On Thu, 2015-12-17 at 20:20 -0600, Jonathan Creekmore wrote:
> > On Dec 17, 2015, at 7:35 PM, Dario Faggioli > com> wrote:
> >
> > Fact is, I don't think the phrase "instead of just allowing the
> > scheduler to be selected on the command line." adds much
> >
On 18/12/15 10:24, George Dunlap wrote:
+ * The invalidate will be done before VMENTER (see
>>>
>>> invalidate -> invalidation?
>>
>> That would be the correct English grammer, yes.
>
> FWIW I think either one is acceptable English grammar.
invalidate is a verb, invalidation is the
On 18/12/15 08:21, Han, Huaitong wrote:
> On Wed, 2015-12-16 at 15:36 +, George Dunlap wrote:
>> [Adding Tim, the previous mm maintainer]
>>
>> On 11/12/15 09:16, Wu, Feng wrote:
> +{
> +void *xsave_addr;
> +unsigned int pkru = 0;
> +bool_t pkru_ad, pkru_wd;
> +
The per domain grant table read lock suffers from significant contention when
performance multi-queue block or network IO due to the parallel
grant map/unmaps/copies occurring on the DomU's grant table.
On multi-socket systems, the contention results in the locked compare swap
operation failing
The per domain p2m read lock suffers from significant contention when
performance multi-queue block or network IO due to the parallel
grant map/unmaps/copies occuring on the DomU's p2m.
On multi-socket systems, the contention results in the locked compare swap
operation failing frequently which
Per-cpu read-write locks allow for the fast path read case to have
low overhead by only setting/clearing a per-cpu variable for using
the read lock. The per-cpu read fast path also avoids locked
compare swap operations which can be particularly slow on coherent
multi-socket systems, particularly
I didn't spot the percpu rwlock owner ASSERT being the wrong way round.
Please review version 4 of the series.
Sorry for the noise.
On 17/12/15 12:52, Malcolm Crossley wrote:
> This patch series adds per-cpu reader-writer locks as a generic lock
> implementation and then converts the grant table
I didn't spot the percpu rwlock owner ASSERT being the wrong way round.
Please review version 4 of the series.
Sorry for the noise.
On 17/12/15 12:52, Malcolm Crossley wrote:
> Per-cpu read-write locks allow for the fast path read case to have
> low overhead by only setting/clearing a per-cpu
>>> On 17.12.15 at 21:22, wrote:
> * Left non-MMCFG RO accesses unhandled (we havent't encountered those accesses
> yet with PVH dom0 and it's probably better to fault on them and investigate
> whether they are guest's issues).
I seriously question this being a
On 18/12/15 07:46, Tian, Kevin wrote:
>> From: David Vrabel [mailto:david.vra...@citrix.com]
>> Sent: Thursday, December 17, 2015 11:17 PM
>>
>> This series improves the performance of EPT by further reducing the
>> impact of the translation invalidations (ept_sync_domain()). By:
>>
>> a)
>>> On 17.12.15 at 21:22, wrote:
> This is provided explicitly in SVM and implicitly in VMX (when neither of
> the three EPT_EFFECTIVE_* bits is set).
>
> Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
On 18/12/15 07:53, Tian, Kevin wrote:
>> From: David Vrabel [mailto:david.vra...@citrix.com]
>> Sent: Thursday, December 17, 2015 11:17 PM
>
> [...]
>
>> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
>> index f7c5e4f..cca35f2 100644
>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>>
On 18/12/15 10:18, David Vrabel wrote:
> On 18/12/15 07:53, Tian, Kevin wrote:
>>> From: David Vrabel [mailto:david.vra...@citrix.com]
>>> Sent: Thursday, December 17, 2015 11:17 PM
>>
>> [...]
>>
>>> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
>>> index f7c5e4f..cca35f2
>>> On 17.12.15 at 21:22, wrote:
> Commit 9256f66c1606 ("x86/PCI: intercept all PV Dom0 MMCFG writes")
> added intercepts for writes to RO MMCFG space from PV dom0.
>
> Similar functionality is needed by dom0s in HVM containers (such as
> PVH and, in the future,
flight 66458 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66458/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-raw 3 host-install(3) broken pass in 66418
test-armhf-armhf-xl-multivcpu
On Tue, 2015-12-15 at 07:12 -0600, Doug Goldstein wrote:
> The following series is a follow on to the Kconfig conversion patch
> series.
