From: Matt Wilson
... as it is very helpful to diagnose VM entry failures due to MSR
loading.
Signed-off-by: Matt Wilson
---
xen/arch/x86/hvm/vmx/vmcs.c | 21 +
1 file changed, 21 insertions(+)
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 1b
From: Matt Wilson
Systems that support LBR formats that include TSX information but do
not support TSX require special handling when saving and restoring MSR
values. For example, see the Linux kernel quirks[1, 2] in the MSR
context switching code. As a wrmsr with certain values under these
condit
flight 100372 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100372/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 11 guest-start fail REGR. vs. 99832
Regressions which ar
Vm_event_vcpu_pause() needs to use vcpu_pause_nosync() in order
for the current vCPU to not get stuck. A consequence of this is
that the custom vm_event response handlers will not always see
the real vCPU state in v->arch.user_regs. This patch makes sure
that the state is always synchronized in vm_
With staging-4.7 'xl dump-core hvm.cfg file' fails:
root@macintyre-old:~ # xl - create -cdVf hvm.cfg
... wait ...
root@macintyre-old:~ # xl dump-core x x.dump
xc: info: j (63635) != nr_pages (65709)
hvm.cfg:
name="x"
description="y"
uuid="0529a09c-2430-48e5-8c09-085d4e2380a8"
memory=1024
memo
flight 100376 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100376/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5aeafb3a254e7cd9e1fb69a0d391388a51c6e210
baseline version:
ovmf 1fbd0ca16a997b68ed320
flight 100382 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100382/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-buildfail REGR. vs. 100365
Tests which
This run is configured for baseline tests only.
flight 66949 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66949/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
Daniel Walker reported problems which happens when
crash_kexec_post_notifiers kernel option is enabled
(https://lkml.org/lkml/2015/6/24/44).
In that case, smp_send_stop() is called before entering kdump routines
which assume other CPUs are still online. As the result, kdump
routines fail to save
Daniel Walker reported problems which happens when
crash_kexec_post_notifiers kernel option is enabled
(https://lkml.org/lkml/2015/6/24/44).
In that case, smp_send_stop() is called before entering kdump routines
which assume other CPUs are still online. This causes some issues
depending on archit
Daniel Walker reported problems which happens when
crash_kexec_post_notifiers kernel option is enabled
(https://lkml.org/lkml/2015/6/24/44).
In that case, smp_send_stop() is called before entering kdump routines
which assume other CPUs are still online. As the result, for x86,
kdump routines fail
On 8/8/2016 11:40 PM, Jan Beulich wrote:
On 12.07.16 at 11:02, wrote:
@@ -178,8 +179,34 @@ static int hvmemul_do_io(
break;
case X86EMUL_UNHANDLEABLE:
{
-struct hvm_ioreq_server *s =
-hvm_select_ioreq_server(curr->domain, &p);
+struct hvm_iore
On Wed, Aug 10, Olaf Hering wrote:
This fails also with 4.4/4.5/4.6. Is 'xl dump-core' supposed to work
with HVM guests? I think at some point 'xm dump-core' used to work, just
crash(1) could not deal with the result.
> xc: info: j (63635) != nr_pages (65709)
> memory=256
> memory=1024
xc: info
On Wed, Aug 10, 2016 at 07:43:38AM +, osstest service owner wrote:
> flight 100382 xen-unstable-smoke real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/100382/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build
1: page-alloc/x86: don't restrict DMA heap to node 0
2: x86/NUMA: cleanup
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
When node zero has no memory, the DMA bit width will end up getting set
to 9, which is obviously not helpful to hold back a reasonable amount
of low enough memory for Dom0 to use for DMA purposes. Find the lowest
node with memory below 4Gb instead.
