It turns out that domU also requires the Xen APIC driver. Otherwise we
get stuck in busy loops that never exit, such as in this stack trace:
(gdb) target remote localhost:
Remote debugging using localhost:
__xapic_wait_icr_idle () at ./arch/x86/include/asm/ipi.h:56
56 while
On 06/08/15 17:45, Ben Catterall wrote:
The paging structure mappings for the deprivileged mode are added
to the monitor page table for HVM guests. The entries are generated by
walking the page tables and mapping in new pages. If a higher-level page table
mapping exists, we attempt to traverse
On Wed, Jul 22, 2015 at 08:43:48AM -0500, Bjorn Helgaas wrote:
Hi Ingo,
On Wed, Jul 22, 2015 at 10:38:45AM +0200, Ingo Molnar wrote:
* Bjorn Helgaas bhelg...@google.com wrote:
Let me know if these are OK or if there are any questions.
[0]
On 06/08/15 17:45, Ben Catterall wrote:
The process to switch into and out of deprivileged mode can be likened to
setjmp/longjmp.
To enter deprivileged mode, we take a copy of the stack from the guest's
registers up to the current stack pointer. This allows us to restore the stack
when we
On Thu, Aug 6, 2015 at 12:53 PM, Luis R. Rodriguez
mcg...@do-not-panic.com wrote:
For those type of OSes...
could it be possible to negotiate or hint to the platform through an
attribute somehow that the OS has such capability to not use MTRR?
And if that's not possible how about a new
On Thu, Aug 06, 2015 at 10:29:59AM +0100, Ian Campbell wrote:
On Thu, 2015-08-06 at 10:20 +0100, Wei Liu wrote:
On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote:
On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote:
On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote:
flight 60575 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60575/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Tests which are
On 06/08/15 09:15, Vijay Kilari wrote:
On Tue, Aug 4, 2015 at 7:15 PM, Julien Grall julien.gr...@citrix.com wrote:
Hi Vijay,
On 27/07/15 12:11, vijay.kil...@gmail.com wrote:
+
+static const hw_irq_controller its_host_lpi_type = {
+.typename = gic-its,
+.startup =
On Thu, Aug 06, 2015 at 08:45:16AM +0800, Chen, Tiejun wrote:
On 8/5/2015 7:25 PM, Wei Liu wrote:
On Wed, Aug 05, 2015 at 12:06:22PM +0100, Ian Campbell wrote:
On Wed, 2015-08-05 at 11:58 +0100, Wei Liu wrote:
On Wed, Aug 05, 2015 at 11:48:55AM +0100, Ian Campbell wrote:
On Wed, 2015-08-05
On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote:
On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote:
[...]
Right. I misinterpreted sd_boot.
You patch, however, has the undesirable effect that it fails to report
error if xenstored is started by systemd but couldn't claim the
On 06/08/15 10:46, big strong wrote:
The old version of Xen contains information about hypercall page like:
xl dmesg
..
(XEN) HVM10: Allocated Xen hypercall page at 169ff000
...
But the new edition seems to miss this information.
Correct. The information is not interesting or
On 06/08/15 11:05, Julien Grall wrote:
But Ian suggested to export gicv3_host_irq_end instead of calling
gicv3_eoi_irq()
And Ian said Exposing those two gicv3 functions is a bit unfortunate,
but I think it will do for now..
Which means he was opposed to the previous solution.
*he wasn't
On Wed, 5 Aug 2015, Feng Wu wrote:
This patch corrects a logic error when handling 64-bt bar with
more than 4G size.
With 64-bit Bar, it has two items in PCIDevice: io_regions[x]
and io_regions[x+1], io_regions[x] has all the informations for
this BAR, while io_regions[x+1] contains
We need to use libxl__domain_build_state.pv_cmdline in order to pickup
the correct args when using pygrub. libxl_domain_build_info.cmdline is
any args statically configured by the user.
This is consistent with the call to xc_domain_allocate, which takes
the cmdline too (in that case for x86/PV
On Wed, 5 Aug 2015, Lars Kurth wrote:
This is one item of feedback, which I believe is a quick win for us. This is
one piece of feedback from a list of
items that have during the last few weeks been raised with me personally,
either during face-2-face conversations
in a private e-mail
Hi Ross,
On my dom0 with a linux 4.2-rc5 kernel i encoutered the splat below.