It occurred to me this morning that we probably ought to stash the .config
somewhere on install in such a way that it can be associated with the Xen
binary
>>> On 18.12.15 at 11:18, wrote:
> On 18/12/15 07:53, Tian, Kevin wrote:
>>> From: David Vrabel [mailto:david.vra...@citrix.com]
>>> Sent: Thursday, December 17, 2015 11:17 PM
>>
>> [...]
>>
>>> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
>>>
On 17/12/2015 20:59, Jonathan Creekmore wrote:
> Allow the schedulers to be independently enabled or disabled at
> compile-time instead of just allowing the scheduler to be selected on
> the command line. To match existing behavior, all four schedulers are
> compiled in by default, although the
On 17/12/2015 20:59, Jonathan Creekmore wrote:
> Adds a simple macro to place a pointer to a scheduler into an array
> section at compile time. Also, goes ahead and generates the array
> entries with each of the schedulers.
>
> CC: George Dunlap
> CC: Dario Faggioli
On Wed, 2015-12-16 at 15:36 +, George Dunlap wrote:
> [Adding Tim, the previous mm maintainer]
>
> On 11/12/15 09:16, Wu, Feng wrote:
> > > > +{
> > > > +void *xsave_addr;
> > > > +unsigned int pkru = 0;
> > > > +bool_t pkru_ad, pkru_wd;
> > > > +
> > > > +bool_t uf = !!(pfec
This run is configured for baseline tests only.
flight 38531 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38531/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pygrub 18
On 17/12/2015 20:59, Jonathan Creekmore wrote:
> Creates a section to contain scheduler entry pointers that are gathered
> together into an array. This will allow, in a follow-on patch, scheduler
> entries to be automatically gathered together into the array for
> automatic parsing.
>
> CC: Ian
On 17/12/2015 20:59, Jonathan Creekmore wrote:
> Instead of having a manually-curated list of schedulers, use the array
> that was auto-generated simply by compiling in the scheduler files as
> the sole source of truth of the available schedulers.
>
> CC: George Dunlap
>>> On 17.12.15 at 21:59, wrote:
> Add machinery to allow the schedulers to be individually selectable
> through the Kconfig interface. The first patch in the series sets up
> the Kconfig options for the schedulers and places the appropriate CONFIG_
> options around
On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
> Add machinery to allow the schedulers to be individually selectable
> through the Kconfig interface.
So I don't want to pick on this series or schedulers specifically here, but
instead discuss the general premise of configurability of
>>> On 17.12.15 at 21:59, wrote:
> +extern const struct scheduler *__schedulers_start[], *__schedulers_end[];
> +#define NUM_SCHEDULERS
> (((uintptr_t)__schedulers_end-(uintptr_t)__schedulers_start) \
> +/ sizeof(struct scheduler *))
>
The check needs to be against the xsave header in the area, rather than
Xen's maximum xfeature_mask. A guest might easily have a smaller xcr0
than the maximum Xen is willing to allow, causing the pointer below to
be bogus.
Signed-off-by: Huaitong Han
---
On 18/12/15 01:35, Dario Faggioli wrote:
> On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
>> Allow the schedulers to be independently enabled or disabled at
>> compile-time instead of just allowing the scheduler to be selected on
>> the command line.
>>
> Reading this quickly, that
On Thu, Dec 17, 2015 at 09:58:38AM -0700, Jan Beulich wrote:
> This eliminates a number of pointless conditionals: Bits 0 and 1 of
> xcomp_bv don't matter anyway, and as long as none of bits 2..62 are
> set, setting bit 63 is pointless too.
>
We should set bit 63 of the xcomp_bv when
>>> On 18.12.15 at 11:45, wrote:
> How would people feel about a CONFIG_STANDARD_FEATURESET[0] with the
> majority of tweakables depending on !STANDARD_FEATURESET? It would default
> Y with a help text which dissuades normal users from touching it ("Say Y,
> unless you
>>> On 18.12.15 at 09:03, wrote:
> flight 66454 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/66454/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-i386
On 18/12/15 11:45, Ian Campbell wrote:
> On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
>> Add machinery to allow the schedulers to be individually selectable
>> through the Kconfig interface.
>
> So I don't want to pick on this series or schedulers specifically here, but
> instead
>>> On 18.12.15 at 11:53, wrote:
> On Thu, Dec 17, 2015 at 09:58:38AM -0700, Jan Beulich wrote:
>> This eliminates a number of pointless conditionals: Bits 0 and 1 of
>> xcomp_bv don't matter anyway, and as long as none of bits 2..62 are
>> set, setting bit 63 is
On 18/12/15 10:50, Huaitong Han wrote:
> The check needs to be against the xsave header in the area, rather than
> Xen's maximum xfeature_mask. A guest might easily have a smaller xcr0
> than the maximum Xen is willing to allow, causing the pointer below to
> be bogus.
