This run is configured for baseline tests only.
flight 72184 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72184/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 9425b34925d0cf1b96aaf2c316d3299df9780252
baseline
flight 113954 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113954/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 12 guest-start fail REGR. vs. 113940
Tests which did not
flight 113958 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113958/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 9425b34925d0cf1b96aaf2c316d3299df9780252
baseline version:
ovmf
On Mon, Oct 2, 2017 at 11:12 AM, Jiri Slaby wrote:
> All these are functions which are invoked from elsewhere, but they are
> not typical C functions. So we annotate them (as global) using the new
> SYM_CODE_START. All these were not balanced with any END, so mark their
> ends by
On Thu, Sep 28, 2017 at 10:12:34AM -0300, Eduardo Habkost wrote:
> On Thu, Sep 28, 2017 at 02:33:57AM -0600, Jan Beulich wrote:
> > >>> On 27.09.17 at 21:56, wrote:
> > > --- a/hw/xen/xen_pt.c
> > > +++ b/hw/xen/xen_pt.c
> > > @@ -964,6 +964,10 @@ static const TypeInfo
Juergen Gross:
> When setting up the Xenstore watch for the memory target size the new
> watch will fire at once. Don't try to reach the configured target size
> by onlining new memory in this case, as the current memory size will
> be smaller in almost all cases due to e.g. BIOS reserved pages.
>
On 10/02/2017 07:44 PM, Boris Ostrovsky wrote:
>
>> +
>> +static void xen_setup_vsyscall_time_info(void)
>> +{
>> +struct vcpu_register_time_memory_area t;
>> +struct pvclock_vsyscall_time_info *ti;
>> +int ret;
>
>
> In the previous version you'd return immediately if
>
flight 113952 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113952/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl
On Sat, Sep 23, 2017 at 2:43 AM, Ingo Molnar wrote:
>
> * Thomas Garnier wrote:
>
>> > 2) we first implement the additional entropy bits that Linus suggested.
>> >
>> > does this work for you?
>>
>> Sure, I can look at how feasible that is. If it is, can
flight 113950 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113950/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64 7 xen-bootfail REGR. vs. 113940
Adding in kwolf; it looks sane to me; Kevin?
If I'm reading this right, this is just after the device state save.
Dave
* Anthony PERARD (anthony.per...@citrix.com) wrote:
> When doing a live migration of a Xen guest with libxl, the images for
> block devices are locked by the original QEMU
On Mon, Oct 2, 2017 at 1:04 PM, Dario Faggioli
wrote:
> On Mon, 2017-10-02 at 17:38 +0300, Andrii Anisov wrote:
> > Hello Meng Xu and Dario,
> >
> Hi,
>
> > On 01.09.17 18:58, Meng Xu wrote:
> > > This series of patches make RTDS scheduler work-conserving
> > > without
> +
> +static void xen_setup_vsyscall_time_info(void)
> +{
> + struct vcpu_register_time_memory_area t;
> + struct pvclock_vsyscall_time_info *ti;
> + int ret;
In the previous version you'd return immediately if
PVCLOCK_TSC_STABLE_BIT was not set. Don't you still need to check this?
On 10/02/2017 02:31 PM, Joao Martins wrote:
> Specifically check for PVCLOCK_TSC_STABLE_BIT and if this bit is set,
> then set it too on pvclock flags. This allows Xen clocksource to use it
> and thus speeding up xen_clocksource_read() callers (i.e. sched_clock())
>
> Signed-off-by: Joao Martins
Right now there is only a pvclock_pvti_cpu0_va() which is defined
on kvmclock since:
commit dac16fba6fc5
("x86/vdso: Get pvclock data from the vvar VMA instead of the fixmap")
The only user of this interface so far is kvm. This commit adds a
setter function for the pvti page and moves
This file defines an ABI shared between guest and hypervisor(s)
(KVM, Xen) and as such there should be an correspondent entry in
MAINTAINERS file. Notice that there's already a text notice at the
top of the header file, hence this commit simply enforces it more
explicitly and have both peers
In order to support pvclock vdso on xen we need to setup the time
info page for vcpu 0 and register the page with Xen using the
VCPUOP_register_vcpu_time_memory_area hypercall. This hypercall
will also forcefully update the pvti which will set some of the
necessary flags for vdso. Afterwards we
Specifically check for PVCLOCK_TSC_STABLE_BIT and if this bit is set,
then set it too on pvclock flags. This allows Xen clocksource to use it
and thus speeding up xen_clocksource_read() callers (i.e. sched_clock())
Signed-off-by: Joao Martins
---
New in v5
---
Hey,
This is take 5 for vdso for Xen. PVCLOCK_TSC_STABLE_BIT can be set starting Xen
4.8 which is required for vdso time related calls. In order to have it on, you
need to have the hypervisor clocksource be TSC e.g. with the following boot
params "clocksource=tsc tsc=stable:socket".
