Hi Juergen,
On 03/02/2016 03:39 PM, Juergen Gross wrote:
> On 01/03/16 19:08, Ian Jackson wrote:
>> Bob Liu writes ("Re: [RFC PATCH] xen-block: introduces extra request to
>> pass-through SCSI commands"):
>>> One thing I'm still not sure about PVSCSI is do we have the same security
>>> issue sin
On Tue, Mar 01, 2016 at 08:55:09AM +0100, Juergen Gross wrote:
> Modern pvops linux kernels support an initrd not covered by the initial
> mapping. This capability is flagged by an elf-note.
>
> In case the elf-note is set by the kernel don't place the initrd into
> the initial mapping. This will a
On Mon, Feb 29, 2016 at 11:17:05AM +, Wei Liu wrote:
> * xsave/xrtors support
hi, Wei
I will send three bugs fix patches. And some clean up patches.
The patch will send on time.
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
___
From: Shannon Zhao
There are two flags: PSCI_COMPLIANT and PSCI_USE_HVC. When set, the
former signals to the OS that the hardware is PSCI compliant. The latter
selects the appropriate conduit for PSCI calls by toggling between
Hypervisor Calls (HVC) and Secure Monitor Calls (SMC). FADT table
cont
On 01/03/16 19:08, Ian Jackson wrote:
> Bob Liu writes ("Re: [RFC PATCH] xen-block: introduces extra request to
> pass-through SCSI commands"):
>> One thing I'm still not sure about PVSCSI is do we have the same security
>> issue since LIO can interface to any block device.
>> E.g when using a pa
From: Shannon Zhao
Parse GTDT (Generic Timer Descriptor Table) to initialize timer. Using
the information presented by GTDT to initialize the arch timer (not
memory-mapped).
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/time.c | 86 ++
From: Shannon Zhao
This adds a new function to initialize UART for ACPI on ARM.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/setup.c| 2 +-
xen/drivers/char/arm-uart.c | 37 +++--
xen/include/xen/serial.h| 2 +-
3 f
From: Shannon Zhao
Define new command line parameter "acpi" to enable/disable acpi.
This implements the following policy to decide whether ACPI should be
used to boot the system:
- acpi=off: ACPI will not be used to boot the system, even if there is
no alternative available (e.g., device tree i
From: Shannon Zhao
Since ACPI 6.0 defines that GIC Distributor Structure contains the GIC
version filed, it could get GIC version from that. Then call acpi device
initializing function to preinit GIC device.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/gic.c |
From: Parth Dixit
Add a helper function to set edge/level type information for an
interrupt.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
xen/arch/arm/irq.c| 27 ---
xen/include/asm-arm/irq.h | 2 ++
2 files changed,
From: Shannon Zhao
This function could get the specified index entry of MADT table. This
would be useful when it needs to get the contens of the entry.
Cc: Jan Beulich
Signed-off-by: Shannon Zhao
Acked-by: Jan Beulich
---
xen/drivers/acpi/tables.c | 59 +++
From: Shannon Zhao
acpi_boot_table_init() will be called in start_xen to get the RSDP and
all the table pointers. With this patch, we can get ACPI boot-time
tables from firmware on ARM64.
Signed-off-by: Naresh Bhat
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabe
From: Shannon Zhao
This function will be used by ACPI booting. Export it so that it can be
used by other files.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/bootfdt.c| 6 +++---
xen/include/xen/device_tree.h | 4
2 files changed, 7 insertions(+), 3
From: Shannon Zhao
Implement __acpi_map_table function for ARM. Move FIX_ACPI_PAGES to
common place and rename it to NUM_FIXMAP_ACPI_PAGES.
Cc: Jan Beulich
Signed-off-by: Shannon Zhao
---
v8: fix coding style and file header
---
xen/arch/arm/Makefile| 1 +
xen/arch/arm/acpi/Makefile
From: Shannon Zhao
Make these types generic to DT and ACPI. So they are can be used in ACPI
codes.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 10 -
xen/arch/arm/gic-v2.c | 10 -
xen/arch/arm/gic-v3.c | 8 +++
From: Parth Dixit
MADT contains the information for MPIDR which is essential for SMP
initialization, parse the GIC cpu interface structures to get the MPIDR
value and map it to cpu_logical_map(), and add enabled cpu with valid
MPIDR into cpu_possible_map.