>
> Signed-off-by: Huaitong
On Thu, 2015-12-17 at 18:38 +, Ian Jackson wrote:
Continuing purely for my own edification...
> FYI, it's (eliding lots) like this:
>
> sub db_retry ($$$;$$) {
> for (;;) {
> $pre->();
> eval {
> $r= &$body;
> if ($db_retry_stop) {
>
flight 66454 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66454/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 66415
build-i386-xsm
On Fri, 2015-12-18 at 10:52 +, George Dunlap wrote:
> On 18/12/15 01:35, Dario Faggioli wrote:
> > On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
> > > Allow the schedulers to be independently enabled or disabled at
> > > compile-time instead of just allowing the scheduler to be
>>> On 18.12.15 at 12:08, wrote:
> What I'd really like to see in the config options are things like:
>
> CONFIG_BIGMEM (instead of doing it via environment variable),
> NR_CPUS, and possibly some other numerical bounds which won't select
> a feature, but might be interesting to
>>> On 18.12.15 at 11:06, wrote:
> @@ -492,6 +494,50 @@ int _rw_is_write_locked(rwlock_t *lock)
> return (lock->lock == RW_WRITE_FLAG); /* writer in critical section? */
> }
>
> +void _percpu_write_lock(percpu_rwlock_t **per_cpudata,
> +
At 08:21 + on 18 Dec (1450426907), Han, Huaitong wrote:
> On Wed, 2015-12-16 at 15:36 +, George Dunlap wrote:
> > With your current series, guest_walk_tables() already checks for
> > pkeys
> > being enabled in the guest before checking for them in the
> > pagetables.
> > For shadow mode,
Commit fb373a2096dc "cri-getconfig: Break out exec_resetting_sigint."
refactored this functionality, and asserted that cri-getconfig is the
one library which everything includes.
standalone-generate-dump-flight-runvars appears to have been the
exception to that rule.
Signed-off-by: Ian Campbell
Add return codes for pci-detach, pci-attach, pci-asssignable-add, and
pci-assignable-remove.
Returning error codes makes it easier for shell scripts to tell if a
command has failed or succeeded.
NB this violates the CODING_STYLE preference for not initializing the
return-value variable at
Return failure when the command failed for more xl commands:
- mem-set
- cd-insert
- pci-*
This makes xl more useful for scripting.
In the case of mem-set, it means first cleaning up
libxl_set_memory_target() to return useful error codes.
Changes in v4:
- Remove block-attach patch
- Split out
This makes xl more useful in scripts.
The strange thing about this is that the internal cd_insert function
*already* returned something appropriate, and cd-eject was using it,
but cd-insert wasn't.
Also:
* Rework cd_insert to return EXIT_FAILURE and EXIT_SUCCESS rather than
magic constants
*
Also move the rc -> shell code translation into set_memory_max() to
make the two functions consistent with each other, and with other
similar examples in xl_cmdimpl.c
Change a 'long long' to "int64_t" while we're at it.
Signed-off-by: George Dunlap
---
v4:
- Move
libxl_set_memory_target seems to have the following return values:
* 1 on failure, if the failure happens because of a xenstore error *or* invalid
target
* -1 if the setmaxmem hypercall
* -errno if the set_pod_target hypercall target fails
* 0 on success
Make it consistently return
On Fri, 2015-12-18 at 12:08 +0100, Juergen Gross wrote:
> On 18/12/15 11:45, Ian Campbell wrote:
> > On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
> > > Add machinery to allow the schedulers to be individually selectable
> > > through the Kconfig interface.
> >
> > So I don't want
flight 66459 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66459/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 65543
>>> On 18.12.15 at 11:06, wrote:
> --- a/xen/include/xen/grant_table.h
> +++ b/xen/include/xen/grant_table.h
> @@ -51,13 +51,35 @@
> /* The maximum size of a grant table. */
> extern unsigned int max_grant_frames;
>
> +DECLARE_PERCPU_RWLOCK_GLOBAL(grant_rwlock);
>
On 18/12/15 12:30, Jan Beulich wrote:
On 18.12.15 at 12:08, wrote:
>> What I'd really like to see in the config options are things like:
>>
>> CONFIG_BIGMEM (instead of doing it via environment variable),
>> NR_CPUS, and possibly some other numerical bounds which won't
flight 66455 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66455/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-winxpsp3 6 xen-boot fail REGR. vs. 59254
On 15.12.2015 23:20, Jim Fehlig wrote:
> From: Ian Campbell
>
> xend prior to 4.0 understands vcpus as maxvcpus and vcpu_avail
> as a bit map of which cpus are online (default is all).
