branch xen-unstable
xen branch xen-unstable
job build-armhf-libvirt
test libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git
***
flight 60711 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60711/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 19 guest-start/debianhvm.repeat
fail REGR. vs. 60683
El 11/08/15 a les 16.19, Ian Campbell ha escrit:
On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
This document is going to explain the design details of Xen booting with
ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are
welcome.
Some small subsets of this seem
Saturday, August 15, 2015, 12:39:25 AM, you wrote:
On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
On 2015-08-13 00:41, Eric Dumazet wrote:
On Wed, 2015-08-12 at 23:46 +0200, Sander Eikelenboom wrote:
Thanks for the reminder, but luckily i was aware of that,
seen enough
flight 60704 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60704/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-win7-amd64 17 guest-stop fail like 58892
branch xen-unstable
xen branch xen-unstable
job build-i386-libvirt
test libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu
flight 60709 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60709/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm 14 guest-saverestore fail REGR. vs. 59254
test-amd64-i386-xl
On 2015/8/17 18:36, Roger Pau Monné wrote:
El 11/08/15 a les 16.19, Ian Campbell ha escrit:
On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote:
This document is going to explain the design details of Xen booting with
ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are
Hi Julien,
On 2015/8/18 0:10, Julien Grall wrote:
Hi,
On 17/08/2015 06:01, Shannon Zhao wrote:
On 2015/8/14 23:17, Julien Grall wrote:
On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
On Mon, Aug 17, 2015 at 09:51:58AM -0600, Jan Beulich wrote:
On 20.07.15 at 16:29, daniel.ki...@oracle.com wrote:
Create generic alloc and copy functions. We need
separate tools for memory allocation and copy to
provide multiboot2 protocol support.
Signed-off-by: Daniel Kiper
Hi Jan,
On 2015/8/17 23:33, Jan Beulich wrote:
On 14.08.15 at 16:59, shannon.z...@linaro.org wrote:
1. Copy and change some EFI and ACPI tables
---
While some explanation on the reasons for this was given in the past
discussion, I'm still missing a
On 8/13/2015 at 05:09 PM, in message
20150813090938.gi7...@zion.uk.xensource.com, Wei Liu wei.l...@citrix.com
wrote:
On Tue, Aug 11, 2015 at 08:24:01PM -0600, Chun Yan Liu wrote:
On 8/11/2015 at 07:27 PM, in message
2015082702.gf7...@zion.uk.xensource.com, Wei Liu
On Tue, Aug 18, 2015 at 3:25 AM Dario Faggioli dario.faggi...@citrix.com
wrote:
On Mon, 2015-08-17 at 00:55 +, Kun Cheng wrote:
On Mon, Aug 17, 2015 at 12:16 AM Frediano Ziglio fredd...@gmail.com
What I'm planing is adding page migration support for NUMA aware
scheduling. In such
This is very similar to the behavior I am seeing in this bug:
https://bugzilla.kernel.org/show_bug.cgi?id=102911
-Jon
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 16.08.15 at 11:14, ian.campb...@citrix.com wrote:
On Fri, 2015-08-14 at 04:07 -0600, Jan Beulich wrote:
If so, I'd be inclined to suggest a force push based on this flight.
Overall I think I'm inclined to agree, I suppose your motive is that
you want to get 4.4.x+1 out the door and I
On 12/08/15 14:33, Andrew Cooper wrote:
On 12/08/15 14:29, Andrew Cooper wrote:
On 11/08/15 19:29, Boris Ostrovsky wrote:
On 08/11/2015 01:19 PM, Andrew Cooper wrote:
On 11/08/15 18:05, Tim Deegan wrote:
* Under this model, PV exception handlers should copy themselves
onto
the privileged
Monday, August 17, 2015, 3:37:13 PM, you wrote:
On Mon, 2015-08-17 at 11:09 +0200, Sander Eikelenboom wrote:
Saturday, August 15, 2015, 12:39:25 AM, you wrote:
On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
On 2015-08-13 00:41, Eric Dumazet wrote:
On Wed, 2015-08-12 at
On 08/16/2015 08:46 PM, Jonathan Creekmore wrote:
On Aug 16, 2015, at 1:59 AM, Ian Campbell ian.campb...@citrix.com wrote:
On Thu, 2015-08-13 at 16:44 -0500, Jonathan Creekmore wrote:
With the addition of FMODE_ATOMIC_POS in the Linux 3.14 kernel,
concurrent blocking file accesses to a single
On Mon, 2015-08-17 at 11:09 +0200, Sander Eikelenboom wrote:
Saturday, August 15, 2015, 12:39:25 AM, you wrote:
On Sat, 2015-08-15 at 00:09 +0200, Sander Eikelenboom wrote:
On 2015-08-13 00:41, Eric Dumazet wrote:
On Wed, 2015-08-12 at 23:46 +0200, Sander Eikelenboom wrote:
Thanks
Monday, August 17, 2015, 4:21:47 PM, you wrote:
On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
This is very similar to the behavior I am seeing in this bug:
https://bugzilla.kernel.org/show_bug.cgi?id=102911
OK, but have you applied the fix ?
