On 2017年10月19日 19:28, Jan Beulich wrote:
On 19.10.17 at 10:49, wrote:
>> On Thu, Oct 19, 2017 at 10:26:36AM +0800, Lan Tianyu wrote:
>>> Hi Roger:
>>> Thanks for review.
>>>
>>> On 2017年10月18日 21:26, Roger Pau Monné wrote:
On Thu, Sep 21, 2017 at 11:01:42PM -0400, Lan Tianyu wrote:
On Mon, Oct 2, 2017 at 12:49 PM, Oleksandr Grytsov wrote:
> From: Oleksandr Grytsov
>
> This patch set adds PV sound device support to xl.cfg and xl.
> See sndif.h for protocol implementation details.
>
>
> Oleksandr Grytsov (5):
> libxl: add PV sound device
> libxl: add vsnd list and info
>
>>> On 24.10.17 at 04:10, wrote:
> As you may know, MBA patch set has got enough Reviewed-by/Acked-by in last
> week.
> It is ready to be merged.
>
> This is a feature for Skylake, Intel has launched Skylake and KVM already
> supported MBA, so including it in Xen 4.10 will quickly fill this gap
On Thu, Oct 5, 2017 at 12:07 PM, Oleksandr Grytsov wrote:
> From: Oleksandr Grytsov
>
> Currently vkb device is the part of FB and console.
> In embedded application we use vkb protocol to communicate
> with user space backend. For this purpose we need to have
> possibility to enable vkb device
On Thu, Oct 5, 2017 at 12:30 PM, Oleksandr Grytsov wrote:
> From: Oleksandr Grytsov
>
> In current implementation the path of device XS entry is created with
> string from libxl__device_kind enum. But access to the device entry
> usually done with hardcoded path. This is source of potential erro
On 03/10/17 23:33, Boris Ostrovsky wrote:
> On 10/02/2017 05:37 PM, HW42 wrote:
>> Juergen Gross:
>>> When setting up the Xenstore watch for the memory target size the new
>>> watch will fire at once. Don't try to reach the configured target size
>>> by onlining new memory in this case, as the curr
Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xen/balloon: don't
online new memory initially") introduced a regression when booting a
HVM domain with memory less than mem-max: instead of ballooning down
immediately the system would try to use the memory up to mem-max
resulting in Xen crashing t
flight 115167 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115167/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 114814
Tests which are faili
flight 72348 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72348/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-daily-netboot-pygrub 1 build-check(1) blocked n/a
build-arm64-pvops
This patch renames PSR sysctl/domctl interfaces and related xsm policy to
make them be general for all resource allocation features but not only
for CAT. Then, we can resuse the interfaces for all allocation features.
Basically, it changes 'psr_cat_op' to 'psr_alloc', and remove 'CAT_' from some
m
Hi,
On 23/10/2017 16:57, Wei Liu wrote:
On Mon, Oct 23, 2017 at 03:38:33PM +0100, Andrew Cooper wrote:
On 23/10/17 15:34, Jan Beulich wrote:
On 23.10.17 at 15:58, wrote:
On 23/10/17 09:40, Jan Beulich wrote:
On 23.10.17 at 01:49, wrote:
flight 115037 xen-unstable real [real]
http://logs.t
On 23/10/17 11:20, Juergen Gross wrote:
> On 06/10/17 15:30, Julien Grall wrote:
>> Hi,
>>
>> On 27/09/17 15:36, Wei Liu wrote:
>>> On Tue, Sep 26, 2017 at 02:02:56PM +0200, Juergen Gross wrote:
Long ago domains to be saved were limited to 1TB size due to the
migration stream v1 limitatio
Wei Liu writes ("[PATCH v2] scripts: introduce a script for build test"):
...
