flight 44347 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44347/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-armhf-pvops 3 host-install(3) broken like 44327
build-armhf
>>> Konrad Rzeszutek Wilk 04/14/16 12:03 AM >>>
>--- a/Config.mk
>+++ b/Config.mk
>@@ -126,6 +126,17 @@ endef
>check-$(gcc) = $(call cc-ver-check,CC,0x040100,"Xen requires at least
>gcc-4.1")
>$(eval $(check-y))
>
>+ld-ver-build-id = $(shell $(1) --build-id 2>&1 | \
>+
>>> Konrad Rzeszutek Wilk 04/14/16 12:04 AM >>>
>--- a/xen/common/kernel.c
>+++ b/xen/common/kernel.c
>@@ -376,6 +376,42 @@ DO(xen_version)(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
>return -EFAULT;
>return 0;
>}
>+
>+case XENVER_build_id:
>+{
>+xen_buil
* What's data integrity extension(DIX) and why?
Modern filesystems feature checksumming of data and metadata to protect against
data corruption. However, the detection of the corruption is done at read time
which could potentially be months after the data was written. At that point the
original d
>>> Konrad Rzeszutek Wilk 04/14/16 12:03 AM >>>
>+.PHONY: note.o
>+note.o:
>+ $(OBJCOPY) -O binary --only-section=.note.gnu.build-id
>$(BASEDIR)/xen-syms $@.bin
>+ $(OBJCOPY) -I binary -O elf64-x86-64 -B i386:x86-64 \
>+ --rename-section=.data=.xsplice.depends -S $@.bin
In accordance with CODING_SYTLE:
- Use 'r' for return values to functions whose return values are a
different error space (like xc_tmem_control, xc_tmem_auth)
libxc functions are supposed to, on failure, set errno and alwas return -1
which is the value stored in 'r', therfore use LOG() instea
Returning error codes makes it easier for shell scripts to tell if a
command has failed or succeeded.
Signed-off-by: George Dunlap
Signed-off-by: Paulina Szubarczyk
---
Changed since v2:
- Remove the change to exit code since the other pathes take care of that
---
tools/libxl/xl_cmdimpl.c |
This is my bite-sized outreachy project [1][2].
The patch aims to improve coding_style and return failure for more xl commands:
- pci-*
-- tmem-*
After rebase to staging it seems that the patch {09} cleaning
libxl_set_memory_target()
to return useful error codes from [0] is not applied I resen
Functions libxl_tmem_freeze(), libxl_tmem_thaw(), libxl_tmem_set() and
libxl_tmem_shared_auth() located in libxl.c file return
ERROR_FAIL/ERROR_INVAL or internal error codes from libxc library
improve main_tmem_* return codes by returning EXIT_{SUCCESS/FAILURE}
accordingly to return codes of those
*libxl__device_from_pcidev() initialize the values of libxl__device
struct and can be void.
*libxl__create_pci_backend(), libxl__device_pci_destroy_all()
should propagate the success/error, rather than always returning 0.
Signed-off-by: Paulina Szubarczyk
---
Changes since v2:
- changed the
- Use EXIT_{SUCCESS,FAILURE} for main_cd*() function
- Use 0/1 as return values of cd_insert function
Signed-off-by: Paulina Szubarczyk
Acked-by: Roger Pau Monné
---
tools/libxl/xl_cmdimpl.c | 16 +++-
1 file changed, 11 insertions(+), 5 deletions(-)
diff --git a/tools/libxl/xl_c
libxl_set_memory_target seems to have the following return values:
* 1 on failure, if the failure happens because of a xenstore error *or*
* invalid target
* -1 if the setmaxmem hypercall
* -errno if the set_pod_target hypercall target fails
* 0 on success
Make it consistently return ERROR_FAI
Various coding style compliance cleanups, such as, arranging for
using only one path out of the function, whitespaces in loops ad if-s
and r instead of rc for storing non-libxl error codes.
