Hi,
does xen support per-core power-gating (pcpg) ?
--
Best Regards
Hamed Rostamzadeh,
MSc Student,
Distributed Systems Lab,
School of Computer Engineering,
Iran University of Science and Technology,
Tehran, Iran.
https://sites.google.com/site/hamedrostamzade/
___
Hi, Thanks for your reply:-)
Now, I know that the windows VM is crashed due to a not fully booted stub
domain. But why did the stub domain crash?
Thanks:-)
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi, everyone.
I'm trying to run a Windows HVM vm with stub domain in xenserver-6.5, whose
internal xen version is xen-4.4-xs88306. After I started the vm, both the
vm and its corresponding stub domain crashed. Here is the related content
in hypervisor.log. The domain ID of the windows vm is 1, and
flight 60672 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60672/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 18 guest-start.2 fail REGR. vs. 60638
test-amd64-i386-x
On 2015/8/13 18:29, Christoffer Dall wrote:
> On Thu, Aug 13, 2015 at 11:22:19AM +0100, Ian Campbell wrote:
>> > On Thu, 2015-08-13 at 11:13 +0100, Stefano Stabellini wrote:
>>> > >
> > > > > For example it is only natural for the kernel to try to use the
> > > > > GIC
> > > > > hy
Hi all,
Today's linux-next merge of the xen-tip tree got a conflict in:
arch/x86/xen/Makefile
between commit:
fc5fee86bdd3 ("x86/xen: build "Xen PV" APIC driver for domU as well")
from Linus' tree and commit:
6e3012fba294 ("xen/PMU: Initialization code for Xen PMU")
from the xen-tip tr
Hi,
lvextend will report error if doing with "-l 0".
So I propose to add an judgment regarding $vg_more_free_pe.
diff --git a/ts-xen-build-prep b/ts-xen-build-prep
index 9a3b523..f1d1255 100755
--- a/ts-xen-build-prep
+++ b/ts-xen-build-prep
@@ -155,7 +155,8 @@ sub lvextend1 ($$$) {
logm
From: Tomasz Nowicki
Ported from Linux commit 4ceacd02f5a1795c5c697e0345ee10beef675290.
acpi_parse_entries() allows to traverse all available table entries (aka
subtables) by passing max_entries parameter equal to 0, but since its count
variable is only incremented if max_entries is not 0, the f
From: Len Brown
Ported from Linux commit 9e3a9d1ed8cc8db93e5c53e9a5b09065bd95de8b.
When ACPI is disabled in the BIOS of this VIA C3 box,
it invalidates the RSDP, which Linux notices:
ACPI Error (tbxfroot-0218): A valid RSDP was not found [20080926]
Bug Linux neglected to disable ACPI at that s
From: Shannon Zhao
Len Brown (1):
ACPI: disable ACPI cleanly when bad RSDP found
Tomasz Nowicki (1):
ACPI/table: Always count matched and successfully parsed entries
xen/drivers/acpi/tables.c | 12 ++--
1 file changed, 10 insertions(+), 2 deletions(-)
--
2.0.4
Sorry for replying so late. Libvmi is used to substract information of
guest, such as system calls. But I don't think it can be used to intercept
hypercalls as hypercall is a behavior between guest and hypervisor while
syscall is a behavior between guest applications and guest kernel. Anyway,
tryin
> -Original Message-
> From: Hu, Robert
> Sent: Thursday, August 13, 2015 11:46 AM
> To: Ian Jackson
> Cc: Ian Campbell; wei.l...@citrix.com; xen-devel@lists.xen.org
> Subject: RE: OSSTEST -- nested test case development, RFC: ts-guest-destroy
> doesn't call guest_await_dhcp_tcp() if guest
On Thu, Aug 13, 2015 at 06:38:46PM -0700, Andy Lutomirski wrote:
> On Thu, Aug 13, 2015 at 5:44 PM, wrote:
> >
> > This is a note to let you know that I've just added the patch titled
> >
> > x86/ldt: Make modify_ldt synchronous
>
> This needs:
>
> https://git.kernel.org/cgit/linux/kernel/g
>>> On 8/13/2015 at 05:09 PM, in message
<20150813090938.gi7...@zion.uk.xensource.com>, Wei Liu
wrote:
> On Tue, Aug 11, 2015 at 08:24:01PM -0600, Chun Yan Liu wrote:
> >
> >
> > >>> On 8/11/2015 at 07:27 PM, in message
> > <2015082702.gf7...@zion.uk.xensource.com>, Wei Liu
> >
> >
On Thu, Aug 13, 2015 at 5:44 PM, wrote:
>
> This is a note to let you know that I've just added the patch titled
>
> x86/ldt: Make modify_ldt synchronous
This needs:
https://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?h=x86/urgent&id=4809146b86c3d41ce588fdb767d021e2a80600dd
an
This is a note to let you know that I've just added the patch titled
x86/ldt: Make modify_ldt synchronous
to the 4.1-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the patch is:
x86-ldt-make-modify
This is a note to let you know that I've just added the patch titled
x86/xen: Probe target addresses in set_aliased_prot() before the hypercall
to the 4.1-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of
On Fri, Aug 14, 2015 at 01:25:45AM +0200, Dario Faggioli wrote:
> On Thu, 2015-08-13 at 16:41 +0100, Wei Liu wrote:
> > ... but allow user to override that check by specifying maxvcpus= in xl
> > configuration file.
