flight 114059 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114059/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972
Tests which
>>> George Dunlap 10/05/17 7:08 PM >>>
>On 10/04/2017 09:28 AM, Jan Beulich wrote:
> On 25.09.17 at 16:26, wrote:
>>> @@ -597,6 +599,47 @@ static const struct x86_emulate_ops all_fuzzer_ops = {
>>> };
>>> #undef SET
>>>
>>> +static void _set_fpu_state(char *fxsave, bool store)
>>> +{
>>>
>>> George Dunlap 10/05/17 6:13 PM >>>
>On 10/04/2017 09:27 AM, Jan Beulich wrote:
> On 25.09.17 at 16:26, wrote:
>>> +if ( memcmp(&state[0], &state[1], sizeof(struct fuzz_state)) )
>>> +{
>>> +int i;
>>
>> unsigned int (and then %u in the format strings below)
>
>Is there re
flight 114042 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114042/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 113974
Tests which did not succee
On 10/5/17, 6:13 AM, "Andrew Cooper" wrote:
On 05/10/17 14:04, Sergey Dyasli wrote:
> On Thu, 2017-10-05 at 03:27 -0600, Jan Beulich wrote:
> On 05.10.17 at 10:18, wrote:
>>> --- a/xen/arch/x86/hvm/vmx/entry.S
>>> +++ b/xen/arch/x86/hvm/vmx/entry.S
>>> @@ -80,7 +80,7 @
flight 114056 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114056/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972
Tests which
flight 114038 qemu-upstream-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114038/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 111049
Tests
This run is configured for baseline tests only.
flight 72204 qemu-upstream-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72204/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 1
flight 114036 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114036/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 113872
Tests which did not succeed, b
flight 114054 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114054/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972
Tests which
flight 114034 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114034/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 113869
Tests which did not succeed,
This run is configured for baseline tests only.
flight 72202 qemu-upstream-4.7-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72202/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1)
flight 114053 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114053/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972
Tests which
flight 114030 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114030/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 113990
test-armhf-armhf-libvirt 14 saveresto
Hi Shaohua,
It seems this patch fixed my issue ! Had the issue remaining in 4.13.3,
after patched with the following patch, issue seems to be gone. I can't
reproduce it anymore.
Thanks anyway ;)
From: Shaohua Li
commit 3664847d95e60a9a943858b7800f8484669740fc upstream.
We have a race condi
On 2017-10-05 12:58:32 [-0700], Stefano Stabellini wrote:
> Let me know if you want this patch to go via the xen tree.
Yes, please.
Sebastian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
flight 114049 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114049/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972
Tests which
flight 114029 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114029/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail in 114014 pass
in 114029
test-armhf-ar
> #ifdef CONFIG_PARAVIRT
> +/*
> + * Paravirt alternatives are applied much earlier than normal alternatives.
> + * They are only applied when running on a hypervisor. They replace some
> + * native instructions with calls to pv ops.
> + */
> +void __init apply_pv_alternatives(void)
> +{
> +
flight 114027 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114027/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-saverestore.2 fail REGR. vs.
113982
Tests which did
On Thu, 5 Oct 2017, Sebastian Andrzej Siewior wrote:
> rwlock.h should not be included directly. Instead linux/splinlock.h
> should be included. One thing it does is to break the RT build.
>
> Cc: Stefano Stabellini
> Cc: xen-de...@lists.xenproject.org
> Cc: linux-arm-ker...@lists.infradead.org
>
This run is configured for baseline tests only.
flight 72200 qemu-upstream-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72200/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-midway 16 gu
flight 72201 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72201/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
build-arm64 2 hosts-allocate broken like 72167
build-arm64-pvops
On 10/05/2017 08:42 PM, Julien Grall wrote:
> Most of the users of page_to_mfn and mfn_to_page are either overriding
> the macros to make them work with mfn_t or use mfn_x/_mfn because the
> rest of the function use mfn_t.
>
> So make __page_to_mfn and __mfn_to_page return mfn_t by default.