Signed-off-by: Paulina Szubarczyk
---
Changes since v2:
- changed the changelog
---
tools/libxl/libxl_pci
On ARM64 Linux the HVC instruction is used to trap into Xen. As this
can be set only at EL3, i.e. outside from Xen, document this boot
requirement.
Signed-off-by: Dirk Behme
---
docs/misc/arm/booting.txt | 4
1 file changed, 4 insertions(+)
diff --git a/docs/misc/arm/booting.txt b/docs/mis
In some mailing list discussion
http://lists.xen.org/archives/html/xen-devel/2016-04/msg00214.html
some details about the interrupt handling of Xen were given.
Add that so it's not forgotten.
Signed-off-by: Dirk Behme
---
Note: I'd be happy to move this to an other documentation file if
a
flight 92114 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92114/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail in 91991 pass in
92114
test-armhf-armhf-libvirt-xs
On 20/04/16 08:26, Bob Liu wrote:
>
> /*
> + * Recognized only if "feature-data-integrity" is present in backend xenbus
> info.
> + * A request with BLKIF_OP_DIX_FLAG indicates the following request is a
> special
> + * request which only contains integrity-metadata segments of current
> reque
Hello Mark,
do you think that this patch addresses your previous comments
(http://marc.info/?l=devicetree&m=145926913008544&w=2) appropriately?
Thanks,
Stefano
On Thu, 7 Apr 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> When it's a Xen domain0 booting with ACPI, it will supply a /chosen
On Mon, 18 Apr 2016, Rafael J. Wysocki wrote:
> On Thu, Apr 7, 2016 at 2:03 PM, Shannon Zhao wrote:
> > From: Shannon Zhao
> >
> > ACPI 6.0 introduces a new table STAO to list the devices which are used
> > by Xen and can't be used by Dom0. On Xen virtual platforms, the physical
> > UART is used
On Fri, 2016-04-01 at 15:35 +0200, Roger Pau Monné wrote:
> Please don't top post, it breaks the flow of the conversation.
>
> I'm also adding Anthony (one of the QEMU/Xen maintainers).
> On Fri, 1 Apr 2016, Paulina Szubarczyk wrote:
>
> > Hi Roger,
> >
> > An another point that needs to be fill
Hello Tamas,
On 14/04/16 17:33, Tamas K Lengyel wrote:
The monitor_get_capabilities check actually belongs to the monitor subsystem so
relocating and renaming it to sanitize the code's name and location.
Signed-off-by: Tamas K Lengyel
Cc: Razvan Cojocaru
Cc: Keir Fraser
Cc: Jan Beulich
Cc:
>>> Konrad Rzeszutek Wilk 04/14/16 12:02 AM >>>
Same comments here as for previous test cases.
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
The following changes since commit 42bb626f7ebc9197d2943b897a99e127315275ab:
Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request' into
staging (2016-04-12 09:34:52 +0100)
are available in the git repository at:
git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xe
From: Wei Liu
In commit ac0487e1 ("xenfb.c: avoid expensive loops when prod <=
out_cons"), ">=" was used. In fact, a full ring is a legit state.
Correct the test to use ">".
Reported-by: "Hao, Xudong"
Signed-off-by: Wei Liu
Tested-by: "Hao, Xudong"
Acked-by: Anthony Perard
Signed-off-by: Ste
>>> Konrad Rzeszutek Wilk 04/14/16 12:03 AM >>>
>--- a/xen/common/xsplice.c
>+++ b/xen/common/xsplice.c
>@@ -517,6 +517,8 @@ static int prepare_payload(struct payload *payload,
>sec = xsplice_elf_sec_by_name(elf, ".note.gnu.build-id");
>if ( sec )
>{
>+struct payload *data;
>>> Juergen Gross 04/15/16 4:54 PM >>>
>Today there are several different situations in which moving a cpu
>from or to a cpupool will return -EBUSY. This makes it hard for the
>user to know what he did wrong, as the Xen tools are not capable to
>print a detailed error message.