It's probably related to your patch that went in just for 4.2-rc5:
xen/events/fifo: Handle linked events when closing a port
--
Sander
[ 49.020173] [ cut here ]
[ 49.020187] WARNING: CPU:
flight 60597 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60597/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-buildfail in 60395 REGR. vs. 59963
Tests which are
On 8/7/2015 at 01:21 AM, in message 55c39796.8000...@citrix.com, George
Dunlap george.dun...@citrix.com wrote:
On 08/06/2015 04:11 AM, Chun Yan Liu wrote:
As 4.6 goes to bug fixing stage, maybe we can pick up this thread? :-)
Beside to call for your precious review comments and
flight 60594 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60594/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl 13 guest-saverestore fail REGR. vs. 59254
Or how can I get the address of hypercall page belonging to a running domU?
2015-08-07 9:45 GMT+08:00 big strong fangtu...@gmail.com:
I want to locate the hypercall page address when creating a new domU, so
as to locate hypercalls. Is it possible?
2015-08-06 17:49 GMT+08:00 Andrew Cooper
This document is going to explain the design details of Xen booting with
ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are
welcome.
To Xen itself booting with ACPI, this is similar to Linux kernel except
that Xen doesn't parse DSDT table. So I'll skip this part and focus on
On Mon, Jul 20, 2015 at 01:03:52PM +0300, Dan Carpenter wrote:
Hello Konrad Rzeszutek Wilk,
The patch 7f9140626c75: xen/mmu: Copy and revector the P2M tree.
from Jul 26, 2012, leads to the following static checker warning:
arch/x86/xen/mmu.c:1105 xen_cleanhighmap()
warn:
Hi,
On 04/08/15 19:12, Julien Grall wrote:
diff --git a/include/xen/page.h b/include/xen/page.h
index c5ed20b..e7e1425 100644
--- a/include/xen/page.h
+++ b/include/xen/page.h
@@ -3,9 +3,9 @@
#include asm/xen/page.h
-static inline unsigned long page_to_mfn(struct page *page)
flight 60577 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60577/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 15 guest-start/debian.repeat fail REGR. vs. 60214
On Thu, 6 Aug 2015, Julien Grall wrote:
Hi,
On 04/08/15 19:12, Julien Grall wrote:
diff --git a/include/xen/page.h b/include/xen/page.h
index c5ed20b..e7e1425 100644
--- a/include/xen/page.h
+++ b/include/xen/page.h
@@ -3,9 +3,9 @@
#include asm/xen/page.h
-static
On 06/08/15 12:06, Stefano Stabellini wrote:
On Thu, 6 Aug 2015, Julien Grall wrote:
Hi,
On 04/08/15 19:12, Julien Grall wrote:
diff --git a/include/xen/page.h b/include/xen/page.h
index c5ed20b..e7e1425 100644
--- a/include/xen/page.h
+++ b/include/xen/page.h
@@ -3,9 +3,9 @@
On 08/06/2015 03:02 PM, Juergen Gross wrote:
On 08/06/2015 02:46 PM, Vlastimil Babka wrote:
On 07/17/2015 06:51 AM, Juergen Gross wrote:
... and here for !CONFIG_MMU.
So, what about CONFIG_MMU !FIXMAP_PAGE_RO combinations? Which
translates to CONFIG_MMU !PAGE_KERNEL_RO. Maybe they don't
On Thu, Aug 06, 2015 at 11:55:57AM +0100, Ian Campbell wrote:
We need to use libxl__domain_build_state.pv_cmdline in order to pickup
the correct args when using pygrub. libxl_domain_build_info.cmdline is
any args statically configured by the user.
This is consistent with the call to
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
Osstest/Debian.pm | 8
1 file changed, 8 insertions(+)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 7a0ead4..07a71e2 100644
--- a/Osstest/Debian.pm
+++ b/Osstest/Debian.pm
@@ -923,7 +923,15 @@ END
# that as a
always_halt results in d-i calling halt, which does not necessarily
poweroff the host (it seems to for x86/PV Xen guests, but does not for
ARM). Using exit/poweroff calls poweroff which is equivalent to
halt -p, doing so results in ARM guests powering off as desired.
