flight 100936 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100936/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4 host-build-prep fail REGR. vs. 100895
flight 100940 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100940/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d947fbed72226011961e5e2691f09baebf128795
baseline version:
ovmf
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not in 4GB address space, then the IPs will not work properly.
Introduce dom0_lowmem bootargs, user could pass "dom0_lowmem=xx"
to xen. It means how much memory user
This run is configured for baseline tests only.
flight 67706 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67706/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1
On 2016/9/8 2:59, Boris Ostrovsky wrote:
> PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor
> objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so
> that it can be included in ASLs for both HVM and PVH2.
>
> Signed-off-by: Boris Ostrovsky
This run is configured for baseline tests only.
flight 67707 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67707/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf dd82465a9f0f0beff0e4d74c6e3192b966853332
baseline
This run is configured for baseline tests only.
flight 67705 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67705/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 6
flight 100933 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100933/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail like 100902
> -Original Message-
> From: Wu, Feng
> Sent: Monday, September 5, 2016 11:12 AM
> To: Jan Beulich
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; Wu, Feng
On 9/13/16 2:40 PM, Derek Straka wrote:
> diff --git a/xen/arch/x86/efi/efi-boot.h b/xen/arch/x86/efi/efi-boot.h
> index 10985721..911fdfd 100644
> --- a/xen/arch/x86/efi/efi-boot.h
> +++ b/xen/arch/x86/efi/efi-boot.h
> @@ -476,6 +476,7 @@ static void __init efi_arch_edd(void)
>
On Tue, Sep 13, 2016 at 02:24:31PM +0100, Julien Grall wrote:
>
>
>On 13/09/16 14:12, Peng Fan wrote:
>>Hi Julien,
>>On Tue, Sep 13, 2016 at 01:59:01PM +0100, Julien Grall wrote:
>>>Hello Peng,
>>>
>>>On 13/09/16 13:55, Peng Fan wrote:
On AArch64 SoCs, some IPs may only have the capability to
On Wed, 14 Sep 2016, Shannon Zhao wrote:
> On 2016/9/13 23:17, Julien Grall wrote:
> >
> >
> > On 13/09/16 14:06, Shannon Zhao wrote:
> >> Hi Julien,
> >
> > Hello Shannon,
> >
> >> On 2016/9/13 19:56, Julien Grall wrote:
> >>> Hi Shannon,
> >>>
> >>> On 02/09/16 03:55, Shannon Zhao wrote:
>
On 2016/9/13 23:17, Julien Grall wrote:
>
>
> On 13/09/16 14:06, Shannon Zhao wrote:
>> Hi Julien,
>
> Hello Shannon,
>
>> On 2016/9/13 19:56, Julien Grall wrote:
>>> Hi Shannon,
>>>
>>> On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
The
flight 100915 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100915/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 100877
test-amd64-amd64-xl-rtds
flight 100932 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100932/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf dd82465a9f0f0beff0e4d74c6e3192b966853332
baseline version:
ovmf
On Mon, Sep 05, 2016 at 06:13:56AM -0400, Kyle Temkin wrote:
> From: "Kyle J. Temkin"
>
> Tegra boards feature a NS16550-compatible serial mapped into the MMIO
> space. Add support for its use both as a full-featured serial port and
> as an earlyprintk driver.
>
> Adds a
On Thu, Sep 01, 2016 at 10:57:48AM -0700, Ed Swierk wrote:
> Windows 8, 10 and Server 2012 guests hang intermittently while booting
> on Xen 4.5.3 with 1 vCPU and 4 e1000 vNICs, shortly after the Windows
> logo appears and the little dots start spinning.
>
> Running strace on qemu shows its main
flight 100909 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100909/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-xtf-amd64-amd64-3 19 xtf/test-hvm32-invlpg~shadow fail baseline untested
test-xtf-amd64-amd64-3
Allows for the conditional inclusion of VGA driver on the x86 platform
rather than having it always enabled.
