This run is configured for baseline tests only.
flight 75490 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75490/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
in order to make builds reproducible.
See https://reproducible-builds.org/ for why this is good.
Signed-off-by: Bernhard M. Wiedemann
---
xen/arch/x86/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
index 162b0b94c0..052bdb1e25 100644
--
On 24/10/2018 09:03, Bernhard M. Wiedemann wrote:
> in order to make builds reproducible.
> See https://reproducible-builds.org/ for why this is good.
>
> Signed-off-by: Bernhard M. Wiedemann
Please follow the MAINTAINERS file and CC the correct people. I've done
so on this email.
> ---
> xen/
Hello Julien,
On 23.10.18 16:26, Julien Grall wrote:
> The common headers (e.g xen/) should be placed before architecture
> specific (asm/). They should then be ordered alphabetically among
> themselves.
Yep, I see the point.
--
*Andrii Anisov*
_
The may_defer var was left with the older bool_t type. This patch
changes the type to bool.
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/emulate.c| 8
xen/arch/x86/hvm/hvm.c| 14 +++---
xen/arch/x86/hvm/svm/nestedsvm.c | 14 +++---
xen/arch/
On 10/24/18 12:19 PM, Alexandru Stefan ISAILA wrote:
> The may_defer var was left with the older bool_t type. This patch
> changes the type to bool.
>
> Signed-off-by: Alexandru Isaila
Acked-by: Razvan Cojocaru
___
Xen-devel mailing list
Xen-devel@li
flight 128956 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128956/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b08b045ca9ab46f335d2edc21eeea5340a1aea6b
baseline version:
ovmf a58a421c3629e5f28b4a6
On 17/10/2018 15:44, Stefano Stabellini wrote:
> It would be good for me to keep an eye on the patches that touch Xen
> support in Linux to try to spot changes that break Xen on ARM early on.
>
> Signed-off-by: Stefano Stabellini
Pushed to xen.tip for-linus-4.20a
Juergen
_
On 16/10/2018 16:33, Bartlomiej Zolnierkiewicz wrote:
> 'default n' is the default value for any bool or tristate Kconfig
> setting so there is no need to write it explicitly.
>
> Also since commit f467c5640c29 ("kconfig: only write '# CONFIG_FOO
> is not set' for visible symbols") the Kconfig beh
Hello Julien,
This patch is very interesting to me.
On 23.10.18 21:17, Julien Grall wrote:
> Devices that expose their interrupt status registers via system
> registers (e.g. Statistical profiling, CPU PMU, DynamIQ PMU, arch timer,
> vgic (although unused by Linux), ...)
I guess under vgic you
On Wed, Oct 24, 2018 at 09:19:06AM +, Alexandru Stefan ISAILA wrote:
> The may_defer var was left with the older bool_t type. This patch
> changes the type to bool.
>
> Signed-off-by: Alexandru Isaila
Reviewed-by: Wei Liu
___
Xen-devel mailing li
On 23/10/18 16:24, Razvan Cojocaru wrote:
> On 10/23/18 5:35 PM, Andrew Cooper wrote:
>> The may_defer booleans were introduced with the monitor infrastructure, but
>> their purpose is not obvious and not described anywhere.
>>
>> They exist to avoid triggering nested monitoring events from introsp
I would say the comment was odd, not duplicated, at the place it is removed.
Reviewed-by: Andrii Anisov
--
*Andrii Anisov*
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
I have to reinvent these runes each time, which is somewhat annoying.
Signed-off-by: Ian Jackson
---
standalone-generate-dump-flight-runvars | 4
1 file changed, 4 insertions(+)
diff --git a/standalone-generate-dump-flight-runvars
b/standalone-generate-dump-flight-runvars
index 04631b3d..
It claimed to have a default db name, but it didn't. Rework the
option parsing to make the usage message true. (That saves me typing
sa-init-db standalone
and getting bizarre errors as sqlite tries to treat the shell script
`standalone' as if it were a database file.)
