On 2015-12-02 00:41, Boris Ostrovsky wrote:
On 12/01/2015 06:30 PM, Sander Eikelenboom wrote:
On 2015-12-02 00:19, Boris Ostrovsky wrote:
On 12/01/2015 06:00 PM, Sander Eikelenboom wrote:
On 2015-12-01 23:47, Boris Ostrovsky wrote:
On 11/30/2015 05:55 PM, Sander Eikelenboom wrote:
On
On Tue, 2015-12-01 at 04:00 -0700, Jan Beulich wrote:
> But not forking doesn't mean importing the whole directory. Some
> Makefile adjustments will be necessary anyway, so removing some
> of the frontends wouldn't make things worse. We indeed should
> avoid editing files we import, but I don't
On Tue, 2015-12-01 at 15:03 -0600, Doug Goldstein wrote:
> This works, but might have problems in Xen 4.5. If you're using running
> on Linux 3.14 or newer then you will have a problem. You need to
> backport commit 9c89dc95201ffed5fead17b35754bf9440fdbdc0 if you're using
> the C based xenstore
On 02/12/15 02:51, Eric Shelton wrote:
> ASRock Z170 Extreme 4 with BIOS version 2.30 was motherboard #1
> Gigabyte GA-Z170XP-SLI with BIOS version F5 was motherboard #2
>
> As I initially reported, both were reporting the error involving f0:1f.0
>
> Not surprisingly, there are no f0:xx.y devices.
>>> On 01.12.15 at 19:47, wrote:
> On Tue, 1 Dec 2015, Jan Beulich wrote:
>> I.e. there must be something different in how make gets invoked or
>> the environment set up.
>
> It happens if CFLAGS is set to anything as a environment variable, eg.
> export CFLAGS=" "
> make
* Paolo Bonzini (pbonz...@redhat.com) wrote:
>
>
> On 01/12/2015 18:53, Anthony PERARD wrote:
> > The problem is in qemu_ram_alloc_internal() where 'size' and 'maxsize' are
> > now been truncate to 32bit, due to 'qemu_host_page_size' been an uintptr_t
> > in the HOST_PAGE_ALIGN macro.
>
> Isn't
Hi everyone,
I am putting together the Advisory Board budget for 2016. Besides items that
are operational and spending on a new HW for the Test Lab, are there any items
which I should add that help the developer community. Things that have been
raised in the past, were
* Easier hosting of
>>> On 02.12.15 at 03:51, wrote:
> ASRock Z170 Extreme 4 with BIOS version 2.30 was motherboard #1
> Gigabyte GA-Z170XP-SLI with BIOS version F5 was motherboard #2
>
> As I initially reported, both were reporting the error involving f0:1f.0
>
> Not surprisingly, there are no
On 02/12/15 10:52, Jan Beulich wrote:
On 02.12.15 at 11:34, wrote:
>> On Mon, 2015-11-30 at 05:35 +, Hu, Robert wrote:
>>
>> Also adding Vt-x maintainers (Kevin and Jun) for their help/input, I'm not
>> sure if there is a dedicated nested-vmx maintainer. This
> On 2 Dec 2015, at 05:54, Meng Xu wrote:
>
> Hi Lars and Dario,
>
> 2015-12-01 4:11 GMT-06:00 Lars Kurth :
>>
>> I wonder whether we need to add some health warnings and recommended
>> background reading to
On Tue, 2015-12-01 at 23:54 -0600, Meng Xu wrote:
> Hi Lars and Dario,
>
> 2015-12-01 4:11 GMT-06:00 Lars Kurth :
> >
> > I wonder whether we need to add some health warnings and recommended
> > background reading to http://wiki.xenproject.org/wiki/RTDS-Based-Schedu
> >
On Wed, 2015-12-02 at 03:52 -0700, Jan Beulich wrote:
> > > > On 02.12.15 at 11:34, wrote:
> > On Mon, 2015-11-30 at 05:35 +, Hu, Robert wrote:
> >
> > Also adding Vt-x maintainers (Kevin and Jun) for their help/input, I'm
> > not
> > sure if there is a dedicated
On Tue, 2015-12-01 at 18:52 +0100, Roger Pau Monné wrote:
> El 01/12/15 a les 17.48, Iurii Mykhalskyi ha escrit:
> > > Does something like the following work? If not, could you paste the
> > > error when running it with -vvv.
> > >
> > > xl block-attach DomU
> > >
flight 65283 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65283/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 16
guest-localmigrate/x10 fail in 65210
On 01/12/2015 18:53, Anthony PERARD wrote:
> The problem is in qemu_ram_alloc_internal() where 'size' and 'maxsize' are
> now been truncate to 32bit, due to 'qemu_host_page_size' been an uintptr_t
> in the HOST_PAGE_ALIGN macro.