> >
> Ok, from the discussion on v1, and from the subject of this new
> submission
This is a note to let you know that I've just added the patch titled
x86/xen: Probe target addresses in set_aliased_prot() before the hypercall
to the 3.14-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of
This is a note to let you know that I've just added the patch titled
x86/xen: Probe target addresses in set_aliased_prot() before the hypercall
to the 3.10-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of
On Thu, 2015-08-13 at 16:41 +0100, Wei Liu wrote:
> ... but allow user to override that check by specifying maxvcpus= in xl
> configuration file.
>
Ok, from the discussion on v1, and from the subject of this new
submission, I now see that what you're after the "more vcpus (in a
single guest) than
On 8/12/2015 4:38 AM, Jan Beulich wrote:
On 11.08.15 at 21:11, wrote:
Some of older[Fam10h] systems require that certain number of
applied microcode patch levels should not be overwritten by
the microcode loader. Otherwise, system hangs are known to occur.
The 'final_levels' of patch ids have
With the addition of FMODE_ATOMIC_POS in the Linux 3.14 kernel,
concurrent blocking file accesses to a single open file descriptor can
cause a deadlock trying to grab the file position lock. If a watch has
been set up, causing a read_thread to blocking read on the file
descriptor, then future write
On 07/27/2015 10:29 PM, Andy Lutomirski wrote:
> modify_ldt has questionable locking and does not synchronize
> threads. Improve it: redesign the locking and synchronize all
> threads' LDTs using an IPI on all modifications.
>
> This will dramatically slow down modify_ldt in multithreaded
> progr
On Thu, 13 Aug 2015 11:21:43 +0100 David Vrabel wrote:
> On 30/07/15 18:03, David Vrabel wrote:
> > Add add_memory_resource() to add memory using an existing "System RAM"
> > resource. This is useful if the memory region is being located by
> > finding a free resource slot with allocate_resource
On 08/12/2015 03:36 PM, Wei Liu wrote:
We should use new_memflags in xc_domain_populate_physmap. That variable
contains node information.
Reported-by: Boris Ostrovsky
Signed-off-by: Wei Liu
Tested-by: Boris Ostrovsky
---
tools/libxc/xc_hvm_build_x86.c | 6 --
1 file changed, 4 inse
flight 60668 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60668/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 host-build-prep fail REGR. vs. 60646
Regressions which are
On Mon, Aug 10, 2015 at 09:21:35PM +0300, M. Ivanov wrote:
> On Mon, 2015-08-10 at 10:47 -0400, Konrad Rzeszutek Wilk wrote:
> > On Mon, Aug 10, 2015 at 05:14:28PM +0300, M. Ivanov wrote:
> > > On Mon, 2015-08-10 at 09:58 -0400, Konrad Rzeszutek Wilk wrote:
> > > > On Mon, Aug 10, 2015 at 02:11:38A
On Mon, Aug 10, 2015 at 03:17:48PM -0400, Konrad Rzeszutek Wilk wrote:
> On Mon, Jul 20, 2015 at 04:29:03PM +0200, Daniel Kiper wrote:
> > Add multiboot2 protocol support. Alter min memory limit handling as we
> > now may not find it from either multiboot (v1) or multiboot2.
