This run is configured for baseline tests only.
flight 66875 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66875/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 3 host-install(
On 22/07/16 17:09, Juergen Gross wrote:
> Add a configuration option to /etc/sysconfig/xencommons to let the
> user configure whether he wants to start xenstore service as a daemon
> or as a stubdom.
>
> Changes in V3:
> - patch 1: re-add sd_notify() call
> - split up former patch 2 into 3 patches
On Sun, Jul 31, 2016 at 01:38:43PM +0800, Quan Xu wrote:
>
> Signed-off-by: Quan Xu
I'm confused, you sign off this patch with another email address.
Can you resend with your Huawei address and that address in SoB? Thanks!
> ---
> MAINTAINERS | 2 +-
> 1 file changed, 1 insertion(+), 1 deleti
>>> On 01.08.16 at 02:48, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Tuesday, June 28, 2016 3:42 PM
>> >>> On 28.06.16 at 03:58, wrote:
>> > As you know, SMAP/SMEP may affect the 32-bit pv guests, after discussed
>> > internally, our current idea is that we can just disable t
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, August 1, 2016 4:16 PM
> To: Wu, Feng
> Cc: Andrew Cooper(andrew.coop...@citrix.com)
> ; Nakajima, Jun ;
> Wang, Yong Y ; xen-devel@lists.xen.org
> Subject: RE: SMAP/SMEP issues with 32-bit pv guests
>
>
flight 99878 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99878/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-buildfail like 99864
build-i386-rumpuserxen
Hi,
At 18:28 +0200 on 29 Jul (1469816936), Roger Pau Monne wrote:
> --- a/xen/arch/x86/mm/shadow/common.c
> +++ b/xen/arch/x86/mm/shadow/common.c
> @@ -1604,9 +1604,8 @@ shadow_free_p2m_page(struct domain *d, struct page_info
> *pg)
> * Input will be rounded up to at least shadow_min_acceptable
flight 99880 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99880/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5a6752cc5ba4a674a0056a2d6e32e8e1dd9c348d
baseline version:
ovmf 2c855d3aaf36da80f8c4f0a
The xenstore-paths documentation specifies various control/feature-XXX
flags to allow a guest to tell a toolstack about its abilities to
respond to values written to control/shutdown. However, because the
parent control xenstore key is created read-only to the guest, unless
empty nodes for the feat
On 01/08/16 03:52, Mihai Donțu wrote:
> Signed-off-by: Mihai Donțu
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
flight 66876 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66876/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-i386-sid-netboot-pygrub 3 host-install(3) broken blocked in
66791
build-i386
VMs created on older versions on Xen will not have been provisioned with
pages to support creation of non-default ioreq servers. In this case
the ioreq server API is not supported and QEMU's only option is to fall
back to using the default ioreq server pages as it did prior to
commit 3996e85c ("Xen
> -Original Message-
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: 01 August 2016 10:16
> To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org
> Cc: Paul Durrant; Stefano Stabellini; Anthony Perard
> Subject: [PATCH] xen: handle inbound migration of VMs without ioreq se
Jim Fehlig writes ("[PATCH] docs: define semantics of vncpasswd in xl.cfg"):
> A recent discussion around LSN-2016-0001 [1] included defining
> the sematics of an empty string for a VNC password. It was stated
> that "libxl interprets an empty password in the caller's
> configuration to mean that p
>>> On 13.07.16 at 17:17, wrote:
> At 14:46 +0100 on 13 Jul (1468421211), Andrew Cooper wrote:
>> We cannot expect to use -Wformat and not the compiler provided
>> inttypes.h.
>
> Since we're not using the compiler-provided printf(), I think that
> we're on pretty thin ice with -Wformat anyway.
On 01/08/16 03:52, Mihai Donțu wrote:
> Found that Windows driver was using a SSE2 instruction MOVD.
