>>> On 03.08.16 at 19:03, wrote:
> Locked buffers are stored in a rbtree for faster lookup during UNLOCK,
> and stored in a list so all buffers can be unlocked when the file
> descriptor is closed.
Is there no sufficiently easy way to walk an rbtree, so the duplicate
putting on a list could be av
> From: Boris Ostrovsky
> Sent: Monday, August 01, 2016 9:57 PM
> On 07/18/2016 10:01 AM, Boris Ostrovsky wrote:
> > ACPI builder is currently distributed under GPLv2 license.
> >
> > We plan to make the builder available to components other
> > than the hvmloader (which is also GPLv2). Some of the
On Thu, Aug 4, 2016 at 12:29 AM, Jan Beulich wrote:
On 03.08.16 at 20:41, wrote:
>> The two functions monitor_traps and mem_access_send_req duplicate some of the
>> same functionality. The mem_access_send_req however leaves a lot of the
>> standard vm_event fields to be filled by other funct
>>> On 03.08.16 at 20:41, wrote:
> The two functions monitor_traps and mem_access_send_req duplicate some of the
> same functionality. The mem_access_send_req however leaves a lot of the
> standard vm_event fields to be filled by other functions.
>
> Remove mem_access_send_req() completely, makin
>>> On 03.08.16 at 18:24, wrote:
> On Wed, Aug 03, 2016 at 10:15:51AM -0600, Jan Beulich wrote:
>> >>> On 03.08.16 at 18:00, wrote:
>> > --- a/xen/include/asm-x86/event.h
>> > +++ b/xen/include/asm-x86/event.h
>> > @@ -23,6 +23,10 @@ int hvm_local_events_need_delivery(struct vcpu *v);
>> > stati
This run is configured for baseline tests only.
flight 66912 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66912/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 478f50990a9a3b76524fd14f2085b9f1127fa41a
baseline v
motes/kraxel/tags/pull-usb-20160803-1' into
staging
usb: bugfixes for xen-usb and ehci, mingw build fix.
# gpg: Signature made Wed 03 Aug 2016 14:04:26 BST
# gpg:using RSA key 0x4CB6D8EED3E87138
# gpg: Good signature from "Gerd Hoffmann (wo
Hi Dario,
I'm thinking about changing the current RTDS scheduler to
work-conserving version as we briefly discussed before.
Below is a design of the work-conserving RTDS.
I'm hoping to get your feedback about the design ideas first before I
start writing it in code.
I think the code change should
flight 99928 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99928/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 9 windows-installfail REGR. vs. 99917
Regressions which ar
flight 99933 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99933/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 365a3aab857a2820d36d2ae9b3b62f06230b295a
baseline version:
ovmf 478f50990a9a3b76524fd14
On 08/03/16 19:16, Konrad Rzeszutek Wilk wrote:
> > > 1.4 clwb/clflushopt
> > >
> > > Writes to NVDIMM may be cached by caches, so certain flushing
> > > operations should be performed to make them persistent on
> > > NVDIMM. clwb is used in favor of clflushopt and clflush to flush
> > > write
On Mon, Aug 1, 2016 at 11:53 AM, Xuquan (Euler) wrote:
> Wei, thanks!!
> This email is sent out from outlook (the Linux can't send out email). the
> format may be not correct.
If you aren't able to use a tool like 'git send-email' to send out
patches, then what most people do is to both paste th
On Mon, Aug 1, 2016 at 5:26 PM, George Dunlap wrote:
> This is due to the difference between credit1 and credit2's load
> balancing. Credit1 randomly shifts stuff around based on what it sees
> at this instant. Which means that much of the time, it has {A,B} {A,B},
> but it frequently ends up wi
When specifying a serial list in domain config, users of
libxl_console_get_tty cannot get the tty path of a second specified pty serial,
since right now it always returns the tty path of serial 0.
Signed-off-by: Bob Liu
---
v2: Rename the patch title.