Move BAD_MADT_ENTRY to common place, par
From: Parth Dixit
ACPI on Xen hypervisor uses MADT table for proper GIC initialization.
First get the GIC version from GIC Distributor. Then parse GIC related
subtables, collect CPU interface and distributor addresses and call
driver initialization function (which is hardware abstraction agnostic
From: Parth Dixit
Add generic way to use device from acpi similar to the way it is
supported in device tree.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
xen/arch/arm/device.c| 18 ++
xen/arch/arm/xen.lds.S | 7 +++
From: Shannon Zhao
Like GICv2, ACPI on Xen hypervisor uses MADT table for proper GICv3
initialization. Parse GIC distributor subtable, redistributor subtable
and interrupt subtable.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/gic-v3.c | 171 +++
From: Shannon Zhao
To support ACPI NUMA, it needs to make the ACPI initialization done
before boot_end_allocator. Also, x86 does this by the same way.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/setup.c | 6 ++
1 file changed, 2
From: Shannon Zhao
ACPI 5.1 only has two explicit methods to boot up SMP, PSCI and Parking
protocol, but the Parking protocol is only specified for ARMv7 now, so
make PSCI as the only way for the SMP boot protocol before some updates
for the ACPI spec or the Parking protocol spec.
ACPI only supp
From: Shannon Zhao
These patches are Part 3 of the previous patch set I sent which adds
ACPI support for arm64 on Xen[1]. Split them as an individual set for
convenient reviewing.
These patches mostly add ACPI support for Xen itself(not yet for Dom0)
on ARM64. It makes Xen could parse physical A
On Tue, Mar 1, 2016 at 7:18 PM, Ian Jackson wrote:
> Harmandeep Kaur writes ("[PATCH v4] libxl: handle failure of xc_version() in
> libxl_get_version_info()"):
>> Check the return value of xc_version() and return NULL if it
>> fails. libxl_get_version_info() can also return NULL now.
>>
>> Caller
Hi,
For Xen upstream master branch with commit 1949868d, After updating qemu-xen
version from fcf6ac57 to 2ce1d30e, booting a pv-grub guest will fail.
Attach the guest config file and Xen log.
Best Regards,
Xudong
(XEN) Bad console= option '115200'
(XEN) Bad console= option '8n1'
Xen 4.7-unsta
On 03/01/16 13:49, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 01, 2016 at 06:33:32PM +, Ian Jackson wrote:
> > Haozhong Zhang writes ("Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM
> > support for Xen"):
> > > On 02/18/16 21:14, Konrad Rzeszutek Wilk wrote:
> > > > [someone:]
> > > > > (2) For
On 01/03/16 16:52, George Dunlap wrote:
> On 01/03/16 09:02, Juergen Gross wrote:
>> Some hardware (e.g. Dell studio 1555 laptops) require SMIs to be
>> called on physical cpu 0 only. Linux drivers like dcdbas or i8k try
>> to achieve this by pinning the running thread to cpu 0, but in Dom0
>> this
Hi, Malcolm,
Not sure whether I missed your reply or not, but failed to find it in my
archive. Could you help re-post if you already did so? Sorry that my
comments might be a bit late which didn't catch previous draft discussions,
but some of below questions are really important to help us underst
Currently it's possible for xc_translate_foreign_address() to fail
and errno still be set to success. This patch fixes the issue.