>
> O
pfn 0 is a legitimate (albeit unlikely) frame to use for translated domains,
so skipping it is wrong. (This behaviour appears to exists simply to cover
the fact that zero is the default value of an uninitialised field in dom.)
ARM already clears the frames at the point that the pfns are allocated
libxl always uses xc_dom_gnttab_init(), which internally calls
xc_dom_gnttab{_hvm,}_seed() to set up the grants point at the console and
xenstore rings. For HVM guests, libxl then asks Xen for the information set
up previously, and calls xc_dom_gnttab_hvm_seed() a second time, which is
wasteful.
Recent changes in grant table configuration have caused calls to
xc_dom_gnttab_init() to fail if not proceeded with a call to
xc_domain_set_gnttab_limits(). This is backwards from the point of view of
3rd party dombuilder users.
Add max_{grant,maptrack}_frames parameters to struct xc_dom_image, a
alloc_magic_pages() is renamed to alloc_magic_pages_pv() to mirror its
alloc_magic_pages_hvm() counterpart. Delete a redundant comment, introduce
some newlines clarity, and remove a logically dead allocation of shared info.
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
CC: Julie
libxl always uses xc_dom_gnttab_init(), which internally calls
xc_dom_gnttab{_hvm,}_seed() to set up the grants point at the console and
xenstore rings. For HVM guests, libxl then asks Xen for the information set
up previously, and calls xc_dom_gnttab_hvm_seed() a second time, which is
wasteful.
A git tree version is available:
http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/dombuilder-gnt-v1
Andrew Cooper (5):
tools/dombuilder: Drop more PVH v1 leftovers
tools/dombuilder: Remove clear_page() from xc_dom_boot.c
tools/dombuilder: Switch to using gf
The sole use of xc_dom_translated() and xc_dom_p2m() outside of the domain
builder is for libxl_dom() to translate the console and xenstore pfns back
into useful values. PV guest pfns are only interesting to the domain builder,
and gfns are the address space used by all other hypercalls.
Renaming
flight 114047 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114047/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972
Tests which
On 05/10/17 18:42, Julien Grall wrote:
> @@ -1114,7 +1115,7 @@ int arch_set_info_guest(
> l4_pgentry_t *l4tab;
>
> l4tab =
> map_domain_page(_mfn(pagetable_get_pfn(v->arch.guest_table)));
> -*l4tab = l4e_from_pfn(page_to_mfn(cr3_page),
> +*l4tab = l4e_from_pfn(m
On 2017-10-05 06:20 AM, Konrad Rzeszutek Wilk wrote:
On Wed, Oct 04, 2017 at 08:26:27PM +0200, Philipp Hahn wrote:
Hello,
Adding Ankur to this as I think he saw something similar.
But in the meantime - do you see this with the latest version of Linux?
with linux-4.9.52 running on Debian-Whe
On Thu, Oct 5, 2017 at 11:42 AM, Julien Grall wrote:
> The function __mem_sharing_unshare_page contains an open-code version of
> copy_domain_page. Use the function to simplify a bit the code.
>
> At the same time replace _mfn(__page_to_mfn(...)) by page_to_mfn(...)
> given that the file given alr
On 05/10/17 18:42, Julien Grall wrote:
> At the same time, correctly align one the prototype changed.
>
> Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 05/10/17 18:42, Julien Grall wrote:
> The function __mem_sharing_unshare_page contains an open-code version of
> copy_domain_page. Use the function to simplify a bit the code.
>
> At the same time replace _mfn(__page_to_mfn(...)) by page_to_mfn(...)
> given that the file given already provides a
The constructions _mfn(... > PAGE_SHIFT) and mfn_to_page(... >> PAGE_SHIFT)
could respectively be replaced by maddr_to_mfn(...) and
maddr_to_page(...).
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
---
Cc: Elena Ufimtseva
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Tim Deegan
Cc: George
The arm32 version of the function is_xen_heap_page currently define a
variable _mfn. This will lead to a compiler when use typesafe MFN in a
folow-up patch:
called object '_mfn' is not a function or function pointer
Fix it by renaming the local variable _mfn to mfn_.
