flight 44398 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44398/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-armhf-pvops 3 host-install(3) broken like 44380
build-armhf
>>> On 09.05.16 at 20:40, wrote:
> On 05/09/2016 01:22 PM, Kevin Moraga wrote:
>>
>> On 05/09/2016 11:15 AM, Boris Ostrovsky wrote:
>>> On 05/09/2016 12:40 PM, Kevin Moraga wrote:
On 05/09/2016 09:53 AM, Jan Beulich wrote:
On 09.05.16 at 16:52, wrote:
>> On 05/09/2016 04:08 AM,
>>> On 09.05.16 at 22:10, wrote:
> On 04/05/2016 09:25 PM, Boris Ostrovsky wrote:
>> This is an RFC for making hvmloader's ACPI builder available to both the
>> toolstack and the hypervisor, as discussed in
>> http://lists.xenproject.org/archives/html/xen-devel/2016-02/msg01228.html
>
> When do
On Tue, 2016-05-10 at 06:49 +, tutu sky wrote:
> Hi,
> I added a new hypercall to xen successfully, but when i try to invoke
> it in dom0 using privcmd, i am unable to invoke (using XC), I must cd
> to /xen.x.y.z/tools/xcutils and then try to invoke hypercall by XC
> interface which i created f
>>> On 09.05.16 at 20:27, wrote:
> Raising #GP under such circumstances is architecturally wrong. (Refer
> to the Intel or AMD manuals describing the conditions under which the
This sentence is pretty clearly unfinished.
Jan
___
Xen-devel mailing li
On 10/05/2016 08:39, Jan Beulich wrote:
On 09.05.16 at 20:27, wrote:
>> Raising #GP under such circumstances is architecturally wrong. (Refer
>> to the Intel or AMD manuals describing the conditions under which the
> This sentence is pretty clearly unfinished.
So it is. It started #SS and
flight 93922 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93922/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeatfail like 83042
test-amd64-i386-
[trimming the Cc list]
On Mon, 2016-05-09 at 21:59 -0500, Doug Goldstein wrote:
> On 5/9/16 10:28 AM, Lars Kurth wrote:
> >
> > - Doug: are there any docs / tests for KCONFIG you want to push
> Not at this time. Unless someone has an idea for what they'd like to
>
This is not specifically relate
>>> On 09.05.16 at 20:27, wrote:
> --- a/xen/arch/x86/hvm/svm/svm.c
> +++ b/xen/arch/x86/hvm/svm/svm.c
> @@ -,10 +,13 @@ static void svm_invlpga_intercept(
>
> static void svm_invlpg_intercept(unsigned long vaddr)
> {
> -struct vcpu *curr = current;
> HVMTRACE_LONG_2D(INVLPG,
Hi Julien,
On Mon, May 09, 2016 at 10:49:58AM +0100, Julien Grall wrote:
>
>
>On 08/05/2016 12:59, Peng Fan wrote:
>>Hi Julien,
>
>Hello Peng,
>
>>On Thu, Apr 28, 2016 at 10:50:33AM +0100, Julien Grall wrote:
>>>Hello,
>>>
>>>On 27/04/16 23:53, Suriyan Ramasami wrote:
>>>
How can I che
On May 10, 2016 2:54 PM, Jan Beulich wrote:
> >>> On 10.05.16 at 05:41, wrote:
> > On May 10, 2016 12:14 AM, Jan Beulich wrote:
> >> >>> On 06.05.16 at 10:54, wrote:
> >> > --- a/xen/drivers/passthrough/iommu.c
> >> > +++ b/xen/drivers/passthrough/iommu.c
> >> > @@ -240,21 +240,47 @@ int iommu_
flight 93920 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93920/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-i386-rumpuserxen6 xen-buildfail like 93873
build-amd64-rumpuserxen
>>> On 10.05.16 at 09:53, wrote:
> +rc = hd->platform_ops->unmap_page(d, gfn);
> +
> +if ( unlikely(rc) )
> +{
> +if ( printk_ratelimit() )
> +printk(XENLOG_ERR
> + "iommu_unmap_page: IOMMU unmapping gfn %#lx failed for
> dom%d.",
> +
[adding Roger]
On Fri, 2016-05-06 at 16:48 +0100, Ross Lagerwall wrote:
> Remove the unused x86 implementation.