>
>Depending on the
>>> Tamas K Lengyel 04/14/16 6:34 PM >>>
>+static inline uint32_t arch_monitor_get_capabilities(struct domain *d)
>+{
>+uint32_t capabilities = 0;
Pointless initializer.
>+capabilities = (1U << XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST);
>+
>+return capabilities;
>+}
Even more - the en
Hello Fu Wei,
On 14/04/16 18:06, fu@linaro.org wrote:
From: Fu Wei
This patch updates the documention for loading XSM by the module which
> lacks a specific compatible string.
s/documention/documentation/
s/which/that/
The sentence is not clear to me. I would rephrase:
"This patch upda
Hi Jan,
On 20/04/16 12:26, Jan Beulich wrote:
Tamas K Lengyel 04/14/16 6:34 PM >>>
+static inline uint32_t arch_monitor_get_capabilities(struct domain *d)
+{
+uint32_t capabilities = 0;
Pointless initializer.
+capabilities = (1U << XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST);
+
+re
I wasn't CC'ed so this fled my attention.
On Fri, Mar 11, 2016 at 03:18:01PM -0500, Zhigang Wang wrote:
> xentop will segmentation fault in this case:
>
> # ip link set eth1 down
> # ip link set eth1 name ETH
> # xentop
>
> This patch will let xentop to handle all uppercase network interfa
On 04/20/2016 04:59 PM, David Vrabel wrote:
> On 20/04/16 08:26, Bob Liu wrote:
>>
>> /*
>> + * Recognized only if "feature-data-integrity" is present in backend xenbus
>> info.
>> + * A request with BLKIF_OP_DIX_FLAG indicates the following request is a
>> special
>> + * request which only con
Hi Jan,
On 14/04/16 16:23, Jan Beulich wrote:
Julien Grall 04/14/16 5:08 PM >>>
On 14/04/16 15:56, Jan Beulich wrote:
Julien Grall 04/14/16 10:55 AM >>>
On 14/04/2016 05:01, Jan Beulich wrote:
Julien Grall 04/13/16 6:01 PM >>>
--- a/xen/include/xen/bitops.h
+++ b/xen/include/xen/bitops.h
flight 92124 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92124/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-xsm 15 guest-localmigratefail REGR. vs. 60684
build-i386
On 14/04/16 20:52, Ben Sanda wrote:
Julien, George, Andrew, and Stefano,
Hello Ben,
Sorry for the late answer, we were at the Xen hackathon.
Thank you for the explanation.
The ARM implementation of share_xen_page_with_guest is nearly the same
as the x86 one. However, the type is never use
On 04/19/2016 08:31 PM, Jan Beulich wrote:
snip
+ASSERT(spin_is_locked(&payload_lock));
+list_for_each_entry ( data, &payload_list, list )
+{
+unsigned int i;
+
+for ( i = 0; i < data->nsyms; i++ )
+{
+if ( !data->symtab[i].new_symbol )
+
b4ff8389ed14 is incomplete: relies on nr_legacy_irqs() to get the number
of legacy interrupts when actually nr_legacy_irqs() returns 0 after
probe_8259A(). Use NR_IRQS_LEGACY instead.
Signed-off-by: Stefano Stabellini
diff --git a/arch/x86/pci/xen.c b/arch/x86/pci/xen.c
index beac4df..349b8ce 10
On 04/13/2016 10:09 PM, Konrad Rzeszutek Wilk wrote:
snip
+static int xsplice_action(xen_sysctl_xsplice_action_t *action)
+{
+struct payload *data;
+char n[XEN_XSPLICE_NAME_SIZE];
+int rc;
+
+rc = verify_name(&action->name, n);
+if ( rc )
+return rc;
+
+spin_lock(&
(CC REST maintainers)
Hello Dirk,
Please CC the relevant maintainers for this patch. You can use
scripts/get_maintainers.pl for this purpose.
