flight 128141 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128141/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-ws16-amd64 16 guest-localmigrate/x10 fail in 128097
pass in 128141
test-amd64-i386-xl-
flight 128134 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128134/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt broken
test-armhf-armhf-li
This run is configured for baseline tests only.
flight 75312 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75312/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
On 29/09/18 00:45, Stefano Stabellini wrote:
> On Sat, 29 Sep 2018, Andrew Cooper wrote:
>> On 28/09/18 21:35, Julien Grall wrote:
>>>
>>> On 09/28/2018 12:11 AM, Stefano Stabellini wrote:
On Wed, 26 Sep 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 09/25/2018 09:45 PM, Stefano St
On Fri, 28 Sep 2018, Julien Grall wrote:
> On 09/28/2018 12:34 AM, Stefano Stabellini wrote:
> > On Wed, 26 Sep 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 09/25/2018 09:38 PM, Stefano Stabellini wrote:
> > > > On Tue, 4 Sep 2018, Julien Grall wrote:
> > > > > At the moment, Xen is
On Sat, 29 Sep 2018, Andrew Cooper wrote:
> On 28/09/18 21:35, Julien Grall wrote:
> >
> >
> > On 09/28/2018 12:11 AM, Stefano Stabellini wrote:
> >> On Wed, 26 Sep 2018, Julien Grall wrote:
> >>> Hi Stefano,
> >>>
> >>> On 09/25/2018 09:45 PM, Stefano Stabellini wrote:
> On Tue, 4 Sep 2018, A
flight 128209 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128209/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 28/09/18 21:35, Julien Grall wrote:
>
>
> On 09/28/2018 12:11 AM, Stefano Stabellini wrote:
>> On Wed, 26 Sep 2018, Julien Grall wrote:
>>> Hi Stefano,
>>>
>>> On 09/25/2018 09:45 PM, Stefano Stabellini wrote:
On Tue, 4 Sep 2018, Andrew Cooper wrote:
> On 04/09/18 20:35, Julien Grall wr
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-examine
testid reboot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree:
On 09/28/2018 12:34 AM, Stefano Stabellini wrote:
On Wed, 26 Sep 2018, Julien Grall wrote:
Hi Stefano,
On 09/25/2018 09:38 PM, Stefano Stabellini wrote:
On Tue, 4 Sep 2018, Julien Grall wrote:
At the moment, Xen is assuming the hardware domain will have the same
number of re-distributor reg
On 09/28/2018 12:11 AM, Stefano Stabellini wrote:
On Wed, 26 Sep 2018, Julien Grall wrote:
Hi Stefano,
On 09/25/2018 09:45 PM, Stefano Stabellini wrote:
On Tue, 4 Sep 2018, Andrew Cooper wrote:
On 04/09/18 20:35, Julien Grall wrote:
Hi,
On 09/04/2018 08:21 PM, Julien Grall wrote:
A follo
flight 128191 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128191/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
These entries are not always sorted by checkpolicy. Enforce the sorting
(which can be done manually if using an unpatched checkpolicy) when
loading the policy so that later uses by the security server do not
incorrectly use the initial sid.
Reported-by: Nicolas Poirot
Signed-off-by: Daniel De Gr
This is apparently a mismatch between what the checkpolicy compilation does
and what it is expected to do. While some parts of checkpolicy do this
sorting, the main compilation flow does not, and the policy compilation
process does not ensure inputs are sorted. In the future, newer versions
of c
This run is configured for baseline tests only.
flight 75310 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75310/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
On 09/28/2018 04:18 AM, Xin Li wrote:
When SILO is enabled, there would be no page-sharing or event notifications
between unprivileged VMs (no grant tables or event channels).
Signed-off-by: Xin Li
v3: make copies of dummy functions to avoid indirect call.
This still makes indirect calls. Y
This allows all system domids to be printed by name, rather than special
casing the idle vcpus alone.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei Liu
CC: Julien Grall
v2:
* Render system names
On 09/28/2018 04:18 AM, Xin Li wrote:
Introduce new boot parameter xsm to choose which xsm module is enabled,
and set default to dummy.
