Lengyel
> CC: Daniel De Graaf
> Signed-off-by: Doug Goldstein
Acked-by: Ra
On 11.12.2015 at 4:38pm, wrote:
> On 11/12/2015 05:37, Xu, Quan wrote:
> > On 11.12.2015 at 3:05pm, Andrew Cooper
> wrote:
> >> On 10/12/15 09:33, Quan Xu wrote:
> >>> diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index
> >>> a5aef55..0bf6b1a 100644
> >>> --- a/xen/include/xen/pci.h
On 12/10/2015 06:48 PM, Doug Goldstein wrote:
> Use the Kconfig generated CONFIG_HAS_MEM_SHARING defines in the code base.
>
> CC: Keir Fraser
> CC: Jan Beulich
> CC: Andrew Cooper
> CC: Razvan Cojocaru
> CC: Tamas K Lengyel
> CC: Daniel De Graaf
> Signed-off-by: Doug Goldstein
Acked-by: R
On 11.12.2015 at 4:37pm, wrote:
> On 11/12/2015 02:09, Xu, Quan wrote:
> > On 11.12.2015 at 3:03pm, wrote:
> >> On 10/12/15 09:33, Quan Xu wrote:
> >>> Signed-off-by: Quan Xu
> >> This patch misses a second use of DMAR_OPERATION_TIMEOUT, in
> >> IOMMU_WAIT_OP() which in turn is used in a large
On 11/12/2015 07:18, Han, Huaitong wrote:
> On Thu, 2015-12-10 at 18:59 +, Andrew Cooper wrote:
>> On 07/12/15 09:16, Huaitong Han wrote:
>>> +
>>> +/* PKRU dom0 is always zero */
>>> +if ( likely(!pte_pkeys) )
>>> +return 0;
>> This is not an architectural restriction (as far a
>>> On 11.12.15 at 08:51, wrote:
>> From: Roger Pau Monne
>> Sent: Tuesday, December 08, 2015 12:48 AM
>>
>> Instead of choosing the interface to expose to guests based on the guest
>> type, do it based on whether the guest has an emulated local apic or not.
>>
>> Signed-off-by: Roger Pau Monné
> -Original Message-
> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
> boun...@lists.xen.org] On Behalf Of George Dunlap
> Sent: Friday, December 11, 2015 2:20 AM
> To: Han, Huaitong ; jbeul...@suse.com;
> andrew.coop...@citrix.com; Nakajima, Jun ; Dong,
> Eddie ; Tian, Kevin ;
flight 65639 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65639/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 15 guest-localmigrate/x10
fail like 65062
test-amd6
>>> On 11.12.15 at 10:16, wrote:
>> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
>> boun...@lists.xen.org] On Behalf Of George Dunlap
>> Sent: Friday, December 11, 2015 2:20 AM
>> On 07/12/15 09:16, Huaitong Han wrote:
>> > This patch adds pkeys support for guest_walk_tables.
>> >
>> >
>>> On 10.12.15 at 19:19, wrote:
> On 07/12/15 09:16, Huaitong Han wrote:
>> +if ( likely(!pte_pkeys) )
>> +return 0;
>> +
>> +/* Update vcpu xsave area */
>> +fpu_xsave(vcpu);
>
> Is there a reason you're calling fpu_xsave() directly here, rather than
> just calling vcpu_save
On Thu, 2015-12-10 at 18:19 +, George Dunlap wrote:
> On 07/12/15 09:16, Huaitong Han wrote:
> > +{
> > +void *xsave_addr;
> > +unsigned int pkru = 0;
> > +bool_t pkru_ad, pkru_wd;
> > +
> > +bool_t uf = !!(pfec & PFEC_user_mode);
> > +bool_t wf = !!(pfec & PFEC_write_access
El 11/12/15 a les 8.51, Tian, Kevin ha escrit:
>> From: Roger Pau Monne
>> Sent: Tuesday, December 08, 2015 12:48 AM
>>
>> Instead of choosing the interface to expose to guests based on the guest
>> type, do it based on whether the guest has an emulated local apic or not.