On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
This is very similar to the behavior I am seeing in this bug:
https://bugzilla.kernel.org/show_bug.cgi?id=102911
OK, but have you applied the fix ?
On 2015/8/14 23:17, Julien Grall wrote:
On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
--
The minimal DT mainly passes Dom0 bootargs, address and size of initrd
(if available), address
On 11/08/15 11:33, Ben Catterall wrote:
On 10/08/15 11:07, Tim Deegan wrote:
Hi,
@@ -685,8 +685,17 @@ static int hap_page_fault(struct vcpu *v,
unsigned long va,
{
struct domain *d = v-domain;
+/* If we get a page fault whilst in HVM security user mode */
+if( v-user_mode
On 08/17/2015 12:18 PM, Eric Dumazet wrote:
From: Eric Dumazet eduma...@google.com
snip
Then can you try following fix as well ?
Thanks !
[PATCH] timer: fix a race in __mod_timer()
snip
I have been running the latest code from git with the 2 patches in this
thread applied. No issues
On 08/17/2015 09:25 AM, Sander Eikelenboom wrote:
OK, but have you applied the fix ?
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=83fccfc3940c4a2db90fd7e7079f5b465cd8c6af
It will be part of net iteration from David Miller to Linus Torvald.
I did not have that
On 8/14/2015 9:51 PM, Paul Durrant wrote:
-Original Message-
From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 14 August 2015 13:03
To: xen-devel@lists.xen.org; Paul Durrant; Ian Jackson; Stefano Stabellini; Ian
Campbell; Wei Liu; Keir (Xen.org); jbeul...@suse.com; Andrew Cooper
Shannon Zhao zhaoshengl...@huawei.com 08/18/15 5:46 AM
On 2015/8/17 23:33, Jan Beulich wrote:
On 14.08.15 at 16:59, shannon.z...@linaro.org wrote:
1. Copy and change some EFI and ACPI tables
---
While some explanation on the reasons for this was
Julien Grall julien.gr...@citrix.com 08/17/15 6:27 PM
On 17/08/2015 08:33, Jan Beulich wrote:
On 14.08.15 at 16:59, shannon.z...@linaro.org wrote:
b) Create EFI_MEMORY_DESCRIPTOR table. This will add memory start and
size information of Dom0. And Dom0 will get the memory information
through
At 14:59 +0100 on 17 Aug (1439823550), Ben Catterall wrote:
On 11/08/15 11:33, Ben Catterall wrote:
On 10/08/15 11:07, Tim Deegan wrote:
This should happen in paging_fault() so it can guard the
shadow-pagetable paths too. Once it's there, it'll need a check for
is_hvm_vcpu() as well as
On 28.07.15 at 15:28, vkuzn...@redhat.com wrote:
x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq
servers and and replaces the shared_info frame with an empty page to support
subsequent XENMAPSPACE_shared_info call.
ARM-specific hook is -ENOSYS for now.
On 20.07.15 at 16:28, daniel.ki...@oracle.com wrote:
An empty description leaves us guess at the why.
--- a/xen/arch/x86/boot/reloc.c
+++ b/xen/arch/x86/boot/reloc.c
@@ -10,15 +10,27 @@
*Keir Fraser k...@xen.org
*/
-/* entered with %eax = BOOT_TRAMPOLINE */
+/*
+ * This entry
From: Eric Dumazet eduma...@google.com
On Mon, 2015-08-17 at 16:25 +0200, Sander Eikelenboom wrote:
Monday, August 17, 2015, 4:21:47 PM, you wrote:
On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
This is very similar to the behavior I am seeing in this bug:
At 14:53 +0100 on 17 Aug (1439823232), Ben Catterall wrote:
On 12/08/15 14:33, Andrew Cooper wrote:
On 12/08/15 14:29, Andrew Cooper wrote:
On 11/08/15 19:29, Boris Ostrovsky wrote:
Would switching TR only when we know that we need to enter this
deprivileged mode help?
