Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.15-rc5-tag
xen: fixes for 4.15-rc5
It contains two fixes for running under Xen:
- a fix avoiding resource conflicts between adding mmio areas and memory
hotplug
- a fix setting N
On 22/12/17 07:40, Alex Braunegg wrote:
> Hi all,
>
> Experienced the same issue again today:
Ccing the maintainers.
Juergen
>
>
> =
>
> vif vif-2-0 vif2.0: Trying to unmap invalid handle! pending_idx: 0x2f
Adi,
thanks for the data.
I won't be able to look into this before next year, sorry.
Juergen
On 20/12/17 23:30, Adi Pircalabu wrote:
> On 20-12-2017 21:44, Juergen Gross wrote:
>> On 19/12/17 07:31, Adi Pircalabu wrote:
>>> Posted initially to centos-virt mailing list. Please note I'm not
>>>
Hi all,
Experienced the same issue again today:
=
vif vif-2-0 vif2.0: Trying to unmap invalid handle! pending_idx: 0x2f
[ cut here ]
kernel BUG at drivers/net/xen-netback/netback.c:430!
i
On 12/21/2017 10:26 AM, Brian Woods wrote:
> Checks the hvm EFER.SVME bit to make sure the EFER.SVME bit it high
s/it/is
> before allowing nested SVM intercepts to be handled successfully. On
> SVME being low, it generates a #UD as per the AMD APM vol2 15.4.
>
> Reported-by: Andrew Cooper
> Sig
On 12/21/2017 10:26 AM, Brian Woods wrote:
> Add a nestedhvm_enable() check to the existing checks for setting the
> virtual GIF and virtual VMLOAD/VMSAVE features. If it isn't a nestedhvm
> guest, do not enable the features in the VMCB.
>
> Signed-off-by: Brian Woods
Reviewed-by: Boris Ostrovsk
.snip..
> diff --git a/shutdown.c b/shutdown.c
> new file mode 100644
> index 000..b3cea6d
> --- /dev/null
> +++ b/shutdown.c
> @@ -0,0 +1,188 @@
> +/*
> + * MiniOS
> + *
> + * file: fromdevice.cc
> + *
> + * NEC Europe Ltd. PROPRIETARY INFORMATION
> + *
> + * This software
## Alex Braunegg (alex.braun...@gmail.com):
> With Christoph any myself reporting the same kernel crash when using
> 4.14.x kernels and Xen 4.8.2 is there any chance to look at this bug
> before 4.8.3 is released?
As "our" bug seems to be kernel-side (I've no problems in 4.13.16, or
any other 4.
Hi Andrew, Jan, Ian,
With Christoph any myself reporting the same kernel crash when using 4.14.x
kernels and Xen 4.8.2 is there any chance to look at this bug before 4.8.3 is
released?
Best regards,
Alex
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.or
Hello, Kevin, all,
> Given the state gets me to a point where I can't log into the server
> directly any longer, what's the best way to obtain the debug key output
> at that point? I have access to IPMI with video and serial outputs.
IPMI is good, you can use SOL (Serial Over Lan) with it.
You
> -Original Message-
> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> Sent: 21 December 2017 17:24
> To: net...@vger.kernel.org
> Cc: Joao Martins ; Wei Liu
> ; Paul Durrant ; xen-
> de...@lists.xenproject.org
> Subject: [PATCH net-next v2] xen-netback: make copy batch size
> confi
Commit eb1723a29b9a ("xen-netback: refactor guest rx") refactored Rx
handling and as a result decreased max grant copy ops from 4352 to 64.
Before this commit it would drain the rx_queue (while there are
enough slots in the ring to put packets) then copy to all pages and write
responses on the ring
On 12/21/2017 03:38 AM, Jan Beulich wrote:
> (dropping xen-users, to avoid cross posting)
>
On 20.12.17 at 18:40, wrote:
>> On Fri, Dec 8, 2017 at 9:17 PM, Kevin Stange wrote:
>>> Hi,
>>>
>>> I've been running Xen 4.4 stably for some time under kernel 4.9 in dom0
>>> on CentOS 6 and have be
Hello.
I have installed Xen-4.9 from Ubuntu 17.10 package. And I would like to profile
it with OProfile (as far as I know this is the only option).
With instruction from
http://wiki.prgmr.com/mediawiki/index.php/Chapter_10:_Profiling_and_Benchmarking_Under_Xen#Profiling_with_Xen
I have been a
Checks the hvm EFER.SVME bit to make sure the EFER.SVME bit it high
before allowing nested SVM intercepts to be handled successfully. On
SVME being low, it generates a #UD as per the AMD APM vol2 15.4.