Signed-off-by: Ian Campbell
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
ts-debian-di-install | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/ts-debian-di-install b/ts-debian-di-install
index 612e0fa..0e778e3 100755
--- a/ts-debian-di-install
+++ b/ts-debian-di-install
@@ -190,9
This is the pygrub debug log.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
ts-logs-capture | 1 +
1 file changed, 1 insertion(+)
diff --git a/ts-logs-capture b/ts-logs-capture
index 0081372..b99b1db 100755
--- a/ts-logs-capture
+++ b/ts-logs-capture
@@ -143,6 +143,7 @@ sub
The armhf tests in distros-debian-* have always failed since they did not
shutdown at the end of installation. I've now investigated that and the fix
is patch #2 in this series.
The remainder of the series consists of various fixes, extensions to
existing quirks and workarounds, mainly to the use
On 08/06/2015 02:46 PM, Vlastimil Babka wrote:
On 07/17/2015 06:51 AM, Juergen Gross wrote:
During early boot as Xen pv domain the kernel needs to map some page
tables supplied by the hypervisor read only. This is needed to be
able to relocate some data structures conflicting with the physical
On Thu, 2015-08-06 at 11:56 +0100, Wei Liu wrote:
On Thu, Aug 06, 2015 at 11:48:15AM +0100, Ian Campbell wrote:
On Thu, 2015-08-06 at 11:17 +0100, Wei Liu wrote:
I don't think so. Though the doc is not clear on how we should use
those
APIs, I got my idea from
This is more useful in standalone mode than having everything be
debian.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
ts-debian-di-install | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-debian-di-install b/ts-debian-di-install
index 0e778e3..95a9215 100755
---
This workaround is only necessary because of how pv-menu-list works,
so we should only apply both or neither of them.
This results in a long line and I'm about to add a second workaround
to this block, so switch to a regular if block instead of postfixing
on the one command. Move the comment
Realistically this isn't going to change until we have either u-boot
or UEFI in an arm32 guest.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
Osstest/Debian.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index
On 07/17/2015 06:51 AM, Juergen Gross wrote:
During early boot as Xen pv domain the kernel needs to map some page
tables supplied by the hypervisor read only. This is needed to be
able to relocate some data structures conflicting with the physical
memory map especially on systems with huge RAM
On Wed, Aug 05, 2015 at 10:22:13AM +0100, Lars Kurth wrote:
This is one item of feedback, which I believe is a quick win for us.
This is one piece of feedback from a list of items that have during
the last few weeks been raised with me personally, either during
face-2-face conversations in a
On Thu, 2015-08-06 at 12:10 +0100, Wei Liu wrote:
On Thu, Aug 06, 2015 at 11:55:57AM +0100, Ian Campbell wrote:
We need to use libxl__domain_build_state.pv_cmdline in order to pickup
the correct args when using pygrub. libxl_domain_build_info.cmdline is
any args statically configured by the
Hi,
I have looked into getting OpenStack been tested on the latest Xen via
osstest. There is an adjustement in common code to accomodate OpenStack,
this is a few extra Linux config option.
The ts-openstack-devstack script does prepare a bit more the host, clone
devstack and other OpenStack
Signed-off-by: Anthony PERARD anthony.per...@citrix.com
---
sg-run-job | 1 +
ts-openstack-tempest | 35 +++
2 files changed, 36 insertions(+)
create mode 100755 ts-openstack-tempest
diff --git a/sg-run-job b/sg-run-job
index 5320d62..0b2184b 100755
On 06/08/15 17:45, Ben Catterall wrote:
This allocation function is used by the deprivileged mode initialisation code
to allocate pages for the new page table mappings and page frames on the HAP
page heap.
Signed-off-by: Ben Catterall ben.catter...@citrix.com
This is fine for your test box,
Hi all,
I have a working base for this and would appreciate feedback at this point to
evaluate if it is moving in the right direction.