---
tools/libxl/libxl.c |2 +-
1 file ch
flight 99931 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99931/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 478f50990a9a3b76524fd14f2085b9f1127fa41a
baseline version:
ovmf 87ee6390cbeb2d15490943b
This run is configured for baseline tests only.
flight 66907 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66907/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 14 guest-saverestore
This run is configured for baseline tests only.
flight 66909 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66909/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 87ee6390cbeb2d15490943bca2978f166f213c13
baseline v
> > 1.4 clwb/clflushopt
> >
> > Writes to NVDIMM may be cached by caches, so certain flushing
> > operations should be performed to make them persistent on
> > NVDIMM. clwb is used in favor of clflushopt and clflush to flush
> > writes from caches to memory.
> >
> > Details of clwb/clflushop
flight 99932 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99932/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Wed, Aug 3, 2016 at 4:37 PM, Jan Beulich wrote:
On 03.08.16 at 17:28, wrote:
>> On 03/08/16 16:25, Jan Beulich wrote:
>> On 03.08.16 at 17:11, wrote:
On Tue, Aug 2, 2016 at 5:12 PM, Jan Beulich wrote:
On 02.08.16 at 17:49, wrote:
>> On Tue, Aug 02, 2016 at 11:47:2
On Mon, Jul 18, 2016 at 08:29:12AM +0800, Haozhong Zhang wrote:
> Hi,
>
Hey!
Thanks for posting! Sorry for the late review. Below are some of my
comment.
> Following is version 2 of the design doc for supporting vNVDIMM in
> Xen. It's basically the summary of discussion on previous v1 design
>
Please disregard this submission for review.
I forgot to rebase to current master and this patch is against a code base that
is out of date.
Apologies for the noise.
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Paul Lai
Sent: Wednesday, August
On 03/08/2016 22:00, Razvan Cojocaru wrote:
> On 08/03/16 23:44, Andrew Cooper wrote:
>> On 03/08/2016 21:37, Bread Cutter wrote:
>>> Hello all,
>>>
>>> I'm writing an executable that runs inside of a guest, and I planned
>>> to use vmcall to talk to a tool running in Dom0, using the vm_event
>>> A
On 08/03/16 23:44, Andrew Cooper wrote:
> On 03/08/2016 21:37, Bread Cutter wrote:
>> Hello all,
>>
>> I'm writing an executable that runs inside of a guest, and I planned
>> to use vmcall to talk to a tool running in Dom0, using the vm_event
>> API. It didn't work, and looking through the code, th
On 03/08/2016 21:37, Bread Cutter wrote:
> Hello all,
>
> I'm writing an executable that runs inside of a guest, and I planned
> to use vmcall to talk to a tool running in Dom0, using the vm_event
> API. It didn't work, and looking through the code, the first thing
> hvm_do_hypercall() does is chec
On Wed, 3 Aug 2016, Stefano Stabellini wrote:
> On Wed, 3 Aug 2016, Wei Liu wrote:
> > > # PV Calls Protocol
> > >
> > > ## Rationale
> > >
> > > PV Calls is a paravirtualized protocol for the POSIX socket API.
> > >
> > > The purpose of PV Calls is to allow the implementation of a specific set
Hello all,
I'm writing an executable that runs inside of a guest, and I planned
to use vmcall to talk to a tool running in Dom0, using the vm_event
API. It didn't work, and looking through the code, the first thing
hvm_do_hypercall() does is check if the guest is in ring0. If not, it
returns EPERM
Ravi Sahita's dynamically allocated altp2m structs
Signed-off-by: Paul Lai
Reviewed-by: Ravi Sahita
---
xen/arch/x86/hvm/hvm.c | 8 +++---
xen/arch/x86/hvm/vmx/vmx.c | 2 +-
xen/arch/x86/mm/altp2m.c | 18 ++---
xen/arch/x86/mm/mm-locks.h | 4 +--
xen/arch/x86/mm/p2m-ept
Indent goto labels by one space
Inline (header) altp2m functions
Define default behavior in switch
Define max and min for range of altp2m macroed values
Signed-off-by: Paul Lai
---
xen/arch/x86/hvm/hvm.c| 46 ---
xen/include/asm-x86/hvm/hvm.h | 19
Move altp2m specific functions to altp2m files. This makes the code
a little easier to read.