>
Hey, this is actually very useful, for another thing I'm working on...
Thanks! :-P
> --- a/xen/common/lib.c
> +++ b/xen/common/lib.c
> @@ -499,6 +499,18 @@ void __init init_construct
On May 10, 2016 4:03 PM, Jan Beulich wrote:
> >>> On 10.05.16 at 09:53, wrote:
> > +rc = hd->platform_ops->unmap_page(d, gfn);
> > +
> > +if ( unlikely(rc) )
> > +{
> > +if ( printk_ratelimit() )
> > +printk(XENLOG_ERR
> > + "iommu_unmap_page: IOM
On Fri, 2016-05-06 at 16:48 +0100, Ross Lagerwall wrote:
> Instead of using a locking order based on line numbers which doesn't
> play nicely with xSplice, statically define the locking order.
>
> Signed-off-by: Ross Lagerwall
>
Reviewed-by: Dario Faggioli
FWIW, I actually like this...
> --- a
>>> On 10.05.16 at 10:20, wrote:
> On May 10, 2016 4:03 PM, Jan Beulich wrote:
>> But please - as said - also avoid logging any message for already dying
>> domains.
>>
>
>
> Kept Kevin's opinion for later, I hope I have got your point as below:
> ...
> +rc = hd->platform_ops->unmap_page(d
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> tutu sky
> Sent: 10 May 2016 07:44
> To: George Dunlap
> Cc: Juergen Gross; Dario Faggioli; Xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] Xen does not work after changing scheduler's code
>
>>> On 06.05.16 at 10:54, wrote:
> When IOMMU mapping is failed, we issue a best effort rollback, stopping
> IOMMU mapping, unmapping the previous IOMMU maps and then reporting the
> error up to the call trees. When rollback is not feasible (in early
> initialization phase or trade-off of complexi
On 10/05/16 03:18, Dario Faggioli wrote:
> [removing Vitaly, adding Juergen]
>
> On Mon, 2016-05-09 at 17:55 +0100, Lars Kurth wrote:
>>
>>> On 9 May 2016, at 17:03, George Dunlap
>>> wrote:
>>> On Mon, May 9, 2016 at 4:28 PM, Lars Kurth
>>> wrote:
- George: are there any manual te
From: Paul Durrant
Sent: Tuesday, May 10, 2016 8:34 AM
To: tutu sky; George Dunlap
Cc: Juergen Gross; Dario Faggioli; Xen-devel@lists.xen.org
Subject: RE: [Xen-devel] Xen does not work after changing scheduler's code
> -Original Message-
> From: X
>>> On 06.05.16 at 10:54, wrote:
> Propagate the IOMMU Device-TLB flush error up to IOMMU unmapping.
>
> Signed-off-by: Quan Xu
> Acked-by: Kevin Tian
Reviewed-by: Jan Beulich
but note ...
> @@ -1766,9 +1769,7 @@ static int intel_iommu_unmap_page(struct domain *d,
> unsigned long gfn)
>
De-htmling and cc-ing win-pv-devel and dropping xen-devel to bcc...
---
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Dominic
Russell
Sent: 10 May 2016 06:25
To: xen-devel@lists.xen.org
Subject: [Xen-devel] PVL XenNet inf
Hello,
In the latest build of XenNet for Windows
On 09/05/16 19:27, Andrew Cooper wrote:
> hap_invlpg() is reachable from the instruction emulator, which means
> introspection and tests using hvm_fep can end up here. As such, crashing the
> domain is not an appropriate action to take.
>
> Fixing this involves rearranging the callgraph.