Signed-off-by: Julien Grall
In the function kimage_alloc_normal_control_page, the variables mfn and
emfn are defined but not used. Remove them.
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
---
Cc: Andrew Cooper
Changes in v3:
- Add Andrew's reviewed-by
---
xen/common/kimage.c | 3 ---
1 file chan
Most of the users of page_to_mfn and mfn_to_page are either overriding
the macros to make them work with mfn_t or use mfn_x/_mfn because the
rest of the function use mfn_t.
So make __page_to_mfn and __mfn_to_page return mfn_t by default.
Only reasonable clean-ups are done in this patch because it
Hi all,
Most of the users of page_to_mfn and mfn_to_page are either overriding
the macros to make them work with mfn_t or use mfn_x/_mfn becaue the rest
of the function use mfn_t.
So I think it is time to make __page_to_mfn and __mfn_to_page using typesafe
MFN.
The first 8 patches will convert o
The function __mem_sharing_unshare_page contains an open-code version of
copy_domain_page. Use the function to simplify a bit the code.
At the same time replace _mfn(__page_to_mfn(...)) by page_to_mfn(...)
given that the file given already provides a typesafe version of page_to_mfn.
Signed-off-by
The file common/tmem_xen.c is now converted to use typesafe. This is
requiring to override the macro page_to_mfn to make it work with mfn_t.
Note that all variables converted to mfn_t havem there initial value,
when set, switch from 0 to INVALID_MFN. This is fine because the initial
values was alw
The file common/xenoprof.c is now converted to use typesafe. This is
requiring to override the macros virt_to_mfn and mfn_to_page to make
them work with mfn_t.
Also, add a couple of missing newlines in the code modified.
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
---
Cc: Andrew Co
- Remove spurious ()
- Add missing spaces
- Turn 1 << to 1UL <<
- Rename spfn to smfn and switch to mfn_t
Signed-off-by: Julien Grall
---
Cc: Stefano Stabellini
Changes in v2:
- Remove double space
- s/spfn/smfn/ and switch to mfn_t
---
xen/arch/arm/domain
At the same time, correctly align one the prototype changed.
Signed-off-by: Julien Grall
---
xen/common/kexec.c | 16
xen/common/kimage.c | 30 ++
xen/include/xen/kimage.h | 4 ++--
3 files changed, 28 insertions(+), 22 deletions(-)
diff
On Thu, 5 Oct 2017, Dario Faggioli wrote:
> Replace, in the 'M:' fields of the components I co-maintain
> ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix
> email, to which I don't have access any longer, with my
> personal email.
>
> Signed-off-by: Dario Faggioli
Acked-by: Stefano S
flight 114024 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114024/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-xsm 6 xen-installfail pass in 114003
Tests which did not succeed, but
Hi Dario,
On Thu, Oct 5, 2017 at 10:28 AM, Dario Faggioli wrote:
>
> Hello,
>
> Soon I won't have access to dario.faggi...@citrix.com email address.
