On Wed, May 23, 2018 at 09:19:22AM +0300, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> If frontend is configured to expose multiple input device instances
> then backend may require a way to uniquely identify concrete input
> device within the frontend. This is useful for
On Wed, May 23, 2018 at 09:19:23AM +0300, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> If frontend is configured to expose multiple connectors then backend may
> require a way to uniquely identify concrete virtual connector within the
> frontend. This is useful for
On 06/07/2018 04:29 PM, Konrad Rzeszutek Wilk wrote:
On Wed, May 23, 2018 at 09:19:23AM +0300, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
If frontend is configured to expose multiple connectors then backend may
require a way to uniquely identify concrete virtual connector
Underscores commonly require two keypresses while hyphen / dash requires
just one, and the visual separation effect of both is basically the same.
Signed-off-by: Jan Beulich
--- a/CODING_STYLE 2017-08-09 14:07:41.565057836 +0200
+++ b/CODING_STYLE 2018-06-07 15:52:55.136611092 +0200
On 06/06/18 11:40, Juergen Gross wrote:
> On 06/06/18 11:35, Jan Beulich wrote:
> On 05.06.18 at 18:19, wrote:
> test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 14 guest-saverestore.2
>>>
>>> I thought I would reply again with the key point from my earlier mail
>>> highlighted, and go
3.16.57-rc1 review patch. If anyone has any objections, please let me know.
--
From: Juergen Gross
commit 71c208dd54ab971036d83ff6d9837bae4976e623 upstream.
Older Xen versions (4.5 and before) might have problems migrating pv
guests with MSR_IA32_SPEC_CTRL having a non-zero
flight 123847 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123847/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-shadow 10 debian-install fail REGR. vs. 123792
test-amd64-amd64-xl
On 06/07/18 01:59, Ross Lagerwall wrote:
On 06/06/2018 04:01 PM, aaron.yo...@oracle.com wrote:
Hello all,
I have been tasked with the issue of UEFI NVRAM variable retention
with Xen HVM/OVMF based guests and wanted to consult the experts
before I undertake any significant coding
On 07/06/18 15:29, Konrad Rzeszutek Wilk wrote:
> On Wed, May 23, 2018 at 09:19:21AM +0300, Oleksandr Andrushchenko wrote:
>> From: Oleksandr Andrushchenko
>>
>> In current kbdif protocol definition multi-touch device parameters
>> are described as a part of frontend's XenBus configuration nodes
On 07/06/18 12:29, Ian Jackson wrote:
> Juergen Gross writes ("Re: [Xen-devel] [xen-unstable test] 123831: trouble:
> broken/fail/pass"):
>> The same host (italia1) that had the failed xtf test yesterday. The two
>> failures are looking very similar to me.
>>
>> Again the question: should we do a
>>> On 07.06.18 at 13:42, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 16 March 2018 12:25
>> >>> On 12.02.18 at 11:47, wrote:
>> > --- a/xen/arch/x86/Makefile
>> > +++ b/xen/arch/x86/Makefile
>> > @@ -33,6 +33,7 @@ obj-$(CONFIG_CRASH_DEBUG) += gdbstub.o
>> > obj-y +=
On 07/06/18 13:23, Paul Durrant wrote:
>> -Original Message-
>> From: Andrew Cooper
>> Sent: 07 June 2018 11:28
>> To: Paul Durrant ; xen-devel@lists.xenproject.org;
>> linux-ker...@vger.kernel.org
>> Cc: Juergen Gross ; Boris Ostrovsky
>> ; Dan Carpenter
>>
>> Subject: Re: [Xen-devel]
Paul Durrant writes ("RE: [PATCH 5/7] public / x86: introduce
__HYPERCALL_iommu_op"):
> FWIW Linux appears to use a single '_' prefix and no suffix.
This practice of scattering underscores about, apparently at random,
is baffling to me.
