On 15/12/15 14:30, Juergen Gross wrote:
> On 15/12/15 14:19, Ian Campbell wrote:
>> On Tue, 2015-12-15 at 13:53 +0100, Juergen Gross wrote:
>>>
mem-set too perhaps?
>>>
>>> Without mini-os supporting ballooning or memory hotplug up to now:
>>> I don't think so. :-)
>>
>> Sure, but you'd get
On Wed, 2015-12-16 at 18:40 +, Andrew Cooper wrote:
> On 16/12/15 12:31, Ian Campbell wrote:
> > libxengnttab will provide a stable API and ABI for accessing the
> > grant table devices.
> >
> > The functions are moved into the xengnt{tab,shr} namespace to make a
> > clean break from libxc and
On Thu, 2015-12-17 at 11:58 +0530, Harmandeep Kaur wrote:
> Hi,
>
Hello Harmandeep,
> I tried to setup xen serial console with this guide,
> http://wiki.xen.org/wiki/Xen_Serial_Console
>
> I am using RS232 -USB cable for this purpose.
> I am on Ubuntu 15.10 (4.2.0-19-generic).
>
> xl info http:
On Wed, 2015-12-16 at 02:12 -0700, Jan Beulich wrote:
> > > > On 16.12.15 at 10:03, wrote:
> > On Wed, 2015-12-16 at 01:32 -0700, Jan Beulich wrote:
> > > > > > On 16.12.15 at 09:16, wrote:
> > > > On Tue, 2015-12-15 at 02:02 -0700, Jan Beulich wrote:
> > > > > Well, I wouldn't want you to introd
El 17/12/15 a les 10.06, Dario Faggioli ha escrit:
> On Thu, 2015-12-17 at 11:58 +0530, Harmandeep Kaur wrote:
>> Hi,
>>
> Hello Harmandeep,
>
>> I tried to setup xen serial console with this guide,
>> http://wiki.xen.org/wiki/Xen_Serial_Console
>>
>> I am using RS232 -USB cable for this purpose.
On 17/12/2015 06:28, Harmandeep Kaur wrote:
> Hi,
>
> I tried to setup xen serial console with this guide,
> http://wiki.xen.org/wiki/Xen_Serial_Console
>
> I am using RS232 -USB cable for this purpose.
> I am on Ubuntu 15.10 (4.2.0-19-generic).
>
> xl info http://paste2.org/F2UgY5yz
>
> My output
On Wed, 2015-12-16 at 18:05 +, Stefano Stabellini wrote:
> On Wed, 16 Dec 2015, Ian Campbell wrote:
> > On Wed, 2015-12-16 at 15:53 +, Stefano Stabellini wrote:
> > > On Wed, 9 Dec 2015, Ian Campbell wrote:
> > > > Signed-off-by: Ian Campbell
> > > > ---
> > > > xen/arch/arm/vtimer.c
flight 66418 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66418/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
65669
Tests which
>>> On 16.12.15 at 20:34, wrote:
> On 12/16/2015 04:04 AM, Jan Beulich wrote:
>>
>>> --- a/xen/arch/x86/hvm/hvm.c
>>> +++ b/xen/arch/x86/hvm/hvm.c
>>> @@ -3116,6 +3116,21 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned
>>> long gla,
>>> goto out_put_gfn;
>>> }
>>>
>>> +
On Wed, 2015-12-16 at 18:30 +, Stefano Stabellini wrote:
> On Wed, 9 Dec 2015, Ian Campbell wrote:
> > Currently only GICv2 support is implemented.
> >
> > Given the differing architectural state between the GICv2 and v3 I
> > ended up with separate save records. I'm not sure if this is the be
On Thu, 2015-12-17 at 09:26 +0100, Juergen Gross wrote:
> On 15/12/15 14:30, Juergen Gross wrote:
> > On 15/12/15 14:19, Ian Campbell wrote:
> > > On Tue, 2015-12-15 at 13:53 +0100, Juergen Gross wrote:
> > > >
> > > > > mem-set too perhaps?
