On 14/03/17 00:50, Stefano Stabellini wrote:
> Upon receiving a notification from the backend, schedule the
> p9_xen_response work_struct. p9_xen_response checks if any responses are
> available, if so, it reads them one by one, calling p9_client_cb to send
> them up to the 9p layer (p9_client_cb c
On 14/03/17 00:50, Stefano Stabellini wrote:
> This patch adds a Kconfig option and Makefile support for building the
> 9pfs Xen driver.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> CC: Eric Van Hensbergen
> CC: Ron Minnich
> CC: Latchesar Ionko
On 14/03/17 00:55, Stefano Stabellini wrote:
> Introduce the Xen 9pfs backend: add struct XenDevOps to register as a
> Xen backend and add struct V9fsTransport to register as v9fs transport.
>
> All functions are empty stubs for now.
>
> Signed-off-by: Stefano Stabellini
> Reviewed-by: Greg Kurz
On 14/03/17 00:55, Stefano Stabellini wrote:
> Write the limits of the backend to xenstore. Connect to the frontend.
> Upon connection, allocate the rings according to the protocol
> specification.
>
> Initialize a QEMUBH to schedule work upon receiving an event channel
> notification from the fro
Due to a bug in the glibc headers the macros makedev(), major() and
minor() where avaialble by including sys/types.h. This bug was
addressed in glibc-2.25 by introducing a warning when these macros are
used. Since Xen is build with -Werror this new warning cause a compile
error.
Use sys/sysmacros.
On 3/13/2017 7:20 PM, Jan Beulich wrote:
On 11.03.17 at 09:42, wrote:
On 3/10/2017 11:29 PM, Jan Beulich wrote:
On 08.03.17 at 16:33, wrote:
changes in v7:
- Use new ioreq server interface - XEN_DMOP_map_mem_type_to_ioreq_server.
- According to comments from George: removed domain_
On 3/13/2017 7:24 PM, Jan Beulich wrote:
On 11.03.17 at 09:42, wrote:
On 3/11/2017 12:03 AM, Jan Beulich wrote:
But there's a wider understanding issue I'm having here: What is
an "entry" here? Commonly I would assume this to refer to an
individual (4k) page, but it looks like you really mea
On 3/13/2017 7:32 PM, Jan Beulich wrote:
On 11.03.17 at 09:42, wrote:
On 3/11/2017 12:59 AM, Andrew Cooper wrote:
On 08/03/17 15:33, Yu Zhang wrote:
--- a/xen/arch/x86/hvm/dm.c
+++ b/xen/arch/x86/hvm/dm.c
@@ -288,6 +288,7 @@ static int inject_event(struct domain *d,
return 0;
}
On 3/13/2017 7:22 PM, Jan Beulich wrote:
On 11.03.17 at 09:42, wrote:
On 3/10/2017 11:33 PM, Jan Beulich wrote:
On 08.03.17 at 16:33, wrote:
@@ -197,6 +217,10 @@ static int hvmemul_do_io(
* - If the IOREQ_MEM_ACCESS_WRITE flag is not set, treat it
* like a norma
Hi,
Thanks for your comments.
On 3 March 2017 at 21:23, Konrad Rzeszutek Wilk wrote:
>> The following changes were done:
>
> .. snip..
>
> Thank you for this great writeup. I took a stab at it and stopped at patch
> #2 b/c Julien said he would look in it deeper. But based on a brief
> look I wou
Hi,
On 5 March 2017 at 12:46, Julien Grall wrote:
> Hi Bhupinder,
>
> On 02/21/2017 11:25 AM, Bhupinder Thakur wrote:
>>
>> There are still some items which are pending:
>>
>> 1. Adding dynamic enable/disable of pl011 emulation for a guest
>> 2. Add a new console type "pl011" in xenconsoled to a
flight 106642 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106642/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-cubietruck 15 guest-start/debian.repeat fail REGR. vs.
106627
Regressions wh
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Monday, March 13, 2017 6:52 PM
>
> Intel SDM states that if there is a current VMCS and there is MOV-SS blocking,
> VMFailValid occurs and control passes to the next instruction.
