On 08.06.2021 01:44, Paul Leiber wrote:
> After more testing, I have come to the following conclusion: It seems that
> every time I do a _reboot_ from within a Windows DomU, the PCI device does
> not get attached to the DomU. After DomU reboot, it is immediately available
> for attachment in the
On 07.06.2021 14:41, Andrew Cooper wrote:
> While the ! annotation is useful to indicate that something special is
> happening, an array of bits is not. Drop it, to prevent mistakes.
>
> Signed-off-by: Andrew Cooper
> ---
> CC: Jan Beulich
> CC: Roger Pau Monné
> CC: Wei Liu
> ---
> xen/arch
Add a configuration item for the maximum number of domains xenstored
should support and set the limit of open file descriptors accordingly.
For HVM domains there are up to 5 socket connections per domain (2 by
the xl daemon process, and 3 by qemu). So set the ulimit for xenstored
to 5 * XENSTORED_
Xenstored is absolutely mandatory for a Xen host and it can't be
restarted, so being killed by OOM-killer in case of memory shortage is
to be avoided.
Set /proc/$pid/oom_score_adj (if available) to -500 in order to allow
xenstored to use large amounts of memory without being killed.
Make sure the
Set some limits for xenstored in order to avoid it being killed by
OOM killer, or to run out of file descriptors.
Changes in V2:
- split into 2 patches
- set limits from start script
Juergen Gross (2):
tools/xenstore: set oom score for xenstore daemon on Linux
tools/xenstore: set open file de
On Thu, Jun 03, 2021 at 12:10:09AM +, Chaitanya Kulkarni wrote:
> > diff --git a/drivers/block/null_blk/main.c b/drivers/block/null_blk/main.c
> > index d8e098f1e5b5..74fb2ec63219 100644
> > --- a/drivers/block/null_blk/main.c
> > +++ b/drivers/block/null_blk/main.c
> > @@ -1851,13 +1851,12 @@
flight 162534 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162534/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 6 xen-buildfail REGR. vs. 162327
Tests which
flight 162527 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162527/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs.
152631
test-amd64-am
flight 162531 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162531/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 6 xen-buildfail REGR. vs. 162327
Tests which
Dear developers,
I am a mostly very happy Xen beginner. My Debian PV DomUs work like a charm
out of the box. The only remaining Windows instance is a MediaPortal TV Server
backend on Windows Server 2012 HVM DomU. But I have problems with reliably
passing through PCIe cards to this Windows HVM
flight 162483 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162483/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 7 xen-install fail REGR. vs. 152332
test-amd64-i386-xl-
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-qemuu-ovmf-amd64
testid debian-hvm-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tree: qemu git://xe
flight 162523 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162523/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 6 xen-buildfail REGR. vs. 162327
Tests which
flight 162501 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162501/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 6 xen-buildfail REGR. vs. 152631
build-amd64
flight 162517 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162517/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 6 xen-buildfail REGR. vs. 162327
Tests which
Hi Jan,
On 01/06/2021 12:54, Jan Beulich wrote:
On 27.05.2021 20:48, Julien Grall wrote:
On 27/05/2021 12:28, Jan Beulich wrote:
port_is_valid() and evtchn_from_port() are fine to use without holding
any locks. Accordingly acquire the per-domain lock slightly later in
evtchn_close() and evtchn
Hi Jan,
On 04/06/2021 14:23, Jan Beulich wrote:
On 03.06.2021 11:39, Julien Grall wrote:
On 27/05/2021 14:58, Jan Beulich wrote:
On 27.05.2021 15:06, Julien Grall wrote:
On 27/05/2021 13:33, Jan Beulich wrote:
@@ -1046,12 +1051,14 @@ static struct page_info *alloc_heap_page
if ( firs
Hi Stefano,
On 04/06/2021 00:55, Stefano Stabellini wrote:
On Thu, 3 Jun 2021, Julien Grall wrote:
On Thu, 3 Jun 2021 at 22:33, Stefano Stabellini wrote:
On Thu, 3 Jun 2021, Julien Grall wrote:
On 02/06/2021 11:09, Penny Zheng wrote:
I could not think a way to fix it properly in codes, do y
flight 162475 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162475/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-qemuu-nested-intel 12 debian-hvm-install fail pass in 162422
Tests which did not succeed, but
Hello Xen community,
Can someone have a look on these patches? Some of them are acked but some
others needs review.