It's sad to hear this. :(
>
> Therefore, replace it, in my entries in MAINTAINERS, with an email address
> that
> I actually can, and will actual
On 10/04/2017 09:28 AM, Jan Beulich wrote:
On 25.09.17 at 16:26, wrote:
>> @@ -597,6 +599,47 @@ static const struct x86_emulate_ops all_fuzzer_ops = {
>> };
>> #undef SET
>>
>> +static void _set_fpu_state(char *fxsave, bool store)
>> +{
>> +if ( cpu_has_fxsr )
>> +{
>> +st
On Thu, Oct 5, 2017 at 9:11 AM, Steven Rostedt wrote:
> On Thu, 5 Oct 2017 09:01:14 -0700
> Thomas Garnier wrote:
>
>> On Thu, Oct 5, 2017 at 6:06 AM, Steven Rostedt wrote:
>> > On Wed, 4 Oct 2017 14:19:56 -0700
>> > Thomas Garnier wrote:
>> >
>> >> When using -fPIE/PIC with function tracing,
On 10/04/2017 09:27 AM, Jan Beulich wrote:
On 25.09.17 at 16:26, wrote:
>> --- a/tools/fuzz/x86_instruction_emulator/afl-harness.c
>> +++ b/tools/fuzz/x86_instruction_emulator/afl-harness.c
>> @@ -14,6 +14,7 @@ extern unsigned int fuzz_minimal_input_size(void);
>> static uint8_t input[INPUT_
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 05 October 2017 17:02
> To: Paul Durrant
> Cc: xen-devel (xen-de...@lists.xenproject.org) de...@lists.xenproject.org>
> Subject: Re: [Xen-devel] SRIOV VF reset problems
>
> >>> On 05.10.17 at 16:00, wrote:
> > I
On Thu, 5 Oct 2017 09:01:14 -0700
Thomas Garnier wrote:
> On Thu, Oct 5, 2017 at 6:06 AM, Steven Rostedt wrote:
> > On Wed, 4 Oct 2017 14:19:56 -0700
> > Thomas Garnier wrote:
> >
> >> When using -fPIE/PIC with function tracing, the compiler generates a
> >> call through the GOT (call *__fen
>>> On 05.10.17 at 16:00, wrote:
> I'm currently looking at a problem with a pass-through SR-IOV device where
> the guest driver triggers a VF reset via a back-door interface to the PF. The
> reset completes successfully but, in this scenario, it is up to the PF driver
> running in dom0 to rest
On Thu, Oct 5, 2017 at 6:06 AM, Steven Rostedt wrote:
> On Wed, 4 Oct 2017 14:19:56 -0700
> Thomas Garnier wrote:
>
>> When using -fPIE/PIC with function tracing, the compiler generates a
>> call through the GOT (call *__fentry__@GOTPCREL). This instruction
>> takes 6 bytes instead of 5 on the u
From: Razvan Cojocaru
For the default EPT view we have xc_set_mem_access_multi(), which
is able to set an array of pages to an array of access rights with
a single hypercall. However, this functionality was lacking for the
altp2m subsystem, which could only set page restrictions for one
page at a
>>> On 05.10.17 at 17:04, wrote:
> On 10/04/2017 09:26 AM, Jan Beulich wrote:
> On 25.09.17 at 16:26, wrote:
>>> --- a/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
>>> +++ b/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
>>> @@ -53,6 +53,15 @@ struct fuzz_state
>>> };
>>> #define DATA_O
Hi,
On 04/10/17 19:10, Oleksandr Andrushchenko wrote:
sorry, pressed send too fast
On 10/04/2017 09:02 PM, Oleksandr Andrushchenko wrote:
On 10/04/2017 08:22 PM, Julien Grall wrote:
On 04/10/17 17:32, Oleksandr Andrushchenko wrote:
Hi, all!
Hello,
We have a use-case where we want to pas
flight 114044 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114044/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972
build-armhf
Hi Manish,
On 21/09/17 14:17, mja...@caviumnetworks.com wrote:
> From: Manish Jaggi
>
> Add gicv3_its_make_hwdom_madt to update hwdom MADT ITS information.
Thanks for the rework, that looks much better now!
> Signed-off-by: Manish Jaggi
Reviewed-by: Andre Przywara
Cheers,
Andre.
> ---
>
Hi,
On 21/09/17 14:17, mja...@caviumnetworks.com wrote:
> From: Manish Jaggi
>
> estimate_acpi_efi_size needs to be updated to provide correct size of
> hardware domains MADT, which now adds ITS information as well.
>
> Introducing gic_get_hwdom_madt_size.
>
> Signed-off-by: Manish Jaggi
> --
Hi Manish,
On 21/09/17 14:17, mja...@caviumnetworks.com wrote:
> From: Manish Jaggi
>
> This patch extends the gicv3_iomem_deny_access functionality by adding
> support for ITS region as well. Add function gicv3_its_deny_access.
