On Thu, Oct 15, 2015 at 01:32:44PM +0200, Daniel Wagner wrote:
> The cpu hotplug state machine in smpboot.c is reusing the states from
> cpu.h. That is confusing when it comes to the CPU_DEAD_FROZEN usage.
> Paul explained to me that he was in need of an additional state
> for destinguishing betwee
This run is configured for baseline tests only.
flight 38257 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38257/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-qcow2 7 host-ping-check-xen
flight 63706 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63706/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 5 kernel-build fail REGR. vs. 62642
Tests which are failin
flight 63703 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63703/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 6 xen-boot fail REGR. vs. 62277
test-amd64-i386-qemuu-r
flight 63705 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63705/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 11 guest-start fail like 63585
Tests which did not succeed,
This run is configured for baseline tests only.
flight 38256 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38256/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 45419de6ca5bad34567e0ca2a16a4bc78f6a6f63
baseline version:
ovm
flight 63704 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63704/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 45419de6ca5bad34567e0ca2a16a4bc78f6a6f63
baseline version:
ovmf b9ffeab7b0856db6409b53efbba51b8c336
This run is configured for baseline tests only.
flight 38255 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38255/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-rumpuserxen-amd64 13 rumpuserxen-demo-x
On Fri, Nov 06, 2015, Joanna Rutkowska wrote
> [snip] I was then asked to share some more
> thoughts about how I thought Xen could actually improve its security
> process [4].
Thanks Joanna for taking the time to put these thoughts into writing.
I think there are a number of actionable things here
On Thu, Nov 05, 2015 at 10:12:26AM -0700, Jan Beulich wrote:
> >>> On 02.11.15 at 18:12, wrote:
> > --- a/xen/arch/x86/domain.c
> > +++ b/xen/arch/x86/domain.c
> > @@ -237,6 +237,7 @@ struct domain *alloc_domain_struct(void)
> > #ifdef CONFIG_BIGMEM
> > const unsigned int bits = 0;
> > #els
From: Martin Pohlack
The mechanism to get this is via the XENVER_build_id and
we add a new subsequent sub-command to retrieve the
binary build-id. The hypercall allows an arbitrary
size (the buffer and len is provided to the hypervisor).
Note that one can also retrieve the value by 'readelf -h x
Since v1 (http://lists.xen.org/archives/html/xen-devel/2015-10/msg01090.html)
- Made it work on EFI
- Compiles on ARM
- Redid it per comments.
Attached are the three patches that will add XENVER_build_id and
add the proper bits in libxl/libxc.
However they also change the behavior of the exist
If the hypervisor is built with we will display it.
Signed-off-by: Konrad Rzeszutek Wilk
---
v2: Include HAVE_*, use libxl_zalloc, s/rc/ret/
---
tools/libxl/libxl.c | 24
tools/libxl/libxl.h | 5 +
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_c
All of XENVER_* have now an XSM check.
The subops for XENVER_[compile_info|changeset|commandline|
extraversion] are now priviliged operations. To not break
guests we still return an string - but it is just ''.
The rest: XENVER_[version|capabilities|
parameters|get_features|page_size|guest_handle]
flight 63700 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63700/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-migrupgrade 21 guest-migrate/src_host/dst_host fail REGR. vs.
63212
Tests whic
> Does your kernel have the Xen drivers (CONFIG_XEN and all which is
> gated on that) enabled. In particular CONFIG_HVC_XEN.
>
Yes the config file I used to compile has CONFIG_XEN=y and
CONFIG_HVC_XEN=y. Config file is attached.
#
# Automatically generated file; DO NOT EDIT.
# Linux/arm 4.3.0-rc
HI Edgar,
Thank you so much for your reply!
2015-11-06 13:25 GMT-05:00 Edgar E. Iglesias :
> On Fri, Nov 06, 2015 at 01:19:04PM -0500, Meng Xu wrote:
> > Hi,
>
> Hi Meng,
>
> >
> > I saw Xen is supported on Xilinx ZynqMP platform at [1].
