hi all
in p2m_pod_demand_populate
i see:
p2m_pod_demand_populate
- pod_eager_reclaim
- pod_eager_record
if gfn is pod, will get mfn from pod cache and set entry。
but i did not know why call pod_eager_reclaim、pod_eager_record in
p2m_pod_demand_populate?
what the purpose for pod_eager_reclai
>>> On 05.05.16 at 18:35, wrote:
> On Wed, May 04, 2016 at 04:34:26AM -0600, Jan Beulich wrote:
>> >>> On 04.05.16 at 11:48, wrote:
>> > On Tue, May 03, 2016 at 08:17:15AM -0600, Jan Beulich wrote:
>> >> >>> On 03.05.16 at 12:55, wrote:
>> >> > The calling convention used by the FreeBSD ELF OSAB
On 05/05/16 11:22, Wei Liu wrote:
> On Thu, May 05, 2016 at 11:10:33AM +0200, Juergen Gross wrote:
>> On 05/05/16 11:02, Wei Liu wrote:
>>> On Thu, May 05, 2016 at 08:36:45AM +0200, Juergen Gross wrote:
The pvusb request structure contains the transfer_flags member which
is missing defini
On 05/05/16 12:13, Anthony PERARD wrote:
> On Wed, May 04, 2016 at 10:25:03AM +0200, Juergen Gross wrote:
>> On 03/05/16 17:06, Anthony PERARD wrote:
>>> On Thu, Mar 10, 2016 at 04:19:30PM +0100, Juergen Gross wrote:
+static void usbback_bh(void *opaque)
+{
+struct usbback_info *
flight 93585 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93585/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
flight 93563 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93563/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-libvirt 3 host-install(3) broken in 93538 pass in 93563
test-amd64-amd64-xl-qemuu-ovmf-amd
flight 93576 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93576/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
On May 05, 2016 7:03 PM, George Dunlap wrote:
> On 05/05/16 07:53, Xu, Quan wrote:
> > On May 04, 2016 9:49 PM, George Dunlap
> wrote:
> >> On Fri, Apr 29, 2016 at 10:25 AM, Quan Xu wrote:
> >>> When IOMMU mapping is failed, we issue a best effort rollback,
> >>> stopping IOMMU mapping, unmappin
Below is the output of xenstore-ls:
root@genericarmv8:/home# xenstore-ls -f
/tool = ""
/tool/xenstored = ""
/local = ""
/local/domain = ""
/local/domain/0 = ""
/local/domain/0/domid = "0"
/local/domain/0/name = "Domain-0"
/vm = ""
/libxl = ""
"ps -ef" prints:
root 1050 1 0 Jul10 ?
flight 93564 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93564/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
On 05/05/16 21:18, Doug Goldstein wrote:
> Most implementations of the sleep command only take integers. GNU
> coreutils has a GNU extension to allow any floating point number to be
> passed but we shouldn't depend on that.
>
> Signed-off-by: Doug Goldstein
Reviewed-by: Andrew Cooper
__
On 05/05/16 21:18, Doug Goldstein wrote:
> The shebang was not on the first line in the init script and it should
> be.
>
> Signed-off-by: Doug Goldstein
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.or
The shebang was not on the first line in the init script and it should
be.
Signed-off-by: Doug Goldstein
---
tools/hotplug/Linux/init.d/xendriverdomain.in | 1 -
1 file changed, 1 deletion(-)
diff --git a/tools/hotplug/Linux/init.d/xendriverdomain.in
b/tools/hotplug/Linux/init.d/xendriverdomai
Most implementations of the sleep command only take integers. GNU
coreutils has a GNU extension to allow any floating point number to be
passed but we shouldn't depend on that.