> > > >
> > > > Without mini-os supporting ballooning
>>> On 17.12.15 at 10:18, wrote:
> On Wed, 2015-12-16 at 02:12 -0700, Jan Beulich wrote:
>> > > > On 16.12.15 at 10:03, wrote:
>> > On Wed, 2015-12-16 at 01:32 -0700, Jan Beulich wrote:
>> > > Depending on how frequently this might get called, the allocation
>> > > overhead may not be tolerable.
On 17/12/15 11:01, Ian Campbell wrote:
> On Thu, 2015-12-17 at 09:26 +0100, Juergen Gross wrote:
>> On 15/12/15 14:30, Juergen Gross wrote:
>>> On 15/12/15 14:19, Ian Campbell wrote:
On Tue, 2015-12-15 at 13:53 +0100, Juergen Gross wrote:
>
>> mem-set too perhaps?
>
> Without
On Thu, 2015-12-17 at 01:52 +0330, Alireza Vaezi wrote:
> On 12/16/15, Ian Campbell wrote:
> > On Wed, 2015-12-16 at 01:01 +0330, Alireza Vaezi wrote:
> > > I'm using Xen 4.4.2 and I need to be able to change or set my
> > > preferred
> > > (available) ssl cipher suit like RC4-SHA, or DES-CBC-SHA
>>> On 16.12.15 at 17:34, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -5188,12 +5188,21 @@ static hvm_hypercall_t *const
> hvm_hypercall64_table[NR_hypercalls] = {
> HYPERCALL(sysctl),
> HYPERCALL(domctl),
> HYPERCALL(tmem_op),
> +HYPERCALL(platfor
On Thu, 2015-12-17 at 11:08 +0100, Juergen Gross wrote:
> On 17/12/15 11:01, Ian Campbell wrote:
> > On Thu, 2015-12-17 at 09:26 +0100, Juergen Gross wrote:
> > > On 15/12/15 14:30, Juergen Gross wrote:
> > > > On 15/12/15 14:19, Ian Campbell wrote:
> > > > > On Tue, 2015-12-15 at 13:53 +0100, Juer
This run is configured for baseline tests only.
flight 38526 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38526/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 9 windows-inst
flight 66428 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66428/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-build fail REGR. vs. 65543
build-i386
> On 16.12.2015 at 4:08pm, wrote:
> >>> On 16.12.15 at 04:51, wrote:
> > --- a/xen/drivers/passthrough/pci.c
> > +++ b/xen/drivers/passthrough/pci.c
> > @@ -1318,6 +1318,25 @@ int iommu_remove_device(struct pci_dev *pdev)
> > return hd->platform_ops->remove_device(pdev->devfn,
> > pci_to_dev
>>> On 17.12.15 at 12:43, wrote:
>> On 16.12.2015 at 4:08pm, wrote:
>> >>> On 16.12.15 at 04:51, wrote:
>> > --- a/xen/drivers/passthrough/pci.c
>> > +++ b/xen/drivers/passthrough/pci.c
>> > @@ -1318,6 +1318,25 @@ int iommu_remove_device(struct pci_dev *pdev)
>> > return hd->platform_ops->
Cc: Stefano Stabellini
Cc: xen-de...@lists.xensource.com
Signed-off-by: Markus Armbruster
---
xen-hvm.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/xen-hvm.c b/xen-hvm.c
index 3d78a0c..2a93390 100644
--- a/xen-hvm.c
+++ b/xen-hvm.c
@@ -240,6 +240,7 @@ static void xen_ram_init(PCMa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-8554 / XSA-164
version 3
qemu-dm buffer overrun in MSI-X handling
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-8555 / XSA-165
version 3
information leak in legacy x86 FPU/XMM initialization
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-166
version 2
ioreq handling possibly susceptible to multiple read issue
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-8551,CVE-2015-8552 / XSA-157
version 3
Linux pciback missing sanity checks leading to crash
UPDATES IN VERSION 3
Removed CVE-2015-8553 from the tit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-8550 / XSA-155
version 5
paravirtualized drivers incautious about shared memory contents
UPDATES IN VERSION 5
Public release.