Based on the first half of Don Slutz' patch:
http://lists.xen.org/archives/html/xen-devel/2014-03/msg03720.html
Signed-off-by: Razvan Cojocaru
---
tools/libxc/xc_page
flight 84925 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84925/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 6 xen-boot fail REGR. vs. 83212
test-amd64-i386-x
On 02/29/16 11:17, Wei Liu wrote:
> = Projects =
>
> == Hypervisor ==
>
> === x86 ===
>
> * VMX TSC scaling support
> - Haozhong Zhang
now in staging branch
> == Toolstack ==
>
> * vNVDIMM support
> - Haozhong Zhang
design still in discussion
_
flight 84924 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84924/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 83820
Regressions whic
I've got the hypercall_page_initialize function as follows. As the size of each
hypercall page entry is 32B and the initialize function only assigns value to
the first 8B, is the remaining space empty or initialized afterwards?
static void hypercall_page_initialise_ring1_kernel(void *hypercall_pa
From: Yang Hongyang
Signed-off-by: Yang Hongyang
Cc: Shriram Rajagopalan
Cc: Wei Liu
Cc: Ian Jackson
Cc: Ian Campbell
---
MAINTAINERS | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/MAINTAINERS b/MAINTAINERS
index db14cfe..27280a4 100644
--- a/MAINTAINERS
+++ b/MAINTAINE
>
> * Posted interrupt
> - Wu, Feng
>
Already in staging branch, thanks!
Thanks,
Feng
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 3/1/16 12:57 PM, Andrew Cooper wrote:
> The inclusion rules conditions for errno.h were unnecesserily complicated, and
> required the includer to jump through hoops if they wished to avoid getting
> multiple namespaces worth of constants.
>
> Vastly simply the logic, and document what is going
On 3/1/16 12:57 PM, Andrew Cooper wrote:
> Otherwise a custom XEN_ERRNO definition will not end up creating appropriately
> namespaced constants for the aliases.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Doug Goldstein
> ---
> CC: Jan Beulich
> CC: Tim Deegan
> CC: Doug Goldstein
> ---
On 3/1/16 12:57 PM, Andrew Cooper wrote:
> These POSIX errnos are expected by other areas of the Xen public interface,
> specifically public/io/xs_wire.h
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Doug Goldstein
> ---
> CC: Jan Beulich
> CC: Tim Deegan
> CC: Doug Goldstein
> ---
> xen/i
On Mon, 2016-02-29 at 11:17 +, Wei Liu wrote:
>
> * Memory protection-key support
> - Huaitong Han
The patches have been merged into staging branch.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
flight 84923 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84923/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 3 host-install(3) broken REGR. vs. 83004
build-armhf-pvops
On Wed, Feb 24, 2016 at 09:32:59AM +0100, Ingo Molnar wrote:
> And if also add the legacy RTC flag, it becomes:
>
> void early_init_hardcoded_platform_quirks(void)
> {
> x86_platform.legacy.ebda_search = 0;
> x86_platform.quirks.idt_remap = 1;
> x86_platform.legacy.rtc = 1;
>
>
Ingo, your feedback appreciated at the end here, regarding quirks.
On Tue, Mar 01, 2016 at 09:00:53AM -0500, Boris Ostrovsky wrote:
> On 02/29/2016 06:50 PM, Andy Lutomirski wrote:
> >diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c
> >index 91ddae732a36..c6ef4da8e4f4 10064
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Ian Campbell
commit 52ba0746b3b44c86aee121babf3b2fd9b8f84090 upstream.
Currently xen_dma_map_page concludes that DMA to anything other than
the head page of a compound page must be foreign, sin
This run is configured for baseline tests only.
flight 44204 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44204/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stopfail
flight 84906 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84906/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399
build-i386-rumpuserxen
On Mon, Feb 29, 2016 at 03:50:19PM -0800, Andy Lutomirski wrote:
> x86_64 has very clean espfix handling on paravirt: espfix64 is set
> up in native_iret, so paravirt systems that override iret bypass
> espfix64 automatically. This is robust and straightforward.
This I think I get as all the ESP
On Mon, Feb 29, 2016 at 03:50:18PM -0800, Andy Lutomirski wrote:
> Borislav, if you're okay with this (ab)use of the cpufeatures stuff
Because of X86_BUG_ESPFIX? Why abuse?
--
Regards/Gruss,
Boris.
ECO tip #101: Trim your mails when you reply.
__
On Mon, 29 Feb 2016, Jan Beulich wrote:
> All,
>
> it just occurred to me that 4.5.2 has been a while back, and indeed
> 4.5.3 would be due later this week. This may be a little too eager,
> but I'd like to aim at getting this out at least some time next week.