>
> pag
>>> On 06.05.16 at 10:54, wrote:
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -677,9 +677,19 @@ static int xenmem_add_to_physmap(struct domain *d,
> #ifdef CONFIG_HAS_PASSTHROUGH
> if ( need_iommu(d) )
> {
> +int ret;
> +
> this_cpu(iommu_dont_flush_iotl
>>> On 06.05.16 at 10:54, wrote:
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -604,15 +604,15 @@ static int iommu_flush_iotlb(struct domain *d, unsigned
> long gfn,
> return rc;
> }
>
> -static void iommu_flush_iotlb_page(struct domain *d, u
>>> On 06.05.16 at 10:54, wrote:
> --- a/xen/arch/x86/mm/p2m-ept.c
> +++ b/xen/arch/x86/mm/p2m-ept.c
> @@ -832,7 +832,8 @@ out:
> need_modify_vtd_table )
> {
> if ( iommu_hap_pt_share )
> -iommu_pte_flush(d, gfn, &ept_entry->epte, order,
> vtd_pte_present);
> +
When loading patches, the code prevents loading a patch containing a new
symbol that duplicates a symbol from another loaded patch. However, the
check should also prevent loading a new symbol that duplicates a symbol
from the core hypervisor.
Signed-off-by: Ross Lagerwall
---
Wei, can you consid
>>> On 06.05.16 at 10:54, wrote:
> --- a/xen/arch/x86/acpi/power.c
> +++ b/xen/arch/x86/acpi/power.c
> @@ -43,36 +43,71 @@ struct acpi_sleep_info acpi_sinfo;
>
> void do_suspend_lowlevel(void);
>
> +enum dev_power_type
> +{
> +/* Use for all of device power type */
No sure what this comm
Fix a declared-but-not-defined warning when building with
XEN_BALLOON_MEMORY_HOTPLUG=n. This fixes a regression introduced by
commit dfd74a1edfab
("xen/balloon: Fix crash when ballooning on x86 32 bit PAE").
Signed-off-by: Ross Lagerwall
---
v2: Moved function instead of adding a prototype.
dri
>>> On 06.05.16 at 10:54, wrote:
> @@ -1430,7 +1430,12 @@ int domain_context_mapping_one(
> unmap_vtd_domain_page(context_entries);
>
> if ( !seg )
> -me_wifi_quirk(domain, bus, devfn, MAP_ME_PHANTOM_FUNC);
> +{
> +ret = me_wifi_quirk(domain, bus, devfn, MAP_ME_PHAN
On 10/05/16 11:27, Ross Lagerwall wrote:
> Fix a declared-but-not-defined warning when building with
> XEN_BALLOON_MEMORY_HOTPLUG=n. This fixes a regression introduced by
> commit dfd74a1edfab
> ("xen/balloon: Fix crash when ballooning on x86 32 bit PAE").
>
> Signed-off-by: Ross Lagerwall
Acked
On 10/05/16 08:53, Peng Fan wrote:
Hi Julien,
Hello Peng,
Thanks for this info. Do you have plan to add bit.LITTLE support for xen?
It is not on my top priority for Xen. Feel free to send a patch series
to add support for big.LITTLE.
Regards,
--
Julien Grall
On Tue, May 10, 2016 at 10:10:02AM +0100, Ross Lagerwall wrote:
> When loading patches, the code prevents loading a patch containing a new
> symbol that duplicates a symbol from another loaded patch. However, the
> check should also prevent loading a new symbol that duplicates a symbol
> from the c
On Tue, 2016-05-10 at 08:47 +, tutu sky wrote:
> From: Paul Durrant
> > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf
> > Of
> > tutu sky
> >
> > Thanks.
> > would you please tell me what do you mean by top-post?
> Top google hit for 'top post': https://en.wikipedia.org/wi
On Tue, 2016-05-10 at 06:44 +, tutu sky wrote:
> No, A Xen running inside Vmware does not crash until i modified it.
> it is not because of vmware at all (it may be caused because of my
> wrong development).