Introduce arch_get_dma_bitsize() to keep this arc
- drop the only left CONFIG_NUMA conditional (this is always true)
- drop struct node_data's node_id field (being always equal to the
node_data[] array index used)
- don't open code node_{start,end}_pfn() nor node_spanned_pages()
except when used as lvalues (those could be converted too, but th
On Di, 2016-08-09 at 16:55 +0100, Alex Bennée wrote:
> Hi,
>
> I'm proposing for the 2.8 cycle we officially drop supporting 64 bit
> guests on 32 bit hosts. For most of the KVM targets it doesn't make
> any sense anyway and for TCG it makes things harder (e.g. supporting
> 64 bit atomics on a 32
On Sun, Aug 7, 2016 at 4:21 PM, Cendrin Sa wrote:
> Hi,
> I was searching a way to clone a machine using both memory and disk
> approach.
> I checked xen save/restore but after restoring, I can only work some seconds
> with my machine and it will crash with the_kernel_task_hang_up.
> using an scri
Hi Julien,
>>> [...]
>>>
switch ( fsc )
{
+case FSC_FLT_TRANS:
+{
+if ( altp2m_active(d) )
+{
+const struct npfec npfec = {
+.insn_fetch = 1,
+.gla_valid = 1,
+
>>> On 09.08.16 at 20:01, wrote:
>> >> > @@ -70,7 +71,11 @@ struct payload {
>> >> > unsigned int nsyms; /* Nr of entries in .strtab
>> >> > and
>> >> > symbols. */
>> >> > struct livepatch_build_id id;/*
>> >> > ELFNOTE_DESC(.note.gnu.build-id) of the payload
Hello Tamas,
On 09/08/2016 21:16, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 10:54 AM, Julien Grall wrote:
Hello Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
This commit moves the altp2m-related code from x86 to ARM. Functions
that are no yet supported notify the caller or print a
c/s 2e426d6 "x86/traps: Drop use_error_code parameter from do_{,guest_}trap()"
introduced an assertion which covered the correctness of shifting 1u by an
input parameter.
While all other inputs provide a constants vector, the `int $N` handling path
from do_general_protection() passes any vector.
> >>> On 03.08.16 at 03:32, wrote:
> >> On 25/07/16 07:09, Kang, Luwei wrote:
> >> First of all - please don't top post.
> >>
> >> > What about remove the dependency between AVX2 and AVX512F
> >> >> ( AVX2:
> >> [AVX512F], ) ?
> >>
> >> Yes, that's what I think we wan
On 10/08/16 10:23, Jan Beulich wrote:
> --- a/xen/arch/x86/numa.c
> +++ b/xen/arch/x86/numa.c
> @@ -355,11 +355,21 @@ void __init init_cpu_to_node(void)
> }
> }
>
> -EXPORT_SYMBOL(cpu_to_node);
> -EXPORT_SYMBOL(node_to_cpumask);
> -EXPORT_SYMBOL(memnode_shift);
> -EXPORT_SYMBOL(memnodemap);
>>> On 10.08.16 at 10:57, wrote:
> On Wed, Aug 10, 2016 at 07:43:38AM +, osstest service owner wrote:
>> flight 100382 xen-unstable-smoke real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/100382/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> incl
>>> On 10.08.16 at 11:53, wrote:
> c/s 2e426d6 "x86/traps: Drop use_error_code parameter from do_{,guest_}trap()"
> introduced an assertion which covered the correctness of shifting 1u by an
> input parameter.