>>
>> Signed-off-by: Roger
>>> On 07.12.15 at 10:16, wrote:
> --- a/xen/arch/x86/xstate.c
> +++ b/xen/arch/x86/xstate.c
> @@ -146,12 +146,15 @@ static void __init setup_xstate_comp(void)
> }
> }
>
> -static void *get_xsave_addr(void *xsave, unsigned int xfeature_idx)
> +void *get_xsave_addr(void *xsave, unsigned int
>>> On 07.12.15 at 10:16, wrote:
> @@ -4605,6 +4605,18 @@ void hvm_cpuid(unsigned int input, unsigned int *eax,
> unsigned int *ebx,
> /* Don't expose INVPCID to non-hap hvm. */
> if ( (count == 0) && !hap_enabled(d) )
> *ebx &= ~cpufeat_mask(X86_FEATURE_INVPCID);
>
>>> On 11.12.15 at 10:23, wrote:
> On Thu, 2015-12-10 at 18:19 +, George Dunlap wrote:
>> On 07/12/15 09:16, Huaitong Han wrote:
>> > +if ( likely(!pte_pkeys) )
>> > +return 0;
>> > +
>> > +/* Update vcpu xsave area */
>> > +fpu_xsave(vcpu);
>>
>> Is there a reason you're
On 11/12/15 01:42, quizy_jo...@outlook.com wrote:
> I'd like to inject int3 traps to hypercall handlers to be able to
> capture hypercalls. However, the dom0/xen would reboot whenever I
> create a new VM. Followup is the console output when this happens.
>
> *(XEN) Xen call trace:*
> (XEN)[]
>>> On 11.12.15 at 09:01, wrote:
> On 11.12.2015 at 3:28pm, wrote:
>> > From: Xu, Quan
>> > Sent: Thursday, December 10, 2015 5:33 PM
>> >
>> > If IOTLB/Context/IETC flush is timeout, we should think all devices
>> > under this IOMMU cannot function correctly.
>> > So for each device under this I
On 11/12/15 07:35, Tian, Kevin wrote:
>> From: Zhang, Haozhong
>> Sent: Thursday, December 10, 2015 7:13 PM
>>
>> On 12/10/15 10:43, Tian, Kevin wrote:
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Tuesday, December 08, 2015 1:04 AM
On 07/12/15 10:16, Haozhong Zha
Instead of choosing the interface to expose to guests based on the guest
type, do it based on whether the guest has an emulated local apic or not.
Signed-off-by: Roger Pau Monné
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Boris Ostrovsky
Cc:
Hi,
Thanks for the report. The maintainers list changed recently, so I'm
CC'ing the current set for VMX and x86/mm.
Since this is an L1 xen crash, the bug is probably in the code that
tried to inject the trap (vmi_write_8_pa() and callers). It's
interesting that both the L1 crashes were in unlo
On 11/12/15 07:53, Jan Beulich wrote:
On 10.12.15 at 21:07, wrote:
>> On 01/12/15 13:35, Jan Beulich wrote:
>> On 01.12.15 at 12:37, wrote:
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -89,7 +89,14 @@ DEFINE_XEN_GUEST_HANDLE(xen_sysctl_tbuf_op_t);
>>> On 11.12.15 at 11:20, wrote:
> On 11/12/15 07:53, Jan Beulich wrote:
> On 10.12.15 at 21:07, wrote:
>>> On 01/12/15 13:35, Jan Beulich wrote:
>>> On 01.12.15 at 12:37, wrote:
> --- a/xen/include/public/sysctl.h
> +++ b/xen/include/public/sysctl.h
> @@ -89,7 +89,14 @@ DEFI
>>> On 10.12.15 at 10:33, wrote:
> @@ -167,10 +172,12 @@ static int queue_invalidate_wait(struct iommu *iommu,
> start_time = NOW();
> while ( poll_slot != QINVAL_STAT_DONE )
> {
> -if ( NOW() > (start_time + DMAR_OPERATION_TIMEOUT) )
> +if ( NOW(
>>> On 10.12.15 at 17:48, wrote:
> --- a/config/x86_32.mk
> +++ b/config/x86_32.mk
> @@ -6,7 +6,6 @@ CONFIG_MIGRATE := y
> CONFIG_XCUTILS := y
>
> HAS_MEM_ACCESS := y
> -HAS_MEM_PAGING := y
> HAS_MEM_SHARING := y
>
> CFLAGS += -m32 -march=i686
> --- a/config/x86_64.mk
> +++ b/config/x86_64
>>> On 10.12.15 at 21:03, wrote:
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -570,8 +570,10 @@ do{ asm volatile (
>\
> /* Fetch next part of the instruction being emulated. */
> #define
On 11/12/15 10:47, Jan Beulich wrote:
On 10.12.15 at 21:03, wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -570,8 +570,10 @@ do{ asm volatile (
>>
>>\
>> /* Fetch next part o
In order to prepare using the virtual mapped linear p2m list for
migration split mapping of the p2m leaf pages into a separate function.