> > I want to have a look at the real hardware of the Xil
flight 63678 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63678/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 6 xen-boot fail REGR. vs. 60684
test-amd64
On 06/11/15 17:37, David Vrabel wrote:
> out:
> if ( fdom )
> rcu_unlock_domain(fdom);
> return rc;
> }
> +
> +int p2m_setup(void)
> +{
> +unsigned int cpu;
> +
> +for_each_present_cpu(cpu)
> +INIT_PAGE_LIST_HEAD(&per_cpu(p2m_deferred_free_pages, cpu));
> +
> +
On 06/11/15 17:37, David Vrabel wrote:
> When using EPT, type changes are done with the following steps:
>
> 1. Set entry as invalid (misconfigured) by settings a reserved memory
> type.
>
> 2. Flush all EPT and combined translations (ept_sync_domain()).
>
> 3. Fixup misconfigured entries as requir
On Fri, Nov 06, 2015 at 01:19:04PM -0500, Meng Xu wrote:
> Hi,
Hi Meng,
>
> I saw Xen is supported on Xilinx ZynqMP platform at [1].
> I want to have a look at the real hardware of the Xilinx ZynqMP
> platform and probably buy on to play with it.
>
> However, after several googling, I couldn't
Hi,
I saw Xen is supported on Xilinx ZynqMP platform at [1].
I want to have a look at the real hardware of the Xilinx ZynqMP
platform and probably buy on to play with it.
However, after several googling, I couldn't find anywhere to buy it.
I'm wondering
(a) if Xilinx has the real hardware now a
On 06/11/15 17:21, Paul Durrant wrote:
> It is useful to be able to see the network addresses in use by a domain
> for a particular vif in xenstore, for example so that ssh can be invoked
> by a toolstack to log into the guest domain.
>
> This patch documents paths to allow a domain to advertise MA
On 06/11/15 17:21, Paul Durrant wrote:
> Without some indication from an HVM domain it is not possible for a
> toolstack to know whether instantiation of a new vbd or vif should
> result in a new PV device of the appropriate type being instantiated
> in a guest. (In other words whether PV drivers a
Hi,
[These lists are in the MAINTAINERS file for mpt2sas; I hope this is
the correct place to report this problem. Xen-devel CCd as this is
failing on trying to boot Xen]
When booting Xen, mpt2sas finds my Intel RMS25JB080, but fails to load
it correctly.
This is a Debian jessie (stable) system,
On 06/11/15 17:21, Paul Durrant wrote:
> ...to be advertised by a guest.
>
> For domain management purposes it is convenient to be able to see
> PV driver version information in xenstore. The XAPI toolstack in
> XenServer has always created a ~/drivers path for this purpose.
>
> This patch document
flight 63702 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63702/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 63340
Tests which did not succe
flight 63676 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63676/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 63369
Regre
On Thu, 5 Nov 2015, Jan Beulich wrote:
> >>> On 05.11.15 at 17:57, wrote:
> > --- a/xen/common/time.c
> > +++ b/xen/common/time.c
> > @@ -16,7 +16,13 @@
> > */
> >
> > #include
> > +#include
> > +#include
> > +#include
> > #include
> > +#include
> > +#include
> > +
> >
> > /* Nonze
When using EPT, type changes are done with the following steps:
1. Set entry as invalid (misconfigured) by settings a reserved memory
type.
2. Flush all EPT and combined translations (ept_sync_domain()).
3. Fixup misconfigured entries as required (on EPT_MISCONFIG vmexits or
when explicitly sett
Holding the p2m lock while calling ept_sync_domain() is very expensive
since it does a on_selected_cpus() call. IPIs on many socket machines
can be very slows and on_selected_cpus() is serialized.
Defer the invalidate until the p2m lock is released. Since the processor
may cache partial translat
If a page is freed without translations being invalidated, and the page is
subsequently allocated to another domain, a guest with a cached
translation will still be able to access the page.
