>>> On 04.06.16 at 16:36, wrote:
> On 3 Jun 2016, at 16:20, Jan Beulich wrote:
>> Mind trying out the attached patch?
>
> Many thanks for your patch!! I did try it, and it is different now
> (details in files attached)
>
> "best of conf_space_header" see below.
>
> I cannot really make sense o
1: return proper values during BAR sizing
2: clean up read_dev_bar()
Signed-off-by: Jan Beulich
Side note: I had always assumed Konrad is the maintainer of pciback,
but according to ./MAINTAINERS he isn't: drivers/pci/*xen*, while
using wild cards, doesn't match drivers/xen/xen-pciback/*. Is tha
Reads following writes with all address bits set to 1 should return all
changeable address bits as one, not the BAR size (nor, as was the case
for the upper half of 64-bit BARs, the high half of the region's end
address). Presumably this didn't cause any problems so far because
consumers use the va
- drop unused function parameter
- simplify determination of 64-bit memory resource
- use const and unsigned
Signed-off-by: Jan Beulich
---
drivers/xen/xen-pciback/conf_space_header.c | 19 ---
1 file changed, 8 insertions(+), 11 deletions(-)
--- 4.7-rc2-xen-pciback-BAR.orig/
(Resending this bug report because the message I sent last week did not
make it to the mailing list somehow.)
Hi,
One of our users gets kernel panics from time to time when he tries to
use his Amazon EC2 instance with CentOS7 x64 in it [1]. Kernel panic
happens within minutes from the moment
>>> On 04.06.16 at 17:15, wrote:
> On 3 Jun 2016, at 15:26, Jan Beulich wrote:
>> I'll see to put together a patch for the recognizable problem,
>> but I'm still unclear about your actual one.
>
> regarding the actual one: while it is still not working, I managed to
> dig deeper and found a few
Just Cc-ing some Linux, block, and Xen on CentOS people...
On Mon, 2016-06-06 at 11:24 +0300, Evgenii Shatokhin wrote:
> (Resending this bug report because the message I sent last week did
> not
> make it to the mailing list somehow.)
>
> Hi,
>
> One of our users gets kernel panics from time to
It's identical to bar_init() now.
Signed-off-by: Jan Beulich
---
I'm sorry for this 3/2 - I only now noticed that this additional
simplification is now possible.
---
drivers/xen/xen-pciback/conf_space_header.c | 14 +-
1 file changed, 1 insertion(+), 13 deletions(-)
--- 4.7-rc2-xe
>>> On 06.06.16 at 07:56, wrote:
> This reverts commit cfacce340608be5f94ce0c8f424487b63c3d5399.
>
> Platforms supporting Intel NVDIMM are now required to provide
> persistency once pmem stores are accepted by the memory subsystem.
> This is usually achieved by a platform-level feature known as A
>>> On 03.06.16 at 18:35, wrote:
> I got a patch ready. But QEMU upstream refuses to start on the receiving end
> with following error message:
>
> qemu-system-i386: Unknown savevm section or instance 'cpu_common' 1
> qemu-system-i386: load of migration failed: Invalid argument
>
> With QEMU tr
(I'm sorry for the re-send - somehow Stefano's old Citrix address got
entered back into my address book.)
>>> On 03.06.16 at 18:35, wrote:
> I got a patch ready. But QEMU upstream refuses to start on the receiving end
> with following error message:
>
> qemu-system-i386: Unknown savevm section
Hi Jan,
On 6 Jun 2016, at 10:41, Jan Beulich wrote:
On 04.06.16 at 17:15, wrote:
On 3 Jun 2016, at 15:26, Jan Beulich wrote:
I'll see to put together a patch for the recognizable problem,
but I'm still unclear about your actual one.
