From: Tamas K Lengyel [mailto:tamas.leng...@zentific.com]
Sent: Friday, January 30, 2015 5:47 AM
In preparation for allowing for introspecting ARM and PV domains the old
control interface via the hvm_op hypercall is retired. A new control
mechanism
is introduced via the domctl hypercall:
flight 34106 ovmf real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34106/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3865 xen-build fail REGR. vs. 33686
build-amd64
This patch series updates Anthony Perard's original patch series to
bring support for running QEMU upstream as a device model in a
stubdomain by using a Linux-based stubdom, rather than MiniOS as
currently used for QEMU traditional. Anthony posted the original
patch series on April 17, 2013.
The
This patch adds rules to the Makefile to retrieve Linux and build a
minimal kernel for the stubdomain. Using Linux kernel 3.17.8.
In order to work as a stubdomain, two patches are applied to the Linux
kernel source.
Signed-off-by: Eric Shelton eshel...@pobox.com
---
stubdom-linux/.gitignore
To ensure the QEMU instance in a stubdomain is running before we unpause
an HVM guest that relies on it for a device model, we do a xenstore wait
on QEMU's indiction that it is running.
Signed-off-by: Eric Shelton eshel...@pobox.com
---
tools/libxl/libxl_dm.c | 46
This patch adds a Makefile which downloads, patches, and compiles
upstream QEMU for a stubdomain based on a linux kernel.
Signed-off-by: Eric Shelton eshel...@pobox.com
---
stubdom-linux/.gitignore| 3 ++
stubdom-linux/Makefile | 55 +
flight 34129 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34129/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 33866
From: Li, Liang Z
Sent: Wednesday, February 04, 2015 11:28 AM
Flushing cache is needed only when guest has IOMMU device, using
need_iommu(d) can minimize the impact to guest with device assigned,
since a guest may be hot plugged with a device thus there may be dirty
cache lines before
From: Tamas K Lengyel [mailto:tamas.leng...@zentific.com]
Sent: Friday, January 30, 2015 5:47 AM
To avoid growing hvm.c these functions can be stored
separately.
Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com
VMX changes are clearly renaming:
Acked-by: Kevin Tian
Tian, Kevin wrote on 2015-02-04:
From: Li, Liang Z
Sent: Wednesday, February 04, 2015 11:28 AM
Flushing cache is needed only when guest has IOMMU device, using
need_iommu(d) can minimize the impact to guest with device assigned,
since a guest may be hot plugged with a device thus there may
This patch builds a disk image intended to be mounted as rootfs by the
Linux stub domain. It is assembled using dracut and genext2fs.
Signed-off-by: Eric Shelton eshel...@pobox.com
---
stubdom-linux/.gitignore | 4 ++
stubdom-linux/Makefile| 45 +++-
This patch creates an appropriate command line for the QEMU instance
running in a Linux-based stubdomain.
NOTE: a number of items are not currently implemented for Linux-based
stubdomains, such as:
- save/restore
- QMP socket
- graphics output (e.g., VNC)
Signed-off-by: Eric Shelton
This enum gives the ability to select between a MiniOS-based QEMU
traditional stub domain and a Linux-based QEMU upstream stub domain. To
use the Linux-based stubdomain, the following two lines should be
included in the appropriate xl.cfg file:
device_model_version=qemu-xen
From: Zhang, Yang Z
Sent: Wednesday, February 04, 2015 1:54 PM
Tian, Kevin wrote on 2015-02-04:
From: Li, Liang Z
Sent: Wednesday, February 04, 2015 11:28 AM
Flushing cache is needed only when guest has IOMMU device, using
need_iommu(d) can minimize the impact to guest with device
On 01/26/15 20:03, Ard Biesheuvel wrote:
+EFI_STATUS
+XenIoMmioInstall (
+ IN EFI_HANDLE *Handle,
+ IN UINT64 GrantTableAddress
+ );
Sorry I had another (pedantic) remark here -- consider
EFI_PHYSICAL_ADDRESS instead of UINT64. (It looks better and that's
what's in your protocol
Use ticket locks for spin locks instead of the current byte locks.
