> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Tuesday, December 08, 2015 3:14 AM
>
> On 11/30/2015 07:39 PM, Brendan Gregg wrote:
> > This introduces a way to have a restricted VPMU, by specifying one of two
> > predefined groups of PMCs to make available. For secure environm
>>> On 10.12.15 at 21:07, wrote:
> On 01/12/15 13:35, Jan Beulich wrote:
> On 01.12.15 at 12:37, wrote:
>>> --- a/xen/include/public/sysctl.h
>>> +++ b/xen/include/public/sysctl.h
>>> @@ -89,7 +89,14 @@ DEFINE_XEN_GUEST_HANDLE(xen_sysctl_tbuf_op_t);
>>> /* (x86) The platform supports HVM gu
> From: Roger Pau Monne
> Sent: Tuesday, December 08, 2015 12:48 AM
>
> Instead of choosing the interface to expose to guests based on the guest
> type, do it based on whether the guest has an emulated local apic or not.
>
> Signed-off-by: Roger Pau Monné
> Signed-off-by: Boris Ostrovsky
> Acke
> From: Roger Pau Monné [mailto:roger@citrix.com]
> Sent: Wednesday, December 09, 2015 6:18 PM
>
> Ccing the vPMU maintainers.
Next time please include the whole patch when CCing me, which is easier
to do review. :-)
>
> El 07/12/15 a les 17.48, Roger Pau Monne ha escrit:
> > Instead of cho
>>> On 10.12.15 at 18:26, wrote:
> On 12/10/15 11:21 AM, Jan Beulich wrote:
> On 10.12.15 at 17:48, wrote:
>>> --- a/MAINTAINERS
>>> +++ b/MAINTAINERS
>>> @@ -226,6 +226,12 @@ F: xen/include/{kexec,kimage}.h
>>> F: xen/arch/x86/machine_kexec.c
>>> F: xen/arch/x86/x86_64/kexec
> From: Zhang, Haozhong
> Sent: Thursday, December 10, 2015 7:13 PM
>
> On 12/10/15 10:43, Tian, Kevin wrote:
> > > From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> > > Sent: Tuesday, December 08, 2015 1:04 AM
> > >
> > > On 07/12/15 10:16, Haozhong Zhang wrote:
> > > > On 12/07/15 10:03,
On 11.12.2015 at 3:01pm, wrote:
> > From: Xu, Quan
> > Sent: Friday, December 11, 2015 10:09 AM
> >
> > On 11.12.2015 at 3:03pm, wrote:
> > > On 10/12/15 09:33, Quan Xu wrote:
> > > > Signed-off-by: Quan Xu
> > > > ---
> > > > xen/drivers/passthrough/vtd/qinval.c | 11 +--
> > > > 1 fi
> From: Xu, Quan
> Sent: Thursday, December 10, 2015 5:33 PM
>
> If IOTLB/Context/IETC flush is timeout, we should think
> all devices under this IOMMU cannot function correctly.
> So for each device under this IOMMU we'll mark it as
> unassignable and kill the domain owning the device.