Signed-off-by: Ian Jackso
flight 128959 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128959/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-freebsd broken
build-amd64-freebsd 6 host-bu
Something is wrong with the freebsd repositories. This causes freebsd
host installation to fail. This problem has persisted for a while now
and is blocking other work.
For now, drop these. The jobs being dropped are
build-amd64-xen-freebsd
build-amd64-xen-xsm-freebsd
in the branches
flight 128958 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128958/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen e0b77cb77ef2b36b8cbd2273cff833f773208d0a
baseline version:
xen 62aa
Hi, Stefano
On Tue, Oct 9, 2018 at 2:39 AM Stefano Stabellini
wrote:
>
> From: Zhongze Liu
>
> Author: Zhongze Liu
>
> Add libxl__sshm_del to unmap static shared memory areas mapped by
> libxl__sshm_add during domain creation. The unmapping process is:
>
> * For a master: decrease the refcount
On 10/09/2018 02:37 AM, Stefano Stabellini wrote:
From: Zhongze Liu
Author: Zhongze Liu
Add libxl__sshm_del to unmap static shared memory areas mapped by
libxl__sshm_add during domain creation. The unmapping process is:
* For a master: decrease the refcount of the sshm region, if the refcoun
On 10/09/2018 02:37 AM, Stefano Stabellini wrote:
Shared memory regions need to be advertised to the guest. Fortunately, a
device tree binding for special memory regions already exist:
reserved-memory.
Add a reserved-memory node for each shared memory region, for both
masters and slaves.
Signed
This run is configured for baseline tests only.
flight 75491 qemu-mainline real [real]
http://osstest.xensource.com/osstest/logs/75491/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
On 24/10/2018 10.16, Andrew Cooper wrote:
> This change is fine in principle, but do all i386pep compatible versions
> of LD support this parameter?
It seems, it was added in 2014 to GNU binutils when the default was
reversed to be unreproducible:
https://sourceware.org/git/gitweb.cgi?p=binutils-g
On Mon, Oct 15, 2018 at 11:36:18AM +0100, Andrew Cooper wrote:
> In particular, initialising %dr6 with the value 0 is buggy, because on
> hardware supporting Transnational Memory, it will cause the sticky RTM bit to
Typo "Transnational"
> be asserted, even though a debug exception from a transact
On Tue, Oct 23, 2018 at 08:09:04PM -0700, Joe Jin wrote:
> Commit 4855c92dbb7 "xen-swiotlb: fix the check condition for
> xen_swiotlb_free_coherent" only fixed memory address check condition
> on xen_swiotlb_free_coherent(), when memory was not physically
> contiguous and tried to exchanged with Xe
On Wed, Oct 24, 2018 at 02:49:49PM +0200, Bernhard M. Wiedemann wrote:
> On 24/10/2018 10.16, Andrew Cooper wrote:
> > This change is fine in principle, but do all i386pep compatible versions
> > of LD support this parameter?
>
> It seems, it was added in 2014 to GNU binutils when the default was
On 24/10/18 14:00, Wei Liu wrote:
> On Mon, Oct 15, 2018 at 11:36:18AM +0100, Andrew Cooper wrote:
>> In particular, initialising %dr6 with the value 0 is buggy, because on
>> hardware supporting Transnational Memory, it will cause the sticky RTM bit to
> Typo "Transnational"
Yeah - I fixed all of
Hi, Stefano
On Tue, Oct 9, 2018 at 2:39 AM Stefano Stabellini
wrote:
>
> From: Zhongze Liu
>
> Author: Zhongze Liu
>
> Add libxl__sshm_add to map shared pages from one DomU to another, The mapping
> process involves the following steps:
>
> * Set defaults and check for further errors in the s
On Wed, Oct 24, 2018 at 2:49 PM Oleksandr Andrushchenko
wrote:
>
> On 10/09/2018 02:37 AM, Stefano Stabellini wrote:
> > From: Zhongze Liu
> >
> > Author: Zhongze Liu
> >
> > Add libxl__sshm_del to unmap static shared memory areas mapped by
> > libxl__sshm_add during domain creation. The unmappi
Hello Julien,
On 23.10.18 21:17, Julien Grall wrote:
> When sending an SGI to another CPU, we require a barrier to ensure that
> any pending stores to normal memory are made visible to the recipient
> before the interrupt arrives.