regarding the actual one: while it is still not working,
Hi all,
a couple of months ago I started working on a new PV protocol for
virtualizing syscalls. I named it XenSock, as its main purpose is to
allow the implementation of the POSIX socket API in a domain other than
the one of the caller. It allows connect, accept, recvmsg, sendmsg, etc
to be imple
>>> On 06.06.16 at 11:09, wrote:
> [ 1466.964895 <0.23>] xen-pciback: :06:00.0: write request 4
> bytes at 0xc = 4000
> [ 1466.964897 <0.02>] xen-pciback: :06:00.0: read 1 bytes at
> 0xc
> [ 1466.964907 <0.10>] xen-pciback: :06:00.0: read 1 bytes at
> 0xc = 0
>>> On 03.06.16 at 21:51, wrote:
>> For HVMLite, there is specifically no qemu, and we need something which
>> can function when we want PCI Passthrough to work. I am quite confident
>> that the correct solution here is to have a basic host bridge/root port
>> implementation in Xen (as we alread
flight 95305 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/95305/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
On 06/06/16 10:33, Stefano Stabellini wrote:
> Hi all,
>
> a couple of months ago I started working on a new PV protocol for
> virtualizing syscalls. I named it XenSock, as its main purpose is to
> allow the implementation of the POSIX socket API in a domain other than
> the one of the caller. It a
On Tue, 31 May 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Currently it only needs ACPI table RSDP, XSDT, GTDT, MADT, FADT, DSDT
> for ARM VM. So only add placeholders for them here.
>
> Signed-off-by: Shannon Zhao
If we are going to make this ARM only, then maybe we should consider
mov
On Tue, 31 May 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Add ACPI tables relevant definitions for generating ACPI tables for ARM
> guest later. Currently RSDP, XSDT, GTDT, MADT, FADT and DSDT tables will
> be used.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxc/include/acpi_defs.
Hello,
On 04/06/2016 18:40, Tamas K Lengyel wrote:
On Sat, Jun 4, 2016 at 3:03 AM, Edgar E. Iglesias
wrote:
Forwarding SMC events for SMC insns that didn't pass the condition tests
doesn't make any sense to me. It'll just make the receivers job harder.
Why would a receiver want to do anything
Hi Stefano,
On 06/06/2016 11:04, Stefano Stabellini wrote:
On Tue, 31 May 2016, Shannon Zhao wrote:
From: Shannon Zhao
Add ACPI tables relevant definitions for generating ACPI tables for ARM
guest later. Currently RSDP, XSDT, GTDT, MADT, FADT and DSDT tables will
be used.
Signed-off-by: Shan
On 03/06/16 18:38, Andrew Cooper wrote:
> On 01/06/16 15:00, Wei Liu wrote:
>> Hi all
>>
>> During the discussion of XSA-180 Ian came up with the idea that we
>> repurpose xenconsoled to handle logging. I've done some research (and
>> some coding as well!).
>>
>> In my reply to George the other day
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Andrew Cooper
> Sent: 06 June 2016 10:58
> To: Stefano Stabellini; xen-de...@lists.xenproject.org
> Cc: joao.m.mart...@oracle.com; Wei Liu; Roger Pau Monne
> Subject: Re: [Xen-devel] RFC: XenSock
On Mon, 6 Jun 2016, Andrew Cooper wrote:
> On 06/06/16 10:33, Stefano Stabellini wrote:
> > Hi all,
> >
> > a couple of months ago I started working on a new PV protocol for
> > virtualizing syscalls. I named it XenSock, as its main purpose is to
> > allow the implementation of the POSIX socket API
On Mon, Jun 06, 2016 at 02:54:47AM -0600, Jan Beulich wrote:
> >>> On 06.06.16 at 07:56, wrote:
> > This reverts commit cfacce340608be5f94ce0c8f424487b63c3d5399.
> >
> > Platforms supporting Intel NVDIMM are now required to provide
> > persistency once pmem stores are accepted by the memory subsy
>>> On 06.06.16 at 12:31, wrote:
> On Mon, Jun 06, 2016 at 02:54:47AM -0600, Jan Beulich wrote:
>> >>> On 06.06.16 at 07:56, wrote:
>> > This reverts commit cfacce340608be5f94ce0c8f424487b63c3d5399.