> +if git branch | grep -q '^\*.\+detached at'; then
You mean some rune involving git-symbolic-ref.
git-symbolic-ref -q HEAD exits with status 1 if HEAD is detached, 0 if
HEAD is a branch, or some other status in case o
From: Razvan Cojocaru
For the default EPT view we have xc_set_mem_access_multi(), which
is able to set an array of pages to an array of access rights with
a single hypercall. However, this functionality was lacking for the
altp2m subsystem, which could only set page restrictions for one
page at a
On 10/23/2017 06:55 PM, Andrew Cooper wrote:
> On 23/10/17 17:22, George Dunlap wrote:
>> On 09/11/2017 06:53 PM, Andrew Cooper wrote:
>>> On 11/09/17 18:01, George Dunlap wrote:
+### x86/RAM
+
+Limit, x86: 16TiB
+Limit, ARM32: 16GiB
+Limit, ARM64: 5TiB
+
>
Hi,
On 23/10/2017 18:55, Andrew Cooper wrote:
On 23/10/17 17:22, George Dunlap wrote:
On 09/11/2017 06:53 PM, Andrew Cooper wrote:
On 11/09/17 18:01, George Dunlap wrote:
+Limit, x86 HVM: 128
+Limit, ARM32: 8
+Limit, ARM64: 128
+
+[XXX Andrew Cooper: Do want to add "Limit-Security
./mg-hosts showprops XXX description and implementation didn't match.
Fix description.
Signed-off-by: Anthony PERARD
---
mg-hosts | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/mg-hosts b/mg-hosts
index a000f2d..d91a965 100755
--- a/mg-hosts
+++ b/mg-hosts
@@ -54,8 +54,8
Anthony PERARD writes ("[PATCH] mg-hosts: Fix usage of showprops"):
> ./mg-hosts showprops XXX description and implementation didn't match.
> Fix description.
Thanks, queued. (I edited the commit message a bit.)
Ian.
From 10ce43294150c6cfd5b00154636eb8cb945b7188 Mon Sep 17 00:00:00 2001
From: A
Hi,
On 23/10/2017 17:01, Andre Przywara wrote:
Hi,
On 18/10/17 17:32, Bhupinder Thakur wrote:
Hi Andre,
I verified this patch on qualcomm platform. It is working fine.
On 18 October 2017 at 19:11, Andre Przywara wrote:
Instead of asserting the receive interrupt (RXI) on the first character
Roger Pau Monné writes ("Re: [PATCH v12 00/33] osstest: FreeBSD host support"):
> Sorry for the delay, had to cherry-pick some commits from the FreeBSD
> host install series in order for the examine one to work. I've pushed
> this to the following branch:
>
> git://xenbits.xen.org/people/royger/os
Hi,
On 24/10/17 12:00, Julien Grall wrote:
> Hi,
>
> On 23/10/2017 17:01, Andre Przywara wrote:
>> Hi,
>>
>> On 18/10/17 17:32, Bhupinder Thakur wrote:
>>> Hi Andre,
>>>
>>> I verified this patch on qualcomm platform. It is working fine.
>>>
>>> On 18 October 2017 at 19:11, Andre Przywara
>>> wr
On Mon, Oct 23, 2017 at 05:56:33PM +0100, Wei Liu wrote:
> +
> +if test $# -lt 2 ; then
> +echo "Usage: $0 [CMD]"
> +exit 1
> +fi
[...]
> +git rev-list $BASE..$TIP | nl -ba | tac | \
> +while read num rev; do
> +echo "Testing $num $rev"
> +git checkout $rev
> +if test $# -eq 0
On 24/10/17 11:27, George Dunlap wrote:
> On 10/23/2017 06:55 PM, Andrew Cooper wrote:
>> On 23/10/17 17:22, George Dunlap wrote:
>>> On 09/11/2017 06:53 PM, Andrew Cooper wrote:
On 11/09/17 18:01, George Dunlap wrote:
> +### x86/RAM
> +
> +Limit, x86: 16TiB
> +Limit, A
flight 115170 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115170/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-pair broken
test-amd64-i386-pair
On Wed, Oct 04, 2017 at 03:03:49PM +0200, Kevin Wolf wrote:
> Am 02.10.2017 um 21:18 hat Dr. David Alan Gilbert geschrieben:
> > Adding in kwolf; it looks sane to me; Kevin?
> > If I'm reading this right, this is just after the device state save.
>
> Is this actual migration? Because the code loo
Hi all,
> On 24 Oct 2017, at 09:35, Jan Beulich wrote:
>
On 24.10.17 at 04:10, wrote:
>> As you may know, MBA patch set has got enough Reviewed-by/Acked-by in last
>> week.
>> It is ready to be merged.
