flight 36080 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36080/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 3 host-install(3) broken REGR. vs. 35893
Hi Andrew,
From Ian & Stefano, I came to know that you have introduced
Migration framework v2
under below patch series
http://marc.info/?l=xen-devel&m=141036915311145
I have few queries:
1) Is there any plans/timeline to support for ARM32/ARM64?.
2) Also does the Domain Image format specifi
On Tue, Mar 10, 2015 at 5:22 PM, Ian Campbell wrote:
> On Tue, 2015-03-10 at 11:45 +, Julien Grall wrote:
>> On 09/03/15 16:08, Vijay Kilari wrote:
>> > On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall
>> > wrote:
>> >> Hi Vijay,
>> >>
>> >> Given the introduction of the new helper, the title lo
flight 36074 qemu-upstream-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36074/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rhel6hvm-amd 6 leak-check/basis(6) running in 34247
[st=running!]
test-a
Reviewed-by: Julien Grall
Signed-off-by: Edgar E. Iglesias
---
config/arm64.mk| 1 +
xen/drivers/char/Makefile | 1 +
xen/drivers/char/cadence-uart.c| 224 +
xen/include/asm-arm/cadence-uart.h | 55 +
4 files chang
From: "Edgar E. Iglesias"
Reviewed-by: Julien Grall
Signed-off-by: Edgar E. Iglesias
---
docs/misc/arm/early-printk.txt | 1 +
xen/arch/arm/Rules.mk| 6 +
xen/arch/arm/arm64/debug-cadence.inc | 45
3 files changed, 52 insertions(
From: "Edgar E. Iglesias"
Signed-off-by: Edgar E. Iglesias
---
xen/arch/arm/platforms/Makefile| 1 +
xen/arch/arm/platforms/xilinx-zynqmp.c | 41 ++
2 files changed, 42 insertions(+)
create mode 100644 xen/arch/arm/platforms/xilinx-zynqmp.c
diff --git
From: "Edgar E. Iglesias"
Changelog:
v3 -> v4:
* Move the grant table range to a reserved area. (Julien review)
v2 -> v3:
* Fix coding style issues. (Julien review)
v1 -> v2:
* Rebase with upstream/staging to fix the device-tree device matching. (Ian
review)
Edgar E. Iglesias (3):
xen/arm
=
CALL FOR PAPERS
10th Workshop on Virtualization in High-Performance Cloud Computing (VHPC
'15)
held in conjunction with Euro-Par 2015, August 24-28, Vienna, Austria
(Springer LNCS)
===
Hi
Got some progress in loading xen hyp and then sits blank.
Here is the log:
U-Boot SPL 2015.04-rc1 (Mar 10 2015 - 13:35:08)
DRA752 ES1.1
reading args
spl_load_image_fat_os: error reading image args, err - -1
reading u-boot.img
reading u-boot.img
U-Boot 2015.04-rc1 (Mar 10 2015 - 13:35:08)
Hi
Some more progress and then PANIC.. says (XEN) GICv2: Cannot find the
maintenance IRQ
Here is the log:
U-Boot SPL 2015.04-rc1 (Mar 10 2015 - 13:35:08)
DRA752 ES1.1
reading args
spl_load_image_fat_os: error reading image args, err - -1
reading u-boot.img
reading u-boot.img
U-Boot 2015.04-rc
On Wed, Feb 18, 2015 at 11:53:22AM +, David Vrabel wrote:
> On 16/02/15 23:05, Mikko Rapeli wrote:
> > Fixes compilation error:
> >
> > xen/gntalloc.h:22:2: error: unknown type name ‘uint16_t’
> >
> > Signed-off-by: Mikko Rapeli
> > ---
> > include/uapi/xen/gntalloc.h | 6 ++
> > 1 file
On Tue, Mar 10, 2015 at 11:30:10AM +, Julien Grall wrote:
> Hello Edgar,
>
> Thank you for adding support of the ZynqMP.
