>>> On 21.04.16 at 02:31, wrote:
>> >--- a/xen/common/xsplice.c
>> >+++ b/xen/common/xsplice.c
>> >@@ -533,6 +533,39 @@ static int prepare_payload(struct payload *payload,
>> >}
>> >
>> >#ifndef CONFIG_ARM
>> >+sec = xsplice_elf_sec_by_name(elf, ".altinstructions");
>> >+if ( sec )
>>> On 21.04.16 at 02:30, wrote:
> On Wed, Apr 20, 2016 at 12:28:02AM -0600, Jan Beulich wrote:
>> >>> Konrad Rzeszutek Wilk 04/14/16 12:02 AM >>>
>> >--- a/xen/arch/x86/Makefile
>> >+++ b/xen/arch/x86/Makefile
>> >@@ -6,7 +6,11 @@ subdir-y += mm
>> >subdir-$(CONFIG_XENOPROF) += oprofile
>> >su
>>> On 21.04.16 at 02:29, wrote:
> On Tue, Apr 19, 2016 at 02:17:35PM -0600, Jan Beulich wrote:
>> >>> Konrad Rzeszutek Wilk 04/14/16 12:02 AM >>>
>> >+bool_t is_patch(const void *ptr)
>> >+{
>> >+struct payload *data;
>>
>> You guess it: const.
>>
>> >+/*
>> >+ * No locking since t
>>> On 21.04.16 at 02:26, wrote:
>> >+unsigned long xsplice_symbols_lookup_by_name(const char *symname)
>> >+{
>> >+struct payload *data;
>>
>> Do you need symbols other than those marked "new_symbol" past the loading
>> of the module? If not, wouldn't it be worthwhile to shrink the symbol ta
>>> On 21.04.16 at 02:28, wrote:
>> >+ASSERT(sec);
>> >+if ( sec->sec->sh_size % sizeof(*payload->funcs) )
>> >+{
>> >+dprintk(XENLOG_ERR, XSPLICE "%s: Wrong size of .xsplice.funcs!\n",
>> >+elf->name);
>> >+return -EINVAL;
>> >+}
>> >+
>> >+payl
>>> On 20.04.16 at 19:36, wrote:
> On Apr 20, 2016 6:05 PM, "Jan Beulich" wrote:
>>
>> >>> Konrad Rzeszutek Wilk 04/20/16 6:00 PM >>>
>> >> >+ size_t pages; /* Total pages for [text,rw,ro]_addr */
>> >>
>> >> Why size_t and not just unsigned int?
>> >
>> >Oh. I was somehow under the impression y
Huge pages are not normally available to PV guests. Not suppressing
hugetlbfs use results in an endless loop of page faults when user mode
code tries to access a hugetlbfs mapped area (since the hypervisor
denies such PTEs to be created, but error indications can't be
propagated out of xen_set_pte_
>>> On 30.03.16 at 09:28, wrote:
> 2016-03-29 18:39 GMT+08:00 Jan Beulich :
>> Forwarding entire batches to the device model when an individual
>> iteration of them got rejected by internal device emulation handlers
>> with X86EMUL_UNHANDLEABLE is wrong: The device model would then handle
>> all i
Xen needs to blacklist any PSCI node as it will be recreated for DOM0.
Up to now, this was done only for arm,psci and arm,psci-0.2 compatible
nodes. Add PSCI 1.0 compatibility to make device tree nodes with
compatible = "arm,psci-1.0";
blacklisted, too
Signed-off-by: Dirk Behme
---
xen/arch/ar
On 04/12/16 16:45, Haozhong Zhang wrote:
> On 04/08/16 09:52, Jan Beulich wrote:
> > >>> On 08.04.16 at 07:02, wrote:
> > > On 03/29/16 04:49, Jan Beulich wrote:
> > >> >>> On 29.03.16 at 12:10, wrote:
> > >> > On 03/29/16 03:11, Jan Beulich wrote:
> > >> >> >>> On 29.03.16 at 10:47, wrote:
> >
On 04/21/16 03:39, Tamas K Lengyel wrote:
> Without specifying the altp2m flag on the response the view never got
> switched.
> Also, add extra information printouts that can be useful during debugging.
>
> Signed-off-by: Tamas K Lengyel
> ---
> Cc: Razvan Cojocaru
> Cc: Ian Jackson
> Cc: Wei
flight 92167 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92167/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 3 host-install(3) broken REGR. vs.
92071
test-armhf-armh
flight 92180 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92180/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 3 host-install(3) broken REGR. vs. 878
Hi Julien,
On Wed, Apr 20, 2016 at 03:44:09PM +0100, Julien Grall wrote:
>Hello Peng,
>
>On 20/04/16 14:54, Peng Fan wrote:
>>Use shift operator, but not muliplication.
>>No function change.
>
>Why? The compiler will calculate the address at compilation time.
Yeah. The compiler will do this. I ju
Without specifying the altp2m flag on the response the view never got switched.
Also, add extra information printouts that can be useful during debugging.
