Ping as I am also interested in modifying kbdfront...
On 02/09/2017 03:45 PM, Juergen Gross wrote:
On 30/01/17 16:10, Juergen Gross wrote:
Instead of using the default resolution of 800*600 for the pointing
device of xen-kbdfront try to read the resolution of the (virtual)
framebuffer device. U
> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew Cooper
> Sent: Tuesday, February 14, 2017 3:59 PM
>
> On 14/02/2017 02:52, Tian, Kevin wrote:
> >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> >> Sent: Monday, February 13, 2017 10:32 PM
> >>
> >> hvm_hw_cpu->ms
On 14/02/2017 08:04, Tian, Kevin wrote:
>> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew
>> Cooper
>> Sent: Tuesday, February 14, 2017 3:59 PM
>>
>> On 14/02/2017 02:52, Tian, Kevin wrote:
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Monday, Febr
This run is configured for baseline tests only.
flight 68555 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68555/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5b97eb4c35316cbe8235ae526209263da818e1a4
baseline v
> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew Cooper
> Sent: Tuesday, February 14, 2017 4:19 PM
>
> On 14/02/2017 08:04, Tian, Kevin wrote:
> >> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew
> Cooper
> >> Sent: Tuesday, February 14, 2017 3:59 P
Due to the large number of grants in use it seems more useful to print the
grant references and handlers in hex format rather than decimal.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek W
The following incorrect format specifiers and incorrect number of parameters
passed to printf like functions are reported by clang:
mce.c:601:18: error: data argument not used by format string
[-Werror,-Wformat-extra-args]
smp_processor_id());
^
xenpm.c:102:23:
Hello,
These patches fix the remaining issues so that Wformat can be enabled for
clang.
This patches have been tested on FreeBSD with clang 3.8, and travis:
https://travis-ci.org/royger/xen/builds/201165863
Thanks, Roger.
___
Xen-devel mailing list
X
>>> On 13.02.17 at 19:26, wrote:
> On 13/02/17 13:19, Jan Beulich wrote:
>> ---
>> TBD: Do we really want to re-init the TSS every time we are about to
>> use it? This can happen quite often during boot, especially while
>> grub is running.
>
> The only case we need worry about is if th
flight 105781 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105781/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 105279
test-armhf-armhf-libvirt-x
My previous reply got bounced because my tablet insisted on using HTML...
> -Original Message-
>
> These need to be static. (I can fix it when committing.)
Ok, thanks.
>
> And I am still not sure about using XEN_PAGE_SIZE. There is no
> dependency in the hypervisor on buffers being pag
>>> On 14.02.17 at 03:19, wrote:
> vpmu_enable() can not use for check if vpmu is enabled in guest during
> booting up. Because linux kernel get the status of if supported pmu
> is earler than xen vpmu initialise. vpmu_enable() will return false
> even if vpmu has been enabled in guest.
>
> Signe
On Mon, Feb 13, 2017 at 05:34:01PM -0500, Waiman Long wrote:
> It is the address of &steal_time that will exceed the 32-bit limit.
That seems extremely unlikely. That would mean we have more than 4G
worth of per-cpu variables declared in the kernel.
___
On Mon, Feb 13, 2017 at 06:53:49AM -0700, Jan Beulich wrote:
> >>> On 10.02.17 at 13:33, wrote:
> > ---
> > Changes since v5:
> > - Adjust the logic to set need_paging.
> > - Remove the usage of the _AC macro.
> > - Subtract memory from the end of regions instead of the start.
> > - Create the
>>> On 14.02.17 at 09:40, wrote:
>> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew
>> Cooper
>> Sent: Tuesday, February 14, 2017 4:19 PM
>>
>> On 14/02/2017 08:04, Tian, Kevin wrote:
>> >> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew
>> Cooper
On Tue, Feb 14, 2017 at 10:10:16AM +, Roger Pau Monne wrote:
> On Mon, Feb 13, 2017 at 06:53:49AM -0700, Jan Beulich wrote:
> > >>> On 10.02.17 at 13:33, wrote:
> > > --- a/xen/include/asm-x86/page.h
> > > +++ b/xen/include/asm-x86/page.h
> > > @@ -374,6 +374,18 @@ perms_strictly_increased(uin
>>> On 14.02.17 at 11:10, wrote:
> On Mon, Feb 13, 2017 at 06:53:49AM -0700, Jan Beulich wrote:
>> >>> On 10.02.17 at 13:33, wrote:
>> > +static int __init pvh_steal_ram(struct domain *d, unsigned long size,
>> > +unsigned long align, paddr_t limit,
>> > +
On Mon, Feb 13, 2017 at 04:05:19PM +, Roger Pau Monne wrote:
> On Mon, Feb 13, 2017 at 03:59:15PM +, Wei Liu wrote:
> > On Mon, Feb 13, 2017 at 03:49:14PM +, Roger Pau Monne wrote:
> > > Sorry, I've forgot to re-generate the patch after adding the
> > > maintainers...