>
This is the second (and last) time I'm saying this:
if Xen works (either inside of V
On Mon, May 09, 2016 at 06:57:13PM +0100, Julien Grall wrote:
>
>
> On 09/05/16 18:39, Wei Liu wrote:
> >On Mon, May 09, 2016 at 05:47:38PM +0100, Julien Grall wrote:
> >>
> >>
> >>On 09/05/16 17:43, Ivan Pavić2 wrote:
> >>>Hello Julien,
> >>
> >>Hello Ivan,
> >>
> >>>
> >>>Julien Grall wrote:
>
On Mon, May 09, 2016 at 05:59:09PM +, Ivan Pavić2 wrote:
> Hello,
>
> > I don't think toolstack tries to load kernel to that guest physical
> > address -- reading from Ivan's log it suggests toolstack loaded the
> > kernel to 0x40008000.
>
> > That (0x8000800) is the address set in PC, right?
On Mon, May 09, 2016 at 07:27:47PM +0100, Andrew Cooper wrote:
> Turns out there are a lot of broken corner cases.
>
> Changes in v2:
> * Some improvements to commit messages
> * Split part of the original patch 4 out, to make the new patch 5 clearer
> * Add vcpu parameter to new invlpg() funct
This is the second (and last) time I'm saying this:
if Xen works (either inside of VMware, or everywhere else) up until you
modify it, and then it stops working after you've modified it, there's
99.99% probability that it is your modifications that are wrong.
Yes, I know it and i mentioned it
On Mon, 9 May 2016, Julien Grall wrote:
> On 09/05/16 17:56, Lars Kurth wrote:
> >
> > > On 9 May 2016, at 17:17, Julien Grall wrote:
> > >
> > > (CC Shannon, Stefano and Steve)
> > >
> > > Hi Lars,
> > >
> > > On 09/05/16 16:28, Lars Kurth wrote:
> > > > Hi all,
> > > >
> > > > I added the f
On Mon, 9 May 2016, Wei Liu wrote:
> On Thu, Apr 28, 2016 at 03:20:46PM -0600, Jim Fehlig wrote:
> > qemu commit 91a097e7 forbids specifying cache mode for empty
> > drives. Attempting to create a domain with an empty qdisk cdrom
> > drive results in
> >
> > qemu-system-x86_64: -drive if=ide,index
On Mon, May 09, 2016 at 11:30:34PM +0800, Big Strong wrote:
> >
> > You need to have appropriate log level set.
> >
> > Try adding loglvl=all guest_loglvl=all to your xen command line and
> > reboot.
> >
> > Wei.
> >
>
> I've enabled all the log level just as you said, but no outputs happen at
>
From: Dario Faggioli
Sent: Tuesday, May 10, 2016 7:32 AM
To: tutu sky; Xen-devel@lists.xen.org
Subject: Re: [Xen-devel] Hypercall invoking
On Tue, 2016-05-10 at 06:49 +, tutu sky wrote:
> Hi,
> I added a new hypercall to xen successfully, but when i
Hello Tianyu,
I am CC'ing Anthony who should have a better idea about this. Also
please use my kernel.org email address for future correspondence.
What do you mean by reusing Q35 for Xen? If you mean using QEMU to
emulate a Q35 based machine for HVM guests, I think that should be OK.
Thanks,
St
On 10/05/16 08:51, Jan Beulich wrote:
On 09.05.16 at 20:27, wrote:
>> --- a/xen/arch/x86/hvm/svm/svm.c
>> +++ b/xen/arch/x86/hvm/svm/svm.c
>> @@ -,10 +,13 @@ static void svm_invlpga_intercept(
>>
>> static void svm_invlpg_intercept(unsigned long vaddr)
>> {
>> -struct vcpu *cu
Hi,
I have followed xen wiki to get xen hypervisor and dom0 run on hikey board.
when I try to run xl command to list all the domain in dom0, the command
line get stuck and even ctrl+c can not terminate it. I used strace and
found the last system call is write data to xenbus and it does not return.