>
> If De
On Thu, 2015-12-10 at 18:59 +, Andrew Cooper wrote:
> On 07/12/15 09:16, Huaitong Han wrote:
> > +
> > +/* PKRU dom0 is always zero */
> > +if ( likely(!pte_pkeys) )
> > +return 0;
>
> This is not an architectural restriction (as far as I can tell). Xen
> must never make assum
> From: Xu, Quan
> Sent: Friday, December 11, 2015 10:09 AM
>
> On 11.12.2015 at 3:03pm, wrote:
> > On 10/12/15 09:33, Quan Xu wrote:
> > > Signed-off-by: Quan Xu
> > > ---
> > > xen/drivers/passthrough/vtd/qinval.c | 11 +--
> > > 1 file changed, 9 insertions(+), 2 deletions(-)
> > >
>
On 11.12.2015 at 3:06pm, Konrad Rzeszutek Wilk wrote:
> On Thu, Dec 10, 2015 at 02:15:32PM +, quizyjones wrote:
> > I can debug xen using console connections. However, HVM nested xen seems
> to not support 'xl console'. Even though I set the console according to
> http://www.dedoimedo.com/comp
On 11.12.2015 at 3:05pm, Andrew Cooper wrote:
> On 10/12/15 09:33, Quan Xu wrote:
> > diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index
> > a5aef55..0bf6b1a 100644
> > --- a/xen/include/xen/pci.h
> > +++ b/xen/include/xen/pci.h
> > @@ -41,6 +41,7 @@
> > struct pci_dev_info {
> >
On 10/12/15 21:24, Andrew Cooper wrote:
> On 09/12/15 07:34, Juergen Gross wrote:
>> On 08/12/15 17:34, Andrew Cooper wrote:
>>> On 08/12/15 16:02, Juergen Gross wrote:
On 08/12/15 16:04, Andrew Cooper wrote:
> On 08/12/15 14:44, Juergen Gross wrote:
>> I'm just playing a little bit wi
On 10/12/15 22:13, Doug Goldstein wrote:
> On 12/9/15 1:34 AM, Juergen Gross wrote:
>> On 08/12/15 17:34, Andrew Cooper wrote:
>>> On 08/12/15 16:02, Juergen Gross wrote:
On 08/12/15 16:04, Andrew Cooper wrote:
> On 08/12/15 14:44, Juergen Gross wrote:
>> I'm just playing a little bit
On Tue, 2015-12-08 at 10:29 +, Ian Campbell wrote:
> On Tue, 2015-12-08 at 08:06 +, Hu, Robert wrote:
> > >
> > [...]
>
> Please trim your quotes.
>
> > For your failure, as Kevin mentioned in other mail, we will find someone
> > to look into.
> > Would you find out the detailed log of '
>>> On 12/10/2015 at 08:05 PM, in message
<1449749113-1243-1-git-send-email-george.dun...@eu.citrix.com>, George Dunlap
wrote:
> Chunyan,
>
> I did a thorough review of v3, and almost all the comments I had fell
> into two categories:
>
> 1. Trivial things that could be easily fixed
>
On Fri, 2015-12-11 at 01:16 +, osstest service owner wrote:
> flight 65633 linux-3.14 real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/65633/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-rumpus
> -Original Message-
> From: Tian, Kevin
> Sent: Friday, December 11, 2015 10:28 AM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: Keir Fraser ; Jan Beulich ; Andrew
> Cooper ; George Dunlap
> ; Dario Faggioli
> Subject: RE: [PATCH v10 6/7] vmx: VT-d posted-interrupt core logic handling
The reproduce method is a little complex. We rely on libvmi to translate
virtual addess into physical address and inject traps.
Goal: monitor all hypercalls of L1 xen (4.4.1) from dom0 of L0 xen (4.4.6)
1. obtain virtual address of hypercall handler (GVA) from xen-syms-4.4.1 file
2. use vmi_paget
> From: Wu, Feng
> Sent: Friday, December 11, 2015 9:59 AM
>
> > > +void vmx_vcpu_block(struct vcpu *v)
> > > +{
> > > +unsigned long flags;
> > > +struct pi_desc *pi_desc = &v->arch.hvm_vmx.pi_desc;
> > > +
> > > +if ( !has_arch_pdevs(v->domain) )
> > > +return;
> > > +
> > > +
On Fri, Dec 11, 2015 at 10:01:13AM +0800, quizy_jo...@outlook.com wrote:
> Aslo reboot when destroy a VM.
You need to give more context on how to reproduce this, and you should
also CC the maintainers of the code. Please look in MAINTAINERS file.