>> >
>> > Platforms supporting Intel NVDIMM are now required to provide
>> > persistency once pme
On 2016/6/6 18:11, Julien Grall wrote:
> Hi Stefano,
>
> On 06/06/2016 11:04, Stefano Stabellini wrote:
>> On Tue, 31 May 2016, Shannon Zhao wrote:
>>> From: Shannon Zhao
>>>
>>> Add ACPI tables relevant definitions for generating ACPI tables for ARM
>>> guest later. Currently RSDP, XSDT, GTDT,
On 03/06/16 12:45, Ian Jackson wrote:
> George Dunlap writes ("Re: [Xen-devel] 4.7 qemu regression: HVM guests fail
> to boot from xvda"):
>> On 03/06/16 12:20, Olaf Hering wrote:
>>> I think the regression is: 'vdev=xvda' does not result in a disk
>>> connected to the emulated controller. Should
>>> On 06.04.16 at 03:25, wrote:
> --- a/tools/firmware/hvmloader/acpi/build.c
> +++ b/tools/firmware/hvmloader/acpi/build.c
> @@ -126,7 +126,7 @@ static struct acpi_20_madt *construct_madt(struct
> acpi_config *config)
> else
> lapic = (struct acpi_20_madt_lapic *)(madt + 1);
>
>
On Mon, 6 Jun 2016, Paul Durrant wrote:
> > -Original Message-
> > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> > Andrew Cooper
> > Sent: 06 June 2016 10:58
> > To: Stefano Stabellini; xen-de...@lists.xenproject.org
> > Cc: joao.m.mart...@oracle.com; Wei Liu; Roge
The original code is bogus because the common case is no HA enabled.
Setting ha variable at the beginning is not very useful.
Move ha to the scope where it is used.
Signed-off-by: Wei Liu
---
tools/libxl/xl_cmdimpl.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/tool
The libxl__stub_dm_spawn_state field in libxl__domain_create_state was
named dmss. That was inconsistent with how things were named (usually
acronym) and there was already libxl__dm_spawn_state named dmss in other
places.
Change dmss to sdss and fix up all sites that reference this field. No
func
A handful of patches I accumulated during freeze when I was debugging various
issues in xl / libxl.
Wei.
Wei Liu (6):
xl: remus/colo: only initialise ha variable when necessary
libxl: add emacs block to libxl_linux.c
libxl: linux hotplug: clean up get_hotplug_env
libxl: debug output for a
That get_hotplug_env function is called for both block and nic. Move
some nic specific code out of common code to appropriate place.
Signed-off-by: Wei Liu
---
tools/libxl/libxl_linux.c | 15 ---
1 file changed, 8 insertions(+), 7 deletions(-)
diff --git a/tools/libxl/libxl_linux.c
Signed-off-by: Wei Liu
---
tools/libxl/libxl_linux.c | 8
1 file changed, 8 insertions(+)
diff --git a/tools/libxl/libxl_linux.c b/tools/libxl/libxl_linux.c
index 624f028..aed8009 100644
--- a/tools/libxl/libxl_linux.c
+++ b/tools/libxl/libxl_linux.c
@@ -300,3 +300,11 @@ int libxl__pci_
George Dunlap writes ("Re: [Xen-devel] 4.7 qemu regression: HVM guests fail to
boot from xvda"):
> On 03/06/16 12:45, Ian Jackson wrote:
> > Secondly, the proposal above involves changing both the semantics of
> > existing `hdtype' parameter values, and the default hdtype value. The
> > resulting
Signed-off-by: Wei Liu
---
tools/libxl/libxl_device.c | 25 +
1 file changed, 25 insertions(+)
diff --git a/tools/libxl/libxl_device.c b/tools/libxl/libxl_device.c
index 4717027..b922a94 100644
--- a/tools/libxl/libxl_device.c
+++ b/tools/libxl/libxl_device.c
@@ -1167,6 +
Signed-off-by: Wei Liu
---
tools/libxl/libxl_dm.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_dm.c b/tools/libxl/libxl_dm.c
index 155a653..69d2242 100644
--- a/tools/libxl/libxl_dm.c
+++ b/tools/libxl/libxl_dm.c
@@ -52,13 +52,15 @@ static int libxl_
>>> On 06.04.16 at 03:25, wrote:
> ACPI sources will be available to various component which will build
> them according to their own rules. ACPI directory will only build
> sources.
"build sources" is kind of contradictory. How about "build intermediate
files"?
> --- a/tools/firmware/hvmloader/
>>> On 06.04.16 at 03:25, wrote:
> Users of ACPI builder will need to provide their own implemetations of
> strncpy(), memcpy, memset() and printf declared in stdio.h and string.h.