Many thanks!
Cheers,
Luca
> On 10 May 2021, at 09:40, Luca Fancellu wrote:
>
> This serie introduce doxygen in the sphinx html docs generation.
> One benefit is to keep most of
Hi,
At 08:45 +0200 on 31 May (1622450756), Jan Beulich wrote:
> On 28.05.2021 17:44, Tim Deegan wrote:
> > Hi,
> >
> > At 10:58 +0200 on 25 May (1621940330), Jan Beulich wrote:
> >> On 24.05.2021 06:29, Roberto Bagnara wrote:
> >>> I stumbled upon parsing errors due to invalid uses of
> >>> _Stat
On Mon, Jun 07, 2021 at 08:36:07AM +0200, Thomas Huth wrote:
> On 05/06/2021 19.50, Ahmed Abouzied wrote:
> > Identifiers with leading underscores followed by capital letters or
> > underscores are reserved for C standards.
> >
> > Resolves: https://gitlab.com/qemu-project/qemu/-/issues/369
> >
>
flight 162498 xen-unstable-smoke real [real]
flight 162515 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/162498/
http://logs.test-lab.xenproject.org/osstest/logs/162515/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which co
On 6/7/2021 2:50 PM, Christoph Hellwig wrote:
On Sun, May 30, 2021 at 11:06:27AM -0400, Tianyu Lan wrote:
+ if (hv_isolation_type_snp()) {
+ pfns = kcalloc(buf_size / HV_HYP_PAGE_SIZE, sizeof(unsigned
long),
+ GFP_KERNEL);
+ for
That is all jobs which start with the same \w* as this job.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive | 18 +-
1 file changed, 13 insertions(+), 5 deletions(-)
diff --git a/ts-hosts-allocate-Executive b/ts-hosts-allocate-Executive
index 9722ce12..849bc97b 100755
* Add a new job pattern parameter to $starvation_q
* Add a new $thisclass parameter to starving
* Pass 0 for now.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive | 10 ++
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/ts-hosts-allocate-Executive b/ts-hosts-alloc
This can result in bad pushes. Better to wait.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/ts-hosts-allocate-Executive b/ts-hosts-allocate-Executive
index 849bc97b..4dfcd0cd 100755
--- a/ts-hosts-allocate-E
Suggested-by: Jan Beulich
Signed-off-by: Ian Jackson
---
ts-xen-build-prep | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-xen-build-prep b/ts-xen-build-prep
index 5ec70dd5..67b3eae6 100755
--- a/ts-xen-build-prep
+++ b/ts-xen-build-prep
@@ -197,7 +197,7 @@ END
}
sub p
On 6/7/2021 2:46 PM, Christoph Hellwig wrote:
On Sun, May 30, 2021 at 11:06:28AM -0400, Tianyu Lan wrote:
+ for (i = 0; i < request->hvpg_count; i++)
+ dma_unmap_page(&device->device,
+
On 6/7/2021 2:43 PM, Christoph Hellwig wrote:
On Sun, May 30, 2021 at 11:06:25AM -0400, Tianyu Lan wrote:
From: Tianyu Lan
For Hyper-V isolation VM with AMD SEV SNP, the bounce buffer(shared memory)
needs to be accessed via extra address space(e.g address above bit39).
Hyper-V code may remap
osstest service owner writes ("[ovmf test] 162371: tolerable FAIL - PUSHED"):
> flight 162371 ovmf real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/162371/
>
> Failures :-/ but no regressions.
>
> Tests which did not succeed, but are not blocking:
> test-amd64-i386-xl-qemuu-ovmf-am
Juergen Gross writes ("[PATCH] MAINTAINERS: add myself as tools/libs reviewer"):
> I have touched most of the Xen libraries in the past, and there is a
> clear lack of reviewer band width in the tools area.
>
> Add myself as a tools/libs reviewer for that reason.
