flight 104051 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104051/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds15 guest-start/debian.repeat fail REGR. vs. 104047
test-armhf-armhf-libvirt-xs
flight 104053 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104053/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 104005
test-armhf-armhf-libvirt 13
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
---
xen/include/public/io/kbdif.h | 249 +-
1 file changed, 222 insertions(+), 27 deletions(-)
diff --git a/xen/include/public/io/kbdif.h b/xen/include/public/io/kbdif.h
index 2d2aebd..
From: Oleksandr Andrushchenko
Hi, all!
This series updates existing kbdif protocol documentation
and adds multi-touch support
Thank you,
Oleksandr Andrushchenko
Oleksandr Andrushchenko (2):
xen/kbdif: update protocol documentation
xen/kbdif: add multi-touch support
xen/include/public/io/
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
---
xen/include/public/io/kbdif.h | 228 ++
1 file changed, 228 insertions(+)
diff --git a/xen/include/public/io/kbdif.h b/xen/include/public/io/kbdif.h
index 0e19a40..1b446f9 100644
--
> -Original Message-
> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> Sent: 14 December 2016 18:11
> To: xen-de...@lists.xenproject.org
> Cc: David Vrabel ; Andrew Cooper
> ; Wei Liu ; Paul Durrant
> ; Stefano Stabellini
> Subject: [RFC] netif: staging grants for requests
>
> Hey
Here is the v2 of this series. The first 5 patches are just cleanup: some
exported headers were still under a non-uapi directory.
The patch 6 was spotted by code review: there is no in-tree user of this
functionality.
The last patch remove the use of header-y. Now all files under an uapi
directory
This header file is exported, thus move it to uapi.
Signed-off-by: Nicolas Dichtel
---
arch/arm/include/asm/types.h | 36 +--
arch/arm/include/uapi/asm/types.h | 40 +++
2 files changed, 41 insertions(+), 35 deletions(-)
c
This option was added in commit c7bb349e7c25 ("kbuild: introduce destination-y
for exported headers") but never used in-tree.
Signed-off-by: Nicolas Dichtel
---
Documentation/kbuild/makefiles.txt | 23 ---
scripts/Makefile.headersinst | 2 +-
2 files changed, 5 inserti
Regularly, when a new header is created in include/uapi/, the developer
forgets to add it in the corresponding Kbuild file. This error is usually
detected after the release is out.
In fact, all headers under uapi directories should be exported, thus it's
useless to have an exhaustive list.
After
This header file is exported, thus move it to uapi.
Signed-off-by: Nicolas Dichtel
---
arch/h8300/include/asm/bitsperlong.h | 10 +-
arch/h8300/include/uapi/asm/bitsperlong.h | 14 ++
2 files changed, 15 insertions(+), 9 deletions(-)
create mode 100644 arch/h8300/includ
This header file is exported, thus move it to uapi.
Signed-off-by: Nicolas Dichtel
---
arch/x86/include/asm/msr-index.h | 694 +
arch/x86/include/uapi/asm/msr-index.h | 698 ++
2 files changed, 699 insertions(+), 693 deletions(
This header file is exported, thus move it to uapi.
Signed-off-by: Nicolas Dichtel
---
arch/nios2/include/asm/setup.h | 2 +-
arch/nios2/include/uapi/asm/setup.h | 6 ++
2 files changed, 7 insertions(+), 1 deletion(-)
create mode 100644 arch/nios2/include/uapi/asm/setup.h
diff --git a
After the last four patches, all exported headers are under uapi/, thus
input-files2 are not needed anymore.
The side effect is that input-files1-name is exactly header-y.
Note also that unput-files3-name is genhdr-y.