>
> For GICv2, rather than using dsb(sy) before writel_gicd, we ca
On Thu, Oct 18, 2018 at 2:03 PM Aaron Gray wrote:
> I have two ASUS PRIME Z270-A machines based on Intel Z270 chipset and am
> wondering about when support will be available for them and what I can do
> to speed this up.
>
> But I have not done anything to do with kernel work since years ago when
in order to make builds reproducible.
See https://reproducible-builds.org/ for why this is good.
We only add the option, if ld understands it.
Signed-off-by: Bernhard M. Wiedemann
---
Config.mk | 8
xen/arch/x86/Makefile | 2 +-
2 files changed, 9 insertions(+), 1 deletion(
flight 128960 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128960/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ea1486c28127057b7f3059b8c3c74afe7912460f
baseline version:
ovmf b08b045ca9ab46f335d2e
On 10/24/18 9:02 AM, Konrad Rzeszutek Wilk wrote:
> On Tue, Oct 23, 2018 at 08:09:04PM -0700, Joe Jin wrote:
>> Commit 4855c92dbb7 "xen-swiotlb: fix the check condition for
>> xen_swiotlb_free_coherent" only fixed memory address check condition
>> on xen_swiotlb_free_coherent(), when memory was not
On 19/10/2018 17:10, Juergen Gross wrote:
> On 19/10/2018 14:48, Daniel Kiper wrote:
>> On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote:
>>> + r = grub_xen_hypercall (__HYPERVISOR_hvm_op, HVMOP_get_param,
>>> + (grub_uint32_t) (&xhv), 0, 0, 0, 0);
>>
>> s/(grub_ui
Hello Julien,
On 18.10.18 16:20, Julien Grall wrote:
> show_registers helpers are not meant to modify any parameters.
> So constify them.
>
> Signed-off-by: Julien Grall
> ---
> xen/arch/arm/traps.c| 14 +++---
> xen/include/asm-arm/processor.h | 2 +-
> 2 files changed,
On 10/24/18 3:03 PM, Andrii Anisov wrote:
Hello Julien,
Hi,
On 18.10.18 16:20, Julien Grall wrote:
show_registers helpers are not meant to modify any parameters.
So constify them.
Signed-off-by: Julien Grall
---
xen/arch/arm/traps.c| 14 +++---
xen/include/asm-
Reviewed-by: Andrii Anisov
--
*Andrii Anisov*
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
Hi, Stefano
On Sat, Oct 20, 2018 at 12:07 AM Stefano Stabellini
wrote:
>
> Hi Wei,
>
> Any chances you can review this series soon? I would love for it to be
> merged before the 4.12 code freeze.
>
> FYI I am making progress upstreaming the device tree binding, they asked
> for a very minor chang
Hi, Stefano!
I'm just curious if the below is on your TODO list [1]:
3. Future Directions:
Allow users to optionally share *mfn-contiguous* pages.
Thank you,
Oleksandr
On 05/25/2018 03:55 AM, Stefano Stabellini wrote:
Hi,
This series impl
Hi,
I'm interested running HVM DomU only with PV drivers (network and
disk). Enabling CONFIG_XEN_NETDEV_FRONTEND and stuff didn't make DomU
see the PV devices until I enabled CONFIG_XEN_PVHVM.
But by looking at the virtualization spectrum[1], it seems possible to
do "HVM with PV drivers", but I c
flight 128942 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128942/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 128918
test-armhf-armhf-libvirt-raw 13 saveresto
On 10/24/18 3:15 PM, Oleksandr Andrushchenko wrote:
Hi, Stefano!
I'm just curious if the below is on your TODO list [1]:
3. Future Directions:
Allow users to optionally share *mfn-contiguous* pages.
What is the use case for that?