On 19/04/16 06:59, Dirk Behme wrote:
On ARM64 Linux the HVC instruction is used to trap into Xen. As this
can be set only at EL3, i.e. outside from Xe
On Tue, Apr 19, 2016 at 07:07:01AM -0400, Maryam Masoudian wrote:
> Thanks.
> One more thing, is it possible to see the percentage of shared memory among
> VMs by xl tool?
> As there is a xl sharing and I want to know whether this provides this
> facility ...
>
Not sure. You can check xl manpage
Hello Dirk,
On 19/04/16 06:59, Dirk Behme wrote:
In some mailing list discussion
http://lists.xen.org/archives/html/xen-devel/2016-04/msg00214.html
some details about the interrupt handling of Xen were given.
Add that so it's not forgotten.
For your information, this is described on the wiki
On Mon, Apr 18, 2016 at 11:04:39AM -0600, Jim Fehlig wrote:
> On 04/16/2016 05:54 AM, osstest service owner wrote:
> > flight 91597 libvirt real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/91597/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
> > inclu
Add PSCI 1.0 compatibility strings to make Xen behave correctly with
device trees having
compatible = "arm,psci-1.0";
Signed-off-by: Dirk Behme
---
xen/arch/arm/domain_build.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index a
Wei Liu writes ("[PATCH] [[for-4.7]] libxl: fix old style declarations"):
> Fix errors like:
>
> /local/work/xen.git/dist/install/usr/local/include/libxl_uuid.h:59:1: error:
> 'static' is not at beginning of declaration [-Werror=old-style-declaration]
> void static inline libxl_uuid_copy_0x04040
Hello Dirk,
On 20/04/16 14:32, Dirk Behme wrote:
Add PSCI 1.0 compatibility strings to make Xen behave correctly with
device trees having
compatible = "arm,psci-1.0";
You need to explain in the commit message what is the correct behavior.
I.e Xen needs to blacklist any PSCI 1.0 node as it wi
Wei Liu writes ("Re: [PATCH] tools/libxc: Correct use of X86_XSS_MASK in guest
xstate generation"):
> On Tue, Apr 19, 2016 at 06:27:05PM +0100, Andrew Cooper wrote:
> > Submitted-from: A punt, on the Cam, during the the hackathon, because.
>
> Acked-by: Wei Liu
> Release-acked-by: Wei Liu
>
>
On 20/04/16 13:08, Bob Liu wrote:
>
>
> The "feature-data-integrity" could be extended to "unsigned int" instead of
> "bool",
> so as to report all DIX formats backend supports.
I think it would be preferable to have something string based. I think
Linux reports the formats using a string enco
Wei Liu writes ("Re: [PATCH 0/3] adjust error return values for cpupool
operations"):
> In principle I agree we need better semantics and documentation of this
> hypercall, and because this is new code so it's risk free, so:
>
> Release-acked-by: Wei Liu
>
> I will leave this series for Ian t
On 11/04/16 15:04, Juergen Gross wrote:
> Document the interface between qemu and libxl regarding backends
> supported by qemu.
>
> Signed-off-by: Juergen Gross
Anyone to commit this, please?
Juergen
> ---
> v2: - replace variable Xenstore path parts () with bash-like syntax
> ($XYZ) as
Use shift operator, but not muliplication.
No function change.
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/arm64/head.S | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index 05e3db0..
The 'Base address for 4K mapping' is '(x19 >> THIRD_SHIFT) << THIRD_SHIFT'.
Also we are building 4K page mapping, not section mapping.
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/arm64/head.S | 8
1 file changed, 4 insertions(+), 4 deletions(-)
di
On Tue, Apr 12, 2016 at 03:03:15PM +0100, Wei Liu wrote:
> On Mon, Apr 11, 2016 at 03:04:09PM +0200, Juergen Gross wrote:
> > Document the interface between qemu and libxl regarding backends
> > supported by qemu.
> >
> > Signed-off-by: Juergen Gross
>
> Reviewed-by: Wei Liu
>
Release-acked-b
flight 92128 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92128/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-i386-xl-qemuu-ovm
xentop will segmentation fault in this case:
# ip link set eth1 down
# ip link set eth1 name ETH
# xentop
This patch will let xentop to handle all uppercase network interface name.