>
> Implement such behaviour for nested vmlaunch and v
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Monday, March 13, 2017 6:52 PM
>
> Currently xen always sets the shadow VMCS-indicator bit on nested vmptrld
> and always clears it on nested vmclear. This behavior is wrong when the
> guest loads a shadow VMCS: shadow bit will be lo
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Monday, March 13, 2017 6:52 PM
>
> Intel SDM states that if the current VMCS is a shadow VMCS, VMFailInvalid
> occurs and control passes to the next instruction.
>
> Implement such behaviour for nested vmlaunch.
>
> Signed-off-by: S
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, March 13, 2017 7:05 PM
>
> When an FPU instruction with a memory destination fails during the memory
> write, it should not affect FPU register state. Due to the way we emulate FPU
> (and SIMD) instructions, we can only guarantee this
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 13 March 2017 11:06
> To: xen-devel
> Cc: Andrew Cooper ; Paul Durrant
>
> Subject: [PATCH 4/4] x86emul: correct FPU code/data pointers and opcode
> handling
>
> Prevent leaking the hypervisor ones (stored by har
On 17-03-14 00:29:09, Jan Beulich wrote:
> >>> Yi Sun 03/14/17 3:42 AM >>>
> >There are three scenarios. E.g.
> >1. User calls domctl interface on Dom0 to set a COS ID 1 for Dom1 into its
> >psr_cos_ids[]. Then, Dom1 is scheduled so that 'psr_ctxt_switch_to()' is
> >called which makes COS ID 1 wor
While we're doing apply_alternatives, we will generate new instructions
if required. The new instructions need to update the Xen text section,
but Xen text section is read-only. So we re-map Xen to a new virtual
address to enable write access.
The targets of the new generated instructions are loca
> -Original Message-
[snip]
> +struct hvm_ioreq_server *p2m_get_ioreq_server(struct domain *d,
> + unsigned int *flags)
> +{
> +struct p2m_domain *p2m = p2m_get_hostp2m(d);
> +struct hvm_ioreq_server *s;
> +
flight 106644 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106644/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-vhd 3 host-install(3)broken REGR. vs. 104301
test-amd64-amd64-xl-p
On 3/14/2017 5:40 PM, Paul Durrant wrote:
-Original Message-
[snip]
+struct hvm_ioreq_server *p2m_get_ioreq_server(struct domain *d,
+ unsigned int *flags)
+{
+struct p2m_domain *p2m = p2m_get_hostp2m(d);
+struct hvm_ioreq_server *s
On 14/03/2017 00:55, Stefano Stabellini wrote:
> CONFIG_XEN_BACKEND is currently set when the host supports Xen,
> regardless of the chosen targets. As a consequence, Xen backends can be
> enabled even on targets that don't support Xen.
>
> Fix the issue by setting CONFIG_XEN_BACKEND only for ta
>>> On 14.03.17 at 10:21, wrote:
> On 17-03-14 00:29:09, Jan Beulich wrote:
>> >>> Yi Sun 03/14/17 3:42 AM >>>
>> >There are three scenarios. E.g.
>> >1. User calls domctl interface on Dom0 to set a COS ID 1 for Dom1 into its
>> >psr_cos_ids[]. Then, Dom1 is scheduled so that 'psr_ctxt_switch_to(
>>> On 14.03.17 at 08:28, wrote:
> On 3/13/2017 7:20 PM, Jan Beulich wrote:
> On 11.03.17 at 09:42, wrote:
>>> On 3/10/2017 11:29 PM, Jan Beulich wrote:
>>> On 08.03.17 at 16:33, wrote:
> --- a/xen/arch/x86/mm/p2m-ept.c
> +++ b/xen/arch/x86/mm/p2m-ept.c
> @@ -131,6 +131,13 @@
On Mon, Mar 13, 2017 at 04:50:12PM +, Wei Liu wrote:
> On Fri, Mar 03, 2017 at 12:25:06PM +, Roger Pau Monne wrote:
> > This removal applies to both the hypervisor and the toolstack side of PVHv1.
> >
> > Note that on the toolstack side a new PVH domain type is introduced to
> > libxl.