> >
> > This way we are
On Thu, Aug 13, 2015 at 02:33:03AM -0600, Jan Beulich wrote:
> >>> On 12.08.15 at 18:23, wrote:
> > On Wed, Aug 12, 2015 at 10:35:32AM +0800, Feng Wu wrote:
> >> +GET_IREMAP_ENTRY(ir_ctrl->iremap_maddr, remap_index, iremap_entries,
> >> p);
> >> +
> >> +old_ire = new_ire = *p;
> >> +
> >>
Add is_pvh_32bit_domain() macro and use it alongside is_pv_32bit_domain() where
necessary.
Since PVH guests cannot change execution mode, has_32bit_shinfo is a good
indicator of whether the guest is PVH and 32-bit.
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/domain.c| 6 +++---
xen/
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/hvm/hvm.c | 36 ++--
1 file changed, 30 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 2434564..96de1bf 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm
Signed-off-by: Boris Ostrovsky
Acked-by: Ian Campbell
---
tools/libxc/xc_dom_x86.c | 32 +++-
1 file changed, 15 insertions(+), 17 deletions(-)
diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
index 3d40fa4..05fb0ce 100644
--- a/tools/libxc/xc_dom_x86
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
xen/arch/x86/domain.c | 27 ---
xen/arch/x86/hvm/hvm.c| 24 +++-
xen/arch/x86/hvm/vmx/vmcs.c | 2 +-
xen/arch/x86/hvm/vmx/vmx.c| 19 +++
xen/include/asm-
Ian Campbell writes ("[PATCH OSSTEST v2 4/7] ts-debian-di-install: Use the
suite in the default hostname"):
> By appending ".$suite" if the suite is in the runvars.
>
> This is more useful in standalone mode than having everything be
> "debian".
Acked-by: Ian Jackson
> v2: Keep using gn but ap
Initial 32-bit PVH support, dom0 will need more work.
Changes in v4:
* Add xenpmu_op hypercall to pvh_hypercall32_table[] (patch 3)
* Adjust 'is_pvh_domain(currd)' test to match a similar test further in the
routine (patch 3)
Changes in v3:
* Swapped patches 1 and 2
* Added is_pvh_32bit_domain(
Ian Campbell writes ("[PATCH OSSTEST v3 2/2] cambridge: arrange to test each
new baseline"):
> Provide a new cr-daily-branch setting OSSTEST_BASELINES_ONLY which
> causes it to only attempt to test the current baseline (if it is
> untested) and never the tip version. Such tests will not result in
Ian Campbell writes ("Re: [PATCH OSSTEST 7/7] Debian: Create /boot/boot -> .
symlink on ARM when PvMenuLst enabled"):
> On Wed, 2015-08-12 at 16:41 +0100, Ian Jackson wrote:
> > Ian Campbell writes ("[PATCH OSSTEST 7/7] Debian: Create /boot/boot -> .
> > symlink on ARM when PvMenuLst enabled"):
>
Ian Campbell writes ("[PATCH OSSTEST v2] Disable proxy for all preseeded wget"):
> At least in some contexts scripts can be run with http_proxy pointing
> to the apt proxy (I noticed it in /usr/lib/base-installer.d/ hook used
> for ucode installation).
>
> Since all of these particular fetches are
Ian Campbell writes ("[PATCH OSSTEST v2 3/7] ts-debian-di-install: Install
pv-grub-menu in ARM guests, always."):
> Signed-off-by: Ian Campbell
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Ian Campbell writes ("[PATCH OSSTEST v2 5/7] Debian: ARM: only apply no
bootloader workaround if xopts{PvMenuLst}"):
> This workaround is only necessary because of how pv-menu-list works,
pv-grub-menu.
Ian.
_
We should parse the output from splitting function, not the original
string.
Signed-off-by: Wei Liu
Reviewed-by: Dario Faggioli
---
tools/libxl/xl_cmdimpl.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index 499a05c..078
On Thu, 2015-08-13 at 14:59 +0100, Ian Campbell wrote:
> Jim, do you have any idea what is going on or who/what is doing this
> translation?
I've had a bit of trouble finding the code, but I think what is happening
is that the moss-bug (the source) is doing a ssh to lace-bug (the
destination), whi
Any thoughts on v2 ?
Chris
> -Original Message-
> From: Chris (Christopher) Brand
> Sent: Friday, 07 August, 2015 1:41 PM
> To: 'Julien Grall'; xen-devel@lists.xen.org
> Cc: Stefano Stabellini; Ian Campbell (ian.campb...@citrix.com)
> Subject: [PATCH v2] xen: arm: Support <32MB frametable
We should use new_memflags in xc_domain_populate_physmap. That variable
contains node information.
