flight 50402 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50402/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 21 guest-migrate/src_host/dst_host fail REGR. vs. 36517
Tests
On 09.04.15 at 22:06, andrew.coop...@citrix.com wrote:
@@ -26,18 +27,24 @@
#endif
#ifndef NDEBUG
-#define ASSERT_INTERRUPT_STATUS(x) \
-pushf; \
-testb $X86_EFLAGS_IF8,1(%rsp);\
-j##x 1f;
Changes from v1, suggested by Daniel:
- flags parameter is now mandatory
- updated documentation about externData calculation
- constant size for externData structure, perform SHA1 on empty string
if requested parameter is NULL
- return error if invalid bit is set in flags
- added
Currently, the flags are not interpreted by vTPM. They are just
packed and sent to vtpmmgr.
Signed-off-by: Emil Condrea emilcond...@gmail.com
---
stubdom/Makefile| 1 +
stubdom/vtpm-deepquote-anyloc.patch | 127
stubdom/vtpm/vtpm_cmd.c
Hi Ian,
Any thoughts on this below?
Regards,
Koushik Chakravarty
Mobile - +91-9663396424
-Original Message-
From: Koushik Chakravarty
Sent: Wednesday, April 8, 2015 5:44 PM
To: Ian Jackson
Cc: Euan Harris; 'xen-de...@lists.xensource.com'
Subject: RE: tools/libxl - Async Task
On 04/14/2015 05:28 PM, Andrew Cooper wrote:
On 14/04/15 10:22, Hongyang Yang wrote:
On 04/14/2015 04:53 PM, Andrew Cooper wrote:
On 14/04/15 00:51, Don Slutz wrote:
On 04/13/15 12:25, Andrew Cooper wrote:
On 13/04/15 17:09, Don Slutz wrote:
If QEMU has called on xc_domain_setmaxmem to
On 10.04.15 at 16:37, david.vra...@citrix.com wrote:
On 03/04/15 15:28, Konrad Rzeszutek Wilk wrote:
Hey David and Boris,
Please see the two patches - the first one fixes an situation that
the original XSA-120 patch hadn't considered.
The second patch is more of just a cleanup. Can be
On Tue, Apr 14, 2015 at 10:33:45AM +0100, Ian Campbell wrote:
On Tue, 2015-04-14 at 02:27 +, osstest service user wrote:
flight 50401 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50401/
Regressions :-(
Tests which did not succeed and are blocking,
On 10.04.15 at 11:08, andrew.coop...@citrix.com wrote:
On 10/04/15 02:23, Tian, Kevin wrote:
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Thursday, April 09, 2015 3:45 AM
Intead of clobbering DMAR - XMAR and back, clobber to RMAD instead.
This
means that changing the
On 08.04.15 at 14:57, roger@citrix.com wrote:
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports rangeset.
Also add the IO ports of the serial
Hi, everyone:
There is no patch for OProfile above 0.9.5 in website
http://xenoprof.sourceforge.net/ . why? Does it mean we don’t need the
patch for OProfile user level tools if we use 0.9.5 above ?
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On Thu, 2015-03-12 at 17:16 +, Ian Campbell wrote:
This series adds parsing of the DT ranges and interrupt-map properties
for PCI devices, these contain the MMIOs and IRQs used by children on
the bus. This replaces the specific mapping stuff on xgene.
Somehow I managed to completely miss
On 13.04.15 at 09:37, mja...@caviumnetworks.com wrote:
Xen currently does not have PCI support for ARM builds. This patch set
makes the code compilable for ARM PCI and adds places-holder code
which would be replaced with PCI pass-through support patch series.
Re-factor MSI Handling
On Tue, 2015-04-14 at 02:27 +, osstest service user wrote:
flight 50401 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50401/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5
On 13/04/15 16:11, Sander Eikelenboom wrote:
Monday, April 13, 2015, 2:21:21 PM, you wrote:
On 13/04/15 13:14, Sander Eikelenboom wrote:
Monday, April 13, 2015, 2:07:02 PM, you wrote:
On 13/04/15 12:21, Sander Eikelenboom wrote:
Monday, April 13, 2015, 11:50:51 AM, you wrote:
On
On 09.04.15 at 22:06, andrew.coop...@citrix.com wrote:
@@ -66,4 +68,40 @@ struct bug_frame {
__stop_bug_frames_2[],
__stop_bug_frames_3[];
+#else /* !__ASSEMBLY__ */
+
+/*
+ * Construct a bugframe, suitable for using in
On 14/04/15 08:50, Jan Beulich wrote:
On 10.04.15 at 11:08, andrew.coop...@citrix.com wrote:
On 10/04/15 02:23, Tian, Kevin wrote:
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Thursday, April 09, 2015 3:45 AM
Intead of clobbering DMAR - XMAR and back, clobber to RMAD instead.