> > >
> > > On M
>>> On 14.02.17 at 11:19, wrote:
> On Tue, Feb 14, 2017 at 10:10:16AM +, Roger Pau Monne wrote:
>> On Mon, Feb 13, 2017 at 06:53:49AM -0700, Jan Beulich wrote:
>> > >>> On 10.02.17 at 13:33, wrote:
>> > > --- a/xen/include/asm-x86/page.h
>> > > +++ b/xen/include/asm-x86/page.h
>> > > @@ -374,
1: VMX: fix VMCS race on context-switch paths
2: x86: package up context switch hook pointers
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 14/02/17 02:19, Luwei Kang wrote:
> vpmu_enable() can not use for check if vpmu is enabled in guest during
> booting up. Because linux kernel get the status of if supported pmu
> is earler than xen vpmu initialise. vpmu_enable() will return false
> even if vpmu has been enabled in guest.
Sorry
When __context_switch() is being bypassed during original context
switch handling, the vCPU "owning" the VMCS partially loses control of
it: It will appear non-running to remote CPUs, and hence their attempt
to pause the owning vCPU will have no effect on it (as it already
looks to be paused). At t
They're all solely dependent on guest type, so we don't need to repeat
all the same four pointers in every vCPU control structure. Instead use
static const structures, and store pointers to them in the domain
control structure.
Since touching it anyway, take the opportunity and move schedule_tail(
On 13/02/17 14:21, Sergey Dyasli wrote:
> Sergey Dyasli (3):
> x86/vmx: introduce VMX_INSN_SUCCEED
> x86/vvmx: correctly emulate VMWRITE
> x86/vvmx: correctly emulate VMREAD
Committed, thanks.
~Andrew
___
Xen-devel mailing list
Xen-devel@lists.xe
On Thu, Feb 09, 2017 at 11:35:16AM +, George Dunlap wrote:
> On 09/02/17 11:24, Wei Liu wrote:
> > On Thu, Feb 09, 2017 at 11:17:46AM +, George Dunlap wrote:
> >> On 09/02/17 10:35, Wei Liu wrote:
> >>> On Wed, Feb 08, 2017 at 04:17:58PM +, George Dunlap wrote:
> On 08/02/17 16:11,
>>> On 13.02.17 at 14:03, wrote:
> --- /dev/null
> +++ b/xen/arch/x86/hvm/hypercall.c
> @@ -0,0 +1,332 @@
> +/**
> + * arch/hvm/hypercall.c
> + *
> + * HVM hypercall dispatching routines
> + *
> + * This program is free so
On 14/02/17 10:33, Jan Beulich wrote:
On 13.02.17 at 14:03, wrote:
>> --- /dev/null
>> +++ b/xen/arch/x86/hvm/hypercall.c
>> @@ -0,0 +1,332 @@
>> +/**
>> + * arch/hvm/hypercall.c
>> + *
>> + * HVM hypercall dispatchin
>>> On 13.02.17 at 14:03, wrote:
> --- a/xen/arch/x86/hvm/hypercall.c
> +++ b/xen/arch/x86/hvm/hypercall.c
> @@ -23,6 +23,29 @@
>
> #include
>
> +static long hvm_memory_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
> +{
> +struct vcpu *curr = current;
const? (yes, you modify *curr->doma
>>> On 13.02.17 at 14:03, wrote:
> hvm_grant_table_op() and hvm_grant_table_op_compat32() are almost identical,
> but there is no need to have two functions instantiated at the end of
> different function pointers.
