flight 96904 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96904/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt-xsm 12 migrate-support-checkfail never pass
test-amd64-amd64-libvirt 12 migrate-sup
flight 96924 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96924/
Perfect :-)
All tests in this flight passed
version targeted for testing:
xen 7da483b0236d8974cc97f81780dcf8e559a63175
baseline version:
xen fea586d801f75317cb
make sure QEMU machine class is initialized and QEMU has registered
Xen stubdom vTPM driver when call tpm_init()
Signed-off-by: Quan Xu
Signed-off-by: Emil Condrea
Reviewed-by: Stefan Berger
---
vl.c | 17 +++--
1 file changed, 11 insertions(+), 6 deletions(-)
diff --git a/vl.c b/
This patch adds infrastructure for xen front drivers living in qemu,
so drivers don't need to implement common stuff on their own. It's
mostly xenbus management stuff: some functions to access XenStore,
setting up XenStore watches, callbacks on device discovery and state
changes, and handle event
Prepare xen_be_unbind_evtchn to be shared with frontends:
* xen_be_unbind_evtchn -> xen_pv_unbind_evtchn
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c| 2 +-
hw/char/xen_console.c | 2 +-
hw/display/xenfb.c | 2 +-
hw/net/xen_nic.c | 2 +-
hw/xen/xen_pvdev.c
The name of the functions moved:
* xen_be_evtchn_event
* xen_be_unbind_evtchn
* xen_be_send_notify
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 37 +
hw/xen/xen_pvdev.c | 35 +++
include/hw/xen/xen
Prepare xen_be_evtchn_event to be shared with frontends:
* xen_be_evtchn_event -> xen_pv_evtchn_event
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_pvdev.c | 2 +-
include/hw/xen/xen_pvdev.h | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff -
This Patch provides the glue for the TPM_TIS(Qemu frontend) to Xen
stubdom vTPM domain that provides the actual TPM functionality. It
sends data and TPM commends with xen_vtpm_frontend. It is similar as
another two vTPM backends:
*vTPM passthrough backend Since QEMU 1.5.
*vTPM libtpms-based bac
xen_be_check_state should not be called for frontends
Use DEVOPS_FLAG_FE flag to distinguish a frontend.
Signed-off-by: Emil Condrea
Signed-off-by: Quan Xu
---
Changes in v9:
* Removed not needed strstr from xenstore_update_be
It was left over from first patch series when domu was included in
Its purpose is to store frontend related functions.
Signed-off-by: Quan Xu
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c | 1 +
hw/display/xenfb.c| 1 +
hw/net/xen_nic.c | 1 +
hw/xen/Makefile.objs | 2 +-
hw/xen/xen_backend.c | 47
Prepare xen_be_send_notify to be shared with frontends:
* xen_be_send_notify -> xen_pv_send_notify
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c| 4 ++--
hw/char/xen_console.c | 4 ++--
hw/display/xenfb.c | 8
hw/net/xen_nic.c | 4 ++--
hw/xen/xen_p
xen_be_frontend_changed -> xen_fe_frontend_changed
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_frontend.c | 4 ++--
include/hw/xen/xen_frontend.h | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_
Prepare xen_be_find_xendev to be shared with frontends:
* xen_be_find_xendev -> xen_pv_find_xendev
Signed-off-by: Emil Condrea
---
hw/display/xenfb.c | 4 ++--
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_pvdev.c | 2 +-
include/hw/xen/xen_pvdev.h | 2 +-
4 files changed, 5 ins
Prepare xen_be_del_xendev to be shared with frontends:
* xen_be_del_xendev -> xen_pv_del_xendev
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 2 +-
hw/xen/xen_pvdev.c | 2 +-
include/hw/xen/xen_pvdev.h | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a
* move xendevs qtail to xen_pvdev.c
* change xen_be_get_xendev to use a new function: xen_pv_insert_xendev
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 70 +---
hw/xen/xen_pvdev.c| 75 +++
* xenstore_update -> xen_pvdev.c
* xenstore_update_fe -> xen_frontend.c
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 43 +--
hw/xen/xen_frontend.c | 18 ++
hw/xen/xen_pvdev.c| 24
This driver transfers any request/repond between TPM xenstubdoms
driver and Xen vTPM stubdom, and facilitates communications between
Xen vTPM stubdom domain and vTPM xenstubdoms driver. It is a glue for
the TPM xenstubdoms driver and Xen stubdom vTPM domain that provides
the actual TPM functionalit
Also rename it to tpm_util_is_selftest().
Signed-off-by: Quan Xu
Signed-off-by: Emil Condrea
Reviewed-by: Stefan Berger
---
hw/tpm/Makefile.objs | 2 +-
hw/tpm/tpm_passthrough.c | 13 +
hw/tpm/tpm_util.c| 11 +++
hw/tpm/tpm_util.h| 1 +
4 files changed
Signed-off-by: Quan Xu
Signed-off-by: Emil Condrea
Reviewed-by: Eric Blake
---
Changes in v9:
* Replace `type` with `struct` as required by 895a2a80e
* Change `qpm_query_tpm_inst` as required by ce21131a0
---
configure| 14 ++
hmp.c| 2 ++
qapi-schema.json |
*INTRODUCTION*
The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM
functionality to virtual machines (Fedora, Ubuntu, Redhat, Windows .etc).
This allows programs to interact with a TPM in a virtual machine the same
way they interact with a TPM on the physical system. Each virtual
The purpose of the new file is to store generic functions shared by frontend
and backends such as xenstore operations, xendevs.
