On 10/27/17 14:49 +0800, Chao Peng wrote:
> On Mon, 2017-09-11 at 12:37 +0800, Haozhong Zhang wrote:
> > The current check refuses the hot-plugged memory that falls in one
> > unused PDX group, which should be allowed.
>
> Looks reasonable to me. The only thing I can think of is you can double
> c
Hi Wei,
On 26 October 2017 at 16:56, Wei Liu wrote:
> On Wed, Oct 25, 2017 at 02:57:08PM +0530, Bhupinder Thakur wrote:
>> xenconsole will use a new macro XEN_INVALID_PFN instead of -1 for
>> initializing ring-ref.
>
> Can you please paste in the error if the compilation fails with -1?
>
> The w
On 27 October 2017 at 12:34, Bhupinder Thakur
wrote:
> Hi Wei,
>
> On 26 October 2017 at 16:56, Wei Liu wrote:
>> On Wed, Oct 25, 2017 at 02:57:08PM +0530, Bhupinder Thakur wrote:
>>> xenconsole will use a new macro XEN_INVALID_PFN instead of -1 for
>>> initializing ring-ref.
>>
>> Can you pleas
>>> On 26.10.17 at 21:29, wrote:
> On 26/10/17 19:49, Craig Bergstrom wrote:
>> Sander, thanks for the details, they've been very useful.
>>
>> I suspect that your host system's mem=2048M parameter is causing the
>> problem. Any chance you can confirm by removing the parameter and
>> running the
>>> On 26.10.17 at 22:48, wrote:
> - While adding some extra logging and enabling the logging on xen pt in
> qemu,
> i wonder if it wouldn't be beneficial to have at least some basic logging
> permanently enabled ?
For this end everything further down you would better have added
the qemu mai
Hi Boris,
On 10/25/2017 11:12 PM, Boris Ostrovsky wrote:
> On 10/25/2017 02:45 AM, Dongli Zhang wrote:
>> After guest live migration on xen, steal time in /proc/stat
>> (cpustat[CPUTIME_STEAL]) might decrease because steal returned by
>> xen_steal_lock() might be less than this_rq()->prev_steal_ti
Xen 4.6 Hypervisor Fails to Boot and is Hanged in "Turning on Paging":
EVM : TI DRA7XX OMAP5
Xen versions - 4.6
Uboot version - 2016.05
Kernel Version - 4.4
Dev Host - 14.04
Output :- Turn on Paging error
Please find the below logs:-
Welcome to minicom 2.5
OPTIONS: I18n
Co
This bug exist much long time, there are many discussion last year but not a
solution then. I call out it now because there is a fix in qemu upstream:
commit a8036336609d2e184fc3543a4c439c0ba7d7f3a2
Author: Roger Pau Monne
Date: Thu Aug 24 16:07:03 2017 +0100
xen/pt: allow QEMU to request
On 27/10/17 09:16, Dongli Zhang wrote:
> Hi Boris,
>
> On 10/25/2017 11:12 PM, Boris Ostrovsky wrote:
>> On 10/25/2017 02:45 AM, Dongli Zhang wrote:
>>> After guest live migration on xen, steal time in /proc/stat
>>> (cpustat[CPUTIME_STEAL]) might decrease because steal returned by
>>> xen_steal_l
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.14c-rc7-tag
xen: fixes for 4.14-rc7
It contains:
- a fix for the Xen gntdev device repairing an issue in case of partial
failure of mapping multiple pages of another domain
- a fi
Hi Juergen,
On 10/27/2017 03:31 PM, Juergen Gross wrote:
> On 27/10/17 09:16, Dongli Zhang wrote:
>> Hi Boris,
>>
>> On 10/25/2017 11:12 PM, Boris Ostrovsky wrote:
>>> On 10/25/2017 02:45 AM, Dongli Zhang wrote:
After guest live migration on xen, steal time in /proc/stat
(cpustat[CPUTIME
On 27/10/17 09:40, Dongli Zhang wrote:
> Hi Juergen,
>
> On 10/27/2017 03:31 PM, Juergen Gross wrote:
>> On 27/10/17 09:16, Dongli Zhang wrote:
>>> Hi Boris,
>>>
>>> On 10/25/2017 11:12 PM, Boris Ostrovsky wrote:
On 10/25/2017 02:45 AM, Dongli Zhang wrote:
> After guest live migration on
On Mon, 2017-09-11 at 12:37 +0800, Haozhong Zhang wrote:
> cleanup_frame_table() initializes the entire newly added frame table
> to all -1's. If it's called after extend_frame_table() failed to map
> the entire frame table, the initialization will hit a page fault.