flight 93923 qemu-upstream-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93923/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 3 host-install(3) broken REGR. vs. 93415
test-ar
On 10/05/16 11:15, Andrew Cooper wrote:
> On 10/05/16 08:51, Jan Beulich wrote:
> On 09.05.16 at 20:27, wrote:
>>> --- a/xen/arch/x86/hvm/svm/svm.c
>>> +++ b/xen/arch/x86/hvm/svm/svm.c
>>> @@ -,10 +,13 @@ static void svm_invlpga_intercept(
>>>
>>> static void svm_invlpg_intercept(un
On Mon, May 02, 2016 at 07:01:16PM -0600, Jim Fehlig wrote:
> Hi all,
>
> This patch adds support for Xen migration stream V2 to the libvirt
> libxl driver. In the process it fixes save/restore and migration
> tests in OSSTest, which have been failing since libvirt commit
> e7440656.
>
> Patch1 c
On Mon, May 09, 2016 at 05:43:14PM +0100, Paul Durrant wrote:
> Newer versions of the QEMU source have replaced the 'stderr' trace
> backend with 'log'. This patch adjusts the tools Makefile to test for
> the 'log' backend and specify it if it is available.
>
> Signed-off-by: Paul Durrant
Acked-
On 10/05/16 11:24, Chenxiao Zhao wrote:
Hi,
Hello,
This is question is not related to development but using Xen. So I have
CCed xen-users and BCCed xen-devel.
I have followed xen wiki to get xen hypervisor and dom0 run on hikey board.
when I try to run xl command to list all the domain i
>>> On 10.05.16 at 12:41, wrote:
> On 10/05/16 11:15, Andrew Cooper wrote:
>> On 10/05/16 08:51, Jan Beulich wrote:
>> On 09.05.16 at 20:27, wrote:
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -,10 +,13 @@ static void svm_invlpga_intercept(
On 10/05/16 12:02, Jan Beulich wrote:
On 10.05.16 at 12:41, wrote:
>> On 10/05/16 11:15, Andrew Cooper wrote:
>>> On 10/05/16 08:51, Jan Beulich wrote:
>>> On 09.05.16 at 20:27, wrote:
> --- a/xen/arch/x86/hvm/svm/svm.c
> +++ b/xen/arch/x86/hvm/svm/svm.c
> @@ -,10 +,1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-3710,CVE-2016-3712 / XSA-179
version 5
QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
UPDATES IN VERSION 5
Fixed credits section. Zuoz
Hi Ross,
On 06/05/16 16:48, Ross Lagerwall wrote:
When building with -ffunction-sections -fdata-sections, it will generate
section names like .text.show_handlers and .data.payload_list. These
sections are in the same namespace as the special sections that Xen
uses, such as .text.kexec and .data.
Signed-off-by: Roger Pau Monné
---
build/common.mk | 1 +
build/gen.mk| 2 +-
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/build/common.mk b/build/common.mk
index 1120a16..13c468e 100644
--- a/build/common.mk
+++ b/build/common.mk
@@ -2,6 +2,7 @@ ROOT := $(abspath $(CURDIR)/.
This prevents overwriting CC if it's already set on the environment.
Signed-off-by: Roger Pau Monné
---
build/common.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/build/common.mk b/build/common.mk
index 2741508..1120a16 100644
--- a/build/common.mk
+++ b/build/common.mk
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 10 May 2016 11:58
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Jackson; Wei Liu
> Subject: Re: [PATCH] tools: configure correct trace backend for QEMU
>
> On Mon, May 09, 2016 at 05:43:14PM +0100, Pau
On 10/05/16 13:18, Roger Pau Monne wrote:
> This prevents overwriting CC if it's already set on the environment.
>
> Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper and committed.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lis
On 10/05/16 13:16, Roger Pau Monne wrote:
> Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper and committed.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Thu, May 05, 2016 at 12:19:29PM +0100, Paul Durrant wrote:
> My recent patch to include/xen/interface/io/netif.h defines a new extra
> info type that can be used to pass hash values between backend and guest
> frontend.