It doesn't look like most of the people who do it are
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 16 March 2018 12:25
> To: Paul Durrant
> Cc: Andrew Cooper ; Wei Liu
> ; George Dunlap ; Ian
> Jackson ; Stefano Stabellini
> ; xen-devel@lists.xenproject.org; KonradRzeszutek
> Wilk ; Daniel De Graaf ;
> Tim
On Wed, May 23, 2018 at 09:19:21AM +0300, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> In current kbdif protocol definition multi-touch device parameters
> are described as a part of frontend's XenBus configuration nodes while
> they belong to backend's configuration. Fix
On 06/07/2018 04:28 PM, Konrad Rzeszutek Wilk wrote:
On Wed, May 23, 2018 at 09:19:22AM +0300, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
If frontend is configured to expose multiple input device instances
then backend may require a way to uniquely identify concrete input
On 06/07/2018 02:21 PM, Jan Beulich wrote:
On 07.06.18 at 13:42, wrote:
>>> From: Jan Beulich [mailto:jbeul...@suse.com]
>>> Sent: 16 March 2018 12:25
>> On 12.02.18 at 11:47, wrote:
--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -33,6 +33,7 @@
Juergen Gross writes ("Re: [Xen-devel] [xen-unstable test] 123831: trouble:
broken/fail/pass"):
> Are you fine then to lift the current commit moratorium?
That seems sensible, if you don't expect to be trying to branch RSN
because of the save/restore bug.
Ian.
When we are looking for a previous job which justifies a failure, we
need to check that the putative justifying job used the same revision
as the baseline we are judging against. So we investigate the build
jobs referred to by that putative justifying job.
However, there are cases where this is
On 07/06/18 13:58, Ian Jackson wrote:
> Juergen Gross writes ("Re: [Xen-devel] [xen-unstable test] 123831: trouble:
> broken/fail/pass"):
>> Are you fine then to lift the current commit moratorium?
>
> That seems sensible, if you don't expect to be trying to branch RSN
> because of the
Add an option to control when vTSC emulation will be activated for a
domU with tsc_mode=default. Without such option each TSC access from
domU will be emulated, which causes a significant perfomance drop for
workloads that make use of rdtsc.
One option to avoid the TSC option is to run domUs with
>>> On 07.06.18 at 15:08, wrote:
> Add an option to control when vTSC emulation will be activated for a
> domU with tsc_mode=default. Without such option each TSC access from
> domU will be emulated, which causes a significant perfomance drop for
> workloads that make use of rdtsc.
>
> One
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 07 June 2018 14:45
> To: Jan Beulich ; Paul Durrant
>
> Cc: Andrew Cooper ; Ian Jackson
> ; Wei Liu ; Stefano Stabellini
> ; xen-devel ;
> Konrad Rzeszutek Wilk ; Daniel de Graaf
> ; Tim (Xen.org)
>
On Wed, Jun 06, 2018 at 07:28:20PM +0200, Daniel Kiper wrote:
> On Tue, Jun 05, 2018 at 11:55:36AM +0200, Roger Pau Monne wrote:
> > Add a note to spell out that if the address tag is not present the
> > file should be loaded using the elf header.
> >
> > Signed-off-by: Roger Pau Monné
> > ---
>
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@citrix.com]
> Sent: 07 June 2018 15:21
> To: Paul Durrant
> Cc: George Dunlap ; Jan Beulich
> ; Andrew Cooper ; Wei
> Liu ; Stefano Stabellini ; xen-
> devel ; Konrad Rzeszutek Wilk
> ; Daniel de Graaf ; Tim
> (Xen.org)
>
>>> On 07.06.18 at 16:49, wrote:
> Am Thu, 07 Jun 2018 08:44:41 -0600
> schrieb "Jan Beulich" :
>
>> The re-use of the field is acceptable only if all existing senders reliably
>> fill zero in there.
>
> How do we know all senders? I just know about write_tsc_info from xen-4.6+.
I don't think
On Thu, Jun 07, 2018 at 04:46:37PM +0200, Roger Pau Monné wrote:
> On Wed, Jun 06, 2018 at 07:28:20PM +0200, Daniel Kiper wrote:
> > On Tue, Jun 05, 2018 at 11:55:36AM +0200, Roger Pau Monne wrote:
> > > Add a note to spell out that if the address tag is not present the
> > > file should be loaded
>>> On 07.06.18 at 15:47, wrote:
> Am Thu, 07 Jun 2018 07:31:26 -0600
> schrieb "Jan Beulich" :
>
>> Hmm, I find this description concerning. Is the field reliably zero when
>> coming from older Xen, or is it not?
>
> It depends on how old.