Signed-off-by: Zhigang Wang
---
tools/xenstat/libxenstat/src/xenstat_linux.c | 7 +--
1 file changed, 5
Sorry I was at the Xen hackathon in the last two days.
On Tue, Apr 12, 2016 at 11:35:20AM +0800, Zhenzhong Duan wrote:
> 在 2016/4/11 19:27, Wei Liu 写道:
> >On Mon, Apr 11, 2016 at 09:42:57AM +0800, Zhenzhong Duan wrote:
> >>It's tool's duty to pass a correct cpumap to XEN. On a host with less than
Hello Peng,
On 20/04/16 14:54, Peng Fan wrote:
Use shift operator, but not muliplication.
No function change.
Why? The compiler will calculate the address at compilation time.
Regards,
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/arm64/head.S | 2 +-
On Sun, Apr 17, 2016 at 02:03:28PM -0600, Jan Beulich wrote:
> >>> Roger Pau Monne 04/15/16 8:27 PM >>>
> >Previously HOSTCC was always hardcoded to gcc
>
> So what is the goal here? Be able to build on a gcc-free system? Or else, how
> does it matter what compiler build elements get built with?
On Tue, Apr 19, 2016 at 12:59 PM, Yu, Zhang wrote:
>>> So what about the VM suspend case you mentioned above? Will that trigger
>>> the unmapping of ioreq server? Could the device model also take the role
>>> to change the p2m type back in such case?
>>
>>
>> Yes. The device model has to be told b
> -Original Message-
> From: George Dunlap
> Sent: 20 April 2016 15:50
> To: Yu, Zhang
> Cc: Paul Durrant; xen-devel@lists.xen.org; Kevin Tian; Jan Beulich; Andrew
> Cooper; Tim (Xen.org); Lv, Zhiyuan; jun.nakaj...@intel.com
> Subject: Re: [Xen-devel] [PATCH v2 3/3] x86/ioreq server: Add HV
On 19/04/16 12:02, Yu, Zhang wrote:
>
>
> On 4/19/2016 12:58 AM, Paul Durrant wrote:
>>> -Original Message-
>>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
>>> Jan
>>> Beulich
>>> Sent: 18 April 2016 17:47
>>> To: Paul Durrant
>>> Cc: Kevin Tian; Keir (Xen.org);
On Tue, Apr 19, 2016 at 10:51:14AM -0600, Jan Beulich wrote:
> >>> "Yu, Zhang" 04/19/16 1:46 PM >>>
> >On 4/19/2016 7:15 PM, Paul Durrant wrote:
> >> I talked to Wei earlier and he is happy to give a freeze exception to this
> >> change.
> >
> >Great! I really obliged. :)
> >BTW, Does some form o
On Sun, Apr 17, 2016 at 04:02:02AM -0600, Jan Beulich wrote:
> >>> Roger Pau Monne 04/15/16 8:29 PM >>>
> >I've also noticed that Xen always sets "-no-integrated-as" when using clang,
> >because previous versions (<3.8.0) didn't support .code16/.code32/.code64
> >in inline asm. This is solved at l
On Wed, Apr 20, 2016 at 10:16:35AM -0400, Zhigang Wang wrote:
> xentop will segmentation fault in this case:
>
> # ip link set eth1 down
> # ip link set eth1 name ETH
> # xentop
>
> This patch will let xentop to handle all uppercase network interface name.