>
> While all other inputs provide a constants vector, the `int $N` handling path
> fro
>>> On 10.08.16 at 09:35, wrote:
> --- a/xen/common/vm_event.c
> +++ b/xen/common/vm_event.c
> @@ -388,6 +388,13 @@ void vm_event_resume(struct domain *d, struct
> vm_event_domain *ved)
> v = d->vcpu[rsp.vcpu_id];
>
> /*
> + * Make sure the vCPU state has been synchron
flight 100387 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100387/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-buildfail REGR. vs. 100365
Tests which
>>> On 10.08.16 at 11:58, wrote:
> On 10/08/16 10:23, Jan Beulich wrote:
>> --- a/xen/arch/x86/numa.c
>> +++ b/xen/arch/x86/numa.c
>> @@ -355,11 +355,21 @@ void __init init_cpu_to_node(void)
>> }
>> }
>>
>> -EXPORT_SYMBOL(cpu_to_node);
>> -EXPORT_SYMBOL(node_to_cpumask);
>> -EXPORT_SYMBOL(
On Tue, Aug 09, 2016 at 07:34:14PM +0200, Paulina Szubarczyk wrote:
> On 08/09/2016 06:56 PM, Anthony PERARD wrote:
> > On Tue, Aug 02, 2016 at 04:06:30PM +0200, Paulina Szubarczyk wrote:
> > > diff --git a/include/hw/xen/xen_common.h b/include/hw/xen/xen_common.h
> > > index 640c31e..e80c61f 10064
>>> On 10.08.16 at 11:58, wrote:
>> >>> On 03.08.16 at 03:32, wrote:
>> >> On 25/07/16 07:09, Kang, Luwei wrote:
>> >> First of all - please don't top post.
>> >>
>> >> > What about remove the dependency between AVX2 and AVX512F
>> >> >> ( AVX2:
>> >> [AVX512F], ) ?
>> >>
On Tue, Aug 9, 2016 at 10:13 AM, He Chen wrote:
> This patch is going to solve SMAP/SMEP issues with 32-bit pv guests by
> adding new xen command line options "xen_smap" and "xen_smep".
>
> For the details, please see:
> https://lists.xen.org/archives/html/xen-devel/2016-06/msg03441.html
>
> I am
On 10/08/16 10:24, Jan Beulich wrote:
> - drop the only left CONFIG_NUMA conditional (this is always true)
I observe that CONFIG_NUMA_EMU is also unconditionally true, which
offers further cleanup opportunities (albeit it probably a separate patch).
> - drop struct node_data's node_id field (bein
>>> On 10.08.16 at 10:09, wrote:
>
> On 8/8/2016 11:40 PM, Jan Beulich wrote:
> On 12.07.16 at 11:02, wrote:
>>> @@ -178,8 +179,34 @@ static int hvmemul_do_io(
>>> break;
>>> case X86EMUL_UNHANDLEABLE:
>>> {
>>> -struct hvm_ioreq_server *s =
>>> -hv
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 10 August 2016 11:33
> To: Paul Durrant; Yu Zhang
> Cc: Andrew Cooper; George Dunlap; Jun Nakajima; Kevin Tian;
> zhiyuan...@intel.com; xen-devel@lists.xen.org; Tim (Xen.org)
> Subject: Re: [PATCH v5 3/4] x86/ioreq
>>> On 10.08.16 at 08:59, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -1740,6 +1740,20 @@ static void vmx_dump_sel2(char *name, uint32_t lim)
> printk("%s:%08x %016"PRIx64"\n", name, limit, base);
> }
>
> +static void vmx_dump_vcpu_msr_ar
On 08/10/2016 01:12 PM, Jan Beulich wrote:
On 10.08.16 at 09:35, wrote:
>> --- a/xen/common/vm_event.c
>> +++ b/xen/common/vm_event.c
>> @@ -388,6 +388,13 @@ void vm_event_resume(struct domain *d, struct
>> vm_event_domain *ved)
>> v = d->vcpu[rsp.vcpu_id];
>>
>> /*
>> +
On 8/10/2016 6:33 PM, Jan Beulich wrote:
On 10.08.16 at 10:09, wrote:
On 8/8/2016 11:40 PM, Jan Beulich wrote:
On 12.07.16 at 11:02, wrote:
@@ -178,8 +179,34 @@ static int hvmemul_do_io(
break;
case X86EMUL_UNHANDLEABLE:
{
-struct hvm_ioreq_server *s =
-
On Tue, Aug 09, 2016 at 04:37:40PM +0100, Wei Liu wrote:
> On Tue, Aug 09, 2016 at 02:11:27PM +0100, Andrew Cooper wrote:
> > On 08/08/16 14:13, Wei Liu wrote:
> > > On Mon, Aug 08, 2016 at 02:06:37PM +0100, Andrew Cooper wrote:
> > >> On 08/08/16 12:24, Wei Liu wrote:
> > >>> Now that xl create -c
On Sun, Aug 07, 2016 at 07:51:14PM +0430, Cendrin Sa wrote:
> Hi,
> I was searching a way to clone a machine using both memory and disk
> approach.