Reported-by: Andrew Cooper
Signed-off-by: Brian Woods
---
xen/arch/x86/hvm/svm/svm.c | 29 ++
Add a nestedhvm_enable() check to the existing checks for setting the
virtual GIF and virtual VMLOAD/VMSAVE features. If it isn't a nestedhvm
guest, do not enable the features in the VMCB.
Signed-off-by: Brian Woods
---
xen/arch/x86/hvm/svm/vmcb.c | 5 +++--
1 file changed, 3 insertions(+), 2 d
This is small patch series which does some basic maintenance work in the
SVM section.
1. Add support for checking the SVME bit before doing nested SVM
operations
2. Add support for checking if nestedhvm is enabled before enabling
nested SVM features in the VMCB.
Brian Woods (2):
x86/sv
The EFI image should be relocatable. At the moment, all the stub is
relocatable but one place.
On both Arm64 and x86-64 (from a quick glance) , the compiler will generate
absolute pointer in the ErrCodeToStr array. Those values are based on Xen
view of the virtual memory and may not be the same as
Hi all,
For the sake of completeness: the solution to the issue stated in my
last email was deactivating Intel's Turbo Boost technology directly in
UEFI (deactivating Turbo Boost through xenpm was not enough). Apparently
Turbo Boost affects Linux and KVM differently than Xen, which led to the
phon
From: David Gibson
The bus pointer in PCIDevice is basically redundant with QOM information.
It's always initialized to the qdev_get_parent_bus(), the only difference
is the type.
Therefore this patch eliminates the field, instead creating a pci_get_bus()
helper to do the type mangling to derive
From: David Gibson
A fair proportion of the users of pci_bus_num() want to get the bus
number on a specific device, so first have to look up the bus from the
device then call it. This adds a helper to do that (since we're going
to make looking up the bus slightly more verbose).
Signed-off-by: D
On 20/12/17 15:14, Jan Beulich wrote:
> All,
>
> with the goal of releasing relatively soon after New Year, please
> point out backport candidates you find missing from the respective
> staging branches, but which you consider relevant.
Travis (with a newly updated Clang) is showing build failures
flight 73153 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/73153/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-i38
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 21 December 2017 11:31
> To: Paul Durrant
> Cc: JulienGrall ; Andrew Cooper
> ; George Dunlap
> ; Ian Jackson ; Wei Liu
> ; StefanoStabellini ; xen-
> de...@lists.xenproject.org; Tim (Xen.org)
> Subject: RE: [Xen-
>>> On 21.12.17 at 11:01, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 21 December 2017 09:47
>> >>> On 20.12.17 at 18:02, wrote:
>> >> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On
>> Behalf
>> >> Of Jan Beulich
>> >> Sent: 20 December 2017 16:35
>> >> >>>
flight 117374 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117374/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 15 guest-saverestore.2 fail REGR. vs.
117255
test-armhf-ar
Hello Wang,
On 20.12.17 23:29, Wang, Baoqian wrote:
(XEN) 3... 2... 1...
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch
input to Xen)
(XEN) Freed 288kB init memory.
Try switching to XEN console now. Hit Ctrl-a three (six with minicom)
times, then '0'.
--
*Andrii Aniso
flight 117376 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117376/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 7 xen-boot fail REGR. vs. 117305
test-amd64-i386-xl
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 21 December 2017 09:47
> To: Paul Durrant
> Cc: JulienGrall ; Andrew Cooper
> ; George Dunlap
> ; Ian Jackson ; Wei Liu
> ; Stefano Stabellini ; xen-
> de...@lists.xenproject.org; Tim (Xen.org)
> Subject: RE: [Xen
>>> On 20.12.17 at 18:02, wrote:
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
>> Of Jan Beulich
>> Sent: 20 December 2017 16:35
>> >>> On 15.12.17 at 11:41, wrote:
>> > +static int hvm_alloc_ioreq_mfn(struct hvm_ioreq_server *s, bool buf)
>> > +{
>> > +struct h
(dropping xen-users, to avoid cross posting)
>>> On 20.12.17 at 18:40, wrote:
> On Fri, Dec 8, 2017 at 9:17 PM, Kevin Stange wrote:
>> Hi,
>>
>> I've been running Xen 4.4 stably for some time under kernel 4.9 in dom0
>> on CentOS 6 and have been trying to finally move my environment up to
>> Xen
>>> On 20.12.17 at 20:15, wrote:
> spin_unlock() has full barrier semantics already.
>
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen
32 matches
Mail list logo