> Besides what is in the tree alread
On Tue, 2016-03-01 at 22:51 +0100, Sander Eikelenboom wrote:
> Tuesday, March 1, 2016, 9:39:25 PM, you wrote:
>
> > On Tue, Mar 01, 2016 at 02:52:14PM -0500, Meng Xu wrote:
> > >
> > > > I dont think I have exhausted all the options here, but it
> > > > looked like
> > > > two last changes did im
On Tue, Mar 01, 2016 at 07:44:10AM -0800, Andy Lutomirski wrote:
> On Tue, Mar 1, 2016 at 6:00 AM, Boris Ostrovsky
> wrote:
> > On 02/29/2016 06:50 PM, Andy Lutomirski wrote:
> >>
> >> diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c
> >> index 91ddae732a36..c6ef4da8e4f4 10
On Tue, Mar 01, 2016 at 10:51:30PM +0100, Sander Eikelenboom wrote:
>
> Tuesday, March 1, 2016, 9:39:25 PM, you wrote:
>
> > On Tue, Mar 01, 2016 at 02:52:14PM -0500, Meng Xu wrote:
> >> Hi Elena,
> >>
> >> Thank you very much for sharing this! :-)
> >>
> >> On Tue, Mar 1, 2016 at 1:20 PM, Elen
On Mon, 2016-02-29 at 08:27 -0500, Meng Xu wrote:
> On Mon, Feb 29, 2016 at 6:17 AM, Wei Liu wrote:
> >
> > == Hypervisor ==
> >
> > * Convert RTDS from time to event-driven model
> > - Meng Xu
> > - Tianyang Chen
>
> We will try our best to meet this release cycle, although we are not
>
Tuesday, March 1, 2016, 9:39:25 PM, you wrote:
> On Tue, Mar 01, 2016 at 02:52:14PM -0500, Meng Xu wrote:
>> Hi Elena,
>>
>> Thank you very much for sharing this! :-)
>>
>> On Tue, Mar 1, 2016 at 1:20 PM, Elena Ufimtseva
>> wrote:
>> >
>> > On Tue, Mar 01, 2016 at 08:48:30AM -0500, Meng Xu wro
Both Emacs etags and Exuberant ctags allow to specify regexp
replacements to help the tools understand some constructs used in the
source code. We use these replacements extensively in make tags,
however, the rules have some limitations, one of them being that they
only match single lines. Luckily,
flight 84976 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84976/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Tue, Mar 01, 2016 at 02:52:14PM -0500, Meng Xu wrote:
> Hi Elena,
>
> Thank you very much for sharing this! :-)
>
> On Tue, Mar 1, 2016 at 1:20 PM, Elena Ufimtseva
> wrote:
> >
> > On Tue, Mar 01, 2016 at 08:48:30AM -0500, Meng Xu wrote:
> > > On Mon, Feb 29, 2016 at 12:59 PM, Konrad Rzeszute
Hi Elena,
Thank you very much for sharing this! :-)
On Tue, Mar 1, 2016 at 1:20 PM, Elena Ufimtseva
wrote:
>
> On Tue, Mar 01, 2016 at 08:48:30AM -0500, Meng Xu wrote:
> > On Mon, Feb 29, 2016 at 12:59 PM, Konrad Rzeszutek Wilk
> > wrote:
> > >> > Hey!
> > >> >
> > >> > CC-ing Elena.
> > >>
> >
The inclusion rules conditions for errno.h were unnecesserily complicated, and
required the includer to jump through hoops if they wished to avoid getting
multiple namespaces worth of constants.
Vastly simply the logic, and document what is going on.
Signed-off-by: Andrew Cooper
---
CC: Jan Beul
hvmloader is unhosted, and shouldn't use the system errno.h. It already has
to use Xen's errno.h for other hypercalls. The use of public/io/xs_wire.h
requires the use of un-prefixed errno values.