> If the other sending side has write_tsc_info from
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/viridian.c | 22 +++---
1 file changed, 7 insertions(+), 15 deletions(-)
diff --git a/xen/arch/x86/hvm/viridian.c b/xen/arch/x86/hvm/viridian.c
index bab606e..86a43ee 100644
--- a/xen/arch/x86/hvm/viridian.c
+++
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/hvm.c | 195 +
1 file changed, 100 insertions(+), 95 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/hvm.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index c23983c..76f7db9 100644
--- a/xen/arch/x86/hvm/hvm.c
+++
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/hvm.c | 19 +++
1 file changed, 3 insertions(+), 16 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 7e90bf2..701e81c 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -740,26
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/mtrr.c | 33 -
1 file changed, 12 insertions(+), 21 deletions(-)
diff --git a/xen/arch/x86/hvm/mtrr.c b/xen/arch/x86/hvm/mtrr.c
index d311031..4c1e850 100644
--- a/xen/arch/x86/hvm/mtrr.c
+++
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
---
Changes since V5:
- Check the return value of hvm_save_cpu_msrs_one()
---
xen/arch/x86/hvm/hvm.c | 60 --
1 file changed, 34 insertions(+), 26
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/mtrr.c | 52 +++--
1 file changed, 29 insertions(+), 23 deletions(-)
diff --git a/xen/arch/x86/hvm/mtrr.c b/xen/arch/x86/hvm/mtrr.c
index
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
---
Changes since V6:
- Add memset to 0 for ctxt
---
xen/arch/x86/hvm/viridian.c | 14 ++
1 file changed, 10 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/hvm/viridian.c
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/hvm.c | 11 ---
1 file changed, 8 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index b254378..e8ecabf 100644
--- a/xen/arch/x86/hvm/hvm.c
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/hvm.c | 58 +++---
1 file changed, 22 insertions(+), 36 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 2542cbd..a88efeb 100644
--- a/xen/arch/x86/hvm/hvm.c
+++
Hi all,
This patch series addresses the ideea of saving data from a single vcpu
instance.
First it starts by adding *save_one functions, then it removes the for loops
from
the *save functions and it merges them to the *save_one functions.
In the final patch, the hvm_save and hvm_save_one
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/hvm.c| 166 ++
xen/include/asm-x86/hvm/support.h | 2 +
2 files changed, 80 insertions(+), 88 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 701e81c..38e5e96
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/hvm/hvm.c | 35 +--
1 file changed, 13 insertions(+), 22 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 38e5e96..2542cbd 100644
--- a/xen/arch/x86/hvm/hvm.c
+++
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/cpu/mcheck/vmce.c | 16 ++--
1 file changed, 10 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86/cpu/mcheck/vmce.c b/xen/arch/x86/cpu/mcheck/vmce.c
index e07cd2f..404f27e
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/cpu/mcheck/vmce.c | 27 +++
1 file changed, 7 insertions(+), 20 deletions(-)
diff --git a/xen/arch/x86/cpu/mcheck/vmce.c b/xen/arch/x86/cpu/mcheck/vmce.c
index 404f27e..ead1f73 100644
--- a/xen/arch/x86/cpu/mcheck/vmce.c
Add a note to spell out that if the address tag is not present the
file should be loaded using the elf header.
Signed-off-by: Roger Pau Monné
---
Cc: Daniel Kiper
Cc: xen-devel@lists.xenproject.org
---
Changes since v1:
- s/elf/@sc{elf}/
- s/Multiboot/Multiboot2/
---
doc/multiboot.texi | 6
On Thu, Jun 07, 2018 at 04:40:48PM +0300, Oleksandr Andrushchenko wrote:
> On 06/07/2018 04:28 PM, Konrad Rzeszutek Wilk wrote:
> > On Wed, May 23, 2018 at 09:19:22AM +0300, Oleksandr Andrushchenko wrote:
> > > From: Oleksandr Andrushchenko
> > >
> > > If frontend is configured to expose
flight 123852 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123852/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64 7 xen-bootfail REGR. vs. 123144
Am Thu, 07 Jun 2018 08:44:41 -0600
schrieb "Jan Beulich" :
> The re-use of the field is acceptable only if all existing senders reliably
> fill zero in there.
How do we know all senders? I just know about write_tsc_info from xen-4.6+.
Olaf
pgp7WNmQ7W4Jd.pgp
Description: Digitale Signatur von
This patch is focused moving the for loop to the caller so
now we can save info for a single vcpu instance.