> I checked xen save/restore but after restoring, I can only work some
> seconds with my machine and it will crash with the_kernel_task_hang_up.
> usin
flight 100390 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100390/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 7f5c8075364776eb139bbd421ad443ae9e4465dc
baseline version:
xen 7da4
On Wed, Aug 10, 2016 at 10:25:30AM +0200, Olaf Hering wrote:
> On Wed, Aug 10, Olaf Hering wrote:
>
> This fails also with 4.4/4.5/4.6. Is 'xl dump-core' supposed to work
> with HVM guests? I think at some point 'xm dump-core' used to work, just
> crash(1) could not deal with the result.
>
> > xc
COPYING file:
The motivation of this change is to make it easier for new
contributors to conduct a license and patent review, WITHOUT
changing any licenses.
- Remove references to BSD-style licenses as we have more
common license exceptions and replace with "other license
stanzas"
- List the mo
On 10/08/16 12:01, Wei Liu wrote:
> On Tue, Aug 09, 2016 at 04:37:40PM +0100, Wei Liu wrote:
>> On Tue, Aug 09, 2016 at 02:11:27PM +0100, Andrew Cooper wrote:
>>> On 08/08/16 14:13, Wei Liu wrote:
On Mon, Aug 08, 2016 at 02:06:37PM +0100, Andrew Cooper wrote:
> On 08/08/16 12:24, Wei Liu w
>>> On 10.08.16 at 12:35, wrote:
> On 10/08/16 10:24, Jan Beulich wrote:
>> - drop the only left CONFIG_NUMA conditional (this is always true)
>
> I observe that CONFIG_NUMA_EMU is also unconditionally true, which
> offers further cleanup opportunities (albeit it probably a separate patch).
So I
>>> On 10.08.16 at 12:55, wrote:
> On 08/10/2016 01:12 PM, Jan Beulich wrote:
> On 10.08.16 at 09:35, wrote:
>>> --- a/xen/common/vm_event.c
>>> +++ b/xen/common/vm_event.c
>>> @@ -388,6 +388,13 @@ void vm_event_resume(struct domain *d, struct
> vm_event_domain *ved)
>>> v = d->vcpu
On 10/08/16 11:29, Jan Beulich wrote:
On 10.08.16 at 11:58, wrote:
>> On 03.08.16 at 03:32, wrote:
> On 25/07/16 07:09, Kang, Luwei wrote:
> First of all - please don't top post.
>
>> What about remove the dependency between AVX2 and AVX512F
>>> ( AVX2:
>
On 09/08/16 15:39, Jan Beulich wrote:
On 09.08.16 at 16:27, wrote:
>> On 09/08/16 15:01, Jan Beulich wrote:
>> On 09.08.16 at 14:41, wrote:
The use of -fno-builtin inhibits this automatic transformation. Manually
tranform the callsites. This causes constructs such as strlen("
On 10/08/16 11:21, Jan Beulich wrote:
On 10.08.16 at 11:58, wrote:
>> On 10/08/16 10:23, Jan Beulich wrote:
>>> --- a/xen/arch/x86/numa.c
>>> +++ b/xen/arch/x86/numa.c
>>> @@ -355,11 +355,21 @@ void __init init_cpu_to_node(void)
>>> }
>>> }
>>>
>>> -EXPORT_SYMBOL(cpu_to_node);
>>> -EX
>>> On 10.08.16 at 08:59, wrote:
> Systems that support LBR formats that include TSX information but do
> not support TSX require special handling when saving and restoring MSR
> values. For example, see the Linux kernel quirks[1, 2] in the MSR
> context switching code. As a wrmsr with certain val
On 14.07.2016 15:04, Bob Liu wrote:
On 07/14/2016 07:49 PM, Evgenii Shatokhin wrote:
On 11.07.2016 15:04, Bob Liu wrote:
On 07/11/2016 04:50 PM, Evgenii Shatokhin wrote:
On 06.06.2016 11:42, Dario Faggioli wrote:
Just Cc-ing some Linux, block, and Xen on CentOS people...