>
> Signed-off-by: Zhi Wang
> Signed-off-by: Mihai Donțu
> ---
> Picked from the XenServer 7 patch queue, as suggested by Andrew Cooper
>
> Changed since v2:
> * handle the case where the destina
>>> On 13.07.16 at 15:46, wrote:
> On 22/06/16 14:12, Tim Deegan wrote:
>> At 12:24 +0100 on 22 Jun (1466598248), Andrew Cooper wrote:
>>> The C standard defines two types of conforming implementation; hosted and
>>> freestanding. A subset of the standard headers are the freestanding
> headers,
On 01/08/16 03:52, Mihai Donțu wrote:
> Signed-off-by: Mihai Donțu
> ---
> Changed since v2:
> * added tests for {,v}movq xmm,r64
> ---
> tools/tests/x86_emulator/test_x86_emulator.c | 120
> +++
> 1 file changed, 120 insertions(+)
>
> diff --git a/tools/tests/x86_emulat
On 30/07/16 04:19, Chao Gao wrote:
> MSI-x tables' initializtion had been deferred in the commit
> 74c6dc2d0ac4dcab0c6243cdf6ed550c1532b798. If an assigned device does not
> support
> MSI-x, the msixtbl_list won't be initialized. However, the following paths
> XEN_DOMCTL_bind_pt_irq
> pt
* Use _PAGE_AVAIL_HIGH and _PAGE_NX instead of opencoding them
* Drop further remenants of the 32bit hypervisor build
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: George Dunlap
---
xen/arch/x86/mm.c | 15 +++
1 file changed, 7 insertions(+), 8 deletions(-)
>>> On 08.07.16 at 18:14, wrote:
> On 07/08/2016 11:11 AM, Jan Beulich wrote:
> On 08.07.16 at 16:39, wrote:
>>> On 07/08/2016 06:10 AM, Jan Beulich wrote:
> @@ -615,20 +593,10 @@ void acpi_build_tables(struct acpi_config *config,
>>> unsigned int physical)
> offset
Hi,
I have recently upgraded to version 7 and noticed the root partition is 3.5GB.
I'm having to delete logs regularly and cant keep many historical logs.
Is there any way I can either extend the root partition ( I have local storage
so I was not able to extend upon upgrade).
Is there any way I
On 28/06/16 02:58, Wu, Feng wrote:
> Hi Andy,
>
> As you know, SMAP/SMEP may affect the 32-bit pv guests, after discussed
> internally, our current idea is that we can just disable this two feature for
> Xen hypervisor itself, hence only enable it for HVM guests. Do you think this
> is acceptabl
flight 99883 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99883/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Wed, Jul 27, 2016 at 04:10:18PM +0100, Julien Grall wrote:
> Hi Wei,
>
> On 25/07/16 16:22, Wei Liu wrote:
> >Starting from 08cffe66 ("xsm: add a default policy to .init.data") we
> >can attach a xsm policy blob to hypervisor. To build that policy blob
> >now hypervisor build system needs to en
On Thu, Jul 28, 2016 at 11:09:41AM +0100, Wei Liu wrote:
> On Wed, Jul 27, 2016 at 04:01:26PM -0400, Chris Patterson wrote:
> > From: Chris Patterson
> >
> > GCC 6 will warn on unused static const variables in c modules:
> > https://gcc.gnu.org/ml/gcc-patches/2015-09/msg00847.html
> >
> > When c
>>> On 14.07.16 at 17:58, wrote:
> --- a/xen/include/xen/types.h
> +++ b/xen/include/xen/types.h
> @@ -1,6 +1,8 @@
> #ifndef __TYPES_H__
> #define __TYPES_H__
>
> +#include
> +
> #include
>
> #define BITS_TO_LONGS(bits) \
> @@ -59,4 +61,8 @@ typedef __u64 __be64;
>
> typedef unsigned
On 01/08/16 11:29, Jan Beulich wrote:
On 14.07.16 at 17:58, wrote:
>> --- a/xen/include/xen/types.h
>> +++ b/xen/include/xen/types.h
>> @@ -1,6 +1,8 @@
>> #ifndef __TYPES_H__
>> #define __TYPES_H__
>>
>> +#include
>> +
>> #include
>>
>> #define BITS_TO_LONGS(bits) \
>> @@ -59,4 +61,
Hello Tamas,
On 29/07/16 23:26, Tamas K Lengyel wrote:
However, as this patch really only touches
things that belong to mem_access/monitor components maybe we should
split these from the generic ARM code altogether to avoid such
conflicts in the future.