Reported-by: Boris Ostrovsky
Signed-off-by: Wei Liu
Reviewed-by: Dario Faggioli
---
tools/libxc/xc_hvm_build_x86.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/tools/
On Wed, 2015-08-12 at 16:41 +0100, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH OSSTEST 7/7] Debian: Create /boot/boot -> .
> symlink on ARM when PvMenuLst enabled"):
> > Signed-off-by: Ian Campbell
>
> Can this please be conditional on the suite ?
It is, it is within the:
if ($xopts{P
Wei Liu (3):
xl: fix vNUMA vdistance parsing
xl: error out if vNUMA specifies more vcpus than pcpus
libxc: fix vNUMA memory allocation
tools/libxc/xc_hvm_build_x86.c | 6 --
tools/libxl/xl_cmdimpl.c | 26 +-
2 files changed, 25 insertions(+), 7 deletions(-
The armhf tests in distros-debian-* have always failed since they did not
shutdown at the end of installation. I've now investigated that and the fix
is patch #2 in this series.
The remainder of the series consists of various fixes, extensions to
existing quirks and workarounds, mainly to the use
This is under the same conditional as the nobootloader confirmation
one, since they effectively both stem from the lack of a boot loader
and the consequential use of the pv-grub-menu package.
Signed-off-by: Ian Campbell
---
v2: Add the second bit of the commit message.
---
Osstest/Debian.pm | 8
On Thu, 2015-08-13 at 09:29 -0600, Jan Beulich wrote:
A bunch of your questions seem to be about things which have been discussed
at length in previous postings, it's probably worth reviewing some of those
discussions.
> >
> > /* For 32bit BARs*/
> > #define GUEST_BAR_BASE_32 <<>>
> > #def
always_halt results in d-i calling "halt", which does not necessarily
poweroff the host (it seems to for x86/PV Xen guests, but does not for
ARM). Using exit/poweroff calls "poweroff" which is equivalent to
"halt -p", doing so results in ARM guests powering off as desired.
Signed-off-by: Ian Campb
Realistically this isn't going to change until we have either u-boot
or UEFI in an arm32 guest.
Signed-off-by: Ian Campbell
Acked-by: Ian Jackson
---
Osstest/Debian.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 1c07108..7fc39d
This workaround is only necessary because of how pv-menu-list works,
so we should only apply both or neither of them.
This results in a long line and I'm about to add a second workaround
to this block, so switch to a regular if block instead of postfixing
on the one command. Move the comment insid
By appending ".$suite" if the suite is in the runvars.
This is more useful in standalone mode than having everything be
"debian".
Signed-off-by: Ian Campbell
---
v2: Keep using gn but append the suite if given. Not sure what the
best syntax for that ($x ? ".$x " : "") is.
---
ts-debian-di-i
At least in some contexts scripts can be run with http_proxy pointing
to the apt proxy (I noticed it in /usr/lib/base-installer.d/ hook used
for ucode installation).
Since all of these particular fetches are from a known to be local
webserver just disable proxying altogether.
With busybox wget in
... but allow user to override that check by specifying maxvcpus= in xl
configuration file.
Signed-off-by: Wei Liu
---
tools/libxl/xl_cmdimpl.c | 24
1 file changed, 20 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
index
Signed-off-by: Ian Campbell
---
v2: s/pv-menu-lst/pv-grub-menu/
Add note that pvgrub == grub1
Ungarble a comment
---
ts-debian-di-install | 13 -
1 file changed, 12 insertions(+), 1 deletion(-)
diff --git a/ts-debian-di-install b/ts-debian-di-install
index 612e0fa..eef4681 10
This is the pygrub debug log.
Signed-off-by: Ian Campbell
Acked-by: Ian Jackson
---
ts-logs-capture | 1 +
1 file changed, 1 insertion(+)
diff --git a/ts-logs-capture b/ts-logs-capture
index 0081372..b99b1db 100755
--- a/ts-logs-capture
+++ b/ts-logs-capture
@@ -143,6 +143,7 @@ sub fetch_logs_
>>> On 13.08.15 at 11:42, wrote:
> 2.1pci_hostbridge and pci_hostbridge_ops
>
> -
> The init function in the PCI host driver calls to register hostbridge
> callbacks:
>
> int pci_hostbridge_r
Provide a new cr-daily-branch setting OSSTEST_BASELINES_ONLY which
causes it to only attempt to test the current baseline (if it is
untested) and never the tip version. Such tests will not result in any
push.