Also moving ept code to ept specific files as requested in:
https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04323.html
Signed-off-by: Paul Lai
---
xen/arch/x86/mm/altp2m.c |
Incorporating comments from v1 altp2m clean code URLs:
https://lists.xenproject.org/archives/html/xen-devel/2016-06/msg03223.html
https://lists.xenproject.org/archives/html/xen-devel/2016-06/msg03465.html
https://lists.xenproject.org/archives/html/xen-devel/2016-06/msg03467.html
Older commen
flight 99929 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99929/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Wed, Jul 27, 2016 at 05:37:05PM +0100, Julien Grall wrote:
> Some of the processor erratum will require to modify code sequence.
> As those modifications may impact the performance, they should only
> be enabled on affected cores. Furthermore, Xen may also want to take
> advantage of new hardwar
Hi Wei,
On 02/08/16 12:01, Wei Liu wrote:
On Thu, Jul 28, 2016 at 08:42:05PM +0800, Shannon Zhao wrote:
On 2016年07月28日 19:06, Julien Grall wrote:
On 26/07/16 02:17, Boris Ostrovsky wrote:
On 07/25/2016 07:40 PM, Stefano Stabellini wrote:
On Mon, 25 Jul 2016, Boris Ostrovsky wrote:
On 07/25/
Maydell
Date: Wed Aug 3 11:52:53 2016 +0100
Merge remote-tracking branch 'remotes/dgibson/tags/ppc-for-2.7-20160803'
into staging
qemu-2.7: ppc patch queue 2016-08-03
Here's the current set of patches (only 2) for spapr, ppc and related
things. Thes
On Wed, 3 Aug 2016, Wei Liu wrote:
> > # PV Calls Protocol
> >
> > ## Rationale
> >
> > PV Calls is a paravirtualized protocol for the POSIX socket API.
> >
> > The purpose of PV Calls is to allow the implementation of a specific set
> > of POSIX functions to be done in a domain other than your
flight 99923 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99923/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 87ee6390cbeb2d15490943bca2978f166f213c13
baseline version:
ovmf e80cb37ee7b507b6cfe4e4b
Hello Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Cosmetic fixes.
---
xen/arch/arm/altp2m.c| 23 +++
xen/arch/arm/hvm.c | 3 ++-
xen/include/asm-arm/altp2m.h | 4
Hello Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
The current implementation differentiates between flushing and
destroying altp2m views. This commit adds the function altp2m_flush,
which allows to flush all or individual altp2m views without destroying
the entire table. In this way, altp
Hello Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a
specific domain. This commit adopts the x86
HVMOP_altp2m_set_domain_state implementation. Note that the function
altp2m_flush is currently implemented in form of a stub.
Sig
The two functions monitor_traps and mem_access_send_req duplicate some of the
same functionality. The mem_access_send_req however leaves a lot of the
standard vm_event fields to be filled by other functions.
Remove mem_access_send_req() completely, making use of monitor_traps() to put
requests int
These are not very useful at all, and overly voluminous since the domain
builder switched to using XEN_DOMCTL_{get,set}hvmcontext to construct HVM
domains.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/common/hvm/save.c | 4
1 file changed, 4 deletions(-)
diff --git a/xen/commo
On Wed, Aug 3, 2016 at 12:16 PM, Julien Grall wrote:
>
>
> On 03/08/16 19:11, Tamas K Lengyel wrote:
>>
>> On Wed, Aug 3, 2016 at 11:56 AM, Julien Grall
>> wrote:
>>>
>>>
>>>
>>> On 03/08/16 18:51, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 11:45 AM, Julien Grall
wrote:
>>
On Wed, 3 Aug 2016, Julien Grall wrote:
> Hi Jan,
>
> On 03/08/16 09:53, Jan Beulich wrote:
> > > > > On 02.08.16 at 20:43, wrote:
> > > On Tue, 2 Aug 2016, Jan Beulich wrote:
> > > > > > > On 02.08.16 at 16:59, wrote:
> > > > > On 02/08/16 15:54, Jan Beulich wrote:
> > > > > > > > > On 02.08.16
Hello Sergej,
Title: s/altp2m/p2m/ and please remove the full stop.