ISSUE DESCRIPTION
==
flight 66423 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66423/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 5 kernel-build fail REGR. vs. 65797
build-amd64-pvops
This patch series adds per-cpu reader-writer locks as a generic lock
implementation and then converts the grant table and p2m rwlocks to
use the percpu rwlocks, in order to improve multi-socket host performance.
CPU profiling has revealed the rwlocks themselves suffer from severe cache
line bounci
The per domain grant table read lock suffers from significant contention when
performance multi-queue block or network IO due to the parallel
grant map/unmaps/copies occurring on the DomU's grant table.
On multi-socket systems, the contention results in the locked compare swap
operation failing fr
The per domain p2m read lock suffers from significant contention when
performance multi-queue block or network IO due to the parallel
grant map/unmaps/copies occuring on the DomU's p2m.
On multi-socket systems, the contention results in the locked compare swap
operation failing frequently which re
Per-cpu read-write locks allow for the fast path read case to have
low overhead by only setting/clearing a per-cpu variable for using
the read lock. The per-cpu read fast path also avoids locked
compare swap operations which can be particularly slow on coherent
multi-socket systems, particularly if
> On 17.12.2015 at 8:10pm, wrote:
> >>> On 17.12.15 at 12:43, wrote:
> > You are correct.
> > As the _pci_hide_device()'s early check, I didn't use it.
> > Could I remove the device from that list before adding it to
> > dom_xen's, and reuse pci_hide_device() as below?
>
> That's what I was tr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-8550 / XSA-155
version 6
paravirtualized drivers incautious about shared memory contents
UPDATES IN VERSION 6
Correct CREDITS section.
ISSUE DESCRIPTI
On 12/17/2015 04:46 AM, Jan Beulich wrote:
On 16.12.15 at 20:34, wrote:
On 12/16/2015 04:04 AM, Jan Beulich wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -3116,6 +3116,21 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned long
gla,
goto out_put_gfn;
>>> On 17.12.15 at 14:55, wrote:
> On 12/17/2015 04:46 AM, Jan Beulich wrote:
> On 16.12.15 at 20:34, wrote:
>>> On 12/16/2015 04:04 AM, Jan Beulich wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -3116,6 +3116,21 @@ int hvm_hap_nested_page_fault(paddr_t
For one, loading the MSR with a possibly non-canonical address was
possible since the verification is conditional, while the MSR load
wasn't. And then for PV guests we need to further limit the range of
valid addresses to exclude the hypervisor range.
Signed-off-by: Jan Beulich
--- a/xen/arch/x8
On 17/12/15 14:01, Jan Beulich wrote:
> For one, loading the MSR with a possibly non-canonical address was
> possible since the verification is conditional, while the MSR load
> wasn't. And then for PV guests we need to further limit the range of
> valid addresses to exclude the hypervisor range.
>
On 12/17/2015 09:01 AM, Jan Beulich wrote:
For one, loading the MSR with a possibly non-canonical address was
possible since the verification is conditional, while the MSR load
wasn't. And then for PV guests we need to further limit the range of
valid addresses to exclude the hypervisor range.