Series is
On 10/02/2017 05:12 AM, Jiri Slaby wrote:
> All these are functions which are invoked from elsewhere, but they are
> not typical C functions. So we annotate them (as global) using the new
> SYM_CODE_START. All these were not balanced with any END, so mark their
> ends by SYM_CODE_END,
On 10/02/2017 05:12 AM, Jiri Slaby wrote:
> These are all functions which are invoked from elsewhere, so we annotate
> them as global using the new SYM_FUNC_START. And their ENDPROC's by
> SYM_FUNC_END.
>
> And make sure ENTRY/ENDPROC is not defined on X86_64, given these were
> the last users.
>
On Mon, Oct 02, 2017 at 06:31:50PM +0100, Julien Grall wrote:
> This will help to consolidate the page-table code and avoid different
> path depending on the action to perform.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Andre Przywara
>
On 10/02/2017 05:12 AM, Jiri Slaby wrote:
> Here, we change all code which is not marked as functions. In other
> words, this code has been using END, not ENDPROC. So switch all of this
> to appropriate new markings SYM_CODE_START and SYM_CODE_END.
>
> Signed-off-by: Jiri Slaby
>
flight 113951 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113951/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl
On Tue, Sep 26, 2017 at 02:43:38PM +, Owen Smith wrote:
> Avoid the unneccessary calls through the input-legacy.c file by
> using the qemu_input_handler_*() calls directly. This did require
> reworking the event and sync handlers to use the reverse mapping
> from qcode to linux using
This will help to consolidate the page-table code and avoid different
path depending on the action to perform.
Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Reviewed-by: Stefano Stabellini
---
Cc: Konrad
The description of AP[1] in Xen is based on testing rather than the ARM
ARM.
Per the ARM ARM, on EL2 stage-1 page table, AP[1] is RES1 as the
translation regime applies to only one exception level (see D4.4.4 and
G4.6.1 in ARM DDI 0487B.a).
Update the comment and also rename the field to match
The parameter 'ai' is used either for attribute index or for
permissions. Follow-up patch will rework that parameters to carry more
information. So rename the parameter to 'flags'.
Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Reviewed-by:
Hi all,
This patch series contains clean-up for the ARM memory subsystem in preparation
of reworking the page tables handling.
For all changes, see in each patch.
Cheers,
Julien Grall (9):
xen/arm: page: Use ARMv8 naming to improve readability
xen/arm: page: Clean-up the definition of
Currently, all the new mappings will be read-write non-executable. Allow the
caller to use other permissions.
Signed-off-by: Julien Grall
---
Changes in v2:
- Switch the runtime check to a BUG_ON()
---
xen/arch/arm/mm.c | 3 +++
1 file changed, 3 insertions(+)
We should consider the early boot period to end when we stop using the
boot allocator. This is inline with x86 and will be helpful to know
whether we should allocate memory from the boot allocator or xenheap.
Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Currently, it is not possible to specify the permission of a new
mapping. It would be necessary to use the function modify_xen_mappings
with a different set of flags.
Introduce a couple of new flags for the permissions (Non-eXecutable,
Read-Only) and also provides definition that combine the
Currently MAIRVAL is defined in term of MAIR0VAL and MAIR1VAL which are
both hardcoded value. This makes quite difficult to understand the value
written in both registers.
Rework the definition by using value of each attribute shifted by their
associated index.
Signed-off-by: Julien Grall
This is based on the Linux ARMv8 naming scheme (see arch/arm64/mm/proc.S). Each
type will contain "NORMAL" or "DEVICE" to make clear whether each attribute
targets device or normal memory.
Signed-off-by: Julien Grall
---
Changes in v3:
- The ai '000' is named
Currently, the flags used to update page tables (i.e PAGE_HYPERVISOR_*)
only contains the memory attribute index. Follow-up patches will add
more information in it. So document the current layout.