>
> -Original Message-
> From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
> Sent: 14 March 2017 09:53
> To: Paul Durrant ; Jan Beulich
>
> Cc: Andrew Cooper ; George Dunlap
> ; Jun Nakajima ;
> Kevin Tian ; zhiyuan...@intel.com; xen-
> de...@lists.xen.org; Tim (Xen.org)
> Subject: Re: [PA
>>> On 14.03.17 at 08:42, wrote:
> On 3/13/2017 7:24 PM, Jan Beulich wrote:
> On 11.03.17 at 09:42, wrote:
>>> On 3/11/2017 12:03 AM, Jan Beulich wrote:
But there's a wider understanding issue I'm having here: What is
an "entry" here? Commonly I would assume this to refer to an
>>> On 14.03.17 at 08:42, wrote:
> So you mean change the definition of to
> xen_dm_op_map_mem_type_to_ioreq_server
> to something like this?
>
> struct xen_dm_op_map_mem_type_to_ioreq_server {
> ioservid_t id; /* IN - ioreq server id */
> uint16_t type; /* IN - memory type *
On 13/03/17 11:05, Jan Beulich wrote:
> @@ -1027,13 +1076,48 @@ do {
> static void put_fpu(
> struct fpu_insn_ctxt *fic,
> bool failed_late,
> +const struct x86_emulate_state *state,
> struct x86_emulate_ctxt *ctxt,
> const struct x86_emulate_ops *ops)
> {
> if ( unli
>>> On 14.03.17 at 11:56, wrote:
> On 13/03/17 11:05, Jan Beulich wrote:
>> @@ -1027,13 +1076,48 @@ do {
>> static void put_fpu(
>> struct fpu_insn_ctxt *fic,
>> bool failed_late,
>> +const struct x86_emulate_state *state,
>> struct x86_emulate_ctxt *ctxt,
>> const struct
flight 106650 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106650/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 106608
test-armhf-armhf-libvirt 13
>>> On 13.03.17 at 18:48, wrote:
> On 13/03/17 15:45, Jan Beulich wrote:
> On 06.03.17 at 17:42, wrote:
>>> +/* Put FEP immediately before va, and a ret instruction at va. */
>>> +memcpy(m->va - 5, "\x0f\x0bxen\xc3", 6);
>>> +barrier();
>>> +
>>> +/* Read them back, to confirm
On Mon, Mar 06, 2017 at 10:59:24AM +0800, Zhang Chen wrote:
> Xen colo-frame can use the notify way communicate with
> qemu colo-compare.
>
> Signed-off-by: Zhang Chen
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists
On Mon, Mar 06, 2017 at 10:59:20AM +0800, Zhang Chen wrote:
> In this patch we close kernel COLO-Proxy on primary side.
>
> Signed-off-by: Zhang Chen
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Mon, Mar 06, 2017 at 10:59:22AM +0800, Zhang Chen wrote:
> Qemu need this args to start userspace colo-proxy.
>
> Signed-off-by: Zhang Chen
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Mon, Mar 06, 2017 at 10:59:26AM +0800, Zhang Chen wrote:
> Signed-off-by: Zhang Chen
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Mon, Mar 06, 2017 at 10:59:19AM +0800, Zhang Chen wrote:
> Add remus '-p' to enable userspace colo proxy(in qemu).
>
> Signed-off-by: Zhang Chen
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Mon, Mar 06, 2017 at 10:59:21AM +0800, Zhang Chen wrote:
> In this patch we add a function to close COLO kernel Proxy on secondary side.
>
> Signed-off-by: Zhang Chen
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lis
On Mon, Mar 06, 2017 at 10:59:25AM +0800, Zhang Chen wrote:
> We use kernel colo proxy's way to get the checkpoint event
> from qemu colo-compare.
> Qemu colo-compare need add a API to support this(I will add this in qemu).
> Qemu side patch:
> https://lists.nongnu.org/archive/html/qemu-devel/2017
On Mon, Mar 06, 2017 at 10:59:23AM +0800, Zhang Chen wrote:
> Qemu need this args to start userspace colo-proxy.