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/cpu/mcheck/vmce.c | 3 +-
xen/arch/x86/hvm/hpet.c| 3 +-
xen/arch/x86/hvm/hvm.c | 12 ++---
xen/arch/x86/hvm/i8254.c
>>> On 07.06.18 at 17:21, wrote:
>> -Original Message-
>> From: Ian Jackson [mailto:ian.jack...@citrix.com]
>> Sent: 07 June 2018 15:21
>> To: Paul Durrant
>> Cc: George Dunlap ; Jan Beulich
>> ; Andrew Cooper ; Wei
>> Liu ; Stefano Stabellini ; xen-
>> devel ; Konrad Rzeszutek Wilk
>>
branch xen-unstable
xenbranch xen-unstable
job build-amd64-libvirt
testid libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib https://git.savannah.gnu.org/git/gnulib.git/
Tree: libvirt_keycodemapdb https://gitlab.com/keycodemap/keycodemapdb.git
Tree: qemu
flight 123894 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123894/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
Hello.
For BSD distros, Xen is better or Bhyve? Can Bhyve be a replacement for Xen?
Have Bhyve all Xen features?
Thank you.
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
(Stefano, question for you at the end)
On 06/07/2018 02:39 AM, Oleksandr Andrushchenko wrote:
> On 06/07/2018 12:19 AM, Boris Ostrovsky wrote:
>> On 06/06/2018 04:14 AM, Oleksandr Andrushchenko wrote:
>>> On 06/04/2018 11:12 PM, Boris Ostrovsky wrote:
On 06/01/2018 07:41 AM, Oleksandr
flight 123858 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123858/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumprun-amd64 7 xen-boot fail REGR. vs. 122997
On Thu, Jun 07, Jan Beulich wrote:
> >>> On 07.06.18 at 16:49, wrote:
> > Am Thu, 07 Jun 2018 08:44:41 -0600
> > schrieb "Jan Beulich" :
> >> The re-use of the field is acceptable only if all existing senders reliably
> >> fill zero in there.
> > How do we know all senders? I just know about
flight 123864 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123864/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl broken
Tests which are
flight 123861 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123861/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-shadow7 xen-boot fail REGR. vs. 122969
Thank you.
As a side point David Vrabel is listed in the maintainers file for xen
hypervisor interface in 4.4.135 but his email is no longer active it seems.
On 7 Jun 2018 09:35, "Ross Lagerwall" wrote:
On 06/05/2018 04:43 PM, Liam Shepherd wrote:
> When upgrading from 4.4.132 to 4.4.135 I
Hi Jan,
On 07/06/2018 14:56, Jan Beulich wrote:
Underscores commonly require two keypresses while hyphen / dash requires
just one, and the visual separation effect of both is basically the same.
I don't buy this argument. A good programmer is lazy by definition but
not that much. C does not
Modify the SMMU code to use generic device instead of dt_device_node for
functions that can be used for ACPI based systems too.
Signed-off-by: Sameer Goel
Acked-by: Julien Grall
---
xen/drivers/passthrough/arm/smmu.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff
flight 123876 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123876/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 123814
build-i386-libvirt
On 06/07/2018 03:17 AM, Oleksandr Andrushchenko wrote:
> On 06/07/2018 12:32 AM, Boris Ostrovsky wrote:
>> On 06/06/2018 05:06 AM, Oleksandr Andrushchenko wrote:
>>> On 06/04/2018 11:49 PM, Boris Ostrovsky wrote:
> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
> index
Add a new config item to control compilation for legacy arm SMMU.
Signed-off-by: Sameer Goel
---
xen/drivers/passthrough/arm/Kconfig | 6 ++
xen/drivers/passthrough/arm/Makefile | 2 +-
2 files changed, 7 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/passthrough/arm/Kconfig
This driver follows an approach similar to smmu driver. The intent here
is to reuse as much Linux code as possible.
- Glue code has been introduced to bridge the API calls.
- Called Linux functions from the Xen IOMMU function calls.
- Xen modifications are preceded by /*Xen: comment */
-
Based on commit 7aa8619a66aea52b145e04cbab4f8d6a4e5f3f3b
This is a verbatim snapshot of arm-smmu-v3.c from Linux kernel source
code.
No Xen code has been added and the file is not built.
Signed-off-by: Sameer Goel
---
xen/drivers/passthrough/arm/smmu-v3.c | 2885 +
1
This patch adds support for the SMMUv3 driver.
List of changes:
- Addition of a linux_compat header.
- Addition of a common header for arm smmu defines.