>
> Signed-off-by: Zhigang Wang
On Wed, Apr 20, 2016 at 3:57 PM, Paul Durrant wrote:
>> -Original Message-
>> From: George Dunlap
>> Sent: 20 April 2016 15:50
>> To: Yu, Zhang
>> Cc: Paul Durrant; xen-devel@lists.xen.org; Kevin Tian; Jan Beulich; Andrew
>> Cooper; Tim (Xen.org); Lv, Zhiyuan; jun.nakaj...@intel.com
>> Sub
On 20 April 2016 at 12:14, Stefano Stabellini wrote:
> The following changes since commit 42bb626f7ebc9197d2943b897a99e127315275ab:
>
> Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request'
> into staging (2016-04-12 09:34:52 +0100)
>
> are available in the git repository at:
> >+void arch_xsplice_free_payload(void *va)
> >+{
> >+vfree_xen(va);
> >+}
>
> What is the idea behind having this hook (instead of generic code just calling
> vfree_xen() [or really just vfree()])?
To have an symmetry with the allocation one. I don't know enough about
ARM to know whether th
On Mon, Apr 18, 2016 at 12:23:26AM -0600, Jan Beulich wrote:
> >>> Konrad Rzeszutek Wilk 04/18/16 7:55 AM >>>
> >> >+ if ( delta > elf->len )
> >> >+ {
> >> >+ dprintk(XENLOG_ERR, XSPLICE "%s: Section table is past end of
> >> >payload!\n",
> >> >+ elf->name);
> >> >+ return -EINVAL;
> >> >+ }
>
> >+.PHONY: xsplice
> >+xsplice: config.h
> >+# Need to have these done in sequential order
> >+$(MAKE) -f $(BASEDIR)/Rules.mk xen_hello_world_func.o
> >+$(MAKE) -f $(BASEDIR)/Rules.mk xen_hello_world.o
>
> Why do these two need doing in order? And why can't $(XSPLICE) not just depend
On Wed, Apr 20, 2016 at 7:24 AM, Wei Liu wrote:
> On Tue, Apr 19, 2016 at 07:07:01AM -0400, Maryam Masoudian wrote:
> > Thanks.
> > One more thing, is it possible to see the percentage of shared memory
> among
> > VMs by xl tool?
> > As there is a xl sharing and I want to know whether this provid
> -Original Message-
> From: George Dunlap
> Sent: 20 April 2016 16:38
> To: Paul Durrant
> Cc: Yu, Zhang; Kevin Tian; jun.nakaj...@intel.com; Andrew Cooper; Tim
> (Xen.org); xen-devel@lists.xen.org; Lv, Zhiyuan; Jan Beulich
> Subject: Re: [Xen-devel] [PATCH v2 3/3] x86/ioreq server: Add HV
On Wed, Apr 20, 2016 at 4:02 PM, George Dunlap wrote:
> On 19/04/16 12:02, Yu, Zhang wrote:
>>
>>
>> On 4/19/2016 12:58 AM, Paul Durrant wrote:
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
Jan
Beulich
Sent: 18 April 2016
Xen Developers,
Would there be any interest in replacing some of the
context-sensitive macros in x86_emulate.c, to make it more
maintainable?
I work on the Xenon project, which researches ways to transform
Xen into a higher-security hypervisor. One of the things we do is
modify Xen code to make i
>>> Julien Grall 04/20/16 2:35 PM >>>
>It is a matter of taste.
Indeed.
> Is there any reason to not allow different way to create a mask?
I dislike it, but not so much to stand in the way to get it in. I.e. I'm not
going
to NAK it, but I'm also not currently planning to ACK it.
Jan
___
>>> George Dunlap 04/20/16 6:30 PM >>>
>On Wed, Apr 20, 2016 at 4:02 PM, George Dunlap
>wrote:
>> On 19/04/16 12:02, Yu, Zhang wrote:
>>> So I suppose the only place we need change for this patch is
>>> for hvmmem_type_t, which should be defined like this?