Signed-off-by: Quan Xu
Signed-off-by: Emil Condrea
---
hw/xen/Makefile.objs | 2 +-
hw/xen/xen_backend.c | 125 +---
Prepare xen_be_printf to be used by both backend and frontends:
* xen_be_printf -> xen_pv_printf
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c| 52 +++---
hw/char/xen_console.c | 10 -
hw/display/xenfb.c | 42 +++
On Sun, Jun 26, 2016 at 5:15 PM, sepanta s wrote:
>
>
>
> On Fri, Jun 24, 2016 at 8:10 PM, Tamas K Lengyel
> wrote:
>
>>
>> On Jun 24, 2016 05:19, "Razvan Cojocaru"
>> wrote:
>> >
>> > On 06/24/2016 02:05 PM, George Dunlap wrote:
>> > > On Wed, Jun 22, 2016 at 12:38 PM, sepanta s
>> wrote:
>>
flight 96893 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96893/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail in 96845 pass in
96893
test-armhf-armhf-xl-multivc
Am 10.07.2016 um 00:29 schrieb Andreas Ziegler :
> In May, Ingo Jürgensmann also started experiencing this problem and
> blogged about it:
> https://blog.windfluechter.net/content/blog/2016/03/23/1721-xen-randomly-crashing-server
> https://blog.windfluechter.net/content/blog/2016/05/12/1723-xen-ra
flight 96898 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96898/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
On Wed, 29 Jun 2016, Michael Young wrote:
I have been trying to trace a problem when using Fedora's qemu with a pv
guest which is that no graphics are available. I get the errors
xen be core: xen be: watching backend path (backend/console/2) failed
xen be core: xen be: watching backend path (b
When this daemon is started after creating backend device, that device
will not be configured.
Racy situation:
1. driver domain is started
2. frontend domain is started (just after kicking driver domain off)
3. device in frontend domain is connected to the backend (as specified
in frontend doma
flight 96949 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96949/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
flight 96965 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96965/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
flight 96980 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96980/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
> From: Corneliu ZUZU [mailto:cz...@bitdefender.com]
> Sent: Wednesday, July 06, 2016 11:50 PM
>
> Minor optimization @ vmx_update_guest_cr: checks if
> v->arch.hvm_vmx.exec_control
> was modified before actually calling vmx_update_cpu_exec_control(v).
>
> Signed-off-by: Corneliu ZUZU
Acked-by
> From: Corneliu ZUZU [mailto:cz...@bitdefender.com]
> Sent: Wednesday, July 06, 2016 11:51 PM
>
> For readability:
>
> * Add function arch_monitor_write_data (in x86/monitor.c) and separate
> handling
> of monitor_write_data there (previously done directly in hvm_do_resume).
>
> * Separate ena
what's the difference between this series and earlier one?
[PATCH v3 0/8] x86/vm-event: Adjustments & fixes
looks you have some patches cross-posted (e.g. 1/16)...
> -Original Message-
> From: Corneliu ZUZU [mailto:cz...@bitdefender.com]
> Sent: Saturday, July 09, 2016 12:12 PM
> To: xen
> From: Tamas K Lengyel [mailto:tamas.leng...@zentific.com]
> Sent: Friday, July 08, 2016 10:32 AM
>
> This patch implements sending notification to a monitor subscriber when an
> x86/vmx guest executes the CPUID instruction.
>
> Signed-off-by: Tamas K Lengyel
> @@ -3525,10 +3527,23 @@ void vm
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Friday, July 08, 2016 2:44 PM
>
> From: Quan Xu
>
> Do away with struct pci_ats_dev; integrate the few bits of information
> in struct pci_dev (and as a result drop get_ats_device() altogether).
> Hook ATS devices onto a linked list off of e
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Friday, July 08, 2016 2:46 PM
>
> From: Quan Xu
>
> If Device-TLB flush timed out, we hide the target ATS device
> immediately. By hiding the device, we make sure it can't be
> assigned to any domain any longer (see device_assigned).
>
> Si
During scsi command queueing, if mapping data fails, we need to
reclaim the failed request. Otherwise, the garbage request will
be pushed into the ring for the backend to work.
Signed-off-by: Bin Wu
---
drivers/scsi/xen-scsifront.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/scs
Title: Samsung Enterprise Portal mySingle
Hello everyone :)
I have a question about xen event channel. Is it possible to allocate two event channels in one xen frontend driver?
I want to bind two different irq handler to one xen frontend driver by using two event channels.
However, I'm
On 7/11/2016 5:54 AM, Tian, Kevin wrote:
what's the difference between this series and earlier one?
[PATCH v3 0/8] x86/vm-event: Adjustments & fixes
looks you have some patches cross-posted (e.g. 1/16)...
Corneliu ZUZU (16):
x86/vmx_update_guest_cr: minor optimization
x86: fix: make ato
This was 2/8 in the old v3-series "x86/vm-event: Adjustments & fixes".
Transferring code-review from "Tian, Kevin " (July
11, 2016) and responding...
On 7/9/2016 7:15 AM, Corneliu ZUZU wrote:
For readability:
* Add function monitor_ctrlreg_write_data() (in x86/monitor.c) and separate
handlin
This was 1/8 in the old v3-series "x86/vm-event: Adjustments & fixes".
Transferring code-review from "Tian, Kevin " (July
11, 2016).
On 7/9/2016 7:12 AM, Corneliu ZUZU wrote:
Minor optimization @ vmx_update_guest_cr: checks if v->arch.hvm_vmx.exec_control
was modified before actually calling v
42 matches
Mail list logo