Signed-off-by: Xin Li
This changes the default behavior of a hypervisor compiled with XSM+FLASK when
booted with no command line arguments from enabling FLAS
On 28/09/18 18:06, Wei Liu wrote:
> This helps capture issues before console is initialised.
>
> Signed-off-by: Wei Liu
Much nicer behaviour.
Acked-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.o
On 28/09/18 18:06, Wei Liu wrote:
> diff --git a/xen/arch/x86/guest/pvh-boot.c b/xen/arch/x86/guest/pvh-boot.c
> index 0e9e5bfdf6..3b44aee90a 100644
> --- a/xen/arch/x86/guest/pvh-boot.c
> +++ b/xen/arch/x86/guest/pvh-boot.c
> @@ -42,7 +42,17 @@ static void __init convert_pvh_info(void)
> modu
This helps capture issues before console is initialised.
Signed-off-by: Wei Liu
---
xen/arch/x86/setup.c | 5 +
xen/drivers/char/console.c | 10 --
xen/include/xen/console.h | 2 ++
3 files changed, 15 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/setup.c b/xen/ar
The relocation code in __start_xen requires one extra element in the
module array. By the looks of it the temporary array is already large
enough. Panic if that's not the case.
While at it, turn an ASSERT to panic() as well.
Signed-off-by: Wei Liu
---
xen/arch/x86/guest/pvh-boot.c | 12
Wei Liu (2):
x86: make sure module array is large enough in pvh-boot.c
xen: initialise opt_xen_console early in PVH boot path
xen/arch/x86/guest/pvh-boot.c | 12 +++-
xen/arch/x86/setup.c | 5 +
xen/drivers/char/console.c| 10 --
xen/include/xen/console.h
It's really nice if these kinds of things are broken up. First, replace
the old want_memblock parameter, then add the parameter to the
__add_page() calls.
> +/*
> + * NONE: No memory block is to be created (e.g. device memory).
> + * NORMAL: Memory block that represents normal (boot or hotp
On Fri, Sep 28, 2018 at 05:19:50PM +0100, Wei Liu wrote:
> On Fri, Sep 28, 2018 at 10:05:21AM -0600, Jan Beulich wrote:
> > >>> On 28.09.18 at 17:53, wrote:
> > > At the moment the ordering of the options matter, which means if "xen"
> > > is not the first option we can lose output.
> > >
> > > I
flight 128186 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128186/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128173
build-amd64
On Fri, Sep 28, 2018 at 10:05:21AM -0600, Jan Beulich wrote:
> >>> On 28.09.18 at 17:53, wrote:
> > At the moment the ordering of the options matter, which means if "xen"
> > is not the first option we can lose output.
> >
> > I think one easy way of improving is to parse opt_console twice. The
>
On 9/28/18 6:55 PM, Jan Beulich wrote:
On 28.09.18 at 17:25, wrote:
>> On 9/28/18 5:52 PM, Jan Beulich wrote:
>> On 28.09.18 at 13:55, wrote:
@@ -1218,34 +1219,67 @@ static void ept_tlb_flush(struct p2m_domain *p2m)
ept_sync_domain_mask(p2m, p2m->domain->dirty_cpumask);
>>
>>> On 28.09.18 at 17:53, wrote:
> At the moment the ordering of the options matter, which means if "xen"
> is not the first option we can lose output.
>
> I think one easy way of improving is to parse opt_console twice. The
> first time solely looks for "xen" and the second time parses the rest
On Fri, Sep 28, 2018 at 04:59:16PM +0100, Andrew Cooper wrote:
> VERS_1.2 can't extend itself. It should extend VERS_1.1
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenpr
flight 75309 distros-debian-jessie real [real]
http://osstest.xensource.com/osstest/logs/75309/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-i386
VERS_1.2 can't extend itself. It should extend VERS_1.1
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
---
tools/libs/gnttab/libxengnttab.map | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libs/gnttab/libxengnttab.map
b/tools/libs/gnttab/libxengnttab.