Signed-off-by: Juergen Gross
---
tools/libxc/xc_sr_save_x86_pv.c | 77 -
1 file changed, 45 insertions(+), 32 deletions
Add support for the virtual mapped linear p2m list of pv-domains in the
v2 migrate stream. This will allow to migrate domains larger than 512
GB.
Tested with 32- and 64-bit pv-domains both with and without linear p2m
list and with a hvm domain.
Juergen Gross (4):
libxc: split mapping p2m leaves
With support of the virtual mapped linear p2m list for migration it is
now possible to detect structural changes of the p2m list which before
would either lead to a crashing or otherwise wrong behaving domU.
A guest supporting the linear p2m list will increment the
p2m_generation counter located i
Set the SIF_VIRT_P2M_4TOOLS flag for pv-domUs in the domain builder
to indicate the Xen tools have full support for the virtual mapped
linear p2m list.
This will enable pv-domUs to drop support of the 3 level p2m tree
and use the linear list only. Without setting this flag some kernels
might limit
In order to be able to migrate pv-domains with more than 512 GB of RAM
the p2m information can be specified by the guest kernel via a virtual
mapped linear p2m list instead of a 3 level tree.
Add support for this new p2m format in libxc.
Signed-off-by: Juergen Gross
---
tools/libxc/xc_sr_save_x
Where in the code base is the initialization of a new domain (to run
unmodified guests) done? Where is it given the details about the memory it
has access to?
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Fri, 2015-12-11 at 12:04 +0800, Robert Hu wrote:
> On Tue, 2015-12-08 at 10:29 +, Ian Campbell wrote:
> > On Tue, 2015-12-08 at 08:06 +, Hu, Robert wrote:
> > > >
> > > [...]
> >
> > Please trim your quotes.
> >
> > > For your failure, as Kevin mentioned in other mail, we will find
>
On Thu, 2015-12-10 at 18:00 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database
> schema updates"):
> > On Thu, 2015-12-10 at 17:12 +, Ian Jackson wrote:
> > > + is a positive integer, which should be unique. Updates
> > > are
> > > +applied in or
On Fri, 2015-12-11 at 11:48 +0800, Robert Hu wrote:
> On Fri, 2015-12-11 at 01:16 +, osstest service owner wrote:
> > flight 65633 linux-3.14 real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/65633/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
>
Wei did some manual investigation and found he could not reproduce this
issue on merlot1, later realising that he had XSM disabled in his build.
On that hunch I ran an adhoc flight with XSM both on and off, results
below. Public copy of the logs is at
http://logs.test-lab.xenproject.org/osstest/lo
Actually CC'ing xen-devel
On Fri, 11 Dec 2015, Stefano Stabellini wrote:
> On Tue, 8 Dec 2015, Gerd Hoffmann wrote:
> > Hi,
> >
> > We have some code in our tree to support pci passthrough of intel
> > graphics devices (igd) on xen, which requires some chipset tweaks
> > for (a) the host bridge
On 12/11/15 4:52 AM, Jan Beulich wrote:
On 10.12.15 at 17:48, wrote:
>> --- a/config/x86_32.mk
>> +++ b/config/x86_32.mk
>> @@ -6,7 +6,6 @@ CONFIG_MIGRATE := y
>> CONFIG_XCUTILS := y
>>
>> HAS_MEM_ACCESS := y
>> -HAS_MEM_PAGING := y
>> HAS_MEM_SHARING := y
>>
>> CFLAGS += -m32 -march=
>>> On 11.12.15 at 13:57, wrote:
> On 12/11/15 4:52 AM, Jan Beulich wrote:
> On 10.12.15 at 17:48, wrote:
>>> --- a/config/x86_32.mk
>>> +++ b/config/x86_32.mk
>>> @@ -6,7 +6,6 @@ CONFIG_MIGRATE := y
>>> CONFIG_XCUTILS := y
>>>
>>> HAS_MEM_ACCESS := y
>>> -HAS_MEM_PAGING := y
>>> HAS_MEM
flight 65635 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65635/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate
fail blocked in 65114
test-amd64
>>> On 11.12.15 at 12:12, wrote:
> On 11/12/15 10:47, Jan Beulich wrote:
>> Furthermore, doesn't this make the wrapping-inside-an-insn
>> situation worse (i.e. what looks broken for 32- and 64-bit modes
>> now gets broken also for 16-bit mode)?