>
> On 10/03/15 02:49, Edgar E. Iglesias wrote:
> > From: "Edgar E. Iglesias"
> >
> > Adds support for the Cadence UART in Xilinx ZynqMP. The
> > rest of the ZynqMP platf
On 03/10/2015 07:07 PM, Julien Grall wrote:
Hi Daniel,
On 10/03/2015 22:45, Daniel De Graaf wrote:
BTW, do you have any pointer on how to write a policy for device/IRQ
passthrough?
There is a bit of documentation in xsm-flask.txt about device labeling,
which is the hard part of making passthr
Hi Daniel,
On 10/03/2015 22:45, Daniel De Graaf wrote:
BTW, do you have any pointer on how to write a policy for device/IRQ
passthrough?
There is a bit of documentation in xsm-flask.txt about device labeling,
which is the hard part of making passthrough work. Labels can be set
either statical
On 03/10/2015 12:52 PM, Julien Grall wrote:
Hi Daniel,
On 23/02/15 16:25, Daniel De Graaf wrote:
On 02/20/2015 12:17 PM, Ian Campbell wrote:
On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
TODO: Update the commit message
A device node is described by a path. It will be used to retriev
On 10/03/15 16:27, Jan Beulich wrote:
> When a device gets detached from a guest, pciback will clear its
> command register, thus disabling both memory and I/O decoding. The
> disabled memory decoding, however, has an effect on the MSI-X table
> accesses the hypervisor does: These won't have the in
flight 36062 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36062/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 35887
On 10/03/15 16:36, Jan Beulich wrote:
> Use + on outputs instead of = and a matching input. Allow not just
> memory for the _eflags operand (it turns out that recent gcc produces
> worse code when also doing this for _dst.val, so the latter is being
> avoided).
>
> Signed-off-by: Jan Beulich
>
> -
On 10/03/15 16:35, Jan Beulich wrote:
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, Mar 10, 2015 at 04:27:15PM +, Jan Beulich wrote:
> >>> On 10.03.15 at 17:16, wrote:
> > On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
> >> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
> >> > --- a/xen/drivers/passthrough/vtd/iommu.c
> >> > +++ b
flight 36177 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36177/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
This patch adds infrastructure for xen front drivers living in qemu,
so drivers don't need to implement common stuff on their own. It's
mostly xenbus management stuff: some functions to access XenStore,
setting up XenStore watches, callbacks on device discovery and state
changes, and handle event
Signed-off-by: Quan Xu
Signed-off-by: Stefan Berger
---
Makefile | 2 +-
src/post.c | 3 +
src/tpm.c | 309 +
src/tpm.h | 141
4 files changed, 454 insertions(+), 1 deletion(-)
create mode 100644 sr
This patch series are only the SeaBios part to enable stubdom vTPM for HVM
virtual machine. It will work with Qemu patch series and Xen patch series.
*INTRODUCTION*
The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM
functio
Signed-off-by: Quan Xu
---
tools/firmware/hvmloader/acpi/build.c | 7 ---
tools/libxl/libxl_create.c| 5 -
2 files changed, 8 insertions(+), 4 deletions(-)
diff --git a/tools/firmware/hvmloader/acpi/build.c
b/tools/firmware/hvmloader/acpi/build.c
index 1431296..49f6772 10064
Signed-off-by: Quan Xu
---
tools/libxl/libxl_create.c | 11 +--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c
index b1ff5ae..66877b3 100644
--- a/tools/libxl/libxl_create.c
+++ b/tools/libxl/libxl_create.c
@@ -1358,8
--Changes in v4:
-qapi schema enhancement.
-remove no need code.
Signed-off-by: Quan Xu
---
configure| 14 ++
hmp.c| 2 ++
qapi-schema.json | 18 --
qemu-options.hx | 13 +++--
tpm.c| 7 ++-
5 files changed, 49 insertio
make sure QEMU machine class is initialized and QEMU has registered
Xen stubdom vTPM driver when call tpm_init()
Signed-off-by: Quan Xu
---
vl.c | 17 +++--
1 file changed, 11 insertions(+), 6 deletions(-)
diff --git a/vl.c b/vl.c
index f6b3546..0bbdaa1 100644
--- a/vl.c
+++ b/vl.c
This patch series are only the Xen part to enable stubdom vTPM for HVM virtual
machine.
it will work w/ Qemu patch series and seaBios patch series. Change
QEMU_STUBDOM_VTPM compile
option from 'n' to 'y', when the Qemu/SeaBios patch series are merged.
