When you say "not tools", I take it to mean that you're not exposing
that option through the libxl interface?
Yes.
tools/libxc/xc_domain.c:xc_assign_dt_device() most certainly does pass
it in, and that's the level I'm talking about. Someone reviewing this
patch series needs to know, when xc
flight 59019 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59019/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
flight 59010 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59010/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-libvirt-xsm 11 guest-start fail like 58973
test-amd64-i386-libvirt
I don't happen to think these "override" semantics are actually going to
turn out to be that useful; I do think a "default" semantic would be
useful. But I'd be content if the name of the current setting were
switched to "override" to make the semantics more clear. We can always
add in "default"
> -Original Message-
> From: Wu, Feng
> Sent: Thursday, July 02, 2015 12:33 PM
> To: Dario Faggioli
> Cc: xen-devel; k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com;
> Tian, Kevin; Zhang, Yang Z; george.dun...@eu.citrix.com; Wu, Feng
> Subject: RE: Fwd: [v3 14/15] Update Posted
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Tuesday, June 30, 2015 10:58 AM
> To: Wu, Feng
> Cc: xen-devel; k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com;
> Tian, Kevin; Zhang, Yang Z; george.dun...@eu.citrix.com; Wu, Feng
> Subject:
Hi Dario,
2015-06-30 10:14 GMT-07:00 Dario Faggioli :
> Hey Meng,
>
> you wanted to "get in touch" with OSSTest failures for RTDS, didn't you?
> Well, Here you go! :-P
>
Yes. Thank you very much for cc. me and the very useful explanation of
how to read the log!
> [I'm adding IanC and Julien, as
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Wednesday, July 01, 2015 9:26 PM
> To: Andrew Cooper
> Cc: Wu, Feng; xen-devel@lists.xen.org; Zhang, Yang Z;
> george.dun...@eu.citrix.com; Tian, Kevin; k...@xen.org; jbeul...@suse.com
> Subject: Re: [X
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Tuesday, June 30, 2015 6:12 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; Tian, Kevin; Zhang, Yang Z;
> george.dun...@eu.citrix.com
> Subject: Re: [v3 12/15] vmx: post
flight 59006 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59006/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build fail REGR. vs. 58988
Regressions which are regard
On 07/01/2015 11:12 PM, Roger Pau Monne wrote:
Install the libnl3 packages needed by the remus code. Those are available on
both Wheezy and Jessie, although the Wheezy ones are too old.
Thanks!
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Shriram Rajagopalan
Cc: Y
flight 59003 linux-3.0 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59003/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 15418
test-amd64-amd64-xl-qem
If I'm correct, then #3 means it's not possible to have devices for a
domain *default* to strict, but to be relaxed in individual
instances.
If you had five devices you wanted strict, and only one device you
wanted to be relaxed (because you knew it didn't matter), you'd have
to set reserved=stric
Ian Campbell, le Fri 26 Jun 2015 12:06:09 +0100, a écrit :
> Also contains a fix from Thomas Leonard (to use %u for "4 + 32", not
> %lu) previously posted as part of "mini-os: enable compiler check for
> printk format types" but with mini-os now having been split a separate
> repo most of that chan
Ian Campbell, le Fri 26 Jun 2015 11:58:40 +0100, a écrit :
> This is under #ifdef HAVE_LIBC so went unnoticed before.
>
> Signed-off-by: Ian Campbell
Acked-by: Samuel Thibault
> ---
> tpm_tis.c |2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/tpm_tis.c b/tpm_tis.c
flight 59004 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59004/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-xsm 11 guest-start fail REGR. vs. 58842
Regressions which are reg
flight 59001 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59001/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Regressions which are
flight 58999 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58999/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 58965
Reg
On 07/01/2015 09:34 AM, Stefano Stabellini wrote:
On Wed, 1 Jul 2015, Dario Faggioli wrote:
On Wed, 2015-07-01 at 13:50 +0100, Stefano Stabellini wrote:
--- /dev/null
+++ b/docs/misc/qemu-deprivilege.txt
@@ -0,0 +1,31 @@
+For security reasons, libxl tries to pass a non-root username to QEMU as
flight 58997 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58997/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are failing
On Sat, Jun 27, 2015 at 07:27:44PM -0400, Don Slutz wrote:
> From: Don Slutz
>
> This adds synchronization of the 6 vcpu registers (only 32bits of
> them) that vmport.c needs between Xen and QEMU.