Isn't it qemu_host_page_mask that causes the problem?
This should
On Tue, Dec 01, 2015 at 11:54:14PM -0600, Meng Xu wrote:
> Hi Lars and Dario,
>
> 2015-12-01 4:11 GMT-06:00 Lars Kurth :
> >
> > I wonder whether we need to add some health warnings and recommended
> > background reading to
On Tue, 2015-12-01 at 14:04 -0600, Doug Goldstein wrote:
> On 11/30/15 11:19 AM, Ian Campbell wrote:
> > On Mon, 2015-11-30 at 11:00 -0600, Doug Goldstein wrote:
> > > Since there is a request to have KEXEC and the UARTs
> > > configurable by the user
> >
> > Who asked for this?
> >
> > I have
On Mon, 2015-11-30 at 05:35 +, Hu, Robert wrote:
Also adding Vt-x maintainers (Kevin and Jun) for their help/input, I'm not
sure if there is a dedicated nested-vmx maintainer. This failure has been
blocking the xen-unstable push gate for a week now so it really does need
looking into.
Also
On 26/11/15 20:32, Doug Goldstein wrote:
> When allocating a pciback device fails, avoid the possibility of a
> use after free.
We should not require clearing drvdata for correctness. We should
ensure we retain drvdata for as long as it is needed.
I note that pcistub_device_release() has:
>>> On 02.12.15 at 11:34, wrote:
> On Mon, 2015-11-30 at 05:35 +, Hu, Robert wrote:
>
> Also adding Vt-x maintainers (Kevin and Jun) for their help/input, I'm not
> sure if there is a dedicated nested-vmx maintainer. This failure has been
> blocking the xen-unstable
>>> On 01.12.15 at 21:03, wrote:
> On 27/11/15 09:51, Huaitong Han wrote:
>> --- a/xen/arch/x86/hvm/hvm.c
>> +++ b/xen/arch/x86/hvm/hvm.c
>> @@ -4582,6 +4582,18 @@ void hvm_cpuid(unsigned int input, unsigned int *eax,
>> unsigned int *ebx,
>> /* Don't expose
>>> On 27.11.15 at 10:52, wrote:
> @@ -90,6 +92,53 @@ static uint32_t set_ad_bits(void *guest_p, void *walk_p,
> int set_dirty)
> return 0;
> }
>
> +#if GUEST_PAGING_LEVELS >= 4
> +uint32_t leaf_pte_pkeys_check(struct vcpu *vcpu, uint32_t pfec,
> +
On Wed, 2015-12-02 at 11:01 +, Ian Campbell wrote:
> On Tue, 2015-12-01 at 23:54 -0600, Meng Xu wrote:
> >
> > What do you guys think which type of information we should include?
>
> I think there is an important distinction between credit2/credit and
> RT
> schedulers such as arinc/rtds
>>> On 27.11.15 at 10:52, wrote:
> @@ -90,6 +92,53 @@ static uint32_t set_ad_bits(void *guest_p, void *walk_p,
> int set_dirty)
> return 0;
> }
>
> +#if GUEST_PAGING_LEVELS >= 4
> +uint32_t leaf_pte_pkeys_check(struct vcpu *vcpu, uint32_t pfec,
> +
On Wed, Dec 02, 2015 at 08:42:17AM +0100, Juergen Gross wrote:
> For migration the last used pfn of a guest is needed to size the
> logdirty bitmap and as an upper bound of the page loop. Unfortunately
> there are pv-kernels advertising a much higher maximum pfn as they
> are really using in order
On Tue, Dec 01, 2015 at 01:27:53PM -0600, Doug Goldstein wrote:
> Prefer using the character device over the proc file if the character
> device exists. This follows similar conversions of xenbus to avoid
> issues with FMODE_ATOMIC_POS added in Linux 3.14 and newer.
>
> CC: Ian Jackson
On 02/12/15 07:42, Juergen Gross wrote:
> diff --git a/tools/libxc/xc_sr_save_x86_hvm.c
> b/tools/libxc/xc_sr_save_x86_hvm.c
> index cdee774..3c879ed 100644
> --- a/tools/libxc/xc_sr_save_x86_hvm.c
> +++ b/tools/libxc/xc_sr_save_x86_hvm.c
> @@ -135,6 +135,20 @@ static int
>>> On 02.12.15 at 09:23, wrote:
> On Tue, 2015-12-01 at 20:30 +, Andrew Cooper wrote:
>> > +#include
>>
>> I can see why you need xstate.h, but I why do you need i387.h ?
> Use vcpu_save_fpu functions.