>
> Signed-off-by: Zhang Chen
Acked-by: Wei Liu
> diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
> index 88ef1c6..d2bbe26 100644
> --- a/tools/xl/xl_parse.c
> +++ b/tools/xl
On 13/03/17 11:07, Jan Beulich wrote:
> Add tests to verify that
> - FPU insns leave correct (guest) values in FIP/FDP/FOP/FCS/FDS,
> - FPU insns writing memory don't update FPU register state when the
> write faults (at the example of FISTP),
> - VCVTPS2PH (once implemented in the emulator) does
On Tue, Mar 14, 2017 at 11:24:12AM +, Wei Liu wrote:
> On Mon, Mar 06, 2017 at 10:59:23AM +0800, Zhang Chen wrote:
> > Qemu need this args to start userspace colo-proxy.
> >
> > Signed-off-by: Zhang Chen
>
> Acked-by: Wei Liu
>
> > diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
> >
On Tue, Mar 14, 2017 at 07:37:04AM +, Olaf Hering wrote:
> Due to a bug in the glibc headers the macros makedev(), major() and
> minor() where avaialble by including sys/types.h. This bug was
> addressed in glibc-2.25 by introducing a warning when these macros are
> used. Since Xen is build wit
All,
with the goal of releasing in about 3 weeks time, please point out
backport candidates you find missing from the respective staging
branch, but which you consider relevant.
Thanks, Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://li
>>> On 14.03.17 at 12:36, wrote:
> On 13/03/17 11:07, Jan Beulich wrote:
>> Add tests to verify that
>> - FPU insns leave correct (guest) values in FIP/FDP/FOP/FCS/FDS,
>> - FPU insns writing memory don't update FPU register state when the
>> write faults (at the example of FISTP),
>> - VCVTPS2P
On Tue, Mar 14, 2017 at 11:43:09AM +, Wei Liu wrote:
> On Tue, Mar 14, 2017 at 07:37:04AM +, Olaf Hering wrote:
> > Due to a bug in the glibc headers the macros makedev(), major() and
> > minor() where avaialble by including sys/types.h. This bug was
> > addressed in glibc-2.25 by introduci
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9603 / XSA-211
version 2
Cirrus VGA Heap overflow via display refresh
UPDATES IN VERSION 2
Patches for qemu-xen-traditional.
Public release.
> > +struct vm_event_desc_access {
> > +union {
> > +uint32_t vmx_instr_info;/* VMX: VMCS Instruction-Information
> > Field */
> > +uint64_t svm_exitinfo; /* SVM: VMCB EXITINFO Field */
> > +uint64_t info;
> > +} vmexit;
> > +uint64_t exit_qualification
Am Tue, 14 Mar 2017 11:54:46 +
schrieb Wei Liu :
> tap-ctl-allocate.c:143:9: error: ‘MISC_MAJOR’ undeclared (first use in
That happened because the variant of the change I sent was untested...
I will revisit this part. sys/types.h is needed according to mknod(2).
Olaf
pgp0vLRVEgZgr.pgp
Des
On Mon, Mar 13, 2017 at 10:38:43AM +, Wei Liu wrote:
> A typo was made in 7a6de259f.
>
> Currently libxlutil lives in the same directory as libxl, fixing this
> issue causes no functional change.
>
> Signed-off-by: Wei Liu
> ---
> tools/Rules.mk | 2 +-
> 1 file changed, 1 insertion(+), 1 d
On Wed, Mar 08, 2017 at 03:49:29PM +0100, Juergen Gross wrote:
> To help consumers of the Xen libraries (e.g. qemu) to use correct
> flags when building provide pkg-config files for all libraries of
> Xen.
>
> The first 2 patches correct some flags used by the Xen internal build
> system. The buil
On Wed, Mar 08, 2017 at 03:49:42PM +0100, Juergen Gross wrote:
> In order to be able to use pkg-config for obtaining linker- and
> compiler-flags provide a xenstat.pc file.
>
> Signed-off-by: Juergen Gross
> ---
> .gitignore | 1 +
> tools/xenstat/libxenstat/Makefile
On Tue, Mar 14, 2017 at 01:08:28PM +0100, Olaf Hering wrote:
> Am Tue, 14 Mar 2017 11:54:46 +
> schrieb Wei Liu :
>
> > tap-ctl-allocate.c:143:9: error: ‘MISC_MAJOR’ undeclared (first use in
>
> That happened because the variant of the change I sent was untested...
> I will revisit this part.