I am not against moving part of mem_acce
>>> On 15.07.16 at 20:02, wrote:
> The generic domain creation logic in
> xen/common/domctl.c:default_vcpu0_location() attempts to try to do
> initial placement load-balancing by placing vcpu 0 on the least-busy
> non-primary hyperthread available. Unfortunately, the logic can end
> up picking a
Signed-off-by: Quan Xu
Reviewed-by: Kevin Tian
---
MAINTAINERS | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/MAINTAINERS b/MAINTAINERS
index 65c2447..97720a8 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -415,7 +415,7 @@ F: xen/include/asm-x86/hvm/monitor.h
VTPM
M: Dani
flight 99879 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99879/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 15 guest-localmigrate/x10 fail in
99847 pass in 99879
test-amd64-i386-
flight 99884 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99884/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 3d8fab5719a52d67cd4666bd08f63a21fe97c480
baseline version:
ovmf 5a6752cc5ba4a674a0056a2
On Mon, Aug 01, 2016 at 10:36:43AM +, Xuquan (Euler) wrote:
> Signed-off-by: Quan Xu
> Reviewed-by: Kevin Tian
Thank you both.
Quan, I think there is something wrong with your email setup.
When I tried to git am this patch, I got:
fatal: corrupt patch at line 11
Patch failed at 0001 MAINT
Wei, thanks!!
This email is sent out from outlook (the Linux can't send out email). the
format may be not correct.
Quan
On Aug 01 2016 at 18:46:00pm, Wei Liu wrote:
On Mon, Aug 01, 2016 at 10:36:43AM +, Xuquan (Euler) wrote:
> Signed-off-by: Quan Xu
> Reviewed-by: Kevin Tian
Thank you b
>>> On 20.07.16 at 20:01, wrote:
> +static int range_share(struct domain *d, struct domain *cd,
> + struct mem_sharing_op_range *range)
> +{
> +int rc = 0;
> +shr_handle_t sh, ch;
> +unsigned long start = range->_scratchspace ?: range->start;
> +
> +while( ran
>>> On 11.07.16 at 16:57, wrote:
> @@ -553,6 +570,27 @@ static long evtchn_ioctl(struct file *file,
> break;
> }
>
> + case IOCTL_EVTCHN_RESTRICT_DOMID: {
> + struct ioctl_evtchn_restrict_domid ierd;
> +
> + rc = -EACCES;
> + if (u->res
This run is configured for baseline tests only.
flight 66877 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66877/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm3 ho
On Fri, Jul 29, 2016 at 06:50:48PM +0100, Andrew Cooper wrote:
> On 29/07/16 17:28, Roger Pau Monne wrote:
> > if ( is_hardware_domain(d) )
> > -config->emulation_flags |= XEN_X86_EMU_PIT;
> > -if ( config->emulation_flags != 0 &&
> > - (config->emulation_fl
Introducing HVMCTL, Jan wrote:
> A long while back separating out all control kind operations (intended
> for use by only the control domain or device model) from the currect
> hvmop hypercall has been discussed. This series aims at finally making
> this reality (at once allowing to streamline the
On Fri, Jul 29, 2016 at 06:57:08PM +0100, Andrew Cooper wrote:
> On 29/07/16 17:28, Roger Pau Monne wrote:
> > Split the Dom0 builder into two different functions, one for PV (and classic
> > PVH), and another one for PVHv2. Introduce a new command line parameter,
> > dom0hvm in order to request th
There are two functions with name xen_pmu_init() in the kernel. Rename
the one in drivers/xen/sys-hypervisor.c to avoid shadowing the one in
arch/x86/xen/pmu.c
Signed-off-by: Juergen Gross
---
drivers/xen/sys-hypervisor.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/dr
The default for the Xen hypervisor is to not enable VPMU in order to
avoid security issues. In this case the Linux kernel will issue the
message "Could not initialize VPMU for cpu 0, error -95" which looks
more like an error than a normal state.
Change the message to something less scary in case t
>>> On 18.07.16 at 20:56, wrote:
> As a question , will disabling MSI enable bit in the card and switching
> back to legacy interrupt method might resolve the issue ?
No, at least not with the current implementation: MSI-X gets
"prepared" (PHYSDEVOP_prepare_msix) by the pciback driver,
i.e. the
>>> On 13.07.16 at 14:53, wrote:
> On 13/07/16 13:20, Petr Tesarik wrote:
>> If a crash kernel is loaded, do not crash the running domain. This is
>> needed if the kernel is loaded with crash_kexec_post_notifiers, because
>> panic notifiers are run before __crash_kexec() in that case, and this
>>
>>> On 13.07.16 at 22:02, wrote:
> On 13/07/16 20:44, Boris Ostrovsky wrote:
>> Do I need to account for the PDX hole?