Ticket locks are fair. This is an important property for hypervisor
locks.
This prototype has the following limitations:
- Only 256 CPUs (8 bit tickets).
- Broken lock profiling.
- x86 only.
Note that spin_lock_irq() and
graft 44 29efad61-815c-4f11-b17d-2c0db93c1...@gmail.com
thanks
Just grafting CFV onto the bug.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 03.02.15 at 12:50, david.vra...@citrix.com wrote:
Use ticket locks for spin locks instead of the current byte locks.
Ticket locks are fair. This is an important property for hypervisor
locks.
Isn't Linux moving to queue locks? Shouldn't we skip the intermediate
step then, not the least
On Tue, 2015-02-03 at 13:40 +, Ian Jackson wrote:
Changes in v5 can be found in individual patch.
See below for output of
./standalone-generate-dump-flight-runvars origin # master
./standalone-generate-dump-flight-runvars xsm # this series applied
diff -ub ../origin xsm |
-Original Message-
From: Wei Liu [mailto:wei.l...@citrix.com]
Sent: 03 February 2015 12:22
To: xen-devel@lists.xen.org
Cc: Wei Liu; Ian Campbell; Ian Jackson; Paul Durrant; Jan Beulich; Andrew
Cooper; Stefano Stabellini
Subject: Stubdom breakage in 4.5
Hi all
I recently found
Wei Liu writes ([PATCH OSSTEST v5 8/9] make-flight: factor out
do_pv_debian_tests):
Pure code motion. No effect on job generation.
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
flight 34091 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34091/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 33774
Tests which did not
On Tue, Feb 03, 2015 at 01:40:55PM +, Ian Jackson wrote:
Wei Liu writes ([PATCH OSSTEST v5 1/9] overlay: update
overlay/etc/grub.d/20_linux_xen):
This file was originally created to work around Debian bug #633127
(/etc/grub/20_linux does not recognise some old Xen kernels).
Wei Liu writes (Re: [PATCH OSSTEST v5 0/9] XSM test case for OSSTest):
On Tue, Feb 03, 2015 at 01:40:05PM +, Ian Jackson wrote:
Can you redo this with | sort after
./standalone-generate-dump-flight-runvars ? That sorts the output by
job which in this case is probably easier to read.
Konrad Rzeszutek Wilk writes ([PATCH 2/4] libxl: vcpuset: Check max_vcpus
argument against the maximum number of vCPUs the guest has set.):
The maximum number of VCPUs the guest can have is determined during
domain creation and is set by 'maxvcpus' parameter (in the guest
config). Trying to
On 03/02/15 13:55, Jan Beulich wrote:
On 03.02.15 at 12:50, david.vra...@citrix.com wrote:
Use ticket locks for spin locks instead of the current byte locks.
Ticket locks are fair. This is an important property for hypervisor
locks.
Isn't Linux moving to queue locks? Shouldn't we skip the
On 02.02.15 at 16:22, dsl...@verizon.com wrote:
Jan Beulich:
The change on what to do when hvm_send_assist_req() fails is bad.
That is correct. Made hvm_has_dm() do full checking so
that the extra VMEXIT and VMENTRY can be skipped.
hvm_complete_assist_req() be a
On 29.01.15 at 22:46, tamas.leng...@zentific.com wrote:
+static int hvm_memory_event_traps(long parameters, mem_event_request_t *req)
It looks like parameters isn't really a signed quantity...
void hvm_memory_event_cr0(unsigned long value, unsigned long old)
{
-
On 29.01.15 at 22:46, tamas.leng...@zentific.com wrote:
-#define XEN_DOMCTL_MEM_EVENT_OP_ACCESS2
+#define XEN_DOMCTL_MEM_EVENT_OP_MONITOR2
While this one looks okay, ...