>
> This patch adds code to xen-netback to pass hash values calculated for
On Thu, May 05, 2016 at 12:19:27PM +0100, Paul Durrant wrote:
[...]
>
> +static int connect_ctrl_ring(struct backend_info *be)
> +{
Please use goto style error handling in this function.
Other than this the code looks good.
Wei.
___
Xen-devel mailin
On Thu, May 05, 2016 at 12:19:28PM +0100, Paul Durrant wrote:
> My recent patch to include/xen/interface/io/netif.h defines a new shared
> ring (in addition to the rx and tx rings) for passing control messages
> from a VM frontend driver to a backend driver.
>
> A previous patch added the necessar
On Thu, May 05, 2016 at 12:19:30PM +0100, Paul Durrant wrote:
> My recent patch to include/xen/interface/io/netif.h defines a new extra
> info type that can be used to pass hash values between backend and guest
> frontend.
>
> This patch adds code to xen-netback to use the value in a hash extra
>
c/s 2656bc7b0 "xen: adopt .deinit_pdata and improve timer handling"
introduced a error path into rt_init() which leaked prv if the
allocation of prv->repl_timer failed.
Introduce an error cleanup path.
Spotted by Coverity.
Signed-off-by: Andrew Cooper
---
CC: Wei Liu
CC: George Dunlap
CC: Dar
On 05/10/2016 03:23 AM, Jan Beulich wrote:
On 09.05.16 at 20:40, wrote:
>> On 05/09/2016 01:22 PM, Kevin Moraga wrote:
>>> On 05/09/2016 11:15 AM, Boris Ostrovsky wrote:
On 05/09/2016 12:40 PM, Kevin Moraga wrote:
> On 05/09/2016 09:53 AM, Jan Beulich wrote:
> On 09.05.16 at
Reclaiming pages is pointless when the cache can already satisfy all
outstanding PoD entries, and doing reclaims in that case can be very
harmful to performance when that memory gets used by the guest, but
only to store zeroes there.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/mm/p2m-pod.c
+++
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 10 May 2016 14:29
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; net...@vger.kernel.org; Wei Liu
> Subject: Re: [PATCH net-next 1/4] xen-netback: add control ring boilerplate
>
> On Thu, May 05, 2016 at 12:
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 10 May 2016 14:29
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; net...@vger.kernel.org; Wei Liu
> Subject: Re: [PATCH net-next 2/4] xen-netback: add control protocol
> implementation
>
> On Thu, May 05, 20
>>> On 10.05.16 at 15:44, wrote:
> Reclaiming pages is pointless when the cache can already satisfy all
> outstanding PoD entries, and doing reclaims in that case can be very
> harmful to performance when that memory gets used by the guest, but
> only to store zeroes there.
>
> Signed-off-by: Jan
On Tue, May 10, 2016 at 9:38 AM, Andrew Cooper
wrote:
> c/s 2656bc7b0 "xen: adopt .deinit_pdata and improve timer handling"
> introduced a error path into rt_init() which leaked prv if the
> allocation of prv->repl_timer failed.
>
> Introduce an error cleanup path.
>
> Spotted by Coverity.
I'm cu
>>> On 10.05.16 at 15:39, wrote:
> I didn't finish unwrapping the stack yesterday. Here it is:
>
> setup_arch -> dmi_scan_machine -> dmi_walk_early -> early_ioremap
Ah, that makes sense. Yet why would early_ioremap() involve an
M2P lookup? As said, MMIO addresses shouldn't be subject to such
loo
From: Fu Wei
Signed-off-by: Fu Wei
---
grub-core/loader/i386/xen.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/grub-core/loader/i386/xen.c b/grub-core/loader/i386/xen.c
index c4d9689..15b0727 100644
--- a/grub-core/loader/i386/xen.c
+++ b/grub-core/loader/i386/xen.c
@@ -689,6 +68
From: Fu Wei
delete: xen_linux, xen_initrd, xen_xsm
add: xen_module
This update bases on
commit 0edd750e50698854068358ea53528100a9192902
Author: Vladimir Serbinenko
Date: Fri Jan 22 10:18:47 2016 +0100
xen_boot: Remove obsolete module type distinctions.