Elena Reshetova writes:
> refcount_t type and corresponding API should be
> used instead of atomic_t when the variable is used as
> a reference counter. This allows to avoid accidental
> refcounter overflows that might lead to use-after-free
> situations.
>
> Signed-off-by: Elena Reshetova
> Sig
> > @@ -2642,6 +2660,38 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
> > case VMEXIT_PAUSE:
> > svm_vmexit_do_pause(regs);
> > break;
> > +
> > +case VMEXIT_IDTR_READ:
> > +hvm_descriptor_access_intercept(vmcb->exitintinfo.bytes, 0,
> > VM_EVENT_DES
On 3/14/2017 6:40 PM, Paul Durrant wrote:
-Original Message-
From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 14 March 2017 09:53
To: Paul Durrant ; Jan Beulich
Cc: Andrew Cooper ; George Dunlap
; Jun Nakajima ;
Kevin Tian ; zhiyuan...@intel.com; xen-
de...@lists.xen.org; Tim (
On 3/14/2017 6:49 PM, Jan Beulich wrote:
On 14.03.17 at 08:42, wrote:
On 3/13/2017 7:24 PM, Jan Beulich wrote:
On 11.03.17 at 09:42, wrote:
On 3/11/2017 12:03 AM, Jan Beulich wrote:
But there's a wider understanding issue I'm having here: What is
an "entry" here? Commonly I would assume t
On 3/14/2017 6:51 PM, Jan Beulich wrote:
On 14.03.17 at 08:42, wrote:
So you mean change the definition of to
xen_dm_op_map_mem_type_to_ioreq_server
to something like this?
struct xen_dm_op_map_mem_type_to_ioreq_server {
ioservid_t id; /* IN - ioreq server id */
uint16_t typ
> Elena Reshetova writes:
>
> > refcount_t type and corresponding API should be
> > used instead of atomic_t when the variable is used as
> > a reference counter. This allows to avoid accidental
> > refcounter overflows that might lead to use-after-free
> > situations.
> >
> > Signed-off-by: Elen
On Fri, Mar 10, 2017 at 05:50:34PM +0200, Vlad Ioan Topan wrote:
> Adds monitor support for descriptor access events (reads & writes of
> IDTR/GDTR/LDTR/TR) for the x86 architecture (VMX and SVM).
>
> Signed-off-by: Vlad Ioan Topan
> ---
> tools/libxc/include/xenctrl.h | 2 ++
> tools/lib
On 03/14/2017 02:15 PM, Vlad-Ioan TOPAN wrote:
>>> @@ -2642,6 +2660,38 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
>>> case VMEXIT_PAUSE:
>>> svm_vmexit_do_pause(regs);
>>> break;
>>> +
>>> +case VMEXIT_IDTR_READ:
>>> +hvm_descriptor_access_intercep
flight 106645 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106645/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
On Sun, Mar 05, 2017 at 01:04:07PM +, Julien Grall wrote:
> Hi Bhupinder,
>
> CC toolstack maintainers.
>
> On 02/21/2017 11:26 AM, Bhupinder Thakur wrote:
> > Add a new pl011 uart node
> > - Get the pl011 spi virq from Xen using a hvm call
>
> See my comment on previous patches.
>
> >
>>> On 14.03.17 at 13:03, wrote:
> So, Jan. Could we draw a conclusion here, that although the selected
> ioreq server may be stale, but
> it should be the device model to do the check?
Yes. In order for this to not come up yet another time, please add
a comment though.
Jan
_
>>> On 14.03.17 at 13:18, wrote:
>
> On 3/14/2017 6:49 PM, Jan Beulich wrote:
> On 14.03.17 at 08:42, wrote:
>>> On 3/13/2017 7:24 PM, Jan Beulich wrote:
>>> On 11.03.17 at 09:42, wrote:
> On 3/11/2017 12:03 AM, Jan Beulich wrote:
>> But there's a wider understanding issue I'm
>>> On 14.03.17 at 13:22, wrote:
> On 3/14/2017 6:51 PM, Jan Beulich wrote:
> On 14.03.17 at 08:42, wrote:
>>> So you mean change the definition of to
>>> xen_dm_op_map_mem_type_to_ioreq_server
>>> to something like this?