The default configuration for the CONFIG_VGA option remains 'y' on x86, so the
behavior out of the box remains unchanged. The addition of the option allows
advanced users to
Hi Julien,
On 09/09/2016 06:56 PM, Julien Grall wrote:
> Hello Sergej
>
> On 16/08/16 23:16, Sergej Proskurin wrote:
>> diff --git a/xen/arch/arm/Makefile b/xen/arch/arm/Makefile
>> index 23aaf52..4a7f660 100644
>> --- a/xen/arch/arm/Makefile
>> +++ b/xen/arch/arm/Makefile
>> @@ -5,6 +5,7 @@
flight 100912 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100912/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 9 debian-di-installfail REGR. vs. 100866
Tests which did not
On Tue, Sep 13, 2016 at 03:21:04AM -0600, Jan Beulich wrote:
> >>> On 11.09.16 at 22:35, wrote:
> > Furthermore on x86 the bloat-o-meter detects that with this
> > change:
> >
> > [konrad@char xen]$ ~/linux/scripts/bloat-o-meter xen-syms xen-syms.align4
> > add/remove:
On 08/09/16 14:09, Jan Beulich wrote:
> Now that all decoding happens in x86_decode() there's no need to keep
> the local registers copy in struct x86_emulate_state. Only rIP gets
> updated in the decode phase, so only that register needs tracking
> there. All other (read-only) registers can be
On 08/09/16 14:07, Jan Beulich wrote:
> This way we can offer to callers the service of just sizing
> instructions, and we also can better guarantee not to raise the wrong
> fault due to not having read all relevant bytes.
>
> Signed-off-by: Jan Beulich
>
> ---
On 13/09/16 14:46, Mihai Donțu wrote:
> On Tue, 13 Sep 2016 09:10:32 -0400 Konrad Rzeszutek Wilk wrote:
>> On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
>>> All,
>>>
>>> in
>>> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
>>> and
>>>
On 12/09/16 16:23, Jan Beulich wrote:
> All,
>
> in
> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
> and
> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01210.html
> Andrew basically suggests that we should switch away from using
> ASSERT() and over
When emulating instructions the emulator maintains a small i-cache fetched
from the guest memory. This patch extends the vm_event interface to allow
returning this i-cache via the vm_event response instead.
When responding to a SOFTWARE_BREAKPOINT event (INT3) the monitor subscriber
normally has
Setting response flags in vm_event are only ever safe if the vCPUs are paused.
To reflect this we move all checks within the if block that already checks
whether this is the case. Checks that are only supported on one architecture
we relocate the bitmask operations to the arch-specific handlers to
flight 100907 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100907/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail REGR. vs. 100895
On 13/09/16 18:35, Derek Straka wrote:
> Allows for the conditional inclusion of EHCI UART driver on the x86 platform
> rather than having it always enabled.
>
> The default configuration for the HAS_EHCI option remains 'y' on x86, so the
> behavior out of the box remains unchanged. The addition
On 13/09/16 18:35, Derek Straka wrote:
> Allows for the conditional inclusion of NS16550 UART driver on the x86
> platform
> rather than having it always enabled.
>
> The default configuration for the HAS_NS16550 option remains 'y' on x86, so
> the
> behavior out of the box remains unchanged.
On Mon, Sep 12, 2016 at 11:47:35AM +0100, George Dunlap wrote:
> On 08/09/16 17:45, Lai, Paul C wrote:
> > [Paul2] in-line
>
> If you're going to engage in discussions on xen-devel it would really be
> worth your time to find a mail setup that allows you to actually quote
> properly such that you
Allows for the conditional inclusion of NS16550 UART driver on the x86 platform
rather than having it always enabled.
The default configuration for the HAS_NS16550 option remains 'y' on x86, so the
behavior out of the box remains unchanged. The addition of the option allows
advanced users to
Allows for the conditional inclusion of EHCI UART driver on the x86 platform
rather than having it always enabled.
The default configuration for the HAS_EHCI option remains 'y' on x86, so the
behavior out of the box remains unchanged. The addition of the option allows
advanced users to
I'm looking to get started with osstest and running to some roadblocks.
The page
https://blog.xenproject.org/2013/02/02/xen-automatic-test-system-osstest/ looks
like the place to begin, but
1. The README link returns 404 (file not found)
> > > On Mon, Sep 12, 2016 at 07:31:42AM +, Chen, Farrah wrote:
> > > > When I compile xen with the latest commit in RHEL 6.7, it failed when
> > > > make tools. Errors showed when running edk2 build for OvmfPkgX64.