Also this is not really a cosmetic change.
On 01/08/16 18:10, Sergej Proskurin wrote:
This commit changes the prototype of the following functions:
- p2m_alloc_vmid
- p2m_free_vmid
Signed-off-by: Sergej Proskurin
---
Cc: Ste
On 03/08/16 19:11, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 11:56 AM, Julien Grall wrote:
On 03/08/16 18:51, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 11:45 AM, Julien Grall
wrote:
The whole discussion of this series was to defer the exposition of altp2m
HVMOP to the guest unt
Hi all,
I am unable to start xen in hikey successfully but getting to this prompt
message:
>* Xen 4.7.0 (c/s Mon Jun 20 11:38:15 2016 +0100 git:9a6cc4f) EFI loader*
>* Using configuration file 'xen.cfg'*
>
* Image: 0x79fd-0x7acb8c00*
*> Unable to create new FDT*
*Shell*
I
The only way a guest may trip with stage 2 access violation is if mem_access is
or was in-use, so reinjecting these exceptions to the guest is never required.
Requested-by: Julien Grall
Signed-off-by: Tamas K Lengyel
---
Cc: Stefano Stabellini
Cc: Julien Grall
v2: simplify the patch by never
Hello Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
The p2m initialization now invokes initialization routines responsible
for the allocation and initialization of altp2m structures. The same
applies to teardown routines. The functionality has been adopted from
the x86 altp2m implementation
On Wed, Aug 3, 2016 at 11:56 AM, Julien Grall wrote:
>
>
> On 03/08/16 18:51, Tamas K Lengyel wrote:
>>
>> On Wed, Aug 3, 2016 at 11:45 AM, Julien Grall
>> wrote:
>>>
>>> The whole discussion of this series was to defer the exposition of altp2m
>>> HVMOP to the guest until we find a usage. I.e a
Hello Sergej,
Title: s/altp2m/p2m/
On 01/08/16 18:10, Sergej Proskurin wrote:
The initially named function "p2m_alloc_table" allocated pages solely
required for the host's p2m. The new implementation leaves p2m
allocation related parts inside of this function to generally initialize
p2m/altp2m
On 03/08/16 18:51, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 11:45 AM, Julien Grall wrote:
The whole discussion of this series was to defer the exposition of altp2m
HVMOP to the guest until we find a usage. I.e a simple:
xsm_hvm_altp2m_op(XSM_PRIV/XSM_DM_PRIV, d);
So why do you want to
On Mon, Aug 01, 2016 at 10:25:22AM -0400, Konrad Rzeszutek Wilk wrote:
> On Mon, Aug 01, 2016 at 04:15:10PM +0200, Petr Tesarik wrote:
> > On Mon, 1 Aug 2016 15:47:58 +0200
[...]
> I wonder if Xen should do that - as in 'fix' the bootparams to not have it.