Signed-off-by: Nicolas Dichtel
---
scripts/Makefile.headersinst | 34
Hi,
I am trying to allocate a new SPI VIRQ for sending pl011 interrupt to
the guest OS. Currently Xen does not allow to allocate a SPI VIRQ for
a guest domain. I tried allocating a new SPI VIRQ by calling
vgic_allocate_spi() but it failed as the SPI VIRQ range for the guests
is limited to 0 (vgic_
flight 104055 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104055/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 9ce9bf5339f8a5a9acfd77d9fbc70bb92a55dd6a
baseline version:
ovmf 9fba84ac6ef01a0debf0c
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 05 January 2017 10:55
> To: xen-devel
> Cc: Suravee Suthikulpanit ; Andrew
> Cooper ; Paul Durrant
> ; Jun Nakajima ; Kevin
> Tian ; Boris Ostrovsky
> Subject: [PATCH v2] x86/HVM: restrict permitted instructions d
On 05/01/17 10:55, Jan Beulich wrote:
> Most invocations of the instruction emulator are for VM exits where the
> set of legitimate instructions (i.e. ones capable of causing the
> respective exit) is rather small. Restrict the permitted sets via a new
> callback, at once eliminating the abuse of h
On 05/01/17 10:50, Jan Beulich wrote:
> Eliminate the mis-naming of 64-bit fields with 32-bit register names
> (eflags instead of rflags etc). To ensure no piece of code was missed,
> transiently use the underscore prefixed names only for 32-bit register
> accesses. This will be cleaned up subseque
On 14/12/16 09:56, Jan Beulich wrote:
> Also take the opportunity and adjust the vmovdqu test case the new one
> here has been cloned from: To zero a ymm register we don't need to go
> through hoops, as 128-bit AVX insns zero the upper portion of the
> destination register, and in the disabled AVX2
On Wed, Dec 14, 2016 at 12:08:01PM +0800, Yi Sun wrote:
> This patch implements xl/xc changes to support get HW info
> for L2 CAT.
>
> 'xl psr-hwinfo' is updated to show both L3 CAT and L2 CAT
> info.
>
> Example(on machine which only supports L2 CAT):
> Cache Monitoring Technology (CMT):
> Enabl
On Wed, Dec 14, 2016 at 12:08:03PM +0800, Yi Sun wrote:
> This patch implements the xl/xc changes to support set CBM
> for L2 CAT.
>
> The new level option is introduced to original CAT setting
> command in order to set CBM for specified level CAT.
> - 'xl psr-cat-cbm-set' is updated to set cache
On Wed, Dec 14, 2016 at 12:08:02PM +0800, Yi Sun wrote:
> This patch implements changes in xl/xc changes to support
> showing CBM of L2 CAT.
>
> The new level option is introduced to original CAT showing
> command in order to show CBM for specified level CAT.
> - 'xl psr-cat-show' is updated to sh
On Wed, Dec 14, 2016 at 12:08:04PM +0800, Yi Sun wrote:
> This patch adds L2 CAT description in related documents.
>
> Signed-off-by: He Chen
> Signed-off-by: Yi Sun
This looks reasonable, too.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On Fri, Jan 06, 2017 at 10:43:56AM +0100, Nicolas Dichtel wrote:
> This header file is exported, thus move it to uapi.
It should rather not be exported - please remove it from
arch/x86/include/uapi/asm/Kbuild instead.
Thanks.
--
Regards/Gruss,
Boris.