*INTRODUCTION*
*INTRODUCTION*
The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM
functionality to virtual machines (Fedora, Ubuntu, Redhat, Windows .etc). This
allows programs to interact with a TPM in a virtual machine the same way they
interact with a TPM on the physical system. Each virt
This drvier transfers any request/repond between TPM xenstubdoms
driver and Xen vTPM stubdom, and facilitates communications between
Xen vTPM stubdom domain and vTPM xenstubdoms driver. It is a glue for
the TPM xenstubdoms driver and Xen stubdom vTPM domain that provides
the actual TPM functionalit
Signed-off-by: Quan Xu
---
Config.mk | 4
tools/Makefile | 7 +++
2 files changed, 11 insertions(+)
diff --git a/Config.mk b/Config.mk
index a5b6c41..5a5f413 100644
--- a/Config.mk
+++ b/Config.mk
@@ -254,6 +254,10 @@ endif
OVMF_UPSTREAM_REVISION ?= 447d264115c476142f884af0be28762
refactor libxl__device_vtpm_add to call the right helpers
libxl__device_vtpm_add_{pv,hvm}. For HVM virtual machine,
it does not support hot-plug and hot-unplug, as it requires
SeaBios to initalize ACPI and virtual MMIO space for TPM
TIS when virtual machine starts.
Signed-off-by: Quan Xu
---
too
Signed-off-by: Quan Xu
---
extras/mini-os/tpmback.c | 21 -
1 file changed, 16 insertions(+), 5 deletions(-)
diff --git a/extras/mini-os/tpmback.c b/extras/mini-os/tpmback.c
index 8a0a983..b8f4c8f 100644
--- a/extras/mini-os/tpmback.c
+++ b/extras/mini-os/tpmback.c
@@ -732,11
when virtual machine is destroyed.
Signed-off-by: Quan Xu
---
tools/libxl/libxl_device.c | 61 +++---
1 file changed, 57 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/libxl_device.c b/tools/libxl/libxl_device.c
index b1a71fe..668bf71 100644
--- a
Hi Daniel,
On 23/02/15 16:25, Daniel De Graaf wrote:
> On 02/20/2015 12:17 PM, Ian Campbell wrote:
>> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
>>> TODO: Update the commit message
>>>
>>> A device node is described by a path. It will be used to retrieved the
>>> node in the device tre
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -313,17 +313,11 @@ struct operand {
enum { OP_REG, OP_MEM, OP_IMM, OP_NONE } type;
unsigned int bytes;
-/* Up to 128-byte operand value, addressable as ulong or
Hi Gareth,
I think this counts as a -devel question, so I've added -devel and moved
-users to bcc (-users is more for end users). I've done less quote
trimming than usual for the other folks on -devel.
On Tue, 2015-03-10 at 14:15 +, Gareth Stockwell wrote:
> What is the recommended way to tra
1: drop unused "bigval" fields from struct operand
2: simplify asm() constraints
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 10.03.15 at 17:16, wrote:
> On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
>> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
>> > --- a/xen/drivers/passthrough/vtd/iommu.c
>> > +++ b/xen/drivers/passthrough/vtd/iommu.c
>> > @@ -1232,6 +1232,38 @@ static
Rather than disabling and enabling MSI-X once per vector, do it just
once per device.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/msi.c
+++ b/xen/arch/x86/msi.c
@@ -1218,6 +1218,9 @@ int pci_restore_msi_state(struct pci_dev
struct msi_desc *entry, *tmp;
struct irq_desc *desc;
st
As done in Linux by f598282f51 ("PCI: Fix the NIU MSI-X problem in a
better way") and its broken predecessor, make sure we don't access the
MSI-X table without having enabled MSI-X first, using the mask-all flag
instead to prevent interrupts from occurring.
Signed-off-by: Jan Beulich
--- a/xen/a
When a device gets detached from a guest, pciback will clear its
command register, thus disabling both memory and I/O decoding. The
disabled memory decoding, however, has an effect on the MSI-X table
accesses the hypervisor does: These won't have the intended effect
anymore. Even worse, for PCIe de
The problem requiring the first patch here is actually what lead to
XSA-120.