>
> Signed-off-by: Juergen Gross
On 07.06.21 15:59, Andrew Cooper wrote:
On 07/06/2021 14:04, Jan Beulich wrote:
On 07.06.2021 15:00, Juergen Gross wrote:
--- a/tools/libs/guest/xg_sr_common_x86_pv.c
+++ b/tools/libs/guest/xg_sr_common_x86_pv.c
@@ -149,27 +149,32 @@ int x86_pv_map_m2p(struct xc_sr_context *ctx)
ctx->x
On 07/06/2021 14:04, Jan Beulich wrote:
> On 07.06.2021 15:00, Juergen Gross wrote:
>> --- a/tools/libs/guest/xg_sr_common_x86_pv.c
>> +++ b/tools/libs/guest/xg_sr_common_x86_pv.c
>> @@ -149,27 +149,32 @@ int x86_pv_map_m2p(struct xc_sr_context *ctx)
>>
>> ctx->x86.pv.nr_m2p_frames = (M2P_CH
Hi,
On 05/05/2021 08:43, Michal Orzel wrote:
AArch64 registers are 64bit whereas AArch32 registers
are 32bit or 64bit. MSR/MRS are expecting 64bit values thus
we should get rid of helpers READ/WRITE_SYSREG32
in favour of using READ/WRITE_SYSREG.
We should also use register_t type when reading sy
On 21.05.2021 09:07, Jan Beulich wrote:
> On 21.05.2021 08:33, Michal Orzel wrote:
>> On 17.05.2021 18:03, Julien Grall wrote:
>>> On 17/05/2021 08:01, Jan Beulich wrote:
On 12.05.2021 19:59, Julien Grall wrote:
> Hi,
>
> On 11/05/2021 07:37, Michal Orzel wrote:
>> On 05.05.
On 07.06.2021 15:00, Juergen Gross wrote:
> --- a/tools/libs/guest/xg_sr_common_x86_pv.c
> +++ b/tools/libs/guest/xg_sr_common_x86_pv.c
> @@ -149,27 +149,32 @@ int x86_pv_map_m2p(struct xc_sr_context *ctx)
>
> ctx->x86.pv.nr_m2p_frames = (M2P_CHUNK_SIZE >> PAGE_SHIFT) * m2p_chunks;
>
> +
After 32-bit PV-guests have been security de-supported when not running
under PV-shim, the hypervisor will no longer be configured to support
those domains per default when not being built as PV-shim.
Unfortunately libxenguest will fail saving or restoring a PV domain
due to this restriction, as i
On 07.06.2021 14:41, Andrew Cooper wrote:
> While the ! annotation is useful to indicate that something special is
> happening, an array of bits is not. Drop it, to prevent mistakes.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
flight 162474 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162474/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs.
152631
test-amd64-am
On 07.06.2021 14:41, Andrew Cooper wrote:
> For reasons which are my fault, but I don't recall why, the
> FDP_EXCP_ONLY/NO_FPU_SEL adjustment uses the whole special_features[] array,
> not the two relevant bits.
>
> HLE and RTM were recently added to the list of special features, causing them
> to
While the ! annotation is useful to indicate that something special is
happening, an array of bits is not. Drop it, to prevent mistakes.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Roger Pau Monné
CC: Wei Liu
---
xen/arch/x86/cpuid.c| 2 --
xen/include/asm-x86/cpuid.h | 1 -
For reasons which are my fault, but I don't recall why, the
FDP_EXCP_ONLY/NO_FPU_SEL adjustment uses the whole special_features[] array,
not the two relevant bits.
HLE and RTM were recently added to the list of special features, causing them
to be always set in guest view, irrespective of the tool
> On May 28, 2021, at 4:12 PM, Dario Faggioli wrote:
>
> A !runnable unit (temporarily) present in the runq may cause us to
> stop scanning the runq itself too early. Of course, we don't run any
> non-runnable vCPUs, but we end the scan and we fallback to picking
> the idle unit. In other word,
> On Mar 19, 2021, at 12:14 PM, Dario Faggioli wrote:
>
> If we schedule, and the current vCPU continues to run, its statistical
> load is not properly updated, resulting in something like this, even if
> all the 8 vCPUs are 100% busy:
>
> (XEN) Runqueue 0:
> (XEN) [...]
> (XEN) aveload
Am Wed, 2 Jun 2021 13:41:02 +0200
schrieb Juergen Gross :
> Shouldn't you check for zero length iovec elements as in the
> writev_exact() case then?
It is not clear to me what the purpose of skipping zero-length iov's at the
beginning of the iov array in writev_exact is.
I assume the syscall (o
I have touched most of the Xen libraries in the past, and there is a
clear lack of reviewer band width in the tools area.