Good mailing practices for 400: avoid t
flight 104057 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104057/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf dd6d0a520eec0fd3fc455ac7345ac0c06095a511
baseline version:
ovmf 9ce9bf5339f8a5a9acfd7
>>> On 06.01.17 at 12:08, wrote:
> On 05/01/17 10:50, Jan Beulich wrote:
>> Eliminate the mis-naming of 64-bit fields with 32-bit register names
>> (eflags instead of rflags etc). To ensure no piece of code was missed,
>> transiently use the underscore prefixed names only for 32-bit register
>> ac
>>> On 05.01.17 at 23:31, wrote:
> On 14/12/16 09:55, Jan Beulich wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -4995,6 +4995,12 @@ x86_emulate(
>> /* vmovntdq ymm,m256 */
>> fail_if(e
>>> On 05.01.17 at 20:26, wrote:
> On 14/12/16 09:37, Jan Beulich wrote:
>> Signed-off-by: Jan Beulich
>>
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -5190,8 +5190,26 @@ x86_emulate(
>> case X86EMUL_OPC(0x0f, 0xae): case X86EMUL_OPC_6
>>> On 06.01.17 at 11:37, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 05 January 2017 10:55
>> @@ -68,6 +80,11 @@ struct segment_register *hvmemul_get_seg
>> struct hvm_emulate_ctxt *hvmemul_ctxt);
>> int hvm_emulate_one_mmio(unsigned long mfn, unsigned long gla);
>>
>>
>>> On 05.01.17 at 19:01, wrote:
> GCCs of at least 4.4 and earlier do not tollerate the initialisiation of the
> $VENDOR_cpu_dev structures, because of c_ident becoming an anonymous union.
>
> Instead of using an anonymous union, reintepret c_ident[] in its CPUID form
> just in get_cpu_vendor().
On 06/01/17 13:29, Jan Beulich wrote:
On 06.01.17 at 12:08, wrote:
>> On 05/01/17 10:50, Jan Beulich wrote:
>>> Eliminate the mis-naming of 64-bit fields with 32-bit register names
>>> (eflags instead of rflags etc). To ensure no piece of code was missed,
>>> transiently use the underscore pr
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 06 January 2017 13:41
> To: Paul Durrant
> Cc: Suravee Suthikulpanit ; Andrew
> Cooper ; Jun Nakajima
> ; Kevin Tian ; xen-devel
> ; Boris Ostrovsky
>
> Subject: RE: [PATCH v2] x86/HVM: restrict permitted instruct
>>> On 05.01.17 at 19:42, wrote:
> +static always_inline u64 __vmptrst(void)
> +{
> +u64 paddr;
> +
> +asm volatile (
> +#ifdef HAVE_GAS_VMX
> + "vmptrst %0\n"
> +#else
> + VMPTRST_OPCODE MODRM_EAX_07
> +#endif
> +
> +#ifdef HAVE_GAS_VMX
> +
On 06/01/17 14:37, Jan Beulich wrote:
On 05.01.17 at 19:42, wrote:
>> +static always_inline u64 __vmptrst(void)
>> +{
>> +u64 paddr;
>> +
>> +asm volatile (
>> +#ifdef HAVE_GAS_VMX
>> + "vmptrst %0\n"
>> +#else
>> + VMPTRST_OPCODE MODRM_EAX_07
>> +#
>>> On 06.01.17 at 15:34, wrote:
> Found by a Travis RANDCONFIG run.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
I'm sorry for the breakage.
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Found by a Travis RANDCONFIG run.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Elena Ufimtseva
---
xen/arch/x86/gdbstub.c| 8
xen/arch/x86/x86_64/gdbstub.c | 2 +-
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/gdbstub.c b/xen/arch/x86/gdbs
On 01/05/2017 05:55 AM, Jan Beulich wrote:
> Most invocations of the instruction emulator are for VM exits where the
> set of legitimate instructions (i.e. ones capable of causing the
> respective exit) is rather small. Restrict the permitted sets via a new
> callback, at once eliminating the abuse
>>> On 06.01.17 at 15:39, wrote:
> On 06/01/17 14:37, Jan Beulich wrote:
> On 05.01.17 at 19:42, wrote:
>>> +static always_inline u64 __vmptrst(void)
>>> +{
>>> +u64 paddr;
>>> +
>>> +asm volatile (
>>> +#ifdef HAVE_GAS_VMX
>>> + "vmptrst %0\n"
>>> +#else
>>> +
This run is configured for baseline tests only.
flight 68327 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68327/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-d
>>> On 05.01.17 at 23:39, wrote:
> @@ -299,6 +299,15 @@ Both option `com1` and `com2` follow the same format.
>the bootloader or other earlier firmware has already set it up.