Signed-off-by: Doug Goldstein
---
tools/hotplug/Linux/block-iscsi | 2 +-
tools/hotplug/Linux/init.d/xenc
flight 93560 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93560/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
On Thu, May 05, 2016 at 11:49:55AM -0500, Doug Goldstein wrote:
> From: Daniel De Graaf
>
> Signed-off-by: Daniel De Graaf
> Signed-off-by: Doug Goldstein
Reviewed-by: Wei Liu
Release-acked-by: Wei Liu
> ---
> tools/flask/policy/policy/modules/xen/xen.te | 9 +
> 1 file changed, 9
flight 93538 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93538/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 3 host-install(3) broken REGR. vs. 93515
test-amd64-amd64-xl-
On May 5, 2016 10:29, "Jan Beulich" wrote:
>
>
> i.A. Jan Beulich
> Software Engineering Consultant
> Attachmate Group
> Nördlicher Zubringer 9-11
> 40470 Düsseldorf
> jbeul...@suse.com
> SUSE
>
> SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB
21284 (AG Nürnberg)
>
> >>>
flight 93542 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93542/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
On Thu, May 05, 2016 at 11:49:55AM -0500, Doug Goldstein wrote:
> From: Daniel De Graaf
>
> Signed-off-by: Daniel De Graaf
> Signed-off-by: Doug Goldstein
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> tools/flask/policy/policy/modules/xen/xen.te | 9 +
> 1 file changed, 9 insertions(+)
Hi everyone,
I updated http://wiki.xenproject.org/wiki/Xen_Project_Test_Days and created
http://wiki.xenproject.org/wiki/Xen_4.7_RC_test_instructions (note that we only
have one page for all RC's now to avoid unnecessary copy and pasting).
For those who want new features to be tested, please ex
From: Daniel De Graaf
Signed-off-by: Daniel De Graaf
Signed-off-by: Doug Goldstein
---
tools/flask/policy/policy/modules/xen/xen.te | 9 +
1 file changed, 9 insertions(+)
diff --git a/tools/flask/policy/policy/modules/xen/xen.te
b/tools/flask/policy/policy/modules/xen/xen.te
index be
On 05/05/16 17:34, Julien Grall wrote:
> Hello,
>
> Some of the processor erratum will require to modify code sequence. As those
> modifications may impact the performance, they should only be enabled on
> affected cores. Furthermore, Xen may also want to take advantage of new
> hardware feature
>>> Razvan Cojocaru 05/05/16 11:24 AM >>>
>On 05/04/2016 04:42 PM, Jan Beulich wrote:
> On 04.05.16 at 13:32, wrote:
>>> But while implementing a stub that falls back to the actual LOCK CMPXCHG
>>> and replacing hvm_copy_to_guest_virt() with it would indeed be an
>>> improvement (with the add
On Wed, May 04, 2016 at 04:34:26AM -0600, Jan Beulich wrote:
> >>> On 04.05.16 at 11:48, wrote:
> > On Tue, May 03, 2016 at 08:17:15AM -0600, Jan Beulich wrote:
> >> >>> On 03.05.16 at 12:55, wrote:
> >> > The calling convention used by the FreeBSD ELF OSABI is exactly the same
> >> > as
> >> >
Some of the processor erratum will require to modify code sequence.
As those modifications may impact the performance, they should only
be enabled on affected cores. Furthermore, Xen may also want to take
advantage of new hardware features coming up with v8.1 and v8.2.
This patch adds an infrastru
New immediates will be defined in the future. To keep track of the
immediates allocated, gather all of them in a separate header.
Also rename BRK_BUG_FRAME to BKR_BUG_FRAME_IMM.
Signed-off-by: Julien Grall
---
xen/arch/arm/traps.c| 2 +-
xen/include/asm-arm/arm64/brk.h | 26 +++
We may need to update branch instruction when patching Xen.
The code has been imported from the files arch/arm64/kernel/insn.c
and arch/arm64/include/asm/insn.h in Linux v4.6-rc3.
Note that only the necessary helpers have been imported.
Signed-off-by: Julien Grall
---
xen/arch/arm/arm64/Makefi
The ARM erratum 832075 applies to certain revisions of Cortex-A57, one
of the workarounds is to change device loads into using load-acquire
semantics.