> > > > erAsm.iii:315: error: invalid combination of opcode and operands
On 13/09/2016 17:46, "George Dunlap" wrote:
>On 12/09/16 17:20, Lars Kurth wrote:
>> Added RTC Policy
>> Added +2 ... -2 scheme for votes
>> Clarified lazy consensus (tallying and lazy voting)
>> Added Informal Votes/Surveys
>> Added Project Team Leadership role and
On Mon, Sep 12, 2016 at 04:31:20PM +0100, Julien Grall wrote:
> Hi,
>
> On 12/09/16 16:28, Jan Beulich wrote:
> > > > > On 11.09.16 at 22:35, wrote:
> > > x86 implements all of them by default - and we just
> > > add two extra HAS_ variables to be declared in autoconf.h.
On 12/09/16 17:20, Lars Kurth wrote:
> Added RTC Policy
> Added +2 ... -2 scheme for votes
> Clarified lazy consensus (tallying and lazy voting)
> Added Informal Votes/Surveys
> Added Project Team Leadership role and Decision making
> Added Community Decisions with Funding and Legal Implications
>
Altp2m cleanup work
The altp2m clean work is motivated by the following URLs:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04323.html
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04454.html
Ravi Sahita's dynamically allocated altp2m domain.
Introduce set_altp2m_active() and altp2m_active() api()s.
Signed-off-by: Ravi Sahita
Signed-off-by: Paul Lai
---
xen/arch/x86/hvm/hvm.c| 8 +++---
xen/arch/x86/hvm/vmx/vmx.c| 2 +-
This makes the code a little easier to read.
Moving hvm_altp2m_supported() check into functions that use it
for better readability.
Moving ept code to ept specific files as requested in:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04323.html
Renamed p2m_init_altp2m_helper()
>>> On 13.09.16 at 17:59, wrote:
> On Mon, Sep 12, 2016 at 01:49:51AM -0600, Jan Beulich wrote:
>> >>> On 11.09.16 at 17:48, wrote:
>> > --- a/docs/misc/livepatch.markdown
>> > +++ b/docs/misc/livepatch.markdown
>> > @@ -875,6 +875,12 @@ section
> On Sep 13, 2016, at 2:05 AM, Andrew Cooper wrote:
>
> On 13/09/16 08:51, Jan Beulich wrote:
> On 12.09.16 at 19:28, wrote:
>> Please try to get quoting right - your response was rather hard to
>> follow.
>>
>>> On Sep 12, 2016, at 2:00
On 12/09/16 15:32, Jan Beulich wrote:
On 09.09.16 at 17:16, wrote:
>> The following code illustrates this idea:
>>
>> typedef struct dm_op_buffer {
>> XEN_GUEST_HANDLE(void) h;
>> size_t len;
>> } dm_op_buffer_t;
>
> This implies that we'll lose all
On 09/11/2016 04:48 PM, Konrad Rzeszutek Wilk wrote:
The initial patch: 11ff40fa7bb5fdcc69a58d0fec49c904ffca4793
"xen/xsplice: Hypervisor implementation of XEN_XSPLICE_op" caps the
size of the binary at 2MB. We follow that in capping the size
of the .BSSes to be at maximum 2MB.
Signed-off-by:
Hi Julien,
On 09/13/2016 05:08 PM, Julien Grall wrote:
>
>
> On 13/09/16 16:06, Sergej Proskurin wrote:
+}
+
+out:
+p2m_read_unlock(hp2m);
+
+return true;
+}
+
static inline void altp2m_reset(struct p2m_domain *p2m)
{
On Mon, Sep 12, 2016 at 01:49:51AM -0600, Jan Beulich wrote:
> >>> On 11.09.16 at 17:48, wrote:
> > --- a/docs/misc/livepatch.markdown
> > +++ b/docs/misc/livepatch.markdown
> > @@ -875,6 +875,12 @@ section and the new function will reference the new
> > string in the new
Hi Wei,
On 08/24/2016 02:27 PM, Wei Liu wrote:
> On Wed, Aug 17, 2016 at 12:17:14AM +0200, Sergej Proskurin wrote:
>> This commit extends xen-access by a simple test of the functionality
>> provided by "xc_altp2m_change_gfn". The idea is to dynamically remap a
>> trapping gfn to another mfn,
>>> On 13.09.16 at 16:56, wrote:
Seems like mistakenly dropped xen-devel in my earlier reply; re-added.
> On 9/13/2016 5:02 PM, Jan Beulich wrote:
> On 13.09.16 at 09:12, wrote:
>>> On a machine with a mount of cpus, dump_timerq() lasts several
On 13/09/16 14:06, Shannon Zhao wrote:
Hi Julien,
Hello Shannon,
On 2016/9/13 19:56, Julien Grall wrote:
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
The design of this feature is described as below.