> For hvmloader we provide those two as wrappers around utul.h.
>
> Some x86-specific definitions move to ACPI build
On Tue, 31 May 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Construct GTDT table with the interrupt information of timers.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/libxl_arm.c | 75
> -
> 1 file changed, 74 insertions(+), 1 dele
On Tue, 31 May 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Assign the guest memory space for ACPI tables and replace the reg in DT
> with real values.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxc/xc_dom_arm.c | 16 +++-
> tools/libxl/libxl_arm.c | 40
On Tue, 31 May 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> The design of this feature is described as below.
> Firstly, the toolstack (libxl) generates the ACPI tables according the
> number of vcpus and gic controller.
>
> Then, it copies these ACPI tables to DomU memory space and passes
On 06/06/16 11:52, Ian Jackson wrote:
> George Dunlap writes ("Re: [Xen-devel] 4.7 qemu regression: HVM guests fail
> to boot from xvda"):
>> On 03/06/16 12:45, Ian Jackson wrote:
>>> Secondly, the proposal above involves changing both the semantics of
>>> existing `hdtype' parameter values, and t
Hello,
On 06/06/16 12:40, Stefano Stabellini wrote:
On Tue, 31 May 2016, Shannon Zhao wrote:
From: Shannon Zhao
Construct GTDT table with the interrupt information of timers.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm.c | 75 -
1
On Fri, 3 Jun 2016, Chenxiao Zhao wrote:
> On 6/3/2016 4:02 AM, Julien Grall wrote:
> > Hello,
> >
> > First thing, the time in the mail headers seems to be wrong. Maybe
> > because of a wrong timezone?
> >
> > I got: 04/06/16 02:32 however we are still the 3rd in my timezone.
> >
> > On 04/06/1
On Tue, Apr 05, 2016 at 09:25:47PM -0400, Boris Ostrovsky wrote:
> Signed-off-by: Boris Ostrovsky
> ---
> tools/libxc/Makefile | 22 +++-
> tools/libxc/include/xc_dom.h | 1 +
> tools/libxc/xc_acpi.c | 268
> ++
> tools/libxc/x
On Mon, 6 Jun 2016, Julien Grall wrote:
> Hello,
>
> On 06/06/16 12:40, Stefano Stabellini wrote:
> > On Tue, 31 May 2016, Shannon Zhao wrote:
> > > From: Shannon Zhao
> > >
> > > Construct GTDT table with the interrupt information of timers.
> > >
> > > Signed-off-by: Shannon Zhao
> > > ---
>
On Mon, Jun 06, 2016 at 11:00:37AM +0100, Stefano Stabellini wrote:
> On Tue, 31 May 2016, Shannon Zhao wrote:
> > From: Shannon Zhao
> >
> > Currently it only needs ACPI table RSDP, XSDT, GTDT, MADT, FADT, DSDT
> > for ARM VM. So only add placeholders for them here.
> >
> > Signed-off-by: Shann
On Mon, Jun 06, 2016 at 06:27:25PM +0800, Shannon Zhao wrote:
>
>
> On 2016/6/6 18:11, Julien Grall wrote:
> > Hi Stefano,
> >
> > On 06/06/2016 11:04, Stefano Stabellini wrote:
> >> On Tue, 31 May 2016, Shannon Zhao wrote:
> >>> From: Shannon Zhao
> >>>
> >>> Add ACPI tables relevant definitio
On Tue, May 31, 2016 at 01:02:57PM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Construct GTDT table with the interrupt information of timers.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/libxl_arm.c | 75
> -
> 1 file changed, 74
On Tue, May 31, 2016 at 01:02:52PM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> The design of this feature is described as below.
> Firstly, the toolstack (libxl) generates the ACPI tables according the
> number of vcpus and gic controller.