>
> I don't understand which "broken" you are referr
On Thu, 2015-12-10 at 18:27 +, Ian Jackson wrote:
> Ian Jackson writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database
> schema updates"):
> > It does say that updates are applied in order. I will add `and
> > monotonically increasing' after `unique'. [etc etc]
>
> Here is v3 of this patc
This is to limit symbol table growth, which would be quite a bit worse
if we went with the "label every unlikely sub-section contribution"
approach proposed previously.
Older gas doesn't support quoted symbols, yet the result looks quite
bit better that way. Hence two variants get introduced, one
On Fri, 2015-12-11 at 03:33 -0700, Jan Beulich wrote:
> > > > On 11.12.15 at 11:20, wrote:
> > On 11/12/15 07:53, Jan Beulich wrote:
> > > > > > On 10.12.15 at 21:07, wrote:
> > > > On 01/12/15 13:35, Jan Beulich wrote:
> > > > > > > > On 01.12.15 at 12:37, wrote:
> > > > > > --- a/xen/include/p
On Fri, 2015-12-04 at 15:26 -0500, jto...@uwaterloo.ca wrote:
> We're a team of three fourth-year undergraduate software engineering
> students at the University of Waterloo in Canada. We're in the process
> of planning for our capstone design project, and are interested in
> contributing to Xen.
This is useful for standalone or adhoc use as well as (presumably)
bisection.
There is no ap-* or cr-daily-* integration here because I didn't need
it (i.e. I'm not intending to create a new mini-os branch here).
Signed-off-by: Ian Campbell
---
mfi-common | 4 +++-
ts-xen-build | 8
On 11.12.2015 at 6:05pm, wrote:
> >>> On 11.12.15 at 09:01, wrote:
> > On 11.12.2015 at 3:28pm, wrote:
> >> > From: Xu, Quan
> >> > Sent: Thursday, December 10, 2015 5:33 PM
> >> >
> >> > If IOTLB/Context/IETC flush is timeout, we should think all devices
> >> > under this IOMMU cannot function
On Fri, 2015-12-11 at 12:12 +, Ian Campbell wrote:
> I think 10 repetitions indicates it probably wasn't a fluke, however I've
> kicked off a repeat (flight 65738) of the test to increase confidence.
>
> In the test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm case I've set
> debianhvm_gen
Adding the rtc platform device in non-privileged Xen PV guests causes
an IRQ conflict because these guests do not have legacy PIC and may
allocate irqs in the legacy range.
In a single VCPU Xen PV guest we should have:
/proc/interrupts:
CPU0
0: 4934 xen-percpu-virq timer0
> On 11.12.2015 at 6:01pm, wrote:
> >>> On 10.12.15 at 10:33, wrote:
> > @@ -167,10 +172,12 @@ static int queue_invalidate_wait(struct iommu
> *iommu,
> > start_time = NOW();
> > while ( poll_slot != QINVAL_STAT_DONE )
> > {
> > -if ( NOW() > (start_time + D
flight 38494 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38494/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-amd64-jessie-netboot-pygrub 9 debian-di-install fail like 38428
test-amd64-i386
> -Original Message-
> From: xen-devel-boun...@lists.xen.org
> [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Xu, Quan
> Sent: Friday, December 11, 2015 10:00 PM
> To: Jan Beulich
> Cc: Tian, Kevin; Wu, Feng; george.dun...@eu.citrix.com;
> andrew.coop...@citrix.com; t...@xen.org; x
On 11/12/15 11:31, Juergen Gross wrote:
> Add support for the virtual mapped linear p2m list of pv-domains in the
> v2 migrate stream. This will allow to migrate domains larger than 512
> GB.
>
> Tested with 32- and 64-bit pv-domains both with and without linear p2m
> list and with a hvm domain.