At the same time introduce PAGE_AI_MASK to get the memory attribute
index easily.
Signed-off-by:
Hi George,
On 10/02/2017 05:30 PM, George Dunlap wrote:
On 10/02/2017 01:59 PM, Julien Grall wrote:
Hi all,
I have been attempting to use the PoD code on Arm (it will be sent in a
separate series) and spent sometimes to clean-up and switch to typesafe gfn
the current code.
The PoD code has
On Mon, 2017-10-02 at 17:38 +0300, Andrii Anisov wrote:
> Hello Meng Xu and Dario,
>
Hi,
> On 01.09.17 18:58, Meng Xu wrote:
> > This series of patches make RTDS scheduler work-conserving
> > without breaking real-time guarantees.
> > VCPUs with extratime flag set can get extra time
> > from the
On Tue, Sep 26, 2017 at 02:43:39PM +, Owen Smith wrote:
> Writes "feature-raw-pointer" during init to indicate the backend
> can pass raw unscaled values for absolute axes to the frontend.
> Frontends set "request-raw-pointer" to indicate the backend should
> not attempt to scale absolute
On 10/02/2017 05:12 AM, Jiri Slaby wrote:
> All these are functions which are invoked from elsewhere, but they are
> not typical C functions. So we annotate them (as global) using the new
> SYM_CODE_START. All these were not balanced with any END, so mark their
> ends by SYM_CODE_END,
On 10/02/2017 05:12 AM, Jiri Slaby wrote:
> Use the new SYM_DATA_START_LOCAL, and SYM_DATA_END* macros:
> 8 OBJECT LOCAL DEFAULT6 gdt
> 000832 OBJECT LOCAL DEFAULT6 gdt_start
> 0028 0 OBJECT LOCAL DEFAULT6 gdt_end
> 0028 256 OBJECT LOCAL DEFAULT6
Hi,
with Xen 4.8.2, migrated domains have wrong stats for stolen time.
For example :
root! laussor:/proc# cat stat
cpu 87957976 32463 6483874 361169794 3075806 0 937004 183086986113 0 0
cpu0 2828867 2434 226580 43754152 786651 0 42766 1778722573131 0 0
cpu1 2611496 3545 232529 42364047 594846
When doing a live migration of a Xen guest with libxl, the images for
block devices are locked by the original QEMU process, and this prevent
the QEMU at the destination to take the lock and the migration fail.
From QEMU point of view, once the RAM of a domain is migrated, there is
two QMP
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Hi all,
>
> I have been attempting to use the PoD code on Arm (it will be sent in a
> separate series) and spent sometimes to clean-up and switch to typesafe gfn
> the current code.
>
> The PoD code has been tested on Arm (the version is slightly
On 10/02/2017 01:59 PM, Julien Grall wrote:
> - Switch the return type to bool
> - Remove the parameter p2m_query_t q as it is not used
>
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
On 10/02/2017 01:59 PM, Julien Grall wrote:
> At the same time make the array gfns const has it is not modified within
> the function.
>
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
This avoids indirection and parameter constraint issues. Doing so relaxes the
load_LDT() constraints from %ax to any general purpose register.
The triple-fault reboot method stays as is, to avoid the int3 possibly getting
moved relative to the lidt.
Signed-off-by: Andrew Cooper
Andrew Cooper (3):
x86/smp: Rework cpu_smpboot_alloc() to cope with more than just
-ENOMEM
xen/x86: Introduce static inline wrappers for l{idt,gdt,ldt,tr}()
x86/ldt: Alter how invalidate_shadow_ldt() deals with TLB flushes
xen/arch/x86/cpu/common.c | 8
xen/arch/x86/domain.c
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: George Dunlap
---
xen/arch/x86/smpboot.c | 31 ++-
1 file changed, 18
Modify invalidate_shadow_ldt() to return a boolean indicating whether mappings
have been dropped, rather than taking a flush parameter. Tweak the internal
logic to be able to ASSERT() that v->arch.pv_vcpu.shadow_ldt_mapcnt matches
the number of PTEs removed.