>
> Combine the two into a single hvm_grant_table_op() (folding
> grant_table_op_i
997382 introduced the following errors:
intr.c:342:46: error: address of array 'vlapic->regs->data' will always
evaluate to 'true'
[-Werror,-Wpointer-bool-conversion]
if ( vlapic && vlapic->regs->data )
~~ ~~^~~~
intr.c:352:42: error:
>>> On 13.02.17 at 14:03, wrote:
> --- a/xen/arch/x86/hvm/hypercall.c
> +++ b/xen/arch/x86/hvm/hypercall.c
> @@ -73,10 +73,12 @@ static long hvm_grant_table_op(
>
> static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
> {
> +struct vcpu *curr = current;
With this constifi
>>> On 14.02.17 at 11:33, wrote:
> On 14/02/17 10:33, Jan Beulich wrote:
> On 13.02.17 at 14:03, wrote:
>>> --- /dev/null
>>> +++ b/xen/arch/x86/hvm/hypercall.c
>>> @@ -0,0 +1,332 @@
>>>
> +/***
> ***
>>> + * arch/hvm/hy
flight 68556 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68556/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-i386-daily-netboot-pygrub 10 guest-start fail REGR. vs. 68530
test-
>>> On 14.02.17 at 11:37, wrote:
> 997382 introduced the following errors:
>
> intr.c:342:46: error: address of array 'vlapic->regs->data' will always
> evaluate to 'true'
> [-Werror,-Wpointer-bool-conversion]
> if ( vlapic && vlapic->regs->data )
>
>>> On 07.02.17 at 00:32, wrote:
> Commit c7bdecae42 ("x86/apicv: fix RTC periodic timer and apicv issue") has
> added a assertion that intack.vector is the highest priority vector. But
> according to the osstest, the assertion failed sometimes. More discussion can
> be found in the thread
> (http
On Tue, Feb 14, 2017 at 03:46:37AM -0700, Jan Beulich wrote:
> >>> On 14.02.17 at 11:37, wrote:
> > 997382 introduced the following errors:
> >
> > intr.c:342:46: error: address of array 'vlapic->regs->data' will always
> > evaluate to 'true'
> > [-Werror,-Wpointer-bool-conversion]
> >
On 13/02/17 16:20, Jan Beulich wrote:
On 13.02.17 at 14:58, wrote:
>> On 13/02/17 11:40, Jan Beulich wrote:
>> On 10.02.17 at 17:38, wrote:
On 01/02/17 11:12, Jan Beulich wrote:
> Before adding more use of stubs cloned from decoded guest insns, guard
> ourselves against mist
> >>> On 14.02.17 at 03:19, wrote:
> > vpmu_enable() can not use for check if vpmu is enabled in guest during
> > booting up. Because linux kernel get the status of if supported pmu is
> > earler than xen vpmu initialise. vpmu_enable() will return false even
> > if vpmu has been enabled in guest.
flight 105785 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105785/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 105720
test-armhf-armhf-libvirt 13
> On 14/02/17 02:19, Luwei Kang wrote:
> > vpmu_enable() can not use for check if vpmu is enabled in guest during
> > booting up. Because linux kernel get the status of if supported pmu is
> > earler than xen vpmu initialise. vpmu_enable() will return false even
> > if vpmu has been enabled in gues
On Tue, Feb 14, 2017 at 10:29 AM, Wei Liu wrote:
> On Thu, Feb 09, 2017 at 11:35:16AM +, George Dunlap wrote:
>> No. This is why I'm bothering to paint this bikeshed: In every context
>> *except* "cpupool create", 0 means cpupool0 -- the one that was created
>> at boot, which always contains
Due to the large number of grants in use it seems more useful to print the
grant references and handlers in hex format rather than decimal.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek W
And fix the following errors reported:
traps.c:2014:25: error: equality comparison with extraneous parentheses
[-Werror,-Wparentheses-equality]
else if ( (port == RTC_PORT(0)) )
~^~
traps.c:2014:25: note: remove extraneous parentheses around the com
Hello,
The following series removes the disable of certain clang warnings, after this
all clang warnings are enabled. This supersedes "[PATCH v3 0/2] Enable Wformat
for clang".