S
>>> On 17.12.15 at 15:12, wrote:
> On 12/17/2015 09:01 AM, Jan Beulich wrote:
>> @@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu
>> enabled_cntrs |= (1ULL << i);
>> }
>>
>> -if ( vpmu_is_set(vcpu_vpmu(v), VPMU_CPU_HAS_DS) &&
>> - !is_canonical_addre
On 12/17/2015 09:18 AM, Jan Beulich wrote:
On 17.12.15 at 15:12, wrote:
On 12/17/2015 09:01 AM, Jan Beulich wrote:
@@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu
enabled_cntrs |= (1ULL << i);
}
-if ( vpmu_is_set(vcpu_vpmu(v), VPMU_CPU_HAS_DS) &&
-
>>> On 17.12.15 at 15:26, wrote:
> On 12/17/2015 09:18 AM, Jan Beulich wrote:
> On 17.12.15 at 15:12, wrote:
>>> On 12/17/2015 09:01 AM, Jan Beulich wrote:
@@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu
enabled_cntrs |= (1ULL << i);
}
On 12/17/2015 09:29 AM, Jan Beulich wrote:
On 17.12.15 at 15:26, wrote:
On 12/17/2015 09:18 AM, Jan Beulich wrote:
On 17.12.15 at 15:12, wrote:
On 12/17/2015 09:01 AM, Jan Beulich wrote:
@@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu
enabled_cntrs |= (1ULL <<
flight 66421 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66421/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate
fail REGR. vs. 65639
This series improves the performance of EPT by further reducing the
impact of the translation invalidations (ept_sync_domain()). By:
a) Deferring invalidations until the p2m write lock is released.
Prior to this change a 16 VCPU guest could not be successfully
migrated on an (admittedly slow) 160
Holding the p2m lock while calling ept_sync_domain() is very expensive
since it does a on_selected_cpus() call. IPIs on many socket machines
can be very slows and on_selected_cpus() is serialized.
It is safe to defer the invalidate until the p2m lock is released
except for two cases:
1. When fre
If a guest allocates a page and the tlbflush_timestamp on the page
indicates that a TLB flush of the previous owner is required, only the
linear and combined mappings are invalidated. The guest-physical
mappings are not invalidated.
This is currently safe because the EPT code ensures that the
gue
On 17/12/15 15:17, David Vrabel wrote:
> diff --git a/xen/include/asm-x86/hvm/vmx/vmcs.h
> b/xen/include/asm-x86/hvm/vmx/vmcs.h
> index a8d4d5b..e778d86 100644
> --- a/xen/include/asm-x86/hvm/vmx/vmcs.h
> +++ b/xen/include/asm-x86/hvm/vmx/vmcs.h
> @@ -67,7 +67,7 @@ struct ept_data {
> };
Use the Kconfig generated CONFIG_COMPAT defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Jan Beulich
---
config/x86_64.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/common/Kconfig | 7 +++
3 files changed, 8 insertions(
Direct mapped domain needs to retrieve the exact same underlying
physical page when the region is re-populated.
Therefore when memory is exchanged for direct mapped domain, we don't
want to free memory of the previous region neither allocate new memory.
Note that because of that, the hypercall XE
The implementation of steal_page for ARM and x86 would be the same.
Rather than duplicating the x86 function, move it in common code.
Also introduce missing define PRtype_info for ARM in order to compile
the code.
Signed-off-by: Julien Grall
---
Cc: Ian Campbell
Cc: Stefano Stabellini
Cc: Kei
Hi all,
Currently XENMEM_exchange is not supported on ARM because the steal_page is
left unimplemented.
However, even if steal_page is implemented, the hypercall can't work for ARM
because:
- Direct mapped domain is not supported
- ARM doesn't have a M2P and therefore usage of mfn_to_gmfn
This function will be used in various place to check a given set of
contiguous MFN belongs to a direct domain guest.
Signed-off-by: Julien Grall
---
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
---
xen/common/memory.c | 62
Cc: Stefano Stabellini
Cc: xen-de...@lists.xensource.com
Signed-off-by: Markus Armbruster
---
xen-hvm.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/xen-hvm.c b/xen-hvm.c
index 3d78a0c..2a93390 100644
--- a/xen-hvm.c
+++ b/xen-hvm.c
@@ -240,6 +240,7 @@ static void xen_ram_init(PCMa
On 15/12/15 16:44, Juergen Gross wrote:
> On 15/12/15 16:01, Andrew Cooper wrote:
>> On 15/12/15 14:57, Juergen Gross wrote:
>>> On 15/12/15 15:06, Andrew Cooper wrote:
On 15/12/15 12:55, Juergen Gross wrote:
> On 15/12/15 13:52, Ian Campbell wrote:
>> On Tue, 2015-12-15 at 13:47 +0100
This eliminates a number of pointless conditionals: Bits 0 and 1 of
xcomp_bv don't matter anyway, and as long as none of bits 2..62 are
set, setting bit 63 is pointless too.