>
> Signed-off-by: Manish Jaggi
Reviewed-by: Andre Przywara
Th
Hi,
On 04/10/17 06:29, Manish Jaggi wrote:
> Hello Julien,
>
> On 10/3/2017 7:17 PM, Julien Grall wrote:
>> Hi Manish,
>>
>> On 21/09/17 14:17, mja...@caviumnetworks.com wrote:
>>> From: Manish Jaggi
>>>
>>> Added gicv3_its_acpi_init to update host_its_list from MADT table.
>>> For ACPI, host_it
On 10/04/2017 09:26 AM, Jan Beulich wrote:
On 25.09.17 at 16:26, wrote:
>> @@ -22,13 +25,17 @@ int main(int argc, char **argv)
>> setbuf(stdin, NULL);
>> setbuf(stdout, NULL);
>>
>> +opt_compact = true;
>
> How about giving the variable an initializer instead?
Actually, if w
On Thu, Oct 5, 2017 at 10:28 AM, Dario Faggioli wrote:
> Replace, in the 'M:' fields of the components I co-maintain
> ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix
> email, to which I don't have access any longer, with my
> personal email.
>
> Signed-off-by: Dario Faggioli
> ---
Hi Andrew,
On 05/10/17 00:27, Andrew Cooper wrote:
On 04/10/2017 19:15, Julien Grall wrote:
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 093ebf1a8e..0753d03aac 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -104,11 +104,11 @@ static
Hi Konrad,
On 05.10.17 16:03, Konrad Rzeszutek Wilk wrote:
On Thu, Oct 05, 2017 at 12:00:20AM +0300, Volodymyr Babchuk wrote:
Added type xen_uuid_t. This type represents UUID as an array of 16
bytes in big endian format.
Added macro XEN_DEFINE_UUID that constructs UUID in the usual way:
XEN
On Thu, Oct 05, 2017 at 04:28:46PM +0200, Dario Faggioli wrote:
> Replace, in the 'M:' fields of the components I co-maintain
> ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix
> email, to which I don't have access any longer, with my
> personal email.
>
> Signed-off-by: Dario Faggioli
On Thu, Oct 05, 2017 at 04:28:46PM +0200, Dario Faggioli wrote:
> Replace, in the 'M:' fields of the components I co-maintain
> ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix
> email, to which I don't have access any longer, with my
> personal email.
>
> Signed-off-by: Dario Faggioli
Replace, in the 'M:' fields of the components I co-maintain
('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix
email, to which I don't have access any longer, with my
personal email.
Signed-off-by: Dario Faggioli
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Hello,
Soon I won't have access to dario.faggi...@citrix.com email address.
Therefore, replace it, in my entries in MAINTAINERS, with an email address that
I actually can, and will actually read.
One thing about RTDS. Meng, which one of the following two sentences, better
describes your situatio
On Thu, Oct 05, 2017 at 02:47:30PM +0100, Ross Lagerwall wrote:
> On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote:
> > If the livepatch has only .rodata sections then it is OK to also
> > apply/revert/apply the livepatch without having to worry about the
> > unforseen consequences.
> >
> > See
On Thu, Oct 05, 2017 at 07:44:17PM +0530, Bhupinder Thakur wrote:
> Hi Wei,
>
> On 5 October 2017 at 15:07, Wei Liu wrote:
> > On Wed, Oct 04, 2017 at 09:58:32PM -0400, Konrad Rzeszutek Wilk wrote:
> >> I get this when compiling under ARM32 (Ubuntu 15.04,
> >> gcc (Ubuntu/Linaro 4.9.2-10ubuntu13)
Hi Wei,
On 5 October 2017 at 15:07, Wei Liu wrote:
> On Wed, Oct 04, 2017 at 09:58:32PM -0400, Konrad Rzeszutek Wilk wrote:
>> I get this when compiling under ARM32 (Ubuntu 15.04,
>> gcc (Ubuntu/Linaro 4.9.2-10ubuntu13) 4.9.2):
>>
>> libxl_console.c: In function ‘libxl__device_vuart_add’:
>> libx
On Thu, Oct 05, 2017 at 08:49:36AM -0400, Konrad Rzeszutek Wilk wrote:
> > +config UBSAN
> > + bool "Undefined behaviour sanitizer"
> > + depends on X86
> > + ---help---
> > + Enable undefined behaviour sanitizer.