This allows MMUEXTOP_SET_LDT to avoid
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
___
Xen-devel mailing list
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Acked-by: Tamas K Lengyel
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
On Mon, Oct 2, 2017 at 6:59 AM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Kevin Tian
> Acked-by: Razvan Cojocaru
>
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Kevin Tian
> Acked-by: Razvan Cojocaru
> Reviewed-by: Wei Liu
On 10/02/2017 03:42 PM, Petre Ovidiu PIRCALABU wrote:
> On Lu, 2017-10-02 at 15:09 +0100, George Dunlap wrote:
>> On 10/02/2017 02:43 PM, George Dunlap wrote:
>>>
>>> On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
Enforce the distinction between an instruction not implemented by
the
flight 113949 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113949/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl
flight 113947 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113947/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 6 kernel-build fail REGR. vs. 113902
Tests which did not
On Lu, 2017-10-02 at 15:09 +0100, George Dunlap wrote:
> On 10/02/2017 02:43 PM, George Dunlap wrote:
> >
> > On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
> > >
> > > Enforce the distinction between an instruction not implemented by
> > > the
> > > emulator and the failure to emulate that
Hi all,
To simplify things, I will forgo the requirement of release-ack until
the code freeze and leave the call to the committers.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hello Meng Xu and Dario,
On 01.09.17 18:58, Meng Xu wrote:
This series of patches make RTDS scheduler work-conserving
without breaking real-time guarantees.
VCPUs with extratime flag set can get extra time
from the unreserved system resource.
System administrators can decide which VCPUs have
On Wed, Sep 06, 2017 at 07:36:23PM +0200, Juergen Gross wrote:
> With virt_spin_lock() being guarded by a static key the bare metal case
> can be optimized by patching the call away completely. In case a kernel
> running as a guest it can decide whether to use paravitualized
> spinlocks, the
On 10/02/2017 03:55 PM, Franck Bui wrote:
>
> I think it would be better to continue the discussion here [1], as a
> solution might require some changes on systemd side.
>
Actually I continued the discussion here:
https://github.com/systemd/systemd/pull/6662
Feel free to join !
Thanks.
On Fri, Sep 29, 2017 at 05:14:58PM -0700, Alistair Francis wrote:
> Replace all occurs of __FUNCTION__ except for the check in checkpatch
> with the non GCC specific __func__.
>
> One line in hcd-musb.c was manually tweaked to pass checkpatch.
>
> Signed-off-by: Alistair Francis
On 10/02/2017 02:43 PM, George Dunlap wrote:
> On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
>> Enforce the distinction between an instruction not implemented by the
>> emulator and the failure to emulate that instruction by defining a new
>> return code, X86EMUL_UNIMPLEMENTED.
>>
>> This value
On 10/02/2017 12:35 PM, Wei Liu wrote:
> On Mon, Oct 02, 2017 at 12:26:24PM +0200, Vasilis Liaskovitis wrote:
>> - any other options?
>
> Can we just make the unit not fail? I.e. when it detects xenfs is
> already mounted, it does nothing but reports success.
>
Unfortunately that's currently
On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
> Enforce the distinction between an instruction not implemented by the
> emulator and the failure to emulate that instruction by defining a new
> return code, X86EMUL_UNIMPLEMENTED.
>
> This value should only be returned by the core emulator only if
On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
> - print the return code of the last failed emulator operation
> in hvm_dump_emulation_state.
> - print the return code in sh_page_fault (SHADOW_PRINTK) to make the
> distiction between X86EMUL_UNHANDLEABLE and X86EMUL_UNIMPLEMENTED.
>
>
On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
> Enforce the distinction between an instruction not implemented by the
> emulator and the failure to emulate that instruction by defining a new
> return code, X86EMUL_UNIMPLEMENTED.
>
> This value should only be returned by the core emulator only if
Hi Stefano,
On 20/09/17 00:17, Stefano Stabellini wrote:
On Tue, 12 Sep 2017, Julien Grall wrote:
Currently, all the new mappings will be read-write non-executable. Allow the
caller to use other permissions.
Signed-off-by: Julien Grall
---
Changes in v2:
On Mon, Oct 2, 2017 at 3:02 PM, Wei Liu wrote:
> On Fri, Sep 29, 2017 at 04:49:23PM +0300, Oleksandr Grytsov wrote:
>> From: Oleksandr Grytsov
>>
>> Enum always uses "x" value as input argument. In
>> case of enum array "t" argument should be
Hi all,
I have been attempting to use the PoD code on Arm (it will be sent in a
separate series) and spent sometimes to clean-up and switch to typesafe gfn
the current code.