-#define XEN_DOMCTL_MEM_EVENT_OP_ACCESS_ENABLE 0
-#define
On Tue, 2015-02-03 at 10:36 +, Wei Liu wrote:
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On Tue, 2015-02-03 at 10:36 +, Wei Liu wrote:
Pure code motion. No effect on job generation.
Signed-off-by: Wei Liu wei.l...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
flight 34089 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34089/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 8 guest-startfail REGR. vs. 33480
On Tue, 2015-02-03 at 10:36 +, Wei Liu wrote:
Duplicate Debian PV and HVM test jobs for XSM testing.
If ~/.xen-osstest/config contains e.g. PlatformsArmhf midway cubietruck
arndale (correspodning to the platform-{...} flag being set on some
host) then I think this will generate a per
On Mon, 2015-02-02 at 17:18 +, Wei Liu wrote:
On Mon, Feb 02, 2015 at 03:03:45PM +, Ian Campbell wrote:
On Mon, 2015-02-02 at 15:01 +, Ian Campbell wrote:
On Mon, 2015-02-02 at 12:59 +, Wei Liu wrote:
Provide mini-os url and revision in Config.mk
Introduce
Wei Liu writes (Re: [Xen-devel] [PATCH RFC] libxl: set disk defaults in
remove/destroy functions):
On Mon, Feb 02, 2015 at 06:06:15PM +, Ian Jackson wrote:
Something like this perhaps, yes. Although it seems to have rather
too much similarity with parts of
This job is very similar to build-arch but it doesn't enable ovmf
because it doesn't compile on FreeBSD yet.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
---
mfi-common | 14 ++
1 file changed,
This is needed when bootstrapping FreeBSD, since the installer has ssh
enabled with the root password set to 'root' by default.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
---
Changes since RFC:
- Place
This patch contains a new subroutine that guesses the right make
command to use (gmake on BSDs, make otherwise).
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
---
ts-xen-build | 13 -
1 file
This is done using mfsBSD, which can be booted from pxelinux and
contains a script to automatically install FreeBSD using ZFS on root.
After the install the host is set to boot from the local disk.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc:
Install pkg (the binary package management tool) and the dependencies
needed to build Xen.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
---
Changes since RFC:
- Add the tools necessary in order to build the
This scripts takes care of installing the run-time dependencies, unpacking
the Xen files and setup the right configuration in order to boot a FreeBSD
PVH Dom0.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Konrad Rzeszutek Wilk writes ([PATCH 1/4] libxl: vcpuset: Return error
values.):
The function does not return any values at all. Convert the
internal libxl ones (ERROR_FAIL, ..., etc) to positive values
and for the other cases just return standard libxl values.
This makes no sense to me, I'm
The Makefile uses wildcard to collect a list of files. The resulting
list of files is in directory order, which is random. As a result the
generated html files will differ when build on different hosts.
Use the built-in sort function to get a stable list of files.
Signed-off-by: Olaf Hering
When building hvmloader for Xen tools the ipxe objects are also linked
into the binary. Unfortunately the linker will place them in the order
found in the archive. Since this order is random the resulting hvmloader
binary differs when it was built from identical sources but on different
build
The need for these changes was caught by build-compare, a tool used in
openSUSE buildservice which prevents needless rebuilds and needless
republish of a package.
Olaf
Olaf Hering (3):
docs: create reproducible html
etherboot: [build] sort objects in blib.a
mini-os: sort objects in binary
-Original Message-
From: Ian Campbell
Sent: 03 February 2015 13:48
To: Paul Durrant
Cc: Wei Liu; xen-devel@lists.xen.org; Ian Jackson; Jan Beulich; Andrew
Cooper; Stefano Stabellini
Subject: Re: Stubdom breakage in 4.5
On Tue, 2015-02-03 at 13:42 +, Paul Durrant wrote:
The current Python interface to Xenstore is just a thin binding to the
C libxenstore library. This means that it is architecture-specific and
makes it awkward to use in platform-independent code like the XenServer
guest agent.