Signed-off-by: Jan Beulich
---
Noticed while working on XSA-165.
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@
Spot when our db search revealed no candidates for the resources to
allocate, and:
- when doing an immediate allocation, call it an error
- when doing a planned allocation, cause it to prevent allocation
on this iteration, and print a suitably unreassuring message
Previously it would simply s
Now, attempting to allocate a nonexistent host fails immediately with
a sensible message, rather than queueing up and then reporting the
message only later:
mariner:testing.git>
OSSTEST_CONFIG=/u/iwj/.xen-osstest/config:local-config.test-database_iwj
./mg-allocate -U 1h spong
2015-12-17 17:05:14
If something other than the DB statements inside need_retry throws an
exception, ->err will normally be undef (because
$dbh_tests->begin_work will clear it, if nothing else).
Signed-off-by: Ian Jackson
---
Osstest/JobDB/Executive.pm |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
Whatever is in the user's cwd is unlikely to correspond to anything
real. In principle it might be possible to obtain an official copy
from the real daemons, and massage it, or something, but that's a lot
of work.
Instead, just remove it when we start the test db daemons.
In principle it would b
I experienced this `die' due to mg-schema-test-database failing to
borrow shared hosts properly, and added this Dumper for debugging.
I have not bothered to improve any of the other quite terse `die's in
ms-planner.
Signed-off-by: Ian Jackson
---
ms-planner |4 +++-
1 file changed, 3 insert
Signed-off-by: Ian Jackson
---
mg-schema-test-database | 14 --
1 file changed, 12 insertions(+), 2 deletions(-)
diff --git a/mg-schema-test-database b/mg-schema-test-database
index a4cb732..4e0ee68 100755
--- a/mg-schema-test-database
+++ b/mg-schema-test-database
@@ -448,12 +448,
Signed-off-by: Ian Jackson
---
README.dev | 101
1 file changed, 101 insertions(+)
diff --git a/README.dev b/README.dev
index 65ec111..879af60 100644
--- a/README.dev
+++ b/README.dev
@@ -232,3 +232,104 @@ probably are after a reboot)
This warning appears when db_retry_abort is used, since 2b069b6c
"Database locking: Perl: Retry all deadlocks in PostgreSQL".
Signed-off-by: Ian Jackson
---
Osstest.pm |1 +
1 file changed, 1 insertion(+)
diff --git a/Osstest.pm b/Osstest.pm
index c77d960..a398b1e 100644
--- a/Osstest.pm
++
The default timeouts mean that after starting a test db queue daemon
and a test db allocation attempt, we have to wait two minutes.
Lower timeouts increase the risk that we might lose noncritical races
and allocate resources to the `wrong' tasks. And they reduce the
duration of an outage which wi
Hi Ian,
On 11/12/15 15:28, Julien Grall wrote:
> Hi all,
>
> This patch series aims to fix the emulation of register {w,x}zr for ARM64.
>
> A branch is available with all the patches applied:
>
> git://xenbits.xen.org/people/julieng/xen-unstable.git branch handle-xzr-v1
>
> Regards,
>
> Julie
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
> ---
> README.dev | 101
>
> 1 file changed, 101 insertions(+)
>
> diff --git a/README.dev b/README.dev
> index 65ec111..879af60 100644
> --- a/README
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> The default timeouts mean that after starting a test db queue daemon
> and a test db allocation attempt, we have to wait two minutes.
>
> Lower timeouts increase the risk that we might lose noncritical races
> and allocate resources to the `w
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Whatever is in the user's cwd is unlikely to correspond to anything
> real. In principle it might be possible to obtain an official copy
> from the real daemons, and massage it, or something, but that's a lot
> of work.