Many thanks in advance,
Ben
The aim of this work is to create a proof-of-concept to establish if it is
feasible to move certain Xen operations into a
This script also install packages needed and clone every OpenStack trees to
be use by devstack to deploy OpenStack.
Signed-off-by: Anthony PERARD anthony.per...@citrix.com
---
sg-run-job| 5 +
ts-openstack-devstack | 304 ++
2 files
OpenStack Tempest is using aes-xts-plain64 cipher with cryptsetup to test
encrypted volumes and this is not configurable.
Signed-off-by: Anthony PERARD anthony.per...@citrix.com
---
ts-kernel-build | 3 +++
1 file changed, 3 insertions(+)
diff --git a/ts-kernel-build b/ts-kernel-build
index
On 08/06/2015 01:04 PM, Robert Richter wrote:
Boris,
we are working on acpi pci support for arm64. For this we are enabling
PCI_MMCONFIG on arm64 which breaks compiling drivers/xen/pci.c.
Looking into it there is x86 code in generic driver code introduced
with:
8deb3eb1461e xen/mcfg: Call
setup_frametable_mappings() rounds frametable_size up to a multiple
of 32MB. This is wasteful on systems with less than 4GB of RAM,
although it does allow the contig bit to be set in the PTEs.
Where the frametable is less than 32MB in size, instead round up
to a multiple of 2MB, not setting the
The process to switch into and out of deprivileged mode can be likened to
setjmp/longjmp.
To enter deprivileged mode, we take a copy of the stack from the guest's
registers up to the current stack pointer. This allows us to restore the stack
when we have finished the deprivileged mode operation,
The paging structure mappings for the deprivileged mode are added
to the monitor page table for HVM guests. The entries are generated by
walking the page tables and mapping in new pages. If a higher-level page table
mapping exists, we attempt to traverse all the way down to a leaf page and add
the
This allocation function is used by the deprivileged mode initialisation code
to allocate pages for the new page table mappings and page frames on the HAP
page heap.
Signed-off-by: Ben Catterall ben.catter...@citrix.com
---
xen/arch/x86/mm/hap/hap.c| 23 +++
Signed-off-by: Anthony PERARD anthony.per...@citrix.com
---
ap-common| 9 +
ap-fetch-version | 4
ap-fetch-version-old | 5 +
ap-print-url | 3 +++
cri-common | 1 +
make-flight | 42 +-
Signed-off-by: Anthony PERARD anthony.per...@citrix.com
---
ts-xen-install | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/ts-xen-install b/ts-xen-install
index 0f53382..17edfb7 100755
--- a/ts-xen-install
+++ b/ts-xen-install
@@ -153,7 +153,8 @@ sub setupboot () {
Added trap handlers to catch exceptions such as a page fault, general
protection fault, etc. These handlers will crash the domain as such exceptions
would indicate that either there is a bug in deprivileged mode or it has been
compromised by an attacker.
Signed-off-by: Ben Catterall
flight 60584 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60584/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
Use the correct API sd_listen_fds to determine whether the process is
started by systemd.
Change sd_booted to booted_by_systemd to avoid confusion with systemd's
API.
launched_by_systemd seems like a more conventional name for this.One
On 08/05/2015 07:19 PM, Wei Liu wrote:
On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote:
[...]
Right. I misinterpreted sd_boot.
You patch, however, has the undesirable effect that it fails to report
error if xenstored is started by systemd but couldn't claim the
socket. I don't
On 17/07/15 05:51, Juergen Gross wrote:
Support 64 bit pv-domains with more than 512GB of memory.
Applied to for-linus-4.3, thanks.
Boris, can we get a test run with this branch, please?
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
flight 37793 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/37793/
Failures :-/ but no regressions.
Tests which did not succeed,
including tests which could not be run:
test-armhf-armhf-armhf-jessie-netboot-pygrub 9 debian-di-install fail never
pass
On Thu, 6 Aug 2015, Julien Grall wrote:
On 06/08/15 12:06, Stefano Stabellini wrote:
On Thu, 6 Aug 2015, Julien Grall wrote:
Hi,
On 04/08/15 19:12, Julien Grall wrote:
diff --git a/include/xen/page.h b/include/xen/page.h
index c5ed20b..e7e1425 100644
--- a/include/xen/page.h
+++
Signed-off-by: Wei Liu wei.l...@citrix.com
---
For 4.6: pure doc changes, risk free.