The Xenstore protocol is simple and quite straightforward to
At 12:09 + on 03 Feb (1422961751), Lars Kurth wrote:
the patch series for modifications to
http://www.xenproject.org/security-policy.html has gone it's second
revision and is ready for voting. In accordance with our governance,
committers are eligible to vote. Others can of course voice
On Tue, Feb 03, 2015 at 01:41:45PM +, Ian Campbell wrote:
On Tue, 2015-02-03 at 13:40 +, Ian Jackson wrote:
Changes in v5 can be found in individual patch.
See below for output of
./standalone-generate-dump-flight-runvars origin # master
-Original Message-
From: Paul Durrant
Sent: 03 February 2015 14:00
To: Ian Campbell
Cc: Wei Liu; xen-devel@lists.xen.org; Ian Jackson; Jan Beulich; Andrew
Cooper; Stefano Stabellini
Subject: RE: Stubdom breakage in 4.5
-Original Message-
From: Ian Campbell
Sent: 03
On Tue, Feb 03, 2015 at 03:11:11PM +, Ian Jackson wrote:
Konrad Rzeszutek Wilk writes ([PATCH 2/4] libxl: vcpuset: Check max_vcpus
argument against the maximum number of vCPUs the guest has set.):
The maximum number of VCPUs the guest can have is determined during
domain creation and is
On 03.02.15 at 17:06, andrew.coop...@citrix.com wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Ian
On 03.02.15 at 17:02, boris.ostrov...@oracle.com wrote:
On 01/30/2015 09:54 AM, Jan Beulich wrote:
On 05.01.15 at 22:44, boris.ostrov...@oracle.com wrote:
+static int __init vpmu_init(void)
+{
+int vendor = current_cpu_data.x86_vendor;
+
+if ( vpmu_mode == XENPMU_MODE_OFF )
+{
On 29.01.15 at 22:46, tamas.leng...@zentific.com wrote:
--- a/docs/misc/xsm-flask.txt
+++ b/docs/misc/xsm-flask.txt
@@ -87,6 +87,7 @@ __HYPERVISOR_domctl (xen/include/public/domctl.h)
* XEN_DOMCTL_set_machine_address_size
* XEN_DOMCTL_debug_op
* XEN_DOMCTL_gethvmcontext_partial
+ *
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
On 01/30/2015 09:54 AM, Jan Beulich wrote:
On 05.01.15 at 22:44, boris.ostrov...@oracle.com wrote:
--- a/xen/arch/x86/hvm/vpmu.c
+++ b/xen/arch/x86/hvm/vpmu.c
@@ -497,3 +497,39 @@ long do_xenpmu_op(int op,
XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg)
return ret;
}
+
+static int
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
On 03.02.15 at 17:23, andrew.coop...@citrix.com wrote:
On 03/02/15 16:15, Jan Beulich wrote:
On 03.02.15 at 17:02, andrew.coop...@citrix.com wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the
On 29.01.15 at 22:46, tamas.leng...@zentific.com wrote:
--- a/xen/arch/x86/mm/mem_paging.c
+++ b/xen/arch/x86/mm/mem_paging.c
@@ -25,31 +25,29 @@
#include xen/mem_event.h
-int mem_paging_memop(struct domain *d, xen_mem_event_op_t *mec)
+int mem_paging_memop(struct domain *d,
Somehow these timestamps got into the tree a long time ago.
Now they prevent reproducible hvmloader binaries.