This fixes the build on stricter toolchains where requesting -fno-builtin does
reduce the include pa
Otherwise a custom XEN_ERRNO definition will not end up creating appropriately
namespaced constants for the aliases.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: Doug Goldstein
---
xen/include/public/errno.h | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
di
These POSIX errnos are expected by other areas of the Xen public interface,
specifically public/io/xs_wire.h
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: Doug Goldstein
---
xen/include/public/errno.h | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/include/pub
On Tue, Mar 01, 2016 at 06:33:32PM +, Ian Jackson wrote:
> Haozhong Zhang writes ("Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support
> for Xen"):
> > On 02/18/16 21:14, Konrad Rzeszutek Wilk wrote:
> > > [someone:]
> > > > (2) For XENMAPSPACE_gmfn, _gmfn_range and _gmfn_foreign,
> > > >
flight 84962 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84962/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Haozhong Zhang writes ("Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support
for Xen"):
> On 02/18/16 21:14, Konrad Rzeszutek Wilk wrote:
> > [someone:]
> > > (2) For XENMAPSPACE_gmfn, _gmfn_range and _gmfn_foreign,
> > >(a) never map idx in them to GFNs occupied by vNVDIMM, and
> > >(b) n
Roger Pau Monne writes ("[PATCH v5] libelf: rewrite symtab/strtab loading"):
> Current implementation of elf_load_bsdsyms is broken when loading inside of
> a HVM guest, because it assumes elf_memcpy_safe is able to write into guest
> memory space, which it is not.
>
> Take the oportunity to do so
On Tue, Mar 01, 2016 at 08:48:30AM -0500, Meng Xu wrote:
> On Mon, Feb 29, 2016 at 12:59 PM, Konrad Rzeszutek Wilk
> wrote:
> >> > Hey!
> >> >
> >> > CC-ing Elena.
> >>
> >> I think you forgot you cc.ed her..
> >> Anyway, let's cc. her now... :-)
> >>
> >> >
> >> >> We are measuring the execution
Roger Pau Monne writes ("[PATCH v2 1/7] blkif: document how FreeBSD uses the
physical-device backend node"):
> FreeBSD blkback uses the physical-device xenstore node in order to fetch the
> path to the underlying backing storage (either a block device or raw image).
> This node is set by the hotpl
Doug Goldstein writes ("Re: [PATCH] travis: add IRC notifications"):
> I'd like to see osstest reports go there as well.
I will implement this.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [PATCH] travis: add IRC
notifications"):
> On Mon, Feb 29, 2016 at 03:10:48PM -0600, Doug Goldstein wrote:
> > So before the Register starts reporting "Xen Project dying due to lack
> > of email response", does anyone have any +1 or -1 to contribute t
Bob Liu writes ("Re: [RFC PATCH] xen-block: introduces extra request to
pass-through SCSI commands"):
> One thing I'm still not sure about PVSCSI is do we have the same security
> issue since LIO can interface to any block device.
> E.g when using a partition /dev/sda1 as the PVSCSI-backend, but
Doug Goldstein writes ("Re: [PATCH v2 3/4] m4/python: fix checks for Python
library support"):
> You need to put your libraries after the sources. e.g.
> gcc -W -march=native -Llibs -o program program.c -lm -lcustom
Of course. I really was quite thick last week! I have queued this
patch now.
A
Li, Liang Z writes ("RE: [Xen-devel] [PATCH] libxc: Expose the MPX cpuid flag
to guest"):
> > Cc: wei.l...@citrix.com; ian.campb...@citrix.com;
> > stefano.stabell...@eu.citrix.com; ian.jack...@eu.citrix.com; xen-
> > de...@lists.xen.org; jbeul...@suse.com
> > Subject: Re: [Xen-devel] [PATCH] libx
Wei Liu writes ("[PATCH] tools/python/xs: fix two comments"):
> These two functions require transaction handle as the first argument.
>
> Reported-by: Sergei Lebedev
> Signed-off-by: Wei Liu
queued, thanks
Ian.