1: be more careful during teardown
2: access MSI-X table only after having enabled MSI-X
3: reduce fiddling with control register during restore
4: cleanup
Signed-off-by: Jan Beulich
__
On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
> > Sent: Monday, March 09, 2015 10:43 PM
> >
> > From: Elena Ufimtseva
> >
> > On some platforms RMRR regions may be not specified
> > in ACPI and thus will not
>>> On 10.03.15 at 12:24, wrote:
> On 10/03/15 07:30, Jan Beulich wrote:
> On 09.03.15 at 19:49, wrote:
>>> On 09/03/15 16:08, Jan Beulich wrote:
Both PV and HVM logic have similar but not similar enough code here.
Synchronize the two so that
- in the HVM case we don't uncondit
flight 36006 xen-4.5-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36006/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-pvh-intel 3 host-install(3) broken pass in 35937
test-amd64-amd64-xl-multivcpu
Hi,
On 23/02/15 15:34, Ian Campbell wrote:
> On Mon, 2015-02-23 at 10:10 +, Julien Grall wrote:
>>
>> On 20/02/2015 17:04, Ian Campbell wrote:
>>> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
Currently, when the device is deassigned from a domain, we directly
reassign
On 10/03/15 02:27, Boris Ostrovsky wrote:
> Signed-off-by: Boris Ostrovsky
> ---
>
> Changes in v4:
> * No buffer allocation in sysctl, copy data device-by-device
> * Replace INVALID_TOPOLOGY_ID with XEN_INVALID_NODE_ID
>
> xen/common/sysctl.c | 59
> +++
On 03/10/2015 10:29 AM, Andrew Cooper wrote:
On 10/03/15 02:27, Boris Ostrovsky wrote:
Instead of copying data for each field in xen_sysctl_topologyinfo separately
put cpu/socket/node into a single structure and do a single copy for each
processor.
Do not use max_cpu_index, which is almost alwa
On 10/03/15 02:27, Boris Ostrovsky wrote:
> Make sysctl NUMA topology query use fewer copies by combining some
> fields into a single structure and copying distances for each node
> in a single copy.
>
> Instead of using max_node_index for passing number of nodes keep this
> value in num_nodes: alm
On 10/03/15 02:27, Boris Ostrovsky wrote:
> Instead of copying data for each field in xen_sysctl_topologyinfo separately
> put cpu/socket/node into a single structure and do a single copy for each
> processor.
>
> Do not use max_cpu_index, which is almost always used for calculating number
> CPUs (
On 23/02/15 16:27, Ian Campbell wrote:
> On Mon, 2015-02-23 at 16:01 +, Julien Grall wrote:
>> Hi Ian,
>>
>> On 23/02/15 15:30, Ian Campbell wrote:
>>> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
>>>
+/* This limit is used by the hypercalls to restrict the size of the path
On 03/10/2015 03:35 AM, Jan Beulich wrote:
On 09.03.15 at 20:02, wrote:
I agree that having the IO page tables on the NUMA node that is closest
to the IOMMU would be beneficial.
And I already withdrew this patch and the corresponding VT-d one.
However, I am not sure at the moment
that this i
On 03/10/2015 07:53 AM, Andrew Cooper wrote:
On 10/03/15 02:27, Boris Ostrovsky wrote:
SLIT values are byte-sized and some of them (0-9 and 255) have
special meaning. Adjust __node_distance() to reflect this and
modify scrub_heap_pages() to deal with __node_distance() returning
an invalid SLIT e
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
> .. and use this new interface to display it along with CPU topology
> and NUMA information when 'xl info -n' command is issued
>
> The output will look like
> ...
> cpu_topology :
> cpu:coresocket node
> 0: 0
>>> On 10.03.15 at 14:39, wrote:
> On 03/10/2015 04:20 AM, Jan Beulich wrote:
> On 10.03.15 at 03:27, wrote:
>>> Changes in v4:
>>> * Split cputopology and NUMA info changes into separate patches
>>> * Added patch#1 (partly because patch#4 needs to know when when distance is
>>> invalid,
>>>
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
> xc_numainfo() is not expected to be used on a hot path and therefore
> hypercall buffer management can be pushed into libxc. This will simplify
> life for callers.