Each new baseline is tested exactly once (i.e. we aren't repeating
hoping for a pass), he
By converting the current boolean $force_baseline into a keyword
indicating the reason.
Signed-off-by: Ian Campbell
Acked-by: Ian Jackson
---
cr-daily-branch | 14 +-
1 file changed, 9 insertions(+), 5 deletions(-)
diff --git a/cr-daily-branch b/cr-daily-branch
index 1fcfd9d..06df5
On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote:
> With the current code in libxl__build_hvm it is possible for the function to
> fail and still return 0.
>
> Signed-off-by: Roger Pau Monné
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
This wasn'
Yuriy Kohut writes ("Re: Xen Security Advisory 140 - QEMU leak of uninitialized
heap memory in rtl8139 device model"):
> Please find attached patches for the 'Qemu-dm 3.4 stable branch’
> (git://xenbits.xen.org/qemu-xen-3.4-testing.git):
>
> # sha256sum xsa140-qemut-3.4-?.patch
> a6f614aea18f5eb
On Thu, 2015-08-13 at 13:08 +0100, Julien Grall wrote:
>
> The MADT has to be modified in order to let DOM0 knows about his CPU
> topology. If ever need the original MADT for power management, then we
> should find a Xen specific way to do it (even if it's passing the
> orginal MADT as a backup).
Roger Pau Monne writes ("[PATCH v4 01/31] libxl: fix libxl__build_hvm error
handling"):
> With the current code in libxl__build_hvm it is possible for the function to
> fail and still return 0.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-deve
Wei Liu writes ("Re: [PATCH for-4.6 v3] libxl: fix libxl__build_hvm error code
return path"):
> Maybe we should just take that patch, that would save me from doing
> another round.
I agree.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http:
On Thu, 2015-08-13 at 11:46 +0100, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH OSSTEST] ts-xen-install: Install netcat
> -openbsd"):
> > This is required by libvirt for live migration (netcat-traditional
> > doesn't cut it).
> >
> > netcat-openbsd has higher update-alternatives priority, so
On Thu, 2015-08-13 at 14:59 +0100, Ian Campbell wrote:
> On Thu, 2015-08-13 at 11:38 +0100, Ian Campbell wrote:
> > Lets see if "virsh --debug 0" tells me anything
>
> http://xenbits.xen.org/people/ianc/tmp/37833/
>
> 2015-08-13 13:02:39 Z executing ssh ... root@10.80.229.144 virsh --debug
> 0 m
On Thu, 2015-08-13 at 11:38 +0100, Ian Campbell wrote:
> Lets see if "virsh --debug 0" tells me anything
http://xenbits.xen.org/people/ianc/tmp/37833/
2015-08-13 13:02:39 Z executing ssh ... root@10.80.229.144 virsh --debug 0
migrate --live debian.guest.osstest xen+ssh://10.80.228.77
migrate: li
Konrad Rzeszutek Wilk writes:
> On August 13, 2015 4:20:11 AM EDT, Vitaly Kuznetsov
> wrote:
>>"Hao, Xudong" writes:
>>
-Original Message-
From: Vitaly Kuznetsov [mailto:vkuzn...@redhat.com]
Sent: Wednesday, August 12, 2015 5:40 PM
To: Hao, Xudong
Cc: xen-devel
>>> On 13.08.15 at 13:21, wrote:
> --- a/xen/common/Makefile
> +++ b/xen/common/Makefile
> @@ -55,6 +55,7 @@ obj-y += vmap.o
> obj-y += vsprintf.o
> obj-y += wait.o
> obj-y += xmalloc_tlsf.o
> +obj-y += gunzip.o
>
> obj-bin-$(CONFIG_X86) += $(foreach n,decompress bunzip2 unxz unlzma unlzo
>
On 08/13/2015 01:29 PM, Ian Campbell wrote:
On Thu, 2015-08-13 at 13:13 +0200, Benjamin Beier wrote:
Program received signal SIGSEGV, Segmentation fault.
0x00418db5 in main_cpupoolcreate (argc=,
argv=0x7fffda50) at xl_cmdimpl.c:7102
7102xl_cmdimpl.c: No such file or directory.