>
> The logs from L1 Xen:
> (XEN) [ Xen-4.4.1
On 11.12.2015 at 3:03pm, wrote:
> On 10/12/15 09:33, Quan Xu wrote:
> > Signed-off-by: Quan Xu
> > ---
> > xen/drivers/passthrough/vtd/qinval.c | 11 +--
> > 1 file changed, 9 insertions(+), 2 deletions(-)
> >
> > diff --git a/xen/drivers/passthrough/vtd/qinval.c
> > b/xen/drivers/passth
Aslo reboot when destroy a VM.
The logs from L1 Xen:
(XEN) [ Xen-4.4.1 x86_64 debug=n Not tainted ]
(XEN) CPU:0
(XEN) RIP:e008:[] _spin_unlock+0x1b/0x30
(XEN) RFLAGS: 00010202 CONTEXT: hypervisor
(XEN) rax: 82d0802f8320 rbx: 7f4b024a9004 rcx: 00
> -Original Message-
> From: Tian, Kevin
> Sent: Thursday, December 10, 2015 7:40 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: Keir Fraser ; Jan Beulich ; Andrew
> Cooper ; George Dunlap
> ; Dario Faggioli
> Subject: RE: [PATCH v10 6/7] vmx: VT-d posted-interrupt core logic handling
On Fri, Dec 11, 2015 at 09:33:02AM +0800, quizy_jo...@outlook.com wrote:
> Yes, I thought it is console=ttyS0. Actually, that should be to dom0 kernel.
> Thanks.
No. On the dom0 kernel it should be console=hvc0. Unless you only want to
see the Linux kernel output but not the hypervisor?
>
>
>
I'd like to inject int3 traps to hypercall handlers to be able to capture
hypercalls. However, the dom0/xen would reboot whenever I create a new VM.
Followup is the console output when this happens.
(XEN) Xen version 4.4.1 (Ubuntu 4.4.1-0ubuntu0.14.04.6)
(stefan.ba...@canonical.com) (gcc (Ubun
Yes, I thought it is console=ttyS0. Actually, that should be to dom0 kernel.
Thanks.
jones
From: Konrad Rzeszutek Wilk
Date: 2015-12-11 03:06
To: quizyjones
CC: xen-devel@lists.xen.org
Subject: Re: [Xen-devel] how can I debug nested xen?
On Thu, Dec 10, 2015 at 02:15:32PM +, quizyjones wr
flight 65633 linux-3.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65633/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 64562
Regressions which are
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Friday, December 11, 2015 12:07 AM
> To: Xen-devel
> Cc: Andrew Cooper ; Jan Beulich
> ; Wu, Feng ; Tian, Kevin
>
> Subject: [PATCH] VT-d: Correct order of parameters to memset() in
> setup_posted_irte
flight 65632 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65632/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 63996
test-amd64-i386-xl-qemu
flight 65634 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65634/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 64456
Regressions which are
On 12/9/15 1:34 AM, Juergen Gross wrote:
> On 08/12/15 17:34, Andrew Cooper wrote:
>> On 08/12/15 16:02, Juergen Gross wrote:
>>> On 08/12/15 16:04, Andrew Cooper wrote:
On 08/12/15 14:44, Juergen Gross wrote:
> I'm just playing a little bit with xenstore in an own domain.
>
> I've
On 09/12/15 07:34, Juergen Gross wrote:
> On 08/12/15 17:34, Andrew Cooper wrote:
>> On 08/12/15 16:02, Juergen Gross wrote:
>>> On 08/12/15 16:04, Andrew Cooper wrote:
On 08/12/15 14:44, Juergen Gross wrote:
> I'm just playing a little bit with xenstore in an own domain.
>
> I've
Signed-off-by: Andrew Cooper
---
CC: Keir Fraser
CC: Jan Beulich
CC: Tim Deegan
CC: Ian Campbell
CC: Ian Jackson
CC: Stefano Stabellini
CC: Shannon Zhao
v2: Reformat the comments, and note that GSI 0 cannot be used.
---
This ABI is utterly mad.