Which is bogus by itself: That function isn't meant to be used
On Wed, 2015-12-02 at 11:03 +, Lars Kurth wrote:
> > On 2 Dec 2015, at 05:54, Meng Xu wrote:
> >
> > Maybe we could add some health warning and add a link to this
> > discussion?
> > Misconfiguration of the system will usually cause performance
> > degradation, even
>>> On 27.11.15 at 10:51, wrote:
> --- a/tools/libxc/xc_cpuid_x86.c
> +++ b/tools/libxc/xc_cpuid_x86.c
> @@ -421,9 +421,11 @@ static void xc_cpuid_hvm_policy(xc_interface *xch,
> bitmaskof(X86_FEATURE_ADX) |
>
>>> On 27.11.15 at 10:51, wrote:
> --- a/xen/include/asm-x86/x86_64/page.h
> +++ b/xen/include/asm-x86/x86_64/page.h
> @@ -134,6 +134,25 @@ typedef l4_pgentry_t root_pgentry_t;
> #define get_pte_flags(x) (((int)((x) >> 40) & ~0xFFF) | ((int)(x) & 0xFFF))
> #define
>>> On 27.11.15 at 10:52, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4304,7 +4304,8 @@ static enum hvm_copy_result __hvm_clear(paddr_t addr,
> int size)
> p2m_type_t p2mt;
> char *p;
> int count, todo = size;
> -uint32_t
On Tue, Dec 01, 2015 at 06:14:53PM +0100, Juergen Gross wrote:
> INVALID_P2M_ENTRY is defined as (xen_pfn_t)-1 and is often used
> according to it's type for an invalid pfn. Change the name of the
> macro to INVALID_PFN.
>
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
On Tue, Dec 01, 2015 at 06:14:54PM +0100, Juergen Gross wrote:
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 02/12/2015 11:30, Paolo Bonzini wrote:
> diff --git a/include/exec/cpu-all.h b/include/exec/cpu-all.h
> index f9998b9..87a4145 100644
> --- a/include/exec/cpu-all.h
> +++ b/include/exec/cpu-all.h
> @@ -174,11 +174,10 @@ extern unsigned long reserved_va;
> #define TARGET_PAGE_MASK
* Paolo Bonzini (pbonz...@redhat.com) wrote:
>
>
> On 02/12/2015 11:30, Paolo Bonzini wrote:
> > diff --git a/include/exec/cpu-all.h b/include/exec/cpu-all.h
> > index f9998b9..87a4145 100644
> > --- a/include/exec/cpu-all.h
> > +++ b/include/exec/cpu-all.h
> > @@ -174,11 +174,10 @@ extern
>>> On 27.11.15 at 10:51, wrote:
> @@ -1307,6 +1311,9 @@ void __init noreturn __start_xen(unsigned long mbi_p)
> if ( cpu_has_smap )
> set_in_cr4(X86_CR4_SMAP);
>
> +if ( !opt_pku )
> +setup_clear_cpu_cap(X86_FEATURE_PKU);
> +
> if (
>>> On 02.12.15 at 08:20, wrote:
>> Does this even compile? There is already
>>
>> static void *get_xsave_addr(void *xsave, unsigned int xfeature_idx)
>>
>> higher in the same file.
>>
>> That function should be augmented to take a struct xsave_struct
>> *xsave,
>>
Paolo Bonzini wrote:
> On 02/12/2015 11:30, Paolo Bonzini wrote:
>> diff --git a/include/exec/cpu-all.h b/include/exec/cpu-all.h
>> index f9998b9..87a4145 100644
>> --- a/include/exec/cpu-all.h
>> +++ b/include/exec/cpu-all.h
>> @@ -174,11 +174,10 @@ extern unsigned long
Commit fc0c3fa2ad5c ("x86/IO-APIC: fix setup of Xen internally used IRQs
(take 2)") introduced a regression on some hardware where Xen would hang
during shutdown, repeating the following message:
APIC error on CPU0: 08(08), Receive accept error
This appears to be because an interrupt (in this
>>> On 24.11.15 at 21:28, wrote:
> RFC. Boot tested on VMware Fusion, and on a 2-socket Xeon server.
Mind trying this one instead?
Jan
--- unstable.orig/xen/arch/x86/mpparse.c
+++ unstable/xen/arch/x86/mpparse.c
@@ -89,19 +89,14 @@ void __init
On Wed, 2015-12-02 at 10:34 +, Ian Campbell wrote:
>
[...]