>
> Jan is probably the best person to ask about this, but I am failure sure
> there are lurking dragons here.
I don't think there are - contiguous chunks of pages can't have a
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Monday, August 1, 2016 6:16 PM
> To: Wu, Feng
> Cc: Nakajima, Jun ; Wang, Yong Y
> ; Jan Beulich (jbeul...@suse.com)
> ; xen-devel@lists.xen.org
> Subject: Re: SMAP/SMEP issues with 32-bit pv guests
>
>
>>> On 28.07.16 at 12:50, wrote:
> The C struct in the document is no more in sync with the actual
> definition of the PVHv2 boot start info.
>
> Signed-off-by: Anthony PERARD
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 01/08/16 13:24, Wang, Yong Y wrote:
>> -Original Message-
>> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
>> Sent: Monday, August 1, 2016 6:16 PM
>> To: Wu, Feng
>> Cc: Nakajima, Jun ; Wang, Yong Y
>> ; Jan Beulich (jbeul...@suse.com)
>> ; xen-devel@lists.xen.org
>> Subject: R
On Mon, 2016-08-01 at 04:40 -0600, Jan Beulich wrote:
> > > > On 15.07.16 at 20:02, wrote:
> >
> > To solve this, when inserting a vcpu, always call the per-scheduler
> > "pick" function to revise the initial placement. This will
> > automatically take all knowledge the scheduler has into accoun
>>> On 01.08.16 at 13:32, wrote:
> 4. We could invent a new hypercall `DMOP' for hypercalls which device
>models should be able to use, which always has the target domain in
>a fixed location in the arguments. We have the dom0 privcmd driver
>know about this one hypercall number and t
On Monday 01 August 2016 10:54:10 Andrew Cooper wrote:
> On 01/08/16 03:52, Mihai Donțu wrote:
> > Signed-off-by: Mihai Donțu
> > ---
> > Changed since v2:
> > * added tests for {,v}movq xmm,r64
> > ---
> > tools/tests/x86_emulator/test_x86_emulator.c | 120
> > +++
> >
>>> On 20.07.16 at 16:00, wrote:
> This patch adds the generic implementation of binary search algorithm
> which is copied from Linux kernel v4.7-rc7. No functional changes.
The last sentence looks wrong in this context.
> --- a/xen/common/Makefile
> +++ b/xen/common/Makefile
> @@ -43,6 +43,7 @@
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Monday, August 1, 2016 8:31 PM
> To: Wang, Yong Y ; Wu, Feng
> Cc: Nakajima, Jun ; Jan Beulich
> (jbeul...@suse.com) ; xen-devel@lists.xen.org
> Subject: Re: SMAP/SMEP issues with 32-bit pv guests
>
>
On 01/08/16 13:46, Jan Beulich wrote:
On 20.07.16 at 16:00, wrote:
>> This patch adds the generic implementation of binary search algorithm
>> which is copied from Linux kernel v4.7-rc7. No functional changes.
> The last sentence looks wrong in this context.
>
>> --- a/xen/common/Makefile
>>
On Monday 01 August 2016 10:52:12 Andrew Cooper wrote:
> On 01/08/16 03:52, Mihai Donțu wrote:
> > Found that Windows driver was using a SSE2 instruction MOVD.
> >
> > Signed-off-by: Zhi Wang
> > Signed-off-by: Mihai Donțu
> > ---
> > Picked from the XenServer 7 patch queue, as suggested by Andre
On Monday 01 August 2016 15:53:27 Mihai Donțu wrote:
> On Monday 01 August 2016 10:52:12 Andrew Cooper wrote:
> > On 01/08/16 03:52, Mihai Donțu wrote:
> > > Found that Windows driver was using a SSE2 instruction MOVD.
> > >
> > > Signed-off-by: Zhi Wang
> > > Signed-off-by: Mihai Donțu
> > > -
On 01/08/16 13:53, Mihai Donțu wrote:
> On Monday 01 August 2016 10:52:12 Andrew Cooper wrote:
>> On 01/08/16 03:52, Mihai Donțu wrote:
>>> Found that Windows driver was using a SSE2 instruction MOVD.
