[Adding Anshul which also had to deal with something similar to this
recently]
On Thu, 2017-01-19 at 09:08 +0100, Juergen Gross wrote:
> On 17/01/17 18:26, Dario Faggioli wrote:
> > Finally, given the wide number of issues similar to this that I've
> > found and
> > fixed in the last release
>>> On 18.01.17 at 20:56, wrote:
> I am looking at rmrr_identity_mapping where the RMRR paddr get converted
> to pfn and then mapped with iommu.
> If ( rmrr->end_address & ~PAGE_SHIFT_MASK_4K ) == 0, the while loop
> while ( base_pfn < end_pfn )
> will not map
>>> On 18.01.17 at 18:38, wrote:
> On Mon, Jan 16, 2017 at 11:56 AM, Jan Beulich wrote:
> On 13.01.17 at 20:21, wrote:
>>> This is a series based on v11 of Daniel Kiper's
>>> "x86: multiboot2 protocol support" series. It aims
> -Original Message-
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: 17 January 2017 17:30
> To: xen-de...@lists.xenproject.org
> Cc: Paul Durrant ; Ian Jackson
> ; Jennifer Herbert ;
> Daniel De
> -Original Message-
[snip]
> > > For safety I guess I could explore the possibility of having libxl not
> > > create a PV backend for this vdev type.
> >
> > ... this is the best option for now.
> >
>
> And I realise if we are not going to have code in libxl for nvme pv
> disk, we can
>>> On 18.01.17 at 22:47, wrote:
> The use of test_bit() can also return EPERM, so the
> return value from test_bit() must be checked to
> ensure that kexec_status() always returns 0, 1 or
> -1, per the public header description.
Well, no, and this is rather
On 17/01/17 18:26, Dario Faggioli wrote:
> In fact, relying on the mask of what pCPUs belong to
> which Credit2 runqueue is not enough. If we only do that,
> when Credit2 is the boot scheduler, we may ASSERT() or
> panic when moving a pCPU from Pool-0 to another cpupool.
>
> This is because pCPUs
>>> On 18.01.17 at 18:26, wrote:
> Reviewed-by: Andrew Cooper
Thanks. What are your thoughts about this remark
>> This would effectively allow us to revert 0e47f92b07 ("x86: force
>> EFLAGS.IF on when exiting to PV guests").
then?
Jan
flight 104271 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104271/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 103983
>>> On 19.01.17 at 03:55, wrote:
> If you tell me what info you need and how to get it, I'll do my best to
> provide it. (but I really don't want to put the vga card back in as it very
> much seemed to prevent booting the whole system)
Well, in that case - is there an
flight 104260 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104260/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 3 host-install(3)broken REGR. vs.
>>> On 18.01.17 at 20:51, wrote:
> On 18/01/17 14:17, Doug Goldstein wrote:
>> +.Lefi_multiboot2_proto:
>> +/* Zero EFI SystemTable and EFI ImageHandle addresses. */
>> +xor %esi,%esi
>> +xor %edi,%edi
>> +
>> +/* Skip Multiboot2
On Sun, Jan 15, 2017 at 01:12:12PM -0800, Luis R. Rodriguez wrote:
> This adds __used, to be used later in the userspace linker-tables
> sandbox. If any userspace applicaiton wants to override they can
> add their own definition and then use include_next.
I think you need a spell checker :(
On Sun, Jan 15, 2017 at 01:12:13PM -0800, Luis R. Rodriguez wrote:
> This will be used later by the linker-table userspace sandbox.