>>>
>>> struct xen_dm_op_map_mem_type_to_ioreq_server {
>>> ioser
On 03/14/2017 08:50 AM, Razvan Cojocaru wrote:
On 03/14/2017 02:15 PM, Vlad-Ioan TOPAN wrote:
@@ -2642,6 +2660,38 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
case VMEXIT_PAUSE:
svm_vmexit_do_pause(regs);
break;
+
+case VMEXIT_IDTR_READ:
+hvm_descri
>>> On 14.03.17 at 13:15, wrote:
>> > @@ -2642,6 +2660,38 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
>> > case VMEXIT_PAUSE:
>> > svm_vmexit_do_pause(regs);
>> > break;
>> > +
>> > +case VMEXIT_IDTR_READ:
>> > +hvm_descriptor_access_intercept(vmcb
Hi Andrew,
On 21/07/16 18:17, Andrew Cooper wrote:
This series is RFC because it has only had compile testing thusfar.
On AMD hardware supporting Debug Extentions, migration of a PV guest which is
not currently using Debug Extentions fails, as the save side writes a
X86_PV_VCPU_MSRS record with
On Mon, 13 Mar 2017 13:28:25 +0100
Michal Hocko wrote:
> On Mon 13-03-17 11:55:54, Igor Mammedov wrote:
> > On Thu, 9 Mar 2017 13:54:00 +0100
> > Michal Hocko wrote:
> >
> > [...]
> > > > It's major regression if you remove auto online in kernels that
> > > > run on top of x86 kvm/vmware hype
On Tue, Mar 14, 2017 at 05:27:17PM +0800, Wei Chen wrote:
> While we're doing apply_alternatives, we will generate new instructions
> if required. The new instructions need to update the Xen text section,
> but Xen text section is read-only. So we re-map Xen to a new virtual
> address to enable wri
flight 106646 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106646/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-amd64-xl-qemuu-
It's useful for an introspection tool to be able to inspect
XSAVE states. Xen already has a DOMCTL that can be used for this
purpose, but it had no public libxc wrapper. This patch adds
xc_vcpu_get_extstate().
Signed-off-by: Razvan Cojocaru
---
tools/libxc/include/xenctrl.h | 23
Commit 78fb69ad9 ("tools/Rules.mk: Properly handle libraries with
recursive dependencies.") introduced a copy and paste error in
tools/Rules.mk:
LDLIBS_libxenstore and SHLIB_libxenstore don't use SHDEPS_libxenstore
but SHDEPS_libxenguest. This will add a superfluous dependency of
libxenstore on li
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xenforeignmemory.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore | 1 +
tools/libs/foreignmemory/Makefile | 21
Some libraries require different compiler-flags when being used in a
local build compared to a build using installed libraries.
Reflect that by supporting local cflags variables in generated
pkg-config files. The local variants will be empty in the installed
pkg-config files.
The flags for the li
Instead of setting the PKG_CONFIG_DIR make variable in each library
Makefile do it in tools/Makefile and stubdom/Makefile globally.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
stubdom/Makefile | 1 +
tools/Makefile | 3 +++
tools/libxc/Makefile | 1 -
3 files changed, 4 inserti
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xencall.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore| 1 +
tools/libs/call/Makefile | 21 -
tools/libs/call/xencall.pc.in
LDLIBS_* and SHLIB_* settings in tools/Rules.mk are sometimes missing
some SHDEPS_* added to them.
Add the missing flags, even if sometimes being empty.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
tools/Rules.mk | 27 +++
1 file changed, 15 insertions(+), 12 dele
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xengnttab.pc and a xengntshr.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore| 2 ++
tools/libs/gnttab/Makefile| 22 +-
tools/libs/
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xenguest.pc file.
Update the xencontrol.pc file to reflect the dependencies of libxenctrl.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
tools/libxc/Makefile | 6 --
tools/libxc/xencontro
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xendevicemodel.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore | 1 +
tools/libs/devicemodel/Makefile | 21 -
tools/l
To help consumers of the Xen libraries (e.g. qemu) to use correct
flags when building provide pkg-config files for all libraries of
Xen.