---
tools/xenstore/xenstored_core.c | 30 +++---
1 file changed, 15 insertions(+), 15 deletions(-)
diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c
index
There were two problems with original code:
1. sd_booted() was used to determined if the process was started by
systemd, which was wrong.
2. Exit with error if pidfile was specified, which was too harsh.
These two combined made cxenstored unable to start by hand if it ran
on a system which
Use the correct API sd_listen_fds to determine whether the process is
started by systemd.
Change sd_booted to booted_by_systemd to avoid confusion with systemd's
API.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
Cc: Dave Scott dave.sc...@eu.citrix.com
For 4.6: without this oxenstored is
Oxenstored only needs to notify systemd its readiness state once. Move
sd_notify_ready out of main loop.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
Cc: Dave Scott dave.sc...@eu.citrix.com
For 4.6: avoid wasting CPU cycles, easy to reason its correctness.
There is a small risk that either I
Signed-off-by: Wei Liu wei.l...@citrix.com
---
For 4.6: remove dead code, risk free.
---
tools/xenstore/xenstored_core.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c
index 72f531b..100f59e 100644
---
Wei Liu (5):
cxenstored: fix systemd socket activation
cxenstored: document a bunch of short options in help string
cxenstored: remove dead option
oxenstored: fix systemd socket activation
oxenstored: move sd_notify_ready out of main loop
tools/ocaml/xenstored/systemd.ml | 2 +-
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
Signed-off-by: Wei Liu wei.l...@citrix.com
---
For 4.6: remove dead code, risk free.
I'm pretty sure this isn't actually dead:
The 'm' option is handled by option parsing, setting the dom0_domid global.
xenbus_master_domid() returns
On Thu, Aug 06, 2015 at 02:49:28PM +0100, Ian Campbell wrote:
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
Signed-off-by: Wei Liu wei.l...@citrix.com
---
For 4.6: remove dead code, risk free.
I'm pretty sure this isn't actually dead:
The 'm' option is handled by option parsing,
-Original Message-
From: Stefano Stabellini [mailto:stefano.stabell...@eu.citrix.com]
Sent: Thursday, August 06, 2015 6:43 PM
To: Wu, Feng
Cc: stefano.stabell...@eu.citrix.com; xen-de...@lists.xensource.com;
qemu-de...@nongnu.org
Subject: Re: [PATCH v1] xenpt: Properly handle
On Tue, 2015-08-04 at 18:12 +0100, David Vrabel wrote:
On 04/08/15 17:41, Jason A. Donenfeld wrote:
Hi folks,
Paul McKenney and I had an offline discussion about some rcu questions
that eventually lead into me investigating a strange full lock-up I'm
experiencing as a consequence of a
On Thu, 6 Aug 2015, Shannon Zhao wrote:
On 2015/8/5 18:31, Stefano Stabellini wrote:
On Wed, 5 Aug 2015, Shannon Zhao wrote:
On 2015/8/4 22:37, Stefano Stabellini wrote:
On Tue, 4 Aug 2015, Shannon Zhao wrote:
This document is going to explain the design details of Xen booting with
ACPI
On Thu, 2015-08-06 at 10:20 +0100, Wei Liu wrote:
On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote:
On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote:
On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote:
[...]
Right. I misinterpreted sd_boot.