Also bases on the
From: Fu Wei
This patch adds "--nounzip" option support in order to
be compatible with the module command of i386, then we can
simplify grub-mkconfig support code.
Signed-off-by: Fu Wei
---
grub-core/loader/arm64/xen_boot.c | 17 +
1 file changed, 17 insertions(+)
diff --git a
From: Fu Wei
This patch adds the support of xen_boot command:
xen_hypervisor
xen_module
Also add a new "feature_xen_boot" to indicate this grub support
xen_boot command.
Signed-off-by: Fu Wei
---
grub-core/normal/main.c | 2 +-
util/grub.d/20_linux_xen.in | 13 ++---
2 fi
On 10/05/16 14:44, Jan Beulich wrote:
> Reclaiming pages is pointless when the cache can already satisfy all
> outstanding PoD entries, and doing reclaims in that case can be very
> harmful to performance when that memory gets used by the guest, but
> only to store zeroes there.
>
> Signed-off-by:
From: Fu Wei
This patchset add xen_boot support into grup-mkconfig for
generating xen boot entrances automatically
Also update the docs/grub.texi for new xen_boot commands.
This patchset has been tested on Foudation model with a bug fix:
http://lists.gnu.org/archive/html/grub-devel/2016-02/msg0
On 10/05/16 14:52, Meng Xu wrote:
> On Tue, May 10, 2016 at 9:38 AM, Andrew Cooper
> wrote:
>> c/s 2656bc7b0 "xen: adopt .deinit_pdata and improve timer handling"
>> introduced a error path into rt_init() which leaked prv if the
>> allocation of prv->repl_timer failed.
>>
>> Introduce an error cle
[BCC'ing xen-users, and cc'ing Anthony]
On Mon, May 9, 2016 at 3:25 PM, wrote:
> Just in case anyone was following this thread, I traced the bug back to
> Qemu, so it is in fact not a Xen bug. Here's my qemu-devel post:
>
> https://lists.nongnu.org/archive/html/qemu-devel/2016-05/msg00119.html
>
On Tue, May 10, 2016 at 02:38:48PM +0100, Andrew Cooper wrote:
> c/s 2656bc7b0 "xen: adopt .deinit_pdata and improve timer handling"
> introduced a error path into rt_init() which leaked prv if the
> allocation of prv->repl_timer failed.
>
> Introduce an error cleanup path.
>
> Spotted by Coverit
On 10/05/16 15:18, Wei Liu wrote:
> On Tue, May 10, 2016 at 02:38:48PM +0100, Andrew Cooper wrote:
>> c/s 2656bc7b0 "xen: adopt .deinit_pdata and improve timer handling"
>> introduced a error path into rt_init() which leaked prv if the
>> allocation of prv->repl_timer failed.
>>
>> Introduce an err
On Tue, May 10, 2016 at 07:49:01AM -0600, Jan Beulich wrote:
> >>> On 10.05.16 at 15:44, wrote:
> > Reclaiming pages is pointless when the cache can already satisfy all
> > outstanding PoD entries, and doing reclaims in that case can be very
> > harmful to performance when that memory gets used by
>>> On 06.05.16 at 17:48, wrote:
> When building with -ffunction-sections -fdata-sections, it will generate
> section names like .text.show_handlers and .data.payload_list. These
> sections are in the same namespace as the special sections that Xen
> uses, such as .text.kexec and .data.schedulers.
flight 93928 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93928/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 14 guest-saverestore fail REGR. vs. 92345
test-armhf-armhf-
On 5/10/2016 6:11 PM, Stefano Stabellini wrote:
Hello Tianyu,
I am CC'ing Anthony who should have a better idea about this. Also
please use my kernel.org email address for future correspondence.
OK. I get it.