Use the alternative framework to enable the workaround only on affected
cores.
Whilst a guest could trigger the deadlock, it can be broken when th
After each CPU has been started, we iterate through a list of CPU
errata to detect CPUs which need from hypervisor code patches.
For each bug there is a function which check if that a particular CPU is
affected. This needs to be done on every CPUs to cover heterogenous
system properly.
If a certa
Signed-off-by: Julien Grall
---
xen/include/asm-arm/arm64/page.h | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/include/asm-arm/arm64/page.h b/xen/include/asm-arm/arm64/page.h
index 29a32cf..fbdc8fb 100644
--- a/xen/include/asm-arm/arm64/page.h
+++ b/xen/include/asm-arm/arm64/page.
The ARM errata 819472, 827319 and 824069 define the same workaround for
these hardware issues in certain Cortex-A53 parts.
The cache instructions "dc cvac" and "dc cvau" need to be upgraded to
"dc civac".
Use the alternative framework to replace those instructions only on
affected cores.
Whilst
The ARM erratum applies to certain revisions of Cortex-A57. The
processor may report a Stage 2 translation fault as the result of
Stage 1 fault for load crossing a page boundary when there is a
permission fault or device memory fault at stage 1 and a translation
fault at Stage 2.
So Xen needs to c
The new document will help to keep track of all the erratum that Xen is
able to handle.
The text is based on the Linux doc in Documents/arm64/silicon-errata.txt.
Also list the current errata that Xen is aware of.
Signed-off-by: Julien Grall
---
docs/misc/arm/silicon-errata.txt | 45 +++
Based on ARM ARM (D4.5.3 in ARM DDI 0486A and B3.12.7 in ARM DDI 0406C.c),
a Stage 1 translation error has priority over a Stage 2 translation error.
Therefore gva_to_ipa can only fail if another vCPU is playing with the
page table.
Rather than injecting a custom fault, replay the instruction and
It may not possible to return a proper error when encoding an
instruction. Instead, a handcrafted instruction will be returned.
Also, provide the encoding for the faulting instruction.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/arm64/brk.h | 13 +
1 file changed, 13 inserti
Flushing the icache will required when the support Xen patching will be
added.
Also import the macro icache_line_size which is used by
flush_icache_range.
Signed-off-by: Julien Grall
---
xen/arch/arm/arm64/cache.S | 45 +
xen/include/asm-arm/page.h |
The header asm-arm/page.h makes use of the macro dsb defined in the header
asm-arm/system.h. Currently, the includer has to specify both of them.
This can be avoided by including asm-arm/system.h in asm-arm/page.h.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/page.h | 1 +
1 file changed
This will be used to know if a feature, which Xen cares, is available accross
all the CPUs.
This code is a light version of arch/arm64/kernel/cpufeature.c from
Linux v4.6-rc3.
Signed-off-by: Julien Grall
---
xen/arch/arm/Makefile| 1 +
xen/arch/arm/cpufeature.c| 34
Add new macros to easily get different parts of the register and to
check if a given MIDR match a CPU model range. The latter will be really
useful to handle errata later.
The macros have been imported from the header arch64/include/asm/cputype.h
in Linux v4.6-rc3
Also remove MIDR_MASK which is u
Hello,
Some of the processor erratum will require to modify code sequence. As those
modifications may impact the performance, they should only be enabled on
affected cores. Furthermore, Xen may also want to take advantage of new
hardware features coming up with v8.1 and v8.2.