Olaf
Olaf Hering (2):
hvmloader: remove timestamp from smbios
hvmloader: remove timestamp from vgabios
tools/firmware/hvmloader/Makefile | 1 -
tools/firmware/hvmloader/smbios.c |
On Tue, 2015-02-03 at 16:06 +, Andrew Cooper wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Stefano Stabellini
On Tue, 2015-02-03 at 16:23 +, Andrew Cooper wrote:
On 03/02/15 16:18, Ian Campbell wrote:
On Tue, 2015-02-03 at 16:06 +, Andrew Cooper wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the
On Tue, 2015-02-03 at 16:17 +, Jan Beulich wrote:
On 03.02.15 at 17:06, andrew.coop...@citrix.com wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable
On 03.02.15 at 17:28, ian.campb...@citrix.com wrote:
On Tue, 2015-02-03 at 16:17 +, Jan Beulich wrote:
On 03.02.15 at 17:06, andrew.coop...@citrix.com wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries.
On Tue, 2015-02-03 at 16:54 +0100, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
AFAICT this is changing the contents of a firmware table which is
exposed to the guest, so the
On 03.02.15 at 17:02, andrew.coop...@citrix.com wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
I agree with the sentiment, but this is not how to
On 03/02/15 16:15, Jan Beulich wrote:
On 03.02.15 at 17:02, andrew.coop...@citrix.com wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
I agree with
On 29.01.15 at 22:46, tamas.leng...@zentific.com wrote:
This is the second patch in the mem_event - vm_event migration.
This patch migrates all previous use-cases of mem_event to use the
new vm_event system.
Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com
Provided this is what it
On 03/02/15 16:18, Ian Campbell wrote:
On Tue, 2015-02-03 at 16:06 +, Andrew Cooper wrote:
On 03/02/15 15:54, Olaf Hering wrote:
Including a timestamp into the binary makes it impossible to get
reproducible binaries. Remove the timestamp because it carries no
valuable info.
On 29.01.15 at 22:46, tamas.leng...@zentific.com wrote:
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -750,15 +750,15 @@ struct xen_domctl_gdbsx_domstatus {
};
/*
- * Memory event operations
+ * VM event operations
*/
-/* XEN_DOMCTL_mem_event_op */
+/*
On Mon, Feb 02, 2015 at 09:28:49AM +, Jan Beulich wrote:
On 30.01.15 at 18:54, daniel.ki...@oracle.com wrote:
- xen.efi build will not so strongly depend
on a given GCC and binutils version.
While I can see the possibility of making the binutils version
dependency go away (by
On 02/03/15 12:45, Laszlo Ersek wrote:
comments below
On 01/26/15 20:03, Ard Biesheuvel wrote:
+EFI_STATUS
+XenIoMmioInstall (
+ IN EFI_HANDLE *Handle,
+ IN UINT64 GrantTableAddress
+ )
+{
+ EFI_STATUS Status;
+ XENIO_PROTOCOL *XenIo;
On 03/02/15 00:42, Ronald PIna wrote:
Hi
I am working for the msc thesis to improve the performance on network
for guest domains that uses real-time services like voip or video
streaming servers , i have an idea to implement a network scheduler on
network backend, the schedulers may be
Hi all
I recently found out that stubdom in 4.5 is broken.
A proper fix to that issue is likely to alter the start up protocol,
which is not acceptable for backport.
Providing a backport that doesn't alter the protocol used to start up
stubdom is difficult.
Paul, do you have any insight how we
Hi Ian,
On 02/02/15 17:38, Ian Campbell wrote:
On Mon, 2015-02-02 at 17:05 +, Julien Grall wrote:
On 02/02/15 16:47, Ian Campbell wrote:
On Mon, 2015-02-02 at 16:33 +, Julien Grall wrote:
Hi Ian,
On 02/02/15 15:59, Ian Campbell wrote:
On Thu, 2015-01-29 at 18:25 +, Julien Grall
On Tue, 2015-02-03 at 13:10 +, Wei Liu wrote:
Starting from rump kernel changeset 91d5623 (Renaming platform macros,
app-tools and autoconf target string), __RUMPUSER_XEN__ and __RUMPAPP__
are deleted. We are supposed to use __RUMPRUN__ instead.