>
> This is to avoid a 2nd and 3rd exchange between QEMU and Xen to
> fetch and put these 6 vcpu re
On 07/01/2015 02:23 AM, Fabio Fantoni wrote:
Il 01/07/2015 02:04, Jim Fehlig ha scritto:
On 06/30/2015 07:55 AM, Stefano Stabellini wrote:
Try to use "xen-qemudepriv-domid$domid" first, then
"xen-qemudepriv-shared" and root if everything else fails.
The uids need to be manually created by the
On Sat, Jun 27, 2015 at 07:27:40PM -0400, Don Slutz wrote:
> From: Don Slutz
>
> This is used to set xen_arch_domainconfig vmware_hw. It is set to
> the emulated VMware virtual hardware version.
>
> Currently 0, 3-4, 6-11 are good values. However the code only
> checks for == 0, != 0, or < 7.
>
> diff --git a/tools/libxl/libxl_x86.c b/tools/libxl/libxl_x86.c
> index ed2bd38..651b338 100644
> --- a/tools/libxl/libxl_x86.c
> +++ b/tools/libxl/libxl_x86.c
> @@ -5,8 +5,8 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
>libxl_domain_config *d_con
On Wed, Jul 01, 2015 at 11:29:46AM +0100, Stefano Stabellini wrote:
> On Tue, 30 Jun 2015, Konrad Rzeszutek Wilk wrote:
> > On Tue, Jun 30, 2015 at 03:13:53PM +0100, Ian Campbell wrote:
> > > On Tue, 2015-06-30 at 15:02 +0100, Stefano Stabellini wrote:
> > > > On Tue, 30 Jun 2015, Ian Campbell wrot
3.14-stable review patch. If anyone has any objections, please let me know.
--
From: Konrad Rzeszutek Wilk
commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream.
A huge amount of NIC drivers use the DMA API, however if
compiled under 32-bit an very important part of the DMA
3.10-stable review patch. If anyone has any objections, please let me know.
--
From: Konrad Rzeszutek Wilk
commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream.
A huge amount of NIC drivers use the DMA API, however if
compiled under 32-bit an very important part of the DMA
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index 58d4951..576b28d 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -1514,6 +1514,13 @@ void p2m_mem_access_emulate_check(struct vcpu *v,
> }
> }
>
> +void p2m_altp2m_check(struct vcpu *v, const vm_event_
From: Elena Ufimtseva
Release memory allocated for scope.devices when disabling
dmar units. Also set device count after memory allocation when
device scope parsing.
This is explanation of why the code should be moved imho and
answers Jan question about why I needed to do this.
In acpi_parse_one_d
On Wed, Jul 01, 2015 at 02:01:07PM +0100, Stefano Stabellini wrote:
> On Mon, 29 Jun 2015, Konrad Rzeszutek Wilk wrote:
> > In Xen 4.6 commit cd2f100f0f61b3f333d52d1737dd73f02daee592
> > "libxc: Fix do_memory_op to return negative value on errors"
> > made the libxc API less odd-ball: On errors, re
On Wed, Jul 01, 2015 at 11:00:45AM +0100, Andrew Cooper wrote:
> On 01/07/15 00:20, elena.ufimts...@oracle.com wrote:
> > --- a/xen/drivers/passthrough/vtd/dmar.c
> > +++ b/xen/drivers/passthrough/vtd/dmar.c
> > @@ -81,6 +81,13 @@ static int __init acpi_register_rmrr_unit(struct
> > acpi_rmrr_unit
From: Ravi Sahita
Signed-off-by: Ravi Sahita
---
tools/flask/policy/policy/modules/xen/xen.if | 4 +-
xen/arch/x86/hvm/hvm.c | 118 ---
xen/include/xsm/dummy.h | 12 +++
xen/include/xsm/xsm.h| 12 +++
The altp2mhvm and nestedhvm parameters are mutually
exclusive and cannot be set together.