Thanks, we're getting there. If my comments confuse you please just ask
for clarification.
There is no need to change the subject line. However, it would be
useful if you have some kind of version number in you subject line. That
is
[PATCH vX] libxl: provide libxl_bimap_{and,or}
You can do
On 04/14/2015 04:53 PM, Andrew Cooper wrote:
On 14/04/15 00:51, Don Slutz wrote:
On 04/13/15 12:25, Andrew Cooper wrote:
On 13/04/15 17:09, Don Slutz wrote:
If QEMU has called on xc_domain_setmaxmem to add more memory for
option ROMs, domain restore needs to also increase the memory.
On 14/04/15 10:22, Hongyang Yang wrote:
On 04/14/2015 04:53 PM, Andrew Cooper wrote:
On 14/04/15 00:51, Don Slutz wrote:
On 04/13/15 12:25, Andrew Cooper wrote:
On 13/04/15 17:09, Don Slutz wrote:
If QEMU has called on xc_domain_setmaxmem to add more memory for
option ROMs, domain restore
On Tue, 14 Apr 2015, Jaggi, Manish wrote:
diff --git a/xen/include/asm-arm/pci.h b/xen/include/asm-arm/pci.h
index de13359..b8ec882 100644
--- a/xen/include/asm-arm/pci.h
+++ b/xen/include/asm-arm/pci.h
@@ -1,7 +1,8 @@
-#ifndef __X86_PCI_H__
-#define __X86_PCI_H__
+#ifndef
On Tue, Apr 14, 2015 at 05:22:31PM +0800, Hongyang Yang wrote:
[...]
If I understand correctly, the steps are this:
* 'xl create' makes a VM of size $FOO
* qemu bumps the size to $FOO+$N
* 'xl save' writes $FOO+$N of page data, but the xl config file at the
start of the image still says
On Tue, 14 Apr 2015, Jaggi, Manish wrote:
Hi Julien,
From: Julien Grall julien.grall@gmail.com
Sent: Monday, April 13, 2015 3:49 PM
To: Jaggi, Manish; xen Devel; Stefano Stabellini; Julien Grall; Ian Campbell;
Kumar, Vijaya; prasun.kap...@cavium.com
Subject: Re: [Xen-devel] [PATCH 0/2]
On 09.04.15 at 22:59, andrew.coop...@citrix.com wrote:
On 09/04/2015 21:38, Boris Ostrovsky wrote:
In case dom0_max_vcpus is incorrectly specified on boot line make sure
we will still boot.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Good catch - lets not do that.
On 10.04.15 at 03:43, kevin.t...@intel.com wrote:
From: Roger Pau Monne [mailto:roger@citrix.com]
Sent: Wednesday, April 08, 2015 8:57 PM
@@ -1484,6 +1489,12 @@ int hvm_domain_initialise(struct domain *d)
goto fail1;
d-arch.hvm_domain.io_handler-num_slot = 0;
+/*
On 09.04.15 at 12:55, andrew.coop...@citrix.com wrote:
On 08/04/15 13:57, Roger Pau Monne wrote:
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports
On Tue, Apr 14, 2015 at 11:46:55AM +0800, Hongyang Yang wrote:
This patch also fix a triple fault when guests running under COLO mode.
(XEN) d0v1 Over-allocation for domain 1: 524545 524544
(XEN) memory.c:155:d0v1 Could not allocate order=0 extent: id=1 memflags=0
(181 of 235)
(XEN) d1v1
On 14/04/15 00:51, Don Slutz wrote:
On 04/13/15 12:25, Andrew Cooper wrote:
On 13/04/15 17:09, Don Slutz wrote:
If QEMU has called on xc_domain_setmaxmem to add more memory for
option ROMs, domain restore needs to also increase the memory.