How much do we care about forward/backwards
Lars Kurth writes (Formal Vote for changes to Xen Project Security Policy
encoded in [PATCH v2 SECURITY-POLICY */9] (vote ends next Wed, Feb 11th)):
Hi all,
the patch series for modifications to
http://www.xenproject.org/security-policy.html has gone it's second revision
and is ready for
On 03.02.15 at 12:45, o...@aepfle.de wrote:
--- a/extras/mini-os/Makefile
+++ b/extras/mini-os/Makefile
@@ -148,9 +148,9 @@ arch_lib:
ifeq ($(CONFIG_LWIP),y)
# lwIP library
-LWC := $(shell find $(LWIPDIR)/src -type f -name '*.c')
+LWC := $(sort $(shell find $(LWIPDIR)/src -type f
Euan Harris writes (Re: Cancelling asynchronous operations in libxl):
Sorry, I didn't think you were waiting for a reply. Your explanation
does answer my questions, thanks.
Oh, good, thanks.
I think that the current proposed behaviour will suit us fine. We will
probably treat the OK and
On Tue, Feb 03, 2015 at 12:08:03PM +, Ian Campbell wrote:
On Tue, 2015-02-03 at 12:06 +, Wei Liu wrote:
On Tue, Feb 03, 2015 at 11:22:44AM +, Ian Campbell wrote:
On Tue, 2015-02-03 at 10:36 +, Wei Liu wrote:
Duplicate Debian PV and HVM test jobs for XSM testing.
If
On Tue, Feb 03, Ian Campbell wrote:
Would a helper macro so we can just write
$(call wildcard,arg arg arg)
instead of
$(sort $(wildcard arg arg arg))
be possible and/or useful?
Just for the or three two places its likely overkill.
Olaf
On Tue, Feb 03, Olaf Hering wrote:
+++ b/extras/mini-os/Makefile
-LWO := $(patsubst %.c,%.o,$(LWC))
+LWO := $(patsubst %.c,%.o,$(LWC)
Somehow this brace disappeared. Should I resend or can this be adjusted
when the patch gets merged?
Olaf
___
Wei Liu writes ([PATCH OSSTEST v5 0/9] XSM test case for OSSTest):
This patch series attempts to duplicate some Debian test cases for XSM. This
is version 5 of this series, rebased on top of OSSTest pretest branch.
Tests duplicated for xen-unstable branch:
build-{i386,amd64,armhf}-xsm
Wei Liu writes ([PATCH OSSTEST v5 1/9] overlay: update
overlay/etc/grub.d/20_linux_xen):
This file was originally created to work around Debian bug #633127
(/etc/grub/20_linux does not recognise some old Xen kernels).
According to Debian bug tracker [0], #633127 bug is fixed in Wheezy. As
On Tue, 2015-02-03 at 12:09 +, Lars Kurth wrote:
the patch series for modifications to
http://www.xenproject.org/security-policy.html has gone it's second
revision and is ready for voting. In accordance with our governance,
committers are eligible to vote. Others can of course voice their
On Tue, Feb 03, 2015 at 11:22:44AM +, Ian Campbell wrote:
On Tue, 2015-02-03 at 10:36 +, Wei Liu wrote:
Duplicate Debian PV and HVM test jobs for XSM testing.
If ~/.xen-osstest/config contains e.g. PlatformsArmhf midway cubietruck
arndale (correspodning to the platform-{...} flag
Hi all,
the patch series for modifications to
http://www.xenproject.org/security-policy.html has gone it's second revision
and is ready for voting. In accordance with our governance, committers are
eligible to vote. Others can of course voice their opinion.
The complete series can be found in
On Tue, 2015-02-03 at 12:12 +, Wei Liu wrote:
So
if [ x$xsm = xtrue -a x$platform != x ] ; then
AIUI, yes.