The PoD code has been tested on Arm (the version is slightly different,
mostly renaming) and the x86 part has only been
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Acked-by: Tamas K Lengyel
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Replace (foo == 0) by !foo
Some unboxing/boxing can be avoided by using mfn_add(...) instead.
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Also take the opportunity to:
- move from 1 << * to 1UL << *.
- use unsigned when possible
- move from unsigned int -> unsigned long for some induction
variables
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by:
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc:
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in
- Switch the return type to bool
- Remove the parameter p2m_query_t q as it is not used
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
A lot of the headers are not necessary. At the same time, order them in the
alphabetical order.
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
Acked-by: George Dunlap
---
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Kevin Tian
Acked-by: Razvan Cojocaru
Reviewed-by: Wei Liu
---
Cc: Jan Beulich
Cc:
At the same time make the array gfns const has it is not modified within
the function.
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in
gfn_aligned is assigned 3 times with the exact same formula. All the
variables used are not modified, so consolidate in a single assignment
at the beginning of the function.
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
Acked-by: George Dunlap
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc:
On 2 October 2017 at 10:12, Jiri Slaby wrote:
> There is a couple of assembly functions, which are invoked only locally
> in the file they are defined. In C, we mark them "static". In assembly,
> annotate them using SYM_{FUNC,CODE}_START_LOCAL (and switch their
> ENDPROC to
flight 113948 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113948/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl
Hi Jan,
On 22/09/17 10:26, Jan Beulich wrote:
On 21.09.17 at 14:40, wrote:
--- a/xen/arch/x86/mm/p2m-pod.c
+++ b/xen/arch/x86/mm/p2m-pod.c
@@ -861,17 +861,19 @@ p2m_pod_zero_check(struct p2m_domain *p2m, unsigned long
*gfns, int count)
for ( i = 0; i < count; i++
On Monday, October 2, 2017 11:12:42 AM CEST Jiri Slaby wrote:
> These are all functions which are invoked from elsewhere, so we annotate
> them as global using the new SYM_FUNC_START. And their ENDPROC's by
> SYM_FUNC_END.
>
> And make sure ENTRY/ENDPROC is not defined on X86_64, given these were
flight 113945 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113945/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 12 guest-start fail in 113939 pass in 113945
test-amd64-i386-freebsd10-i386
From: Andrew Cooper
An access which crosses a page boundary is performed atomically by x86
hardware, albeit with a severe performance penalty. An important corner case
is when a straddled access hits two pages which differ in whether a
translation exists, or in net
On 02/10/2017 12:36, George Dunlap wrote:
>>> Although I'm not business man, I don't think the top cloud provider[s]
>>> would allow nested virtualization, however mature nested virtualization
>>> is. Even xen-pv is unable to be nested in the aws and azure.
>>
>> Check the contributors to KVM
On Fri, Sep 29, 2017 at 04:49:23PM +0300, Oleksandr Grytsov wrote:
> From: Oleksandr Grytsov
>
> Enum always uses "x" value as input argument. In
> case of enum array "t" argument should be passed.
>
> Signed-off-by: Oleksandr Grytsov
On Mon, Oct 02, 2017 at 12:26:24PM +0200, Vasilis Liaskovitis wrote:
> Apologies for formatting. Here is my question in plain text:
>
> There are systemd services that check for dom0 detection before xenfs
> gets mounted by proc-xen.mount. See this systemd bug report for an
> example:
>
On Sat, Sep 30, 2017 at 4:39 AM, Paolo Bonzini wrote:
>
> - Lai Jiangshan ha scritto:
>> On Sat, Sep 30, 2017 at 12:39 AM, Paolo Bonzini wrote:
>> > On 29/09/2017 17:47, Lai Jiangshan wrote:
>> >> Hello, all
>> >>
>> >>
On Fri, Sep 29, 2017 at 10:53:07AM +0100, Roger Pau Monne wrote:
> Spotted by Coverity.
>
This now has a Coverity ID 1418831.
I will add that to commit message.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Apologies for formatting. Here is my question in plain text:
There are systemd services that check for dom0 detection before xenfs
gets mounted by proc-xen.mount. See this systemd bug report for an
example:
https://github.com/systemd/systemd/issues/6442
Upstream systemd has accepted the patch
1 - 100 of 124 matches
Mail list logo