Signed-off-by: Don Slutz dsl...@verizon.com
On Mon, Apr 13, 2015 at 07:51:31PM -0400, Don Slutz wrote:
On 04/13/15 12:25, Andrew Cooper wrote:
On 13/04/15 17:09, Don Slutz wrote:
If QEMU has called on xc_domain_setmaxmem to add more memory for
option ROMs, domain restore needs to also increase the memory.
Signed-off-by: Don Slutz
On 13.04.15 at 12:34, mja...@caviumnetworks.com wrote:
On Monday 13 April 2015 03:45 PM, Stefano Stabellini wrote:
On Mon, 13 Apr 2015, Manish Jaggi wrote:
@@ -282,22 +266,10 @@ static struct pci_dev *alloc_pdev(struct pci_seg
*pseg,
u8 bus, u8 devfn)
*((u8*) pdev-bus) = bus;
On 04/14/2015 05:29 PM, Wei Liu wrote:
On Tue, Apr 14, 2015 at 05:22:31PM +0800, Hongyang Yang wrote:
[...]
If I understand correctly, the steps are this:
* 'xl create' makes a VM of size $FOO
* qemu bumps the size to $FOO+$N
* 'xl save' writes $FOO+$N of page data, but the xl config file at
On Tue, Apr 14, 2015 at 09:43:07AM +0100, Ian Campbell wrote:
On Thu, 2015-03-12 at 17:16 +, Ian Campbell wrote:
This series adds parsing of the DT ranges and interrupt-map properties
for PCI devices, these contain the MMIOs and IRQs used by children on
the bus. This replaces the
On 10.04.15 at 19:29, roger@citrix.com wrote:
This is needed for performing save/restore of PV guests.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Tim Deegan t...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
Once migration v2
El 14/04/15 a les 13.55, Jan Beulich ha escrit:
On 10.04.15 at 19:29, roger@citrix.com wrote:
This is needed for performing save/restore of PV guests.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Tim Deegan t...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper
On 10.04.15 at 19:29, roger@citrix.com wrote:
Modify shadow_track_dirty_vram to use a local buffer and then flush to the
guest without the paging_lock held. This is modeled after
hap_track_dirty_vram.
And hence introduces the same issue: The HVMOP_track_dirty_vram
handler explicitly
On 13.04.15 at 16:14, ian.jack...@eu.citrix.com wrote:
Here are some more which I propose to force push. In each case I show
all the blocking tests mentioned in the osstest test report.
osstest service user writes ([xen-4.5-testing test] 50373: regressions -
FAIL):
flight 50373
On 20.03.15 at 16:52, jbeul...@suse.com wrote:
This has been pending for almost 4 weeks now...
Jan
Due to the (late) point in time when qemu requests the hypervisor to
set up MSI-X interrupts (which is where the MMIO intercept gets put
in place), the hypervisor doesn't see all guest writes,
The CfP is at
http://events.linuxfoundation.org/events/xen-project-developer-summit/program/cfp
http://events.linuxfoundation.org/events/xen-project-developer-summit/program/cfp
Regards
Lars___
Xen-devel mailing list
Xen-devel@lists.xen.org
---
xen/arch/x86/traps.c| 66 +++
xen/arch/x86/x86_64/entry.S | 26 +
2 files changed, 92 insertions(+)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index 22cdfc4..c562842 100644
--- a/xen/arch/x86/traps.c
+++
New 10.1 images are larger than the previous 10.0 images, so change the size
of the LVM volume to accommodate them.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
ts-freebsd-install | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
On Thu, 2015-04-09 at 13:16 +0100, Ian Jackson wrote:
I would say something like this:
WFM, in particular the final two paragraphs which I think clarify
everything which needs clarifying, thanks.
Ian.
___
Xen-devel mailing list
On 14.04.15 at 12:45, roger@citrix.com wrote:
Hello,
El 14/04/15 a les 12.31, Jan Beulich ha escrit:
On 14.04.15 at 12:01, roger@citrix.com wrote:
I have one question about the current IO port handling for PVH guests
(DomU and Dom0). There's some code right now in
On 13.04.15 at 18:01, dsl...@verizon.com wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -536,8 +536,9 @@ static int hvm_alloc_ioreq_gmfn(struct domain *d,
unsigned long *gmfn)
static void hvm_free_ioreq_gmfn(struct domain *d, unsigned long gmfn)
{
-unsigned
On 4/14/2015 3:19 AM, Wei Liu wrote:
Thanks, we're getting there. If my comments confuse you please just ask
for clarification.