>
> Move the cleanup of partial
On 27/10/17 00:30, Boris Ostrovsky wrote:
> On 10/26/2017 04:48 PM, Sander Eikelenboom wrote:
>> Hi Boris / Andrew,
>>
>> In the aftermath of the linux mmap path I have some questions regarding
>> pci-passthrough:
>>
>> - Is pci-passthrough in combination with an auto-ballooning dom0 supposed to
We performed Xen 4.10 RC1 testing on Intel Xeon Skylake, Broadwell server,
Intel Atom Denverton platforms, verified many functional features, which
include new features Local MCE, L2 CAT and UMIP on Xen 4.10. We'd like to share
the result out.
Most of features passed to testing on Xen 4.10 RC1,
>>> On 27.10.17 at 09:27, wrote:
> This bug exist much long time, there are many discussion last year but not a
> solution then. I call out it now because there is a fix in qemu upstream:
> commit a8036336609d2e184fc3543a4c439c0ba7d7f3a2
> Author: Roger Pau Monne
> Date: Thu Aug 24 16:07:03 20
flight 72360 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72360/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-jessie-netboot-pygrub 1 build-check(1) blocked n/a
build-arm64-pvops
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Friday, October 27, 2017 4:38 PM
> To: Julien Grall ; Anthony PERARD
> ; Hao, Xudong ;
> sstabell...@kernel.org
> Cc: Lars Kurth ; Wei Liu ; Quan Xu
> ; Kang, Luwei ; Zhang,
> PengtaoX ; Xen-devel de...@lists.xenpr
>>> On 27.10.17 at 10:28, wrote:
> RAS:
> [BUG] xen-mceinj tool testing cause dom0 crash
> https://www.mail-archive.com/xen-devel@lists.xen.org/msg108671.html
Please can you provide helpful links? This doesn't point to the
beginning of the thread, and the mail archive chosen doesn't
appear to h
On 27/10/17 07:58, Chao Peng wrote:
> On Mon, 2017-09-11 at 12:37 +0800, Haozhong Zhang wrote:
>> Replace pdx_to_page(pfn_to_pdx(pfn)) by mfn_to_page(pfn), which is
>> identical to the former.
> Looks good to me.
Is that a Reviewed-by: then?
>
> Chao
>> Signed-off-by: Haozhong Zhang
>> ---
>> Cc
On 27/10/17 09:28, Hao, Xudong wrote:
>
> We performed Xen 4.10 RC1 testing on Intel Xeon Skylake, Broadwell
> server, Intel Atom Denverton platforms, verified many functional
> features, which include new features Local MCE, L2 CAT and UMIP on Xen
> 4.10. We’d like to share the result out.
>
>
>
Stefano Stabellini writes ("Re: [PATCH v5.1 1/8] xen: link against
xentoolcore"):
> On Fri, 20 Oct 2017, Ian Jackson wrote:
> >then
> > - xen_stable_libs="-lxendevicemodel $xen_stable_libs"
> > + xen_stable_libs="-lxendevicemodel $xen_stable_libs -lxentoolcore"
>
> Is it on purp
Stefano Stabellini writes ("Re: [PATCH v5.1 6/8] xen: destroy_hvm_domain: Try
xendevicemodel_shutdown"):
> On Fri, 20 Oct 2017, Ian Jackson wrote:
> > xc_interface_open etc. is not going to work if we have dropped
> > privilege, but xendevicemodel_shutdown will if everything is new
> > enough.
> >
Stefano Stabellini writes ("Re: [PATCH v5.1 2/8] xen: restrict: use
xentoolcore_restrict_all"):
> On Fri, 20 Oct 2017, Ian Jackson wrote:
...
