flight 113566 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113566/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4084ccfa22dab15e2b9c3f531ba9ec18a6e08a8d
baseline version:
ovmf bec7a86c70398e774eb90
>>> On 13.09.17 at 11:21, wrote:
On 13.09.17 at 07:27, wrote:
>> CONTENTS, ALLOC, LOAD, DATA
>> 6 .bss 00143280 82d08082 82d08082 2**4
>> ALLOC, RELOC
>
> Objdump is apparently ignoring a section attribute bit here - m
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 11, 2017 6:03 PM
>
> This makes it easier to match them against SDM updates. Also update a
> few comments with names as per SDM version 063.
>
> Signed-off-by: Jan Beulich
Acked-by: Kevin Tian
___
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 11, 2017 6:04 PM
>
> Bring code up-to-date with SDM version 063, including the LBR format
> enumeration.
>
> Signed-off-by: Jan Beulich
Acked-by: Kevin Tian
___
Xen-devel maili
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 11, 2017 6:04 PM
> To: xen-devel
> Cc: Andrew Cooper ; Nakajima, Jun
> ; Tian, Kevin
> Subject: [PATCH 3/3] x86/cpuidle: add new CPU families
>
> Bring code up-to-date with SDM version 063.
>
> Signed-off-by: Jan Beulich
> From: Zhang, Haozhong
> Sent: Monday, September 11, 2017 8:13 PM
>
> On 09/11/17 10:38 +0100, Roger Pau Monné wrote:
> > On Mon, Sep 11, 2017 at 02:00:48PM +0800, Haozhong Zhang wrote:
> > > The 64-bit DMAR fault address is composed of two 32 bits registers
> > > DMAR_FEADDR_REG and DMAR_FEUADDR
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 11, 2017 6:03 PM
>
> >>> On 11.09.17 at 08:00, wrote:
> > The 64-bit DMAR fault address is composed of two 32 bits registers
> > DMAR_FEADDR_REG and DMAR_FEUADDR_REG. According to VT-d spec:
> > "Software is expected to acce
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: Saturday, September 9, 2017 12:06 AM
>
> From: Andrew Cooper
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists
> From: Petre Pircalabu [mailto:ppircal...@bitdefender.com]
> Sent: Tuesday, September 12, 2017 10:32 PM
>
> - print the return code of the last failed emulator operation
> in hvm_dump_emulation_state.
> - print the return code in sh_page_fault (SHADOW_PRINTK) to make the
> distiction between X86E
> From: Petre Pircalabu [mailto:ppircal...@bitdefender.com]
> Sent: Tuesday, September 12, 2017 10:32 PM
>
> Modified the behavior of hvm_emulate_one_insn and
> vmx_realmode_emulate_one to generate an Invalid Opcode trap when
> X86EMUL_UNIMPLEMENTED is returned by the emulator instead of just
> cr
>>> On 18.09.17 at 10:18, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Monday, September 11, 2017 6:03 PM
>>
>> >>> On 11.09.17 at 08:00, wrote:
>> > The 64-bit DMAR fault address is composed of two 32 bits registers
>> > DMAR_FEADDR_REG and DMAR_FEUADDR_REG. According to VT-
flight 113562 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113562/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 15 guest-saverestorefail REGR. vs. 113387
test-amd64-i386-xl
From: Colin Ian King
In the case where sizeof(maddr) != sizeof(long) p is initialized and
never read and clang throws a warning on this. Move declaration of
p to clean up the clang build warning:
warning: Value stored to 'p' during its initialization is never read
Signed-off-by: Colin Ian King
On 18/09/17 10:38, Colin King wrote:
> From: Colin Ian King
>
> In the case where sizeof(maddr) != sizeof(long) p is initialized and
> never read and clang throws a warning on this. Move declaration of
> p to clean up the clang build warning:
>
> warning: Value stored to 'p' during its initiali
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Jennifer Herbert
> Sent: 14 September 2017 16:34
> To: Ian Jackson ; Wei Liu ;
> xen-de...@lists.xenproject.org; jto...@uwaterloo.ca
> Cc: Jennifer Herbert
> Subject: [Xen-devel] [PATCH 1/2] Tidy
flight 72119 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72119/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-i386-sid-netboot-pvgrub 10 debian-di-install fail REGR. vs.