That does not explan what this is, why it is needed, or anything at all
:(
___
Xen-devel mailing list
On Sun, Jan 15, 2017 at 01:10:47PM -0800, Luis R. Rodriguez wrote:
> A linker table is a data structure that is stitched together from items
> in multiple object files. Linux has historically implicitly used linker
> tables for ages, however they were all built in an adhoc manner which
> requires
On Thu, Jan 19, 2017 at 01:07:52AM -0700, Jan Beulich wrote:
> >>> On 18.01.17 at 22:47, wrote:
> > The use of test_bit() can also return EPERM, so the
> > return value from test_bit() must be checked to
> > ensure that kexec_status() always returns 0, 1 or
> > -1, per
On Thu, Jan 19, 2017 at 02:09:37AM -0700, Jan Beulich wrote:
> >>> On 18.01.17 at 20:51, wrote:
> > On 18/01/17 14:17, Doug Goldstein wrote:
> >> +.Lefi_multiboot2_proto:
> >> +/* Zero EFI SystemTable and EFI ImageHandle addresses. */
> >> +xor
On (01/19/17 11:31), Paul Durrant wrote:
> Sowmini,
>
> Yeah, it would be useful to verify any change fixes the particular
> issue you're seeing so please share the program. For the non-empty
> non-linear case I'd hope that catching this and doing a pull of some
> sensible amount of header (which
On Thu, Jan 19, 2017 at 08:18:53AM +0100, Juergen Gross wrote:
> Add tools/tests/xenstore for a framework to do tests of xenstore.
> The aim is to test for correctness and performance.
>
> Add a test program containing some tests meant to be run against any
> xenstore implementation (xenstored,
On Sun, Jan 15, 2017 at 01:10:46PM -0800, Luis R. Rodriguez wrote:
> Section ranges are on one of the types of custom sections
> types used in Linux.
Argh, come on, proof-read your changelog text please!
> This provides a series of helpers for
> defining them and using them. Most importantly
On (01/19/17 09:36), Paul Durrant wrote:
>
> Hi Sowmini,
>
> Sounds like a straightforward bug to me... netfront should be able
> to handle an empty skb and clearly, if it's relying on skb_headlen()
> being non-zero, that's not the case.
>
> Paul
I see. Seems like there are 2 things broken
>>> On 19.01.17 at 06:24, wrote:
> @@ -39,7 +39,7 @@ extern u64 size_or_mask, size_and_mask;
> extern const struct mtrr_ops *mtrr_if;
>
> #define is_cpu(vnd) (mtrr_if && mtrr_if->vendor == X86_VENDOR_##vnd)
> -#define use_intel() (mtrr_if && mtrr_if->use_intel_if == 1)
>
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
---
xen/include/public/io/kbdif.h | 248 +-
1 file changed, 221 insertions(+), 27 deletions(-)
diff --git
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
---
xen/include/public/io/kbdif.h | 216 ++
1 file changed, 216 insertions(+)
diff --git
Eric Blake writes:
> Quite a few users of qdict_put() were manually wrapping a
> non-QObject. We can make such call-sites shorter, by providing
> common macros to do the tedious work. Also shorten nearby
> qdict_put_obj(,,QOBJECT()) sequences.
>
> Signed-off-by: Eric Blake
From: Oleksandr Andrushchenko
Hi, all!
This series updates existing kbdif protocol documentation
and adds multi-touch support
Thank you,
Oleksandr Andrushchenko
Oleksandr Andrushchenko (2):
xen/kbdif: update protocol documentation
xen/kbdif: add
On Sun, Jan 15, 2017 at 01:12:13PM -0800, Luis R. Rodriguez wrote:
> This will be used later by the linker-table userspace sandbox.
>
> Signed-off-by: Luis R. Rodriguez
> ---
> tools/include/linux/export.h | 22 ++
> 1 file changed, 22 insertions(+)
>
>
On Sun, Jan 15, 2017 at 01:12:14PM -0800, Luis R. Rodriguez wrote:
> This will be used later by the userspace linker table.
same comment as the last time you used this sentence as a changelog
text...
thanks,
greg k-h
___
Xen-devel mailing list
On Sun, Jan 15, 2017 at 01:10:52PM -0800, Luis R. Rodriguez wrote:
> Move the __jump_table from the a custom section solution
> to a generic solution, this avoiding extra vmlinux.lds.h
> customizations.
>
> This also demos the use of the .data linker table and of
> the shared asm call
On Sun, Jan 15, 2017 at 01:12:11PM -0800, Luis R. Rodriguez wrote:
> Start off with just __ref -- we enalbe you to override, if you do
> that then you can define your own.