> Or perhaps Linux code during bootup ca
On Wed, Aug 3, 2016 at 11:45 AM, Julien Grall wrote:
>
>
> On 03/08/16 18:43, Tamas K Lengyel wrote:
>>
>> On Wed, Aug 3, 2016 at 11:30 AM, Andrew Cooper
>> wrote:
>>>
>>> On 03/08/16 17:51, Julien Grall wrote:
On 03/08/16 17:42, Tamas K Lengyel wrote:
>
> On Wed, Aug
On Wed, 3 Aug 2016, Juergen Gross wrote:
> On 02/08/16 20:27, Stefano Stabellini wrote:
> > On Tue, 2 Aug 2016, Juergen Gross wrote:
> >> Instead of calling xen_be_register() for each supported backend type
> >> for hvm and pv guests in their machine init functions use a common
> >> function in ord
On 03/08/16 18:43, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 11:30 AM, Andrew Cooper
wrote:
On 03/08/16 17:51, Julien Grall wrote:
On 03/08/16 17:42, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 10:24 AM, Julien Grall
wrote:
Hi Tamas,
On 03/08/16 17:01, Tamas K Lengyel wrote:
O
On Wed, Aug 3, 2016 at 11:30 AM, Andrew Cooper
wrote:
> On 03/08/16 17:51, Julien Grall wrote:
>>
>>
>> On 03/08/16 17:42, Tamas K Lengyel wrote:
>>> On Wed, Aug 3, 2016 at 10:24 AM, Julien Grall
>>> wrote:
Hi Tamas,
On 03/08/16 17:01, Tamas K Lengyel wrote:
>
> On Wed
Hello Sergej,
Title: s/altp2m/p2m/ and please drop the full stop.
On 01/08/16 18:10, Sergej Proskurin wrote:
This commit pulls out generic init/teardown functionality out of
p2m_init and p2m_teardown into p2m_init_one, p2m_free_one, and
p2m_flush_table functions. This allows our future impleme
On 03/08/16 17:51, Julien Grall wrote:
>
>
> On 03/08/16 17:42, Tamas K Lengyel wrote:
>> On Wed, Aug 3, 2016 at 10:24 AM, Julien Grall
>> wrote:
>>> Hi Tamas,
>>>
>>>
>>> On 03/08/16 17:01, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 8:08 AM, Julien Grall
wrote:
>
> Hell
Freeing a buffer may now call the IOCTL_PRIVCMD_HCALL_BUF_UNLOCK ioctl
on the fd, so the fd should only be closed after the buffer cache is
released.
Signed-off-by: David Vrabel
---
tools/libs/call/core.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libs/call/core.c
This is the libxencall side of the "xen/privcmd: prevent page
migration for hypercall buffers" series for Linux. It calls the
necessary LOCK/UNLOCK ioctls.
This should not be applied until after the Linux series is applied.
David
___
Xen-devel maili
Using just mlock'd buffers for hypercalls is not sufficient as these
are still subject to compaction and page migration. Use the new
IOCTL_PRIVCMD_HCALL_BUF_LOCK and IOCTL_PRIVCMD_HCALL_BUF_UNLOCK ioctls
provided by the privcmd driver to prevent this.
Since not all kernels support these ioctls, d
Original version of that patch (commit a89941816726) had to be reverted
due to Xen allocating irqs in its cpu_up ops.
The first patch moves allocations into hotplug notifiers and the second
one restores the original patch (with minor adjustments to new hotplug
framework)
This originally went thro
Commit ce0d3c0a6fb1 ("genirq: Revert sparse irq locking around
__cpu_up() and move it to x86 for now") reverted irq locking
introduced by commit a89941816726 ("hotplug: Prevent alloc/free
of irq descriptors during cpu up/down") because of Xen allocating
irqs in both of its cpu_up ops.
We can move
Now that Xen no longer allocates irqs in _cpu_up() we can restore
commit a89941816726 ("hotplug: Prevent alloc/free of irq descriptors
during cpu up/down")
Signed-off-by: Boris Ostrovsky
Acked-by: Thomas Gleixner
CC: x...@kernel.org
CC: Thomas Gleixner
---
arch/x86/kernel/smpboot.c | 11 --
(CC Stefano)
On 03/08/16 18:04, Julien Grall wrote:
Hello Sergej,
Title: s/altp2m/p2m/
On 01/08/16 18:10, Sergej Proskurin wrote:
The struct vttbr introduces a simple way to precisely access the
individual fields of the vttbr.