72091
test-a
From: Colin Ian King
In the case where sizeof(maddr) != sizeof(long) p is initialized and
never read and clang throws a warning on this. Move declaration of
p to clean up the clang build warning:
warning: Value stored to 'p' during its initialization is never read
Signed-off-by: Colin Ian King
On 09/18/17 02:30 -0600, Jan Beulich wrote:
> >>> On 18.09.17 at 10:18, wrote:
> >> From: Jan Beulich [mailto:jbeul...@suse.com]
> >> Sent: Monday, September 11, 2017 6:03 PM
> >>
> >> >>> On 11.09.17 at 08:00, wrote:
> >> > The 64-bit DMAR fault address is composed of two 32 bits registers
> >
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Jennifer Herbert
> Sent: 14 September 2017 16:34
> To: Ian Jackson ; Wei Liu ;
> xen-de...@lists.xenproject.org; jto...@uwaterloo.ca
> Cc: Jennifer Herbert
> Subject: [Xen-devel] [PATCH 2/2] Intr
On Mon, Sep 18, 2017 at 05:05:18PM +0800, Haozhong Zhang wrote:
> On 09/18/17 02:30 -0600, Jan Beulich wrote:
> > >>> On 18.09.17 at 10:18, wrote:
> > >> From: Jan Beulich [mailto:jbeul...@suse.com]
> > >> Sent: Monday, September 11, 2017 6:03 PM
> > >>
> > >> >>> On 11.09.17 at 08:00, wrote:
>
flight 113565 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113565/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
113497
test-amd64-i3
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
> Beulich
> Sent: 14 September 2017 16:20
> To: xen-devel
> Cc: George Dunlap ; Andrew Cooper
>
> Subject: [Xen-devel] [PATCH v2 14/17] x86emul: abstract out XCRn accesses
>
> Use hooks, just
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 14 September 2017 16:22
> To: xen-devel
> Cc: Andrew Cooper ; Paul Durrant
> ; George Dunlap
> Subject: [PATCH v2 17/17] x86/HVM: eliminate custom #MF/#XM handling
>
> Use the generic stub exception handling inst
>>> On 18.09.17 at 11:27, wrote:
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 14 September 2017 16:22
>> To: xen-devel
>> Cc: Andrew Cooper ; Paul Durrant
>> ; George Dunlap
>> Subject: [PATCH v2 17/17] x86/HVM: eliminate custom #MF/#XM handling
>>
>>
This run is configured for baseline tests only.
flight 72120 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72120/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4084ccfa22dab15e2b9c3f531ba9ec18a6e08a8d
baseline v
On Mon, Sep 18, 2017 at 08:36:03AM +, osstest service owner wrote:
> flight 113562 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/113562/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-
flight 113572 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113572/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7f2f96f1a8af3c22bdf5d4dccb020846799f7be0
baseline version:
ovmf 4084ccfa22dab15e2b9c3
>>> On 15.09.17 at 20:48, wrote:
> SCHEDOP_remote_shutdown should be a DMOP so that a deprivileged qemu
> can do the propery tidying up.
>
> We should remove SCHEDOP_remote_shutdown at some point.
Except we can't for ABI stability reasons, plus how would you
remote-shutdown a PV guest then?
> -
> -Original Message-
> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> Sent: 13 September 2017 19:11
> To: Xen-devel
> Cc: Wei Liu ; Paul Durrant ;
> Konrad Rzeszutek Wilk ; Joao Martins
>
> Subject: [PATCH v3 0/1] netif: staging grants for I/O requests
>
> Hey,
>
> This is v3 t
On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
> On Mon, Sep 18, 2017 at 08:36:03AM +, osstest service owner wrote:
> > flight 113562 xen-unstable real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/113562/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and
>>> On 15.09.17 at 19:25, wrote:
> On Fri, Sep 15, 2017 at 05:57:50PM +0100, Wei Liu wrote:
>> On Fri, Sep 15, 2017 at 12:55:51PM -0400, Konrad Rzeszutek Wilk wrote:
>> > instead of hardcoding values. We also drop the uint64_t
>> > cast as the macro uses ULL to produce the proper width
>> > types.