Currently translations are invalidated before releasing the page ref, but
while still holding the mm locks.
This RFC series improves the performance of EPT by reducing the impact
of the translation invalidations (ept_sync_domain()). Two approaches
are used:
a) Removing unnecessary invalidations after fixing misconfigured
entries (after a type change).
b) Deferring invalidations until the p2m write
- Incorporated feedback from
http://lists.xenproject.org/archives/html/xen-devel/2015-06/msg01992.html
Open Issues:
- Did not build and test the doc yet (want to get the content right first)
- Decide on supported status in MAINTAINER file
- Resolve loose ends on where and how to record Feature S
> -Original Message-
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: 06 November 2015 17:22
> To: xen-de...@lists.xenproject.org
> Cc: Paul Durrant
> Subject: [PATCH 2/4] docs: Document a path for PV driver version
> information...
>
> ...to be advertised by a guest.
>
> For
On Fri, Nov 06, 2015 at 04:05:25AM -0700, Jan Beulich wrote:
> >>> On 06.11.15 at 05:22, wrote:
> > On Wed, Oct 28, 2015 at 10:05:31AM -0600, Jan Beulich wrote:
> >> >>> On 27.10.15 at 21:36, wrote:
> >> > +static void __init add_extra_rmrr(void)
> >> > +{
> >> > +struct acpi_rmrr_unit *acpi_
...to be advertised by a guest.
For domain management purposes it is convenient to be able to see
PV driver version information in xenstore. The XAPI toolstack in
XenServer has always created a ~/drivers path for this purpose.
This patch documents that path and also adds a specification of how
it
Without some indication from an HVM domain it is not possible for a
toolstack to know whether instantiation of a new vbd or vif should
result in a new PV device of the appropriate type being instantiated
in a guest. (In other words whether PV drivers are present and
functioning).
This patch docume
...to be advertised by a guest.
For domain management purposes it is convenient to be able to see
PV driver version information in xenstore. The XAPI toolstack in
XenServer has always created a ~/drivers path for this purpose.
This patch documents that path and also adds a specification of how
it
It is useful to be able to see the network addresses in use by a domain
for a particular vif in xenstore, for example so that ssh can be invoked
by a toolstack to log into the guest domain.
This patch documents paths to allow a domain to advertise MAC (unicast
and multicast) and IP (versions 4 and
Patch #1 documents paths, some already in used by XenServer, which can be
used by guests to advertise contol capabilities.
Patch #2 documents paths which can be used to advertise PV driver versions.
Patch #3 documents paths which can be used by guests to advertise hotplug
capabilities.
Patch #4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
Recently Xen has released the XSA-148 advisory [1] addressing a fatal bug in the
hypervisor. The bug has been lurking there for the last 7 years! We, the Qubes
OS Project, have commented on this in our Security Bulletin #22 [2]. And far
from en
...via xenstore.
XenServer already makes use of ~/control/feature-suspend being written
to advertise guest capability of responding to 'suspend' when written to
~/control/shutdown and, since they are derived from XenServer drivers,
the Xen Project Windows PV drivers attempt to write this value. Th
flight 63720 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63720/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
On 06/11/15 16:05, Roger Pau Monne wrote:
> The HVM related code (SVM, VMX) generally assumed that a local apic is
> always present. With the introduction of a HVM mode were the local apic can
> be removed, some of this broken code paths arised.
>
> The SVM exit/resume paths unconditionally checked
This structure contains the physical address of the command line, as well as
the physical address of the list of loaded modules. The physical address of
this structure is passed to the guest at boot time in the %ebx register.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: We
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
VCPUOP_is_up hypercalls from HVM guests.
This patch introduces a new structure (vcpu_hvm_context) that should be used
in conjuction with the VCPUOP_initialise hypercall in order to initialize
vCPUs for HVM guests.