>>
>> This is a feature for Skylake, Intel has launched Skylake and KVM already
>> su
>>> On 24.10.17 at 14:14, wrote:
> a) Sticking to the rules
> I think in some cases where a few days have been missed, we should have
> enough flexibility to bend the rules.
> In fact, if say a crucial part of PVHv2 missed the deadline by a few days,
> we would probably bend the rules.
For a c
>>> On 24.10.17 at 11:10, wrote:
> This patch renames PSR sysctl/domctl interfaces and related xsm policy to
> make them be general for all resource allocation features but not only
> for CAT. Then, we can resuse the interfaces for all allocation features.
>
> Basically, it changes 'psr_cat_op' t
flight 115172 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115172/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt broken
test-amd64-i386-libvirt-q
Hi Andre,
On 24 October 2017 at 16:57, Andre Przywara wrote:
> Hi,
>
> On 24/10/17 12:00, Julien Grall wrote:
>> Hi,
>>
>> On 23/10/2017 17:01, Andre Przywara wrote:
>>> Hi,
>>>
>>> On 18/10/17 17:32, Bhupinder Thakur wrote:
Hi Andre,
I verified this patch on qualcomm platform. It
Hi,
On 23 October 2017 at 21:31, Andre Przywara wrote:
> Hi,
>
> On 18/10/17 17:32, Bhupinder Thakur wrote:
>> Hi Andre,
>>
>> I verified this patch on qualcomm platform. It is working fine.
>>
>> On 18 October 2017 at 19:11, Andre Przywara wrote:
>>> Instead of asserting the receive interrupt (
flight 115175 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115175/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 114507
build-i386
On 04/10/17 17:58, Josh Poimboeuf wrote:
> Since lguest was removed, only the native version of wbinvd() is used.
> The paravirt interface is no longer needed.
>
> Signed-off-by: Josh Poimboeuf
Reviewed-by: Juergen Gross
Juergen
___
Xen-devel maili
Anthony PERARD writes ("Re: [PATCH v2] scripts: introduce a script for build
test"):
> That feels wrong. How do I run the same exact command at the default
> one, but with -j8 instead of -j4?
.../build-test sh -ec make -j4 distclean && ./configure && make -j4
But I think Anthony has a point. T
On 10/23/2017 07:03 PM, Stefano Stabellini wrote:
> On Tue, 17 Oct 2017, Boris Ostrovsky wrote:
>> On 10/06/2017 08:30 PM, Stefano Stabellini wrote:
>>> + /*
>>> +* Backend only supports 1 inflight accept request, will return
>>> +* errors for the others
>>> +*/
>>> + if (test_and_s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15597 / XSA-236
version 3
pin count / page reference race in grant table code
UPDATES IN VERSION 3
We now once again think that only Xen 4.2 a
On Tue, Sep 12, 2017 at 4:35 PM, Rich Persaud wrote:
>> On Sep 11, 2017, at 13:01, George Dunlap wrote:
>>
>> +### XSM & FLASK
>> +
>> +Status: Experimental
>> +
>> +Compile time disabled
>> +
>> +### XSM & FLASK support for IS_PRIV
>> +
>> +Status: Experimental
>
> In which specific area
On 10/23/2017 07:06 PM, Stefano Stabellini wrote:
> On Tue, 17 Oct 2017, Boris Ostrovsky wrote:
>>> +static unsigned int pvcalls_front_poll_passive(struct file *file,
>>> + struct pvcalls_bedata *bedata,
>>> + struct
Hi Sameer,
On 19/10/17 15:53, Goel, Sameer wrote:
On 10/12/2017 6:45 AM, Julien Grall wrote:
On 21/09/17 01:37, Sameer Goel wrote:
This will be used as a device property to match the DMA capable devices
with the associated SMMU. The header file is a port from linux. The code
was changed to rem
(I just noticed that I missed this patch, sorry)
On 10/06/2017 08:30 PM, Stefano Stabellini wrote:
> Send PVCALLS_RELEASE to the backend and wait for a reply. Take both
> in_mutex and out_mutex to avoid concurrent accesses. Then, free the
> socket.