It has been tested in FreeBSD with clang 3.8, and by travis, all OK:
https://travis-ci.org/royger/xen/builds/201482055
The following incorrect format specifiers and incorrect number of parameters
passed to printf like functions are reported by clang:
mce.c:601:18: error: data argument not used by format string
[-Werror,-Wformat-extra-args]
smp_processor_id());
^
xenpm.c:102:23:
Signed-off-by: Roger Pau Monné
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
Config.mk | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/Config.mk b/Config.mk
inde
flight 105784 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105784/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR.
vs. 105756
build-a
On Tue, Feb 14, 2017 at 08:46:56AM +, Roger Pau Monne wrote:
> Hello,
>
> These patches fix the remaining issues so that Wformat can be enabled for
> clang.
This has now been superseded by "[PATCH v4 0/4] clang: don't disable any
warnings". Please ignore this series.
Roger.
On Tue, Feb 14, 2017 at 12:31:00PM +, osstest service owner wrote:
> flight 105784 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/105784/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-
flight 105788 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105788/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On 14/02/17 12:30, Roger Pau Monne wrote:
> And fix the following errors reported:
>
> traps.c:2014:25: error: equality comparison with extraneous parentheses
> [-Werror,-Wparentheses-equality]
> else if ( (port == RTC_PORT(0)) )
>~^~
> traps.c:2014
>>> On 14.02.17 at 13:30, wrote:
> --- a/Config.mk
> +++ b/Config.mk
> @@ -212,9 +212,6 @@ CFLAGS += -std=gnu99
>
> CFLAGS += -Wall -Wstrict-prototypes
>
> -# Clang complains about macros that expand to 'if ( ( foo == bar ) ) ...'
> -CFLAGS-$(clang) += -Wno-parentheses
Taking the comment bei
>>> On 14.02.17 at 13:30, wrote:
> --- a/Config.mk
> +++ b/Config.mk
> @@ -213,8 +213,7 @@ CFLAGS += -std=gnu99
> CFLAGS += -Wall -Wstrict-prototypes
>
> # Clang complains about macros that expand to 'if ( ( foo == bar ) ) ...'
> -# and is a bit too fierce about unused return values
> -CFLAGS-
On Tue, Feb 14, 2017 at 06:56:12AM -0700, Jan Beulich wrote:
> >>> On 14.02.17 at 13:30, wrote:
> > --- a/Config.mk
> > +++ b/Config.mk
> > @@ -212,9 +212,6 @@ CFLAGS += -std=gnu99
> >
> > CFLAGS += -Wall -Wstrict-prototypes
> >
> > -# Clang complains about macros that expand to 'if ( ( foo =
On Tue, Feb 14, 2017 at 07:00:18AM -0700, Jan Beulich wrote:
> >>> On 14.02.17 at 13:30, wrote:
> > --- a/Config.mk
> > +++ b/Config.mk
> > @@ -213,8 +213,7 @@ CFLAGS += -std=gnu99
> > CFLAGS += -Wall -Wstrict-prototypes
> >
> > # Clang complains about macros that expand to 'if ( ( foo == bar
On 14/02/17 14:06, Roger Pau Monne wrote:
> On Tue, Feb 14, 2017 at 06:56:12AM -0700, Jan Beulich wrote:
> On 14.02.17 at 13:30, wrote:
>>> --- a/Config.mk
>>> +++ b/Config.mk
>>> @@ -212,9 +212,6 @@ CFLAGS += -std=gnu99
>>>
>>> CFLAGS += -Wall -Wstrict-prototypes
>>>
>>> -# Clang complai
>>> On 14.02.17 at 15:13, wrote:
> On 14/02/17 14:06, Roger Pau Monne wrote:
>> On Tue, Feb 14, 2017 at 06:56:12AM -0700, Jan Beulich wrote:
>> On 14.02.17 at 13:30, wrote:
--- a/Config.mk
+++ b/Config.mk
@@ -212,9 +212,6 @@ CFLAGS += -std=gnu99
CFLAGS += -Wall -Ws
On 02/14/2017 04:20 AM, Paul Durrant wrote:
My previous reply got bounced because my tablet insisted on using HTML...
-Original Message-
These need to be static. (I can fix it when committing.)
Ok, thanks.
And I am still not sure about using XEN_PAGE_SIZE. There is no
dependency
(Resending the e-mail due to SMTP issue)
On 02/14/2017 02:18 PM, Julien Grall wrote:
Hi,
Ping? As Ian mentioned earlier, without this series it is not possible
to build Xen tools for ARM64 in osstest.