___
Xen-devel mailing list
Xen-devel@l
On Tue, Feb 9, 2016 at 12:17 PM, Dario Faggioli
wrote:
> On Thu, 2016-02-04 at 16:50 -0600, Chong Li wrote:
>> Add XEN_DOMCTL_SCHEDOP_getvcpuinfo and _putvcpuinfo hypercalls
>> to independently get and set the scheduling parameters of each
>> vCPU of a domain
>>
>> Signed-off-by: Chong Li
>> Sign
flight 84879 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84879/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail pass in 84563
Regressions which are regarded as allow
Wei Liu writes ("[PATCH] libxl: fix comment LIBXL__EGC_INIT -> LIBXL_EGC_INIT"):
> Signed-off-by: Wei Liu
> Cc: Ian Jackson
Thanks, queued
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, Mar 01, 2016 at 08:10:24AM -0800, James Bottomley wrote:
> On Mon, 2016-02-29 at 10:12 +, David Woodhouse wrote:
> > On Fri, 2016-02-19 at 05:45 -0800, Luis R. Rodriguez wrote:
> > > This ports built-in firmware to use linker tables,
> > > this replaces the custom section solution with
Wei Liu writes ("Re: [Xen-devel] [PATCH v3] tools/configure: only require
bcc/ld86/as86 when needed"):
> On Wed, Feb 24, 2016 at 09:03:29AM -0600, Doug Goldstein wrote:
> > bcc/ld86/as86 are necessary when we build ROMBIOS. However if we do not
> > build it (and are not building qemu-trad), the bu
flight 84616 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84616/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 59254
test-amd64-amd64-xl
On 03/01/2016 11:48 AM, Lars Kurth wrote:
> Unfortunately, we were rejected again. What is notable, is that the
> number of mentoring organisations is much smaller than in the past.
> However, this year the Linux Foundation and most distros (with the
> exception of CentOS, which was in last year) a
Daniel, Jesus,
I am going to break my comments down into different sections to make this more
consumable. Let's focus on the A1-A3 use-cases in this mail.
First I wanted to start of with some questions about definitions, as I am
seeing some discrepancies in some of the data shown and am trying
On Tue, 1 Mar 2016, Stefano Stabellini wrote:
> On Tue, 1 Mar 2016, Shannon Zhao wrote:
> > On 2016/2/29 22:15, Stefano Stabellini wrote:
> > > On Sun, 28 Feb 2016, Shannon Zhao wrote:
> > >> > From: Shannon Zhao
> > >> >
> > >> > Map all other tables to Dom0 using 1:1 mappings.
> > >> >
> > >>
flight 84880 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84880/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 5 kernel-build fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
>>> On 25.02.16 at 15:56, wrote:
> Signed-off-by: Anthony PERARD
Same as previous patch:
Acked-by: Jan Beulich
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 25.02.16 at 15:56, wrote:
> It should now be loaded by libxl.
>
> Signed-off-by: Anthony PERARD
Pending concerns to previous patches, this one on its own clearly
looks fine, i.e.
Acked-by: Jan Beulich
Jan
___
Xen-devel mailing list
Xen-deve
>>> On 25.02.16 at 15:56, wrote:
> ... to compile SeaBIOS and OVMF. Only depends on CONFIG_*.
>
> If --with-system-* configure option is used, then set *_CONFIG=n to not
> compile SEABIOS and OVMF.
>
> Signed-off-by: Anthony PERARD
The subject prefix is a little misleading, as this doesn't rea
On Mon, Feb 29, Konrad Rzeszutek Wilk wrote:
> .. A fix for what issue?
#include
#include
#include
#include
#include
int main(void)
{
unsigned long long *p;
int fd;
fd = open("/dev/mem", O_RDWR);
if (fd < 0) {
perror("/dev/mem");
Ian Campbell writes ("[PATCH 2/2] xl: NULL terminate buf when reading dom0
/proc/uptime"):
> The contents of /proc/uptime is typically something like "80164.57
> 640617.58", so the existing 512 byte buffer is more than large enoguh,
> so reduce its effective size to 511 bytes and ensure we include
Ian Campbell writes ("[PATCH] libxl: qmp: ensure qmp read buffer is NULL
terminated"):
> Coverity rightly points out that qmp->buffer may not be NULL
> terminated when passed to strncat.
>
> Make the actual buffer a byte bigger than QMP_RECEIVE_BUFFER_SIZE and
> always append a NULL byte.