> > Drop individual use of xendevicemodel_restrict and
> > xenforeignmemory_restrict. These are not actually effective in this
> > version of qemu, because
Stefano Stabellini writes ("Re: [PATCH v5.1 7/8] os-posix: Provide new -runas
: facility"):
> CC'ing the maintainers (scripts/get_maintainer.pl is your friend)
I don't know what your scripts/get_maintainer.pl does, but mine
says:
get_maintainer.pl: No maintainers found, printing recent contrib
Stefano Stabellini writes ("Re: [PATCH v5.1 8/8] configure: do_compiler: Dump
some extra info under bash"):
> CC'ing the maintainers for this.
Thanks, but scripts/get_maintainer.pl seems to print different
information for me... (see my other mail)
Ian.
__
Hi,
On 27/10/17 08:27, Hao, Xudong wrote:
This bug exist much long time, there are many discussion last year but not a
solution then. I call out it now because there is a fix in qemu upstream:
commit a8036336609d2e184fc3543a4c439c0ba7d7f3a2
Author: Roger Pau Monne
Date: Thu Aug 24 16:07:03 2
flight 115272 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115272/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stopfail REGR. vs. 114644
test-amd64-amd64-x
Hi,
On 26/10/17 16:39, Jan Beulich wrote:
On 26.10.17 at 17:32, wrote:
On 26/10/17 16:26, Jan Beulich wrote:
On 17.10.17 at 15:24, wrote:
+/* IN/OUT - If the tools domain is PV then, upon return, frame_list
+ * will be populated with the MFNs of the resource.
+ *
Hi,
On 26/10/17 08:30, Jan Beulich wrote:
1: don't latch wrong (stale) GS base addresses
2: fix asm() constraint for GS selector update
Patch 1 is strictly a bug fix. Patch 2 could be considered a merely
cosmetic change, as there's no known bad effect from the wrong
constraint so far, but perso
Hi Jan,
On 26/10/17 11:47, Jan Beulich wrote:
On 25.10.17 at 20:53, wrote:
[adhoc adhoc]
harness 8f16840: MaxUmask: enforce a maximum umask value
115230: all pass
flight 115230 xen-unstable adhoc [adhoc]
http://logs.test-lab.xenproject.org/osstest/logs/115230/
I assume this having been an
Hi,
On 26/10/17 12:03, Wei Liu wrote:
On Thu, Oct 26, 2017 at 09:15:46AM +0100, Julien Grall wrote:
Hi Juergen,
On 10/26/2017 08:31 AM, Juergen Gross wrote:
On 24/10/17 12:09, Andrew Cooper wrote:
On 23/10/17 11:20, Juergen Gross wrote:
On 06/10/17 15:30, Julien Grall wrote:
Hi,
On 27/09/
flight 115275 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115275/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 114814
Tests which did not s
On Fri, Oct 20, 2017 at 10:22:55AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> > Ross Lagerwall
> > Sent: 18 October 2017 15:04
> > To: Xen-devel
> > Cc: Ross Lagerwall ; Ian Jackson
> > ; Wei Liu
> > Subjec
On Fri, Oct 27, 2017 at 01:46:24AM +, osstest service owner wrote:
> flight 115244 linux-linus real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/115244/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-a
On 10/27/2017 12:45 PM, Wei Liu wrote:
On Fri, Oct 20, 2017 at 10:22:55AM +0100, Paul Durrant wrote:
...
CFLAGS += -Werror -Wmissing-prototypes
diff --git a/tools/libs/devicemodel/core.c b/tools/libs/devicemodel/core.c
index b66d4f9..2a23077 100644
--- a/tools/libs/devicemodel/core.c
+++ b/t
flight 115280 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115280/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3866 xen-buildfail REGR. vs. 114507
build-amd64-xsm
On 10/27/2017 04:16 AM, Sander Eikelenboom wrote:
On 27/10/17 00:30, Boris Ostrovsky wrote:
On 10/26/2017 04:48 PM, Sander Eikelenboom wrote:
- Enabling the xen pt logging in qemu spit out some things, i wonder if they
are normal:
qemu-system-i386: -serial pty: char device redirect
Hi,
On 27/10/17 08:23, Srini wrote:
Xen 4.6 Hypervisor Fails to Boot and is Hanged in "Turning on Paging":
Again, as I already said on embedded-pv-devel ML, why are you using Xen
4.6? It was released 2 years ago and supported anymore.