I have no idea what this means, do you?
> The way you'd use this, if you
> do override, is define your own __ref and then
On Wed, Jan 18, 2017 at 07:15:44PM +0100, Juergen Gross wrote:
[...]
> diff --git a/xen/include/public/io/xs_wire.h b/xen/include/public/io/xs_wire.h
> index 54c1d71..751bd17 100644
> --- a/xen/include/public/io/xs_wire.h
> +++ b/xen/include/public/io/xs_wire.h
> @@ -48,7 +48,7 @@ enum
On Sun, Jan 15, 2017 at 01:12:10PM -0800, Luis R. Rodriguez wrote:
> This will be used later by the userspace linker-tables sandbox.
What is that?
> As a convenience, include bug.h on kernel.h -- this is not done
> on upstream kernel.h, however most header files do include bug.h
> eventually, if
On Wed, Jan 18, 2017 at 07:40:58PM +, Andrew Cooper wrote:
> With accurate vendor information available, the shared bits can be sorted out
> during recalculation, rather than at query time in the legacy cpuid path.
>
> This means that:
> * Duplication can be dropped from the automatically
On Sun, Jan 15, 2017 at 01:10:44PM -0800, Luis R. Rodriguez wrote:
> Linux makes extensive use of custom ELF header sections,
> documentation for these are well scattered. Unify this
> documentation in a central place and provide helpers to
> build custom Linux sections.
>
> This also generalizes
On Sun, Jan 15, 2017 at 01:12:15PM -0800, Luis R. Rodriguez wrote:
> Add a userspace sandbox to allow easy experimentation and
> test extensions with linker tables, section ranges and the
> new section core definitions.
>
> The userspace sandbox tries to mimic the Linux kernel development
> flow
> -Original Message-
> From: Sowmini Varadhan [mailto:sowmini.varad...@oracle.com]
> Sent: 19 January 2017 11:14
> To: Paul Durrant
> Cc: Konrad Rzeszutek Wilk ; Wei Liu
> ; net...@vger.kernel.org; xen-
>
Boris Ostrovsky writes ("Re: [Xen-devel] Xen 4.8 + Linux 4.9 + Credit2 = can't
bootup"):
> Hopefully I should be able to filter on "X-Osstest-Failures includes
> "linux-linus:".
The first report from the restarted tests is below:
osstest service owner writes ("[linux-linus test] 104237:
> -Original Message-
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> Sent: 18 January 2017 19:25
> To: Sowmini Varadhan ; Wei Liu
> ; Paul Durrant
> Cc: net...@vger.kernel.org;
This run is configured for baseline tests only.
flight 68393 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68393/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-armhf-xsm 3 host-install(3)
On Sun, Jan 15, 2017 at 01:10:49PM -0800, Luis R. Rodriguez wrote:
> If you modify the target asm we currently do not force the
> recompilation of the firmware files. The target asm is in
> the firmware/Makefile, peg this file as a dependency to
> require re-compilation of firmware targets when
On Sun, Jan 15, 2017 at 01:10:48PM -0800, Luis R. Rodriguez wrote:
> Linux provides a rich array of features, enabling each feature
> however increases the size of the kernel and there are many
> features which users often want disabled. The traditional
> solution to this problem is for each
On Thu, Jan 19, 2017 at 08:58:12AM +, Paul Durrant wrote:
> > -Original Message-
> [snip]
> > > > For safety I guess I could explore the possibility of having libxl not
> > > > create a PV backend for this vdev type.
> > >
> > > ... this is the best option for now.
> > >
> >
> > And I
On Sun, Jan 15, 2017 at 01:10:51PM -0800, Luis R. Rodriguez wrote:
> The ending header guard is misplaced. This has no
> functional change, this is just an eye-sore.