There is no need to change the subject line. However, it would be
useful if you have some kind of version number in you subject line. That
is
[PATCH vX] libxl:
On 10.04.15 at 19:29, roger@citrix.com wrote:
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -397,6 +397,53 @@ int paging_mfn_is_dirty(struct domain *d, mfn_t gmfn)
return rv;
}
+static inline void *map_dirty_bitmap(XEN_GUEST_HANDLE_64(uint8) dirty_bitmap,
+
Hi Julien/Ian,
From: Julien Grall julien.grall@gmail.com
Sent: Tuesday, April 14, 2015 5:16 PM
To: Ian Campbell; Julien Grall
Cc: prasun.kap...@cavium.com; Stefano Stabellini; Jaggi, Manish; Julien Grall;
Xen Devel; Kumar, Vijaya
Subject: Re:
From: xen-devel-boun...@lists.xen.org xen-devel-boun...@lists.xen.org on
behalf of wei.l...@citrix.com wei.l...@citrix.com
Sent: Tuesday, April 14, 2015 3:57 PM
To: xen-de...@lists.xenproject.org; edmund.h.wh...@intel.com;
xumengpa...@gmail.com;
Hi Linda,
Hi Linda,
On 14/04/15 13:14, Linda wrote:
On 4/14/2015 3:19 AM, Wei Liu wrote:
Thanks, we're getting there. If my comments confuse you please just ask
for clarification.
There is no need to change the subject line. However, it would be
useful if you have some kind of version
On Tue, Apr 14, 2015 at 05:40:24PM +0800, Hongyang Yang wrote:
On 04/14/2015 05:29 PM, Wei Liu wrote:
On Tue, Apr 14, 2015 at 05:22:31PM +0800, Hongyang Yang wrote:
[...]
If I understand correctly, the steps are this:
* 'xl create' makes a VM of size $FOO
* qemu bumps the size to
On Fri, 2015-04-03 at 15:31 +0200, Julien Grall wrote:
Also, as we plan to use passtrough, we there are such places:
In tools/libxc/include/xenctrl.h:
int xc_domain_bind_pt_irq(xc_interface *xch,
uint32_t domid,
*uint8_t* machine_irq,
On 14/04/15 10:28, Stefano Stabellini wrote:
On Tue, 14 Apr 2015, Jaggi, Manish wrote:
diff --git a/xen/include/asm-arm/pci.h b/xen/include/asm-arm/pci.h
index de13359..b8ec882 100644
--- a/xen/include/asm-arm/pci.h
+++ b/xen/include/asm-arm/pci.h
@@ -1,7 +1,8 @@
-#ifndef __X86_PCI_H__
On Mon, 2015-04-06 at 16:15 +0200, Julien Grall wrote:
Hi Ian,
On 01/04/2015 10:30, Ian Campbell wrote:
On Tue, 2015-03-31 at 17:48 +0100, Stefano Stabellini wrote:
If it helps we could add a couple of comments on top of the structs in
smmu.c to explain the meaning of the fields, like:
Koushik Chakravarty writes (RE: tools/libxl - Async Task Cancellation Query):
When you say - That would require the caller to preserve the ao_how which
seems awkward to me - whom do you refer as the caller?
By the caller I mean the program outside libxl which is calling libxl.
From what I
On 14/04/15 11:01, Roger Pau Monné wrote:
El 08/04/15 a les 14.57, Roger Pau Monne ha escrit:
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports
Hi all
We are now three months into 4.6 development window. This is an email to keep
track of all the patch series I gathered. It is by no means complete and / or
acurate. Feel free to reply this email with new projects or correct my
misunderstanding.
= Timeline =
We are planning on a 9-month
On 14/04/15 11:33, Ian Campbell wrote:
Whoops. I didn't spot those one thanks.
libxc is not ABI stable, we can make these bigger if necessary, or
introduce new interface etc as required depending on how things pan out
at the hypercall layer.