Signed-off-by: Ed White
---
docs/man/xl.cfg.pod.5 | 12
tools/libxl/libxl_create.c | 1 +
tools/libxl/libxl_dom.c | 2 ++
tools/libxl/libxl_types.idl | 1 +
tools/
Add the remaining routines required to support enabling the alternate
p2m functionality.
Signed-off-by: Ed White
---
xen/arch/x86/hvm/hvm.c | 58 +-
xen/arch/x86/mm/hap/Makefile | 1 +
xen/arch/x86/mm/hap/altp2m_hap.c | 98 ++
xen/arch/x86/mm/p2m-ept.c| 3
The existing ept_set_entry() and ept_get_entry() routines are extended
to optionally set/get suppress_ve and renamed. New ept_set_entry() and
ept_get_entry() routines are provided as wrappers, where set preserves
suppress_ve for an existing entry and sets it for a new entry.
Additional function po
Add a flag to indicate that a memory event occurred in an alternate p2m
and a field containing the p2m index. Allow any event response to switch
to a different alternate p2m using the same flag and field.
Modify p2m_memory_access_check() to handle alternate p2m's.
Signed-off-by: Ed White
---
xe
Signed-off-by: Ed White
---
xen/arch/x86/hvm/hvm.c | 201
xen/include/public/hvm/hvm_op.h | 69 ++
2 files changed, 270 insertions(+)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index d2d90c8..0d81050 100644
--- a/xe
In preparation for selectively enabling #VE in a later patch, set
suppress #VE on all EPTE's.
Suppress #VE should always be the default condition for two reasons:
it is generally not safe to deliver #VE into a guest unless that guest
has been modified to receive it; and even then for most EPT viol
This set of patches adds support to hvm domains for EPTP switching by creating
multiple copies of the host p2m (currently limited to 10 copies).
The primary use of this capability is expected to be in scenarios where access
to memory needs to be monitored and/or restricted below the level at which
Add the basic data structures needed to support alternate p2m's and
the functions to initialise them and tear them down.
Although Intel hardware can handle 512 EPTP's per hardware thread
concurrently, only 10 per domain are supported in this patch for
performance reasons.
The iterator in hap_enab
From: Ravi Sahita
Signed-off-by: Ravi Sahita
---
xen/arch/x86/hvm/emulate.c | 12 +++--
xen/arch/x86/hvm/vmx/vmx.c | 30 +
xen/arch/x86/x86_emulate/x86_emulate.c | 48 +-
xen/arch/x86/x86_emulate/x86_emulate.h | 4
Implement and hook up the code to enable VMX support of VMFUNC and #VE.
VMFUNC leaf 0 (EPTP switching) emulation is added in a later patch.
Signed-off-by: Ed White
---
xen/arch/x86/hvm/vmx/vmx.c | 138 +
1 file changed, 138 insertions(+)
diff --git a
From: Andrew Cooper
For use on codepaths which would need to use domain_pause() but might be in
the target domain's context. In the case that the target domain is in
context, all other vcpus are paused.
Signed-off-by: Andrew Cooper
---
xen/common/domain.c | 28
As implemented here, only supported on platforms with VMX HAP.
By default this functionality is force-disabled, it can be enabled
by specifying altp2m=1 on the Xen command line.
Signed-off-by: Ed White
Reviewed-by: Andrew Cooper
---
docs/misc/xen-command-line.markdown | 7 +++
xen/arch/x8
Currently, neither is enabled globally but may be enabled on a per-VCPU
basis by the altp2m code.
Remove the check for EPTE bit 63 == zero in ept_split_super_page(), as
that bit is now hardware-defined.