>
> Signed-off-by: Luis R. Rodriguez
> ---
> include/linux/jump_label.h | 4 ++--
> 1 file changed, 2
flight 104267 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104267/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-xsm 6 xen-boot fail in 104247 pass in 104267
On Wed, Jan 18, 2017 at 10:40:07PM -0500, Doug Goldstein wrote:
> On 1/18/17 4:25 PM, Daniel Kiper wrote:
> > On Wed, Jan 18, 2017 at 07:52:44AM -0700, Jan Beulich wrote:
> >> ... the comment style here fixed (which could be done upon commit
> >> or when Daniel merges this back into his series).
>
On Wed, Jan 18, 2017 at 02:56:39PM -0500, Ronald Rojas wrote:
> diff --git a/tools/golang/xenlight/Makefile b/tools/golang/xenlight/Makefile
> new file mode 100644
> index 000..a45336b
> --- /dev/null
> +++ b/tools/golang/xenlight/Makefile
> @@ -0,0 +1,29 @@
> +XEN_ROOT=$(CURDIR)/../../..
>
>>> On 19.01.17 at 12:37, wrote:
> On Thu, Jan 19, 2017 at 02:09:37AM -0700, Jan Beulich wrote:
>> >>> On 18.01.17 at 20:51, wrote:
>> > Are we strictly guaranteed to have the entire image, including multiboot
>> > tags, loaded below 4GB
On 17/01/17 17:26, Dario Faggioli wrote:
> In fact, there is one scratch mask per each CPU. When
> you use the one of a CPU, it must be true that:
> - the CPU belongs to your cpupool and scheduler,
> - you own the runqueue lock (the one you take via
>{v,p}cpu_schedule_lock()) for that CPU.
>
Hi Andre,
I see following issues when running on ThunderX platform with your patches.
I have debugged and patched/workaround few issues. For issue (5) I
need your inputs.
1) Your code base fails to boot xen. Fails at dom0 memory allocation.
To overcome this I have rebased your patches on
Hi Stefano,
On 16/01/2017 19:10, Stefano Stabellini wrote:
On Mon, 16 Jan 2017, Julien Grall wrote:
Hi Stefano,
On 03/01/17 22:51, Stefano Stabellini wrote:
On Wed, 28 Dec 2016, Julien Grall wrote:
Hi Stefano,
On 22/12/16 02:15, Stefano Stabellini wrote:
gic_update_one_lr is called with
On 19/01/17 12:51, Wei Liu wrote:
> On Wed, Jan 18, 2017 at 07:25:57PM +0100, Juergen Gross wrote:
>> xl mem-max is setting the hypervisor memory limit of a domain, but not
>> the memory/static-max value in Xenstore. This prohibits setting the
>> memory size above the old maximum size.
>>
>> Set
flight 104272 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104272/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qcow216 guest-localmigrate/x10 fail REGR. vs. 103995
On 10/11/16 23:45, Paul Lai wrote:
> The was requested in:
> https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04323.html
> Renamed p2m_init_altp2m_helper() to p2m_init_altp2m_ept().
>
> Signed-off-by: Paul Lai
> Reviewed-by: Konrad Rzeszutek Wilk
On Wed, Jan 18, 2017 at 07:25:57PM +0100, Juergen Gross wrote:
> xl mem-max is setting the hypervisor memory limit of a domain, but not
> the memory/static-max value in Xenstore. This prohibits setting the
> memory size above the old maximum size.
>
> Set the new maximum value in Xenstore.
>
>
On 10/11/16 23:45, Paul Lai wrote:
> Moving altp2m domain startup and teardown into altp2m_domain_init()
> and altp2m_domain_teardown() respectively.
You're not "moving" the startup into a function unless the new function
appears *and* the old code disappears.
I think it would be better to have
Hi Edgar,
On 10/01/2017 11:37, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
Relax the hardware domains mapping attributes to p2m_mmio_direct_c.
This will allow the hardware domain to fully control the
attribtues via its S1 mappings.
s/attribtues/attributes/
flight 104293 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104293/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl
Hi Vijay,
On 19/01/17 12:26, Vijay Kilari wrote:
> Hi Andre,
>
>I see following issues when running on ThunderX platform with your patches.