Signed-off-by:
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/hvm/stdvga.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/arch/x86/hvm/stdvga.c b/xen/arch/x86/hvm/stdvga.c
index 02a9
The HVM related code (SVM, VMX) generally assumed that a local apic is
always present. With the introduction of a HVM mode were the local apic can
be removed, some of this broken code paths arised.
The SVM exit/resume paths unconditionally checked the state of the lapic,
which is wrong if it's bee
Signed-off-by: Roger Pau Monné
Reported by: Boris Ostrovsky
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v7:
- Patch added.
---
xen/arch/x86/hvm/i8254.c | 18 ++
1 file changed, 18 insertions(+)
diff --git a/xen/arch/x86/hvm/i8254.c b/xen/arch/x86/hvm/i8254.c
index 8a9
This new elfnote contains the 32bit entry point into the kernel. Xen will
use this entry point in order to launch the guest kernel in 32bit protected
mode with paging disabled.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
Reviewed-by: Andrew Cooper
Cc: Ian Jackson
Cc: Stefano Stabellini
C
This series is split in the following order:
- Patches from 1 to 12 allow disabling the devices emulated inside of Xen,
with the exception of patch 2 which is a bugfix for the vlapic.
- Patches from 13 to 21 introduce the creation of HVM guests without a
device model and without the devic
Only some minor libxl changes are needed in order to be able to migrate HVM
guests without a device model, no hypervisor changes are needed.
This change prevents sending the emulator context if the device model
version is set to none.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Ian Campb
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v6:
- Return ENODEV in hpet_load if the vhpet is disabled.
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/hvm/hpet.c | 13 +
xen/arch/x86/hvm/hvm.c | 1
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v7:
- Add Andrew Cooper Reviewed-by.
- Apply renaming from earlier patch (s/PMTIMER/PM/).
Changes since v6:
- Return ENODEV in pmtimer_load if the timer is disabled.
- hvm_acpi_pow
Allow xc_dom_elfloader to report a guest type as hvm-3.0-x86_32 if it's
running inside of a HVM container and has the PHYS32_ENTRY elfnote set.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v6:
- Return ENODEV in rtc_load if rtc is disabled.
- Add checks to rtc_reset and rtc_update_clock to prevent calling them if
rtc is disabled.
Changes since v4:
- Add Andrew Cooper
Introduce a new flag in xc_dom_image that turns on and off the emulated
devices. This prevents creating the VGA hole, the hvm_info page and the
ioreq server pages. libxl unconditionally sets it to true for all HVM
domains at the moment.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
Reviewed-b
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM
builder now uses the PV xc_dom_* set of functions this kernel will be parsed
and loaded inside the guest like on PV, but the container is a pure HVM
guest.
Also, if device_model_version is set to none or a device model fo
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Acked-by: Aravind Gopalakrishnan
Cc: Suravee Suthikulpanit
Cc: Aravind Gopalakrishnan
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/drivers/passthrough/amd/iommu_guest.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(
Introduce a bitmap in x86 xen_arch_domainconfig that allows enabling or
disabling specific devices emulated inside of Xen for HVM guests.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Jan B
Instead of choosing the interface to expose to guests based on the guest
type, do it based on whether the guest has an emulated local apic or not.
Signed-off-by: Roger Pau Monné
Signed-off-by: Boris Ostrovsky
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v7:
- Merge vpmu work from Boris
Only allow enabling or disabling all the emulated devices inside of Xen,
right now Xen doesn't support enabling specific emulated devices only.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v7:
- Rework if condition.
Changes sin
If certain devices (like the local or the io apic) are disabled some modes
of operation of the HVM event channel callback cannot be used. Make sure Xen
doesn't try to setup them.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/irq.c | 4
1 file change
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Jan Beulich
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Jun Nakajima
Cc: Eddie Dong
Cc: Kevin Tian
---
Changes since v7:
- Return 0 on vlapic_msr_set to note an error if the vlapic is disabled.