Signed-off-by: Ed White
Reviewed-by: Andrew Cooper
---
xen/arch/x86/hvm/vmx/vmcs.c
Hello,
I want to know about Blktap asynchronous i/o read write operations on VHD.
I want to know detail flow of program block-VHD.c . How the read write
operations are performed on VHD .
And any improvement in code would be done for better read write operations.
Description about dynamic disk struc
If xc_domain_get_guest_width were to fail, guest_width is not set, and
hence guest_64bit becomes undefined.
Fix is to initialise to 0, and report error if call fails.
Signed-off-by: Jennifer Herbert
---
tools/libxc/xc_cpuid_x86.c |8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
If xc_hvm_param_get fails, is_pae and/or is_nestedhvm are left undefined.
This patch Indicates error and defaults to false.
Signed-off-by: Jennifer Herbert
---
tools/libxc/xc_cpuid_x86.c | 18 +-
1 file changed, 13 insertions(+), 5 deletions(-)
diff --git a/tools/libxc/xc_cpui
hvm_info->signature is not a string, but an 64 bit int, and is not
NULL terminated. The use of strncpy to populate it is inappropriate and
potentially misleading. A cursory glance might have you thinking someone
had miscounted the length of the string literal - not realising it was
intentionally
The return from xc_dom_allocate is not checked for a NULL value.
This patch fixes this, causing it to return from the function with an error.
Signed-off-by: Jennifer Herbert
---
tools/libxc/xc_dom_compat_linux.c |6 ++
1 file changed, 6 insertions(+)
diff --git a/tools/libxc/xc_dom_comp
The only place that jumps to 'err:' does so because !dom, which is
rechecked in 'err:'. This patch simplifies, giving the same result.
Signed-off-by: Jennifer Herbert
---
tools/libxc/xc_dom_core.c |7 +--
1 file changed, 1 insertion(+), 6 deletions(-)
diff --git a/tools/libxc/xc_dom_co
Unlikely that it may seem localtime_r could fail, which would result in a
null pointer dereference. In this case, one can simply just skip logging the
date/time, and logging anything is more useful then nothing.
Signed-off-by: Jennifer Herbert
---
tools/libxc/xtl_logger_stdio.c |9 +
By adding the const keyword, it is clearer to people and static analysis
tools that no changes to the data are to be made.
Signed-off-by: Jennifer Herbert
---
tools/libxc/xc_core.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxc/xc_core.c b/tools/libxc/xc_core.
Fix a number of coverity issues in libxc.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 07/01/2015 04:42 AM, Stefano Stabellini wrote:
On Tue, 30 Jun 2015, Jim Fehlig wrote:
On 06/30/2015 07:55 AM, Stefano Stabellini wrote:
[...]
b/docs/misc/qemu-deprivilege.txt
new file mode 100644
index 000..783874b
--- /dev/null
+++ b/docs/misc/qemu-deprivilege.txt
@@ -0,0 +1,26 @@
+For
On Wed, Jul 1, 2015 at 7:50 AM, Dario Faggioli
wrote:
> On Wed, 2015-07-01 at 09:48 +0100, Ian Campbell wrote:
>> On Tue, 2015-06-30 at 17:54 -0700, Meng Xu wrote:
>> > 2015-06-30 9:19 GMT-07:00 Ian Campbell :
>> > > Note that this field is not the same as the others in this struct, it is
>> > > i
On 01/07/15 17:13, Stefano Stabellini wrote:
> On Wed, 1 Jul 2015, Andrew Cooper wrote:
>> On 01/07/15 16:51, Boris Ostrovsky wrote:
>>> On 07/01/2015 11:46 AM, Andrew Cooper wrote:
On 01/07/15 15:46, Roger Pau Monne wrote:
> Introduce a new DOMCTL flag that can be used to disable device
>
On Tue, Jun 23, 2015 at 10:57 AM, Tiejun Chen wrote:
> This patch enables XENMEM_memory_map in hvm. So hvmloader can
> use it to setup the e820 mappings.