>
On 11/12/15 15:18, Andrew Cooper wrote:
> On 11/12/15 11:31, Juergen Gross wrote:
>> Add support for the virtual mapped linear p2m list of pv-domains in the
>> v2 migrate stream. This will allow to migrate domains larger than 512
>> GB.
>>
>> Tested with 32- and 64-bit pv-domains both with and with
On 11/12/15 11:31, Juergen Gross wrote:
> In order to prepare using the virtual mapped linear p2m list for
> migration split mapping of the p2m leaf pages into a separate function.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Andrew Cooper
___
Xen-de
On Wed, 9 Dec 2015, Ian Campbell wrote:
> On Thu, 2015-12-03 at 11:23 +, Ian Campbell wrote:
> > diff --git a/hw/display/xenfb.c b/hw/display/xenfb.c
> > index 5e324ef..c96d974 100644
> > --- a/hw/display/xenfb.c
> > +++ b/hw/display/xenfb.c
> > @@ -104,9 +104,8 @@ static int common_bind(struct
On Mon, 7 Dec 2015, Jan Beulich wrote:
> >>> On 07.12.15 at 15:56, wrote:
> > On Mon, 7 Dec 2015, Jan Beulich wrote:
> >> >>> On 07.12.15 at 13:45, wrote:
> >> > On Tue, 24 Nov 2015, Jan Beulich wrote:
> >> >> Now that the hypervisor intercepts all config space writes and monitors
> >> >> changes
On Fri, 4 Dec 2015, Julien Grall wrote:
> Hi Stefano:
>
> Can you please add xen/arm in the commit title?
>
> On 04/12/2015 12:36, Stefano Stabellini wrote:
> > Injecting a fault to the guest just because it is writing to one of the
> > GICD_ICACTIVER registers, which are part of the GICv2 and GI
Hi Stefano,
On 11/12/15 14:36, Stefano Stabellini wrote:
> On Fri, 4 Dec 2015, Julien Grall wrote:
>> On 04/12/2015 12:36, Stefano Stabellini wrote:
>>> Injecting a fault to the guest just because it is writing to one of the
>>> GICD_ICACTIVER registers, which are part of the GICv2 and GICv3 specs
flight 65643 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65643/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-rumpuserxen-i386 15
rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 64997
t
On 11/12/15 11:31, Juergen Gross wrote:
> In order to be able to migrate pv-domains with more than 512 GB of RAM
> the p2m information can be specified by the guest kernel via a virtual
> mapped linear p2m list instead of a 3 level tree.
>
> Add support for this new p2m format in libxc.
>
> Signed-
Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database schema
updates"):
> On Thu, 2015-12-10 at 18:00 +, Ian Jackson wrote:
> > It does say that updates are applied in order.
>
> Right I was considering an osstest repo with 01 and 03 in it, which is
> applied and all up to da
On 11/12/15 15:51, Andrew Cooper wrote:
> On 11/12/15 11:31, Juergen Gross wrote:
>> In order to be able to migrate pv-domains with more than 512 GB of RAM
>> the p2m information can be specified by the guest kernel via a virtual
>> mapped linear p2m list instead of a 3 level tree.
>>
>> Add suppor
Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database schema
updates"):
> On Thu, 2015-12-10 at 18:27 +, Ian Jackson wrote:
> > See schema/README.schema, introduced in this patch, for the design.
>
> The README looks good now, thanks.
Thanks.
> Code comments
> > diff -
Ian Campbell writes ("[PATCH OSSTEST] make-flight: Support specifying a mini-os
tree+revision"):
> This is useful for standalone or adhoc use as well as (presumably)
> bisection.
>
> There is no ap-* or cr-daily-* integration here because I didn't need
> it (i.e. I'm not intending to create a new
flight 65654 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65654/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-vhd 9 debian-di-install fail REGR. vs. 63340
Tests which did not succe
>>> On 11.12.15 at 15:33, wrote:
> On Mon, 7 Dec 2015, Jan Beulich wrote:
>> >>> On 07.12.15 at 15:56, wrote:
>> > On Mon, 7 Dec 2015, Jan Beulich wrote:
>> >> >>> On 07.12.15 at 13:45, wrote:
>> >> > On Tue, 24 Nov 2015, Jan Beulich wrote:
>> >> >> TBD: We probably need to deal with running on
On Fri, 2015-12-11 at 15:12 +, Ian Campbell wrote:
> Dec 10 20:13:39.584976 (XEN) avc: denied { pcilevel } for domid=8
> target=7 scontext=system_u:system_r:dm_dom_t
> tcontext=system_u:system_r:domU_t_target tclass=hvm
I wonder if this is an intx associated with the USB?