>
> xend from 4.0 onwards understands maxvcpus as maxvcpus and
> vcpus as the number
On Fri, 2015-12-18 at 04:02 -0700, Jan Beulich wrote:
> Previously build attempts on ix86 resulted in no error, with just
>
> *** Xen x86/32 target no longer supported!
As an aside, could we drop the *** there, or make it something else?
When I look at build failure logs I usually look for the
>>> On 18.12.15 at 12:50, wrote:
> On Fri, 2015-12-18 at 04:02 -0700, Jan Beulich wrote:
>> Previously build attempts on ix86 resulted in no error, with just
>>
>> *** Xen x86/32 target no longer supported!
>
> As an aside, could we drop the *** there, or make it
On 18/12/15 10:11, Jan Beulich wrote:
On 17.12.15 at 21:22, wrote:
>> * Left non-MMCFG RO accesses unhandled (we havent't encountered those
>> accesses
>> yet with PVH dom0 and it's probably better to fault on them and investigate
>> whether they are guest's
Additional add some diagnostic messages to the program to have an idea
why it failed.
Signed-off-by: Juergen Gross
Acked-by: Ian Campbell
Acked-by: Daniel De Graaf
---
tools/helpers/init-xenstore-domain.c | 104
Add libxl_xenstore_domid() to obtain the domain id of the xenstore
domain.
Signed-off-by: Juergen Gross
---
tools/libxl/libxl.c | 24
tools/libxl/libxl.h | 11 +++
2 files changed, 35 insertions(+)
diff --git a/tools/libxl/libxl.c
Support the xenstore domain flag for obtaining domain info.
Signed-off-by: Juergen Gross
---
tools/libxc/include/xenctrl.h | 2 +-
tools/libxc/xc_domain.c | 17 +
2 files changed, 10 insertions(+), 9 deletions(-)
diff --git
Add a parameter to init-xenstore-domain for support of arbitrary
parameters for the xenstore domain.
Signed-off-by: Juergen Gross
Acked-by: Ian Campbell
Acked-by: Daniel De Graaf
---
tools/helpers/init-xenstore-domain.c | 15
The program init-xenstore-domain to start a xenstore domain instead
of the xenstored daemon is built, but not installed. Change that.
Move the program to a new tools subdirectory "helpers" to be able to
use libxl in a later patch. Otherwise a dependency loop will be
created.
While moving modify
Split up tools/helpers/xen-init-dom0.c in order to prepare reusing
generation of the json configuration by init-xenstore-domain.c.
Signed-off-by: Juergen Gross
---
tools/helpers/Makefile| 2 +-
tools/helpers/init-dom-json.c | 59 ++
Move xen-init-dom0 from tools/libxl to tools/helpers, as it is just a
helper program.
Signed-off-by: Juergen Gross
---
tools/helpers/Makefile | 10 ++
tools/{libxl => helpers}/xen-init-dom0.c | 0
tools/libxl/Makefile | 14
Xen supports to run xenstore in a dedicated domain. It is, however, a
setup which isn't easy to configure. Today flask is required for full
functionality and the resulting xenstore domain is not configurable in
the same way as the xenstore daemon.
This patch series enables running a xenstore
init-xenstore-domain takes only positional parameters today. Change
this to a more flexible parameter syntax allowing to specify additional
options or to omit some.
Today the supported usage is:
init-xenstore-domain
[]
Modify this to:
init-xenstore-domain --kernel
When creating a xenstore domain via init-xenstore-domain destroy it
in case of an error occurred after calling xc_domain_create().
Signed-off-by: Juergen Gross
Acked-by: Daniel De Graaf
---
tools/helpers/init-xenstore-domain.c | 4 +++-
1 file changed, 3
When restarting or shutting down dom0 the xendomains script tries to
stop all other domains. Don't do this for the xenstore domain, as it
might survive a dom0 reboot in the future.
The same applies to xl shutdown --all.
Signed-off-by: Juergen Gross
---
In order to be able to have full support of a xenstore domain in Xen
add a "Xenstore-domain" flag to the hypervisor. This flag must be
specified at domain creation time and is returned by
XEN_DOMCTL_getdomaininfo.