You should try Xen 4.9 first and report if it still does
Hi Stefano,
On 26/10/17 00:50, Stefano Stabellini wrote:
On Tue, 24 Oct 2017, Andre Przywara wrote:
From: Bhupinder Thakur
With the current SBSA UART emulation, streaming larger amounts of data
(as caused by "find /", for instance) can lead to character loses.
On 25/10/17 11:30, Andrew Cooper wrote:
On 25/10/17 00:30, Boris Ostrovsky wrote:
This call was left during PVHv1 removal (commit 33e5c32559e1 ("x86:
remove PVHv1 code")):
-if ( is_pvh_vcpu(sampling) &&
- !(vpmu_mode & XENPMU_MODE_ALL) &&
+if ( !(vpmu_mode & XENPMU
Hi Juergen,
On 25/10/17 08:08, Juergen Gross wrote:
On 24/10/17 18:06, Julien Grall wrote:
Hi,
I think this is 4.10 material (particularly patch #5). Juergen, would it
be possible get the some feedback on this series?
Patch 5: Reviewed-by: Juergen Gross
Thank you!
For the series:
Releas
Hi,
Just answering to dom0 been 1:1 domain.
On 24/10/17 22:33, Stefano Stabellini wrote:
On Tue, 24 Oct 2017, Volodymyr Babchuk wrote:
For this series, I think we need a way to specify which domains can talk
to TEE, so that we can only allow it for a specific subset of DomUs. I
would probably
On Thu, Oct 26, 2017 at 05:25:36PM +0200, Olaf Hering wrote:
> An upcoming change in systemd will mount xenfs right away, along with
> all other system mounts. This improves the detection of the
> virtualization environment, which is currently racy. Some parts of
> systemd rely on the presence of /
Roger Pau Monne writes ("[PATCH for-next 1/9] gcov: return ENOSYS for
unimplemented gcov domctl"):
> Signed-off-by: Roger Pau Monné
...
> default:
> -ret = -EINVAL;
> +ret = -ENOSYS;
> break;
> }
Reviewed-by: Ian Jackson
I think this is a bugfix which should
Hi,
On 27/10/17 14:59, Ian Jackson wrote:
Roger Pau Monne writes ("[PATCH for-next 1/9] gcov: return ENOSYS for unimplemented
gcov domctl"):
Signed-off-by: Roger Pau Monné
...
default:
-ret = -EINVAL;
+ret = -ENOSYS;
break;
}
Reviewed-by: Ian Jackson
Xen Developers,
Attempting to run Xen on a second generation (has switches instead of jumpers)
HiKey 960, following the guidance on the Xen wiki. Everything builds, flashes,
and runs as expected up to the point shown below. Xen hangs in a loop detecting
rcu_preempt stalls. The specific CPU is n
Hi,
On 25/10/17 09:22, Manish Jaggi wrote:
>
>
> On 10/23/2017 7:27 PM, Andre Przywara wrote:
>> Hi Manish,
>>
>> On 12/10/17 22:03, Manish Jaggi wrote:
>>> ACPI/IORT Support in Xen.