In the XSM case th
On Fri, 2015-12-11 at 15:15 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database
> schema updates"):
> > On Thu, 2015-12-10 at 18:27 +, Ian Jackson wrote:
> > > See schema/README.schema, introduced in this patch, for the design.
> >
> > The README
On 11/12/15 11:31, Juergen Gross wrote:
> With support of the virtual mapped linear p2m list for migration it is
> now possible to detect structural changes of the p2m list which before
> would either lead to a crashing or otherwise wrong behaving domU.
>
> A guest supporting the linear p2m list wi
On Fri, 2015-12-11 at 14:26 +, Stefano Stabellini wrote:
> On Wed, 9 Dec 2015, Ian Campbell wrote:
> > On Thu, 2015-12-03 at 11:23 +, Ian Campbell wrote:
> > > diff --git a/hw/display/xenfb.c b/hw/display/xenfb.c
> > > index 5e324ef..c96d974 100644
> > > --- a/hw/display/xenfb.c
> > > +++ b
flight 65650 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65650/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-localmigrate fail REGR. vs. 64765
test-amd64-amd64-xl-qemuu-
Rather than getting dabt every time through info->dabt, introduce a
local variable and use it.
Also fix a coding style error in the if condition.
Signed-off-by: Julien Grall
---
xen/arch/arm/io.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm/io.c b/xen/ar
The mapping between aarch64 and aarch32 has not been chosen in random.
It's based on D1.20.1 in ARM DDI 0487A.d.
The section is not obvious to find in the spec, so make it clear for the
anyone else.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/arm64/processor.h | 7 ++-
1 file change
Hi all,
This patch series aims to fix the emulation of register {w,x}zr for ARM64.
A branch is available with all the patches applied:
git://xenbits.xen.org/people/julieng/xen-unstable.git branch handle-xzr-v1
Regards,
Julien Grall (4):
xen/arm: io: handle_read: Use a local variable to store
Factorize the code to emulate a a 32-bit/64-bit sysreg in specific
helpers.
While this is currently not necessary, it will be helpful in a following
patch to handle properly some registers.
Signed-off-by: Julien Grall
---
xen/arch/arm/vtimer.c | 47 +-
On AArch64, the encoding 31 could be used to represent {x,w}sp or
{x,w}zr (See C1.2.4 in ARM DDI 0486A.d). The choice will depend how the
register field is interpreted by the instruction.
All the instructions trapped by Xen (either via a sysreg access or data
abort) interprets the encoding 31 as z
>>> + */
>>> +static int map_p2m_list(struct xc_sr_context *ctx, uint64_t p2m_cr3)
>>> +{
>>> +xc_interface *xch = ctx->xch;
>>> +xen_vaddr_t p2m_vaddr, p2m_end, mask, off;
>>> +xen_pfn_t p2m_mfn, mfn, saved_mfn, max_pfn;
>>> +uint64_t *ptes;
>>> +xen_pfn_t *mfns;
>>> +unsi
Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database schema
updates"):
> On Fri, 2015-12-11 at 15:15 +, Ian Jackson wrote:
> > I can put this in a comment if you like.
>
> I suppose a comment next to any such override is a pretty good policy to
> have.
OK. See below; I hav
On Thu, 2015-12-10 at 15:21 +, George Dunlap wrote:
> On 03/12/15 11:22, Ian Campbell wrote:
> > It can trivially be replaced by xc_map_foreign_pages which is the
> > interface I want to move to going forward (by standardising on _bulk
> > but handling err=NULL as _pages does).
> >
> > The cal
Support the xenstore domain flag for obtaining domain info.
Signed-off-by: Juergen Gross
---
tools/libxc/include/xenctrl.h | 2 +-
tools/libxc/xc_domain.c | 17 +
2 files changed, 10 insertions(+), 9 deletions(-)
diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/in
After starting the xenstore domain write the basic data (domid and
name) to the xenstore.
Add a new option to init-xenstore-domain to be able to specify the
domain's name.