Add myself as a tools/libs reviewer for that reason.
Signed-off-by: Juergen Gross
---
MAINTAINERS | 7 +++
1 file changed, 7 insertions(+)
diff --git a/MAINTAINERS b/MA
On 07.06.21 13:01, Andrew Cooper wrote:
On 07/06/2021 10:04, Juergen Gross wrote:
After 32-bit PV-guests have been security de-supported when not running
under PV-shim, the hypervisor will no longer be configured to support
those domains per default when not being built as PV-shim.
Unfortunatel
flight 162490 xen-unstable-smoke real [real]
flight 162495 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/162490/
http://logs.test-lab.xenproject.org/osstest/logs/162495/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which co
Jan Beulich writes ("Re: Ping: [PATCH] docs: release-technician-checklist:
update to leaf tree version pinning"):
> On 27.04.2021 18:01, Jan Beulich wrote:
> > On 07.04.2021 11:56, Jan Beulich wrote:
> >> Our releases look to flip-flop between keeping or discarding the date
> >> and title of the r
On 07/06/2021 10:04, Juergen Gross wrote:
> After 32-bit PV-guests have been security de-supported when not running
> under PV-shim, the hypervisor will no longer be configured to support
> those domains per default when not being built as PV-shim.
>
> Unfortunately libxenguest will fail saving or
flight 162481 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/162481/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777
build-amd64-libvirt
On 27.04.2021 18:01, Jan Beulich wrote:
> On 07.04.2021 11:56, Jan Beulich wrote:
>> Our releases look to flip-flop between keeping or discarding the date
>> and title of the referenced qemu-trad commit. I think with the hash
>> replaced by a tag, the commit's date and title would better also be
>>
On 07.06.21 12:12, Olaf Hering wrote:
Am Wed, 2 Jun 2021 14:03:40 +0200
schrieb Juergen Gross :
Maybe XEN_DOMCTL_PFINFO_XALLOC should no longer be supported, i.e.
a stream containing it should be rejected? This might be a
worthwhile modification of patch 5.
If there is a desire to actively br
Am Wed, 2 Jun 2021 14:03:40 +0200
schrieb Juergen Gross :
> Maybe XEN_DOMCTL_PFINFO_XALLOC should no longer be supported, i.e.
> a stream containing it should be rejected? This might be a
> worthwhile modification of patch 5.
If there is a desire to actively break incoming domUs from pre-4.6 host
Am Wed, 2 Jun 2021 13:41:02 +0200
schrieb Juergen Gross :
> Shouldn't you check for zero length iovec elements as in the
> writev_exact() case then?
I will double check if this is a hard requirement.
Olaf
pgpz4DuTfvQEM.pgp
Description: Digitale Signatur von OpenPGP
On 06.05.2021 14:47, George Dunlap wrote:
> --- a/xen/arch/x86/Kconfig
> +++ b/xen/arch/x86/Kconfig
> @@ -55,7 +55,7 @@ config PV
> config PV32
> bool "Support for 32bit PV guests"
> depends on PV
> - default y
> + default PV_SHIM
> select COMPAT
> ---help---
>
On 07.06.2021 11:04, Juergen Gross wrote:
> After 32-bit PV-guests have been security de-supported when not running
> under PV-shim, the hypervisor will no longer be configured to support
> those domains per default when not being built as PV-shim.
>
> Unfortunately libxenguest will fail saving or
After 32-bit PV-guests have been security de-supported when not running
under PV-shim, the hypervisor will no longer be configured to support
those domains per default when not being built as PV-shim.
Unfortunately libxenguest will fail saving or restoring a PV domain
due to this restriction, as i
Hi Christoph:
Thanks for your review.
On 6/7/2021 2:41 PM, Christoph Hellwig wrote:
On Sun, May 30, 2021 at 11:06:18AM -0400, Tianyu Lan wrote:
+ if (ms_hyperv.ghcb_base) {
+ rdmsrl(MSR_AMD64_SEV_ES_GHCB, ghcb_gpa);
+
+ ghcb_va = ioremap_cache(ghcb_gpa,
flight 162480 xen-unstable-smoke real [real]
flight 162486 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/162480/
http://logs.test-lab.xenproject.org/osstest/logs/162486/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which co
61 matches
Mail list logo