> I have debugged and patched/workaround few issues. For issue (5) I
> need your inputs.
thanks for the testing and the input. It seems that my
On Thu, Jan 19, 2017 at 01:56:34PM +, Andrew Cooper wrote:
> On 19/01/17 11:01, Wei Liu wrote:
> > On Wed, Jan 18, 2017 at 07:15:44PM +0100, Juergen Gross wrote:
> > [...]
> >> diff --git a/xen/include/public/io/xs_wire.h
> >> b/xen/include/public/io/xs_wire.h
> >> index 54c1d71..751bd17
flight 104275 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104275/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-qemuu-nested-amd 13 xen-boot/l1 fail in 104250 pass in 104275
On 1/19/17 6:56 AM, Daniel Kiper wrote:
>> Can you tell me what were the fixes to the relocation code?
>
> Unfortunately I have not received any details from you. Just vague
> statements that it does not work. So, I am not able to say anything
> about that. If you provide more details I am happy
On 1/19/17 3:31 AM, Jan Beulich wrote:
On 18.01.17 at 18:38, wrote:
>>
>> What's controversial about it?
>
> The not insignificant amount of assembly code it adds, when our
> overall goal is to reduce the amount of assembly code. But
> Andrew has meanwhile
On Wed, Jan 18, 2017 at 12:34 AM, Jan Beulich wrote:
> >>> On 17.01.17 at 16:08, wrote:
> > I was lucky to capture the full log before it fills up my 100MB ring
> buffer
> > (in less than 2 seconds).
> > Please find the log in the attachment.
This run is configured for baseline tests only.
flight 68394 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68394/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf
On 19/01/17 11:01, Wei Liu wrote:
> On Wed, Jan 18, 2017 at 07:15:44PM +0100, Juergen Gross wrote:
> [...]
>> diff --git a/xen/include/public/io/xs_wire.h
>> b/xen/include/public/io/xs_wire.h
>> index 54c1d71..751bd17 100644
>> --- a/xen/include/public/io/xs_wire.h
>> +++
On 19/01/17 03:56, Doug Goldstein wrote:
> On 1/18/17 2:40 PM, Andrew Cooper wrote:
>> The VT-x/SVM features are hidden from PV dom0 by the pv_featureset[] upper
>> mask, but nothing thusfar has prevented the features being visible in
> thus far? Could be the difference between British English and
Hi Andre,
On 19/01/2017 13:50, Andre Przywara wrote:
On 19/01/17 12:26, Vijay Kilari wrote:
I see following issues when running on ThunderX platform with your patches.
I have debugged and patched/workaround few issues. For issue (5) I
need your inputs.
thanks for the testing and the
On 01/19/2017 03:25 AM, Markus Armbruster wrote:
> Eric Blake writes:
>
>> Quite a few users of qdict_put() were manually wrapping a
>> non-QObject. We can make such call-sites shorter, by providing
>> common macros to do the tedious work. Also shorten nearby
>>
Hi Stefano,
On 01/13/2017 07:39 PM, Stefano Stabellini wrote:
> On Fri, 13 Jan 2017, Pooya.Keshavarzi wrote:
>> On 01/12/2017 07:50 PM, Stefano Stabellini wrote:
>>> On Thu, 12 Jan 2017, Pooya.Keshavarzi wrote:
Firstly sorry for the late reply on this.
Regarding the problem
Hi,
On 19/01/17 14:32, Julien Grall wrote:
> Hi Andre,
>
> On 19/01/2017 13:50, Andre Przywara wrote:
>> On 19/01/17 12:26, Vijay Kilari wrote:
>>>I see following issues when running on ThunderX platform with your
>>> patches.
>>> I have debugged and patched/workaround few issues. For issue
On Wed, Jan 18, 2017 at 11:16:31PM +0100, Dario Faggioli wrote:
> On Wed, 2017-01-18 at 14:56 -0500, Ronald Rojas wrote:
> > Create error type Errorxl for throwing proper xenlight
> > errors.
> >
> > Update Ctx functions to throw Errorxl errors.