Signed-off-by: Juergen Gross
---
tools/xenstore/init-xenstore-domain.c | 13 -
1 file changed, 12 insertions(+)
Don't start a new xenstore domain in case one is already detected to
be running.
Signed-off-by: Juergen Gross
---
tools/xenstore/init-xenstore-domain.c | 25 +++--
1 file changed, 23 insertions(+), 2 deletions(-)
diff --git a/tools/xenstore/init-xenstore-domain.c
b/tools/xe
Xen supports to run xenstore in a dedicated domain. It is, however, a
setup which isn't easy to configure. Today flask is required for full
functionality and the resulting xenstore domain is not configurable in
the same way as the xenstore daemon.
This patch series enables running a xenstore domai
The program init-xenstore-domain to start a xenstore domain instead
of the xenstored daemon is built, but not installed. Change that.
Signed-off-by: Juergen Gross
---
tools/xenstore/Makefile | 3 +++
1 file changed, 3 insertions(+)
diff --git a/tools/xenstore/Makefile b/tools/xenstore/Makefile
Add a parameter to init-xenstore-domain for support of arbitrary
parameters for the xenstore domain.
Signed-off-by: Juergen Gross
---
tools/xenstore/init-xenstore-domain.c | 21 -
1 file changed, 16 insertions(+), 5 deletions(-)
diff --git a/tools/xenstore/init-xenstore-doma
Additional add some diagnostic messages to the program to have an idea
why it failed.
Signed-off-by: Juergen Gross
---
tools/xenstore/init-xenstore-domain.c | 109 +++---
1 file changed, 87 insertions(+), 22 deletions(-)
diff --git a/tools/xenstore/init-xenstore-doma
In order to be able to have full support of a xenstore domain in Xen
add a "Xenstore-domain" flag to the hypervisor. This flag must be
specified at domain creation time and is returned by
XEN_DOMCTL_getdomaininfo.
It will allow the domain to retrieve domain information by issuing the
XEN_DOMCTL_ge
Xenstore messages for diagnostic purposes are lost today in case
xenstore is running under mini-os instead in a dom0 daemon.
Use printk of mini-os in this situation.
Signed-off-by: Juergen Gross
---
tools/xenstore/utils.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/tools/xenstore/
init-xenstore-domain takes only positional parameters today. Change
this to a more flexible parameter syntax allowing to specify additional
options or to omit some.
Today the supported usage is:
init-xenstore-domain
[]
Modify this to:
init-xenstore-domain --kernel
On Fri, 2015-12-11 at 14:05 +, Ian Campbell wrote:
So returning to the logs for 65682 (the first repro, which exhibited the
fail with the usual timeout).
http://osstest.test-lab.xenproject.org/~osstest/pub/logs/65682/test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm/info.html
First thing
Sorry Tim,
your mail address has gained an additional character in the original
mail. Forwarded the mail just for you convenience.
Juergen
Forwarded Message
Subject: [Xen-devel] [PATCH 1/9] xen: add xenstore domain flag to hypervisor
Date: Fri, 11 Dec 2015 16:47:33 +0100
From
On Fri, 2015-12-11 at 15:34 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database
> schema updates"):
> > On Fri, 2015-12-11 at 15:15 +, Ian Jackson wrote:
> > > I can put this in a comment if you like.
> >
> > I suppose a comment next to any such o
On Wed, 2015-12-09 at 15:42 +, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH XEN v6 22/32] tools/libs/foreignmemory:
> optimise map(num==1, err==NULL) case"):
> > This looks to be a reasonably common case (many of the previous
> > callers to xc_map_foreign_pages use it) and it is easy enoug
On 11/12/15 16:24, Andrew Cooper wrote:
>
+ */
+static int map_p2m_list(struct xc_sr_context *ctx, uint64_t p2m_cr3)
+{
+xc_interface *xch = ctx->xch;
+xen_vaddr_t p2m_vaddr, p2m_end, mask, off;
+xen_pfn_t p2m_mfn, mfn, saved_mfn, max_pfn;
+uint64
For all supported targets HAS_MEM_ACCESS is enabled so this drops the
conditional and always makes it enabled. The goal here is to remove the
setting in the top level config directory when kconfig changes land.
Signed-off-by: Doug Goldstein
---
tools/tests/xen-access/Makefile | 3 +--
1 file cha
1 - 100 of 138 matches
Mail list logo