(because you know $xsm and $platform cannot possibly contain spaces)
___
Xen-devel mailing list
Xen-devel@lists.xen.org
Hello Vijay,
On 03/02/15 06:47, Vijay Kilari wrote:
On Thu, Jan 29, 2015 at 11:55 PM, Julien Grall julien.gr...@linaro.org
wrote:
@@ -909,8 +911,15 @@ static int gicv_v3_init(struct domain *d)
for ( i = 0; i gicv3.rdist_count; i++ )
{
+paddr_t size =
Wei Liu writes ([PATCH OSSTEST v5 7/9] ts-xen-install: install Xen with XSM
support if requested):
Signed-off-by: Wei Liu wei.l...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
...
+my $enable_xsm = $r{enable_xsm} =~ m/true/ ? 1 : 0;
+
my %distpath;
sub packages () {
@@
On 3 February 2015 at 12:14, Laszlo Ersek ler...@redhat.com wrote:
On 01/26/15 20:03, Ard Biesheuvel wrote:
This adds the .dsc and .fdf descriptions to build a UEFI image that
is bootable by a Xen guest on 64-bit ARM (AArch64)
Contributed-under: TianoCore Contribution Agreement 1.0
On 02/02/15 16:05, Ian Campbell wrote:
On Thu, 2015-01-29 at 18:25 +, Julien Grall wrote:
The current VGIC code doesn't support to change the pending and active status
of an IRQ via the (re-)distributor.
If we plan to support it in the future, it will unlikely require a specific
bitfield
On Tue, 2015-02-03 at 13:13 +, Julien Grall wrote:
My point was, we have to trust a bit the device tree given by the
platform. If the device tree is buggy, then bare-metal linux will
unlikely boot.
I think overlapping or not correctly size aligned, assuming such goes
against the binding ==
Wei Liu writes ([PATCH OSSTEST v5 3/9] ts-xen-build: build with XSM support if
requested):
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
On Tue, 2015-02-03 at 13:48 +, Ian Jackson wrote:
Wei Liu writes ([PATCH OSSTEST v5 4/9] mfi-common: create build-$arch-xsm
job):
Signed-off-by: Wei Liu wei.l...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
Changes in v4:
1. Use true and false instead of y and n.
On Tue, Feb 03, 2015 at 01:48:30PM +, Ian Jackson wrote:
Wei Liu writes ([PATCH OSSTEST v5 4/9] mfi-common: create build-$arch-xsm
job):
Signed-off-by: Wei Liu wei.l...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
Changes in v4:
1. Use true and false instead of y
Hi all,
quick reminder that the vote closes today. All committers but Ian Jackson and
Keir Fraser have voted in favour. Unless there are objections by tomorrow the
vote carries
Regards
Lars
On 29 Jan 2015, at 12:16, Konrad Rzeszutek Wilk konrad.w...@oracle.com wrote:
On Jan 29, 2015 6:09
On Tue, 2015-02-03 at 12:06 +, Wei Liu wrote:
On Tue, Feb 03, 2015 at 11:22:44AM +, Ian Campbell wrote:
On Tue, 2015-02-03 at 10:36 +, Wei Liu wrote:
Duplicate Debian PV and HVM test jobs for XSM testing.
If ~/.xen-osstest/config contains e.g. PlatformsArmhf midway
On 3 February 2015 at 11:55, Laszlo Ersek ler...@redhat.com wrote:
On 02/03/15 12:45, Laszlo Ersek wrote:
comments below
On 01/26/15 20:03, Ard Biesheuvel wrote:
+EFI_STATUS
+XenIoMmioInstall (
+ IN EFI_HANDLE *Handle,
+ IN UINT64 GrantTableAddress
+ )
+{
+ EFI_STATUS
1 - 100 of 166 matches
Mail list logo