Cheers
On 10/24/18 3:15 PM, Oleksandr Tyshchenko wrote:
Hi, Stefano
On Sat, Oct 20, 2018 at 12:07 AM Stefano Stabellini
wrote:
Hi Wei,
Any chances you can review this series soon? I would love for it to be
merged before the 4.12 code freeze.
FYI I am making progress upstreaming the device tree b
On 24/10/2018 16:16, Jintack Lim wrote:
> Hi,
>
> I'm interested running HVM DomU only with PV drivers (network and
> disk). Enabling CONFIG_XEN_NETDEV_FRONTEND and stuff didn't make DomU
> see the PV devices until I enabled CONFIG_XEN_PVHVM.
Right, that's how it is done in modern Linux kernels.
On 10/24/2018 05:24 PM, Julien Grall wrote:
On 10/24/18 3:15 PM, Oleksandr Andrushchenko wrote:
Hi, Stefano!
I'm just curious if the below is on your TODO list [1]:
3. Future Directions:
Allow users to optionally share *mfn-contiguous* pa
On 10/24/18 3:32 PM, Oleksandr Andrushchenko wrote:
On 10/24/2018 05:24 PM, Julien Grall wrote:
On 10/24/18 3:15 PM, Oleksandr Andrushchenko wrote:
Hi, Stefano!
I'm just curious if the below is on your TODO list [1]:
3. Future Directions:
==
On 18.10.18 16:20, Julien Grall wrote:
> In Xen, it is common to add __init to the declaration and not the
> prototype. Remove the few __init on some prototypes which allows to
> avoid the inclusion of init.h in headers.
>
> With these changes, init.h is now required to be included on some c
> fil
On 10/24/18 10:38 AM, Andrii Anisov wrote:
Hello Julien,
Hi Andrii,
Thank you for the review.
On 23.10.18 21:17, Julien Grall wrote:
Devices that expose their interrupt status registers via system
registers (e.g. Statistical profiling, CPU PMU, DynamIQ PMU, arch timer,
vgic (although unus
On 10/24/18 6:57 AM, Boris Ostrovsky wrote:
> On 10/24/18 9:02 AM, Konrad Rzeszutek Wilk wrote:
>> On Tue, Oct 23, 2018 at 08:09:04PM -0700, Joe Jin wrote:
>>> Commit 4855c92dbb7 "xen-swiotlb: fix the check condition for
>>> xen_swiotlb_free_coherent" only fixed memory address check condition
>>> o
On 18.10.18 16:20, Julien Grall wrote:
> do_bug_frame is only necessary when trapping. This allows to remove
> processor.h include.
>
> However, time.h was missing an include resulting to compilation error if
> processor.h is removed from bug.h.
>
> Signed-off-by: Julien Grall
> ---
> xen/arch/a
On 10/24/18 2:32 PM, Andrii Anisov wrote:
Hello Julien,
Hi Andrii,
On 23.10.18 21:17, Julien Grall wrote:
diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c
index 0108e9603c..077b941b79 100644
--- a/xen/arch/arm/gic.c
+++ b/xen/arch/arm/gic.c
@@ -300,12 +300,6 @@ void send_SGI_mask(const
On 10/23/2018 05:03 AM, Stefano Stabellini wrote:
To avoid mixing the output of different domains on the console, buffer
the output chars and print line by line. Unless the domain has input
from the serial, in which case we want to print char by char for a
smooth user experience.
The size of SBS
Add all usable memory regions to grub memory management and add the
needed mmap iterate code, which will be used by grub core (e.g.
grub-core/lib/relocator.c or grub-core/mmap/mmap.c).
As we are running in 32-bit mode don't add memory above 4GB.
Signed-off-by: Juergen Gross
---
grub-core/kern/i
Support mkimage for xen_pvh.
In order to avoid using plain integers for the ELF notes use the
available Xen include instead. While at it replace the plain numbers
for Xen PV mode, too.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: some style adjustments (Daniel Kiper)
use d
This patch series adds support for booting Linux as PVH guest.
Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh
platform grub is booted as a standalone image directly by Xen.