Ping.
Any sugg
>>> On 10.08.16 at 14:10, wrote:
> On 10/08/16 11:29, Jan Beulich wrote:
> On 10.08.16 at 11:58, wrote:
>>> On 03.08.16 at 03:32, wrote:
>> On 25/07/16 07:09, Kang, Luwei wrote:
>> First of all - please don't top post.
>>
>>> What about remove the dependency
On 8/10/2016 6:43 PM, Paul Durrant wrote:
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 10 August 2016 11:33
To: Paul Durrant; Yu Zhang
Cc: Andrew Cooper; George Dunlap; Jun Nakajima; Kevin Tian;
zhiyuan...@intel.com; xen-devel@lists.xen.org; Tim (Xen.org)
Subjec
flight 100391 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100391/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
>>> On 10.08.16 at 14:18, wrote:
> On 10/08/16 11:21, Jan Beulich wrote:
> On 10.08.16 at 11:58, wrote:
>>> On 10/08/16 10:23, Jan Beulich wrote:
--- a/xen/arch/x86/numa.c
+++ b/xen/arch/x86/numa.c
@@ -355,11 +355,21 @@ void __init init_cpu_to_node(void)
}
}
>>>
On 08/10/2016 08:33 PM, Evgenii Shatokhin wrote:
> On 14.07.2016 15:04, Bob Liu wrote:
>>
>> On 07/14/2016 07:49 PM, Evgenii Shatokhin wrote:
>>> On 11.07.2016 15:04, Bob Liu wrote:
On 07/11/2016 04:50 PM, Evgenii Shatokhin wrote:
> On 06.06.2016 11:42, Dario Faggioli wrote:
>>>
>>> On 04.08.16 at 23:06, wrote:
> v2:
> * Reordered .gitignore changes alphabetically
> * Dropped trailing slashes
> * Use relative path for ACPI_PATH
> * Use $(addprefix...)
> * Dropped use of 'cd' in rules and instead add $(ACPI_BUILD_DIR)/ to $*
What about the suggested use of $(CURDIR) e.g.
flight 100377 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100377/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-debianhvm-amd64 15 guest-localmigrate/x10 fail pass
in 100367
Regressions which are
On August 09, 2016 9:02 PM, < jbeul...@suse.com > wrote:
> >>> On 09.08.16 at 14:36, wrote:
> > Hi Jan,
> >
> > A question about ' XENFEAT_auto_translated_physmap':
> >
> > In linux code, in arch/x86/xen/mmu.c,
>
> I assume you know that I'm not a maintainer of the Linux code.
>
> > __xen_pgd_wal
On Wed, Aug 10, 2016 at 12:11 PM, Roger Pau Monné wrote:
> On Sun, Aug 07, 2016 at 07:51:14PM +0430, Cendrin Sa wrote:
>> Hi,
>> I was searching a way to clone a machine using both memory and disk
>> approach.