- Rebase of the SMMUv3 driver to the driver in linux kernel 4.14 rc7.
- New config defines for ARM SMMU drivers.
Changes in v3
- Changes to
Define WARN_ON_ONCE() macro to mirror Linux functionality.
Signed-off-by: Sameer Goel
Acked-by: Julien Grall
---
xen/arch/arm/xen.lds.S | 1 +
xen/arch/x86/xen.lds.S | 1 +
xen/include/xen/lib.h | 13 +
3 files changed, 15 insertions(+)
diff --git a/xen/arch/arm/xen.lds.S
Pull common defines for SMMU drives in a local header.
Signed-off-by: Sameer Goel
---
xen/drivers/passthrough/arm/smmu-v3.c | 96 +---
xen/drivers/passthrough/arm/smmu.c| 104 +
xen/drivers/passthrough/arm/smmu.h| 125 ++
3
flight 123870 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123870/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 123828
test-armhf-armhf-libvirt 14
This run is configured for baseline tests only.
flight 74795 linux-3.18 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74795/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-check fail
On 06/07/2018 04:44 AM, Oleksandr Andrushchenko wrote:
> On 06/07/2018 12:48 AM, Boris Ostrovsky wrote:
>> On 06/06/2018 08:10 AM, Oleksandr Andrushchenko wrote:
>>> On 06/05/2018 01:07 AM, Boris Ostrovsky wrote:
On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote:
>>
+
+static
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.18-rc1-tag
xen: fixes and features for v4-18-rc1
It contains some minor code cleanups (fixing return types of functions),
some fixes for Linux running as Xen PVH guest, and adding
Hi Sameer,
On 06/08/2018 05:17 AM, Sameer Goel wrote:
Pull common defines for SMMU drives in a local header.
Can add more detail in commit message?
Signed-off-by: Sameer Goel
---
xen/drivers/passthrough/arm/smmu-v3.c | 96 +---
xen/drivers/passthrough/arm/smmu.c|
On 06/07/2018 06:47 PM, Konrad Rzeszutek Wilk wrote:
On Thu, Jun 07, 2018 at 04:40:48PM +0300, Oleksandr Andrushchenko wrote:
On 06/07/2018 04:28 PM, Konrad Rzeszutek Wilk wrote:
On Wed, May 23, 2018 at 09:19:22AM +0300, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
If
Nested Xen on Xen, KVM on Xen, VMware on Xen, and hyperv on Xen all failed.
Already updated the result:
https://wiki.xenproject.org/wiki/Nested_Virtualization_in_Xen
Thanks,
-Xudong
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Tuesday, June 5, 2018 6:28 PM
To: Hao, Xudong ;
flight 123837 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123837/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-libvirt-xsm 1
On 06/07/2018 12:32 AM, Boris Ostrovsky wrote:
On 06/06/2018 05:06 AM, Oleksandr Andrushchenko wrote:
On 06/04/2018 11:49 PM, Boris Ostrovsky wrote:
On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote:
+struct gntdev_dmabuf_export_args {
+ int dummy;
+};
Please define the full structure
On 06/07/2018 01:05 AM, Dongwon Kim wrote:
On Wed, Jun 06, 2018 at 05:51:38PM -0400, Boris Ostrovsky wrote:
On 06/06/2018 08:46 AM, Oleksandr Andrushchenko wrote:
On 06/05/2018 01:36 AM, Boris Ostrovsky wrote:
On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote:
From: Oleksandr
Isn't the page https://wiki.xen.org/wiki/Reporting_Bugs_against_Xen_Project
Dongli Zhang
- Original Message -
From: sc...@viviotech.net
To: xen-de...@lists.xen.org
Sent: Thursday, June 7, 2018 1:30:47 PM GMT +08:00 Beijing / Chongqing / Hong
Kong / Urumqi
Subject: [Xen-devel] Xentop
Hello Paul Durrant,
The patch 3ad0876554ca: "xen/privcmd: add
IOCTL_PRIVCMD_MMAP_RESOURCE" from May 9, 2018, leads to the following
static checker warning:
drivers/xen/privcmd.c:827 privcmd_ioctl_mmap_resource()
warn: passing casted pointer 'pfns' to
On 06/05/2018 04:43 PM, Liam Shepherd wrote:
When upgrading from 4.4.132 to 4.4.135 I started observing about 3%
packet loss on PV on HVM domU interfaces. Specifically TX dropped
packets (As reported by ifconfig).