The first part of th
Signed-off-by: Julien Grall
---
xen/arch/arm/Makefile | 38 --
xen/arch/arm/arm32/Makefile | 9 -
xen/arch/arm/arm64/Makefile | 12 +---
xen/arch/arm/platforms/Makefile | 2 +-
4 files changed, 30 insertions(+), 31 deletions(
>>> Razvan Cojocaru 05/05/16 12:51 PM >>>
>On 05/04/2016 05:45 PM, Jan Beulich wrote:
>>> +*msr &= 0x1fff;
>>> > +return &d->arch.monitor_msr_bitmap->high;
>>> > +
>>> > +default:
>>> > +return NULL;
>>> > +}
>>> > +}
>>> > +
>>> > +static int monitor_enable_msr(str
This run is configured for baseline tests only.
flight 44388 linux-3.14 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44388/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-amd 9 redhat-inst
i.A. Jan Beulich
Software Engineering Consultant
Attachmate Group
Nördlicher Zubringer 9-11
40470 Düsseldorf
jbeul...@suse.com
SUSE
SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284
(AG Nürnberg)
>>> Tamas K Lengyel 05/04/16 7:18 PM >>>
>On May 4, 2016 09:35, "Ja
On Thu, May 05, 2016 at 05:03:08PM +0100, Julien Grall wrote:
> Hi Wei,
>
> On 05/05/16 16:57, Wei Liu wrote:
> >On Thu, May 05, 2016 at 04:47:31PM +0100, Steve Capper wrote:
> >>[Apologies for the late send]
> >>
> >>Mini-OS on ARM
> >>==
> >>
> >>This session covered mini-os bringup
Hi Wei,
On 05/05/16 16:57, Wei Liu wrote:
On Thu, May 05, 2016 at 04:47:31PM +0100, Steve Capper wrote:
[Apologies for the late send]
Mini-OS on ARM
==
This session covered mini-os bringup on 64-bit ARM platforms.
The following points arose during discussion:
*) 32-bit Mini-OS ma
On Thu, May 05, 2016 at 04:47:31PM +0100, Steve Capper wrote:
> [Apologies for the late send]
>
> Mini-OS on ARM
> ==
>
> This session covered mini-os bringup on 64-bit ARM platforms.
> The following points arose during discussion:
>
> *) 32-bit Mini-OS may have bit-rotted
> o) Som
[Apologies for the late send]
PCI Passthrough on ARM
==
In this session Julien Grall talked through an older PCI design
document from xen-devel.
http://lists.xen.org/archives/html/xen-devel/2015-08/msg01306.html
The following points arose during discussion:
*) On ARM everyth
[Apologies for the late send]
Mini-OS on ARM
==
This session covered mini-os bringup on 64-bit ARM platforms.
The following points arose during discussion:
*) 32-bit Mini-OS may have bit-rotted
o) Some memory addresses may have been hard-coded for instance.
o) The memory map in X
[Apologies for the late send]
Xen - ARM Status
There was discussion on the following items:
*) Booting Xen on 64-bit ARM SoC
o) Unfortunately Xen was executed in EL1.
o) Advice was given that the firmware should boot the Xen in EL2.
o) The ARMv7 secure mode switch to Hyp tr
On Thu, May 05, 2016 at 01:24:26PM +, Zytaruk, Kelly wrote:
> I am having problems getting XEN boot messages over a serial console.
>
> I have two systems. On one system I can see the XEN boot message over a
> serial console whereas on the other system I cannot.
>
> I physically move the sa
I am having problems getting XEN boot messages over a serial console.
I have two systems. On one system I can see the XEN boot message over a serial
console whereas on the other system I cannot.
I physically move the same PCIe serial card and hard drive from one system to
the other. One syste
flight 93534 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93534/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
This run is configured for baseline tests only.
flight 44387 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44387/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-q
flight 93533 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93533/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Thu, 2016-05-05 at 13:00 +0100, Julien Grall wrote:
> Hi Dario,
> On 04/05/16 10:06, Dario Faggioli wrote:
> > On what hardware/emulator? The same Julien was using?