>>> --
>>>
>>> I had sent out patch series [0] to hide smmu from Dom0 IORT. Ext
flight 115298 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115298/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Intel IceLake cpu has added new cpu features: AVX512VBMI2/GFNI/
VAES/AVX512VNNI/AVX512BITALG/VPCLMULQDQ. Those new cpu features
need expose to guest.wq
The bit definition:
CPUID.(EAX=7,ECX=0):ECX[bit 06] AVX512VBMI2
CPUID.(EAX=7,ECX=0):ECX[bit 08] GFNI
CPUID.(EAX=7,ECX=0):ECX[bit 09] VAES
CPUID.(E
On 10/27/17 1:37 AM, Jan Beulich wrote:
On 26.10.17 at 23:05, wrote:
>> On 10/18/17 4:50 AM, Jan Beulich wrote:
>> On 17.10.17 at 23:41, wrote:
From: David Esler
In 9180f5365524 a change was made to the send_chr function to take in
C-strings and print out a character
On 10/27/17 7:41 AM, Julien Grall wrote:
> Hi,
>
> On 27/10/17 08:23, Srini wrote:
>> Xen 4.6 Hypervisor Fails to Boot and is Hanged in "Turning on Paging":
>
> Again, as I already said on embedded-pv-devel ML, why are you using Xen
> 4.6? It was released 2 years ago and supported anymore.
I hav
On 10/09/2017 10:14 AM, Lars Kurth wrote:
>
>> On 27 Sep 2017, at 13:57, Robert VanVossen
>> wrote:
>>
>>
>>
>> On 9/26/2017 3:12 AM, Dario Faggioli wrote:
>>> [Cc-list modified by removing someone and adding someone else]
>>>
>>> On Mon, 2017-09-25 at 16:10 -0700, Stefano Stabellini wrote:
>>
> -Original Message-
> From: Julien Grall [mailto:julien.gr...@linaro.org]
> Sent: 27 October 2017 12:46
> To: Jan Beulich ; Paul Durrant
>
> Cc: Julien Grall ; Andrew Cooper
> ; Wei Liu ; George
> Dunlap ; Ian Jackson ;
> Stefano Stabellini ; xen-de...@lists.xenproject.org;
> Konrad Rzesz
flight 115279 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115279/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop fail REGR. vs. 114682
Tests which did not
Commit:
9043442b43b1 ("locking/paravirt: Use new static key for controlling
call of virt_spin_lock()")
set the static virt_spin_lock_key to a value before jump_label_init()
has been called, which will result in a WARN().
Move the native_pv_lock_init() into xx_smp_prepare_cpus(). Make the
set
Roger Pau Monne writes ("[PATCH v6 07/20] osstest: introduce
resource_shared_mark_ready"):
> That allows marking a host as ready to be shared. Replace the current
> caller that open-codes it.
...
> -$mjobdb->jobdb_resource_shared_mark_ready
> - ($ho->{Ident}, $ho->{Name}, "build-".$ho->{Suite}."
flight 115282 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115282/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 115247
test-armhf-armhf-libvirt 14 saveresto
It is possible to send a zero-string message body to xenstore's
XS_CONTROL handling function. Then the number of strings is used
for an array allocation. This leads to a crash in strcmp() in a
CONTROL sub-command invocation loop.
The output of xs_count_string() should be verified and all 0 or
negat
Pawel Wieczorkiewicz writes ("[PATCH] tools/xenstored: Check number of strings
passed to do_control()"):
> It is possible to send a zero-string message body to xenstore's
> XS_CONTROL handling function. Then the number of strings is used
> for an array allocation. This leads to a crash in strcmp()
This function only works on resource of restype `host'. Ie, hosts.
Signed-off-by: Ian Jackson
CC: Roger Pau Monné
---
Osstest/TestSupport.pm | 4 ++--
ts-freebsd-host-install | 4 ++--
ts-xen-build-prep | 2 +-
3 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/Osstest/TestS
$ho->{Ident} is completely wrong here. That, ultimately, is going to
be restype. But restype must be the fixed value `host'. If this
function were called with a $ho whose Ident was `src_host' or
something, it would fail because hosts are all restype `host' in the
datanase, of course.
Also `$res
On October 27, 2017 6:02:00 PM GMT+02:00, Dou Liyang
wrote:
>Commit:
>
> 9043442b43b1 ("locking/paravirt: Use new static key for controlling
> call of virt_spin_lock()")
>
>set the static virt_spin_lock_key to a value before jump_label_init()
>has been called, which will result in a WARN().
>
>
From: Andrii Anisov
/var/log could be a tmpfs mount point, so create xen subfolder at runtime.