Firstly, the toolstack (libxl)
Hi Julien,
On 09/12/2016 04:29 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/16 23:17, Sergej Proskurin wrote:
>> Signed-off-by: Sergej Proskurin
>> ---
>> Cc: Stefano Stabellini
>> Cc: Julien Grall
>> ---
>> v2:
On 13/09/16 16:06, Sergej Proskurin wrote:
+}
+
+out:
+p2m_read_unlock(hp2m);
+
+return true;
+}
+
static inline void altp2m_reset(struct p2m_domain *p2m)
{
p2m_write_lock(p2m);
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 0bf1653..a4c923c 100644
---
Hi Julien,
On 09/12/2016 04:18 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/16 23:17, Sergej Proskurin wrote:
>> This commit adds the function "altp2m_lazy_copy" implementing the altp2m
>> paging mechanism. The function "altp2m_lazy_copy" lazily copies the
>> hostp2m's mapping into the
Hi Julien,
On 09/12/2016 11:17 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:17, Sergej Proskurin wrote:
>> This commit makes sure that the page reference count is updated through
>> the function "p2m_put_l3_page" only the entries have been freed from the
>> hosts's p2m.
>>
>>
On 13/09/16 15:00, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 11:02 AM, Julien Grall wrote:
On 16/08/2016 23:17, Sergej Proskurin wrote:
This commit extends the function "p2m_mem_access_check" and
"p2m_mem_access_check_and_get_page" to consider altp2m. The function
Hi Julien,
On 09/12/2016 11:02 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:17, Sergej Proskurin wrote:
>> This commit extends the function "p2m_mem_access_check" and
>> "p2m_mem_access_check_and_get_page" to consider altp2m. The function
>> "p2m_mem_access_check_and_get_page"
flight 100905 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100905/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail like 100813
On Tue, 13 Sep 2016 09:10:32 -0400 Konrad Rzeszutek Wilk wrote:
> On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
> > All,
> >
> > in
> > https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
> > and
> >
On Thu, Sep 08, 2016 at 12:24:46PM +0200, Laszlo Ersek wrote:
> On 09/08/16 11:38, Anthony PERARD wrote:
> > Hello,
> >
> > We are introducing a new virtualisation mode in Xen called PVHv2 (also
> > called hvmlite in the past). We would like to have a UEFI firmware
> > running on it to make it
On 13/09/16 14:42, Sergej Proskurin wrote:
Hi Julien,
On 09/13/2016 03:30 PM, Julien Grall wrote:
On 13/09/16 14:27, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 10:53 AM, Julien Grall wrote:
Hello Sergej,
On 16/08/2016 23:16, Sergej Proskurin wrote:
This commit
Hi Julien,
On 09/13/2016 03:30 PM, Julien Grall wrote:
>
>
> On 13/09/16 14:27, Sergej Proskurin wrote:
>> Hi Julien,
>
> Hello Sergej,
>
>>
>> On 09/12/2016 10:53 AM, Julien Grall wrote:
>>> Hello Sergej,
>>>
>>> On 16/08/2016 23:16, Sergej Proskurin wrote:
This commit extends the function
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
> Beulich
> Sent: 12 September 2016 16:24
> To: xen-devel
> Subject: [Xen-devel] BUG_ON() vs ASSERT()
>
> All,
>
> in
>
On 17/08/16 18:18, Dario Faggioli wrote:
> When a vcpu explicitly yields it is usually giving
> us an advice of "let someone else run and come back
> to me in a bit."
>
> Credit2 isn't, so far, doing anything when a vcpu
> yields, which means an yield is basically a NOP (well,
> actually, it's
On 13/09/16 14:27, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 09/12/2016 10:53 AM, Julien Grall wrote:
Hello Sergej,
On 16/08/2016 23:16, Sergej Proskurin wrote:
This commit extends the function prototypes of the functions:
* __p2m_get_mem_access
*
Hi Julien,
On 09/12/2016 10:53 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:16, Sergej Proskurin wrote:
>> This commit extends the function prototypes of the functions:
>> * __p2m_get_mem_access
>> * p2m_mem_access_check_and_get_page
>>
>> We extend the function prototype of
On 13/09/16 14:12, Peng Fan wrote:
Hi Julien,
On Tue, Sep 13, 2016 at 01:59:01PM +0100, Julien Grall wrote:
Hello Peng,
On 13/09/16 13:55, Peng Fan wrote:
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not
Hi Julien,
On Tue, Sep 13, 2016 at 01:59:01PM +0100, Julien Grall wrote:
>Hello Peng,
>
>On 13/09/16 13:55, Peng Fan wrote:
>>On AArch64 SoCs, some IPs may only have the capability to access
>>32bits address space. The physical memory assigned for Dom0 maybe
>>not in 4GB address space, then the
On Mon, Sep 12, 2016 at 09:23:41AM -0600, Jan Beulich wrote:
> All,
>
> in
> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01201.html
> and
> https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01210.html
> Andrew basically suggests that we should switch away from
flight 67704 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67704/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-i386-current-netinst-pygrub 10 guest-start fail REGR. vs.