>
> Then, it copies these ACPI tables to DomU me
On Mon, May 23, 2016 at 12:06:40PM +0100, George Dunlap wrote:
> On Thu, May 19, 2016 at 4:01 PM, Jan Beulich wrote:
> On 19.05.16 at 16:53, wrote:
> >> On Thu, May 19, 2016 at 08:44:59AM -0600, Jan Beulich wrote:
> >>> >>> On 19.05.16 at 16:34, wrote:
> >>> > We could even have the
> >>> >
On 03/06/16 12:45, Ian Jackson wrote:
> George Dunlap writes ("Re: [Xen-devel] 4.7 qemu regression: HVM guests fail
> to boot from xvda"):
>> On 03/06/16 12:20, Olaf Hering wrote:
>>> I think the regression is: 'vdev=xvda' does not result in a disk
>>> connected to the emulated controller. Should
flight 95312 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/95312/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 3 host-install(3) broken REG
>>> On 06.04.16 at 03:25, wrote:
> --- a/tools/firmware/hvmloader/acpi/acpi2_0.h
> +++ b/tools/firmware/hvmloader/acpi/acpi2_0.h
> @@ -490,6 +490,11 @@ struct acpi_numa {
> xen_vmemrange_t *vmemrange;
> };
>
> +struct acpi_mem_ops {
> +void *(*alloc)(uint32_t size, uint32_t align);
> +
On 06/06/2016 04:11 AM, Jan Beulich wrote:
> @@ -225,38 +225,42 @@ static inline void read_dev_bar(struct p
> (PCI_BASE_ADDRESS_SPACE_MEMORY |
> PCI_BASE_ADDRESS_MEM_TYPE_64))) {
> bar_info->val = res[pos - 1].start >> 32;
On 06/06/16 11:12, George Dunlap wrote:
> On 03/06/16 18:38, Andrew Cooper wrote:
>> On 01/06/16 15:00, Wei Liu wrote:
>>> Hi all
>>>
>>> During the discussion of XSA-180 Ian came up with the idea that we
>>> repurpose xenconsoled to handle logging. I've done some research (and
>>> some coding as w
On 06/06/2016 04:12 AM, Jan Beulich wrote:
> - drop unused function parameter
> - simplify determination of 64-bit memory resource
> - use const and unsigned
>
> Signed-off-by: Jan Beulich
Reviewed-by: Boris Ostrovsky
___
Xen-devel mailing list
Xen-d
>>> On 06.04.16 at 03:25, wrote:
> .gitignore| 8
>
> tools/firmware/hvmloader/Makefile | 3 +--
> tools/firmware/hvmloader/smbios.c | 1 +
> tools/firmware/rombios/32
On Mon, 6 Jun 2016, Jan Beulich wrote:
> >>> On 03.06.16 at 18:35, wrote:
> > I got a patch ready. But QEMU upstream refuses to start on the receiving
> > end
> > with following error message:
> >
> > qemu-system-i386: Unknown savevm section or instance 'cpu_common' 1
> > qemu-system-i386: load
On Wed, Jun 01, 2016 at 02:38:17PM +0800, Haozhong Zhang wrote:
> On 05/27/16 17:16, Wei Liu wrote:
> > On Fri, May 27, 2016 at 05:14:08PM +0100, Wei Liu wrote:
> > > On Fri, May 27, 2016 at 10:06:31AM -0600, Jan Beulich wrote:
> > > > >>> On 27.05.16 at 17:31, wrote:
> > > > > On Fri, May 27, 201
On 06/06/2016 04:47 AM, Jan Beulich wrote:
> It's identical to bar_init() now.
>
> Signed-off-by: Jan Beulich
> ---
> I'm sorry for this 3/2 - I only now noticed that this additional
> simplification is now possible.
I wonder whether we should also move content of read_dev_bar() into
bar_init().
>>> On 06.04.16 at 03:25, wrote:
> --- /dev/null
> +++ b/tools/libxc/xc_acpi.c
> @@ -0,0 +1,268 @@
> +#include
> +#include
> +#include
> +#include
> +#include
> +
> +#include
> +#include
> +#include
Why are these two needed here? The code here shouldn't care
about the mode the guest may l
Hi,
About the livepatch TODO: "Make XENPF_get_symbol also include Live Patch
symbols" mentioned at http://wiki.xenproject.org/wiki/XSplice, I am wondering
how the patched function would be dumped.
For instance, if function "gnttab_usage_print_all" is livepatched, it would
show as symbol in both
On Thu, May 19, 2016 at 05:37:30PM +0300, Iurii Mykhalskyi wrote:
> PV rtc device interface is implemented in libxl and xl with
> full support for device control. No JSON parser for domain
> configuration yet.