>>>
>>> Signed-off-by: Zhi Wang
>>> Signed-off-by: Mihai Donțu
>>> ---
>>> Picked from the XenSe
On 01/08/16 12:15, Jan Beulich wrote:
On 11.07.16 at 16:57, wrote:
>> @@ -553,6 +570,27 @@ static long evtchn_ioctl(struct file *file,
>> break;
>> }
>>
>> +case IOCTL_EVTCHN_RESTRICT_DOMID: {
>> +struct ioctl_evtchn_restrict_domid ierd;
>> +
>> +
>>> On 01.08.16 at 14:53, wrote:
> On Monday 01 August 2016 10:52:12 Andrew Cooper wrote:
>> On 01/08/16 03:52, Mihai Donțu wrote:
>> > Found that Windows driver was using a SSE2 instruction MOVD.
>> >
>> > Signed-off-by: Zhi Wang
>> > Signed-off-by: Mihai Donțu
>> > ---
>> > Picked from the Xen
On 30/07/16 00:21, Tamas K Lengyel wrote:
On Fri, Jul 29, 2016 at 12:53 PM, Julien Grall wrote:
The following message flood the console when memaccess is enabled on
various platforms:
traps.c:2510:d1v0 HSR=0x9383004f pc=0x08b7d4c4 gva=0x08eeb8e0
gpa=0x004903f8e0
This is
On Mon, 1 Aug 2016 13:55:01 +0200
"Jan Beulich" wrote:
> >>> On 13.07.16 at 14:53, wrote:
> > On 13/07/16 13:20, Petr Tesarik wrote:
> >> If a crash kernel is loaded, do not crash the running domain. This is
> >> needed if the kernel is loaded with crash_kexec_post_notifiers, because
> >> panic
flight 99887 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99887/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is
why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is
broken for 32bit builds.
Fix the identified breakage with ELF_PRPTRVAL
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: Stefa
As xen/stdbool.h is included, the typedef should use bool rather than _Bool.
Suggested-by: Jan Beulich
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
---
xen/include/xen/types.h | 2 +-
1 file changed, 1 insertion(+), 1 delet
Suggested-by: Jan Beulich
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
---
xen/common/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/common/Makefile b/xen/common/Makefile
If user asks xl to automatically connect to console when creating a
guest, use the new startup protocol before trying to unpause domain so
that we don't lose any console output.
Signed-off-by: Wei Liu
---
tools/libxl/xl_cmdimpl.c | 28 +---
1 file changed, 25 insertions(+
The console client will write 0x00 to that fd before entering console
loop to indicate its readiness.
Signed-off-by: Wei Liu
---
tools/console/client/main.c | 15 +++
1 file changed, 15 insertions(+)
diff --git a/tools/console/client/main.c b/tools/console/client/main.c
index be3970
The new argument will be passed down to xenconsole process, which then
uses it to notify readiness.
Signed-off-by: Wei Liu
---
tools/libxl/libxl.c | 15 +++
tools/libxl/libxl.h | 43 ---
2 files changed, 51 insertions(+), 7 deletions(-)
diff -
There is no short '-t' option.
Signed-off-by: Wei Liu
---
tools/console/client/main.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/console/client/main.c b/tools/console/client/main.c
index f660e10..be39700 100644
--- a/tools/console/client/main.c
+++ b/tools/console/
The bug described in the comment has been fixed in libxl. Since console
client is a private binary and libxl is the only supported toolstack in
upstream, remove the bodge to simplify code.
Note that the xs watch is still needed because the console client
relies on it to tell if the tty is gone.
S
Wait until the tty node is available before exec'ing xenconsole.
Signed-off-by: Wei Liu
---
tools/libxl/libxl.c | 28 +++-
1 file changed, 27 insertions(+), 1 deletion(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 0bc805e..a611b29 100644
--- a/tools/lib
No user yet.
Signed-off-by: Wei Liu
---
tools/libxl/libxl.c | 57 ++---
1 file changed, 37 insertions(+), 20 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 760ebca..0bc805e 100644
--- a/tools/libxl/libxl.c
+++ b/tools/li
Signed-off-by: Wei Liu
---
docs/misc/console.txt | 6 ++
1 file changed, 6 insertions(+)
diff --git a/docs/misc/console.txt b/docs/misc/console.txt
index ed7b795..0da295e 100644
--- a/docs/misc/console.txt
+++ b/docs/misc/console.txt
@@ -124,3 +124,9 @@ can only have one pv console with xens
As discussed, this series implements the xen console client startup protocol.
Somewhat related, I need to fix libxl_console_exec as well.
With this series:
1. libxl will wait for tty node to show up before exec'ing console client.