> > >
> > > (XEN) CPU1 never came online
> > > (XEN) Failed to bring up CPU 1 (error -5)
> > > (XEN) Bringing up CPU2
> > > (XEN)
Hi Dario,
On 04/05/16 10:06, Dario Faggioli wrote:
On Tue, 2016-05-03 at 21:26 -0400, Konrad Rzeszutek Wilk wrote:
On Tue, May 03, 2016 at 11:46:27PM +0200, Dario Faggioli wrote:
Julien, the patch is very very similar to the one attached to one
of my reply
in that thread, but I had to change
On 05/05/16 12:06, Stefano Stabellini wrote:
On Thu, 5 May 2016, Julien Grall wrote:
Hi Wei,
On 27/04/16 08:05, Wei Chen wrote:
This patch adds v2m extension support in GIC-v2 driver. The GICv2 driver
detects the MSI frames from device tree and creates corresponding device
tree nodes in dom0
(CC Stefano)
I forgot the CC stefano on this mail.
On 05/05/16 12:39, Julien Grall wrote:
On 28/04/16 14:26, Suriyan Ramasami wrote:
Hello Julien,
Hello Suriyan,
Thank you for the advice. I do have a follow up question.
On Thu, Apr 28, 2016 at 2:50 AM, Julien Grall mailto:julien.gr
On 28/04/16 14:26, Suriyan Ramasami wrote:
Hello Julien,
Hello Suriyan,
Thank you for the advice. I do have a follow up question.
On Thu, Apr 28, 2016 at 2:50 AM, Julien Grall mailto:julien.gr...@arm.com>> wrote:
Hello,
On 27/04/16 23:53, Suriyan Ramasami wrote:
My recent patch to import an up-to-date include/xen/interface/io/netif.h
from the Xen Project brought in the necessary definitions to support the
new control shared ring and protocol. This patch series updates xen-netback
to support the new ring.
Patch #1 adds the necessary boilerplate to map the
My recent patch to include/xen/interface/io/netif.h defines a new shared
ring (in addition to the rx and tx rings) for passing control messages
from a VM frontend driver to a backend driver.
A previous patch added the necessary boilerplate for mapping the control
ring from the frontend, should it
My recent patch to include/xen/interface/io/netif.h defines a new shared
ring (in addition to the rx and tx rings) for passing control messages
from a VM frontend driver to a backend driver.
This patch adds the necessary code to xen-netback to map this new shared
ring, should it be created by a fr
My recent patch to include/xen/interface/io/netif.h defines a new extra
info type that can be used to pass hash values between backend and guest
frontend.
This patch adds code to xen-netback to pass hash values calculated for
guest receive-side packets (i.e. netback transmit side) to the frontend.
My recent patch to include/xen/interface/io/netif.h defines a new extra
info type that can be used to pass hash values between backend and guest
frontend.
This patch adds code to xen-netback to use the value in a hash extra
info fragment passed from the guest frontend in a transmit-side
(i.e. netb
flight 93515 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93515/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-rtds 15 guest-start/debian.repeat fail pass in 93496
Regressions which are regarded as
flight 93530 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93530/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
On Thu, 5 May 2016, Julien Grall wrote:
> Hi Wei,
>
> On 27/04/16 08:05, Wei Chen wrote:
> > This patch adds v2m extension support in GIC-v2 driver. The GICv2 driver
> > detects the MSI frames from device tree and creates corresponding device
> > tree nodes in dom0's DTB. It also provides one hw_o
On 05/05/16 07:53, Xu, Quan wrote:
> On May 04, 2016 9:49 PM, George Dunlap wrote:
>> On Fri, Apr 29, 2016 at 10:25 AM, Quan Xu wrote:
>>> When IOMMU mapping is failed, we issue a best effort rollback,
>>> stopping IOMMU mapping, unmapping the previous IOMMU maps and
>> then
>>> reporting the err
Hi Wei,
On 27/04/16 08:05, Wei Chen wrote:
This patch adds v2m extension support in GIC-v2 driver. The GICv2 driver
detects the MSI frames from device tree and creates corresponding device
tree nodes in dom0's DTB. It also provides one hw_ops callback to map
v2m MMIO regions to dom0 and route v2
On 05/04/2016 05:45 PM, Jan Beulich wrote:
>> +*msr &= 0x1fff;
>> > +return &d->arch.monitor_msr_bitmap->high;
>> > +
>> > +default:
>> > +return NULL;
>> > +}
>> > +}
>> > +
>> > +static int monitor_enable_msr(struct domain *d, u32 msr)
>> > +{
>> > +u32 *bitmap
It looks like something is wrong with xenstore. Is xenstored running?