Signed-off-by: Andrii Anisov
Reviewed-by: Volodymyr Babchuk
Reviewed-by: Oleksandr Andrushchenko
---
tools/hotplug/Linux/init.d/xencommons.in | 1 +
1 file changed, 1 insertion(+)
diff --git a/too
flight 115301 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115301/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Hello,
These are the remaining FreeBSD host setup patches. I've only sent the
ones that changed or are new in this version.
Branch can be found at:
git://xenbits.xen.org/people/royger/osstest.git freebsd_v14
Thanks, Roger.
___
Xen-devel mailing list
Since at the moment osstest only builds FreeBSD on FreeBSD, there are
no dependencies to install. Just mark the host as ready to share.
Signed-off-by: Roger Pau Monné
---
ts-build-prep-freebsd | 37 +
ts-freebsd-host-install | 3 ---
2 files changed, 37 ins
Add support and introduce a FreeBSD build job to sg-run-job.
Signed-off-by: Roger Pau Monné
---
Changes since v13:
- Run ts-build-prep-freebsd for FreeBSD build host setup.
Changes since v5:
- Add a '+' to the arguments passed to ts-freebsd-set-hostflags, so
they are hidden from testid.
Ch
That allows marking a host as ready to be shared. Replace the current
callers that open-code it.
Signed-off-by: Roger Pau Monné
---
Changes since v13:
- s/resource_shared_mark_ready/host_shared_mark_ready/.
- First argument of jobdb_resource_shared_mark_ready must be 'host'.
Changes since v4:
Boris Petkov writes:
> On October 27, 2017 6:02:00 PM GMT+02:00, Dou Liyang
> wrote:
>>Commit:
>>
>> 9043442b43b1 ("locking/paravirt: Use new static key for controlling
>> call of virt_spin_lock()")
>>
>>set the static virt_spin_lock_key to a value before jump_label_init()
>>has been called,
On Fri, 27 Oct 2017, Ian Jackson wrote:
> Stefano Stabellini writes ("Re: [PATCH v5.1 2/8] xen: restrict: use
> xentoolcore_restrict_all"):
> > On Fri, 20 Oct 2017, Ian Jackson wrote:
> ...
> > > Drop individual use of xendevicemodel_restrict and
> > > xenforeignmemory_restrict. These are not act
On 27/10/17 18:32, Pawel Wieczorkiewicz wrote:
> It is possible to send a zero-string message body to xenstore's
> XS_CONTROL handling function. Then the number of strings is used
> for an array allocation. This leads to a crash in strcmp() in a
> CONTROL sub-command invocation loop.
> The output o
On Fri, Oct 27, 2017 at 07:52:37PM +0300, Andrii Anisov wrote:
> From: Andrii Anisov
>
> /var/log could be a tmpfs mount point, so create xen subfolder at runtime.
>
> Signed-off-by: Andrii Anisov
> Reviewed-by: Volodymyr Babchuk
> Reviewed-by: Oleksandr Andrushchenko
Acked-by: Wei Liu
Jul
On 27/10/17 19:09, Vitaly Kuznetsov wrote:
> Boris Petkov writes:
>
>> On October 27, 2017 6:02:00 PM GMT+02:00, Dou Liyang
>> wrote:
>>> Commit:
>>>
>>> 9043442b43b1 ("locking/paravirt: Use new static key for controlling
>>> call of virt_spin_lock()")
>>>
>>> set the static virt_spin_lock_ke
On 27/10/17 18:02, Dou Liyang wrote:
> Commit:
>
> 9043442b43b1 ("locking/paravirt: Use new static key for controlling
> call of virt_spin_lock()")
>
> set the static virt_spin_lock_key to a value before jump_label_init()
> has been called, which will result in a WARN().
>
> Move the native_
On 16/02/17 11:15, Jan Beulich wrote:
> When __context_switch() is being bypassed during original context
> switch handling, the vCPU "owning" the VMCS partially loses control of
> it: It will appear non-running to remote CPUs, and hence their attempt
> to pause the owning vCPU will have no effect
Physical addresses on processors supporting 5 level paging can be up to
52 bits wide. For a Xen pv guest running on such a machine those
physical addresses have to be supported in order to be able to use any
memory on the machine even if the guest itself does not support 5 level
paging.