>
> For passive sockets, check whether we have al
Hi Sameer,
On 19/10/17 16:21, Goel, Sameer wrote:
On 10/12/2017 8:06 AM, Julien Grall wrote:
+
+/* Redefine WARN macros */
+#undef WARN
+#undef WARN_ON
+#define WARN(condition, format...) ({ \
+ int __ret_warn_on = !!(condition); \
+ if (unlikely(__ret_wa
On 10/24/2017 04:10 AM, Juergen Gross wrote:
> Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xen/balloon: don't
> online new memory initially") introduced a regression when booting a
> HVM domain with memory less than mem-max: instead of ballooning down
> immediately the system would try to use
On 24/10/17 16:33, Boris Ostrovsky wrote:
> On 10/24/2017 04:10 AM, Juergen Gross wrote:
>> Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xen/balloon: don't
>> online new memory initially") introduced a regression when booting a
>> HVM domain with memory less than mem-max: instead of ballooning
On 10/24/2017 10:41 AM, Juergen Gross wrote:
> On 24/10/17 16:33, Boris Ostrovsky wrote:
>> On 10/24/2017 04:10 AM, Juergen Gross wrote:
>>> Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xen/balloon: don't
>>> online new memory initially") introduced a regression when booting a
>>> HVM domain w
On 24/10/17 16:56, Boris Ostrovsky wrote:
> On 10/24/2017 10:41 AM, Juergen Gross wrote:
>> On 24/10/17 16:33, Boris Ostrovsky wrote:
>>> On 10/24/2017 04:10 AM, Juergen Gross wrote:
Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xen/balloon: don't
online new memory initially") introdu
Juergen Gross:
> On 24/10/17 16:56, Boris Ostrovsky wrote:
>> On 10/24/2017 10:41 AM, Juergen Gross wrote:
>>> On 24/10/17 16:33, Boris Ostrovsky wrote:
On 10/24/2017 04:10 AM, Juergen Gross wrote:
> Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xen/balloon: don't
> online new memo
On 24/10/17 16:59, HW42 wrote:
> Juergen Gross:
>> On 24/10/17 16:56, Boris Ostrovsky wrote:
>>> On 10/24/2017 10:41 AM, Juergen Gross wrote:
On 24/10/17 16:33, Boris Ostrovsky wrote:
> On 10/24/2017 04:10 AM, Juergen Gross wrote:
>> Commit 96edd61dcf44362d3ef0bed1a5361e0ac7886a63 ("xe
On Fri, Sep 15, 2017 at 3:51 PM, Konrad Rzeszutek Wilk
wrote:
>> +### Soft-reset for PV guests
>
> s/PV/HVM/
Is it? I thought this was for RHEL 5 PV guests to be able to do crash kernels.
>> +### Transcendent Memory
>> +
>> +Status: Experimental
>> +
>> +[XXX Add description]
>
> Guests wit
On 20/10/17 15:11, Jan Beulich wrote:
1: fix GS-base-dirty determination
2: also show FS/GS base addresses when dumping registers
3: avoid FS/GS base reads
Patch 1 is a bug fix which should be strongly considered for 4.10.
Patch 2 has proven helpful in analyzing the original problem, so
would
Hi,
I think this is 4.10 material (particularly patch #5). Juergen, would it
be possible get the some feedback on this series?
Cheers,
On 12/10/17 20:19, Andrew Cooper wrote:
A git tree version is available:
http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/
On Thu, Oct 19, 2017 at 09:15:41AM -0700, Alistair Francis wrote:
> Replace all occurs of __FUNCTION__ except for the check in checkpatch
> with the non GCC specific __func__.
>
> One line in hcd-musb.c was manually tweaked to pass checkpatch.
>
> Signed-off-by: Alistair Francis
> Cc: Gerd Hoffm
Hello Stefano
On Mon, Oct 23, 2017 at 02:26:56PM -0700, Stefano Stabellini wrote:
> > > >This is a lot of a work. It requires changes in generic parts of XEN.
> > > >I fear it will be very hard to upstream such changes, because no one
> > > >sees an immediate value in them. How do you think, what
On Tue, 24 Oct 2017, Boris Ostrovsky wrote:
> On 10/23/2017 07:03 PM, Stefano Stabellini wrote:
> > On Tue, 17 Oct 2017, Boris Ostrovsky wrote:
> >> On 10/06/2017 08:30 PM, Stefano Stabellini wrote:
> >>> + /*
> >>> + * Backend only supports 1 inflight accept request, will return
> >>> + * errors
flight 115187 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115187/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
From: Bhupinder Thakur
With the current SBSA UART emulation, streaming larger amounts of data
(as caused by "find /", for instance) can lead to character loses.