- Add Andrew Cooper Reviewed-by.
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v6:
- Return ENODEV in ioapic_load if the ioapic is disabled.
- Add an assert to make sure vioapic_update_EOI and
vioapic_irq_positive_edge is only called when the vioapic is enabled.
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v6:
- Return ENODEV in vpic_load if the vpic is disabled.
- Add asserts to vpic_irq_{negative/positive}_edge and vpic_ack_pending_irq
to make sure they are not called when the vpic is
On Friday 06 November 2015 15:09:53 Stefano Stabellini wrote:
> > > ---
> > > +static void xen_read_wallclock(struct timespec *ts)
> > > +{
> > > + u32 version;
> > > + u64 delta;
> > > + struct timespec now;
> > > + struct shared_info *s = HYPERVISOR_shared_info;
> > > + struct pvclock_w
On Fri, 2015-11-06 at 08:38 -0600, ed sandberg wrote:
Please don't top post.
> Thanks for the help Ian,
> # setenv xen_bootargs 'console=dtuart dtuart=/serial@12C2
> dom0_mem=512M'
> # setenv dom0_bootargs 'console=hvc0 console=ttySAC2,115200n8
> ignore_loglevel psci=enable clk_ignore_unused
On Thu, 5 Nov 2015, Arnd Bergmann wrote:
> On Thursday 05 November 2015 17:09:43 Stefano Stabellini wrote:
> > Read the wallclock from the shared info page at boot time.
> >
> > Signed-off-by: Stefano Stabellini
>
> Please use the appropriate timespec64 based functions here,
> we are in the proc
On Thu, 5 Nov 2015, David Vrabel wrote:
> On 05/11/15 17:09, Stefano Stabellini wrote:
> > If Linux is running as dom0, call XENPF_settime to update the system
> > time in Xen on pvclock_gtod notifications.
>
> Isn't this a cut-and-paste from x86? Can you make it common?
Not exactly, for the way
On Thu, 5 Nov 2015, Jan Beulich wrote:
> >>> On 05.11.15 at 18:09, wrote:
> > --- a/arch/arm/xen/hypercall.S
> > +++ b/arch/arm/xen/hypercall.S
> > @@ -89,6 +89,7 @@ HYPERCALL2(memory_op);
> > HYPERCALL2(physdev_op);
> > HYPERCALL3(vcpu_op);
> > HYPERCALL1(tmem_op);
> > +HYPERCALL1(dom0_op);
>
On Fri, 6 Nov 2015, Mark Rutland wrote:
> > + delta = arch_timer_read_counter(); /* time since system boot */
> > + delta += now.tv_sec * (u64)NSEC_PER_SEC + now.tv_nsec;
>
> The arch counter value is not a number of nanoseconds (unless CNTFRQ
> reads as 100), so this doesn't look rig
Thanks for the help Ian,
I tried using ttySAC2 in /etc/init/ttySAC2.conf but I still am not
prompted to login on the serial output. I also tried creating
/etc/init/ttyhvc0.conf. I think that is the correct place to start
getty from. There are other similar files in that location and this page:
This is sent by mistake. Please ignore this email until I finish the
whole series.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Thu, 5 Nov 2015, David Vrabel wrote:
> On 05/11/15 16:57, Stefano Stabellini wrote:
> > +case XENPF_settime32:
> > +do_settime(op->u.settime32.secs,
> > + op->u.settime32.nsecs,
> > + op->u.settime32.system_time);
> > +break;
>
> I don't t
On Mon, Aug 10, 2015 at 08:11:22PM +0100, George Dunlap wrote:
> Move pygrub checks for local access ability into a separate function.
>
> Also reorganize libxl__device_disk_local_initiate_attach so that we
> don't initialize dls->disk unless we actually end up doing a local
> attach.