> >
> > Signed-off-by: Ronald Rojas
On Thu, Jan 19, 2017 at 12:03:22PM +, Wei Liu wrote:
> On Wed, Jan 18, 2017 at 02:56:39PM -0500, Ronald Rojas wrote:
>
> > diff --git a/tools/golang/xenlight/Makefile b/tools/golang/xenlight/Makefile
> > new file mode 100644
> > index 000..a45336b
> > --- /dev/null
> > +++
On 19/01/17 13:51, Juergen Gross wrote:
> On 19/01/17 12:51, Wei Liu wrote:
>> On Wed, Jan 18, 2017 at 07:25:57PM +0100, Juergen Gross wrote:
>>> xl mem-max is setting the hypervisor memory limit of a domain, but not
>>> the memory/static-max value in Xenstore. This prohibits setting the
>>>
flight 104279 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104279/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5ab0ffc9f64f5a539a9bdb50446b7fbf92b845d6
baseline version:
ovmf
flight 104283 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104283/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 104238
test-armhf-armhf-libvirt-qcow2
On 18/01/17 19:56, Ronald Rojas wrote:
> Create a basic Makefile to build and install libxenlight Golang
> bindings. Also add a stub package which only opens libxl context.
>
> Include a global xenlight.Ctx variable which can be used as the
> default context by the entire program if desired.
>
>
Craft the Dom0 e820 memory map and populate it. Introduce a helper to remove
memory pages that are shared between Xen and a domain, and use it in order to
remove low 1MB RAM regions from dom_io in order to assign them to a PVHv2 Dom0.
Signed-off-by: Roger Pau Monné
---
Cc:
Hello,
This is the first batch of the PVHv2 Dom0 support series, that includes
everything up to the point where ACPI tables for Dom0 are crafted. I've
decided to left the last part of the series (the one that contains the PCI
config space handlers, and other emulation/trapping related code)
Current __hvm_copy assumes that the destination memory belongs to the current
vcpu, but this is not always the case since for PVHv2 Dom0 build hvm copy
functions are used with current being the idle vcpu. Add a new vcpu parameter
to hvm copy in order to solve that. Note that only
On Thu, 19 Jan 2017, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Signed-off-by: Oleksandr Andrushchenko
> ---
> xen/include/public/io/kbdif.h | 216
> ++
> 1 file
On Wed, 11 Jan 2017, Oleksandr Andrushchenko wrote:
> On 01/11/2017 02:29 AM, Stefano Stabellini wrote:
> > On Tue, 10 Jan 2017, Oleksandr Andrushchenko wrote:
> > > On 01/07/2017 12:37 AM, Stefano Stabellini wrote:
> > > > On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote:
> > > > > From:
On (01/19/17 13:47), Sowmini Varadhan wrote:
> > Specifically I'm talking about the dev_validate_header() check.
> > That is supposed to protect us from these kinds of situations.
>
> ah, but I run my pf_packet application as root, so I have
> capable(CAP_SYS_RAWIO), so I slip through the
Hello,
On 19/01/2017 19:22, Stefano Stabellini wrote:
On Thu, 19 Jan 2017, Roger Pau Monné wrote:
On Wed, Jan 18, 2017 at 07:13:23PM +, Julien Grall wrote:
Hi,
On 18/01/17 19:05, Stefano Stabellini wrote:
On Wed, 18 Jan 2017, Roger Pau Monné wrote:
On Tue, Jan 17, 2017 at 02:20:54PM
flight 68397 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68397/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 3 host-install(3) broken
Hi,
On 19/01/2017 20:15, Boris Ostrovsky wrote:
So this appears to be a pretty slow, 2-core box:
[ 0.049778] SMP: Total of 2 processors activated (96.00 BogoMIPS).
For comparison, my (old-ish) phone is 4 x 26 BogoMIPS. So it's
theoretically faster than this server.
The ARM32 platforms we
>
> So I can see 2 solutions:
> 1) Increase the timeout
> 2) Only build the kernel on the Arndales. Though they are known to
> be unreliable in the colo :/
>
> Any opinions?
I'd vote for (1). Alternatively we could cross-compile on an x86 box.