Despite appearing to be wrong, it is compati
On 01/12/15 13:35, Jan Beulich wrote:
On 01.12.15 at 12:37, wrote:
>> --- a/xen/include/public/sysctl.h
>> +++ b/xen/include/public/sysctl.h
>> @@ -89,7 +89,14 @@ DEFINE_XEN_GUEST_HANDLE(xen_sysctl_tbuf_op_t);
>> /* (x86) The platform supports HVM guests. */
>> #define _XEN_SYSCTL_PHYSCAP_
_regs.eip needs to be truncated after having size added to it, or bad
situations can occur. e.g. emulating an instruction which crosses the 4GB
boundary causes _regs.eip to become invalid (have some of the upper 32 bits
set), and fail vmentry checks when returning back to the guest.
The comment /*
On Thu, Dec 10, 2015 at 02:15:32PM +, quizyjones wrote:
> I can debug xen using console connections. However, HVM nested xen seems to
> not support 'xl console'. Even though I set the console according to
> http://www.dedoimedo.com/computers/xen-console.html, it still cannot output
> xen rel
On 10/12/15 09:33, Quan Xu wrote:
> diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h
> index a5aef55..0bf6b1a 100644
> --- a/xen/include/xen/pci.h
> +++ b/xen/include/xen/pci.h
> @@ -41,6 +41,7 @@
> struct pci_dev_info {
> bool_t is_extfn;
> bool_t is_virtfn;
> +bool_t is_u
On 10/12/15 09:33, Quan Xu wrote:
> Signed-off-by: Quan Xu
> ---
> xen/drivers/passthrough/vtd/qinval.c | 11 +--
> 1 file changed, 9 insertions(+), 2 deletions(-)
>
> diff --git a/xen/drivers/passthrough/vtd/qinval.c
> b/xen/drivers/passthrough/vtd/qinval.c
> index b81b0bd..990baf2 1006
On 07/12/15 09:16, Huaitong Han wrote:
> +
> +/* PKRU dom0 is always zero */
> +if ( likely(!pte_pkeys) )
> +return 0;
This is not an architectural restriction (as far as I can tell). Xen
must never make assumptions about how a guest chooses to use a feature.
~Andrew
___
On 07/12/15 09:16, Huaitong Han wrote:
> This patch adds xstate support for pkeys.
>
> Signed-off-by: Huaitong Han
> ---
> xen/arch/x86/xstate.c| 7 +--
> xen/include/asm-x86/xstate.h | 4 +++-
> 2 files changed, 8 insertions(+), 3 deletions(-)
>
> diff --git a/xen/arch/x86/xstate.c b
On 07/12/15 09:16, Huaitong Han wrote:
> This patch adds functions to support PKRU access.
>
> Signed-off-by: Huaitong Han
Reviewed-by: Andrew Cooper , with a suggestion...
> ---
> xen/include/asm-x86/processor.h | 20
> 1 file changed, 20 insertions(+)
>
> diff --git a/xen
On 10/12/15 15:48, George Dunlap wrote:
> On 07/12/15 09:16, Huaitong Han wrote:
>> This patch adds functions to get pkeys value from PTE.
>>
>> Signed-off-by: Huaitong Han
>> ---
>> xen/include/asm-x86/guest_pt.h| 7 +++
>> xen/include/asm-x86/page.h| 5 +
>> xen/include/as
flight 65687 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65687/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
Ian Jackson writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database schema
updates"):
> It does say that updates are applied in order. I will add `and
> monotonically increasing' after `unique'. [etc etc]
Here is v3 of this patch. I'll refrain from reposting the whole
series.
Ian.
>From a7
On 07/12/15 09:16, Huaitong Han wrote:
> This patch adds pkeys support for guest_walk_tables.