It seems that the default ethtool settings have changed.
Previously (4.4.132):
> -Original Message-
> From: Dan Carpenter [mailto:dan.carpen...@oracle.com]
> Sent: 07 June 2018 09:32
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org
> Subject: [bug report] xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE
>
> Hello Paul Durrant,
>
> The patch 3ad0876554ca:
On 06/07/2018 12:48 AM, Boris Ostrovsky wrote:
On 06/06/2018 08:10 AM, Oleksandr Andrushchenko wrote:
On 06/05/2018 01:07 AM, Boris Ostrovsky wrote:
On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote:
+
+static struct sg_table *
+dmabuf_exp_ops_map_dma_buf(struct dma_buf_attachment
This run is configured for baseline tests only.
flight 74793 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74793/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stopfail
On 06/06/2018 04:01 PM, aaron.yo...@oracle.com wrote:
Hello all,
I have been tasked with the issue of UEFI NVRAM variable retention
with Xen HVM/OVMF based guests and wanted to consult the experts before
I undertake any significant coding effort. I am new to Xen so any
help/direction
flight 123855 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123855/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 15 guest-saverestore.2 fail REGR. vs.
123829
version targeted for
flight 123844 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123844/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-2 broken in 123492
flight 74794 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74794/
Perfect :-)
All tests in this flight passed as required
baseline version:
flight 74767
jobs:
build-amd64 pass
On Thu, Jun 07, 2018 at 09:59:10AM +0100, Ross Lagerwall wrote:
> On 06/06/2018 04:01 PM, aaron.yo...@oracle.com wrote:
> > Any comments/suggestions/opinions/caveats on this approach?
>
> I did this a while back. It is easy enough to do:
>
> 1) Have Xen load OVMF_code.fd rather than the
On 07/06/18 11:21, Paul Durrant wrote:
> Commit 3ad0876554ca ("xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE")
> introduced a static checker warning:
>
> drivers/xen/privcmd.c:827 privcmd_ioctl_mmap_resource()
> warn: passing casted pointer 'pfns' to 'xen_remap_domain_mfn_array()'
> 64
Juergen Gross writes ("Re: [Xen-devel] [xen-unstable test] 123831: trouble:
broken/fail/pass"):
> The same host (italia1) that had the failed xtf test yesterday. The two
> failures are looking very similar to me.
>
> Again the question: should we do a force push?
I think the final decision is
Hi,
On Wed, Jun 6, 2018 at 8:00 PM, Julien Grall wrote:
> (+ Stefano, Mirela, Juergen and Boris)
>
> On 06/06/18 09:17, moin anjnawala wrote:
>>
>> Hi Julien,
>
>
> Hi,
>
>> As you specified earlier I am now able to boot using xen4.10. I am
>> using linux4.4 as dom0 as well as domU.In domU, I
Hi Julien,
On Tue, Jun 5, 2018 at 8:00 PM, Julien Grall wrote:
>
>
> On 05/06/18 18:24, Julien Grall wrote:
>
>> Hi Mirela,
>>
>> On 01/06/18 14:17, Mirela Simonovic wrote:
>>
>>> Linux/dom0 accesses OSLSR register when saving CPU context during the
>>> suspend procedure. Xen traps access to
>>> On 06.06.18 at 17:21, wrote:
> On 06/06/18 16:00, Jan Beulich wrote:
> On 04.06.18 at 15:59, wrote:
>>> @@ -518,7 +524,10 @@ struct arch_vcpu
>>> void *fpu_ctxt;
>>> unsigned long vgc_flags;
>>> struct cpu_user_regs user_regs;
>>> -unsigned long
>>> On 06.06.18 at 16:16, wrote:
> On 06/06/18 14:50, Jan Beulich wrote:
> On 04.06.18 at 15:59, wrote:
>>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>>> +++ b/xen/arch/x86/hvm/vmx/vmx.c
>>> @@ -3696,6 +3696,7 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs)
>>> */
>>>
> -Original Message-
> From: Andrew Cooper
> Sent: 07 June 2018 11:28
> To: Paul Durrant ; xen-devel@lists.xenproject.org;
> linux-ker...@vger.kernel.org
> Cc: Juergen Gross ; Boris Ostrovsky
> ; Dan Carpenter
>
> Subject: Re: [Xen-devel] [PATCH] xen/privcmd: fix static checker warning
>
96 matches
Mail list logo