>>> Andrew Cooper 07/25/17 8:55 PM >>>
>--- a/xen/arch/x86/hvm/emulate.c
>+++ b/xen/arch/x86/hvm/emulate.c
>@@ -958,8 +958,8 @@ int hvmemul_insn_fetch(
>* Will we overflow insn_buf[]? This shouldn't be able to happen,
>* which means something went wrong with instruction decoding...
>*/
>- if ( in
flight 112375 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112375/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 2 hosts-allocate broken REGR. vs. 110515
build-arm64-pvops
On Sun, Jul 30, 2017 at 12:26:59AM -0600, Jan Beulich wrote:
> >>> Wei Liu 07/20/17 6:04 PM >>>
> >What is left is mostly PV MMU hypercall functions and their supporting code.
> >I'm still thinking about how to refactor those because the helper functions
> >are
> >a bit convulted. The helper func
flight 112383 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112383/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
coverity-amd646 coverity-build fail REGR. vs. 40
version t
>>> Sergey Dyasli 07/24/17 3:48 PM >>>
>@@ -470,6 +471,9 @@ int arch_domain_create(struct domain *d, unsigned int
>domcr_flags,
>if ( (rc = init_domain_cpuid_policy(d)) )
>goto fail;
>
>+if ( (rc = init_domain_vmx_msr_policy(d)) )
>+goto fail;
There should not be a direct ca
flight 112376 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112376/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 2 hosts-allocate broken REGR. vs. 112286
build-arm64-pvops
All the other counters get reset to 0 when printing stats,
while the flush counter keeps incrementing:
[ 2118.107554] xen-blkback: (5.xvda-0): oo 0 | rd 1748 | wr6 | f
3424 | ds0 | pg: 161/1056
[ 2128.147524] xen-blkback: (5.xvda-0): oo 0 | rd 5705 | wr9 | f
3429 |
On 30/07/17 07:16, Jan Beulich wrote:
David Woodhouse 07/20/17 5:22 PM >>>
>> This includes stuff lke the hypercall tables which we really want
>> to be read-only. And they were going into .data.read-mostly.
> Yes, we'd like them to be read-only, but what if EFI properly assigned r/o
> permis
Export some of the get/put functions so that we can move PV mm code
trunk by trunk.
When moving code is done some of the functions might be made static
again.
Also fix coding style issues and use bool when appropriate.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 40 ++
This series is built on top of the "easy part" [0] (and rebased on top of
current staging).
After discussing with George and Andrew on IRC, it is clear that
alloc_page_type and free_page_type are only useful for PV guests. This
immediately enables us to move them and the supporting code to PV dire
They will be used by both common mm code and PV mm code in the next
few patches. Note that they might be moved again later if they aren't
needed by common mm code any more.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 19 +--
xen/include/asm-x86/mm.h | 19 +++
And export it via a local header because it is going to be used by
several PV specific files.
Take the chance to change its return type to bool.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 46 --
xen/arch/x86/pv/mm.c | 40 +++
Move them and the helper functions to pv/mm.c. Use bool in the moved
code where appropriate.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c | 1 +
xen/arch/x86/mm.c | 492
xen/arch/x86/pv/mm.c| 491
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index d232076459..167b318260 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -127,8 +127,6 @@
#include
#include
-#include "pv/mm.h"
-
/* Mapping
Also move pv_new_guest_cr3 there so that we don't have to export
mod_l1_entry.
Fix coding style issues. Change v to curr and d to currd where
appropriate.
Signed-off-by: Wei Liu
---
I can't convince git diff to produce sensible diff for donate_page and
steal_page. Those functions aren't changed
They are only useful for PV guests. Also change preemptible to bool.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c| 2 +-
xen/arch/x86/mm.c| 12 ++--
xen/include/asm-x86/mm.h | 4 ++--
3 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/domain.c b
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 167b318260..40fb761d08 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -1050,8 +1050,6 @@ int put_pag
Move the code to pv/mm.c and export it via pv/mm.h. Use bool for flush.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 44
xen/arch/x86/pv/mm.c| 35 +++
xen/include/asm-x86/pv/mm.h | 4
3 files c
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 65
xen/arch/x86/pv/mm.c | 65
2 files changed, 65 insertions(+), 65 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index a
They are only used by PV code.
Fix coding style issues while moving. Move declarations to PV specific
header file.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 253
xen/arch/x86/pv/mm.c| 246 +++
flight 112378 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112378/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 2 hosts-allocate broken REGR. vs. 112102
I'm extremely sorry that I mistakenly copied and pasted an immediate
version of the proposal here. As you might have already noticed, some
of the content obviously conflicts with itself. Please see the new one below.
And some typo's and indentation issues are also fixed. Sorry again for my
mistake.
On Fri, Jul 28, 2017 at 7:23 PM, Wei Liu wrote:
> On Fri, Jul 28, 2017 at 03:11:34PM +0100, Wei Liu wrote:
>> On Tue, Jul 18, 2017 at 05:25:23PM +0300, Oleksandr Grytsov wrote:
>> [...]
>> > /* Waits for the passed device to reach state XenbusStateInitWait.
>> > * This is not really useful by i
flight 112381 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112381/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 2 hosts-allocate broken REGR. vs. 112276
bu
flight 112379 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112379/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 2 hosts-allocate broken REGR. vs. 112193
flight 112380 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112380/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 2 hosts-allocate broken REGR. vs. 111765
build-arm64-xsm
On Sun, 2017-07-30 at 13:50 +0100, Andrew Cooper wrote:
> On 30/07/17 07:16, Jan Beulich wrote:
> >
> > >
> > > >
> > > > >
> > > > > David Woodhouse 07/20/17 5:22 PM >>>
> > > This includes stuff lke the hypercall tables which we really want
> > > to be read-only. And they were going into .da
CCed xen-devel so that more people would be able to help.
Dongli Zhang
On 07/31/2017 09:09 AM, Dongli Zhang wrote:
> Hi Valentin,
>
> On 07/30/2017 03:42 PM, Valentin Vidic wrote:
>> I'm having a problem with a domU hang in disk IO, described here:
>>
>> https://lists.xen.org/archives/html/xen-u
flight 112382 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112382/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 2 hosts-allocate broken REGR. vs. 110515
build-arm64-pvops
flight 112384 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112384/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 2 hosts-allocate broken REGR. vs. 112286
build-arm64-pvops
> From: Oleksandr Tyshchenko
> Sent: Wednesday, July 26, 2017 1:27 AM
>
> From: Oleksandr Tyshchenko
>
> Hi, all.
>
> The purpose of this patch series is to create a base for porting
> any "Non-shared" IOMMUs to Xen on ARM. Saying "Non-shared" IOMMU I
> mean
> the IOMMU that can't share the pag
Here are the options:
1. Dump a vmcore of guest and print nr_grant_frames with crash utility.
2. Implement a kernel module in guest to dump nr_grant_frames if you still have
access to your hung guest domU.
3. There is a new utility in xen toolstack at tools/misc/xen-diag.c to dump
grant table us
Thanks. Will do.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
33 matches
Mail list logo