67647
Hi Julien,
On 2016/9/13 19:56, Julien Grall wrote:
> Hi Shannon,
>
> On 02/09/16 03:55, Shannon Zhao wrote:
>> From: Shannon Zhao
>>
>> The design of this feature is described as below.
>> Firstly, the toolstack (libxl) generates the ACPI tables according the
>> number
flight 100924 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100924/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl
Hi Julien,
On 09/12/2016 10:47 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:16, Sergej Proskurin wrote:
>> Signed-off-by: Sergej Proskurin
>> ---
>> Cc: Stefano Stabellini
>> Cc: Julien Grall
>> ---
>> v3:
Hello Peng,
On 13/09/16 13:55, Peng Fan wrote:
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not in 4GB address space, then the IPs will not work properly.
Introduce dom0_lowmem bootargs, user could pass
flight 100902 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100902/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 16 guest-start.2fail in 100893 pass in 100902
test-armhf-armhf-xl-cubietruck
On AArch64 SoCs, some IPs may only have the capability to access
32bits address space. The physical memory assigned for Dom0 maybe
not in 4GB address space, then the IPs will not work properly.
Introduce dom0_lowmem bootargs, user could pass "dom0_lowmem=xx"
to xen. It means how much memory user
Hi Julien,
On 09/12/2016 10:41 AM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/2016 23:16, Sergej Proskurin wrote:
>> Signed-off-by: Sergej Proskurin
>> ---
>> Cc: Stefano Stabellini
>> Cc: Julien Grall
>> ---
>> v2:
branch xen-4.7-testing
xenbranch xen-4.7-testing
job build-amd64
testid xen-build
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree:
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
The design of this feature is described as below.
Firstly, the toolstack (libxl) generates the ACPI tables according the
number of vcpus and gic controller.
Then, it copies these ACPI tables to
>>> On 13.09.16 at 12:37, wrote:
> On 12/09/16 15:32, Jan Beulich wrote:
> On 09.09.16 at 17:16, wrote:
>>> The following code illustrates this idea:
>>>
>>> typedef struct dm_op_buffer {
>>> XEN_GUEST_HANDLE(void) h;
>>>
This run is configured for baseline tests only.
flight 67703 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67703/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop
[using xendevel correct address]
On Tue, 2016-09-13 at 16:54 +0800, Wei Yang wrote:
> On Fri, 2016-09-09 at 17:41 +0800, Wei Yang wrote:
> >
> > I'm not surprised by that. Yet, I'd be interested in hearing more
> > about this profiling you have done (things like, how you captured
> > the data,
On 17/08/16 18:18, Dario Faggioli wrote:
> Right now, the following scenario can occurr:
> - upon vcpu v wakeup, v itself is put in the runqueue,
>and pcpu X is tickled;
> - pcpu Y schedules (for whatever reason), sees v in
>the runqueue and picks it up.
>
> This may seem ok (or even a
On 05/09/16 14:47, Dario Faggioli wrote:
> On Wed, 2016-08-31 at 18:10 +0100, anshul makkar wrote:
>> On 17/08/16 18:18, Dario Faggioli wrote:
>>>
>>> Right now, the following scenario can occurr:
>>> - upon vcpu v wakeup, v itself is put in the runqueue,
>>> and pcpu X is tickled;
>>> -
Hi Shannon,
On 13/09/16 08:03, Shannon Zhao wrote:
On 2016/9/12 23:18, Julien Grall wrote:
Hi Shannon,
On 02/09/16 03:55, Shannon Zhao wrote:
From: Shannon Zhao
Here it adds the ACPI tables size to set the target maxmem to avoid
providing less available memory
On 12/09/16 15:32, Jan Beulich wrote:
On 09.09.16 at 17:16, wrote:
>> The following code illustrates this idea:
>>
>> typedef struct dm_op_buffer {
>> XEN_GUEST_HANDLE(void) h;
>> size_t len;
>> } dm_op_buffer_t;
>
> This implies that we'll lose all
Really fix the address this time...