Cheers,
On 02/08/2017 07:50 PM, Julien Grall wrote:
Hi,
On 24/01/17 22:19, David Scott wro
(Resending the e-mail due to SMTP issue)
On 02/14/2017 12:12 PM, Julien Grall wrote:
Hi Jan,
On 02/14/2017 10:51 AM, Jan Beulich wrote:
On 07.02.17 at 00:32, wrote:
Commit c7bdecae42 ("x86/apicv: fix RTC periodic timer and apicv
issue") has
added a assertion that intack.vector is the highest
On Tue, Feb 14, 2017 at 11:08:11AM +0530, rohan kumbhar wrote:
> Hi,
>
> I am interested to restart Hosted Xen Project.
>
> I have gone through the presentation of Hosted Xen and Ian Pratt's video in
> Xen Summit 9.
> I have secured the source code for HostedXen from
> https://downloads.xen.org/H
This run is configured for baseline tests only.
flight 68557 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68557/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-xsm 6 xen-boot
On 02/14/2017 04:39 AM, Peter Zijlstra wrote:
> On Mon, Feb 13, 2017 at 05:34:01PM -0500, Waiman Long wrote:
>> It is the address of &steal_time that will exceed the 32-bit limit.
> That seems extremely unlikely. That would mean we have more than 4G
> worth of per-cpu variables declared in the kern
On Fri, Feb 10, 2017 at 02:54:23AM -0700, Jan Beulich wrote:
> >>> On 09.02.17 at 23:24, wrote:
> > On Thu, 9 Feb 2017, Jan Beulich wrote:
> >> the recent qemuu update results in the produced binary triggering the
> >> OOM killer on the first system I tried the updated code on. Is there
> >> anyth
Hi,
On 01/26/2017 09:11 PM, Julien Grall wrote:
Hi,
On 26/01/2017 19:01, Boris Ostrovsky wrote:
On 01/26/2017 12:18 PM, Ian Jackson wrote:
Boris Ostrovsky writes ("Re: [Xen-devel] [linux-linus test] 104684:
regressions - FAIL"):
On 01/26/2017 08:23 AM, osstest service owner wrote:
flight 10
On Mon, Feb 13, 2017 at 08:46:29AM +, Paul Durrant wrote:
> > -Original Message-
> > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> > Sent: 10 February 2017 21:52
> > To: Paul Durrant ; xen-de...@lists.xenproject.org
> > Cc: Konrad Rzeszutek Wilk
> > Subject: [PATCH] Mak
On Mon, Feb 13, 2017 at 08:58:42AM +, Paul Durrant wrote:
> > -Original Message-
> > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> > Sent: 10 February 2017 21:52
> > To: Paul Durrant ; xen-de...@lists.xenproject.org
> > Subject: [PATCH v1] Make demu.git compiler under Xe
On 14/02/17 10:28, Jan Beulich wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -552,6 +552,27 @@ static void vmx_load_vmcs(struct vcpu *v
> local_irq_restore(flags);
> }
>
> +void vmx_vmcs_reload(struct vcpu *v)
> +{
> +/*
> + * As we're running w
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Konrad Rzeszutek Wilk
> Sent: 14 February 2017 15:15
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org
> Subject: Re: [Xen-devel] [PATCH] Make it compiler under Xen 4.7.
>
> On Mon, Feb 13
On 14/02/17 10:29, Jan Beulich wrote:
> They're all solely dependent on guest type, so we don't need to repeat
> all the same four pointers in every vCPU control structure. Instead use
> static const structures, and store pointers to them in the domain
> control structure.