FIY, a patch has been sent on the ML see [PATCH
On Fri, 2015-04-10 at 15:25 +0100, Julien Grall wrote:
On 10/04/15 14:58, Iurii Konovalenko wrote:
Hi, Julien!
Hi Iurii,
On Wed, Apr 8, 2015 at 7:05 PM, Julien Grall julien.gr...@citrix.com
wrote:
The virtualization extension requires LPAE. Any reason to make this
optional?
I
Jan Beulich writes (Re: More force pushes (xen-4.5-testing, xen-unstable,
qemu-mainline)):
flight 50373 xen-4.5-testing real [real]
xen 0b754fb3ed6b7b6d0f2e1f7c1877d3c0a7da2168
flight 50390 xen-unstable real [real]
xen
flight 50403 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50403/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 10 guest-start fail REGR. vs. 36764
El 08/04/15 a les 14.57, Roger Pau Monne ha escrit:
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports rangeset.
Also add the IO ports of the serial
On 14.04.15 at 12:01, roger@citrix.com wrote:
I have one question about the current IO port handling for PVH guests
(DomU and Dom0). There's some code right now in vmx_vmexit_handler
(EXIT_REASON_IO_INSTRUCTION) that's kind PVH specific:
if ( exit_qualification 0x10 )
{
/* INS,
Hello,
El 14/04/15 a les 12.31, Jan Beulich ha escrit:
On 14.04.15 at 12:01, roger@citrix.com wrote:
I have one question about the current IO port handling for PVH guests
(DomU and Dom0). There's some code right now in vmx_vmexit_handler
(EXIT_REASON_IO_INSTRUCTION) that's kind PVH
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
---
v2: Pass msg as a second parameter rather than duplicating
ASSERT_INTERRUPT_STATUS
---
xen/include/asm-x86/asm_defns.h | 13 -
1 file changed, 8 insertions(+),
On Thu, 2015-04-09 at 12:30 +0100, Tim Deegan wrote:
What's the policy on reusing DOMCTL numbers? I see
XEN_DOMCTL_arm_configure_domain
has been retired in the conflicting patch. Should I just reuse it's number
for monitor_op? For the most part domctl numbers seem to be continuous but
On 14/04/15 11:33, Julien Grall wrote:
On 14/04/15 10:28, Stefano Stabellini wrote:
On Tue, 14 Apr 2015, Jaggi, Manish wrote:
diff --git a/xen/include/asm-arm/pci.h b/xen/include/asm-arm/pci.h
index de13359..b8ec882 100644
--- a/xen/include/asm-arm/pci.h
+++ b/xen/include/asm-arm/pci.h
@@
On 04/14/2015 11:27 AM, wei.l...@citrix.com wrote:
== Hypervisor ==
* Alternate p2m: support multiple copies of host p2m (ok)
- Ed White
* Improve RTDS scheduler (none)
- Dagaen Golomb, Meng Xu
This is a little vague... exactly what kinds of improvements are
envisioned here?
*
On Tue, Apr 14, 2015 at 12:27 PM, wei.l...@citrix.com wrote:
Hi all
We are now three months into 4.6 development window. This is an email to
keep
track of all the patch series I gathered. It is by no means complete and /
or
acurate. Feel free to reply this email with new projects or
On 14/04/15 11:27, wei.l...@citrix.com wrote:
=== Hypervisor X86 ===
* VT-d Posted-interrupt (PI) (none)
- Wu, Feng
V1 posted
* Intel PML (Page Modification Logging) for Xen (none)
design doc posted
- Kai Huang
V1 posted (good)
* PVH - AMD hardware support. (fair)
RFC
On 14/04/15 14:17, Ian Campbell wrote:
On Fri, 2015-04-10 at 15:19 +0100, David Vrabel wrote:
This is only temporary until arm/arm64 provides an xadd()
implementation.
I'll assume that you aren't planning on doing this and add it to my own
TODO list. Although, I'm more than willing to be
Urgh... I think I made a mistake in the rune I gave you, sorry. The
--subject-prefix= doesn't need to include [].
And you forgot to change the subject line to
libxl: provide libxl_bitmap_{and,or}
I'm a picky about the subject line because this is what shows up when
you look at git commit log.