>
> I
flight 84930 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/84930/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Mon, 2016-02-29 at 10:12 +, David Woodhouse wrote:
> On Fri, 2016-02-19 at 05:45 -0800, Luis R. Rodriguez wrote:
> > This ports built-in firmware to use linker tables,
> > this replaces the custom section solution with a
> > generic solution.
> >
> > This also demos the use of the .rodata (
>>> On 25.02.16 at 15:56, wrote:
> --- a/tools/firmware/hvmloader/hvmloader.c
> +++ b/tools/firmware/hvmloader/hvmloader.c
> @@ -365,8 +365,26 @@ int main(void)
>
> if ( bios->acpi_build_tables )
> {
> +const struct hvm_modlist_entry *acpi_module;
> +acp
On Tue, 1 Mar 2016, Jan Beulich wrote:
> >>> On 01.03.16 at 16:35, wrote:
> > Ifdef'ing CONFIG_ARM in xen/arch/arm/efi/efi-boot.h is redundant, remove
> > the condition and simplify the ifdef's.
> >
> > Signed-off-by: Stefano Stabellini
>
> Reviewed-by: Jan Beulich
>
> Since you have no co-ma
Ian Campbell writes ("[PATCH 1/2] xl: uptime: skip dom0 when calling
print_domU_uptime"):
> Dom0 is handled separately (via print_dom0_uptime) and the domU
> variant doesn't work for dom0 since libxl_vm_get_start_time() doesn't.
>
> Signed-off-by: Ian Campbell
Acked-by: Ian Jackson
and queued
>>> On 01.03.16 at 16:55, wrote:
> On 01/03/16 15:52, George Dunlap wrote:
>> On 01/03/16 09:02, Juergen Gross wrote:
>>> --- a/xen/common/schedule.c
>>> +++ b/xen/common/schedule.c
>>> @@ -271,6 +271,12 @@ int sched_move_domain(struct domain *d, struct cpupool
>>> *c)
>>> struct scheduler *
Wei Liu writes ("Re: [PATCH v4 2/4] libxl: introduce
LIBXL_VGA_INTERFACE_TYPE_UNKNOWN"):
> On Tue, Feb 16, 2016 at 06:37:47PM +0100, Roger Pau Monne wrote:
> > And use it as the default value for the VGA kind. This allows libxl to set
> > it to the default value later on when the domain type is kn
>>> On 25.02.16 at 15:56, wrote:
> --- a/tools/firmware/hvmloader/ovmf.c
> +++ b/tools/firmware/hvmloader/ovmf.c
> @@ -34,17 +34,10 @@
> #include
> #include
>
> -#define ROM_INCLUDE_OVMF
> -#include "roms.inc"
> -
> -#define OVMF_SIZE (sizeof(ovmf))
> #define OVMF_MAXOFFSET
>>> On 25.02.16 at 15:56, wrote:
> All BIOS but ROMBIOS needs to be loaded via modules.
>
> ROMBIOS is handled as a special case.
>
> Signed-off-by: Anthony PERARD
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lis
On Tue, 1 Mar 2016, Jan Beulich wrote:
> >>> On 01.03.16 at 16:44, wrote:
> > On Mon, 29 Feb 2016, Jan Beulich wrote:
> >> All,
> >>
> >> it just occurred to me that 4.5.2 has been a while back, and indeed
> >> 4.5.3 would be due later this week. This may be a little too eager,
> >> but I'd like
On 01/03/16 15:52, George Dunlap wrote:
> On 01/03/16 09:02, Juergen Gross wrote:
>> Some hardware (e.g. Dell studio 1555 laptops) require SMIs to be
>> called on physical cpu 0 only. Linux drivers like dcdbas or i8k try
>> to achieve this by pinning the running thread to cpu 0, but in Dom0
>> this
On 01/03/16 09:02, Juergen Gross wrote:
> Some hardware (e.g. Dell studio 1555 laptops) require SMIs to be
> called on physical cpu 0 only. Linux drivers like dcdbas or i8k try
> to achieve this by pinning the running thread to cpu 0, but in Dom0
> this is not enough: the vcpu must be pinned to phy
1 - 100 of 190 matches
Mail list logo