This is due to the OUT ring buffer getting full, because we change the
TX interrupt bit only when the FIFO is actually full, and not alr
Hi,
the SBSA UART emulation as in the staging tree right now has two problems:
- The pl011 earlycon output from a guest is very slow (think: WarGames).
This is due to every character being synchronously handed over to Xen.
This is not very critical (just slow), but it increases boot times
of
From: Bhupinder Thakur
The early console output uses pl011_early_write() to write data. This
function waits for BUSY bit to get cleared before writing the next byte.
In the SBSA UART emulation logic, the BUSY bit was set as soon one
byte was written in the FIFO and it remained set until the FIFO
On Tue, 24 Oct 2017, Boris Ostrovsky wrote:
> (I just noticed that I missed this patch, sorry)
Thanks for the review!
> On 10/06/2017 08:30 PM, Stefano Stabellini wrote:
> > Send PVCALLS_RELEASE to the backend and wait for a reply. Take both
> > in_mutex and out_mutex to avoid concurrent accesse
On Fri, Oct 20, 2017 at 02:38:21PM +0100, Ian Jackson wrote:
> +static bool os_parse_runas_uid_gid(const char *optarg)
> +{
> +unsigned long lv;
> +char *ep;
> +uid_t got_uid;
> +gid_t got_gid;
> +int rc;
> +
> +errno = 0;
> +lv = strtoul(optarg, &ep, 0); /* can't qemu_s
Hi,
On 23/10/17 21:11, Volodymyr Babchuk wrote:
On Mon, Oct 23, 2017 at 05:59:44PM +0100, Julien Grall wrote:
Hi Volodymyr,
Hi Julien,
Let me begin the e-mail with I am not totally adversed to putting the TEE
mediator in Xen. At the moment, I am trying to understand the whole picture.
Than
Hi all,
this series introduces the frontend for the newly introduced PV Calls
procotol.
PV Calls is a paravirtualized protocol that allows the implementation of
a set of POSIX functions in a different domain. The PV Calls frontend
sends POSIX function calls to the backend, which implements them a
Send a PVCALLS_SOCKET command to the backend, use the masked
req_prod_pvt as req_id. This way, req_id is guaranteed to be between 0
and PVCALLS_NR_REQ_PER_RING. We already have a slot in the rsp array
ready for the response, and there cannot be two outstanding responses
with the same req_id.
Wait
Introduce a waitqueue to allow only one outstanding accept command at
any given time and to implement polling on the passive socket. Introduce
a flags field to keep track of in-flight accept and poll commands.
Send PVCALLS_ACCEPT to the backend. Allocate a new active socket. Make
sure that only on
Send data to an active socket by copying data to the "out" ring. Take
the active socket out_mutex so that only one function can access the
ring at any given time.
If not enough room is available on the ring, rather than returning
immediately or sleep-waiting, spin for up to 5000 cycles. This small
Send PVCALLS_CONNECT to the backend. Allocate a new ring and evtchn for
the active socket.
Introduce fields in struct sock_mapping to keep track of active sockets.
Introduce a waitqueue to allow the frontend to wait on data coming from
the backend on the active socket (recvmsg command).
Two mutex
Implement recvmsg by copying data from the "in" ring. If not enough data
is available and the recvmsg call is blocking, then wait on the
inflight_conn_req waitqueue. Take the active socket in_mutex so that
only one function can access the ring at any given time.
Signed-off-by: Stefano Stabellini
Send PVCALLS_RELEASE to the backend and wait for a reply. Take both
in_mutex and out_mutex to avoid concurrent accesses. Then, free the
socket.
For passive sockets, check whether we have already pre-allocated an
active socket for the purpose of being accepted. If so, free that as
well.
Signed-off
Implement the probe function for the pvcalls frontend. Read the
supported versions, max-page-order and function-calls nodes from
xenstore.
Only one frontend<->backend connection is supported at any given time
for a guest. Store the active frontend device to a static pointer.