For booting Linux kernel it is using the standard linux kernel
loader. The only modification of the linux
Initialize the needed Xen specific data. This is:
- the Xen start of day page containing the console and Xenstore ring
page PFN and event channel
- the grant table
- the shared info page
Set the RSDP address for the guest from the start_info page passed
as boot parameter.
Signed-off-by: Juerge
include/grub/offsets.h needs some defines for Xen PVH mode.
Add them. While at it line up the values in the surrounding lines to
start at the same column.
Signed-off-by: Juergen Gross
---
V3: XENPVH->XEN_PVH (Daniel Kiper)
---
include/grub/offsets.h | 21 -
1 file changed, 1
Add the needed code to setup the hypercall page for calling into the
Xen hypervisor.
Signed-off-by: Juergen Gross
---
V3: grub_xen_early_halt->grub_xen_panic (Roger Pau Monné)
issue panic message (Roger Pau Monné)
rewrite grub_xen_hypercall to avoid register variables (Daniel Kiper)
---
Xen PVH guests will have the RSDP at an arbitrary address. Support that
by passing the RSDP address via the boot parameters to Linux.
The new protocol version 2.14 requires to set version to 0x8000 ored
with the actually use protocol version (the minimum of the kernel
supplied protocol version and
From: Hans van Kranenburg
This solves the build failing with "Error: no symbol table and no
.moddeps section"
Also see:
- 6371e9c10433578bb236a8284ddb9ce9e201eb59
- https://savannah.gnu.org/bugs/?49012
Signed-off-by: Hans van Kranenburg
Reviewed-by: Daniel Kiper
---
V2: new patch
Signed-off-b
In order to support grub2 in Xen PVH environment some additional Xen
headers are needed as grub2 will be started in PVH mode requiring to
use several HVM hypercalls and structures.
Add the needed headers from Xen 4.10 being the first Xen version with
full (not only experimental) PVH guest support.
Add the code for the Xen PVH mode boot entry.
Signed-off-by: Juergen Gross
---
V3: clear %fs and %gs, too (Daniel Kiper)
use GRUB_MEMORY_MACHINE_PROT_STACK_SIZE for stack size (Daniel Kiper)
---
grub-core/kern/i386/xen/startup_pvh.S | 52 +++
1 file changed, 5
Add the hooks to current code needed for Xen PVH. They will be filled
with code later when the related functionality is being added.
Signed-off-by: Juergen Gross
---
V3: xenpvh->xen_pvh (Daniel Kiper)
adjust copyright date (Roger Pau Monné)
---
grub-core/kern/i386/xen/pvh.c | 36
Add xen_pvh support to grub-install.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
include/grub/util/install.h | 1 +
util/grub-install-common.c | 1 +
util/grub-install.c | 7 +++
3 files changed, 9 insertions(+)
diff --git a/include/grub/util/install.h b/include/gru
Some common code needs to be special cased for Xen PVH mode. This hits
mostly Xen PV mode specific areas.
Split include/grub/i386/pc/int_types.h off from
include/grub/i386/pc/int.h to support including this file later from
xen_pvh code without the grub_bios_interrupt definition.
Move definition o
With Xen PVH mode adding a new machine type the machine related headers
need to be present for the build to succeed. Most of the headers just
need to include the related common i386 headers. Add those to the tree.
Signed-off-by: Juergen Gross
---
V3: updated commit message (Daniel Kiper)
xenp
Initialize the grant tab in a dedicated function. This will enable
using it for PVH guests, too.
Call the new function from grub_machine_init() as this will later
be common between Xen PV and Xen PVH mode.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: update commit message (Dan
Rearrange grub-core/kern/xen/init.c to prepare adding PVH mode support
to it. This includes putting some code under #ifdef GRUB_MACHINE_XEN
as it will not be used when running as PVH.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
grub-core/kern/xen/init.c | 60 +
Add the modifications to the build system needed to build a xen_pvh
grub.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: sorted some filenames (Daniel Kiper)
---
gentpl.py | 4 ++--
grub-core/Makefile.am | 12
grub-core/Makefile.core.def | 3
On 10/23/2018 05:03 AM, Stefano Stabellini wrote:
Today Ctrl-AAA is used to switch between Xen and Dom0. Extend the
mechanism to allow for switching between Xen, Dom0, and any of the
initial DomU created from Xen alongside Dom0 out of information provided
via device tree.