It will allow the domain to retrieve domain information by issuing the
Create the xenstore domain with the xs_domain flag specified. This
enables us to test whether such a domain is already running before
we create it. As there ought to be only one xenstore in the system
we don't need to start another one.
Signed-off-by: Juergen Gross
---
After starting the xenstore domain write the basic data (domid, name
and memory values) to the xenstore. This makes the domain appear
correctly in xl list. Create a stub json object in order to make e.g.
xl list -l happy.
Add a new option to init-xenstore-domain to be able to specify the
domain's
On 18/12/15 11:02, Jan Beulich wrote:
On 18.12.15 at 09:03, wrote:
>> flight 66454 xen-unstable real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/66454/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> including tests
On Fri, 2015-12-18 at 13:19 +, Andrew Cooper wrote:
> However, it is also wrong for OSSTest to be attempting to build a 32bit
> hypervisor on any branch since 4.3. It seems to me that there is a bug
> there as well.
It is doing a build because it wants the 32 bit tools and it just does a
On 12/18/15 4:30 AM, Ian Campbell wrote:
> On Tue, 2015-12-15 at 07:12 -0600, Doug Goldstein wrote:
>> The following series is a follow on to the Kconfig conversion patch
>> series.
>
> It occurred to me this morning that we probably ought to stash the .config
> somewhere on install in such a way
On 18/12/15 15:20, Doug Goldstein wrote:
> On 12/18/15 4:30 AM, Ian Campbell wrote:
>> On Tue, 2015-12-15 at 07:12 -0600, Doug Goldstein wrote:
>>> The following series is a follow on to the Kconfig conversion
>>> patch series.
>>
>> It occurred to me this morning that we probably ought to stash
On 12/18/2015 01:21 AM, Tian, Kevin wrote:
From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
Sent: Thursday, December 17, 2015 10:42 PM
On 12/17/2015 09:29 AM, Jan Beulich wrote:
On 17.12.15 at 15:26, wrote:
On 12/17/2015 09:18 AM, Jan Beulich wrote:
On
Michael, could you please backport these two patches? They should apply
fine.
On Fri, 18 Dec 2015, Stefano Stabellini wrote:
> The following changes since commit 18f49881cf8359e89396aac12f5d3cf3f8a632ba:
>
> configure: Fix shell syntax to placate OpenBSD's pdksh (2015-12-18 13:32:49
> +)
On 12/18/2015 08:02 AM, Andrew Cooper wrote:
On 18/12/15 10:11, Jan Beulich wrote:
On 17.12.15 at 21:22, wrote:
* Left non-MMCFG RO accesses unhandled (we havent't encountered those accesses
yet with PVH dom0 and it's probably better to fault on them and
On 12/18/15 5:02 AM, Jan Beulich wrote:
On 18.12.15 at 09:03, wrote:
>> flight 66454 xen-unstable real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/66454/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> including tests
This series adds the qrwlocks from Linux. These are fair; under
contention both readers and writers will be queued and obtain the lock
in FIFO order (due to the fairness of the internal ticket lock).
The implementation is all in C and thus architecture independent.
Compared to the Linux
From: Konrad Rzeszutek Wilk
Our 'struct domain' has when lock profiling is enabled is bigger than
one page.
We can't use vmap nor vzalloc as both of those stash the
physical address in struct page which makes the assumptions
in 'arch_init_memory' trip over ASSERTs.
On 18/12/15 13:33, Ian Campbell wrote:
>> However, it is also wrong for OSSTest to be attempting to build a 32bit
>> > hypervisor on any branch since 4.3. It seems to me that there is a bug
>> > there as well.
> It is doing a build because it wants the 32 bit tools and it just does a
> make dist.
On 18/12/15 13:14, Juergen Gross wrote:
> When restarting or shutting down dom0 the xendomains script tries to
> stop all other domains. Don't do this for the xenstore domain, as it
> might survive a dom0 reboot in the future.
>
> The same applies to xl shutdown --all.
>
> Signed-off-by: Juergen
On 18/12/15 14:55, Juergen Gross wrote:
> On 18/12/15 15:20, Doug Goldstein wrote:
>> On 12/18/15 4:30 AM, Ian Campbell wrote:
>>> On Tue, 2015-12-15 at 07:12 -0600, Doug Goldstein wrote:
The following series is a follow on to the Kconfig conversion
patch series.