>
> Signed-off-by: Huaitong Han
> ---
> xen/arch/x86/i387.c | 2 +-
> xen/arch/x86/mm/guest_walk.c | 73
> +++
> xen/include/asm-x86/hvm/hvm.h | 2 +
On 10/12/15 18:06, Ian Jackson wrote:
> Ian Jackson writes ("Re: [PATCH] scripts: Add a script to build and submit to
> coverity."):
>> If curl can do that then fine. Given
>>
>> +declare -a curl_args
>> +curl_args+=("--form" "token=$COV_TOKEN")
>> +curl_args+=("--form" "e
Ian Jackson writes ("Re: [PATCH] scripts: Add a script to build and submit to
coverity."):
> If curl can do that then fine. Given
>
> > >>> +declare -a curl_args
> > >>> +curl_args+=("--form" "token=$COV_TOKEN")
> > >>> +curl_args+=("--form" "email=$COV_EMAIL")
>
> this could be ach
Andrew Cooper writes ("Re: [PATCH] scripts: Add a script to build and submit to
coverity."):
> On 10/12/15 17:48, Ian Jackson wrote:
> > Ideally there would be a way to get it to read the token from a file
> > in $HOME. We could then provide the token in ~osstest in the
> > production colo.
>
>
Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database schema
updates"):
> On Thu, 2015-12-10 at 17:12 +, Ian Jackson wrote:
> > + is a positive integer, which should be unique. Updates are
> > +applied in order.
>
> Don't these also need to be monotonically increasing over t
On 10/12/15 17:48, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [PATCH] scripts: Add a script to build and submit
> to coverity."):
>> On 10/12/15 16:53, Ian Campbell wrote:
>>> ijc: Maybe we can think of a way to add this to osstest while still
>>> keeping the coverity token private?
>> This w
Andrew Cooper writes ("Re: [PATCH] scripts: Add a script to build and submit to
coverity."):
> On 10/12/15 16:53, Ian Campbell wrote:
> > ijc: Maybe we can think of a way to add this to osstest while still
> > keeping the coverity token private?
>
> This would be ideal.
It doesn't sound particul
On Thu, 2015-12-10 at 17:12 +, Ian Jackson wrote:
> diff --git a/schema/README.updates b/schema/README.updates
> new file mode 100644
> index 000..622410c
> --- /dev/null
> +++ b/schema/README.updates
> @@ -0,0 +1,179 @@
> +SCHEMA DEFINITION AND SCHEMA UPDATES (PRODUCTION `EXECUTIVE' MODE)
On 07/12/15 09:16, Huaitong Han wrote:
> This patch adds xstate support for pkeys.
Hey Huaitong,
Hope you don't mind me giving you a little feedback on the way you've
broken down your patches here. The purpose for breaking a change down
into separate patches like this is to make it easier for pe
Is it possible to increase the number of pages (or memory size) visible to
the guest OS (domU)? Perhaps at boot-time?
Can this be achieved by increasing the value of nr_pages in the start_info
struct when it is initialized? Where exactly in the code is this happening?
Thanks
__
Ian Campbell writes ("Re: [OSSTEST PATCH 4/8] Schema: Introduce
mg-schema-create"):
> On Thu, 2015-12-10 at 17:12 +, Ian Jackson wrote:
> > There is a fair amount of option parsing clobber here that will be
> > relevant shortly.
> >
> > Signed-off-by: Ian Jackson
>
> Acked-by: Ian Campbell
On 12/10/15 11:21 AM, Jan Beulich wrote:
On 10.12.15 at 17:48, wrote:
>> --- a/MAINTAINERS
>> +++ b/MAINTAINERS
>> @@ -226,6 +226,12 @@ F: xen/include/{kexec,kimage}.h
>> F: xen/arch/x86/machine_kexec.c
>> F: xen/arch/x86/x86_64/kexec_reloc.S
>>
>> +KCONFIG
>> +M: Doug Gol
>>> On 10.12.15 at 18:18, wrote:
> El 10/12/15 a les 17.53, Jan Beulich ha escrit:
> On 07.12.15 at 17:48, wrote:
>>> Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down,
>>> VCPUOP_is_up, VCPUOP_get_physid and VCPUOP_send_nmi hypercalls from HVM
>>> guests.