This is an
On 17.08.15 at 17:07, t...@xen.org wrote:
At 14:53 +0100 on 17 Aug (1439823232), Ben Catterall wrote:
So, have we arrived at a decision for this? Thanks!
Seems to have stalled a bit. OK, I propose that:
- we use TR/IST to make Xen take interrupts/exceptions at a different SP;
- we make
On 14.08.15 at 16:59, shannon.z...@linaro.org wrote:
1. Copy and change some EFI and ACPI tables
---
While some explanation on the reasons for this was given in the past
discussion, I'm still missing a word on the why for each of these here.
a) Copy
On 20.07.15 at 16:29, daniel.ki...@oracle.com wrote:
Create generic alloc and copy functions. We need
separate tools for memory allocation and copy to
provide multiboot2 protocol support.
Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
Reviewed-by: Andrew Cooper
El 07/08/15 a les 18.36, Andrew Cooper ha escrit:
On 07/08/15 11:18, Roger Pau Monne wrote:
@@ -1336,7 +1343,8 @@ static int meminit_hvm(struct xc_dom_image *dom)
* tot_pages will be target_pages - VGA_HOLE_SIZE after
* this call.
*/
-rc =
On 17/08/2015 08:33, Jan Beulich wrote:
On 14.08.15 at 16:59, shannon.z...@linaro.org wrote:
1. Copy and change some EFI and ACPI tables
---
While some explanation on the reasons for this was given in the past
discussion, I'm still missing a word on
On 17.08.15 at 16:58, t...@xen.org wrote:
At 14:59 +0100 on 17 Aug (1439823550), Ben Catterall wrote:
On 11/08/15 11:33, Ben Catterall wrote:
On 10/08/15 11:07, Tim Deegan wrote:
I wonder whether it would be better to switch to an IDT with all
unacceptable traps stubbed out, rather than
On 20.07.15 at 16:29, daniel.ki...@oracle.com wrote:
Rename mbi and mbi_old variables and rearrange code a bit to make
it more readable. Additionally, this way multiboot (v1) protocol
implementation and future multiboot2 protocol implementation will
use the same variable naming convention.
Hi Vijay,
This patch doesn't only do initialization but also destruction of vGIC info.
Although, a part of the domain initialization is done in part in #8 and
#8. It's very confusing to see the initialization split in 3 different
patch.
I would prefer to see the initialization/destruction
Wei Liu (3):
xl: fix vNUMA vdistance parsing
xl: error out if vNUMA specifies more vcpus than pcpus
libxc: fix vNUMA memory allocation
tools/libxc/xc_hvm_build_x86.c | 6 --
tools/libxl/xl_cmdimpl.c | 34 +-
2 files changed, 33 insertions(+), 7
Only 4KB allocation was using new_memflags. We should use new_memflags
in for 2MB and 1GB allocation as well because that variable contains
node information.
Without this patch, when creating a HVM guest with vNUMA, because the
node information was not present in the flags passed to libxc,
We should parse the output from splitting function, not the original
string, otherwise the parsed result is wrong.
For example:
vnuma = [ [...,vdistance=10,20,...],
[...,vdistance=20,10,...] ]
Before this change, vdistance from node 0 to all nodes (including
itself) was 10 and
... but allow user to override that check by specifying maxvcpus= in xl
configuration file.
Note that the code is constructed such that the fallout is dealt with
after parsing. We can live with that because though it wastes a bit of
cpu cycles but it is still functionally correct and I would like
Hi Wei,
Thanks for CCing me, for me, I prefer option 2, it won't affect the normal
development release cycle, if the contributor wants to contribute to
-unstable, then it is his responsibility to resolve the confilicts on the
main branch. but I think it depends on the maintainers who will make
Hi Chris,
On 14/08/2015 14:42, Chris (Christopher) Brand wrote:
Ensure that every bit has a specific value.
Reported-by: Julien Grall julien.gr...@citrix.com
Signed-off-by: Chris Brand chris.br...@broadcom.com
---
xen/include/asm-arm/page.h | 5 +
1 file changed, 5 insertions(+)
diff
On 17/08/2015 11:58, Chris (Christopher) Brand wrote:
Hi Julien,
Thanks for the review.