>>> On 28.09.18 at 17:25, wrote:
> On 9/28/18 5:52 PM, Jan Beulich wrote:
> On 28.09.18 at 13:55, wrote:
>>> @@ -1218,34 +1219,67 @@ static void ept_tlb_flush(struct p2m_domain *p2m)
>>> ept_sync_domain_mask(p2m, p2m->domain->dirty_cpumask);
>>> }
>>>
>>> +static void ept_set_ad_sync(
On Fri, Sep 28, 2018 at 04:23:24PM +0100, Wei Liu wrote:
> On Fri, Sep 28, 2018 at 09:19:56AM -0600, Jan Beulich wrote:
> > >>> On 28.09.18 at 17:12, wrote:
> > > On Fri, Sep 28, 2018 at 09:08:34AM -0600, Jan Beulich wrote:
> > >> >>> On 28.09.18 at 10:24, wrote:
> > >> > --- a/xen/drivers/char/c
>>> On 17.07.18 at 11:48, wrote:
> --- a/xen/drivers/passthrough/pci.c
> +++ b/xen/drivers/passthrough/pci.c
> @@ -768,6 +768,13 @@ int pci_add_device(u16 seg, u8 bus, u8 devfn,
> goto out;
> }
>
> +ret = vpci_add_handlers(pdev);
> +if ( ret )
> +{
>
On 9/28/18 1:28 AM, Juergen Gross wrote:
> Commit a46b53672b2c2e3770b38a4abf90d16364d2584b ("xen/blkfront: cleanup
> stale persistent grants") introduced a regression as purged persistent
> grants were not pu into the list of free grants again. Correct that.
I'll apply this for 4.19, and if things
>>> On 17.07.18 at 11:48, wrote:
> --- a/xen/drivers/vpci/header.c
> +++ b/xen/drivers/vpci/header.c
> @@ -184,7 +184,19 @@ static void defer_map(struct domain *d, struct pci_dev
> *pdev,
> * started for the same device if the domain is not well-behaved.
> */
> curr->vpci.pdev =
>>> On 17.07.18 at 11:48, wrote:
> --- a/xen/drivers/vpci/header.c
> +++ b/xen/drivers/vpci/header.c
> @@ -131,12 +131,15 @@ bool vpci_process_pending(struct vcpu *v)
> if ( rc == -ERESTART )
> return true;
>
> -spin_lock(&v->vpci.pdev->vpci_lock);
> -if ( v
On Fri, Sep 28, 2018 at 04:22:28PM +0100, Andrew Cooper wrote:
> Xen 4.11 shipped with a SONAME of 1.1.
>
> For staging (and 4.12 eventually), the SONAME was bumped to 1.2 by c/s
> 28ca696a3. Further changes before 4.12 ships should not bump the SONAME.
>
> Signed-off-by: Andrew Cooper
Acked-b
On 9/28/18 5:52 PM, Jan Beulich wrote:
On 28.09.18 at 13:55, wrote:
>> @@ -1218,34 +1219,67 @@ static void ept_tlb_flush(struct p2m_domain *p2m)
>> ept_sync_domain_mask(p2m, p2m->domain->dirty_cpumask);
>> }
>>
>> +static void ept_set_ad_sync(struct p2m_domain *p2m, int value)
>
> Ca
On Fri, Sep 28, 2018 at 09:19:56AM -0600, Jan Beulich wrote:
> >>> On 28.09.18 at 17:12, wrote:
> > On Fri, Sep 28, 2018 at 09:08:34AM -0600, Jan Beulich wrote:
> >> >>> On 28.09.18 at 10:24, wrote:
> >> > --- a/xen/drivers/char/console.c
> >> > +++ b/xen/drivers/char/console.c
> >> > @@ -91,7 +9
Xen 4.11 shipped with a SONAME of 1.1.
For staging (and 4.12 eventually), the SONAME was bumped to 1.2 by c/s
28ca696a3. Further changes before 4.12 ships should not bump the SONAME.