> > +
> > + If unsure, say N here.
>
> Could you perhaps expand it a b
On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote:
By default when using objcopy we lose the alignment when we copy it from
xen-syms -
with the result that alignment (on ARM32 for example) can be 1:
[Nr] Name TypeAddr OffSize ES Flg Lk Inf
Al
..
[ 6]
On 10/05/2017 02:51 PM, Konrad Rzeszutek Wilk wrote:
On Thu, Oct 05, 2017 at 02:47:30PM +0100, Ross Lagerwall wrote:
On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote:
If the livepatch has only .rodata sections then it is OK to also
apply/revert/apply the livepatch without having to worry abo
On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote:
If the .bug.frames.X or .livepatch.funcs sizes are different
than what the hypervisor expects - we fail the payload. To help
in diagnosing this include the expected and the payload
sizes.
Also make it more natural by having "Multiples" in the
Hi,
I'm currently looking at a problem with a pass-through SR-IOV device where the
guest driver triggers a VF reset via a back-door interface to the PF. The reset
completes successfully but, in this scenario, it is up to the PF driver running
in dom0 to restore the VF's config space. This is do
On Wed, 2017-10-04 at 14:23 +0100, George Dunlap wrote:
> On 09/15/2017 06:35 PM, Dario Faggioli wrote:
> >
> > diff --git a/xen/common/sched_credit.c b/xen/common/sched_credit.c
> > index 3efbfc8..35d0c98 100644
> > --- a/xen/common/sched_credit.c
> > +++ b/xen/common/sched_credit.c
> > @@ -410,8
On 10/05/2017 10:01 AM, Jan Beulich wrote:
On 04.10.17 at 18:34, wrote:
>> On 10/04/2017 09:23 AM, Jan Beulich wrote:
>> On 25.09.17 at 16:26, wrote:
--- a/tools/fuzz/x86_instruction_emulator/Makefile
+++ b/tools/fuzz/x86_instruction_emulator/Makefile
@@ -18,22 +18,22 @@ a
On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote:
If the livepatch has only .rodata sections then it is OK to also
apply/revert/apply the livepatch without having to worry about the
unforseen consequences.
See commit 98b728a7b235c67e210f67f789db5d9eb38ca00c
"livepatch: Disallow applying after
flight 114041 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114041/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972
build-armhf
On Wed, Oct 04, 2017 at 08:26:27PM +0200, Philipp Hahn wrote:
> Hello,
>
Adding Ankur to this as I think he saw something similar.
But in the meantime - do you see this with the latest version of Linux?
> with linux-4.9.52 running on Debian-Wheezy with Xen-4.1 I observed
> several stuck process
On 05/10/17 14:04, Sergey Dyasli wrote:
> On Thu, 2017-10-05 at 03:27 -0600, Jan Beulich wrote:
> On 05.10.17 at 10:18, wrote:
>>> --- a/xen/arch/x86/hvm/vmx/entry.S
>>> +++ b/xen/arch/x86/hvm/vmx/entry.S
>>> @@ -80,7 +80,7 @@ UNLIKELY_END(realmode)
>>> mov %rsp,%rdi
>>> cal
>>> On 05.10.17 at 14:02, wrote:
> On Thu, Oct 05, 2017 at 11:55:39AM +, Jan Beulich wrote:
>> >>> On 05.10.17 at 13:09, wrote:
>> > On Thu, Oct 05, 2017 at 10:01:46AM +, Jan Beulich wrote:
>> >> >>> On 05.10.17 at 11:20, wrote:
>> >> > On Wed, Oct 04, 2017 at 08:33:33AM +, Jan Beuli
On Wed, 4 Oct 2017 14:19:56 -0700
Thomas Garnier wrote:
> When using -fPIE/PIC with function tracing, the compiler generates a
> call through the GOT (call *__fentry__@GOTPCREL). This instruction
> takes 6 bytes instead of 5 on the usual relative call.