I'm not sure I follow the last sentence. What JSON parser do you need?
Is there a speci
>>> On 06.04.16 at 03:25, wrote:
> With this flags set guests will not try to set up SCI.
I've just read through the respective ACPI spec section again, and
I couldn't find a reference to SCI from there ("Hardware-Reduced
ACPI"). Can you clarify this connection please. Also there are other
conseq
On 27.05.16 15:30, Haozhong Zhang wrote:
> Commit 26646f3 "x86/mce: translate passed-in GPA to host machine
> address" and commit 4ddf474 "tools/xen-mceinj: Pass in GPA when
> injecting through MSR_MCI_ADDR" forgot to consider reserved domain
> ID and mistakenly add MC_MSRINJ_F_GPADDR flag for them
flight 95299 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/95299/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail REGR. vs.
94856
test-amd64-i
On Mon, Jun 06, 2016 at 02:07:46PM +0100, Stefano Stabellini wrote:
> On Mon, 6 Jun 2016, Jan Beulich wrote:
> > >>> On 03.06.16 at 18:35, wrote:
> > > I got a patch ready. But QEMU upstream refuses to start on the receiving
> > > end
> > > with following error message:
> > >
> > > qemu-system-
On Mon, Jun 06, 2016 at 03:40:33PM +0200, Egger, Christoph wrote:
> On 27.05.16 15:30, Haozhong Zhang wrote:
> > Commit 26646f3 "x86/mce: translate passed-in GPA to host machine
> > address" and commit 4ddf474 "tools/xen-mceinj: Pass in GPA when
> > injecting through MSR_MCI_ADDR" forgot to conside
>>> On 06.04.16 at 03:25, wrote:
> --- a/xen/common/libacpi/Makefile
> +++ b/xen/common/libacpi/Makefile
> @@ -21,7 +21,16 @@ C_SRC = build.c dsdt_anycpu.c dsdt_15cpu.c static_tables.c
> C_SRC += dsdt_anycpu_qemu_xen.c dsdt_empty.c
> OBJS = $(patsubst %.c,%.o,$(C_SRC))
>
> -CFLAGS_xeninclude
>>> On 06.06.16 at 15:03, wrote:
> On 06/06/2016 04:11 AM, Jan Beulich wrote:
>> @@ -225,38 +225,42 @@ static inline void read_dev_bar(struct p
>> (PCI_BASE_ADDRESS_SPACE_MEMORY |
>> PCI_BASE_ADDRESS_MEM_TYPE_64))) {
>> bar_
flight 95318 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/95318/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
>>> On 06.06.16 at 15:09, wrote:
> On 06/06/2016 04:47 AM, Jan Beulich wrote:
>> It's identical to bar_init() now.
>>
>> Signed-off-by: Jan Beulich
>> ---
>> I'm sorry for this 3/2 - I only now noticed that this additional
>> simplification is now possible.
>
> I wonder whether we should also mo
On 6/2/2016 5:07 AM, Julien Grall wrote:
Hello Aaron,
On 02/06/2016 02:32, Aaron Cornelius wrote:
This is with a custom application, we use the libxl APIs to interact
with Xen. Domains are created using the libxl_domain_create_new()
function, and domains are destroyed using the libxl_domain_de
On Mon, 6 Jun 2016, Wei Liu wrote:
> On Mon, Jun 06, 2016 at 02:07:46PM +0100, Stefano Stabellini wrote:
> > On Mon, 6 Jun 2016, Jan Beulich wrote:
> > > >>> On 03.06.16 at 18:35, wrote:
> > > > I got a patch ready. But QEMU upstream refuses to start on the
> > > > receiving end
> > > > with fol
On 06/06/2016 04:41 AM, Jan Beulich wrote:
>
>> - on the DomU - when I run that "test console" tool, the "lspci -xxx"
>> output is different from before/after
>> not much, though, only one register(?)