> -Original Message-
> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> Sent: 13 September 2017 19:11
> To: Xen-devel
> Cc: Wei Liu ; Paul Durrant ;
> Konrad Rzeszutek Wilk ; Joao Martins
>
> Subject: [PATCH v3 1/1] public/io/netif.h: add gref mapping control messages
>
> Adds 3 m
Hi Jan,
On 01/09/17 11:45, Jan Beulich wrote:
I've recently got sufficiently annoyed by people not applying enough
common sense to get_maintainer.pl output, Cc-ing all REST maintainers
on ARM-only public interface changes.
It seems that you didn't move arch-arm.h, arch-x86_{32,64}.h under resp
On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
> On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
>> On Mon, Sep 18, 2017 at 08:36:03AM +, osstest service owner wrote:
>>> flight 113562 xen-unstable real [real]
>>> http://logs.test-lab.xenproject.org/osstest/logs/113562/
>>>
>>> Regress
Hello,
I am looking for ways to try out COLO.
I tried a wiki and mailing list, but I failed.
I do not know whether the wiki and the mailing list are correct.
Could you tell me the latest way to try it?
I have read the following documents:
COLO - Coarse Grain Lock Stepping
https://wiki.xen.org/wi
On Mon, Sep 18, 2017 at 11:15:03AM +0100, George Dunlap wrote:
> On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
> > On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
> >> On Mon, Sep 18, 2017 at 08:36:03AM +, osstest service owner wrote:
> >>> flight 113562 xen-unstable real [real]
> >>>
On 09/18/2017 11:15 AM, George Dunlap wrote:
> On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
>> On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
>>> On Mon, Sep 18, 2017 at 08:36:03AM +, osstest service owner wrote:
flight 113562 xen-unstable real [real]
http://logs.test-lab.
SBSA UART emulation for guests in Xen
==
Linaro has published VM System specification for ARM Processors, which
provides a set of guidelines for both guest OS and hypervisor implementations,
such that building OS images according to these guidelines guarantees
t
Allocate a new gfn to be used as a ring buffer between xenconsole
and Xen for sending/receiving pl011 console data.
Signed-off-by: Bhupinder Thakur
Acked-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v4:
- Rem
Add emulation code to emulate read/write access to pl011 registers
and pl011 interrupts:
- Emulate DR read/write by reading and writing from/to the IN
and OUT ring buffers and raising an event to the backend when
there is data in the OUT ring buffer and injecting an interrupt
Rearrange xen header includes in alphabetical order in domctl.c.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Reviewed-by: Julien Grall
---
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Corrected include of in alphabetical order.
xen/arch/arm/domctl.c | 6
On 09/18/2017 11:26 AM, Wei Liu wrote:
> On Mon, Sep 18, 2017 at 11:15:03AM +0100, George Dunlap wrote:
>> On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
>>> On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
On Mon, Sep 18, 2017 at 08:36:03AM +, osstest service owner wrote:
> fl
DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
xencons_queued() to tell the current size of the ring buffer,
xencons_mask() to mask off the index, which are useful helper functions.
pl011 emulation code will use these helper functions.
io/console.h includes io/ring.h which d
Add a new domctl API to initialize vpl011. It takes the GFN and console
backend domid as input and returns an event channel to be used for
sending and receiving events from Xen.
Xen will communicate with xenconsole using GFN as the ring buffer and
the event channel to transmit and receive pl011 da
The console->conspath name is changed to console->xspath as it is
clear from the name that it is referring to xenstore path.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes sin
Add a new vuart console node to xenstore. This node is added at
/local/domain/$DOMID/vuart/0.
The node contains information such as the ring-ref, event channel,
buffer limit and type of console.
Xenconsole reads the node information to setup the ring buffer and
event channel for sending/receivin
This patch introduces a new console_init function. This function
initializes the console structure.
Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch.
tools/co
Xenconsole uses a domain structure which contains console specific fields. This
patch defines a new console structure, which would be used by the xenconsole
functions to perform console specific operations like reading/writing data
from/to
the console ring buffer or reading/writing data from/to co
An option is provided in libxl to enable/disable SBSA vuart while
creating a guest domain.
Libxl now supports a generic vuart console and SBSA uart is a specific type.
In future support can be added for multiple vuart of different types.