>>>
>>> This patch in
On 04/12/15 20:26, jto...@uwaterloo.ca wrote:
> Hi,
>
> We're a team of three fourth-year undergraduate software engineering
> students at the University of Waterloo in Canada. We're in the process
> of planning for our capstone design project, and are interested in
> contributing to Xen. Ideally
>>> On 10.12.15 at 17:48, wrote:
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -226,6 +226,12 @@ F: xen/include/{kexec,kimage}.h
> F: xen/arch/x86/machine_kexec.c
> F: xen/arch/x86/x86_64/kexec_reloc.S
>
> +KCONFIG
> +M: Doug Goldstein
> +S: Supported
> +F: docs/misc/kconf
On Thu, 2015-12-10 at 17:12 +, Ian Jackson wrote:
> There is a fair amount of option parsing clobber here that will be
> relevant shortly.
>
> Signed-off-by: Ian Jackson
Acked-by: Ian Campbell
(perhaps assuming #8 goes in in the same batch)
___
El 10/12/15 a les 17.53, Jan Beulich ha escrit:
On 07.12.15 at 17:48, wrote:
>> Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down,
>> VCPUOP_is_up, VCPUOP_get_physid and VCPUOP_send_nmi hypercalls from HVM
>> guests.
>>
>> This patch introduces a new structure (vcpu_hvm_context
On 12/10/15 10:59 AM, Jan Beulich wrote:
On 10.12.15 at 17:48, wrote:
>> - added initial x86_128 support
>
> You're kidding?
>
> Jan
>
Yes.
--
Doug Goldstein
signature.asc
Description: OpenPGP digital signature
___
Xen-devel mailing list
Xe
See schema/README.schema, introduced in this patch, for the design.
Signed-off-by: Ian Jackson
---
v2: Slight increase schema update name length format.
Docs fixes:
Change erroneous `three' to `four'.
Change `state' to `status' throghout.
Explain scope of .
Sort out (and renum
>>> On 10.12.15 at 17:53, wrote:
> On 12/10/2015 07:30 AM, Jan Beulich wrote:
> On 08.12.15 at 15:20, wrote:
>>> The tables are almost identical and therefore there is little reason to
>>> keep both sets.
>>>
>>> PVH needs 3 extra hypercalls:
>>> * mmuext_op. PVH uses MMUEXT_TLB_FLUSH_MULTI a
We are going to have multiple schema snippets and this is going be
just the initial baseline.
Rename the file and change references to it.
Signed-off-by: Ian Jackson
Acked-by: Ian Campbell
---
INSTALL.production|4 ++--
mg-schema-test-database
Really, we don't want the initial schema setup to mess about with
permissions. Instead, we simply expect to run the creation as the
correct role user.
So:
- Remove the code in mg-schema-test-database to remove the
permission settings from initial.sql;
- Instead, run exactly that code on init
Thanks for the quick review. There is little change here, other than
significant changes to the README in
5/8 Schema: Support database schema updates
as prompted by review comments.
All the patches apart from that and
4/8 Schema: Introduce mg-schema-create
have been acked.
Thanks,
Ian.
Signed-off-by: Ian Jackson
Acked-by: Ian Campbell
---
mg-schema-test-database |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/mg-schema-test-database b/mg-schema-test-database
index d704950..9791d84 100755
--- a/mg-schema-test-database
+++ b/mg-schema-test-database
@@ -244
Signed-off-by: Ian Jackson
Acked-by: Ian Campbell
---
Osstest/Executive.pm|1 +
README |5 +
mg-schema-create|4 +++-
mg-schema-test-database |1 +
mg-schema-update| 16
5 files changed, 26 insertions(+), 1 deletion(-)
Signed-off-by: Ian Jackson
Acked-by: Ian Campbell
---
schema/drop-old-resource-log.sql |8
1 file changed, 8 insertions(+)
create mode 100644 schema/drop-old-resource-log.sql
diff --git a/schema/drop-old-resource-log.sql b/schema/drop-old-resource-log.sql
new file mode 100644
inde
If you try to run mg-schema-create on an existing instance it bombs
out right at the beginning because it tries to create the `flights'
table, which already exists.