On Tue, Sep 13, 2016 at 10:39:02AM +0100, Wei Liu wrote:
> Hi,
>
> I just realise that your xen-devel address is wrong.
>
> It should be xen-devel@lists.xen.org.
>
> On Tue, Sep 13, 2016 at 03:30:51AM +, Chen, Farrah wrote:
> > Hi Wei,
> >
> > We have
On 13/09/16 09:27, Jan Beulich wrote:
On 12.09.16 at 18:21, wrote:
>> compress_xsave_states() mustn't read xstate_bv or xcomp_bv before first
>> confirming that the input buffer is large enough. It also doesn't cope with
>> compressed input. Make all of these
On 13/09/16 09:23, Jan Beulich wrote:
On 12.09.16 at 18:21, wrote:
>> Without checking the size input, the memcpy() for the uncompressed path might
>> read off the end of the vcpu's xsave_area. Both callers pass the approprite
>> size, so hold them to it with a
Hi Julien,
On 09/09/2016 07:14 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/16 23:16, Sergej Proskurin wrote:
>> +static int altp2m_init_helper(struct domain *d, unsigned int idx)
>> +{
>> +int rc;
>> +struct p2m_domain *p2m = d->arch.altp2m_p2m[idx];
>> +
>> +ASSERT(p2m ==
>>> On 11.09.16 at 22:35, wrote:
> Furthermore on x86 the bloat-o-meter detects that with this
> change:
>
> [konrad@char xen]$ ~/linux/scripts/bloat-o-meter xen-syms xen-syms.align4
> add/remove: 0/0 grow/shrink: 3/14 up/down: 115/-1497 (-1382)
> function
>>> On 11.09.16 at 22:35, wrote:
> --- a/xen/include/asm-x86/cpufeature.h
> +++ b/xen/include/asm-x86/cpufeature.h
> @@ -34,6 +34,7 @@ XEN_CPUFEATURE(MFENCE_RDTSC,(FSCAPINTS+0)*32+ 9) /*
> MFENCE synchronizes RDTS
>
> /* An alias of a feature we know is always
Hi Julien,
On 09/09/2016 07:02 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 16/08/16 23:16, Sergej Proskurin wrote:
>> The current implementation differentiates between flushing and
>> destroying altp2m views. This commit adds the function altp2m_flush,
>> which allows to release all of the
This run is configured for baseline tests only.
flight 67702 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67702/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 10
On 13/09/16 08:51, Jan Beulich wrote:
On 12.09.16 at 19:28, wrote:
> Please try to get quoting right - your response was rather hard to
> follow.
>
>> On Sep 12, 2016, at 2:00 AM, Jan Beulich
>> > wrote:
>>
>> On 12.09.16
>>> On 12.09.16 at 18:21, wrote:
> compress_xsave_states() mustn't read xstate_bv or xcomp_bv before first
> confirming that the input buffer is large enough. It also doesn't cope with
> compressed input. Make all of these problems the callers responsbility to
>
>>> On 12.09.16 at 18:21, wrote:
> Without checking the size input, the memcpy() for the uncompressed path might
> read off the end of the vcpu's xsave_area. Both callers pass the approprite
> size, so hold them to it with a BUG_ON().
>
> The compressed path is
>>> On 12.09.16 at 19:28, wrote:
Please try to get quoting right - your response was rather hard to
follow.
> On Sep 12, 2016, at 2:00 AM, Jan Beulich
> > wrote:
>
> On 12.09.16 at 10:47,
>
On a machine with a mount of cpus, dump_timerq() lasts several seconds
which may exceed watchdog timeout and cause Xen hyperviosr reboot.
This patch is to disable watchdog when dump timer queues to fix the
issue.
Signed-off-by: Lan Tianyu
---
xen/common/timer.c |4
On 2016/9/12 23:22, Julien Grall wrote:
> Hi Shannon,
>
> On 02/09/16 03:55, Shannon Zhao wrote:
>> From: Shannon Zhao
>>
>> The design of this feature is described as below.
>> Firstly, the toolstack (libxl) generates the ACPI tables according the
>> number of vcpus
1 - 100 of 101 matches
Mail list logo