So when re
Roger Pau Monne writes ("[PATCH 04/16] osstest: introduce
host_shared_mark_ready"):
> That allows marking a host as ready to be shared. Replace the current
> callers that open-code it.
>
> Signed-off-by: Roger Pau Monné
> ---
> Changes since v13:
> - s/resource_shared_mark_ready/host_shared_mar
Roger Pau Monne writes ("[PATCH 12/16] osstest: add script to install build
dependencies on FreeBSD"):
> Since at the moment osstest only builds FreeBSD on FreeBSD, there are
> no dependencies to install. Just mark the host as ready to share.
Acked-by: Ian Jackson
__
Roger Pau Monne writes ("[PATCH 14/16] osstest: add support for FreeBSD
buildjobs to sg-run-job"):
> Add support and introduce a FreeBSD build job to sg-run-job.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xe
On Fri, 27 Oct 2017, Julien Grall wrote:
> Hi,
>
> Just answering to dom0 been 1:1 domain.
>
> On 24/10/17 22:33, Stefano Stabellini wrote:
> > On Tue, 24 Oct 2017, Volodymyr Babchuk wrote:
> > > > For this series, I think we need a way to specify which domains can talk
> > > > to TEE, so that we
flight 115303 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115303/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 27 Oct 2017 20:59, "Stefano Stabellini" wrote:
On Fri, 27 Oct 2017, Julien Grall wrote:
> Hi,
>
> Just answering to dom0 been 1:1 domain.
>
> On 24/10/17 22:33, Stefano Stabellini wrote:
> > On Tue, 24 Oct 2017, Volodymyr Babchuk wrote:
> > > > For this series, I think we need a way to specify
New tigervnc server changes the way to send long pressed key,
from "down up down up ..." to "down down ... up". So we insert
an up event after each key down event to simulate auto-repeat
key events for xen keyboard frontend driver.
Signed-off-by: Liang Yan
---
hw/display/xenfb.c | 3 +++
1 file
On Fri, 27 Oct 2017, Julien Grall wrote:
> On 27/10/17 08:27, Hao, Xudong wrote:
> > This bug exist much long time, there are many discussion last year but not a
> > solution then. I call out it now because there is a fix in qemu upstream:
> > commit a8036336609d2e184fc3543a4c439c0ba7d7f3a2
> > Aut
On 10/27/2017 01:49 PM, Juergen Gross wrote:
Physical addresses on processors supporting 5 level paging can be up to
52 bits wide. For a Xen pv guest running on such a machine those
physical addresses have to be supported in order to be able to use any
memory on the machine even if the guest it
On Fri, Sep 22, 2017 at 5:11 PM, Daniel Kiper wrote:
> On Fri, Sep 22, 2017 at 02:25:46AM -0600, Jan Beulich wrote:
>> >>> On 22.09.17 at 00:46, wrote:
>> > One piece that I see still missing is the Xen command line parameters
>> > not being verified. It would be ideal to have the option to get t
flight 115289 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115289/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 114843
test-armhf-armhf-libvirt-xsm 14 savere
flight 115299 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115299/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3866 xen-buildfail REGR. vs. 114507
build-amd64-xsm
The passed-through device might be an express device. In this case the
old code allocated a too small emulated config space in
pci_config_alloc() since pci_config_size() returned the size for a
non-express device. This leads to an out-of-bound write in
xen_pt_config_reg_init(), which sometimes resu
flight 115290 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115290/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-examine 8 reboot fail REGR. vs. 114658
test-armhf-armhf-xl-
flight 115295 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115295/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stopfail REGR. vs. 114644
test-amd64-amd64-x
Commit:
9043442b43b1 ("locking/paravirt: Use new static key for controlling
call of virt_spin_lock()")
set the static virt_spin_lock_key to a value before jump_label_init()
has been called, which will result in a WARN().
Move the native_pv_lock_init() into native_smp_prepare_cpus(), and set
flight 115296 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115296/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 6 xen-install fail REGR. vs. 114814
test-amd64-amd64-xl-q
94 matches
Mail list logo