>
> CC: Keir Fraser
> CC: Jan Beulich
> CC: Andrew Cooper
> Signed-off-by: Tiejun Chen
> Reviewed-by: Tim Deegan
> Reviewed-by: Kevin Tian
On Tue, Jun 23, 2015 at 10:57 AM, Tiejun Chen wrote:
> This patch extends the existing hypercall to support rdm reservation policy.
> We return error or just throw out a warning message depending on whether
> the policy is "strict" or "relaxed" when reserving RDM regions in pfn space.
> Note in so
On Wed, 1 Jul 2015, Andrew Cooper wrote:
> On 01/07/15 16:51, Boris Ostrovsky wrote:
> > On 07/01/2015 11:46 AM, Andrew Cooper wrote:
> >> On 01/07/15 15:46, Roger Pau Monne wrote:
> >>> Introduce a new DOMCTL flag that can be used to disable device
> >>> emulation
> >>> inside of Xen for HVM guest
On 07/01/2015 11:57 AM, Ian Campbell wrote:
The next Xen technical call will be at:
Wed 8 Jul 17:00:00 BST 2015
`date -d @1436371200`
See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
for more information on the call.
Please let me know (CC-ing the list) any topi
On 01/07/15 17:15, Boris Ostrovsky wrote:
> On 07/01/2015 11:57 AM, Ian Campbell wrote:
>> The next Xen technical call will be at:
>> Wed 8 Jul 17:00:00 BST 2015
>> `date -d @1436371200`
>>
>> See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
>> for more information
On 01/07/15 14:41, Ben Catterall wrote:
> Reworked the internals and declaration, applying (un)boxing
> where needed. Converted calls to map_domain_page() to
> provide mfn_t types, boxing where needed.
>
> Signed-off-by: Ben Catterall
> ---
> xen/arch/arm/domain_build.c | 2 +-
> x
On 01/07/15 14:57, Andrew Cooper wrote:
> On 01/07/15 14:41, Ben Catterall wrote:
>> From: Andrew Cooper
>>
>> Signed-off-by: Andrew Cooper
>> [Convert grant_table.c to pass mfn_t types and fix ARM compiling]
>>
>> Signed-off-by: Ben Catterall
>
> Reviwed-by: Andrew Cooper for the additions
>
On 01/07/15 17:07, David Vrabel wrote:
> On 01/07/15 14:57, Andrew Cooper wrote:
>> On 01/07/15 14:41, Ben Catterall wrote:
>>> From: Andrew Cooper
>>>
>>> Signed-off-by: Andrew Cooper
>>> [Convert grant_table.c to pass mfn_t types and fix ARM compiling]
>>>
>>> Signed-off-by: Ben Catterall
>> R
On 01/07/15 16:51, Boris Ostrovsky wrote:
> On 07/01/2015 11:46 AM, Andrew Cooper wrote:
>> On 01/07/15 15:46, Roger Pau Monne wrote:
>>> Introduce a new DOMCTL flag that can be used to disable device
>>> emulation
>>> inside of Xen for HVM guests. The following emulated devices are
>>> disabled
>>
The next Xen technical call will be at:
Wed 8 Jul 17:00:00 BST 2015
`date -d @1436371200`
See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
for more information on the call.
Please let me know (CC-ing the list) any topics which you would like to
discuss. It might be
On 07/01/2015 11:46 AM, Andrew Cooper wrote:
On 01/07/15 15:46, Roger Pau Monne wrote:
Introduce a new DOMCTL flag that can be used to disable device emulation
inside of Xen for HVM guests. The following emulated devices are disabled
when the XEN_DOMCTL_CDF_noemu is used: hpet, pmtimer, rtc, ioa
On 01/07/15 15:46, Roger Pau Monne wrote:
> Introduce a new DOMCTL flag that can be used to disable device emulation
> inside of Xen for HVM guests. The following emulated devices are disabled
> when the XEN_DOMCTL_CDF_noemu is used: hpet, pmtimer, rtc, ioapic, lapic,
> pic and pmu. Also all the MM
On Tue, Jun 23, 2015 at 10:57 AM, Tiejun Chen wrote:
> We will create this sort of identity mapping as follows:
>
> If the gfn space is unoccupied, we just set the mapping. If space
> is already occupied by desired identity mapping, do nothing.