Ian Campbell writes ([PATCH OSSTEST v4 08/25] make-flight: Handle
$BUILD_LVEXTEND_MAX in mfi-common:create_build_jobs()):
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
___
Xen-devel mailing list
On Fri, Apr 10, Olaf Hering wrote:
How is new code supposed to wait for backend changes?
Right now there are two APIs for that:
- libxl__wait_for_backend loops for a while until it returns an error.
- libxl__ev_devstate_wait registers a watch and a timer.
In case of pvscsi there are
Roger Pau Monne writes ([PATCH] osstest: fix FreeBSD guest disk size):
New 10.1 images are larger than the previous 10.0 images, so change the size
of the LVM volume to accommodate them.
Thanks, after discussion this now looks like the patch below and I'm
going to push it to osstest pretest
On Tue, 2015-04-14 at 16:40 +0100, Jan Beulich wrote:
On 14.04.15 at 17:25, ian.campb...@citrix.com wrote:
The quick-start is not terribly comprehensive for beginners.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
README |7 ++-
1 file changed, 6 insertions(+), 1
I'll fix it when I get home. It'll be late where you are. L
Sent from my iPhone
On Apr 14, 2015, at 10:33 AM, Wei Liu wei.l...@citrix.com wrote:
Urgh... I think I made a mistake in the rune I gave you, sorry. The
--subject-prefix= doesn't need to include [].
And you forgot to change
Konrad Rzeszutek Wilk writes (libvirtd live-locking on CTX_LOCK when doing
'virsh domid save /tmp/blah' with guest corrupting memory (on purpose).):
It looks like thread #10 is blocking in libxl_read_exactly waiting
for 'libxl-save-helper'. Said application (see below) has dispatched
an
No functional change, other than to debug and error message output.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
tools/libxl/libxl_event.c| 39 +++
tools/libxl/libxl_internal.h |8
2 files changed, 31 insertions(+), 16
* Regression in PCI passthrough of INTx legacy devices can trigger list
corruption (good)
Sander reported it. Two different types of patches available.
- Konrad Rzeszutek Wilk
Done.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 04/14/15 05:52, Wei Liu wrote:
On Tue, Apr 14, 2015 at 05:40:24PM +0800, Hongyang Yang wrote:
On 04/14/2015 05:29 PM, Wei Liu wrote:
On Tue, Apr 14, 2015 at 05:22:31PM +0800, Hongyang Yang wrote:
[...]
If I understand correctly, the steps are this:
* 'xl create' makes a VM of size $FOO
On 04/14/15 04:53, Wei Liu wrote:
On Mon, Apr 13, 2015 at 07:51:31PM -0400, Don Slutz wrote:
On 04/13/15 12:25, Andrew Cooper wrote:
On 13/04/15 17:09, Don Slutz wrote:
If QEMU has called on xc_domain_setmaxmem to add more memory for
option ROMs, domain restore needs to also increase the
On Tue, Apr 14, 2015 at 01:34:43PM -0400, Don Slutz wrote:
On 04/14/15 04:53, Wei Liu wrote:
On Mon, Apr 13, 2015 at 07:51:31PM -0400, Don Slutz wrote:
On 04/13/15 12:25, Andrew Cooper wrote:
On 13/04/15 17:09, Don Slutz wrote:
If QEMU has called on xc_domain_setmaxmem to add more memory
The save helper message reader does operates with the fd in blocking
mode. So spurious wakeups could cause it to block, unless it takes
precautions.
Reported-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
On Tue, Apr 14, 2015 at 01:43:38PM -0400, Don Slutz wrote:
On 04/14/15 05:52, Wei Liu wrote:
On Tue, Apr 14, 2015 at 05:40:24PM +0800, Hongyang Yang wrote:
On 04/14/2015 05:29 PM, Wei Liu wrote:
On Tue, Apr 14, 2015 at 05:22:31PM +0800, Hongyang Yang wrote:
[...]
If I understand
On 20/03/15 16:27, Jan Beulich wrote:
Commit 74fd0036de (x86: properly handle MSI-X unmask operation from
guests) didn't go far enough: it fixed an issue with unmasking, but
left an issue with masking in place: Due to the (late) point in time
when qemu requests the hypervisor to set up MSI-X
On Tue, 2015-04-14 at 12:24 +, Jaggi, Manish wrote:
Hi Julien/Ian,
Please will you configure your mail client to do the chevron () style
of quotation favour in open source communities, picking out your replies
from the mail you are replying to is a massive chore, especially after a
couple of
Sets up a tcpdump on a dom0. (We do not log traffic to other test
boxes in the job because that might include large amounts of migration
or test data.)