>>>
>>> typedef enum {
>>> HVMMEM_r
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
> Beulich
> Sent: 20 April 2016 17:53
> To: George Dunlap; Paul Durrant; Wei Liu; yu.c.zh...@linux.intel.com
> Cc: Kevin Tian; Keir (Xen.org); Andrew Cooper; Tim (Xen.org); xen-
> de...@lists.xe
>>> Konrad Rzeszutek Wilk 04/20/16 6:09 PM >>>
>On Mon, Apr 18, 2016 at 12:23:26AM -0600, Jan Beulich wrote:
>> >>> Konrad Rzeszutek Wilk 04/18/16 7:55 AM >>>
>> >> >+ if ( delta > elf->len )
>> >> >+ {
>> >> >+ dprintk(XENLOG_ERR, XSPLICE "%s: Section table is past end of
>> >> >payload!\n",
>>
On Wed, Apr 20, 2016 at 5:30 PM, Paul Durrant wrote:
>> In any case, is it really not the case that the devicemodels on the
>> far side have to re-register which IO ranges they're interested in?
>> Shouldn't the devicemodel on the far side re-register the pfns it
>> wants to watch as well? That a
>>> Konrad Rzeszutek Wilk 04/20/16 6:00 PM >>>
>> >+ size_t pages; /* Total pages for [text,rw,ro]_addr */
>>
>> Why size_t and not just unsigned int?
>
>Oh. I was somehow under the impression you liked size_t more than
>unsignged int! I will change it over.
When used where actually talking abou
>>> Konrad Rzeszutek Wilk 04/20/16 6:10 PM >>>
>> >+.PHONY: xsplice
>> >+xsplice: config.h
>> >+ # Need to have these done in sequential order
>> >+ $(MAKE) -f $(BASEDIR)/Rules.mk xen_hello_world_func.o
>> >+ $(MAKE) -f $(BASEDIR)/Rules.mk xen_hello_world.o
>>
>> Why do these two need doing
On 20/04/16 17:58, Paul Durrant wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
>> Beulich
>> Sent: 20 April 2016 17:53
>> To: George Dunlap; Paul Durrant; Wei Liu; yu.c.zh...@linux.intel.com
>> Cc: Kevin Tian; Keir (Xen.org); Andrew
On Wed, Apr 20, 2016 at 5:52 PM, Jan Beulich wrote:
>>If it's the case that the only code that uses this is in XenServer,
>>then I'd say the answer to #1 can be simply, "Don't compile" and
>>"Don't do that" respectively; and the answer to #2 can be either
>>"Leave it be" or "Remove the enum from t
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 20 April 2016 18:07
> To: Paul Durrant; Jan Beulich; Wei Liu; yu.c.zh...@linux.intel.com
> Cc: Kevin Tian; Keir (Xen.org); Andrew Cooper; Tim (Xen.org); xen-
> de...@lists.xen.org; zhiyuan...@intel.com; jun
>>> Roger Pau Monné 04/20/16 4:51 PM >>>
>On Sun, Apr 17, 2016 at 02:03:28PM -0600, Jan Beulich wrote:
>> >>> Roger Pau Monne 04/15/16 8:27 PM >>>
>> >@@ -50,8 +49,10 @@ DESTDIR ?= /
>> >clang ?= n
>> >ifeq ($(clang),n)
>> >gcc := y
>> >+HOSTCC = gcc
>> >else
>> >gcc := n
>> >+HOSTCC = c
flight 92125 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92125/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
test-amd64-amd64-xl-c
On 20/04/16 17:42, John McDermott wrote:
> Xen Developers,
>
> Would there be any interest in replacing some of the
> context-sensitive macros in x86_emulate.c, to make it more
> maintainable?
>
> I work on the Xenon project, which researches ways to transform
> Xen into a higher-security hyperviso
Data path and tapdisk 3
* Stop using block protocol for Windows, status of pvscsi
Windows 8 (10?) scsi only -- PV driver fakes a scsi device and
translates.
Propose to use pvscsi in the data path.
Juergen: pvscsi is on track, no script provided in tree. but there is
script available. planning t
* Background
Jon: XenServer has had plugin storage architecture / model for some
time. Try to invent new plugin model to not deeply embedded in
XenServer. It needs to work on standard Xen installation. Early in
the process, need to define APIs. Look into integrate with libxl.
* Data path plugi
* Signature verification
Code bloat to verify all sort of sigs. Limit to two types of sigs
Verify in hypervisor seems to be the only way.