>
> Also update error logging macros.
>
> Signed-off-by: Boris Ostrovsky
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
> xc_cputopoinfo() is not expected to be used on a hot path and therefore
> hypercall buffer management can be pushed into libxc. This will simplify
> life for callers.
>
> Also update error reporting macros.
>
> Signed-off-by: Boris Ostro
On 03/10/2015 04:20 AM, Jan Beulich wrote:
On 10.03.15 at 03:27, wrote:
Changes in v4:
* Split cputopology and NUMA info changes into separate patches
* Added patch#1 (partly because patch#4 needs to know when when distance is
invalid,
i.e. NUMA_NO_DISTANCE)
* Split sysctl version update in
>>> On 10.03.15 at 14:18, wrote:
> On 10/03/15 13:06, Jan Beulich wrote:
> On 10.03.15 at 13:51, wrote:
>>> Hi,
>>>
>>> On 27/02/15 11:33, Roger Pau Monne wrote:
diff --git a/xen/drivers/passthrough/iommu.c
>>> b/xen/drivers/passthrough/iommu.c
index cc12735..7fcbbb1 100644
--
On 03/10/2015 07:40 AM, David Vrabel wrote:
On 09/03/15 14:10, David Vrabel wrote:
Memory hotplug doesn't work with PV guests because:
a) The p2m cannot be expanded to cover the new sections.
Broken by 054954eb051f35e74b75a566a96fe756015352c8 (xen: switch to
linear virtual mapped sparse p2m
On Sun, 2015-03-08 at 21:11 -1000, Justin Weaver wrote:
> Thanks to all for the comments! I've implemented most of the changes
> recommended here in the v2 review. I should have a new patch set ready
> this week (with an updated soft affinity patch as well).
>
Great! :-)
> > Oh, and this is what
I think it is fair to read the PCRs before performing Deep Quote and after
and
to retry if something changed.
It is an interesting suggestion to extend the tpm character device driver
in order
to obtain atomicity. I will think about it.
Thanks for clarifying.
On Mon, Mar 9, 2015 at 7:26 PM, Daniel
On 10/03/15 13:06, Jan Beulich wrote:
On 10.03.15 at 13:51, wrote:
>> Hi,
>>
>> On 27/02/15 11:33, Roger Pau Monne wrote:
>>> diff --git a/xen/drivers/passthrough/iommu.c
>> b/xen/drivers/passthrough/iommu.c
>>> index cc12735..7fcbbb1 100644
>>> --- a/xen/drivers/passthrough/iommu.c
>>> +++
Wei Liu, le Tue 10 Mar 2015 13:14:39 +, a écrit :
> ... because XEN_ROOT is used in mini-os's Config.mk.
>
> Signed-off-by: Wei Liu
Acked-by: Samuel Thibault
> ---
> stubdom/Makefile | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/stubdom/Makefile b/stubdom/Makefile
> index f339
Wei Liu, le Tue 10 Mar 2015 13:14:38 +, a écrit :
> One place was missed when I did the replacement in 55f7cd7427 ("Mini-OS:
> standalone build").
>
> Signed-off-by: Wei Liu
Acked-by: Samuel Thibault
> ---
> Makefile | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git
One place was missed when I did the replacement in 55f7cd7427 ("Mini-OS:
standalone build").
Signed-off-by: Wei Liu
---
Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Makefile b/Makefile
index f16520e..862f766 100644
--- a/Makefile
+++ b/Makefile
@@ -165,7 +165,7 @@
... because XEN_ROOT is used in mini-os's Config.mk.
Signed-off-by: Wei Liu
---
stubdom/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/stubdom/Makefile b/stubdom/Makefile
index f339b20..d9e7e40 100644
--- a/stubdom/Makefile
+++ b/stubdom/Makefile
@@ -1,6 +1,7 @@
XEN_ROOT = $(CURDI
Hi all
Songtao Liu reported some issues with stubdom.