Also arrange that:
- We stop the tcpdump when doing log capture
- We capture the tcpdump record (by adding a big pattern to the log list)
-
On Tue, 2015-04-14 at 13:34 +0100, Julien Grall wrote:
Hi Manish,
On 14/04/15 13:25, Jaggi, Manish wrote:
* ARM PCI passthrough (none)
- Manish Jaggi
- Vijay Kilari
[manish] I have started pushing the patches
Finding the [manish] in the mail was like finding a needle in a
On Mon, 2015-04-13 at 09:51 +0100, Jan Beulich wrote:
On 02.04.15 at 11:45, ian.campb...@citrix.com wrote:
On Wed, 2015-04-01 at 13:28 +, Olaf Hering wrote:
To allow reproducible builds of hvmloader introduce a make variable
VGABIOS_REL_DATE=dd Mon to provide a fixed date string.
On 14.04.15 at 17:25, ian.campb...@citrix.com wrote:
The quick-start is not terribly comprehensive for beginners.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
README |7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/README b/README
index
Provisionally add this before the migration tests to see (a) how much
extra disk space etc. it uses (b) whether it helps us debug our
migration problems.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
sg-run-job |2 ++
1 file changed, 2 insertions(+)
diff --git a/sg-run-job
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
ts-xen-install |1 +
1 file changed, 1 insertion(+)
diff --git a/ts-xen-install b/ts-xen-install
index b3f4387..7dbeab0 100755
--- a/ts-xen-install
+++ b/ts-xen-install
@@ -309,6 +309,7 @@ END
print EO or die $!
On 04/14/2015 06:27 AM, wei.l...@citrix.com wrote:
* Display IO topology when PXM data is available (good)
v3 posted
- Boris Ostrovsky
I should have v7 in the next day or so.
* VPMU - 'perf' support in Xen (good)
v14 posted
Need reviews/final ack.
- Boris Ostrovsky
The quick-start is not terribly comprehensive for beginners.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
README |7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/README b/README
index 07c4797..2013699 100644
--- a/README
+++ b/README
@@ -26,7 +26,12 @@
flight 50407 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50407/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 3 host-install(3) broken in 50333 REGR. vs.
Konrad Rzeszutek Wilk wrote:
It is unhealthy. If the device is not doing any DMA operations
it would work - but if you are saving and there are DMA operations
happening the chance of corruption (outstanding DMAs) increase.
As such re-use the check migration used.
s/used// ?
On 4/14/2015 at 09:33 PM, in message 552d1718.8060...@eu.citrix.com,
George
Dunlap george.dun...@eu.citrix.com wrote:
On 04/14/2015 11:27 AM, wei.l...@citrix.com wrote:
== Hypervisor ==
* Alternate p2m: support multiple copies of host p2m (ok)
- Ed White
* Improve
Hi all,
On Mon, 13 Apr 2015 16:36:58 +0800 Bob Liu bob@oracle.com wrote:
On 04/13/2015 04:09 PM, Stephen Rothwell wrote:
After merging the xen-tip tree, today's linux-next build (x86_64
allmodconfig)
failed like this:
drivers/char/tpm/xen-tpmfront.c: In function 'setup_ring':
flight 50408 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50408/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 14 guest-localmigrate/x10 fail in 50317 REGR.
vs. 50268
Tests
On 04/14/2015 03:21 AM, Jan Beulich wrote:
On 09.04.15 at 22:59, andrew.coop...@citrix.com wrote:
On 09/04/2015 21:38, Boris Ostrovsky wrote:
In case dom0_max_vcpus is incorrectly specified on boot line make sure
we will still boot.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
On Tue, Apr 14, 2015 at 6:42 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Mon, 2015-04-13 at 09:35 +0100, Jan Beulich wrote:
On 02.04.15 at 12:01, ian.campb...@citrix.com wrote:
On Thu, 2015-03-26 at 17:07 +, Jan Beulich wrote:
having been released mid January, it is time to get
1 - 100 of 118 matches
Mail list logo