>
> With this change, function tracing sup
On Thu, 2017-10-05 at 03:27 -0600, Jan Beulich wrote:
> > > > On 05.10.17 at 10:18, wrote:
> >
> > --- a/xen/arch/x86/hvm/vmx/entry.S
> > +++ b/xen/arch/x86/hvm/vmx/entry.S
> > @@ -80,7 +80,7 @@ UNLIKELY_END(realmode)
> > mov %rsp,%rdi
> > call vmx_vmenter_helper
> > c
On Thu, Oct 05, 2017 at 12:00:20AM +0300, Volodymyr Babchuk wrote:
> Added type xen_uuid_t. This type represents UUID as an array of 16
> bytes in big endian format.
>
> Added macro XEN_DEFINE_UUID that constructs UUID in the usual way:
>
> XEN_DEFINE_UUID(0x00112233, 0x4455, 0x6677, 0x8899,
>
rwlock.h should not be included directly. Instead linux/splinlock.h
should be included. One thing it does is to break the RT build.
Cc: Stefano Stabellini
Cc: xen-de...@lists.xenproject.org
Cc: linux-arm-ker...@lists.infradead.org
Signed-off-by: Sebastian Andrzej Siewior
---
arch/arm/xen/p2m.c
> +config UBSAN
> + bool "Undefined behaviour sanitizer"
> + depends on X86
> + ---help---
> + Enable undefined behaviour sanitizer.
> +
> + If unsure, say N here.
Could you perhaps expand it a bit? How does it sanitize it? With soap :-)?
And what 'undefinded behaviour's ar
On Tue, Oct 03, 2017 at 07:07:50PM +0100, Andrew Cooper wrote:
> tmem_mempool_page_get() is only referenced by address, so isn't eligable for
> inlining in the first place.
>
> Signed-off-by: Andrew Cooper
> ---
> CC: Konrad Rzeszutek Wilk
Reviewed-by: Konrad Rzeszutek Wilk
>
> Not related t
xen-pt doesn't set the is_express field, but is supposed to be
able to handle PCI Express devices too. Mark it as hybrid.
Suggested-by: Jan Beulich
Signed-off-by: Eduardo Habkost
---
hw/xen/xen_pt.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/hw/xen/xen_pt.c b/hw/xen/xen_pt.c
index 01d
Hello Jan,
thank you for you answer.
Am 05.10.2017 um 12:12 schrieb Jan Beulich:
On 04.10.17 at 20:26, wrote:
>> with linux-4.9.52 running on Debian-Wheezy with Xen-4.1 I observed
>> several stuck processes: Here is one (truncated) dump of the Linux
>> kernel messages:
>>
>>> [] ? __schedu
On Thu, Oct 05, 2017 at 11:55:39AM +, Jan Beulich wrote:
> >>> On 05.10.17 at 13:09, wrote:
> > On Thu, Oct 05, 2017 at 10:01:46AM +, Jan Beulich wrote:
> >> >>> On 05.10.17 at 11:20, wrote:
> >> > On Wed, Oct 04, 2017 at 08:33:33AM +, Jan Beulich wrote:
> >> >> >>> On 19.09.17 at 17:
>>> On 05.10.17 at 13:09, wrote:
> On Thu, Oct 05, 2017 at 10:01:46AM +, Jan Beulich wrote:
>> >>> On 05.10.17 at 11:20, wrote:
>> > On Wed, Oct 04, 2017 at 08:33:33AM +, Jan Beulich wrote:
>> >> >>> On 19.09.17 at 17:29, wrote:
>> >> > --- a/xen/include/xen/vpci.h
>> >> > +++ b/xen/incl
On Wed, Oct 04, 2017 at 04:57:29PM +0100, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Wed, Oct 04, 2017 at 04:57:30PM +0100, Ian Jackson wrote:
> This necessitates adding $(CFLAGS_xeninclude) to all the depending
> libraries (which can be done via Rules.mk), so that the definition of
> domid_t (in xen.h) can be found.
>
> Signed-off-by: Ian Jackson
Acked-by: Wei Liu
1 - 100 of 166 matches
Mail list logo