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
CC: Oleksandr Andrushchenko
---
tools/libs/gntt
>>> On 28.09.18 at 17:12, wrote:
> On Fri, Sep 28, 2018 at 09:08:34AM -0600, Jan Beulich wrote:
>> >>> On 28.09.18 at 10:24, wrote:
>> > --- a/xen/drivers/char/console.c
>> > +++ b/xen/drivers/char/console.c
>> > @@ -91,7 +91,8 @@ static uint32_t conringc, conringp;
>> > static int __read_mostly
On Fri, Sep 28, 2018 at 04:13:51PM +0100, Andrew Cooper wrote:
> On 28/09/18 16:12, Wei Liu wrote:
> > On Fri, Sep 28, 2018 at 09:08:34AM -0600, Jan Beulich wrote:
> > On 28.09.18 at 10:24, wrote:
> >>> --- a/xen/drivers/char/console.c
> >>> +++ b/xen/drivers/char/console.c
> >>> @@ -91,7 +91,
flight 128173 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128173/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 28/09/18 16:12, Wei Liu wrote:
> On Fri, Sep 28, 2018 at 09:08:34AM -0600, Jan Beulich wrote:
> On 28.09.18 at 10:24, wrote:
>>> --- a/xen/drivers/char/console.c
>>> +++ b/xen/drivers/char/console.c
>>> @@ -91,7 +91,8 @@ static uint32_t conringc, conringp;
>>> static int __read_mostly serc
On Fri, Sep 28, 2018 at 09:06:25AM -0600, Jan Beulich wrote:
> >>> On 28.09.18 at 10:24, wrote:
> > The relocation code in __start_xen requires one extra element in the
> > module array. By the looks of it the temporary array is already large
> > enough. Add a BUG_ON to catch any issue in the futu
On Fri, Sep 28, 2018 at 09:08:34AM -0600, Jan Beulich wrote:
> >>> On 28.09.18 at 10:24, wrote:
> > --- a/xen/drivers/char/console.c
> > +++ b/xen/drivers/char/console.c
> > @@ -91,7 +91,8 @@ static uint32_t conringc, conringp;
> > static int __read_mostly sercon_handle = -1;
> >
> > #ifdef CO
>>> On 28.09.18 at 10:39, wrote:
> Requested-by: Jan Beulich
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
>>> On 28.09.18 at 10:39, wrote:
> BOOTSTRAP_DIRECTMAP_END is gone. The comment in question should refer
> to BOOSTRAP_MAP_BASE and 4GB instead.
>
> Move the entire comment block to where it belongs -- immediately
> before the loop which does the things said in the comment.
>
> Remove two traili
>>> On 28.09.18 at 10:24, wrote:
> --- a/xen/drivers/char/console.c
> +++ b/xen/drivers/char/console.c
> @@ -91,7 +91,8 @@ static uint32_t conringc, conringp;
> static int __read_mostly sercon_handle = -1;
>
> #ifdef CONFIG_X86
> -static bool __read_mostly opt_console_xen; /* console=xen */
>
>>> On 28.09.18 at 10:24, wrote:
> The relocation code in __start_xen requires one extra element in the
> module array. By the looks of it the temporary array is already large
> enough. Add a BUG_ON to catch any issue in the future.
>
> While at it, turn another ASSERT to BUG_ON as well.
Hmm, a
How to/when to online hotplugged memory is hard to manage for
distributions because different memory types are to be treated differently.
Right now, we need complicated udev rules that e.g. check if we are
running on s390x, on a physical system or on a virtualized system. But
there is also sometime
On Fri, Sep 28, 2018 at 03:51:35PM +0100, Andrew Cooper wrote:
> This was last used by blktap1, which was deleted by c/s f6bcc035084 in 2014.
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
>>> On 28.09.18 at 13:55, wrote:
> @@ -1218,34 +1219,67 @@ static void ept_tlb_flush(struct p2m_domain *p2m)
> ept_sync_domain_mask(p2m, p2m->domain->dirty_cpumask);
> }
>
> +static void ept_set_ad_sync(struct p2m_domain *p2m, int value)
Can the second parameter be bool please (and the tr
This was last used by blktap1, which was deleted by c/s f6bcc035084 in 2014.
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
---
config/Tools.mk.in | 1 -
tools/configure| 44
tools/configure.ac | 2 --
3 files changed, 47 deletio
Its user blktap is long gone in f6bcc035 ("tools: remove blktap1").