> * Optionally, the base baud rate (usually the highest baud rate the
>device can communicate at) can be specified
The xenbus driver used for communication with Xenstore (all kernel
accesses to Xenstore and in case of Xenstore living in another domain
all accesses of the local domain to Xenstore) is rather simple
especially regarding multiple concurrent accesses: they are just being
serialized in spite of Xenst
The xenbus driver has an awful mixture of internal and global visible
headers: some of the internal used only stuff is defined in the
global header include/xen/xenbus.h while some stuff defined in internal
headers is used by other drivers, too.
Clean this up by moving the external used symbols to
Handling of multiple concurrent Xenstore accesses through xenbus driver
either from the kernel or user land is rather lame today: xenbus is
capable to have one access active only at one point of time.
Rewrite xenbus to handle multiple requests concurrently by making use
of the request id of the Xe
Today a Xenstore watch event is delivered via a callback function
declared as:
void (*callback)(struct xenbus_watch *,
const char **vec, unsigned int len);
As all watch events only ever come with two parameters (path and token)
changing the prototype to:
void (*callback)(struct
This is a note to let you know that I've just added the patch titled
x86/smpboot: Make logical package management more robust
to the 4.9-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the patch is:
flight 104056 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104056/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 6 xen-boot fail pass in 104051
test-amd64-i386-xl-qemuu-winxpsp
On Thu, Dec 29, 2016 at 02:04:15PM +, Julien Grall wrote:
> Hi all,
>
> The document below is an early version of a design
> proposal for PCI Passthrough in Xen. It aims to
> describe from an high level perspective the interaction
> with the different subsystems and how guest will be able
> to
flight 104058 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104058/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 0dc3359ac677b80475c6f4933c513089ad451ebe
baseline version:
ovmf dd6d0a520eec0fd3fc455
>>> On 05.01.17 at 19:59, wrote:
> On 05/01/17 09:13, Jan Beulich wrote:
> On 04.01.17 at 22:11, wrote:
>>> On 12/12/16 10:00, Jan Beulich wrote:
@@ -1791,6 +1795,34 @@ static int inject_swint(enum x86_swint_t
generate_exception(fault_type, error_code);
}
+sta
> -Original Message-
> From: Juergen Gross [mailto:jgr...@suse.com]
> Sent: 06 January 2017 15:06
> To: linux-ker...@vger.kernel.org; xen-de...@lists.xenproject.org
> Cc: boris.ostrov...@oracle.com; Juergen Gross ;
> konrad.w...@oracle.com; Roger Pau Monne ; Wei Liu
> ; Paul Durrant ;
> net
> Latest 4.10-rc2 boots both credit1 and credit2. So you can either try
> that or apply 9d85eb9119f4eeeb48e87adfcd71f752655700e9, which I think
> is the missing patch.
And this patch has just been queued for 4.9-stable.
-boris
___
Xen-devel mailing
On 01/06/2017 08:58 AM, Jan Beulich wrote:
On 05.01.17 at 23:39, wrote:
@@ -299,6 +299,15 @@ Both option `com1` and `com2` follow the same format.
the bootloader or other earlier firmware has already set it up.
* Optionally, the base baud rate (usually the highest baud rate the
devic
On Thu, Dec 29, 2016 at 02:04:15PM +, Julien Grall wrote:
> Hi all,
>
> The document below is an early version of a design
> proposal for PCI Passthrough in Xen. It aims to
> describe from an high level perspective the interaction
> with the different subsystems and how guest will be able
> to
On Fri, Jan 06, 2017 at 04:05:43PM +0100, Juergen Gross wrote:
> Today a Xenstore watch event is delivered via a callback function
> declared as:
>
> void (*callback)(struct xenbus_watch *,
> const char **vec, unsigned int len);
>
> As all watch events only ever come with two par
On Fri, Jan 06, 2017 at 04:05:43PM +0100, Juergen Gross wrote:
> Today a Xenstore watch event is delivered via a callback function
> declared as:
>
> void (*callback)(struct xenbus_watch *,
> const char **vec, unsigned int len);
>
> As all watch events only ever come with two par
>>> On 06.01.17 at 17:24, wrote:
> On 01/06/2017 08:58 AM, Jan Beulich wrote:
> On 05.01.17 at 23:39, wrote:
>>> @@ -1118,6 +1118,20 @@ static void __init ns16550_parse_port_config(
>>> uart->clock_hz = simple_strtoul(conf, &conf, 0) << 4;
>>> }
>>>
>>> +if ( *conf == '
flight 104059 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104059/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 01/06/2017 12:30 AM, Stefano Stabellini wrote:
> On Thu, 5 Jan 2017, Joao Martins wrote:
>> Hey Stefano,
>>
>> Thanks a lot for the review and the comments!!