> Otherwise, failure is returned.
>
> And we also add
> -Original Message-
> From: Roger Pau Monné [mailto:roger@citrix.com]
> Sent: 01 July 2015 16:35
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Cc: Kevin Tian; Jan Beulich; Jun Nakajima; Andrew Cooper; Eddie Dong;
> Aravind Gopalakrishnan; Suravee Suthikulpanit; Boris Ostrovsky
>
On Wed, 1 Jul 2015, Dario Faggioli wrote:
> On Wed, 2015-07-01 at 13:50 +0100, Stefano Stabellini wrote:
> > --- /dev/null
> > +++ b/docs/misc/qemu-deprivilege.txt
> > @@ -0,0 +1,31 @@
> > +For security reasons, libxl tries to pass a non-root username to QEMU as
> > +argument. During initialization
El 01/07/15 a les 17.25, Paul Durrant ha escrit:
>> -Original Message-
>> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
>> boun...@lists.xen.org] On Behalf Of Roger Pau Monne
>> Sent: 01 July 2015 15:46
>> To: xen-de...@lists.xenproject.org
>> Cc: Kevin Tian; Jan Beulich; Jun Nak
On Wed, 2015-07-01 at 13:50 +0100, Stefano Stabellini wrote:
> --- /dev/null
> +++ b/docs/misc/qemu-deprivilege.txt
> @@ -0,0 +1,31 @@
> +For security reasons, libxl tries to pass a non-root username to QEMU as
> +argument. During initialization QEMU calls setuid and setgid with the
> +user ID and
> -Original Message-
> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
> boun...@lists.xen.org] On Behalf Of Roger Pau Monne
> Sent: 01 July 2015 15:46
> To: xen-de...@lists.xenproject.org
> Cc: Kevin Tian; Jan Beulich; Jun Nakajima; Andrew Cooper; Eddie Dong;
> Aravind Gopalakrish
flight 58996 linux-3.16 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58996/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 12 guest-start/redhat.repeat fail REGR.
vs. 58447
Regressions w
On 06/26/2015 11:28 AM, Jan Beulich wrote:
>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>> > +++ b/xen/arch/x86/hvm/vmx/vmx.c
>> > @@ -2010,9 +2010,9 @@ static int vmx_cr_access(unsigned long
>> > exit_qualification)
>> > }
>> > case VMX_CONTROL_REG_ACCESS_TYPE_CLTS: {
>> > unsigned long
Introduce a new DOMCTL flag that can be used to disable device emulation
inside of Xen for HVM guests. The following emulated devices are disabled
when the XEN_DOMCTL_CDF_noemu is used: hpet, pmtimer, rtc, ioapic, lapic,
pic and pmu. Also all the MMIO handlers are disabled.
Signed-off-by: Roger Pa
Change the physical memory address of the special pages when there are no
emulated devices. On HVM guests the special pages have always been reserved
so that they end at the 0xff000 pfn, but there are some problems with this
approach when used without emulated devices:
- If we want to allow HVMli
Allow device_model_version to be set to "none" in order to request the
creation of a HVM guest without emulated devices. This disables the VGA
and MMIO memory holes and the ioreq server pages.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
-
HVM guests have always used the emulated serial console by default, but if
the emulated serial pty cannot be fetched from xenstore try to use the PV
console instead.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/console/client/ma
Remove xc_hvm_build_x86.c and xc_hvm_build_arm.c since xc_hvm_build is not
longer used in order to create HVM guests.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxc/Makefile | 2 -
tools/libxc/include/xenguest
This HVM parameter returns the first free pfn after all the special pages.