Reported-by: Cc: Andrew Cooper
Signed-off-by: Wei Liu
---
config/Tools.mk.in | 1 -
tools/configure| 44
tools/configure.ac | 2 --
3 files changed, 47 deletions(-)
diff --git
On 9/28/18 9:52 AM, Juergen Gross wrote:
> On 28/09/2018 15:33, Boris Ostrovsky wrote:
>> On 9/28/18 9:13 AM, Juergen Gross wrote:
>>> On 28/09/2018 14:45, Boris Ostrovsky wrote:
On 9/28/18 3:28 AM, Juergen Gross wrote:
> Commit a46b53672b2c2e3770b38a4abf90d16364d2584b ("xen/blkfront: clea
On 28/09/2018 15:33, Boris Ostrovsky wrote:
> On 9/28/18 9:13 AM, Juergen Gross wrote:
>> On 28/09/2018 14:45, Boris Ostrovsky wrote:
>>> On 9/28/18 3:28 AM, Juergen Gross wrote:
Commit a46b53672b2c2e3770b38a4abf90d16364d2584b ("xen/blkfront: cleanup
stale persistent grants") introduced a
Am Thu, 13 Sep 2018 09:39:13 +0200
schrieb Olaf Hering :
> this patch was not applied yet, even after a few "pings".
No reaction since months.
So scrap that patch, just in case it is still part of someones to-consider
queue.
Olaf
pgpFtD6Pj968F.pgp
Description: Digitale Signatur von OpenPGP
flight 128163 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128163/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b9cee524e6c1941b77b6780e19bd57052e53249c
baseline version:
ovmf 6532fdec11d7940a584a7
On 28/09/2018 14:55, Omkar Bolla wrote:
> Hi,
> I tried to run script after pause the domain and unpause domain after
> run script. But I ended up with same error
I looked at the script again, it is wrong. The permissions should
be set for each node under the root path of the respective domains,
t
flight 128127 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128127/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-amd broken
test-armhf-armhf-xl-vhd 10 debian-d
On 9/28/18 9:13 AM, Juergen Gross wrote:
> On 28/09/2018 14:45, Boris Ostrovsky wrote:
>> On 9/28/18 3:28 AM, Juergen Gross wrote:
>>> Commit a46b53672b2c2e3770b38a4abf90d16364d2584b ("xen/blkfront: cleanup
>>> stale persistent grants") introduced a regression as purged persistent
>>> grants were n
flight 128118 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128118/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-migrupgrade 22 guest-migrate/src_host/dst_host fail REGR. vs.
128084
test-amd64
On 28/09/2018 14:45, Boris Ostrovsky wrote:
> On 9/28/18 3:28 AM, Juergen Gross wrote:
>> Commit a46b53672b2c2e3770b38a4abf90d16364d2584b ("xen/blkfront: cleanup
>> stale persistent grants") introduced a regression as purged persistent
>> grants were not pu into the list of free grants again. Corre
Hi there!
In a possible scenario where I (and a whole academic team) could work
on improving Xen, what are the major areas requiring
exploration/optimizations? Ideally, part that would be not that hard
to work on, but allow high potential "reward".
From my perspective, storage is probably a side
On Fri, Sep 28, 2018 at 12:37:22PM +0100, George Dunlap wrote:
> On Tue, Sep 25, 2018 at 12:20 PM Anthony PERARD
> wrote:
> >
> > On Fri, Sep 21, 2018 at 06:04:23PM +0100, George Dunlap wrote:
> > > +## Migration
> > > +
> > > +When calling xen-save-devices-state, since QEMU is running in a chroot
This run is configured for baseline tests only.
flight 75307 xen-4.10-testing real [real]
http://osstest.xensource.com/osstest/logs/75307/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
On 9/28/18 2:55 PM, Razvan Cojocaru wrote:
> This patch is a pre-requisite for fixing the logdirty VGA issue
> (display freezes when switching to a new altp2m view early in a
> domain's lifetime), but sent separately for easier review.