+.pxn = 0,
I would add a comment to explain that this bit is reserved for PL2 stage
1 page table.
Will do.
+.avail = 0,
I don't think this one is necessary. avail is not
On 14/08/2015 14:41, Chris (Christopher) Brand wrote:
Hi,
Hi Chris,
Thank you for the patch.
This is more-or-less what Julien requested. He noted that pt.contig was never
set to zero. When I looked further, I found other bits that were also never
given a value. Looking at the callsites,
Hi Vijay,
On 27/07/2015 04:11, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Initialize physical ITS driver from GIC v3 driver
if LPIs are supported by hardware
Signed-off-by: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
---
v5: Made check of its dt node
Hi Chris,
On 14/08/2015 14:41, Chris (Christopher) Brand wrote:
Shuffle lines around so that the assignments in mfn_to_xen_entry()
occur in the same order as the bits are declared in lpae_pt_t.
This makes it easier to see which ones are never given a value.
No change in behaviour.
Also fix a
On 2015-08-17 19:18, Eric Dumazet wrote:
From: Eric Dumazet eduma...@google.com
On Mon, 2015-08-17 at 16:25 +0200, Sander Eikelenboom wrote:
Monday, August 17, 2015, 4:21:47 PM, you wrote:
On Mon, 2015-08-17 at 09:02 -0500, Jon Christopherson wrote:
This is very similar to the behavior I am
On Sun, Aug 16, 2015 at 09:51:53AM +0100, Ian Campbell wrote:
On Fri, 2015-08-14 at 00:38 +0100, Wei Liu wrote:
In fact, if b_info-max_vcpus is 0, the elements of vcpu_parsed are
sized against the host pcpus, and we risk to call libxl_bitmap_set() for
vcpus beyond that limit, while
Hi Julien,
Thanks for the review.
+.pxn = 0,
I would add a comment to explain that this bit is reserved for PL2 stage
1 page table.
Will do.
+.avail = 0,
I don't think this one is necessary. avail is not used by the hardware neither
Xen.
grep -rF pt.avail
P.S. Apologies for any threading issues - I have not yet managed to
get git send-email working properly.
I'm usually using git format-patch to get a list of files (one per
patch) and my cover letter (--cover-letter).
Thanks.
Then I use git send-email *.patch which will send the patch
Hi Vijay,
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
ITS translation space contains GITS_TRANSLATOR register
which is written by device to raise LPI. This space needs
to mapped to every domain address space for all physical
ITS
Hi Vijay,
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
+for ( i = 0; i dev-nr_lpis; i++ )
+{
+msi = xzalloc(struct msi_desc);
+/* Reserve pLPI */
+if ( its_alloc_device_irq(dev, plpi) || !msi )
+{
+its_discard_lpis(dev, i);
+
On Mon, 17 Aug 2015, Eric Dumazet wrote:
[PATCH] timer: fix a race in __mod_timer()
lock_timer_base() can not catch following :
CPU1 ( in __mod_timer()
timer-flags |= TIMER_MIGRATING;
spin_unlock(base-lock);
base = new_base;
spin_lock(base-lock);
timer-flags = ~TIMER_BASEMASK;
On Mon, 2015-08-17 at 00:55 +, Kun Cheng wrote:
On Mon, Aug 17, 2015 at 12:16 AM Frediano Ziglio fredd...@gmail.com
What I'm planing is adding page migration support for NUMA aware
scheduling. In such a case the most time I'll be dealing with Xen's
memory management scheduling part
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
Parse host dt and generate ITS node for Dom0.
ITS node resides inside GIC node so when GIC node
is encountered look for ITS node.
Signed-off-by: Vijaya Kumar K
Hi,
On 17/08/2015 06:01, Shannon Zhao wrote:
On 2015/8/14 23:17, Julien Grall wrote:
On 14/08/15 15:59, Shannon Zhao wrote:
2. Create minimal DT to pass required information to Dom0
--
The minimal DT mainly passes Dom0 bootargs,
On Sun, Aug 16, 2015 at 01:22:05PM -0400, Konrad Rzeszutek Wilk wrote:
On August 16, 2015 9:48:05 AM EDT, George Diamantopoulos
georged...@gmail.com wrote:
Hello,
I've been trying to compile xen with multiboot2 support, but building
has
been failing. Tried with both gcc-4.8.4 and gcc-5.2
flight 60706 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60706/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are
63 matches
Mail list logo