(
On 13/08/15 12:55, Jan Beulich wrote:
On 13.08.15 at 13:00, wrote:
>> On 13/08/15 11:54, Jan Beulich wrote:
>> On 13.08.15 at 12:48, wrote:
On 2015/8/13 18:29, Christoffer Dall wrote:
> However, what about for other resources? Having code somewhere that
> says "hide this ra
>>> On 13.08.15 at 13:00, wrote:
> On 13/08/15 11:54, Jan Beulich wrote:
> On 13.08.15 at 12:48, wrote:
>>> On 2015/8/13 18:29, Christoffer Dall wrote:
However, what about for other resources? Having code somewhere that
says "hide this random piece of hardware if you're Xen dom0" s
On August 13, 2015 4:20:11 AM EDT, Vitaly Kuznetsov wrote:
>"Hao, Xudong" writes:
>
>>> -Original Message-
>>> From: Vitaly Kuznetsov [mailto:vkuzn...@redhat.com]
>>> Sent: Wednesday, August 12, 2015 5:40 PM
>>> To: Hao, Xudong
>>> Cc: xen-devel@lists.xen.org
>>> Subject: Re: [Xen-devel]
Hi Stefano,
On 13/08/15 12:21, Stefano Stabellini wrote:
> +static int kernel_decompress(struct kernel_info *info,
> + paddr_t *addr, paddr_t *size)
> +{
> +char *output, *input;
> +char magic[2];
> +int rc;
> +unsigned kernel_order_in;
> +unsigned k
On Thu, Aug 13, 2015 at 04:49:41AM -0600, Jan Beulich wrote:
> The function shouldn't return NULL after having obtained a reference,
> or else the caller won't know to drop it.
>
> Also its result shouldn't be ignored - if calling code is certain that
> a page already has a non-zero refcount, it b
> -Original Message-
> From: Yu, Zhang [mailto:yu.c.zh...@linux.intel.com]
> Sent: 13 August 2015 11:47
> To: Paul Durrant; xen-devel@lists.xen.org; Ian Jackson; Stefano Stabellini;
> Ian
> Campbell; Wei Liu; Keir (Xen.org); jbeul...@suse.com; Andrew Cooper
> Cc: Kevin Tian; zhiyuan...@int
On Thu, 2015-08-13 at 13:13 +0200, Benjamin Beier wrote:
>
> Program received signal SIGSEGV, Segmentation fault.
> 0x00418db5 in main_cpupoolcreate (argc=,
> argv=0x7fffda50) at xl_cmdimpl.c:7102
> 7102xl_cmdimpl.c: No such file or directory.
> (gdb) bt
> #0 0x00418db5 i
On Thu, Aug 13, 2015 at 04:58:45AM -0600, Jan Beulich wrote:
> From: Jean Delvare
>
> A 32-bit entry point to a DMI table says how many structures the table
> contains. The SMBIOS specification explicitly says that end-of-table
> markers should be ignored if they are not actually at the end of th
flight 60665 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60665/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Regressions which are
On 13/08/15 11:58, Jan Beulich wrote:
> From: Jean Delvare
>
> A 32-bit entry point to a DMI table says how many structures the table
> contains. The SMBIOS specification explicitly says that end-of-table
> markers should be ignored if they are not actually at the end of the
> DMI table. So only h
The current gunzip code to decompress the Dom0 kernel is implemented in
inflate.c which is included by bzimage.c.
I am looking to doing the same on ARM64 but there is quite a bit of
boilerplate definitions that I would need to import in order for
inflate.c to work correctly.
Instead of copying/pa
Free the memory used for the compressed kernel and update the relative
mod->start and mod->size parameters with the uncompressed ones.
Signed-off-by: Stefano Stabellini
CC: julien.gr...@citrix.com
CC: ian.campb...@citrix.com
---
Changes in v2:
- use gzip_check
- avoid useless casts
- free origi
Hi all,
this patch series introduces support for gzipped kernels, such as the
standard Image.gz format used by Linux on arm64 by default, in Xen on
arm. Without it, Xen cannot load the default kernel shipped by distros,
such as CentOS 7.
Stefano Stabellini (2):
xen: move perform_gunzip to c
On 08/12/2015 01:28 PM, Ian Campbell wrote:
On Wed, 2015-08-12 at 13:03 +0200, Benjamin Beier wrote:
Since xen version 4.5.1 there is a bug with the xl cpupool-create
command.
It always throws a segmentation fault when used with a config file as
parameter.