> The new ept_set_ad_sync() function has been added to update a
Hi,
I tried to run script after pause the domain and unpause domain after run
script. But I ended up with same error
Below I shared PV device log, and attached my FE and BE driver and script
that i used,
root@hikey960:/debian#
[XEN_BUF]xen_vdevb_be_probe(): 124: Probe called. We are good to go.
[
On 9/28/18 3:28 AM, Juergen Gross wrote:
> Commit a46b53672b2c2e3770b38a4abf90d16364d2584b ("xen/blkfront: cleanup
> stale persistent grants") introduced a regression as purged persistent
> grants were not pu into the list of free grants again. Correct that.
>
> Signed-off-by: Juergen Gross
> ---
This patch is a pre-requisite for fixing the logdirty VGA issue
(display freezes when switching to a new altp2m view early in a
domain's lifetime), but sent separately for easier review.
The new ept_set_ad_sync() function has been added to update all
active altp2ms' ept.ad. New altp2ms will inherit
On Tue, Sep 25, 2018 at 12:20 PM Anthony PERARD
wrote:
>
> On Fri, Sep 21, 2018 at 06:04:23PM +0100, George Dunlap wrote:
> > +## Migration
> > +
> > +When calling xen-save-devices-state, since QEMU is running in a chroot
> > +it is not useful to pass a filename (it doesn't even have write access
flight 128114 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128114/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 10 debian-hvm-install fail REGR.
vs. 125898
test-amd
flight 128168 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128168/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-freebsd broken
build-amd64-freebs
Hi,
On 09/27/2018 11:34 PM, Stefano Stabellini wrote:
On Wed, 26 Sep 2018, Julien Grall wrote:
Hi Stefano,
On 09/26/2018 05:53 PM, Stefano Stabellini wrote:
On Tue, 25 Sep 2018, Julien Grall wrote:
Some capababilities are set right during boot and will never change
afterwards. At the moment,
>>> On 28.09.18 at 10:28, wrote:
> On Thu, 2018-09-27 at 15:36 +0100, Andrew Cooper wrote:
>> Hello,
>>
>> Please can the following patches be considered for stable.
>>
> Can we also include:
>
> 6e395f477fb85 - xen: sched/Credit2: fix bug when moving CPUs between
> two Credit2 c
Hi Stefano,
On 09/28/2018 12:02 AM, Stefano Stabellini wrote:
On Wed, 26 Sep 2018, Julien Grall wrote:
Hi Stefano,
On 09/26/2018 12:50 AM, Stefano Stabellini wrote:
On Tue, 25 Sep 2018, Julien Grall wrote:
From: Volodymyr Babchuk
Existing SMC wrapper call_smc() allows only 4 parameters and
On 9/28/18 12:04 PM, Wei Liu wrote:
> On Wed, Sep 26, 2018 at 03:26:20PM +0300, Razvan Cojocaru wrote:
>> but is it OK that the hypervisor builds with a set of flags that
>> includes CONFIG_HVM and the firmware code with a set that doesn't?
>
> To answer this question: yes, it is OK to do that. An
On Wed, Sep 26, 2018 at 03:26:20PM +0300, Razvan Cojocaru wrote:
> but is it OK that the hypervisor builds with a set of flags that
> includes CONFIG_HVM and the firmware code with a set that doesn't?
To answer this question: yes, it is OK to do that. And that's deliberate
for the shim because it
Requested-by: Jan Beulich
Signed-off-by: Wei Liu
---
xen/arch/x86/setup.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index cf404ec..ae6f4d9 100644
--- a/xen/arch/x86/setup.c
+++ b/xen/arch/x86/setup.c
@@ -416,6 +416,8 @@ static void *__init
Wei Liu (2):
x86: fix comment on super page alignment requirement
x86: undefine BOOSTRAP_MAP_LIMIT after its last user
xen/arch/x86/setup.c | 28 +++-
1 file changed, 15 insertions(+), 13 deletions(-)
base-commit: a8c7e309d1fec898a2731b6e0f63d66c509c7233
--
git-serie
BOOTSTRAP_DIRECTMAP_END is gone. The comment in question should refer
to BOOSTRAP_MAP_BASE and 4GB instead.