2. xl will wait for console client to be ready before unpausing gu
>>> On 01.08.16 at 04:52, wrote:
> @@ -4412,6 +4412,7 @@ x86_emulate(
> case 0x7f: /* movq mm,mm/m64 */
> /* {,v}movdq{a,u} xmm,xmm/m128 */
> /* vmovdq{a,u} ymm,ymm/m256 */
> +case 0xd6: /* {,v}movq xmm,xmm/m64 */
> {
> uint8_t *buf = get_stub
On Monday 01 August 2016 07:19:51 Jan Beulich wrote:
> >>> On 01.08.16 at 04:52, wrote:
> > @@ -4412,6 +4412,7 @@ x86_emulate(
> > case 0x7f: /* movq mm,mm/m64 */
> > /* {,v}movdq{a,u} xmm,xmm/m128 */
> > /* vmovdq{a,u} ymm,ymm/m256 */
> > +case 0xd6: /*
On Monday 01 August 2016 06:59:08 Jan Beulich wrote:
> >>> On 01.08.16 at 14:53, wrote:
> > On Monday 01 August 2016 10:52:12 Andrew Cooper wrote:
> >> On 01/08/16 03:52, Mihai Donțu wrote:
> >> > Found that Windows driver was using a SSE2 instruction MOVD.
> >> >
> >> > Signed-off-by: Zhi W
>>> On 01.08.16 at 04:52, wrote:
> Found that Windows driver was using a SSE2 instruction MOVD.
Nevertheless the title shouldn't say "SSE2", as you also add AVX ones.
Nor are you limiting things to MM register sources. Hence I think the
title needs changing.
> --- a/xen/arch/x86/x86_emulate/x86_
>>> On 01.08.16 at 15:28, wrote:
> On Monday 01 August 2016 06:59:08 Jan Beulich wrote:
>> >>> On 01.08.16 at 14:53, wrote:
>> > On Monday 01 August 2016 10:52:12 Andrew Cooper wrote:
>> >> On 01/08/16 03:52, Mihai Donțu wrote:
>> >> > Found that Windows driver was using a SSE2 instruction
(re-adding xen-devel)
>>> On 01.08.16 at 15:02, wrote:
> On Mon, 1 Aug 2016 13:55:01 +0200
> "Jan Beulich" wrote:
>
>> >>> On 13.07.16 at 14:53, wrote:
>> > On 13/07/16 13:20, Petr Tesarik wrote:
>> >> If a crash kernel is loaded, do not crash the running domain. This is
>> >> needed if the ke
Simon, Keir,
In case you didn't realize --- this needs your ACK.
Jan, now that I checked the logs more carefully, you are the only one
from Suse/Novell who touched these files so your ACK is needed as well.
Thanks.
-boris
On 07/18/2016 10:01 AM, Boris Ostrovsky wrote:
> ACPI builder is curren
Now that xl create -c is fixed in xen-unstable, there is no need to keep
the hack to get guest console output anymore.
Use xl create -Fc directly, then wait for the xl process to exit. Print
any error as it occurs.
Signed-off-by: Wei Liu
---
xtf-runner | 36
On 08/01/2016 06:09 AM, Jan Beulich wrote:
On 08.07.16 at 18:14, wrote:
>> On 07/08/2016 11:11 AM, Jan Beulich wrote:
>> On 08.07.16 at 16:39, wrote:
On 07/08/2016 06:10 AM, Jan Beulich wrote:
>> @@ -615,20 +593,10 @@ void acpi_build_tables(struct acpi_config *config,
unsi
On 08/01/2016 07:40 AM, Juergen Gross wrote:
> There are two functions with name xen_pmu_init() in the kernel. Rename
> the one in drivers/xen/sys-hypervisor.c to avoid shadowing the one in
> arch/x86/xen/pmu.c
>
> Signed-off-by: Juergen Gross
While at it, how about changing xen_properties_init t
On 08/01/2016 07:41 AM, Juergen Gross wrote:
> The default for the Xen hypervisor is to not enable VPMU in order to
> avoid security issues. In this case the Linux kernel will issue the
> message "Could not initialize VPMU for cpu 0, error -95" which looks
> more like an error than a normal state.