User can enable SBSA vuart by adding the following line in
This patch introduces a new maybe_add_console_evtchn_fd function. This
function adds the console event channel FD to list of polled FDs.
Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v6:
- Renamed add_
This patch introduces a new buffer_available function to check if
more data is allowed to be buffered.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this ch
This patch introduces a new console_evtchn_unmask function. This function
unmasks the console event channel if it is masked for some timeout
period.
One optimization that has been done is to merge the two for loops.
One for loop was used to iterate through all domains and
unmask the domain event
This patch introduces a new handle_console_ring function. This function
reads the data from the ring buffer on receiving an event.
The initialization of event channel poll fd to -1 is moved inside the
handle_console_ring function as they are related. There should be no
change in the behavior as th
This patch introduces a new maybe_add_console_tty_fd function. This function
adds the tty fd to the list of polled fds.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v6
This patch adds the support for multiple consoles and introduces the
iterator functions to operate on multiple consoles.
The functions called by the iterators check that they are operating
on valid I/O parameters. This ensures that if a particular console is
not initialized then the functions will
The SBSA UART node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and consequently lives
in the PL011 driver. It's baudrate and other c
This patch introduces a console_close_evtchn function. This function closes
the console event channel.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this ch
Xenconsole functions take domain structure as input. These functions shall be
modified to take console structure as input since these functions typically
perform
console specific operations.
Also the console specific functions starting with prefix "domain_" shall be
modified
to "console_" to ind
This patch introduces a console_open_log console_cleanup function. This function
opens the console log file.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split t
1. Update documentation for a new vuart option added.
2. Update documentation about SPI irq reserved for vuart.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: George Dunlap
CC: Jan Beulich
CC: Konrad R
This patch finally adds the support for vuart console. It adds
two new fields in the console initialization:
- optional
- use_gnttab
optional flag tells whether the console is optional.
use_gnttab tells whether the ring buffer should be allocated using
grant table.
The VUART console is enabled
The early console output uses pl011_early_write() to write data. This
function waits for BUSY bit to get cleared before writing the next byte.
In the SBSA UART emulation logic, the BUSY bit was set as soon one
byte was written in the FIFO and it remained set until the FIFO was
emptied. This meant
Add a new console type VUART to connect to guest's emualated vuart
console.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v4:
- Removed the vuart compile time flag so t
This patch introduces a new console_cleanup function. This function
frees up the console resources.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v6:
- Removed a null p
This patch introduces a new handle_console_tty function. This function
performs read/write from/to console tty.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Spli
This patch fixes the issue observed when pl011 patches were tested on
the junos hardware by Andre/Julien. It was observed that when large output is
generated such as on executing 'find /', output was getting truncated
intermittently
due to OUT ring buffer getting full.
This issue was due to the f
>>> On 18.09.17 at 12:10, wrote:
> Hi Jan,
>
> On 01/09/17 11:45, Jan Beulich wrote:
>> I've recently got sufficiently annoyed by people not applying enough
>> common sense to get_maintainer.pl output, Cc-ing all REST maintainers
>> on ARM-only public interface changes.
>
> It seems that you did
>>> On 18.09.17 at 12:31, wrote:
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -36,6 +36,7 @@
> #include "grant_table.h"
> #include "hvm/save.h"
> #include "memory.h"
> +#include "event_channel.h"
Please play by the alphabetic sorting here (xen.h going first bein
On Mon, Sep 18, 2017 at 11:15:03AM +0100, George Dunlap wrote:
> On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
> > On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
> >> On Mon, Sep 18, 2017 at 08:36:03AM +, osstest service owner wrote:
> >>> flight 113562 xen-unstable real [real]
> >>>
Wei Liu (3):
libxl: use libxl__read_xenstore_check in vtpm function
libxl: use libxl__read_xenstore_check in vdispl function
xl: avoid leaking memory in vdispl parser
tools/libxl/libxl_vdispl.c | 7 +--
tools/libxl/libxl_vtpm.c | 6 --
tools/xl/xl_parse.c| 2 ++
3 files ch
Coverity-ID: 1418095
Signed-off-by: Wei Liu
---
tools/xl/xl_parse.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 9965b83c44..0678fbc1b0 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -832,6 +832,8 @@ int parse_vdispl_config(
libxl__read_xenstore can return NULL. Use the _checked variant to
return early when the read fails.