Rename xen_rx to consol
Support platform i386/xen_pvh in configure.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
configure.ac | 3 +++
1 file changed, 3 insertions(+)
diff --git a/configure.ac b/configure.ac
index 5e63c4af3..81a19afd5 100644
--- a/configure.ac
+++ b/configure.ac
@@ -151,6 +151,7 @@ case
Retrieve the memory map from the hypervisor and normalize it to contain
no overlapping entries and to be sorted by address.
Signed-off-by: Juergen Gross
---
V3: use grub_e820_mmap_entry instead of own struct (Daniel Kiper)
---
grub-core/kern/i386/xen/pvh.c | 96 ++
Andra Paraschiv writes ("[PATCH RESEND qemu-xen-traditional] xen/pt: allow QEMU
to request MSI unmasking at bind time"):
> When a MSI interrupt is bound to a guest using
> xc_domain_update_msi_irq (XEN_DOMCTL_bind_pt_irq) the interrupt is
> left masked by default.
Applied, and pushed the correspo
> A solution to this issue was proposed, whereby Xen synchronises siblings
> on vmexit/entry, so we are never executing code in two different
> privilege levels. Getting this working would make it safe to continue
> using hyperthreading even in the presence of L1TF. Obviously, its going
> to come
flight 75492 distros-debian-squeeze real [real]
http://osstest.xensource.com/osstest/logs/75492/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-i386
Thanks Juergen,
On Wed, Oct 24, 2018 at 10:30 AM Juergen Gross wrote:
>
> On 24/10/2018 16:16, Jintack Lim wrote:
> > Hi,
> >
> > I'm interested running HVM DomU only with PV drivers (network and
> > disk). Enabling CONFIG_XEN_NETDEV_FRONTEND and stuff didn't make DomU
> > see the PV devices unti
On 23.10.18 21:17, Julien Grall wrote:
> When an IPI is generated by a CPU, the pattern looks roughly like:
>
>
>dsb(sy);
>
>
> On the receiving CPU we rely on the fact that, once we've taken the
> interrupt, then the freshly written shared data must be visible to us.
> Put another way,
On 24.10.18 17:46, Julien Grall wrote:
> patch #1 and #2 should be backported. This patch is technically not a
> bug fix but a relaxation. So I am not comfortable to suggest
> backporting it up to Xen 4.9. Hence the ordering of the series.
OK, I understand the motivation, but still feel some odd
On 10/24/18 4:40 PM, Andrii Anisov wrote:
On 24.10.18 17:46, Julien Grall wrote:
patch #1 and #2 should be backported. This patch is technically not a
bug fix but a relaxation. So I am not comfortable to suggest
backporting it up to Xen 4.9. Hence the ordering of the series.
OK, I understand
On 10/24/18 6:02 AM, Konrad Rzeszutek Wilk wrote:
> On Tue, Oct 23, 2018 at 08:09:04PM -0700, Joe Jin wrote:
>> Commit 4855c92dbb7 "xen-swiotlb: fix the check condition for
>> xen_swiotlb_free_coherent" only fixed memory address check condition
>> on xen_swiotlb_free_coherent(), when memory was not
flight 128962 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128962/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Tue, Oct 23, 2018 at 2:37 AM Alexandru Stefan ISAILA
wrote:
>
> Any thoughts on this are appreciated.
FYI I already acked this.
Tamas
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Tue, Oct 23, 2018 at 6:37 AM Razvan Cojocaru
wrote:
>
> Tamas, could you please give this a spin?
>
> https://github.com/razvan-cojocaru/xen/tree/altp2m-logdirty-take2
>
> It _should_ solve the crashes.
Indeed, I no longer see the crash. However, there might be some
locking issue present becau
Hi, Stefano
On Tue, Oct 23, 2018 at 5:04 AM Stefano Stabellini
wrote:
>
> Make vpl011 being able to be used without a userspace component in Dom0.