What extra security provides? It ensure binaries you get is from the
vendor.
Can do in userspace in Dom0? Questionable, even Linux doesn't trust
modul
* Auto generate device handling routines
Libxl has a lot of PV drivers. And the number is increasing at the moment.
GlobalLogic has some customised drivers. The code plumbing is painful.
Libxl already has IDL to describe the device interface and uses
scripts to generate a lot of files.
Propose
* HVMlite domu support, some emulation in hypervisor, some modes to consider:
| lapic | ioapic | pit | pic | hpet | pm timer | rtc | comments |
|---++-+-+--+--+-+--|
| n | n | n | n | n| n| n |0 |
| y | n | n
On Apr 20, 2016 6:05 PM, "Jan Beulich" wrote:
>
> >>> Konrad Rzeszutek Wilk 04/20/16 6:00 PM >>>
> >> >+ size_t pages; /* Total pages for [text,rw,ro]_addr */
> >>
> >> Why size_t and not just unsigned int?
> >
> >Oh. I was somehow under the impression you liked size_t more than
> >unsignged int!
flight 92171 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92171/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
On Wed, Apr 20, 2016 at 04:12:59PM +0100, Wei Liu wrote:
> On Wed, Apr 20, 2016 at 10:16:35AM -0400, Zhigang Wang wrote:
> > xentop will segmentation fault in this case:
> >
> > # ip link set eth1 down
> > # ip link set eth1 name ETH
> > # xentop
> >
> > This patch will let xentop to handle
On Wed, Apr 20, 2016 at 03:02:25PM +0100, Wei Liu wrote:
> On Tue, Apr 12, 2016 at 03:03:15PM +0100, Wei Liu wrote:
> > On Mon, Apr 11, 2016 at 03:04:09PM +0200, Juergen Gross wrote:
> > > Document the interface between qemu and libxl regarding backends
> > > supported by qemu.
> > >
> > > Signed-
Toolstack session
=
Topics:
- Build system
- Stubdom
- Testing
- {o/c}xenstored
Wei: what downstream consumers expect from the build system. Xen has a top
level makefile that builds everything, by pulling other projects source
code. Trying to make it cleaner.
George: someo
flight 92139 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92139/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 91757
Regressions
On Wed, 2016-04-20 at 10:25 -0600, Tamas K Lengyel wrote:
>
>
> On Wed, Apr 20, 2016 at 7:24 AM, Wei Liu wrote:
> > On Tue, Apr 19, 2016 at 07:07:01AM -0400, Maryam Masoudian wrote:
> > > Thanks.
> > > One more thing, is it possible to see the percentage of shared
> > memory among
> > > VMs by x
On Apr 20, 2016 12:34, "Dario Faggioli" wrote:
>
> On Wed, 2016-04-20 at 10:25 -0600, Tamas K Lengyel wrote:
> >
> >
> > On Wed, Apr 20, 2016 at 7:24 AM, Wei Liu wrote:
> > > On Tue, Apr 19, 2016 at 07:07:01AM -0400, Maryam Masoudian wrote:
> > > > Thanks.
> > > > One more thing, is it possible t
flight 92184 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92184/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
On Wed, Apr 20, Paulina Szubarczyk wrote:
> @@ -398,34 +398,34 @@ libxl_device_pci
> *libxl_device_pci_assignable_list(libxl_ctx *ctx, int *num)
> dir = opendir(SYSFS_PCIBACK_DRIVER);
> +while((de = readdir(dir))) {
> -closedir(dir);
This change seems to leak 'dir' in success case
On Wed, Apr 20, Paulina Szubarczyk wrote:
> *libxl__device_from_pcidev() initialize the values of libxl__device
> struct and can be void.
> -static int libxl__device_from_pcidev(libxl__gc *gc, uint32_t domid,
> +static void libxl__device_from_pcidev(libxl__gc *gc, uint32_t domid,
>
1 - 100 of 128 matches
Mail list logo