Coverity-ID: 1418098
Signed-off-by: Wei Liu
---
tools/libxl/libxl_vtpm.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_vtpm.c b/tools/libxl/libxl_vtp
Coverity-ID: 1418097
Signed-off-by: Wei Liu
---
tools/libxl/libxl_vdispl.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_vdispl.c b/tools/libxl/libxl_vdispl.c
index 5740c89fad..cfee0f5cdf 100644
--- a/tools/libxl/libxl_vdispl.c
+++ b/tools/libxl/lib
On 09/18/2017 11:46 AM, Roger Pau Monné wrote:
> On Mon, Sep 18, 2017 at 11:15:03AM +0100, George Dunlap wrote:
>> On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
>>> On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
On Mon, Sep 18, 2017 at 08:36:03AM +, osstest service owner wrote:
On 18/09/17 13:05, George Dunlap wrote:
> On 09/18/2017 11:46 AM, Roger Pau Monné wrote:
>> On Mon, Sep 18, 2017 at 11:15:03AM +0100, George Dunlap wrote:
>>> On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
> On Mon, Sep 18, 2017 at 0
Found one issue in this patch:
In libxl__arch_build_dom_finish, rc is not getting initialized.
Surprisingly, it was working fine in my testing.
Regards,
Bhupinder
On 18 September 2017 at 16:01, Bhupinder Thakur
wrote:
> Add a new domctl API to initialize vpl011. It takes the GFN and console
> b
>>> On 18.09.17 at 13:05, wrote:
> On 09/18/2017 11:46 AM, Roger Pau Monné wrote:
>> On Mon, Sep 18, 2017 at 11:15:03AM +0100, George Dunlap wrote:
>>> On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
On Mon, Sep 18, 2017 at 10:37:58AM +0100, Wei Liu wrote:
> On Mon, Sep 18, 2017 at 08:36:0
On Mon, Sep 18, 2017 at 04:01:50PM +0530, Bhupinder Thakur wrote:
>
> +int libxl__arch_build_dom_finish(libxl__gc *gc,
> + libxl_domain_build_info *info,
> + struct xc_dom_image *dom,
> + libxl__domain
On Mon, Sep 18, 2017 at 09:45:06AM +, Paul Durrant wrote:
> > -Original Message-
> > From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> > Sent: 13 September 2017 19:11
> > To: Xen-devel
> > Cc: Wei Liu ; Paul Durrant ;
> > Konrad Rzeszutek Wilk ; Joao Martins
> >
> > Subject: [PA
> -Original Message-
> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> Sent: 18 September 2017 12:36
> To: Paul Durrant
> Cc: Xen-devel ; Wei Liu ;
> Konrad Rzeszutek Wilk
> Subject: Re: [PATCH v3 0/1] netif: staging grants for I/O requests
>
> On Mon, Sep 18, 2017 at 09:45:06AM
On Mon, Sep 18, 2017 at 09:53:18AM +, Paul Durrant wrote:
> > -Original Message-
> > From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> > Sent: 13 September 2017 19:11
> > To: Xen-devel
> > Cc: Wei Liu ; Paul Durrant ;
> > Konrad Rzeszutek Wilk ; Joao Martins
> >
> > Subject: [PA
> -Original Message-
> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> Sent: 18 September 2017 12:56
> To: Paul Durrant
> Cc: Xen-devel ; Wei Liu ;
> Konrad Rzeszutek Wilk
> Subject: Re: [PATCH v3 1/1] public/io/netif.h: add gref mapping control
> messages
>
> On Mon, Sep 18, 201
This run is configured for baseline tests only.
flight 72121 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72121/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7f2f96f1a8af3c22bdf5d4dccb020846799f7be0
baseline v
flight 113569 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113569/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm broken
test-armhf-armhf-libvirt-raw
flight 113579 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113579/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
>>> On 08.09.17 at 18:05, wrote:
> From: Andrew Cooper
>
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Wed, Sep 13, 2017 at 12:52:47AM -0400, Lan Tianyu wrote:
> This patch is to increase page pool size when max vcpu number is larger
> than 128.