>
> Signed-
Mark Rutland writes:
> On Fri, Nov 06, 2015 at 11:41:49AM +, David Vrabel wrote:
>> On 06/11/15 11:39, Stefano Stabellini wrote:
>> > On Thu, 5 Nov 2015, Mark Rutland wrote:
>> >>> static void xen_percpu_init(void)
>> >>> {
>> >>> struct vcpu_register_vcpu_info info;
>> >>> @@ -104
David Vrabel writes:
> On 06/11/15 11:39, Stefano Stabellini wrote:
>> On Thu, 5 Nov 2015, Mark Rutland wrote:
static void xen_percpu_init(void)
{
struct vcpu_register_vcpu_info info;
@@ -104,6 +120,8 @@ static void xen_percpu_init(void)
BUG_ON(err);
per_c
flight 63662 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63662/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
like 63475
test-amd64-amd64-
> On 6 Nov 2015, at 11:44, David Vrabel wrote:
>
> On 05/11/15 18:31, Lars Kurth wrote:
>> Hi all,
>>
>> We have the following options * Hold it on Monday Oct 3 - to Tue Oct
>> 4 : the problem is that Oct 3 is a public holiday in Germany, which
>> would affect German participants
>
> The emai
> On 6 Nov 2015, at 11:24, Paul Durrant wrote:
>>
>> We have the following options
>> * Hold it on Monday Oct 3 - to Tue Oct 4 : the problem is that Oct 3 is a
>> public
>> holiday in Germany, which would affect German participants
>> * Do a 1 day event only on Oct 4 : I don't think this is pra
> + delta = arch_timer_read_counter(); /* time since system boot */
> + delta += now.tv_sec * (u64)NSEC_PER_SEC + now.tv_nsec;
The arch counter value is not a number of nanoseconds (unless CNTFRQ
reads as 100), so this doesn't look right; the units don't match.
Thanks,
Mark.
___
On Wed, 2015-11-04 at 16:50 +, Ian Jackson wrote:
> Jan Beulich writes ("Re: [PATCH 4/4] xen/public: arm: rework the
> macro set_xen_guest_handle_raw"):
> > All quite interesting, but pretty moot with there not being any
> > get_xen_guest_handle() anymore.
>
> If we don't provide a get_xen_gue
On Fri, Nov 06, 2015 at 11:11:40AM +, Stefano Stabellini wrote:
> On Thu, 5 Nov 2015, Mark Rutland wrote:
> > Hi,
> >
> > > +static u64 get64(const u64 *p)
> > > +{
> > > + u64 ret;
> > > +
> > > + if (BITS_PER_LONG < 64) {
> > > + u32 *p32 = (u32 *)p;
> > > + u32 h, l;
> > > +
On Fri, Nov 06, 2015 at 11:41:49AM +, David Vrabel wrote:
> On 06/11/15 11:39, Stefano Stabellini wrote:
> > On Thu, 5 Nov 2015, Mark Rutland wrote:
> >>> static void xen_percpu_init(void)
> >>> {
> >>> struct vcpu_register_vcpu_info info;
> >>> @@ -104,6 +120,8 @@ static void xen_percpu_in
On 05/11/15 18:31, Lars Kurth wrote:
> Hi all,
>
> We have the following options * Hold it on Monday Oct 3 - to Tue Oct
> 4 : the problem is that Oct 3 is a public holiday in Germany, which
> would affect German participants
The email from Angela below says there's no rooms available on the Tues
On Thu, 5 Nov 2015, Mark Rutland wrote:
> > static void xen_percpu_init(void)
> > {
> > struct vcpu_register_vcpu_info info;
> > @@ -104,6 +120,8 @@ static void xen_percpu_init(void)
> > BUG_ON(err);
> > per_cpu(xen_vcpu, cpu) = vcpup;
> >
> > + xen_setup_runstate_info(cpu);
>
>
On 06/11/15 11:39, Stefano Stabellini wrote:
> On Thu, 5 Nov 2015, Mark Rutland wrote:
>>> static void xen_percpu_init(void)
>>> {
>>> struct vcpu_register_vcpu_info info;
>>> @@ -104,6 +120,8 @@ static void xen_percpu_init(void)
>>> BUG_ON(err);
>>> per_cpu(xen_vcpu, cpu) = vcpup;
>>
On Thu, 5 Nov 2015, Lars Kurth wrote:
Hi all,
I was just informed that it is not going to be possible to hold the Developer
Summit alongside LinuxCon in Berlin, unless we make some hard choices. I had
originally had booked the space and all looked fine when it was originally
arranged several
>>> On 05.11.15 at 18:53, wrote:
> The 8250-uart.h contains extra serial register definitions
> for the internal UARTs in TI OMAP SoCs which are used in
> OMAP UART driver only.