But in the future the `flights' table might be removed in an update,
which would remove this safety catch. Then running the create m
There is a fair amount of option parsing clobber here that will be
relevant shortly.
Signed-off-by: Ian Jackson
---
mg-schema-create| 61 +++
mg-schema-test-database |2 +-
2 files changed, 62 insertions(+), 1 deletion(-)
create mode 100
Ian Campbell writes ("[PATCH OSSTEST] cs-adjust-flight: Add job-rename command
which applies a perlop to job names"):
> My intention was to allow creation of adhoc jobs based on a template
> but modified e.g. to enable/disable XSM with a sequence something
> like:
>
> ./cs-adjust-flight $flight c
On 10/12/15 16:53, Ian Campbell wrote:
> From: Andrew Cooper
>
> The submission requires a token and email address, which must be
> registered as a project admin with the Coverity system. Nonetheless
> this is a convenient place to keep it.
>
> Signed-off-by: Andrew Cooper
>
> Took Andy script an
>>> On 10.12.15 at 17:53, wrote:
> From: Andrew Cooper
>
> The submission requires a token and email address, which must be
> registered as a project admin with the Coverity system. Nonetheless
> this is a convenient place to keep it.
>
> Signed-off-by: Andrew Cooper
>
> Took Andy script and:
>>> On 10.12.15 at 17:48, wrote:
> - added initial x86_128 support
You're kidding?
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 07.12.15 at 17:48, wrote:
> Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down,
> VCPUOP_is_up, VCPUOP_get_physid and VCPUOP_send_nmi hypercalls from HVM
> guests.
>
> This patch introduces a new structure (vcpu_hvm_context) that should be used
> in conjuction with the VCPUOP
From: Andrew Cooper
The submission requires a token and email address, which must be
registered as a project admin with the Coverity system. Nonetheless
this is a convenient place to keep it.
Signed-off-by: Andrew Cooper
Took Andy script and:
- Wrote commit message.
- Generalised the settings
On 12/10/2015 07:30 AM, Jan Beulich wrote:
On 08.12.15 at 15:20, wrote:
The tables are almost identical and therefore there is little reason to
keep both sets.
PVH needs 3 extra hypercalls:
* mmuext_op. PVH uses MMUEXT_TLB_FLUSH_MULTI and MMUEXT_INVLPG_MULTI to
optimize TLB flushing. Since
My intention was to allow creation of adhoc jobs based on a template
but modified e.g. to enable/disable XSM with a sequence something
like:
./cs-adjust-flight $flight copy-jobs $template test-foo-xsm
./cs-adjust-flight $flight rename-job test-foo-xsm 's/-xsm$//'
./cs-adjust-flight $flight runvar-
Use the Kconfig generated CONFIG_HAS_MEM_PAGING defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Razvan Cojocaru
CC: Tamas K Lengyel
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
---
config/x86_32.mk| 1 -
config/x86_64.mk| 1 -
xen/Rules.
Use the Kconfig generated CONFIG_HAS_NS16550 defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
---
config/arm32.mk | 1 -
config/arm64.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk | 1 -
xen/dr
Use the Kconfig generated CONFIG_HAS_GICV3 defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
Signed-off-by: Doug Goldstein
---
config/arm64.mk | 1 -
xen/arch/arm/Kconfig | 5 +
xen/arch/arm/Makefile| 2 +-
xen/arch/arm/Rules.mk| 2 --
x
Use the Kconfig generated CONFIG_HAS_EHCI defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
---
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk | 1 -
xen/drivers/char/Kconfig | 8
xen/drivers/char/Makefile | 2 +-
4
Use the Kconfig generated CONFIG_HAS_IOPORTS defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
---
xen/Rules.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk | 1 -
xen/common/Kconfig | 3 +
Use the Kconfig generated CONFIG_HAS_CADENCE_UART defines in the code base.