The first 2 patches correct some flags used by the Xen internal build
system. The build process wasn't producing wrong results, but this was
just pure luck as no
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xenstore.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore| 1 +
tools/xenstore/Makefile | 21 +
tools/xenstore/xenstore.pc.in | 10 ++
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xenblktapctl.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore | 1 +
tools/blktap2/control/Makefile | 23 +--
tools/blktap2
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xenevtchn.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore| 1 +
tools/libs/evtchn/Makefile| 21 -
tools/libs/evtchn/xenevtchn.pc.i
Instead of generating the *.pc.in files at configure time use the new
pkg-config scheme for those files. Add the dependencies to other Xen
libraries as needed.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore| 1 -
tools/configure | 4 +---
tools
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xentoollog.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore | 1 +
tools/libs/toollog/Makefile | 20 +++-
tools/libs/toollog/xentoollo
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xenvchan.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore| 1 +
tools/libvchan/Makefile | 21 -
tools/libvchan/xenvchan.pc.in | 10 ++
Instead of installing $(PKG_INSTALLDIR) in multiple Makefiles below
tools, do so in tools/Makefile.
Signed-off-by: Juergen Gross
---
tools/Makefile | 5 -
tools/libxc/Makefile | 1 -
tools/libxl/Makefile | 1 -
3 files changed, 4 insertions(+), 3 deletions(-)
diff --git a/tools/Makefi
Hi Konrad,
On 14/03/17 13:20, Konrad Rzeszutek Wilk wrote:
On Tue, Mar 14, 2017 at 05:27:17PM +0800, Wei Chen wrote:
While we're doing apply_alternatives, we will generate new instructions
if required. The new instructions need to update the Xen text section,
but Xen text section is read-only.
In order to be able to use pkg-config for obtaining linker- and
compiler-flags provide a xenstat.pc file.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
.gitignore | 1 +
tools/xenstat/libxenstat/Makefile | 20 +++-
tools/xenstat/libxenstat/
On 3/14/2017 9:10 PM, Jan Beulich wrote:
On 14.03.17 at 13:03, wrote:
So, Jan. Could we draw a conclusion here, that although the selected
ioreq server may be stale, but
it should be the device model to do the check?
Yes. In order for this to not come up yet another time, please add
a comme
On 3/14/2017 9:11 PM, Jan Beulich wrote:
On 14.03.17 at 13:18, wrote:
On 3/14/2017 6:49 PM, Jan Beulich wrote:
On 14.03.17 at 08:42, wrote:
On 3/13/2017 7:24 PM, Jan Beulich wrote:
On 11.03.17 at 09:42, wrote:
On 3/11/2017 12:03 AM, Jan Beulich wrote:
But there's a wider understanding
On 3/14/2017 9:12 PM, Jan Beulich wrote:
On 14.03.17 at 13:22, wrote:
On 3/14/2017 6:51 PM, Jan Beulich wrote:
On 14.03.17 at 08:42, wrote:
So you mean change the definition of to
xen_dm_op_map_mem_type_to_ioreq_server
to something like this?
struct xen_dm_op_map_mem_type_to_ioreq_server
flight 106658 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106658/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen
On 14/03/17 13:20, Julien Grall wrote:
> Hi Andrew,
>
> On 21/07/16 18:17, Andrew Cooper wrote:
>> This series is RFC because it has only had compile testing thusfar.
>>
>> On AMD hardware supporting Debug Extentions, migration of a PV guest
>> which is
>> not currently using Debug Extentions fails
On Tue, Mar 14, 2017 at 01:32:31PM +, Julien Grall wrote:
> Hi Konrad,
>
> On 14/03/17 13:20, Konrad Rzeszutek Wilk wrote:
> > On Tue, Mar 14, 2017 at 05:27:17PM +0800, Wei Chen wrote:
> > > While we're doing apply_alternatives, we will generate new instructions
> > > if required. The new inst
Hi Anthony,
I am trying to run a DomU guest using OVMF. I have built xen staging
with --with-ovmf option. I am able to install a new guest but I am
unable to boot it (see the attached image).
The xl.cfg file I am using:
name='test_uefi'
memory=16384
disk=['file:/home/IMAGES/FEDORA/FC25/Fedo
1 - 100 of 206 matches
Mail list logo