Signed-off-by: Tamas K Lengyel
---
Cc: Razvan Cojocaru
Cc: Ian Jackson
Cc: Wei Liu
---
tools/tests/xen-access/xen-access.c | 10 ++
flight 92143 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92143/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds15 guest-start/debian.repeat fail blocked in 91350
test-armhf-armhf-xl-xsm 15
On Wed, Apr 20, 2016 at 01:14:17AM -0600, Jan Beulich wrote:
> >>> Konrad Rzeszutek Wilk 04/14/16 12:03 AM >>>
> >--- a/Config.mk
> >+++ b/Config.mk
> >@@ -126,6 +126,17 @@ endef
> >check-$(gcc) = $(call cc-ver-check,CC,0x040100,"Xen requires at least
> gcc-4.1")
> >$(eval $(check-y))
> >
> >+
> >--- a/xen/common/xsplice.c
> >+++ b/xen/common/xsplice.c
> >@@ -533,6 +533,39 @@ static int prepare_payload(struct payload *payload,
> >}
> >
> >#ifndef CONFIG_ARM
> >+sec = xsplice_elf_sec_by_name(elf, ".altinstructions");
> >+if ( sec )
> >+{
> >+struct alt_instr *a,
On Wed, Apr 20, 2016 at 12:28:02AM -0600, Jan Beulich wrote:
> >>> Konrad Rzeszutek Wilk 04/14/16 12:02 AM >>>
> >--- a/xen/arch/x86/Makefile
> >+++ b/xen/arch/x86/Makefile
> >@@ -6,7 +6,11 @@ subdir-y += mm
> >subdir-$(CONFIG_XENOPROF) += oprofile
> >subdir-y += x86_64
> >
> >+ifdef CONFIG_XSP
On Tue, Apr 19, 2016 at 02:17:35PM -0600, Jan Beulich wrote:
> >>> Konrad Rzeszutek Wilk 04/14/16 12:02 AM >>>
> >+bool_t is_patch(const void *ptr)
> >+{
> >+struct payload *data;
>
> You guess it: const.
>
> >+/*
> >+ * No locking since this list is only ever changed during apply or
> >+static int prepare_payload(struct payload *payload,
> >+ struct xsplice_elf *elf)
> >+{
> >+const struct xsplice_elf_sec *sec;
> >+unsigned int i;
> >+struct xsplice_patch_func_internal *f;
>
> Why is there a second ("internal") variant of this structure n
> >+unsigned long xsplice_symbols_lookup_by_name(const char *symname)
> >+{
> >+struct payload *data;
>
> Do you need symbols other than those marked "new_symbol" past the loading
> of the module? If not, wouldn't it be worthwhile to shrink the symbol table
> to just
> those, likely speeding
flight 92168 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92168/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-i386-xl-qemuu-ovm
flight 92192 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92192/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
flight 92141 linux-3.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92141/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-raw3 host-install(3) broken REGR. vs. 91148
R
On Wed, Apr 20, Paulina Szubarczyk wrote:
> In accordance with CODING_SYTLE:
> - Use 'r' for return values to functions whose return values are a
>different error space (like xc_tmem_control, xc_tmem_auth)
>
> libxc functions are supposed to, on failure, set errno and alwas return -1
> whic
On Wed, Apr 20, Paulina Szubarczyk wrote:
> libxl_set_memory_target seems to have the following return values:
>
> * 1 on failure, if the failure happens because of a xenstore error *or*
> * invalid target
>
> * -1 if the setmaxmem hypercall
>
> * -errno if the set_pod_target hypercall target f
On Wed, Apr 20, Paulina Szubarczyk wrote:
> - Use EXIT_{SUCCESS,FAILURE} for main_cd*() function
> - Use 0/1 as return values of cd_insert function
>
> Signed-off-by: Paulina Szubarczyk
> Acked-by: Roger Pau Monné
Reviewed-by: Olaf Hering
___
Xe
On Wed, Apr 20, Paulina Szubarczyk wrote:
> *libxl__device_from_pcidev() initialize the values of libxl__device
> struct and can be void.
> -static int libxl__device_from_pcidev(libxl__gc *gc, uint32_t domid,
> +static void libxl__device_from_pcidev(libxl__gc *gc, uint32_t domid,
>
On Wed, Apr 20, Paulina Szubarczyk wrote:
> @@ -398,34 +398,34 @@ libxl_device_pci
> *libxl_device_pci_assignable_list(libxl_ctx *ctx, int *num)
> dir = opendir(SYSFS_PCIBACK_DRIVER);
> +while((de = readdir(dir))) {
> -closedir(dir);
This change seems to leak 'dir' in success case
flight 92184 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92184/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
On Apr 20, 2016 12:34, "Dario Faggioli" wrote:
>
> On Wed, 2016-04-20 at 10:25 -0600, Tamas K Lengyel wrote:
> >
> >
> > On Wed, Apr 20, 2016 at 7:24 AM, Wei Liu wrote:
> > > On Tue, Apr 19, 2016 at 07:07:01AM -0400, Maryam Masoudian wrote:
> > > > Thanks.