CC: Ian Campbell
CC: Ian Jackson
CC: Jan Beulich
CC: Keir Fraser
CC: Tim Deegan
Signed-off-by: Doug Goldstein
---
config/arm64.mk | 1 -
xen/drivers/char/Kconfig | 9 +
xen/drivers/char/Makefile |
Use the Kconfig generated CONFIG_HAS_OMAP defines in the code base.
CC: Ian Campbell
CC: Ian Jackson
CC: Jan Beulich
CC: Keir Fraser
CC: Tim Deegan
Signed-off-by: Doug Goldstein
---
config/arm32.mk | 1 -
xen/drivers/char/Kconfig | 9 +
xen/drivers/char/Makefile | 2 +-
3
The following series is a follow on to the Kconfig conversion patch series.
There are still more components to convert however this is the bare minimal
to get everything working and get the options out of the existing makefiles.
The CONFIG_HAS_ variables are there to match the behavior of the Linu
Use the Kconfig generated CONFIG_HAS_ARM_HDLCD defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
Signed-off-by: Doug Goldstein
---
xen/arch/arm/Kconfig | 1 +
xen/arch/arm/Rules.mk | 2 --
xen/drivers/video/Kconfig | 4
xen/drivers/video/Makefile | 2 +-
4 file
Use the Kconfig generated CONFIG_HAS_MEM_ACCESS defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Razvan Cojocaru
CC: Tamas K Lengyel
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
---
xen/Rules.mk |
Use the Kconfig generated CONFIG_HAS_ACPI defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
---
xen/Rules.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk| 1 -
xen/common/sysctl.c | 2 +-
xen/drivers/
Use the Kconfig generated CONFIG_HAS_PCI defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
---
xen/Rules.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk| 1 -
Use the Kconfig generated CONFIG_HAS_DEVICE_TREE defines in the code
base.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Jan Beulich
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
---
xen/Rules.mk | 1 -
xen/arch/arm/Kconfig | 1 +
xen/arch/arm/Rules.mk
Switches the build system to rely on the options and flags generated by
Kconfig to control what gets built and how. Follow on patches will
convert items to be prefixed with CONFIG_. Additionally remove a #define
that resulted in a redefined variable when building for arm.
CC: Ian Campbell
CC: Ste
Use the Kconfig generated CONFIG_HAS_MEM_SHARING defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Razvan Cojocaru
CC: Tamas K Lengyel
CC: Daniel De Graaf
Signed-off-by: Doug Goldstein
---
config/x86_32.mk| 1 -
config/x86_64.mk| 1 -
xen/Rules
Use the Kconfig generated CONFIG_HAS_VIDEO defines in the code base.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
---
xen/arch/arm/Kconfig | 1 +
xen/arch/arm/Rules.mk | 1 -
xen/arch/x86/Kconfig | 1
Use the Kconfig generated CONFIG_COMPAT defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
---
config/x86_64.mk | 1 -
xen/arch/x86/Kconfig | 7 +++
2 files changed, 7 insertions(+), 1 deletion(-)
diff --git a/config/x86_64.mk b/
Added myself as the maintainer of kconfig.
CC: Ian Campbell
CC: Ian Jackson
CC: Jan Beulich
CC: Keir Fraser
CC: Tim Deegan
Signed-off-by: Doug Goldstein
---
MAINTAINERS | 6 ++
1 file changed, 6 insertions(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index 01f575c..129cecc 100644
--- a/M
Use the Kconfig generated CONFIG_HAS_GDBSX defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
---
xen/Rules.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/arch/x86/Rules.mk | 1 -
xen/common/Kconfig| 4
xen/common/domain.c
1 - 100 of 191 matches
Mail list logo