> FWIW looking at the different branches in
>
> http://logs.test-lab.xenproject.org/osstest/results/history/test-amd64-amd64-qemuu-nested-intel/
>
> While xen-unstable has started failing on godello1 xen-4.6-testing does
> seem to
On 02/12/15 13:46, Ross Lagerwall wrote:
> @@ -298,6 +299,13 @@ static void stop_this_cpu(void *dummy)
> void smp_send_stop(void)
> {
> int timeout = 10;
> +cpumask_t online;
> +
> +cpumask_clear();
> +cpumask_set_cpu(smp_processor_id(), );
You can avoid this intermediate
While reviewing those patches I noticed a few types that could do with
tweaking.
Signed-off-by: Jan Beulich
---
For the AMD MWAIT change it would certainly be nice to get confirmation
on whether just Fam10 doesn't deep-sleep, or whether there's a wider
range (I'm pretty sure
On 12/02/2015 12:45 AM, Jim Fehlig wrote:
> On 11/23/2015 11:57 AM, Joao Martins wrote:
>> Introduce support for domainInterfaceStats API call for querying
>> network interface statistics. Consequently it also enables the
>> use of `virsh domifstat ` command plus
>> seeing the interfaces names
On 12/02/2015 12:08 AM, Jim Fehlig wrote:
> On 11/23/2015 11:56 AM, Joao Martins wrote:
>> . to a more generic name i.e. libxlDomainStartCallback,
>> since it will now cover another case other than the console.
>>
>> Signed-off-by: Joao Martins
>> ---
>>
flight 65285 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65285/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-winxpsp3 6 xen-boot fail REGR. vs. 59254
On 30/06/15 13:26, Boris Ostrovsky wrote:
> On 06/30/2015 05:51 AM, Ross Lagerwall wrote:
>> On 06/29/2015 02:32 PM, Boris Ostrovsky wrote:
>>> On 06/29/2015 06:19 AM, Ross Lagerwall wrote:
On 06/19/2015 05:06 PM, David Vrabel wrote:
> On 19/06/15 17:02, Boris Ostrovsky wrote:
>> On
On 19/06/15 16:15, Ross Lagerwall wrote:
> When a CPU is offlined, there may be unprocessed events on a port for
> that CPU. If the port is subsequently reused on a different CPU, it
> could be in an unexpected state with the link bit set, resulting in
> interrupts being missed. Fix this by
On 02/12/15 13:51, Jan Beulich wrote:
> While reviewing those patches I noticed a few types that could do with
> tweaking.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing
>>> On 02.12.15 at 14:46, wrote:
> Commit fc0c3fa2ad5c ("x86/IO-APIC: fix setup of Xen internally used IRQs
> (take 2)") introduced a regression on some hardware where Xen would hang
> during shutdown, repeating the following message:
> APIC error on CPU0: 08(08),
On Wed, Dec 2, 2015 at 1:49 PM, kumara rathnavel wrote:
> Hello All,
>
> I require logs of the Hypercalls made from Guest to the Hypervisor after the
> boot, as xl dmesg provides me with the log messages during the
> initialisation.
One thing you could look at is xentrace
On 28/11/15 15:47, Sander Eikelenboom wrote:
>
> -rtc_cmos rtc_cmos: hctosys: unable to read the hardware clock
> +hctosys: unable to open rtc device (rtc0)
>
> -genirq: Flags mismatch irq 8. (hvc_console) vs. (rtc0)
> -hvc_open: request_irq failed with rc -16.
I have
On 11/25/2015 08:32 AM, Ian Campbell wrote:
> On Wed, 2015-11-25 at 14:37 +, Ian Campbell wrote:
>> 2015-11-21 23:06:44 Z executing ssh ... root@172.16.144.44 virsh
>> domxml-from-native xen-xl /etc/xen/debian.jessie.guest.osstest.cfg >
>> /etc/xen/debian.jessie.guest.osstest.cfg.xml
>>
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, November 26, 2015 9:56 PM
>
> On 26/11/15 13:48, Malcolm Crossley wrote:
> > On 26/11/15 13:46, Jan Beulich wrote:
> > On 25.11.15 at 11:28, wrote:
> >>> The problem is that SandyBridge
On Wed, 2015-12-02 at 04:06 -0700, Jan Beulich wrote:
> > > )
> > > +*ecx &= ~cpufeat_mask(X86_FEATURE_PKU);
> > > +
> > > +if ( (count == 0) && cpu_has_pku )
> > > +*ecx |= (v->arch.hvm_vcpu.guest_cr[4] & X86_CR4_PKE)
> > > ?
> > > +
On Wed, 2015-12-02 at 04:31 -0700, Jan Beulich wrote:
> > > > On 02.12.15 at 08:20, wrote:
> > > Does this even compile? There is already
> > >
> > > static void *get_xsave_addr(void *xsave, unsigned int
> > > xfeature_idx)
> > >
> > > higher in the same file.
> > >
>
101 - 157 of 157 matches
Mail list logo