> In order to clean up code move these definitions to omap-uart.c.
> Also rename some definitions to follow to the UART_
On Thu, 5 Nov 2015, Lars Kurth wrote:
> Hi all,
>
> I was just informed that it is not going to be possible to hold the Developer
> Summit alongside LinuxCon in Berlin, unless we make some hard choices. I had
> originally had booked the space and all looked fine when it was originally
> arrange
> -Original Message-
> From: win-pv-devel-boun...@lists.xenproject.org [mailto:win-pv-devel-
> boun...@lists.xenproject.org] On Behalf Of Lars Kurth
> Sent: 05 November 2015 18:31
> To: Xen-devel; mirageos-de...@xenproject.org; xen-
> a...@lists.xenproject.org; win-pv-de...@lists.xenproject
On Thu, 5 Nov 2015, Mark Rutland wrote:
> Hi,
>
> > +static u64 get64(const u64 *p)
> > +{
> > + u64 ret;
> > +
> > + if (BITS_PER_LONG < 64) {
> > + u32 *p32 = (u32 *)p;
> > + u32 h, l;
> > +
> > + /*
> > +* Read high then low, and then make sure high
>>> On 06.11.15 at 05:22, wrote:
> On Wed, Oct 28, 2015 at 10:05:31AM -0600, Jan Beulich wrote:
>> >>> On 27.10.15 at 21:36, wrote:
>> > +static void __init add_extra_rmrr(void)
>> > +{
>> > +struct acpi_rmrr_unit *acpi_rmrr;
>> > +struct acpi_rmrr_unit *rmrru;
>> > +unsigned int dev,
The document looks good to me. I would appreciate if the linux guys
could give a look at the last three paragraphs under section 5.
On Thu, 5 Nov 2015, Shannon Zhao wrote:
> This document is going to explain the design details of Xen booting with
> ACPI on ARM. Any comments are welcome.
>
> Chang
On Nov 6, 10:37am, Wei Liu wrote:
} On Fri, Nov 06, 2015 at 02:31:22AM -0800, John Nemeth wrote:
} > I would like to request that there be a way in the xen console
} > to send the escape char. The problem I faced was that I did:
} >
} > xl console
} > domU> telnet
}
} As a workaround, you
On Fri, Nov 06, 2015 at 02:31:22AM -0800, John Nemeth wrote:
> I would like to request that there be a way in the xen console
> to send the escape char. The problem I faced was that I did:
>
> xl console
> domU> telnet
As a workaround, you can try
telnet -e escapechar
?
> ...
>
>
On Fri, Nov 06, 2015 at 08:53:27AM +, Hao, Xudong wrote:
> > -Original Message-
> > From: Wei Liu [mailto:wei.l...@citrix.com]
> > Sent: Wednesday, November 4, 2015 6:19 PM
> > To: Hao, Xudong
> > Cc: Wei Liu ; xen-devel@lists.xen.org
> > Subject: Re: [Xen-devel] ovmf fail to compile
>
flight 38254 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38254/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-armhf-jessie-netboot-pygrub 12 saverestore-support-check fail
never pass
test-armhf-ar
1 - 100 of 103 matches
Mail list logo