>>
>> diff lspci.before-testconsole lspci.after-testconsole
>> 2c2
>> < 00: cf 15 00 00 02 01 00
(CC Ian, Stefano and Wei)
Hello Aaron,
On 06/06/16 14:58, Aaron Cornelius wrote:
On 6/2/2016 5:07 AM, Julien Grall wrote:
Hello Aaron,
On 02/06/2016 02:32, Aaron Cornelius wrote:
This is with a custom application, we use the libxl APIs to interact
with Xen. Domains are created using the lib
On Mon, Jun 06, 2016 at 06:32:16AM -0700, Dongli Zhang wrote:
> Hi,
>
> About the livepatch TODO: "Make XENPF_get_symbol also include Live Patch
> symbols" mentioned at http://wiki.xenproject.org/wiki/XSplice, I am wondering
> how the patched function would be dumped.
Thank you for taking a look!
>>> On 06.06.16 at 15:32, wrote:
> Hi,
>
> About the livepatch TODO: "Make XENPF_get_symbol also include Live Patch
> symbols" mentioned at http://wiki.xenproject.org/wiki/XSplice, I am
> wondering
> how the patched function would be dumped.
>
> For instance, if function "gnttab_usage_print_all
On Thu, Jun 02, 2016 at 04:14:04PM +0100, Julien Grall wrote:
>
>
> On 02/06/16 16:04, Julien Grall wrote:
> >Hi Konrad,
> >
> >On 02/06/16 15:46, Konrad Rzeszutek Wilk wrote:
> >>On Tue, May 31, 2016 at 11:24:10AM +0100, Julien Grall wrote:
> >>>On 31/05/16 10:21, Stefano Stabellini wrote:
> >>>
Hi Konrad,
On 06/06/16 15:17, Konrad Rzeszutek Wilk wrote:
On Thu, Jun 02, 2016 at 04:14:04PM +0100, Julien Grall wrote:
On 02/06/16 16:04, Julien Grall wrote:
Hi Konrad,
On 02/06/16 15:46, Konrad Rzeszutek Wilk wrote:
On Tue, May 31, 2016 at 11:24:10AM +0100, Julien Grall wrote:
On 31/05
On Mon, Jun 06, 2016 at 03:05:47PM +0100, Julien Grall wrote:
> (CC Ian, Stefano and Wei)
>
> Hello Aaron,
>
> On 06/06/16 14:58, Aaron Cornelius wrote:
> >On 6/2/2016 5:07 AM, Julien Grall wrote:
> >>Hello Aaron,
> >>
> >>On 02/06/2016 02:32, Aaron Cornelius wrote:
> >>>This is with a custom app
On 06/06/2016 07:04 AM, Jan Beulich wrote:
>
>> --- a/tools/firmware/hvmloader/Makefile
>> +++ b/tools/firmware/hvmloader/Makefile
>> @@ -20,8 +20,6 @@
>> XEN_ROOT = $(CURDIR)/../../..
>> include $(XEN_ROOT)/tools/firmware/Rules.mk
>>
>> -SUBDIRS := acpi
>> -
>> # The HVM loader is started in
On 2016年06月06日 20:16, Wei Liu wrote:
> On Mon, Jun 06, 2016 at 06:27:25PM +0800, Shannon Zhao wrote:
>> >
>> >
>> > On 2016/6/6 18:11, Julien Grall wrote:
>>> > > Hi Stefano,
>>> > >
>>> > > On 06/06/2016 11:04, Stefano Stabellini wrote:
> >> On Tue, 31 May 2016, Shannon Zhao wrote:
> >
On 2016年06月06日 20:16, Wei Liu wrote:
> On Mon, Jun 06, 2016 at 11:00:37AM +0100, Stefano Stabellini wrote:
>> > On Tue, 31 May 2016, Shannon Zhao wrote:
>>> > > From: Shannon Zhao
>>> > >
>>> > > Currently it only needs ACPI table RSDP, XSDT, GTDT, MADT, FADT, DSDT
>>> > > for ARM VM. So only add
>>> On 06.06.16 at 16:01, wrote:
> On 06/06/2016 04:41 AM, Jan Beulich wrote:
>>
>>> - on the DomU - when I run that "test console" tool, the "lspci -xxx"
>>> output is different from before/after
>>> not much, though, only one register(?)
>>>
>>> diff lspci.before-testconsole lspci.after-testcon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-5242 / XSA-181
version 2
arm: Host crash caused by VMID exhaustion
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
=
>>> On 06.06.16 at 16:20, wrote:
> On 06/06/2016 07:04 AM, Jan Beulich wrote:
>>
>>> --- a/tools/firmware/hvmloader/Makefile
>>> +++ b/tools/firmware/hvmloader/Makefile
>>> @@ -20,8 +20,6 @@
>>> XEN_ROOT = $(CURDIR)/../../..