>
> Instead, just rem
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
> ---
> mg-schema-test-database | 14 --
> 1 file changed, 12 insertions(+), 2 deletions(-)
>
> diff --git a/mg-schema-test-database b/mg-schema-test-database
> index a4cb732..4e0ee68 100755
> --- a/
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> I experienced this `die' due to mg-schema-test-database failing to
> borrow shared hosts properly, and added this Dumper for debugging.
>
> I have not bothered to improve any of the other quite terse `die's in
> ms-planner.
>
> Signed-off-by
Ian pointed out that the definition of "offset" and "appropriate
boundary" in the comments added by "xen/arm: vgic: Optimize the way to
store the target vCPU in the rank" were not cleared.
Clarify them by explicitly mentionning the offset is in byte and the
appropriate boundary is ITARGET/IROUTER
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> This warning appears when db_retry_abort is used, since 2b069b6c
> "Database locking: Perl: Retry all deadlocks in PostgreSQL".
Is the reason for not turning this into a return related to the fact this
is within an eval, not a proper sub? But
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> If something other than the DB statements inside need_retry throws an
> exception, ->err will normally be undef (because
> $dbh_tests->begin_work will clear it, if nothing else).
>
> Signed-off-by: Ian Jackson
Acked-by: Ian Campbell
> ---
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Now, attempting to allocate a nonexistent host fails immediately with
> a sensible message, rather than queueing up and then reporting the
> message only later:
>
> mariner:testing.git> OSSTEST_CONFIG=/u/iwj/.xen-osstest/config:local-
> confi
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Spot when our db search revealed no candidates for the resources to
> allocate, and:
> - when doing an immediate allocation, call it an error
> - when doing a planned allocation, cause it to prevent allocation
> on this iteration, and pri
Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe
previous local plan data"):
> Acked-by: Ian Campbell
Thanks.
> Would it make sense to remove data-projection.pl too? I suppose it isn't
> consumed anywhere so is more or less harmless.
Precisely.
> OOI do these test m
On Thu, 2015-12-17 at 17:17 +, Julien Grall wrote:
> Hi Ian,
>
> On 11/12/15 15:28, Julien Grall wrote:
> > Hi all,
> >
> > This patch series aims to fix the emulation of register {w,x}zr for
> > ARM64.
> >
> > A branch is available with all the patches applied:
> >
> > git://xenbits.xen.or
flight 66464 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66464/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
Ian Campbell writes ("Re: [OSSTEST PATCH 4/9] mg-schema-test-database: Borrow
shares properly"):
> On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > # As we copy, we note everything we're not borrowing as
> > - # belonging to the parent db.
> > + # belonging to the parent db. We b
On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database:
> Wipe previous local plan data"):
> > Acked-by: Ian Campbell
>
> Thanks.
>
> > Would it make sense to remove data-projection.pl too? I suppose it
> > isn't
> > consumed
On Mon, Dec 14, 2015 at 12:39:34PM +0100, Gerd Hoffmann wrote:
> Signed-off-by: Gerd Hoffmann
> ---
> hw/xen/xen_pt.h | 3 +--
> vl.c| 10 --
> 2 files changed, 1 insertion(+), 12 deletions(-)
>
> diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h
> index c545280..6d8702b 100644
On 17/12/15 16:58, Jan Beulich wrote:
> This eliminates a number of pointless conditionals: Bits 0 and 1 of
> xcomp_bv don't matter anyway, and as long as none of bits 2..62 are
> set, setting bit 63 is pointless too.
xcomp_bv[63] is the indication of whether the area is compressed or not.
It wil
Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting
via last" warning"):
> On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > This warning appears when db_retry_abort is used, since 2b069b6c
> > "Database locking: Perl: Retry all deadlocks in PostgreSQL".