>>
>> On 01/04/2017 07:40 PM, Stefano Stabellini wrote:
>>> On Wed, 14 Dec 2016, Joao Martins wrote:
# Proposed Extension
#
>>> On 06.01.17 at 16:35, wrote:
On 05.01.17 at 19:59, wrote:
>> On 05/01/17 09:13, Jan Beulich wrote:
>> On 04.01.17 at 22:11, wrote:
On 12/12/16 10:00, Jan Beulich wrote:
> --- a/xen/arch/x86/xstate.c
> +++ b/xen/arch/x86/xstate.c
> @@ -723,6 +741,66 @@ int handle_xse
On 01/06/2017 10:43 AM, Jan Beulich wrote:
On 06.01.17 at 17:24, wrote:
On 01/06/2017 08:58 AM, Jan Beulich wrote:
On 05.01.17 at 23:39, wrote:
@@ -1118,6 +1118,20 @@ static void __init ns16550_parse_port_config(
uart->clock_hz = simple_strtoul(conf, &conf, 0) << 4;
}
This run is configured for baseline tests only.
flight 68329 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68329/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 42b85551615d62fb68f0dbd63c068445c4d3c511
baseline v
flight 68330 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68330/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-armhf-jessie-netboot-pygrub 11 migrate-support-check fail
never pass
test-armhf-armhf-
flight 104061 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104061/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 6e5e544f227f031d0b45828b56cec5668dd1bf5b
baseline version:
ovmf 0dc3359ac677b80475c6f
Hi,
On 05/01/17 18:56, Stefano Stabellini wrote:
> On Thu, 22 Dec 2016, Andre Przywara wrote:
> 7> The number of LPIs on a host can be potentially huge (millions),
>> although in practise will be mostly reasonable. So prematurely allocating
>> an array of struct irq_desc's for each LPI is not an o
This run is configured for baseline tests only.
flight 68328 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68328/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
Konrad is unable to attend on Wednesday the 11th. As he is the PV
drivers Czar, his presence is important. I suggest we reschedule the
meeting on Tuesday the 10th of January, at 9AM PST.
On Wed, 21 Dec 2016, Stefano Stabellini wrote:
> Hi all,
>
> the 4.9 development cycle is open, and we a numbe
Join the call: https://www.uberconference.com/stefano-aporeto
US dial in number, no pin needed: 669-999-0613
International callers can find other dial-in numbers on the website,
should use 669-999-0613 as pin.BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//timeanddate.com//Meeting Planner
METHOD:PUBLISH
On Fri, Jan 06, 2017 at 02:34:17PM +, Andrew Cooper wrote:
> Found by a Travis RANDCONFIG run.
>
> Signed-off-by: Andrew Cooper
Acked-by: Elena Ufimtseva
> ---
> CC: Jan Beulich
> CC: Elena Ufimtseva
> ---
> xen/arch/x86/gdbstub.c| 8
> xen/arch/x86/x86_64/gdbstub.c | 2
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
adjustments"):
> On 06.01.17 at 17:24, wrote:
> Well, as you may have seen, things are getting complicated here:
> The two currently-last elements are permitted only with
> CONFIG_HAS_PCI, so by adding the new fields to the end
On Fri, 6 Jan 2017, Joao Martins wrote:
> >>> I don't think it makes sense: the rest of the page would still be
> >>> accessible from the backend, which could compromise its content. I would
> >>> share a list of pages that can be mapped contiguously to create a data
> >>> ring.