This patch series tights up those loose ends that caused the problem he
saw [0].
I've tested this series myself, but it would be good if Songtao can also
give it a try and confirm it fixes those issues.
Note that the patch marked with mini-o
>>> On 10.03.15 at 13:51, wrote:
> Hi,
>
> On 27/02/15 11:33, Roger Pau Monne wrote:
>> diff --git a/xen/drivers/passthrough/iommu.c
> b/xen/drivers/passthrough/iommu.c
>> index cc12735..7fcbbb1 100644
>> --- a/xen/drivers/passthrough/iommu.c
>> +++ b/xen/drivers/passthrough/iommu.c
>> @@ -332,7
Hi,
On 27/02/15 11:33, Roger Pau Monne wrote:
> diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> index cc12735..7fcbbb1 100644
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct dom
Add the {xen-pvscsi: } prefix in pr_fmt and remove DPRINTK, then
replace all DPRINTK with pr_debug.
Also fixed up some comments just as eliminate redundant whitespace
and format the code.
These will make the code easier to read.
Signed-off-by: Tao Chen
---
drivers/xen/xen-scsiback.c | 75 +
On Tue, Mar 10, 2015 at 06:42:30AM +, Liu, SongtaoX wrote:
> > -Original Message-
> > From: xen-devel-boun...@lists.xen.org
> > [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Ian Campbell
> > Sent: Tuesday, March 03, 2015 1:00 AM
> > To: Wei Liu
> > Cc: Samuel Thibault; Stefano S
flight 35991 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35991/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 35919
build-amd64-rumpu
For the last few weeks Anthony and I have been working on creating a CI
environment to run against all OpenStack jobs. We're now in a position where
we can share the current status, overview of how it works and next steps. We
actively want to support involvement in this effort from others with
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-2151 / XSA-123
version 4
Hypervisor memory corruption due to x86 emulator flaw
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-2150 / XSA-120
version 4
Non-maskable interrupts triggerable by guests
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-124
version 2
Non-standard PCI device functionality may render pass-through insecure
UPDATES IN VERSION 2
Clarify scope. PCI config space backdoors a
On 10/03/15 02:27, Boris Ostrovsky wrote:
> SLIT values are byte-sized and some of them (0-9 and 255) have
> special meaning. Adjust __node_distance() to reflect this and
> modify scrub_heap_pages() to deal with __node_distance() returning
> an invalid SLIT entry.
>
> Signed-off-by: Boris Ostrovsky
On Tue, 2015-03-10 at 11:45 +, Julien Grall wrote:
> On 09/03/15 16:08, Vijay Kilari wrote:
> > On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall
> > wrote:
> >> Hi Vijay,
> >>
> >> Given the introduction of the new helper, the title looks wrong to me.
> >>
> >>
> >> On 09/03/2015 08:59, vijay.kil
Hi Ian,
On 09/03/15 16:06, Ian Campbell wrote:
> On Mon, 2015-03-09 at 14:00 +0200, Julien Grall wrote:
>> Hi Ian,
>>
>> On 05/03/2015 19:00, Ian Campbell wrote:
>>> On Tue, 2015-03-03 at 16:35 +, Julien Grall wrote:
+gicv3_info.nr_lines = min((unsigned)1020, nr_lines);
>>>
>>> "1020U
On 09/03/15 16:08, Vijay Kilari wrote:
> On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall wrote:
>> Hi Vijay,
>>
>> Given the introduction of the new helper, the title looks wrong to me.
>>
>>
>> On 09/03/2015 08:59, vijay.kil...@gmail.com wrote:
>>>
>>> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/m
On 09/03/15 14:10, David Vrabel wrote:
> Memory hotplug doesn't work with PV guests because:
>
> a) The p2m cannot be expanded to cover the new sections.
Broken by 054954eb051f35e74b75a566a96fe756015352c8 (xen: switch to
linear virtual mapped sparse p2m list).
This one would be non-trivial to
Hello Edgar,
On 10/03/15 02:49, Edgar E. Iglesias wrote:
> Signed-off-by: Edgar E. Iglesias
Reviewed-by: Julien Grall
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hello Edgar,
Thank you for adding support of the ZynqMP.