I am not sure whether this is really helpful. You don't seem to
debugger_trap_entry() is not safe to use during early boot, as it follows
current before it is necesserily safe to do so. Futhermore it does this
unconditionally, despite most callsites turning into no-ops because of the
vector test.
Inline debugger_trap_entry() into the two callers where doesn't
Hello Sergej,
Title: s/altp2m/p2m/
On 01/08/16 18:10, Sergej Proskurin wrote:
The struct vttbr introduces a simple way to precisely access the
individual fields of the vttbr.
I am not sure whether this is really helpful. You don't seem to take
often advantage of those fields and the actual a
Using mlock() for hypercall buffers is not sufficient since mlocked
pages are still subject to compaction and page migration. Page
migration can be prevented by taking additional references to the
pages.
Introduce two new ioctls: IOCTL_PRIVCMD_HCALL_BUF_LOCK and
IOCTL_PRIVCMD_HCALL_BUF_UNLOCK whi
Currently libxencall using mlocked buffers for hypercall buffers.
This pages are subject to compaction and page migration. A userspace
process may see a hypercall fail with -EFAULT if a page backing a
hypercall buffer is in the process of being migrated.
Page migration can be prevented by taking a
The standard return value for ioctl(2) where the cmd is not supported
is ENOTTY, not EINVAL.
Signed-off-by: David Vrabel
---
drivers/xen/privcmd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c
index 702040f..ac76bc4 100644
--- a
Hello Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
This commit moves the altp2m-related code from x86 to ARM. Functions
that are no yet supported notify the caller or print a BUG message
stating their absence.
Also, the struct arch_domain is extended with the altp2m_active
attribute, repr
On 03/08/16 17:42, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 10:24 AM, Julien Grall wrote:
Hi Tamas,
On 03/08/16 17:01, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 8:08 AM, Julien Grall wrote:
Hello Sergej,
Please try to reply to all when answering on the ML. Otherwise the answe
On Wed, Aug 3, 2016 at 10:24 AM, Julien Grall wrote:
> Hi Tamas,
>
>
> On 03/08/16 17:01, Tamas K Lengyel wrote:
>>
>> On Wed, Aug 3, 2016 at 8:08 AM, Julien Grall wrote:
>>>
>>> Hello Sergej,
>>>
>>> Please try to reply to all when answering on the ML. Otherwise the answer
>>> may be delayed/los
On Wed, Aug 3, 2016 at 10:10 AM, George Dunlap wrote:
> On 03/08/16 16:58, Tamas K Lengyel wrote:
>> On Wed, Aug 3, 2016 at 9:44 AM, George Dunlap
>> wrote:
>>> On 03/08/16 16:40, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 9:30 AM, George Dunlap
wrote:
> On 03/08/16 16:18, Tam
Hi Tamas,
On 03/08/16 17:01, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 8:08 AM, Julien Grall wrote:
Hello Sergej,
Please try to reply to all when answering on the ML. Otherwise the answer
may be delayed/lost.