>
> Is th
Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe
previous local plan data"):
> On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote:
> > If you don't run it as the same user, this is not a problem, because
> > the default WebspaceFile has $HOME in it.
>
> Right, I shoul
Ian Campbell writes ("Re: [OSSTEST PATCH 1/9] README.dev: Document the
blessings"):
> On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > +Each flight has a `blessing' and an `intended blessing'. The
> > +`intended blessing' is what the flight is going to be blessed as when
> > +its executi
On Thu, 2015-12-17 at 17:43 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 4/9] mg-schema-test
> -database: Borrow shares properly"):
> > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > > # As we copy, we note everything we're not borrowing as
> > > - # belonging t
On Thu, 2015-12-17 at 17:48 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an
> "exiting via last" warning"):
> > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > > This warning appears when db_retry_abort is used, since 2b069b6c
> > > "Databas
On Thu, 2015-12-17 at 17:50 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test
> -database: Wipe previous local plan data"):
> > On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote:
> > > If you don't run it as the same user, this is not a problem,
> because
>
On Thu, 2015-12-17 at 17:59 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 1/9] README.dev: Document
> the blessings"):
> > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > > +Each flight has a `blessing' and an `intended blessing'. The
> > > +`intended blessing' is
Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting
via last" warning"):
> On Thu, 2015-12-17 at 17:48 +, Ian Jackson wrote:
> > Why would `return' be better ? It would still generate the same
> > warning. Leaving the loop via `last' seems less heavyweight than
> > u
flight 66426 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66426/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail in 66395
pass in 66426
test-amd64-amd64-qe
flight 66433 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66433/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 11 guest-start fail like 65766
Tests which did not succeed,
Commit 9256f66c1606 ("x86/PCI: intercept all PV Dom0 MMCFG writes")
added intercepts for writes to RO MMCFG space from PV dom0.
Similar functionality is needed by dom0s in HVM containers (such as
PVH and, in the future, HVMlite).
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/hvm/emulate.c
This is provided explicitly in SVM and implicitly in VMX (when neither of
the three EPT_EFFECTIVE_* bits is set).
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/hvm/svm/svm.c |3 ++-
xen/arch/x86/hvm/vmx/vmx.c |5 -
xen/include/xen/mm.h |1 +
3 files changed, 7 insertions(
v2:
* Expanded npfec structure to include page's precense indicator (I took the
easy way out and didn't implement VMX's fine-grained status since I couldn't
figure out how to properly do it in SVM)
* s/mmio/mmcfg for some operations. I left mmio_ro_emulate_ctxt as is because
it is used for no
I think we can make this even more generic. In particular, I would love
to see a solution for link tables that:
a) can be used for any kind of data structures, not just function
pointers (the latter is a specialization of the former);
b) doesn't need any changes to the linker scripts once the ini
On Tue, Dec 15, 2015 at 2:16 PM, Luis R. Rodriguez
wrote:
> From: "Luis R. Rodriguez"
>
> This lets us annotate its requirements specifically for
> PC and lguest subarchitectures. While at it since head.c
> just has ebda data rename it. Since we're using linker tables
> and both x86 32-bit and 64
On Thu, Dec 17, 2015 at 12:55 PM, H. Peter Anvin wrote:
> On 12/17/15 12:48, Andy Lutomirski wrote:
>>
>> I'm entirely ignorant of anything going on in gPXE/iPXE.
>>
>> Can you explain what a linker table *does*? It looks like all you've
>> done in this patch is to move code around. What actuall
On 12/17/15 12:48, Andy Lutomirski wrote:
>
> I'm entirely ignorant of anything going on in gPXE/iPXE.
>
> Can you explain what a linker table *does*? It looks like all you've
> done in this patch is to move code around. What actually happens?
>
A linker table is a data structure that is stit
Creates a section to contain scheduler entry pointers that are gathered
together into an array. This will allow, in a follow-on patch, scheduler
entries to be automatically gathered together into the array for
automatic parsing.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Be
1 - 100 of 131 matches
Mail list logo