>
> Since touching it any
> -Original Message-
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> Sent: 14 February 2017 15:16
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org
> Subject: Re: [PATCH v1] Make demu.git compiler under Xen 4.7 (and later)
>
> On Mon, Feb 13, 2017 at 08:58:42AM +
On Tue, Feb 14, 2017 at 03:26:34PM +, Paul Durrant wrote:
> > -Original Message-
> > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> > Sent: 14 February 2017 15:16
> > To: Paul Durrant
> > Cc: xen-de...@lists.xenproject.org
> > Subject: Re: [PATCH v1] Make demu.git compil
flight 105787 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105787/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 105781
test-armhf-armhf-libvirt-x
> -Original Message-
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> Sent: 14 February 2017 15:32
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org
> Subject: Re: [PATCH v1] Make demu.git compiler under Xen 4.7 (and later)
>
> On Tue, Feb 14, 2017 at 03:26:34PM +
On Tue, Feb 14, 2017 at 03:39:00PM +, Paul Durrant wrote:
> > -Original Message-
> > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
> > Sent: 14 February 2017 15:32
> > To: Paul Durrant
> > Cc: xen-de...@lists.xenproject.org
> > Subject: Re: [PATCH v1] Make demu.git compil
flight 105786 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105786/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 15
guest-localmigrate/x10 fail REGR. vs. 592
Hi Jan,
On 02/14/2017 10:51 AM, Jan Beulich wrote:
On 07.02.17 at 00:32, wrote:
Commit c7bdecae42 ("x86/apicv: fix RTC periodic timer and apicv issue") has
added a assertion that intack.vector is the highest priority vector. But
according to the osstest, the assertion failed sometimes. More di
On 14/02/17 08:55, Jan Beulich wrote:
On 13.02.17 at 19:26, wrote:
>> On 13/02/17 13:19, Jan Beulich wrote:
>>> ---
>>> TBD: Do we really want to re-init the TSS every time we are about to
>>> use it? This can happen quite often during boot, especially while
>>> grub is running.
>>
On Mon, Feb 13, 2017 at 02:32:13PM +0800, Yi Sun wrote:
> This patch creates CAT and CDP feature document in doc/features/. It describes
> key points to implement L3 CAT/CDP and L2 CAT which is described in details in
> Intel SDM "INTEL® RESOURCE DIRECTOR TECHNOLOGY (INTEL® RDT) ALLOCATION
> FEATU
Hi Andrew,
On 02/07/2017 06:57 PM, Andrew Cooper wrote:
The predicate is common between x86 and ARM, and is unlikley to be different/
NIT: s/unlikley/unlikely/
on other architectures. Drop the arch declarations and introduce a common
static inline in xen/mm.h instead.
Signed-off-by: Andrew
On Mon, Feb 13, 2017 at 02:32:16PM +0800, Yi Sun wrote:
> This patch implements the CPU init and free flow including L3 CAT
> initialization and feature list free.
>
> Signed-off-by: Yi Sun
> ---
> v7:
> - initialize 'l3_cat'.
> - fix typo.
> - correct criteria to call 'free_feature'
> -Original Message-
[snip]
> > Thank you. Keep in mind that it will likely break against
> > older Xen versions (Xen 4.4?) as there is no xenctrl_compat.h
>
> I'm not sure you actually need to include that directly. I was going to try
> just
> adding the 'want compat' defines and seeing
On Tue, Feb 14, 2017 at 09:46:17AM -0500, Waiman Long wrote:
> On 02/14/2017 04:39 AM, Peter Zijlstra wrote:
> > On Mon, Feb 13, 2017 at 05:34:01PM -0500, Waiman Long wrote:
> >> It is the address of &steal_time that will exceed the 32-bit limit.
> > That seems extremely unlikely. That would mean w
Hi Tamas,
On 13/02/17 16:20, Tamas K Lengyel wrote:
On Fri, Feb 10, 2017 at 5:14 PM, Volodymyr Babchuk
wrote:
Hello,
This e-mail is sort of follow-up to the two threads: [1] (my thread
about TEE interaction) and [2] (Edgar's thread regarding handling SMC
calls in platform_hvc). I want to disc
On 13/02/17 12:36, Jan Beulich wrote:
On 13.02.17 at 12:00, wrote:
>> @@ -502,11 +503,9 @@ void recalculate_cpuid_policy(struct domain *d)
>>
>> cpuid_featureset_to_policy(fs, p);
>>
>> -p->extd.maxphysaddr = min(p->extd.maxphysaddr, max->extd.maxphysaddr);
>> p->extd.maxphy
On 14/02/17 14:46, Waiman Long wrote:
> On 02/14/2017 04:39 AM, Peter Zijlstra wrote:
>> On Mon, Feb 13, 2017 at 05:34:01PM -0500, Waiman Long wrote:
>>> It is the address of &steal_time that will exceed the 32-bit limit.