On 03/08/16 13:45, Sergej Proskurin wrote:
The interesting part about #VE is
On Wed, Aug 03, 2016 at 10:15:51AM -0600, Jan Beulich wrote:
> >>> On 03.08.16 at 18:00, wrote:
> > On Wed, Aug 03, 2016 at 09:37:41AM -0600, Jan Beulich wrote:
> >> >>> On 03.08.16 at 17:28, wrote:
> >> > On 03/08/16 16:25, Jan Beulich wrote:
> >> > On 03.08.16 at 17:11, wrote:
> >> >>> On
>>> On 03.08.16 at 18:10, wrote:
> George Dunlap writes ("Re: Device model operation hypercall (DMOP, re qemu
> depriv)"):
>> So before qemu devpriv can be usable, *all* the HVMCTL operations would
>> need to be audited, and those that were deemed insecure would need to be
>> either fixed or remo
On 03/08/16 16:58, Tamas K Lengyel wrote:
Well, you never know when your series gets split up and have only bits
of it merged. So having each patch tested individually is a necessity
to ensure nothing gets broken midway through. Especially since
mem_access/monitor/vm_event is not tested automat
flight 99926 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99926/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 03/08/16 17:11, Jan Beulich wrote:
On 05.07.16 at 21:05, wrote:
>> --- a/xen/arch/x86/domain.c
>> +++ b/xen/arch/x86/domain.c
>> @@ -545,25 +545,31 @@ int arch_domain_create(struct domain *d, unsigned int
>> domcr_flags,
>> }
>> else
>> {
>> -if ( (config->emulation
>>> On 03.08.16 at 18:00, wrote:
> On Wed, Aug 03, 2016 at 09:37:41AM -0600, Jan Beulich wrote:
>> >>> On 03.08.16 at 17:28, wrote:
>> > On 03/08/16 16:25, Jan Beulich wrote:
>> > On 03.08.16 at 17:11, wrote:
>> >>> On Tue, Aug 2, 2016 at 5:12 PM, Jan Beulich wrote:
>> >>> On 02.08.16 a
George Dunlap writes ("Re: Device model operation hypercall (DMOP, re qemu
depriv)"):
> So before qemu devpriv can be usable, *all* the HVMCTL operations would
> need to be audited, and those that were deemed insecure would need to be
> either fixed or removed.
Even worse, the bad HVMCTLs would b
>>> On 05.07.16 at 21:05, wrote:
> --- a/xen/arch/x86/domain.c
> +++ b/xen/arch/x86/domain.c
> @@ -545,25 +545,31 @@ int arch_domain_create(struct domain *d, unsigned int
> domcr_flags,
> }
> else
> {
> -if ( (config->emulation_flags & ~XEN_X86_EMU_ALL) != 0 )
> +ui
On 03/08/16 16:58, Tamas K Lengyel wrote:
> On Wed, Aug 3, 2016 at 9:44 AM, George Dunlap
> wrote:
>> On 03/08/16 16:40, Tamas K Lengyel wrote:
>>> On Wed, Aug 3, 2016 at 9:30 AM, George Dunlap
>>> wrote:
On 03/08/16 16:18, Tamas K Lengyel wrote:
> On Wed, Aug 3, 2016 at 8:41 AM, Georg
>>> On 05.07.16 at 21:05, wrote:
> Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
with a suggestion and a minor remark:
> @@ -90,16 +87,20 @@ ROMS += $(SEABIOS_ROM)
> endif
>
> .PHONY: all
> -all: subdirs-all
> +all: acpi subdirs-all
> $(MAKE) hvmloader
>
> +.PHONY: acpi
> +a
>>> On 05.07.16 at 21:05, wrote:
> --- a/xen/arch/x86/hvm/vlapic.c
> +++ b/xen/arch/x86/hvm/vlapic.c
> @@ -1115,7 +1115,12 @@ static int __vlapic_accept_pic_intr(struct vcpu *v)
> struct domain *d = v->domain;
> struct vlapic *vlapic = vcpu_vlapic(v);
> uint32_t lvt0 = vlapic_get_re
Andrew Cooper writes ("Re: [OSSTEST PATCH] ts-xen-build-prep: Use .gitconfig so
_everything_ uses git cache"):
> On 03/08/16 16:47, Ian Jackson wrote:
> Note that the git config url insteadOf feature is backwards: one
> configures the config variable "url.NEW-URL.insteadOf.OLD-URL". So
>
flight 99917 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99917/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-raw 9 debian-di-install fail in 99911 pass in 99917
test-armhf-armhf-xl-rtds 11 gu
On Wed, Aug 3, 2016 at 8:08 AM, Julien Grall wrote:
> Hello Sergej,
>
> Please try to reply to all when answering on the ML. Otherwise the answer
> may be delayed/lost.