> In that case, output is printed to the Xen serial and input is received
> from the Xen serial one character at a time.
>
> Call domain_vpl011_init d
On 10/24/18 8:09 PM, Tamas K Lengyel wrote:
> On Tue, Oct 23, 2018 at 6:37 AM Razvan Cojocaru
> wrote:
>>
>> Tamas, could you please give this a spin?
>>
>> https://github.com/razvan-cojocaru/xen/tree/altp2m-logdirty-take2
>>
>> It _should_ solve the crashes.
>
> Indeed, I no longer see the crash
On Wed, Oct 24, 2018 at 11:20 AM Razvan Cojocaru
wrote:
>
> On 10/24/18 8:09 PM, Tamas K Lengyel wrote:
> > On Tue, Oct 23, 2018 at 6:37 AM Razvan Cojocaru
> > wrote:
> >>
> >> Tamas, could you please give this a spin?
> >>
> >> https://github.com/razvan-cojocaru/xen/tree/altp2m-logdirty-take2
>
On Wed, Oct 24, 2018 at 11:31 AM Tamas K Lengyel
wrote:
>
> On Wed, Oct 24, 2018 at 11:20 AM Razvan Cojocaru
> wrote:
> >
> > On 10/24/18 8:09 PM, Tamas K Lengyel wrote:
> > > On Tue, Oct 23, 2018 at 6:37 AM Razvan Cojocaru
> > > wrote:
> > >>
> > >> Tamas, could you please give this a spin?
> >
On 10/24/18 8:52 PM, Tamas K Lengyel wrote:
> On Wed, Oct 24, 2018 at 11:31 AM Tamas K Lengyel
> wrote:
>>
>> On Wed, Oct 24, 2018 at 11:20 AM Razvan Cojocaru
>> wrote:
>>>
>>> On 10/24/18 8:09 PM, Tamas K Lengyel wrote:
On Tue, Oct 23, 2018 at 6:37 AM Razvan Cojocaru
wrote:
>
flight 128964 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128964/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a8b5750901faa63ff5570634851e648b8e335e5a
baseline version:
ovmf ea1486c28127057b7f305
This run is configured for baseline tests only.
flight 75493 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75493/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
On Tue, Oct 23, 2018 at 11:43 AM Chang S. Bae wrote:
>
> The helper functions will switch on faster accesses to FSBASE and GSBASE
> when the FSGSBASE feature is enabled.
>
> Accessing user GSBASE needs a couple of SWAPGS operations. It is avoidable
> if the user GSBASE is saved at kernel entry, be
flight 128965 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128965/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 24/10/18 20:16, Andy Lutomirski wrote:
> On Tue, Oct 23, 2018 at 11:43 AM Chang S. Bae
> wrote:
>> The helper functions will switch on faster accesses to FSBASE and GSBASE
>> when the FSGSBASE feature is enabled.
>>
>> Accessing user GSBASE needs a couple of SWAPGS operations. It is avoidable
Hi,
On 10/24/2018 04:54 PM, Juergen Gross wrote:
> This patch series adds support for booting Linux as PVH guest.
>
> Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh
> platform grub is booted as a standalone image directly by Xen.
>
> For booting Linux kernel it is using the sta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-278
x86: Nested VT-x usable even when disabled
ISSUE DESCRIPTION
=
When running HVM guests, virtual extensions are enabled in hardware because
Xen is using them. As a re
On Wed, 24 Oct 2018 at 14:25, Eric Duncan wrote:
>
> On Thu, Oct 18, 2018 at 2:03 PM Aaron Gray wrote:
>
>> I have two ASUS PRIME Z270-A machines based on Intel Z270 chipset and am
>> wondering about when support will be available for them and what I can do
>> to speed this up.
>>
>> But I have n
flight 128945 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128945/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 10 debian-hvm-install fail REGR.
vs. 125898
test-amd
This run is configured for baseline tests only.
flight 75496 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75496/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
flight 128969 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128969/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
1 - 100 of 105 matches
Mail list logo