On 10/03/15 02:49, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Adds support for the Cadence UART in Xilinx ZynqMP. The
> rest of the ZynqMP platform is discovered via device-tree.
Did you make sure that the default grant tab
On 10/03/15 07:30, Jan Beulich wrote:
On 09.03.15 at 19:49, wrote:
>> On 09/03/15 16:08, Jan Beulich wrote:
>>> Both PV and HVM logic have similar but not similar enough code here.
>>> Synchronize the two so that
>>> - in the HVM case we don't unconditionally try to access extended
>>> conf
Copy the entire output buffer to the guest because some firmwares update
size on successful calls (contrary to the spec) and the buffer may
contain data beyond the output size that the firmware requires on a
subsequent GetNextVariableName() call (e.g. a NULL character).
Note that this shouldn't ch
On Tue, 10 Mar 2015, Bunny Mintoo wrote:
> Thanks for your mail.
> My architecture is x86 compatible. I have just added new instructions over
> existing x86 ISA.These new instructions are now to be
> taught to the CPU. In QEMU, I was able to mimic the new CPU working with
> software changes (cha
On Tue, 2015-03-10 at 09:01 +, Ian Campbell wrote:
Forgot to say -- this needs some u-boot patches to enable booting in
hypmode. Jan Kiska has picked up the dev work of those, I tested using
v4 from http://lists.denx.de/pipermail/u-boot/2015-February/206557.html
applied on top of u-boot-tegra.
While working with qemu, IGD is a specific device in the case of pass through
so we need to identify that to handle more later. Here we define a table to
record all IGD types currently we can support. Also we need to introduce two
helper functions to get vendor and device ids to lookup that table.
Although we already have 'gfx_passthru' in b_info, this doesn' suffice
after we want to handle IGD specifically. Now we define a new field of
type, gfx_passthru_kind, to indicate we're trying to pass IGD. Actually
this means we can benefit this to support other specific devices just
by extending gf
v2:
* Refine patch #2's head description
* Improve codes quality inside patch #1 based on Wei's comments
* Refill the summary inside patch #0 based on Konrad and Wei's suggestion
When we're working to support IGD GFX passthrough with qemu
upstream, instead of "-gfx_passthru" we'd like to make th
On Mon, 2015-03-09 at 17:54 -0400, Don Slutz wrote:
>
> On 03/09/15 11:40, Ian Campbell wrote:
> > Refactor the $kvp_replace helper in ts-xen-install into a generic
> > helper (which requires using ::EO and ::EI for namespacing) for use
> > with target_editfile and use it to edit /etc/sysctl.conf
On Tue, Mar 10, 2015 at 02:28:16PM +0800, Tiejun Chen wrote:
> Its pointless because internally, libxl__calloc() would always
> terminate program execution if failed,
>
> libxl__calloc()
> |
> + void *ptr = calloc(nmemb, size);
> + if (!ptr) libxl__alloc_failed(CTX, __func__, nmemb, si
There is a lot of hacky and WIP stuff here, including a serial driver
issue (FIFO depth? Interrupts?) which I haven't gotten to the bottom of
yet. But with these hacks and sync_console I can boot on the platform
and run guests etc.
Actually only up to and including patch #7 "HACK: xen: arm: tryin
Messing with the FIFO depths and trigger levels seems to help, as does messing
with the interrupt enable state at various points. The latter might be better
handled via the start/stop_tx hooks which were added a while ago.
Signed-off-by: Ian Campbell
---
xen/drivers/char/ns16550.c | 16 +
As used on the Jetson board.
This platform has a bunch of specific mappings and, more importantly, an
additional interrupt controller (which is used alongside the main GIC and
covers the same interrupts etc, so it is not a secondary or chained interrupt
controller) which dom0 really wants to poke
DO NOT APPLY. Doesn't work without sync_console *and* the changes from "HACK:
xen: arm: trying to figure out ns16550 vs. Tegra issue".
I suspect and IRQ or FIFO depth issue. Linux has a separate serial-tegra driver
so perhaps the device is just not as compatible as I think.
Signed-off-by: Ian Cam
1 - 100 of 114 matches
Mail list logo