>>> include $(XEN_ROOT)/tools/firmware/Rules.mk
>>>
>>> -SUBDIRS := a
On 06/06/2016 09:51 AM, Jan Beulich wrote:
On 06.06.16 at 15:03, wrote:
>> On 06/06/2016 04:11 AM, Jan Beulich wrote:
>>> @@ -225,38 +225,42 @@ static inline void read_dev_bar(struct p
>>>(PCI_BASE_ADDRESS_SPACE_MEMORY |
>>> PCI_BASE_ADDRESS
On 2016年06月06日 20:04, Stefano Stabellini wrote:
> On Mon, 6 Jun 2016, Julien Grall wrote:
>> > Hello,
>> >
>> > On 06/06/16 12:40, Stefano Stabellini wrote:
>>> > > On Tue, 31 May 2016, Shannon Zhao wrote:
> > > From: Shannon Zhao
> > >
> > > Construct GTDT table with the interrup
On 06/06/2016 09:54 AM, Jan Beulich wrote:
On 06.06.16 at 15:09, wrote:
>> On 06/06/2016 04:47 AM, Jan Beulich wrote:
>>> It's identical to bar_init() now.
>>>
>>> Signed-off-by: Jan Beulich
>>> ---
>>> I'm sorry for this 3/2 - I only now noticed that this additional
>>> simplification is no
On 2016年06月06日 19:40, Stefano Stabellini wrote:
> On Tue, 31 May 2016, Shannon Zhao wrote:
>> From: Shannon Zhao
>>
>> Assign the guest memory space for ACPI tables and replace the reg in DT
>> with real values.
>>
>> Signed-off-by: Shannon Zhao
>> ---
>> tools/libxc/xc_dom_arm.c | 16 ++
On 06/06/2016 10:21 AM, Jan Beulich wrote:
On 06.06.16 at 16:01, wrote:
>> On 06/06/2016 04:41 AM, Jan Beulich wrote:
- on the DomU - when I run that "test console" tool, the "lspci -xxx"
output is different from before/after
not much, though, only one register(?)
di
On Tue, May 31, 2016 at 06:44:55AM +0200, Paulina Szubarczyk wrote:
[...]
> /*
> * Grant Sharing Interface (allocating and granting pages to others)
> */
> diff --git a/tools/libs/gnttab/libxengnttab.map
> b/tools/libs/gnttab/libxengnttab.map
> index dc737ac..6a94102 100644
> --- a/tools/libs
On 06/06/2016 10:29 AM, Jan Beulich wrote:
>> How would this help with avoiding building the intermediate files
>> from multiple paces (libxc and hvmloader specifically --- that was
>> the reason for .NOTPARALLEL).
> If you symlink the source files into three different subdirectories,
> building i
On Mon, 6 Jun 2016, Shannon Zhao wrote:
> On 2016年06月06日 20:04, Stefano Stabellini wrote:
> > On Mon, 6 Jun 2016, Julien Grall wrote:
> >> > Hello,
> >> >
> >> > On 06/06/16 12:40, Stefano Stabellini wrote:
> >>> > > On Tue, 31 May 2016, Shannon Zhao wrote:
> > > > From: Shannon Zhao
>
>>> On 06.06.16 at 16:49, wrote:
> On 06/06/2016 10:29 AM, Jan Beulich wrote:
>>> How would this help with avoiding building the intermediate files
>>> from multiple paces (libxc and hvmloader specifically --- that was
>>> the reason for .NOTPARALLEL).
>> If you symlink the source files into thre
On 6/6/2016 10:19 AM, Wei Liu wrote:
On Mon, Jun 06, 2016 at 03:05:47PM +0100, Julien Grall wrote:
(CC Ian, Stefano and Wei)
Hello Aaron,
On 06/06/16 14:58, Aaron Cornelius wrote:
On 6/2/2016 5:07 AM, Julien Grall wrote:
Hello Aaron,
On 02/06/2016 02:32, Aaron Cornelius wrote:
This is with
1 - 100 of 183 matches
Mail list logo