-boris
flight 104282 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104282/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 59254
On 01/19/2017 01:07 PM, Ian Jackson wrote:
> Boris Ostrovsky writes ("Re: [Xen-devel] [linux-linus test] 104237:
> regressions - FAIL"):
>> On 01/18/2017 10:05 AM, osstest service owner wrote:
>>> build-armhf-pvops 5 kernel-build fail REGR. vs.
>>> 59254
>> ARM build
In xen_swiotlb_map_page and xen_swiotlb_map_sg_attrs, if the original
page is not suitable, we swap it for another page from the swiotlb
pool.
In these cases, we don't update the previously calculated dma address
for the page before calling xen_dma_map_page. Thus, we end up calling
On (01/19/17 11:37), David Miller wrote:
>
> I thought we had code which made sure that at least a minimal
> link layer header was present in the SKB?
>
> Specifically I'm talking about the dev_validate_header() check.
> That is supposed to protect us from these kinds of situations.
ah, but I
On Thu, 19 Jan 2017, Roger Pau Monné wrote:
> On Wed, Jan 18, 2017 at 07:13:23PM +, Julien Grall wrote:
> > Hi,
> >
> > On 18/01/17 19:05, Stefano Stabellini wrote:
> > > On Wed, 18 Jan 2017, Roger Pau Monné wrote:
> > > > On Tue, Jan 17, 2017 at 02:20:54PM -0800, Stefano Stabellini wrote:
>
On Thu, 19 Jan 2017, Pooya Keshavarzi wrote:
> Hi Stefano,
>
> On 01/13/2017 07:39 PM, Stefano Stabellini wrote:
> > On Fri, 13 Jan 2017, Pooya.Keshavarzi wrote:
> >> On 01/12/2017 07:50 PM, Stefano Stabellini wrote:
> >>> On Thu, 12 Jan 2017, Pooya.Keshavarzi wrote:
>
> Firstly sorry
On Thu, 19 Jan 2017, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Signed-off-by: Oleksandr Andrushchenko
> ---
> xen/include/public/io/kbdif.h | 248
> +-
> 1 file
> So this appears to be a pretty slow, 2-core box:
>
> [ 0.049778] SMP: Total of 2 processors activated (96.00 BogoMIPS).
For comparison, my (old-ish) phone is 4 x 26 BogoMIPS. So it's
theoretically faster than this server.
-boris
>
> Julien --- how does 2.5 hours for kernel build sound to
On 01/19/2017 01:39 PM, Stefano Stabellini wrote:
> In xen_swiotlb_map_page and xen_swiotlb_map_sg_attrs, if the original
> page is not suitable, we swap it for another page from the swiotlb
> pool.
>
> In these cases, we don't update the previously calculated dma address
> for the page before
On Thu, Jan 19, 2017 at 06:58:46PM -0500, Boris Ostrovsky wrote:
> On 01/19/2017 01:39 PM, Stefano Stabellini wrote:
> > In xen_swiotlb_map_page and xen_swiotlb_map_sg_attrs, if the original
> > page is not suitable, we swap it for another page from the swiotlb
> > pool.
> >
> > In these cases,
Subsequent patches introducing relocatable early boot code play with
page tables using 2 MiB huge pages. If load address is not aligned at
2 MiB then code touching such page tables must have special cases for
start and end of Xen image memory region. So, let's make life easier
and move default
This way Xen can be loaded on EFI platforms using GRUB2 and
other boot loaders which support multiboot2 protocol.
Signed-off-by: Daniel Kiper
---
v12 - suggestions/fixes:
- rename __efi64_start to __efi64_mb2_start
(suggested by Andrew Cooper),
- use
..calculating its value during runtime.
Signed-off-by: Daniel Kiper
Acked-by: Jan Beulich
Reviewed-by: Doug Goldstein
---
xen/arch/x86/setup.c |4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git
Build xen.gz with EFI code. We need this to support multiboot2
protocol on EFI platforms.
If we wish to load non-ELF file using multiboot (v1) or multiboot2 then
it must contain "linear" (or "flat") representation of code and data.
This is requirement of both boot protocols. Currently, PE file
1 - 100 of 160 matches
Mail list logo