Introduce a stub func
Also add pvcalls-front to the Makefile.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/Kconfig | 9 +
drivers/xen/Makefile | 1 +
2 files changed, 10 insertions(+)
diff --git a/drivers/xen/Kconfig b/drivers/xen/Kconfig
index 4545561
Introduce a xenbus frontend for the pvcalls protocol, as defined by
https://xenbits.xen.org/docs/unstable/misc/pvcalls.html.
This patch only adds the stubs, the code will be added by the following
patches.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
CC: boris.ostrov...@oracle
Send PVCALLS_BIND to the backend. Introduce a new structure, part of
struct sock_mapping, to store information specific to passive sockets.
Introduce a status field to keep track of the status of the passive
socket.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
CC: boris.ostrov
Send PVCALLS_LISTEN to the backend.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/pvcalls-front.c | 57 +
drivers/xen/pvcalls-front.h | 1 +
2 files changed, 58 inser
For active sockets, check the indexes and use the inflight_conn_req
waitqueue to wait.
For passive sockets if an accept is outstanding
(PVCALLS_FLAG_ACCEPT_INFLIGHT), check if it has been answered by looking
at bedata->rsp[req_id]. If so, return POLLIN. Otherwise use the
inflight_accept_req waitq
Introduce a data structure named pvcalls_bedata. It contains pointers to
the command ring, the event channel, a list of active sockets and a list
of passive sockets. Lists accesses are protected by a spin_lock.
Introduce a waitqueue to allow waiting for a response on commands sent
to the backend.
On Fri, Oct 20, 2017 at 2:44 AM, Yi Zhang wrote:
> On 2017-10-19 at 12:17:12 -0600, Tamas K Lengyel wrote:
>> On Thu, Oct 19, 2017 at 2:11 AM, Zhang Yi wrote:
>> > From: Zhang Yi Z
>> >
>> > Current we only support Sub-page Protection on the 4k
>> > page table.
>> >
>> > Signed-off-by: Zhang Yi
Anthony PERARD writes ("Re: [PATCH v5.1 7/8] os-posix: Provide new -runas
: facility"):
> On Fri, Oct 20, 2017 at 02:38:21PM +0100, Ian Jackson wrote:
> > +static bool os_parse_runas_uid_gid(const char *optarg)
...
> > +errno = 0;
> > +lv = strtoul(optarg, &ep, 0); /* can't qemu_strtoul, w
flight 115174 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115174/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stopfail REGR. vs. 114644
test-amd64-amd64-x
Hi Julien, Jens,
I'm looped in Jens Wiklander. He is one of OP-TEE maintainers. He also
maintains TEE subsytem in Linux kernel. I CC'ed him in 4/4 patch,
because only it concerned OP-TEE. But looks like discussion in this
thread revolves primarily over OP-TEE, so I'm adding him there.
Jens, if yo
On 21/10/17 21:02, Luwei Kang wrote:
> Hi All,
>
> Here is a patch-series which adding Processor Trace enabling in XEN guest.
> You can get It's software developer manuals from:
> https://software.intel.com/sites/default/files/managed/c5/15/architecture-instruction-set-extensions-programming-refer
flight 115192 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115192/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
The EFI multiboot2 entry point currently requires EFI BootServices to
not have been exited however the header currently tells the boot
loader that Xen optionally supports EFI BootServices having been exited.
With this change Xen properly advertises that EFI must not be exited
allowing the boot load
flight 115177 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115177/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 114814
Tests which are faili
On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
> The EFI multiboot2 entry point currently requires EFI BootServices to
> not have been exited however the header currently tells the boot
> loader that Xen optionally supports EFI BootServices having been exited.
> With this change Xe
On 24/10/17 21:08, Daniel Kiper wrote:
> On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
>> The EFI multiboot2 entry point currently requires EFI BootServices to
>> not have been exited however the header currently tells the boot
>> loader that Xen optionally supports EFI BootServic
On 10/24/17 3:08 PM, Daniel Kiper wrote:
> On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
>> The EFI multiboot2 entry point currently requires EFI BootServices to
>> not have been exited however the header currently tells the boot
>> loader that Xen optionally supports EFI BootServ
On 10/24/17 3:08 PM, Daniel Kiper wrote:
> On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
>>
>> Unfortunately the spec is a bit vague and how I am reading it is:
>> - no tag = exit boot services in the boot loader
>> - tag present marked optional = boot loader can or cannot exit bo
On 10/24/17 3:22 PM, Andrew Cooper wrote:
> On 24/10/17 21:08, Daniel Kiper wrote:
>> On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
>>> The EFI multiboot2 entry point currently requires EFI BootServices to
>>> not have been exited however the header currently tells the boot
>>> lo
On Tue, Oct 24, 2017 at 09:22:20PM +0100, Andrew Cooper wrote:
> On 24/10/17 21:08, Daniel Kiper wrote:
> > On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
> >> The EFI multiboot2 entry point currently requires EFI BootServices to
> >> not have been exited however the header current
On Tue, 24 Oct 2017, Volodymyr Babchuk wrote:
> > > > >Approach in this RFC is much simpler. Few hooks in arch code +
> > > > >additional
> > > > >subsystem, which can be easily turned off.