>>> It occurred to me
>>> On 18.12.15 at 16:06, wrote:
> On 18/12/15 14:55, Juergen Gross wrote:
>> On 18/12/15 15:20, Doug Goldstein wrote:
>>> On 12/18/15 4:30 AM, Ian Campbell wrote:
On Tue, 2015-12-15 at 07:12 -0600, Doug Goldstein wrote:
> The following series is a follow on to
Holding the p2m lock while calling ept_sync_domain() is very expensive
since it does a on_selected_cpus() call. IPIs on many socket machines
can be very slows and on_selected_cpus() is serialized.
It is safe to defer the invalidate until the p2m lock is released
except for two cases:
1. When
flight 66463 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66463/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
65650
Regressions
On 18/12/15 15:47, Andrew Cooper wrote:
> On 18/12/15 14:34, Juergen Gross wrote:
>> xl list is currently limited to 1024 domains. Remove the limit.
>>
>> Signed-off-by: Juergen Gross
>
> libxl_list_vm() needs similar treatment. In fact, it looks as if it
> should be
flight 66466 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66466/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-amd 3 host-install(3) broken REGR. vs.
On 18 December 2015 at 15:17, Stefano Stabellini
wrote:
> The following changes since commit 18f49881cf8359e89396aac12f5d3cf3f8a632ba:
>
> configure: Fix shell syntax to placate OpenBSD's pdksh (2015-12-18 13:32:49
> +)
>
> are available in the git
>>> On 18.12.15 at 14:19, wrote:
> However, it is also wrong for OSSTest to be attempting to build a 32bit
> hypervisor on any branch since 4.3. It seems to me that there is a bug
> there as well.
>
> Independently of not falling over a missing defconfig, the
This series improves the performance of EPT by further reducing the
impact of the translation invalidations (ept_sync_domain()). By:
a) Deferring invalidations until the p2m write lock is released.
Prior to this change a 16 VCPU guest could not be successfully
migrated on an (admittedly slow)
If a guest allocates a page and the tlbflush_timestamp on the page
indicates that a TLB flush of the previous owner is required, only the
linear and combined mappings are invalidated. The guest-physical
mappings are not invalidated.
This is currently safe because the EPT code ensures that the
From: Jennifer Herbert
The current rwlocks are write-biased and unfair. This allows writers
to starve readers in situations where there are many writers (e.g.,
p2m type changes from log dirty updates during domain save).
Introduce queued read-write locks which use
atomic_compareandswap() used atomic_t as the new, old and returned
values which is less convinient than using just int.
Signed-off-by: David Vrabel
---
xen/common/domain.c | 5 +
xen/include/asm-arm/atomic.h | 8
xen/include/asm-x86/atomic.h | 8
From: Jennifer Herbert
Reduce the size of struct lock_debug so increases in other lock
structures don't increase the size of struct domain too much.
Signed-off-by: Jennifer Herbert
Signed-off-by: David Vrabel
On 18/12/15 14:53, Andrew Cooper wrote:
> On 18/12/15 13:14, Juergen Gross wrote:
>> Add libxl_xenstore_domid() to obtain the domain id of the xenstore
>> domain.
>>
>> Signed-off-by: Juergen Gross
>
> What are the expected semantics here? Would you expect it to return
> domid 0
>>> On 18.12.15 at 15:15, wrote:
> On 18/12/15 13:33, Ian Campbell wrote:
>>> However, it is also wrong for OSSTest to be attempting to build a 32bit
>>> > hypervisor on any branch since 4.3. It seems to me that there is a bug
>>> > there as well.
>> It is doing a
Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting
via last" warning"):
> On Thu, 2015-12-17 at 18:38 +, Ian Jackson wrote:
> > Both of these are intentional. Perl thinks they might not be.
>
> ... and that's because it is a common enough mistake to think that next
The check needs to be against the xsave header in the area, rather than Xen's
maximum xfeature_mask. A guest might easily have a smaller xcr0 than the
maximum Xen is willing to allow, causing the pointer below to be bogus.
The get_xsave_addr() is modified to support uncompressed xstate areas.
The following changes since commit 18f49881cf8359e89396aac12f5d3cf3f8a632ba:
configure: Fix shell syntax to placate OpenBSD's pdksh (2015-12-18 13:32:49
+)
are available in the git repository at:
git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xsa155
for you to fetch changes
Reading twice the same field could give the guest an attack of
opportunity. In the case of event->type, gcc could compile the switch
statement into a jump table, effectively ending up reading the type
field multiple times.
This is part of XSA-155.
Signed-off-by: Stefano Stabellini
1 - 100 of 198 matches
Mail list logo