>> I checked xen save/restore but after restoring, I can only work some
>> seconds with
>>> On 04.08.16 at 23:06, wrote:
> --- a/tools/firmware/hvmloader/acpi/README
> +++ b/tools/firmware/hvmloader/acpi/README
> @@ -1,11 +1,19 @@
> -ACPI Table for domain firmware
> +ACPI builder for domain firmware
>
>
> -INSTALL
> +BUILDING ACPI
> -
> -Simply make is OK.
> -# m
flight 100381 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100381/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-amd64-amd64-libvirt-xsm 12 migrate-s
>>> On 04.08.16 at 23:06, wrote:
> @@ -34,13 +34,15 @@ $(H_SRC): $(ACPI_BUILD_DIR)/%.h: %.asl iasl
> $(MK_DSDT): mk_dsdt.c
> $(HOSTCC) $(HOSTCFLAGS) $(CFLAGS_xeninclude) -o $@ mk_dsdt.c
>
> -$(ACPI_BUILD_DIR)/dsdt_anycpu_qemu_xen.asl: dsdt.asl $(MK_DSDT)
> +$(ACPI_BUILD_DIR)/dsdt_anycpu_q
>>> On 10.08.16 at 15:19, wrote:
> On August 09, 2016 9:02 PM, < jbeul...@suse.com > wrote:
>> >>> On 09.08.16 at 14:36, wrote:
>> > Hi Jan,
>> >
>> > A question about ' XENFEAT_auto_translated_physmap':
>> >
>> > In linux code, in arch/x86/xen/mmu.c,
>>
>> I assume you know that I'm not a mainta
On 08/10/2016 09:17 AM, Jan Beulich wrote:
On 04.08.16 at 23:06, wrote:
>> v2:
>> * Reordered .gitignore changes alphabetically
>> * Dropped trailing slashes
>> * Use relative path for ACPI_PATH
>> * Use $(addprefix...)
>> * Dropped use of 'cd' in rules and instead add $(ACPI_BUILD_DIR)/ to $
On 08/10/2016 09:30 AM, Jan Beulich wrote:
>> +#ifndef __ACPI_X86_H__
>> +#define __ACPI_X86_H__
>> +
>> +#define IOAPIC_BASE_ADDRESS 0xfec0
> This will need re-basing - looks like your submission and my commit
> happened at about the same time.
Right, I saw that but this series is based on A
On Wed, Aug 10, 2016 at 04:44:21AM -0600, Jan Beulich wrote:
> >>> On 10.08.16 at 08:59, wrote:
> > --- a/xen/arch/x86/hvm/vmx/vmcs.c
> > +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> > @@ -1740,6 +1740,20 @@ static void vmx_dump_sel2(char *name, uint32_t lim)
> > printk("%s:%08x %016"PRIx6
On Aug 10, 2016 05:52, "Jan Beulich" wrote:
>
> >>> On 10.08.16 at 12:55, wrote:
> > On 08/10/2016 01:12 PM, Jan Beulich wrote:
> > On 10.08.16 at 09:35, wrote:
> >>> --- a/xen/common/vm_event.c
> >>> +++ b/xen/common/vm_event.c
> >>> @@ -388,6 +388,13 @@ void vm_event_resume(struct domain *
On Aug 10, 2016 03:52, "Julien Grall" wrote:
>
> Hello Tamas,
>
>
> On 09/08/2016 21:16, Tamas K Lengyel wrote:
>>
>> On Wed, Aug 3, 2016 at 10:54 AM, Julien Grall
wrote:
>>>
>>> Hello Sergej,
>>>
>>>
>>> On 01/08/16 18:10, Sergej Proskurin wrote:
This commit moves the altp2m-relat
On 10.08.2016 15:49, Bob Liu wrote:
On 08/10/2016 08:33 PM, Evgenii Shatokhin wrote:
On 14.07.2016 15:04, Bob Liu wrote:
On 07/14/2016 07:49 PM, Evgenii Shatokhin wrote:
On 11.07.2016 15:04, Bob Liu wrote:
On 07/11/2016 04:50 PM, Evgenii Shatokhin wrote:
On 06.06.2016 11:42, Dario Faggio
Currently setting altp2mhvm=1 in the domain configuration allows access to the
altp2m interface for both in-guest and external privileged tools. This poses
a problem for use-cases where only external access should be allowed, requiring
the user to compile Xen with XSM enabled to be able to appropri
From: Tamas K Lengyel
Use __get_gfn_type_access instead of get_gfn_type_access when checking
the hostp2m entries during altp2m mem_access setting and gfn remapping
to avoid a lock conflict which can make dom0 freeze. During mem_access
setting the hp2m is already locked. For gfn remapping we chang
Signed-off-by: Wei Liu
---
xtf-runner | 13 +
1 file changed, 13 insertions(+)