It can be used by guests to figure out the first free memory address after
the kernel, ramdisk and special pages. This is interesting for compatibility
reasons in case more special pages are later added, older guests can sti
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
VCPUOP_is_up hypercalls from HVM guests.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/hvm.c | 8
1 file changed, 8 insertions(+)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arc
This HVM parameter is used to pass a list of loaded modules to the guest.
Right now the number of loaded modules is limited to 1 by the current
implementation, but this interface allows passing more than one module.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian C
This HVM parameter returns a PFN that contains the address of the memory
page where the guest command line has been placed.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Jan Beulich
Cc: Andrew Cooper
---
tools/libxc/xc_dom_x86.c
This new elfnote contains the 32bit entry point into the kernel. Xen will
use this entry point in order to launch the guest kernel in 32bit protected
mode with paging disabled.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xcutil
If there's no device model running nic type is always LIBXL_NIC_TYPE_VIF.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl/libxl_create.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/tools/libxl/libxl_create.c b/to
Enable this hypercall for HVM guests in order to fetch the e820 memory
map in the absence of an emulated BIOS. The memory map is populated and
notified to Xen in arch_setup_meminit_hvm.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Jan
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM
builder now uses the PV xc_dom_* set of functions this kernel will be parsed
and loaded inside the guest like on PV, but the container is a pure HVM
guest.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stab
Install the libnl3 packages needed by the remus code. Those are available on
both Wheezy and Jessie, although the Wheezy ones are too old.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Ian Campbell
Cc: Shriram Rajagopalan
Cc: Yang Hongyang
---
ts-xen-build-prep | 8 +---
1 file chan
On 01/07/15 15:50, Ian Campbell wrote:
> On Wed, 2015-07-01 at 15:37 +0100, Julien Grall wrote:
>>> AFIACT the default is "offer the guest the hardware's native version".
>>
>> This is true when the domain is firstly created. But this will be
>> confusing if the user decide to migrate the guest to
Hi,
On 01/07/15 15:39, George Dunlap wrote:
> Then make the meaning of the flags as follows:
> * for pci devices:
> - RDM_RELAXED flag SET: ignore conflicts in set_identity_p2m_entry()
> - RDM_RELAXED flag CLEAR: error on conflicts in set_identity_p2m_entry()
> * for dt devices:
> - Ignore this
On Tue, 30 Jun 2015, Ian Jackson wrote:
> > > * The number and nature of parallel operations done in the stress
> > > test is unreasonable for the provided hardware:
> > > => the timeout is fine
> >
> > I don't know if it is our place to make this call. Should we really be
> > decidin
No longer send reports, or copies, to named individuals. Instead,
send all output to the new osstest-output list (CC other appropriate
lists).
After this patch goes live, people interested in bisection progress
emails will find them in the new list. (There are a lot of these.)
(Configurations f
On Wed, 2015-07-01 at 15:35 +0100, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH OSSTEST v2] mg-all-branch-statuses: Show how
> up to date each branch is"):
> > On Wed, 2015-07-01 at 14:37 +0100, Ian Jackson wrote:
> > > These -??-?? are quite visually noisy.
> >
> > Agreed, I did con
On Wed, 2015-07-01 at 15:37 +0100, Julien Grall wrote:
> > AFIACT the default is "offer the guest the hardware's native version".
>
> This is true when the domain is firstly created. But this will be
> confusing if the user decide to migrate the guest to a platform where
> the native GIC is differ
Introduce a very simple (and dummy) domain loader to be used to load the
firmware (hvmloader) into HVM guests. Since hmvloader is just a 32bit elf
executable the loader is fairly simple.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
to
Now that we have all the code in place HVM domain building in libxl can be
switched to use the xc_dom_* family of functions, just like they are used in
order to build PV guests.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl
Unify both functions into xc_dom_p2m. Should not introduce any functional
change.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Samuel Thibault
---
stubdom/grub/kexec.c | 4 ++--
tools/libxc/include/xc_dom.h | 14 ++
1 - 100 of 238 matches
Mail list logo