You
On Wed, 2015-08-05 at 18:00 +0100, George Dunlap wrote:
On Wed, Aug 5, 2015 at 4:47 PM, Andrew Cooper andrew.coop...@citrix.com
wrote:
From: Anshul Makkar anshul.mak...@citrix.com
A domain with sufficient shadow allocation can cause a watchdog timeout
during domain destruction. Expand
On Thu, 2015-08-06 at 09:25 +0100, Wei Liu wrote:
On Thu, Aug 06, 2015 at 12:49:51AM +, Tian, Kevin wrote:
From: Ting-Wei Lan [mailto:lant...@gmail.com]
Sent: Thursday, August 06, 2015 1:10 AM
When using Linux = 3.19 (commit 47591df) as dom0 on some Intel
Ironlake
devices,
flight 60587 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60587/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 8ca1489ba63753f3dfd6552fd7a2c1f4f64e296a
baseline version:
ovmf
On 06/08/15 16:58, Jason A. Donenfeld wrote:
On Thu, Aug 6, 2015 at 12:02 PM, David Vrabel david.vra...@citrix.com wrote:
Linux PV guests must use the Xen PV APIC driver. You need to
investigate why your PV guest is not using this (although I'm surprised
it works at all with the wrong one).
On Thu, 2015-08-06 at 14:50 +0100, Ian Campbell wrote:
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
Use the correct API sd_listen_fds to determine whether the process is
started by systemd.
Change sd_booted to booted_by_systemd to avoid confusion with systemd's
API.
In that case, it doesn't compile.
arch/x86/xen/apic.c:204:13: error: redefinition of ‘xen_init_apic’
void __init xen_init_apic(void)
^
In file included from arch/x86/xen/apic.c:9:0:
arch/x86/xen/xen-ops.h:110:27: note: previous definition of
‘xen_init_apic’ was here
static inline
flight 60583 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60583/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 59059
Regressions which
On Tue, Aug 4, 2015 at 5:29 PM, Julien Grall julien.gr...@citrix.com wrote:
Based on 8.1.3 (IHI 0069A), unless stated otherwise, the 64-bit registers
supports both 32-bit and 64-bits access.
All the registers we properly emulate (i.e not RAZ/WI) supports 32-bit access.
For RAZ/WI, it's also
It turns out that domU also requires the Xen APIC driver. Otherwise we
get stuck in busy loops that never exit, such as in this stack trace:
(gdb) target remote localhost:
Remote debugging using localhost:
__xapic_wait_icr_idle () at ./arch/x86/include/asm/ipi.h:56
56 while
On Wed, 2015-08-05 at 17:22 +0100, Matthew Vernon wrote:
Alternatively I don't know if drbd upstream provides a convenient way
to
build and install the modules in an out of tree way?
I built the 8.4.6 kernel module, and that has resolved the kernel
panics.
Great!
So this does seem
On Thu, Aug 06, 2015 at 12:49:51AM +, Tian, Kevin wrote:
From: Ting-Wei Lan [mailto:lant...@gmail.com]
Sent: Thursday, August 06, 2015 1:10 AM
When using Linux = 3.19 (commit 47591df) as dom0 on some Intel Ironlake
devices, It is possible to encounter graphics issues that make
Hi, Liu
Does pv or pvh guest support virtio devices?
If yes, how can I configure the guest?
If not, how can I make it support?
Thanks
Lai
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi David,
On 24/07/15 11:36, David Vrabel wrote:
On 09/07/15 21:42, Julien Grall wrote:
Only use the first 4KB of the page to store the events channel info. It
means that we will wast 60KB every time we allocate page for:
* control block: a page is allocating per CPU
* event array:
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote:
Signed-off-by: Wei Liu wei.l...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
I’m not familiar with the systemd side of things, but the OCaml stub changes
look ok:
Acked-by: David Scott dave.sc...@citrix.com
On 6 Aug 2015, at 14:38, Wei Liu wei.l...@citrix.com wrote:
Use the correct API sd_listen_fds to determine whether the process is
started by systemd.
On Thu, Aug 6, 2015 at 12:02 PM, David Vrabel david.vra...@citrix.com wrote:
Linux PV guests must use the Xen PV APIC driver. You need to
investigate why your PV guest is not using this (although I'm surprised
it works at all with the wrong one).
Actually it appears this PV Guest is using the
Although I’m not familiar with systemd, this also looks fine:
Acked-by: David Scott dave.sc...@citrix.com
On 6 Aug 2015, at 14:38, Wei Liu wei.l...@citrix.com wrote:
Oxenstored only needs to notify systemd its readiness state once. Move
sd_notify_ready out of main loop.
Signed-off-by:
90 matches
Mail list logo