>
> On 03/08/16 13:45, Sergej Proskurin wrote:
>>
>> The interesting part about #VE is that it allows to handle certain
>> violat
On Wed, Aug 03, 2016 at 09:37:41AM -0600, Jan Beulich wrote:
> >>> On 03.08.16 at 17:28, wrote:
> > On 03/08/16 16:25, Jan Beulich wrote:
> > On 03.08.16 at 17:11, wrote:
> >>> On Tue, Aug 2, 2016 at 5:12 PM, Jan Beulich wrote:
> >>> On 02.08.16 at 17:49, wrote:
> > On Tue, Aug 02,
On Wed, Aug 3, 2016 at 9:44 AM, George Dunlap wrote:
> On 03/08/16 16:40, Tamas K Lengyel wrote:
>> On Wed, Aug 3, 2016 at 9:30 AM, George Dunlap
>> wrote:
>>> On 03/08/16 16:18, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 8:41 AM, George Dunlap
wrote:
> On 01/08/16 17:52, Tama
In particular, when xen.git clones a subtrees, whose url we didn't
specify in the runvars, we end up using the url from xen.git's
Config.mk.
Arrange to use the git cache for all git urls, via the insteadOf
feature.
Note that the git config url insteadOf feature is backwards: one
configures the co
On 03/08/16 16:47, Ian Jackson wrote:
> In particular, when xen.git clones a subtrees, whose url we didn't
> specify in the runvars, we end up using the url from xen.git's
> Config.mk.
>
> Arrange to use the git cache for all git urls, via the insteadOf
> feature.
>
> Note that the git config url i
On 03/08/16 16:40, Tamas K Lengyel wrote:
> On Wed, Aug 3, 2016 at 9:30 AM, George Dunlap
> wrote:
>> On 03/08/16 16:18, Tamas K Lengyel wrote:
>>> On Wed, Aug 3, 2016 at 8:41 AM, George Dunlap
>>> wrote:
On 01/08/16 17:52, Tamas K Lengyel wrote:
> The two functions monitor_traps and m
On Wed, Aug 3, 2016, at 07:50 AM, li...@ssl-mail.com wrote:
> So *today's* simplest working combination seems to be
After the sytem is booted with
+ patched kernel
- /mapbs
+ efi=no-rs
I now get tons of these at serial console
(XEN) [2016-08-03 15:23:25] d1v0 Ov
>>> On 28.07.16 at 12:50, wrote:
> Instead of having several representation of hvm_start_info in C, define
> it in public/arch-x86/hvm/start_info.h so both libxc and hvmloader can
> use it.
>
> Also move the comment describing the binary format to be alongside the
> C struct.
>
> Signed-off-by:
On Wed, Aug 3, 2016 at 9:30 AM, George Dunlap wrote:
> On 03/08/16 16:18, Tamas K Lengyel wrote:
>> On Wed, Aug 3, 2016 at 8:41 AM, George Dunlap
>> wrote:
>>> On 01/08/16 17:52, Tamas K Lengyel wrote:
The two functions monitor_traps and mem_access_send_req duplicate some of
the
>>> On 03.08.16 at 17:28, wrote:
> On 03/08/16 16:25, Jan Beulich wrote:
> On 03.08.16 at 17:11, wrote:
>>> On Tue, Aug 2, 2016 at 5:12 PM, Jan Beulich wrote:
>>> On 02.08.16 at 17:49, wrote:
> On Tue, Aug 02, 2016 at 11:47:22AM +0200, Roger Pau Monne wrote:
>> On Fri, Jul 29, 2
On Wed, Aug 3, 2016 at 5:43 AM, Julien Grall wrote:
> Hi Tamas,
>
> On 02/08/16 23:47, Tamas K Lengyel wrote:
>>
>> On Tue, Aug 2, 2016 at 4:05 PM, Julien Grall wrote:
>>>
>>> On 02/08/2016 22:34, Tamas K Lengyel wrote:
On Tue, Aug 2, 2016 at 2:02 PM, Julien Grall
wrote:
>
>>>
1 - 100 of 200 matches
Mail list logo