What do you mean by reusing Q35 for Xen? If you mean using QEMU to
emulate a Q35
>>> On 10.05.16 at 15:50, wrote:
> On 10/05/16 14:44, Jan Beulich wrote:
>> Reclaiming pages is pointless when the cache can already satisfy all
>> outstanding PoD entries, and doing reclaims in that case can be very
>> harmful to performance when that memory gets used by the guest, but
>> only to
>>> On 06.05.16 at 17:48, wrote:
> --- a/xen/common/lib.c
> +++ b/xen/common/lib.c
> @@ -499,6 +499,18 @@ void __init init_constructors(void)
> }
>
> /*
> + * The GCC docs state that the function must be marked noinline to have the
> + * expected result:
> + * "When inlining the expected behav
This run is configured for baseline tests only.
flight 44399 qemu-upstream-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44399/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 15 g
Hi all,
I cleaned the test page page up as much as I could and have time for and
incorporated your input: see
http://wiki.xenproject.org/wiki/Xen_4.7_RC_test_instructions
Obviously there are still gaps, which could be filled. I did focus on top-level
features and features which have a command
>>> On 06.05.16 at 17:48, wrote:
> @@ -201,11 +203,20 @@ static inline void mm_enforce_order_unlock(int
> unlock_level,
>
> /
> * *
> - * To avoid dead
On Tue, May 10, 2016 at 9:44 AM, Jan Beulich wrote:
On 06.05.16 at 10:54, wrote:
>> When IOMMU mapping is failed, we issue a best effort rollback, stopping
>> IOMMU mapping, unmapping the previous IOMMU maps and then reporting the
>> error up to the call trees. When rollback is not feasible
>>> On 06.05.16 at 17:48, wrote:
> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -206,11 +206,19 @@ struct scrub_region {
> static struct scrub_region __initdata region[MAX_NUMNODES];
> static unsigned long __initdata chunk_size;
>
> +#ifdef NDEBUG
> +static void __init bo
On 06/05/16 16:48, Ross Lagerwall wrote:
> Instead of using a locking order based on line numbers which doesn't
> play nicely with xSplice, statically define the locking order.
>
> Signed-off-by: Ross Lagerwall
Along with this change, it would useful to modify the message in
__check_lock_level()
On 06/05/16 16:48, Ross Lagerwall wrote:
> When using xsplice, use of __LINE__ can generate spurious changes in
> functions due to embedded line numbers. For release builds, remove the
> use of these line numbers in BOOT_BUG_ON() and print the current text
> address instead.
>
> Signed-off-by: Ros
>>> On 06.05.16 at 17:48, wrote:
> When using xsplice, use of __LINE__ can generate spurious changes in
> functions due to embedded line numbers. For release builds, remove the
> use of these line numbers in domain_crash*() and print the current text
> address instead.
Which makes it more cumber
>>> On 06.05.16 at 17:48, wrote:
> --- a/xen/drivers/passthrough/vtd/dmar.h
> +++ b/xen/drivers/passthrough/vtd/dmar.h
> @@ -108,6 +108,15 @@ struct acpi_atsr_unit *acpi_find_matched_atsr_unit(const
> struct pci_dev *);
>
> #define DMAR_OPERATION_TIMEOUT MILLISECS(1000)
>
> +#ifdef NDEBUG
>
On Tue, May 10, 2016 at 10:31:38PM +0800, Lan, Tianyu wrote:
> On 5/10/2016 6:11 PM, Stefano Stabellini wrote:
> > Hello Tianyu,
> >
> > What do you mean by reusing Q35 for Xen? If you mean using QEMU to
> > emulate a Q35 based machine for HVM guests, I think that should be OK.
> >
>
> From xl c
>>> On 06.05.16 at 17:48, wrote:
> --- a/xen/drivers/acpi/utilities/utmisc.c
> +++ b/xen/drivers/acpi/utilities/utmisc.c
> @@ -134,6 +134,51 @@ const char *__init
> acpi_ut_validate_exception(acpi_status status)
> *
>
> **
1 - 100 of 150 matches
Mail list logo