diff --git a/xtf-runner b/xtf-runner
index c063699..7b69c45 100755
--- a/xtf-runner
+++ b/xtf-runner
@@ -151,6 +151,19 @@ def __repr__(self):
return "TestInfo(%s)" % (self.name, )
+def get_xen
Wei Liu (3):
xtf-runner: introduce get_xen_version
xtf-runner: options for different modes to get output
xtf-runner: support two modes for getting output
xtf-runner | 144 -
1 file changed, 123 insertions(+), 21 deletions(-)
--
2
We need two modes for getting output:
1. Use console directly with newer (>=4.8) Xen
2. Use log files for older Xen
This patch implements both. The default behaviour is to choose mode
automatically based on Xen version. User can also explicitly specify
which mode to use.
Signed-off-by: Wei Liu
Only options and help text. Implementation will come later.
Signed-off-by: Wei Liu
---
xtf-runner | 27 +++
1 file changed, 27 insertions(+)
diff --git a/xtf-runner b/xtf-runner
index 7b69c45..73a4e0d 100755
--- a/xtf-runner
+++ b/xtf-runner
@@ -532,6 +532,20 @@ def main
flight 100394 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100394/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 100391
Tests which
On Wed, Aug 10, Wei Liu wrote:
> On Wed, Aug 10, 2016 at 10:25:30AM +0200, Olaf Hering wrote:
> > On Wed, Aug 10, Olaf Hering wrote:
> >
> > This fails also with 4.4/4.5/4.6. Is 'xl dump-core' supposed to work
> > with HVM guests? I think at some point 'xm dump-core' used to work, just
> > crash(
On Wed, Aug 10, 2016 at 06:34:10AM -0600, Jan Beulich wrote:
> >>> On 10.08.16 at 08:59, wrote:
> > Systems that support LBR formats that include TSX information but do
> > not support TSX require special handling when saving and restoring MSR
> > values. For example, see the Linux kernel quirks[1
flight 100379 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100379/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds15 guest-start/debian.repeat fail REGR. vs. 100363
test-amd64-i386-xl-qemuu-w
On Tue, Aug 09, 2016 at 09:09:07AM -0700, James Bottomley wrote:
> On Tue, 2016-08-09 at 15:24 +0100, One Thousand Gnomes wrote:
> > > table development go under copyleft-next, Rusty recently asked for
> > > code to go in prior to the license tag being added denoting this
> > > license as GPL-com
This run is configured for baseline tests only.
flight 66956 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66956/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 4 host-pin
flight 100396 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100396/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
flight 100388 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100388/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf af90df3cb099ed8e009579b7b55e7142dc0fc410
baseline version:
ovmf 5aeafb3a254e7cd9e1fb6
Ping?
On Thu, 4 Aug 2016, Stefano Stabellini wrote:
> Hi all,
>
> This is the design document of the PV Calls protocol. You can find
> prototypes of the Linux frontend and backend drivers here:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/sstabellini/xen.git pvcalls-5
>
> To use them, make
flight 100383 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100383/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl 11 guest-start fail like 99847
test-armhf-armhf-xl-cubietruck
Juergen Gross, on Fri 05 Aug 2016 19:35:45 +0200, wrote:
> The first free pfn available for allocation is calculated by adding the
> number of page table frames to the pfn of the first page table and
> then the magic number 3 to account for start info page et al.