The content of the config file does not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.2-rc6-tag
xen: bug fixes for 4.2-rc6
- - Revert a fix from 4.2-rc5 that was causing lots of WARNING spam.
- - Fix a memory leak affecti
On Thu, 2015-08-13 at 04:49 -0600, Jan Beulich wrote:
> The function shouldn't return NULL after having obtained a reference,
> or else the caller won't know to drop it.
>
> Also its result shouldn't be ignored - if calling code is certain that
> a page already has a non-zero refcount, it better A
On Thu, 13 Aug 2015, Julien Grall wrote:
> On 13/08/15 11:54, Jan Beulich wrote:
> On 13.08.15 at 12:48, wrote:
> >> On 2015/8/13 18:29, Christoffer Dall wrote:
> >>> However, what about for other resources? Having code somewhere that
> >>> says "hide this random piece of hardware if you're
On 13/08/15 11:54, Jan Beulich wrote:
On 13.08.15 at 12:48, wrote:
>> On 2015/8/13 18:29, Christoffer Dall wrote:
>>> However, what about for other resources? Having code somewhere that
>>> says "hide this random piece of hardware if you're Xen dom0" sounds
>>> awful to me. I know it's only
From: Jean Delvare
A 32-bit entry point to a DMI table says how many structures the table
contains. The SMBIOS specification explicitly says that end-of-table
markers should be ignored if they are not actually at the end of the
DMI table. So only honor the end-of-table marker for tables accessed
>>> On 13.08.15 at 12:48, wrote:
> On 2015/8/13 18:29, Christoffer Dall wrote:
>> However, what about for other resources? Having code somewhere that
>> says "hide this random piece of hardware if you're Xen dom0" sounds
>> awful to me. I know it's only the serial port right now, but still.
>>
On 8/13/2015 6:33 PM, Paul Durrant wrote:
-Original Message-
From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 13 August 2015 11:06
To: xen-devel@lists.xen.org; Paul Durrant; Ian Jackson; Stefano Stabellini; Ian
Campbell; Wei Liu; Keir (Xen.org); jbeul...@suse.com; Andrew Cooper
The function shouldn't return NULL after having obtained a reference,
or else the caller won't know to drop it.
Also its result shouldn't be ignored - if calling code is certain that
a page already has a non-zero refcount, it better ASSERT()s so.
Finally this as well as get_page() and put_page()
On 2015/8/13 18:29, Christoffer Dall wrote:
> On Thu, Aug 13, 2015 at 11:22:19AM +0100, Ian Campbell wrote:
>> On Thu, 2015-08-13 at 11:13 +0100, Stefano Stabellini wrote:
>>>
> For example it is only natural for the kernel to try to use the GIC
> hyp
> functionalities if they are de
On 8/13/2015 6:16 PM, Paul Durrant wrote:
-Original Message-
From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 13 August 2015 11:06
To: xen-devel@lists.xen.org; Paul Durrant; Ian Jackson; Stefano Stabellini; Ian
Campbell; Wei Liu; Keir (Xen.org); jbeul...@suse.com; Andrew Cooper
Ian Campbell writes ("Re: [Xen-devel] [PATCH v2 2/2] cambridge: arrange to test
each new baseline"):
> I also considered refactoring this bit:
>
> if [ "x$treeurl" != xnone: ]; then
> treearg=--tree-$tree=$treeurl
> fi
> tested_revis
Ian Campbell writes ("[PATCH OSSTEST] ts-xen-install: Install netcat-openbsd"):
> This is required by libvirt for live migration (netcat-traditional
> doesn't cut it).
>
> netcat-openbsd has higher update-alternatives priority, so it will be
> used if installed.
Acked-by: Ian Jackson
__
On Thu, 2015-08-13 at 04:29 -0600, Jan Beulich wrote:
> >
> > > > On 13.08.15 at 12:14, wrote:
> > There isn't a race here is there? What if the reference were dropped
> > after
> > this check but before the guest_physmap_add_page (which takes new
> > references)? We are implicitly relying on a
On 13/08/15 10:20, Jan Beulich wrote:
>> BTW, IIRC x86 does modify at least one ACPI table which is the DMAR (I
>> think), to hide the IOMMU from the guest? That's another table we would
>> want to frob on ARM I think (or it's equivalent, which I think is IORT).
>
> Eliminating that hack is suppos
1 - 100 of 188 matches
Mail list logo