>> That seems extremely unlikely. That would mean we have more than 4G
>> wor
On 13/02/17 16:59, Tamas K Lengyel wrote:
On Mon, Feb 13, 2017 at 9:37 AM, Julien Grall wrote:
Hi Tamas,
On 13/02/17 16:20, Tamas K Lengyel wrote:
On Fri, Feb 10, 2017 at 5:14 PM, Volodymyr Babchuk
wrote:
Hello,
This e-mail is sort of follow-up to the two threads: [1] (my thread
about
Signed-off-by: Olaf Hering
---
docs/misc/status-override-table-spec.odt | Bin 20206 -> 0 bytes
1 file changed, 0 insertions(+), 0 deletions(-)
diff --git a/docs/misc/status-override-table-spec.odt
b/docs/misc/status-override-table-spec.odt
deleted file mode 100644
index
4ea576b2c248a70445a6a5
The odt files should have been saved as Flat XML via 'Save as ...'.
git send-email warns about lines longer than 998 chars. Hopefully all
involved mail services have no silly limits.
Olaf
Olaf Hering (4):
docs: convert STAO from odt to fodt
docs: convert XENV from odt to fodt
docs: remove
Signed-off-by: Olaf Hering
---
docs/misc/xen-env-table-spec.odt | Bin 19204 -> 0 bytes
1 file changed, 0 insertions(+), 0 deletions(-)
diff --git a/docs/misc/xen-env-table-spec.odt b/docs/misc/xen-env-table-spec.odt
deleted file mode 100644
index
c8de7ca7d8e7d00dabe9d7bebef1e8117e47f95e..0
Fixes 140b31a8de ("Add STAO spec to docs/misc")
Signed-off-by: Olaf Hering
---
docs/misc/status-override-table-spec.fodt | 707 ++
1 file changed, 707 insertions(+)
diff --git a/docs/misc/status-override-table-spec.fodt
b/docs/misc/status-override-table-spec.fodt
ne
Fixes c33b5f013d ("Add XENV to docs/misc")
Signed-off-by: Olaf Hering
---
docs/misc/xen-env-table-spec.fodt | 852 ++
1 file changed, 852 insertions(+)
diff --git a/docs/misc/xen-env-table-spec.fodt
b/docs/misc/xen-env-table-spec.fodt
new file mode 100644
in
On Tue, Jan 17, Stefano Stabellini wrote:
> On Tue, 17 Jan 2017, Olaf Hering wrote:
> > On Fri, Jan 13, Julien Grall wrote:
> >
> > > Regarding the format. Does ODT will allow git to do proper diff?
> >
> > There is flat ODT, "Safe as ..." and pick the better format from the
> > pulldown menu.
Hello,
and ping.
Olaf
On Wed, Aug 17, Olaf Hering wrote:
> Starting with xen-4.7 cpuid() will return with the hypervisor bit set
> in a dom0 when running on an AMD system. As a result biosdevname
> thinks it runs in a guest and does nothing. Detect a dom0 by looking
> into xenfs. This works wi
flight 105792 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105792/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
At 16:04 + on 14 Feb (1487088291), Andrew Cooper wrote:
> Hmm ok. With the other bugfix of not dropping the first line, this hunk
> is now simply:
>
> @@ -504,7 +505,7 @@ void recalculate_cpuid_policy(struct domain *d)
>
> p->extd.maxphysaddr = min(p->extd.maxphysaddr, max->extd.maxphy
Hi,
Ping? As Ian mentioned earlier, without this series it is not possible
to build Xen tools for ARM64 in osstest.
Cheers,
On 02/08/2017 07:50 PM, Julien Grall wrote:
Hi,
On 24/01/17 22:19, David Scott wrote:
On 24 Jan 2017, at 11:35, Ian Jackson wrote:
Ian Jackson writes ("[PATCH 0/2
On Tue, Feb 14, 2017 at 12:30:55PM +, Roger Pau Monne wrote:
> The following incorrect format specifiers and incorrect number of parameters
> passed to printf like functions are reported by clang:
>
> mce.c:601:18: error: data argument not used by format string
> [-Werror,-Wformat-extra-args]
These two patches don't apply anymore. Please rebase.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi Stefano,
On 02/13/2017 07:59 PM, Stefano Stabellini wrote:
> On Mon, 13 Feb 2017, Julien Grall wrote:
>> Hi Stefano,
>>
>> On 10/02/17 01:01, Stefano Stabellini wrote:
>>> On Fri, 3 Feb 2017, Edgar E. Iglesias wrote:
A possible hack could be to allocate a chunk of DDR dedicated for PCI DMA
1 - 100 of 170 matches
Mail list logo