Can you do xenstore-ls in dom0?
On Thu, 5 May 2016, Shannon Zhao wrote:
> Hi,
>
> I'm going to create a domU for XEN on ARM64. I'm following [1] to cross
> compile the xen tools and [2] to create domU. One thing different is
>
On Thu, May 05, 2016 at 10:31:04AM +0100, Wei Liu wrote:
> On Wed, May 04, 2016 at 08:54:07AM -0700, Paul Lai wrote:
> > During the make world, git mini-os.git didn't honor the 'configure
> > --enable-githttp' option. The 'enable-githttp' was only honored in
> > the tools subdirectory.
> >
> > Si
CC'ing new Julien's email address.
On Thu, 5 May 2016, Stefano Stabellini wrote:
> It looks like something is wrong with xenstore. Is xenstored running?
> Can you do xenstore-ls in dom0?
>
> On Thu, 5 May 2016, Shannon Zhao wrote:
> > Hi,
> >
> > I'm going to create a domU for XEN on ARM64. I'm
On May 04, 2016 4:43 PM, Jan Beulich wrote:
> >>> On 04.05.16 at 04:14, wrote:
> > On May 04, 2016 10:00 AM, Tian, Kevin wrote:
> >> > From: Xu, Quan
> >> > Sent: Friday, April 29, 2016 5:25 PM diff --git
> >> > a/xen/arch/x86/acpi/power.c b/xen/arch/x86/acpi/power.c index
> >> > 2885e31..909733
gnutls_kx_set_priority, gnutls_certificate_type_set_priority and
gnutls_protocol_set_priority were deprecated and eventually removed in
GNUTLS 3.4. Application should use gnutls_priority_set_direct instead
per [0].
gnutls_anon_server_credentials was deprecated at some point. Application
should use
On Wed, May 04, 2016 at 10:25:03AM +0200, Juergen Gross wrote:
> On 03/05/16 17:06, Anthony PERARD wrote:
> > On Thu, Mar 10, 2016 at 04:19:30PM +0100, Juergen Gross wrote:
> >> +static void usbback_bh(void *opaque)
> >> +{
> >> +struct usbback_info *usbif;
> >> +struct usbif_urb_back_ring
flight 44389 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44389/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-armhf 3 host-install(3) broken like 44369
build-armhf-pvop
On 05/04/2016 05:51 PM, Tamas K Lengyel wrote:
> Since in-guest debug exceptions are now unconditionally trapped to Xen, adding
> a hook for vm_event subscribers to tap into this new always-on guest event. We
> rename along the way hvm_event_breakpoint_type to hvm_event_type to better
> match the v
On 05/04/2016 05:51 PM, Tamas K Lengyel wrote:
> Add headers to the covered list.
>
> Signed-off-by: Tamas K Lengyel
> Acked-by: Jan Beulich
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim Deegan
> Cc: Wei Liu
On 05/04/2016 05:51 PM, Tamas K Lengyel wrote:
> Mechanical renaming to better describe that the code in hvm/event is part of
> the monitor subsystem.
>
> Signed-off-by: Tamas K Lengyel
> Acked-by: Kevin Tian
> ---
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Razvan Cojocaru
> Cc: Jun Nakajima
On 05/04/2016 05:51 PM, Tamas K Lengyel wrote:
> Signed-off-by: Tamas K Lengyel
> ---
> Cc: Razvan Cojocaru
> Cc: Ian Jackson
> Cc: Wei Liu
> ---
> tools/tests/xen-access/xen-access.c | 32 ++--
> 1 file changed, 30 insertions(+), 2 deletions(-)
>
> diff --git a/to
On 05/04/2016 05:51 PM, Tamas K Lengyel wrote:
> Add support for monitoring ARM SMC events. This patch only adds the required
> bits to enable/disable monitoring and forwarding the event through vm_event.