>
> Signed-off-by: Lan Tianyu
> ---
> xen/arch/arm/domain.c| 5 +
> xen/arch/x86/domain.c| 25 +
> xen/common/dom
>>> On 08.09.17 at 18:05, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -3069,6 +3069,83 @@ void hvm_task_switch(
> hvm_unmap_entry(nptss_desc);
> }
>
> +enum hvm_translation_result hvm_translate_get_page(
> +struct vcpu *v, unsigned long addr, bool linear,
On Mon, Sep 18, 2017 at 10:05:07AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> > Jennifer Herbert
> > Sent: 14 September 2017 16:34
> > To: Ian Jackson ; Wei Liu ;
> > xen-de...@lists.xenproject.org; jto...@uw
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 18 September 2017 14:20
> To: Paul Durrant
> Cc: Jennifer Herbert ; Ian Jackson
> ; Wei Liu ; xen-
> de...@lists.xenproject.org; jto...@uwaterloo.ca
> Subject: Re: [Xen-devel] [PATCH 2/2] Introduce migration precopy
Jennifer Herbert writes ("[PATCH 2/2] Introduce migration precopy policy"):
> This Patch allows a migration precopy policy to be specified.
But only for direct libxc users. How do you think this should be
exposed via libxl ?
The general approach, so far, seems sound.
Thanks,
Ian.
_
>>> On 08.09.17 at 18:05, wrote:
> Changes since V1:
> - Moved ASSERT to the begining of the loop
> - Corrected the decrement on mfn int the while statement
> - Modified the comment to PAGE_SIZE+1
While several of my v1 comments were taken care of verbally, some
haven't been add
On 09/18/2017 12:11 PM, Juergen Gross wrote:
> On 18/09/17 13:05, George Dunlap wrote:
>> On 09/18/2017 11:46 AM, Roger Pau Monné wrote:
>>> On Mon, Sep 18, 2017 at 11:15:03AM +0100, George Dunlap wrote:
On 09/18/2017 10:45 AM, Roger Pau Monné wrote:
> On Mon, Sep 18, 2017 at 10:37:58AM +0
On Thu, Sep 14, 2017 at 04:33:58PM +0100, Jennifer Herbert wrote:
> This Patch allows a migration precopy policy to be specified.
>
> The precopy phase of the xc_domain_save() live migration algorithm has
> historically been implemented to run until either a) (almost) no pages
> are dirty or b) so
Coverity-ID: 1418097
Signed-off-by: Wei Liu
---
tools/libxl/libxl_vdispl.c | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_vdispl.c b/tools/libxl/libxl_vdispl.c
index 5740c89fad..befc56bdeb 100644
--- a/tools/libxl/libxl_vdispl.c
+++ b/tools/libxl/li
libxl__read_xenstore can return NULL. Use the _mandatory variant to
return early when the read fails.
Coverity-ID: 1418098
Signed-off-by: Wei Liu
---
tools/libxl/libxl_vtpm.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_vtpm.c b/tools/libxl/libxl_
Coverity-ID: 1418095
Signed-off-by: Wei Liu
---
tools/xl/xl_parse.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 9965b83c44..0678fbc1b0 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -832,6 +832,8 @@ int parse_vdispl_config(
v2: use _mandatory variant
Wei Liu (3):
libxl: use libxl__read_xenstore_mandatory in vtpm function
libxl: use libxl__read_xenstore_mandatory in vdispl function
xl: avoid leaking memory in vdispl parser
tools/libxl/libxl_vdispl.c | 8 ++--
tools/libxl/libxl_vtpm.c | 7 +--
tools/x
Jan Beulich writes ("Re: [PATCH 01/22] xen: Provide XEN_DMOP_remote_shutdown"):
> >>> On 15.09.17 at 20:48, wrote:
> > SCHEDOP_remote_shutdown should be a DMOP so that a deprivileged qemu
> > can do the propery tidying up.
> >
> > We should remove SCHEDOP_remote_shutdown at some point.
>
> Excep
On Fri, Sep 15, 2017 at 10:05:22AM -0600, Jan Beulich wrote:
> >>> On 15.09.17 at 16:04, wrote:
> > Set free_heap_pages()'s need_scrub to true if alloc_domheap_pages()
> > returns pages back to heap as result of assign_pages() error when those
> > pages were requested with MEMF_no_scrub flag.
> >
1 - 100 of 170 matches
Mail list logo