Move the entire comment block to where it belongs -- immediately
before the loop which does the things said in the comment.
Remove two trailing spaces while at it.
Signed-off-by: Wei Liu
On 28/09/18 09:24, Simon Kuenzer wrote:
> Hey,
>
> for some research we are currently looking into mapping big memory
> regions to PV guests. With big I mean 100s to 1000s of mega bytes.
> Using one grant for each 4K page seems to be expensive although we got
> it working so far.
> Is there another
On Thu, 2018-09-27 at 15:36 +0100, Andrew Cooper wrote:
> Hello,
>
> Please can the following patches be considered for stable.
>
Can we also include:
6e395f477fb85 - xen: sched/Credit2: fix bug when moving CPUs between
two Credit2 cpupools
for 4.10 and 4.11 ?
From a quick che
This helps capture issues before console is initialised. The impact is
minimal because it only affects Xen running in as a guest.
Signed-off-by: Wei Liu
---
xen/drivers/char/console.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/char/console.c b/xen/drive
The relocation code in __start_xen requires one extra element in the
module array. By the looks of it the temporary array is already large
enough. Add a BUG_ON to catch any issue in the future.
While at it, turn another ASSERT to BUG_ON as well.
Signed-off-by: Wei Liu
---
xen/arch/x86/guest/pvh
Hey,
for some research we are currently looking into mapping big memory
regions to PV guests. With big I mean 100s to 1000s of mega bytes. Using
one grant for each 4K page seems to be expensive although we got it
working so far.
Is there another mechanism we could look into? Is changing the
g
Wei Liu (2):
x86: make sure module array is large enough in pvh-boot.c
xen: make opt_xen_console true before console initialisation
xen/arch/x86/guest/pvh-boot.c | 9 -
xen/drivers/char/console.c| 7 ++-
2 files changed, 14 insertions(+), 2 deletions(-)
--
2.11.0
_
When SILO is enabled, there would be no page-sharing or event notifications
between unprivileged VMs (no grant tables or event channels).
Signed-off-by: Xin Li
---
CC: Daniel De Graaf
CC: George Dunlap
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei
Hi,
thank you for explanation, links and advices. I'm gonna go through all
that literature.
Best regards!
On Thu, Sep 27, 2018 at 7:06 PM Dario Faggioli wrote:
>
> On Thu, 2018-09-27 at 16:09 +0100, Julien Grall wrote:
> > Hi Dario,
> >
> Hi,
>
> > On 09/27/2018 03:32 PM, Dario Faggioli wrote:
>
Introduce new boot parameter xsm to choose which xsm module is enabled,
and set default to dummy.
Signed-off-by: Xin Li
---
CC: Daniel De Graaf
CC: George Dunlap
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei Liu
CC: Sergey Dyasli
CC: Andrew Coope
flight 128143 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128143/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 6532fdec11d7940a584a73797b5cc067d64f84a5
baseline version:
ovmf 6a147d6dae733f3a1d5dd
On Fri, Sep 28, 2018 at 09:28:27AM +0200, Juergen Gross wrote:
> Commit a46b53672b2c2e3770b38a4abf90d16364d2584b ("xen/blkfront: cleanup
> stale persistent grants") introduced a regression as purged persistent
> grants were not pu into the list of free grants again. Correct that.
s/pu /put /
Alan
Commit a46b53672b2c2e3770b38a4abf90d16364d2584b ("xen/blkfront: cleanup
stale persistent grants") introduced a regression as purged persistent
grants were not pu into the list of free grants again. Correct that.
Signed-off-by: Juergen Gross
---
drivers/block/xen-blkfront.c | 4 ++--
1 file chang
>>> On 27.09.18 at 19:54, wrote:
> On 27/09/18 15:36, Andrew Cooper wrote:
>> Hello,
>>
>> Please can the following patches be considered for stable.
>>
>> 18cd4997d26b - x86/efi: move the logic to detect PE build support
>> 93249f7fc17c - x86/efi: split compiler vs linker support
>>
>> CentOS and
97 matches
Mail list logo