>
> Signed-off-by: Tamas K Lengyel
> ---
> Cc: Stefano Stabellini
> Cc: Julien Grall
> Cc:
On 05/04/2016 05:51 PM, Tamas K Lengyel wrote:
> The prototype of vm_event_fill_regs will differ on x86 and ARM so in this
> patch
> we move components from common to arch-specific that use this function. As
> part of this patch we rename and relocate vm_event_monitor_guest_request as
> monitor_gu
On Wed, May 04, 2016 at 08:54:07AM -0700, Paul Lai wrote:
> During the make world, git mini-os.git didn't honor the 'configure
> --enable-githttp' option. The 'enable-githttp' was only honored in
> the tools subdirectory.
>
> Signed-off-by: Paul Lai
Acked-by: Wei Liu
Thanks for your patch.
I
On 05/04/2016 04:42 PM, Jan Beulich wrote:
On 04.05.16 at 13:32, wrote:
>> But while implementing a stub that falls back to the actual LOCK CMPXCHG
>> and replacing hvm_copy_to_guest_virt() with it would indeed be an
>> improvement (with the added advantage of being able to treat
>> non-emula
On Thu, May 05, 2016 at 08:03:05AM +, Ni, Ruiyu wrote:
> Gary,
> Can you kindly teach me how to run OVMF under Xen?
>
> I worked out a draft fix and need to verify whether
> everything is fine.
>
Hi Ray,
1. Install the Xen host. I use openSUSE Leap 42.1 as the host system
and it's availab
On Thu, May 05, 2016 at 11:10:33AM +0200, Juergen Gross wrote:
> On 05/05/16 11:02, Wei Liu wrote:
> > On Thu, May 05, 2016 at 08:36:45AM +0200, Juergen Gross wrote:
> >> The pvusb request structure contains the transfer_flags member which
> >> is missing definitions of it's semantics.
> >>
> >> Ad
On Thu, May 05, 2016 at 08:03:05AM +, Ni, Ruiyu wrote:
> Gary,
> Can you kindly teach me how to run OVMF under Xen?
>
> I worked out a draft fix and need to verify whether
> everything is fine.
>
Currently you need to build Xen's hvmloader, which will embed a OVMF
binary inside it.
These ar
flight 93523 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93523/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
On 05/05/16 11:02, Wei Liu wrote:
> On Thu, May 05, 2016 at 08:36:45AM +0200, Juergen Gross wrote:
>> The pvusb request structure contains the transfer_flags member which
>> is missing definitions of it's semantics.
>>
>> Add the definition of the USBIF_SHORT_NOT_OK flag.
>>
>> Signed-off-by: Juerg
On 05/04/2016 05:45 PM, Jan Beulich wrote:
On 29.04.16 at 08:03, wrote:
>> --- a/xen/arch/x86/monitor.c
>> +++ b/xen/arch/x86/monitor.c
>> @@ -22,6 +22,104 @@
>> #include
>> #include
>>
>> +int arch_monitor_init_domain(struct domain *d)
>> +{
>> +if ( !d->arch.monitor_msr_bitmap )
>
On Thu, May 05, 2016 at 08:36:45AM +0200, Juergen Gross wrote:
> The pvusb request structure contains the transfer_flags member which
> is missing definitions of it's semantics.
>
> Add the definition of the USBIF_SHORT_NOT_OK flag.
>
> Signed-off-by: Juergen Gross
> ---
> Please consider taking
flight 93516 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/93516/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 14 guest-saverestore fail REGR. vs. 91479
test-amd64-amd64-libvirt-
Gary,
Can you kindly teach me how to run OVMF under Xen?
I worked out a draft fix and need to verify whether
everything is fine.
Regards,
Ray
>-Original Message-
>From: Laszlo Ersek [mailto:ler...@redhat.com]
>Sent: Thursday, April 28, 2016 6:36 PM
>To: Ni, Ruiyu ; Gary Lin
>Cc: edk2-de
96 matches
Mail list logo