>
> As the start info page, xensto
Juergen Gross, on Fri 05 Aug 2016 19:35:46 +0200, wrote:
> alloc_contig_pages() is never used anywhere in mini-os. Remove it.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Wei Liu
Acked-by: Samuel Thibault
> ---
> arch/x86/mm.c | 142
> -
Juergen Gross, on Fri 05 Aug 2016 19:35:47 +0200, wrote:
> mm.c contains unused code inside #ifdef MM_DEBUG areas. Its usability
> is rather questionable and some parts are even wrong (e.g.
> print_chunks() called with nr_pages > 1000 will clobber an arbitrary
> stack content with a 0 byte).
>
> R
Juergen Gross, on Fri 05 Aug 2016 19:35:48 +0200, wrote:
> Add a brief description how the physical and virtual address usage
> looks like on x86 to include/x86/arch_mm.h
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Wei Liu
Acked-by: Samuel Thibault
> ---
> include/x86/arch_mm.h | 20
Juergen Gross, on Fri 05 Aug 2016 19:35:49 +0200, wrote:
> Add a variable holding the number of available memory pages. This will
> aid auto-ballooning later.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Wei Liu
Acked-by: Samuel Thibault
> ---
> include/mm.h | 1 +
> mm.c | 6
Juergen Gross, on Fri 05 Aug 2016 19:35:50 +0200, wrote:
> Instead of panicing when no page can be allocated try to fail the
> memory allocation by returning NULL instead.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Wei Liu
Acked-by: Samuel Thibault
> ---
> V2: fixed minor style issue
> -
Juergen Gross, on Fri 05 Aug 2016 19:35:51 +0200, wrote:
> Add CONFIG_BALLOON defaulting to 'n' as a config item to Mini-OS.
>
> Add balloon.c, balloon.h and arch/*/balloon.c for future use.
>
> Signed-off-by: Juergen Gross
Not much to be against here :)
Acked-by: Samuel Thibault
> ---
> V2:
This run is configured for baseline tests only.
flight 66957 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66957/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-i386-rumpuserxen6 xen-build
Juergen Gross, on Fri 05 Aug 2016 19:35:52 +0200, wrote:
> Add support for obtaining the maximum memory size from the hypervisor.
> This will make it possible to support ballooning.
>
> Signed-off-by: Juergen Gross
Acked-by: Samuel Thibault
> diff --git a/mm.c b/mm.c
> index 8cf3210..25ee3da 1
Juergen Gross, on Fri 05 Aug 2016 19:35:53 +0200, wrote:
> In order to be able to support ballooning the virtual memory layout
> of Mini-OS has to be modified: instead of a (nearly) consecutive
> area used for physical memory mapping, on demand mappings, and heap
> we need enough spare place for ad
Juergen Gross, on Fri 05 Aug 2016 19:35:54 +0200, wrote:
> mem_test() isn't used anywhere and its value is rather questionable
> with mini-os being in a mature state. Remove the function.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Samuel Thibault
> ---
> arch/x86/mm.c | 55
Juergen Gross, on Fri 05 Aug 2016 19:35:55 +0200, wrote:
> There are several core functions in Mini-OS not checking for failed
> memory allocations. Add such checks.
>
> Add do_map_frames() dummy function to arm architecture as it will be
> needed in future for compilations to succeed.
>
> Signed
Juergen Gross, on Fri 05 Aug 2016 19:35:56 +0200, wrote:
> When constructing the 3 level p2m tree there is no need to allocate
> new pages for the level 1 containing the p2m info for all pages. The
> pages from the linear p2m list constructed by the hypervisor can be
> used for that purpose.
>
> S
1 - 100 of 128 matches
Mail list logo