> >> Note that the
On Fri, 6 Jan 2017, Paul Durrant wrote:
> > -Original Message-
> > From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> > Sent: 14 December 2016 18:11
> > To: xen-de...@lists.xenproject.org
> > Cc: David Vrabel ; Andrew Cooper
> > ; Wei Liu ; Paul Durrant
> > ; Stefano Stabellini
> > Su
On 06/01/17 18:33, Elena Ufimtseva wrote:
> On Fri, Jan 06, 2017 at 02:34:17PM +, Andrew Cooper wrote:
>> Found by a Travis RANDCONFIG run.
>>
>> Signed-off-by: Andrew Cooper
> Acked-by: Elena Ufimtseva
Thanks. Pushed.
~Andrew
___
Xen-devel mail
On Wed, Jan 04, 2017 at 11:47:14AM +0200, Andy Shevchenko wrote:
> On Tue, Jan 3, 2017 at 11:25 PM, Luis R. Rodriguez wrote:
> > On Thu, Dec 22, 2016 at 03:58:18PM +0200, Andy Shevchenko wrote:
> >> On Wed, 2016-12-21 at 18:38 -0800, Luis R. Rodriguez wrote:
> >> > +#define LINKTABLE_FOR_EACH(poin
On 01/06/2017 09:33 AM, Paul Durrant wrote:
>> -Original Message-
>> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
>> Sent: 14 December 2016 18:11
>> To: xen-de...@lists.xenproject.org
>> Cc: David Vrabel ; Andrew Cooper
>> ; Wei Liu ; Paul Durrant
>> ; Stefano Stabellini
>> Subjec
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/x86_emulate/x86_emulate.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/x86_emulate/x86_emulate.c
b/xen/arch/x86/x86_emulate/x86_emulate.c
index 98ba7c5..c4ba79b 100644
--- a/xen/arch/x86/x86_em
As the comment says, the guest shouldn't be able to change X86_EFLAGS_TF,
although we don't care which value it currently has.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/traps.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/traps.c b/x
On 01/06/2017 07:18 PM, Stefano Stabellini wrote:
> On Fri, 6 Jan 2017, Paul Durrant wrote:
>>> -Original Message-
>>> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
>>> Sent: 14 December 2016 18:11
>>> To: xen-de...@lists.xenproject.org
>>> Cc: David Vrabel ; Andrew Cooper
>>> ; W
On Fri, 6 Jan 2017, Andre Przywara wrote:
> >> +/* LPIs on the host always go to a guest, so no struct irq_desc for them.
> >> */
> >> +union host_lpi {
> >> +uint64_t data;
> >> +struct {
> >> +uint64_t virt_lpi:32;
> >> +uint64_t dom_id:16;
> >> +uint64_t vcpu_id:
On Fri, Jan 6, 2017 at 10:00 PM, Luis R. Rodriguez wrote:
> On Wed, Jan 04, 2017 at 11:47:14AM +0200, Andy Shevchenko wrote:
>> On Tue, Jan 3, 2017 at 11:25 PM, Luis R. Rodriguez wrote:
>> > On Thu, Dec 22, 2016 at 03:58:18PM +0200, Andy Shevchenko wrote:
>> >> On Wed, 2016-12-21 at 18:38 -0800,
On Fri, Jan 6, 2017 at 11:43 AM, Nicolas Dichtel
wrote:
> This header file is exported, thus move it to uapi.
Just hint for the future:
-M (move)
-C (copy)
-D (delete) [though this is NOT for applying]
--
With Best Regards,
Andy Shevchenko
___
Xen-de
On 01/06/2017 10:05 AM, Juergen Gross wrote:
> The xenbus driver has an awful mixture of internal and global visible
> headers: some of the internal used only stuff is defined in the
> global header include/xen/xenbus.h while some stuff defined in internal
> headers is used by other drivers, too.