> > > >
> > > > Stefano do you have any opinion on this discussion?
> >
> > We need to start somewhere, an
On 24/10/2017 22:11, Daniel Kiper wrote:
> On Tue, Oct 24, 2017 at 09:22:20PM +0100, Andrew Cooper wrote:
>> On 24/10/17 21:08, Daniel Kiper wrote:
>>> On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
The EFI multiboot2 entry point currently requires EFI BootServices to
not
On Tue, Oct 24, 2017 at 03:28:52PM -0500, Doug Goldstein wrote:
> On 10/24/17 3:08 PM, Daniel Kiper wrote:
> > On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
> >> The EFI multiboot2 entry point currently requires EFI BootServices to
> >> not have been exited however the header curr
flight 115183 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115183/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 114507
build-i386
On Tue, Oct 24, 2017 at 03:49:10PM -0500, Doug Goldstein wrote:
> On 10/24/17 3:22 PM, Andrew Cooper wrote:
> > On 24/10/17 21:08, Daniel Kiper wrote:
> >> On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
> >>> The EFI multiboot2 entry point currently requires EFI BootServices to
> >
On Tue, Oct 24, 2017 at 10:40:26PM +0100, Andrew Cooper wrote:
> On 24/10/2017 22:11, Daniel Kiper wrote:
> > On Tue, Oct 24, 2017 at 09:22:20PM +0100, Andrew Cooper wrote:
> >> On 24/10/17 21:08, Daniel Kiper wrote:
> >>> On Tue, Oct 24, 2017 at 02:40:41PM -0500, Doug Goldstein wrote:
> The E
This call was left during PVHv1 removal (commit 33e5c32559e1 ("x86:
remove PVHv1 code")):
-if ( is_pvh_vcpu(sampling) &&
- !(vpmu_mode & XENPMU_MODE_ALL) &&
+if ( !(vpmu_mode & XENPMU_MODE_ALL) &&
!vpmu->arch_vpmu_ops->do_interrupt(regs) )
ret
On 2017年10月19日 16:47, Roger Pau Monné wrote:
> For all platforms supporting HVM, for PV I don't think it makes sense.
> Since AFAIK ARM guest type is also HVM I would rather introduce this
> field in the hvm_domain structure rather than the generic domain
> structure.
>
This sounds reasonable.
>
On Tue, Oct 24, 2017 at 02:59:00PM +, HW42 wrote:
> I think you really should allow pseudonymous contributions. But in my
> case my nickname is anyway linked to my legal name so fell free to use:
> Simon Gaiser
I personally always have difficulties with pseudos in emails, I think
it's just a
On 10/16/17 11:48 AM, Andrew Cooper wrote:
> On 16/10/17 17:19, Jan Beulich wrote:
> On 16.10.17 at 17:45, wrote:
>
> I've been bitten by this issue several times before, and a fix would be
> nice.
Same here.
>
> IMO, the toolstack should not be making assumptions about the initrd,
> and
flight 115182 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/115182/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop fail REGR. vs. 114682
Tests which did not
On 2017年10月19日 16:40, Roger Pau Monné wrote:
> On Thu, Oct 19, 2017 at 04:09:02PM +0800, Lan Tianyu wrote:
>> On 2017年10月18日 23:12, Roger Pau Monné wrote:
diff --git a/tools/libacpi/libacpi.h b/tools/libacpi/libacpi.h
index a2efd23..fdd6a78 100644
--- a/tools/libacpi/libacpi.h
+
1 - 100 of 103 matches
Mail list logo