On Mon, Aug 01, 2016 at 01:41:20PM +0200, Juergen Gross wrote:
> The default for the Xen hypervisor is to not enable VPMU in order to
> avoid security issues. In this case the Linux kernel will issue the
> message "Could not initialize VPMU for cpu 0, error -95" which looks
> more like an error tha
On Mon, 1 Aug 2016 15:47:58 +0200
"Jan Beulich" wrote:
> (re-adding xen-devel)
>
> >>> On 01.08.16 at 15:02, wrote:
> > On Mon, 1 Aug 2016 13:55:01 +0200
> > "Jan Beulich" wrote:
> >
> >> >>> On 13.07.16 at 14:53, wrote:
> >> > On 13/07/16 13:20, Petr Tesarik wrote:
> >> >> If a crash kernel
>>> On 01.08.16 at 15:56, wrote:
> Jan, now that I checked the logs more carefully, you are the only one
> from Suse/Novell who touched these files so your ACK is needed as well.
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.or
>>> On 01.08.16 at 16:06, wrote:
> On 08/01/2016 06:09 AM, Jan Beulich wrote:
> On 08.07.16 at 18:14, wrote:
>>> On 07/08/2016 11:11 AM, Jan Beulich wrote:
>>> On 08.07.16 at 16:39, wrote:
> On 07/08/2016 06:10 AM, Jan Beulich wrote:
>>> @@ -615,20 +593,10 @@ void acpi_build_tabl
On Mon, Aug 01, 2016 at 09:57:10AM +0100, Paul Durrant wrote:
> The xenstore-paths documentation specifies various control/feature-XXX
> flags to allow a guest to tell a toolstack about its abilities to
> respond to values written to control/shutdown. However, because the
> parent control xenstore
>>> On 01.08.16 at 16:15, wrote:
> On Mon, 1 Aug 2016 15:47:58 +0200
> "Jan Beulich" wrote:
>
>> (re-adding xen-devel)
>>
>> >>> On 01.08.16 at 15:02, wrote:
>> > On Mon, 1 Aug 2016 13:55:01 +0200
>> > "Jan Beulich" wrote:
>> >
>> >> >>> On 13.07.16 at 14:53, wrote:
>> >> > On 13/07/16 13:2
On Mon, Aug 01, 2016 at 04:15:10PM +0200, Petr Tesarik wrote:
> On Mon, 1 Aug 2016 15:47:58 +0200
> "Jan Beulich" wrote:
>
> > (re-adding xen-devel)
> >
> > >>> On 01.08.16 at 15:02, wrote:
> > > On Mon, 1 Aug 2016 13:55:01 +0200
> > > "Jan Beulich" wrote:
> > >
> > >> >>> On 13.07.16 at 14:5
On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
> > > > Your suggestion makes sense, but I'm starting to doubt my initial
> > > > patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it takes the
> > > > GPR-handling route and I can't seem to be able to easily prevent it
> > > > with !(r
On 01/08/16 15:48, Mihai Donțu wrote:
> On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
> Your suggestion makes sense, but I'm starting to doubt my initial
> patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it takes the
> GPR-handling route and I can't seem to be able to
On Monday 01 August 2016 17:48:33 Mihai Donțu wrote:
> On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
> > > > > Your suggestion makes sense, but I'm starting to doubt my initial
> > > > > patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it takes
> > > > > the
> > > > > GPR-handling
>>> On 01.08.16 at 16:48, wrote:
> On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
>> > > > Your suggestion makes sense, but I'm starting to doubt my initial
>> > > > patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it takes the
>> > > > GPR-handling route and I can't seem to be abl
>>> On 01.08.16 at 16:55, wrote:
> On Monday 01 August 2016 17:48:33 Mihai Donțu wrote:
>> On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
>> > > > > Your suggestion makes sense, but I'm starting to doubt my initial
>> > > > > patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it take
On 01/08/16 15:59, Jan Beulich wrote:
On 01.08.16 at 16:55, wrote:
>> On Monday 01 August 2016 17:48:33 Mihai Donțu wrote:
>>> On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
>>> Your suggestion makes sense, but I'm starting to doubt my initial
>>> patch. :-) I'm testing "movq xm
On Monday 01 August 2016 15:53:56 Andrew Cooper wrote:
> On 01/08/16 15:48, Mihai Donțu wrote:
> > > I'd rather pick a fixed register and update the regs->... field from that
> > > after the stub was executed. E.g. using rAX and treating it just like a
> > > return value of the "call". But maybe I'
1 - 100 of 196 matches
Mail list logo