>
On Fri, 6 Jan 2017, Edgar E. Iglesias wrote:
> On Thu, Dec 29, 2016 at 02:04:15PM +, Julien Grall wrote:
> > Hi all,
> >
> > The document below is an early version of a design
> > proposal for PCI Passthrough in Xen. It aims to
> > describe from an high level perspective the interaction
> > wi
On Fri, 6 Jan 2017, Roger Pau Monné wrote:
> > bridge. See [6] for more details.
> >
> > XXX: I think this could be solved by using the host memory layout when
> > creating a guest with PCI devices => Detail it.
>
> I'm not really sure I follow here, but if this write to the MSI doorbell
> doesn'
flight 104064 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104064/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Hello Bhupinder,
it is good to hear that you are making progress.
On Fri, 6 Jan 2017, Bhupinder Thakur wrote:
> Hi,
>
> I am trying to allocate a new SPI VIRQ for sending pl011 interrupt to
> the guest OS. Currently Xen does not allow to allocate a SPI VIRQ for
> a guest domain. I tried allocat
On 01/06/2017 10:05 AM, Juergen Gross wrote:
> Today a Xenstore watch event is delivered via a callback function
> declared as:
>
> void (*callback)(struct xenbus_watch *,
> const char **vec, unsigned int len);
>
> As all watch events only ever come with two parameters (path and to
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit 9d85eb9119f4eeeb48e87adfcd71f752655700e9 upstream.
The logical package management has several issues:
- The APIC ids provided by ACPI are not required to be the same as
On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Signed-off-by: Oleksandr Andrushchenko
> ---
> xen/include/public/io/kbdif.h | 249
> +-
> 1 file changed, 222 insertions(+), 27 deletions(-)
>
> diff --git a/xen/inc
flight 104060 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104060/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 3 host-install(3)broken REGR. vs. 104049
test-amd64-amd64-
On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Signed-off-by: Oleksandr Andrushchenko
> ---
> xen/include/public/io/kbdif.h | 228
> ++
> 1 file changed, 228 insertions(+)
>
> diff --git a/xen/include/public/io/kb
flight 104062 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104062/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt15 guest-start/debian.repeat fail REGR. vs. 102642
Regressi
flight 104063 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104063/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 6 xen-boot fail REGR. vs. 104056
Regressions which
On Thu, Jan 05, 2017 at 02:28:56PM -0500, Dan Streetman wrote:
> Do not read a pci device's msi message data to see if a pirq was
> previously configured for the device's msi/msix, as the old pirq was
> unmapped and may now be in use by another pci device. The previous
> pirq should never be re-us
On Mon, Dec 12, 2016 at 05:34:29PM +0700, Suravee Suthikulpanit wrote:
> Hi Konrad,
>
> Thanks for review comments.
>
> On 10/14/2016 10:20 PM, Konrad Rzeszutek Wilk wrote:
> > On Mon, Sep 19, 2016 at 12:52:45AM -0500, Suravee Suthikulpanit wrote:
> > > AVIC introduces two #vmexit handlers:
> > >
This run is configured for baseline tests only.
flight 68333 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68333/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 0dc3359ac677b80475c6f4933c513089ad451ebe
baseline v
flight 104065 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104065/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 3 host-install(3) broken REGR. vs. 104049
test-armhf-armhf-
Hi,
With ACPI numa support, I came across this panic from init_node_heap() when
initializing for node1 which is called from end_boot_allocator().
(XEN) Walking Hypervisor VA 0x847e on CPU0 via TTBR 0xffcf8000
(XEN) 0TH[0x108] = 0x
(XEN) PAR: 0809: T
flight 104067 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104067/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt 15 guest-start/debian.repeat fail in 104062 pass in
104067
test-armhf-armhf
99 matches
Mail list logo