> > > > One more thing, is it possible t
On Wed, 2016-04-20 at 10:25 -0600, Tamas K Lengyel wrote:
>
>
> On Wed, Apr 20, 2016 at 7:24 AM, Wei Liu wrote:
> > On Tue, Apr 19, 2016 at 07:07:01AM -0400, Maryam Masoudian wrote:
> > > Thanks.
> > > One more thing, is it possible to see the percentage of shared
> > memory among
> > > VMs by x
flight 92139 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92139/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR.
vs. 91757
Regressions
Toolstack session
=
Topics:
- Build system
- Stubdom
- Testing
- {o/c}xenstored
Wei: what downstream consumers expect from the build system. Xen has a top
level makefile that builds everything, by pulling other projects source
code. Trying to make it cleaner.
George: someo
On Wed, Apr 20, 2016 at 03:02:25PM +0100, Wei Liu wrote:
> On Tue, Apr 12, 2016 at 03:03:15PM +0100, Wei Liu wrote:
> > On Mon, Apr 11, 2016 at 03:04:09PM +0200, Juergen Gross wrote:
> > > Document the interface between qemu and libxl regarding backends
> > > supported by qemu.
> > >
> > > Signed-
On Wed, Apr 20, 2016 at 04:12:59PM +0100, Wei Liu wrote:
> On Wed, Apr 20, 2016 at 10:16:35AM -0400, Zhigang Wang wrote:
> > xentop will segmentation fault in this case:
> >
> > # ip link set eth1 down
> > # ip link set eth1 name ETH
> > # xentop
> >
> > This patch will let xentop to handle
flight 92171 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92171/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
On Apr 20, 2016 6:05 PM, "Jan Beulich" wrote:
>
> >>> Konrad Rzeszutek Wilk 04/20/16 6:00 PM >>>
> >> >+ size_t pages; /* Total pages for [text,rw,ro]_addr */
> >>
> >> Why size_t and not just unsigned int?
> >
> >Oh. I was somehow under the impression you liked size_t more than
> >unsignged int!
* HVMlite domu support, some emulation in hypervisor, some modes to consider:
| lapic | ioapic | pit | pic | hpet | pm timer | rtc | comments |
|---++-+-+--+--+-+--|
| n | n | n | n | n| n| n |0 |
| y | n | n
* Auto generate device handling routines
Libxl has a lot of PV drivers. And the number is increasing at the moment.
GlobalLogic has some customised drivers. The code plumbing is painful.
Libxl already has IDL to describe the device interface and uses
scripts to generate a lot of files.
Propose
* Background
Jon: XenServer has had plugin storage architecture / model for some
time. Try to invent new plugin model to not deeply embedded in
XenServer. It needs to work on standard Xen installation. Early in
the process, need to define APIs. Look into integrate with libxl.
* Data path plugi
* Signature verification
Code bloat to verify all sort of sigs. Limit to two types of sigs
Verify in hypervisor seems to be the only way.
What extra security provides? It ensure binaries you get is from the
vendor.
Can do in userspace in Dom0? Questionable, even Linux doesn't trust
modul
Data path and tapdisk 3
* Stop using block protocol for Windows, status of pvscsi
Windows 8 (10?) scsi only -- PV driver fakes a scsi device and
translates.
Propose to use pvscsi in the data path.
Juergen: pvscsi is on track, no script provided in tree. but there is
script available. planning t
On 20/04/16 17:42, John McDermott wrote:
> Xen Developers,
>
> Would there be any interest in replacing some of the
> context-sensitive macros in x86_emulate.c, to make it more
> maintainable?
>
> I work on the Xenon project, which researches ways to transform
> Xen into a higher-security hyperviso
flight 92125 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92125/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
test-amd64-amd64-xl-c
>>> Roger Pau Monné 04/20/16 4:51 PM >>>
>On Sun, Apr 17, 2016 at 02:03:28PM -0600, Jan Beulich wrote:
>> >>> Roger Pau Monne 04/15/16 8:27 PM >>>
>> >@@ -50,8 +49,10 @@ DESTDIR ?= /
>> >clang ?= n
>> >ifeq ($(clang),n)
>> >gcc := y
>> >+HOSTCC = gcc
>> >else
>> >gcc := n
>> >+HOSTCC = c
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 20 April 2016 18:07
> To: Paul Durrant; Jan Beulich; Wei Liu; yu.c.zh...@linux.intel.com
> Cc: Kevin Tian; Keir (Xen.org); Andrew Cooper; Tim (Xen.org); xen-
> de...@lists.xen.org; zhiyuan...@intel.com; jun
On Wed, Apr 20, 2016 at 5:52 PM, Jan Beulich wrote:
>>If it's the case that the only code that uses this is in XenServer,
>>then I'd say the answer to #1 can be simply, "Don't compile" and
>>"Don't do that" respectively; and the answer to #2 can be either
>>"Leave it be" or "Remove the enum from t
On 20/04/16 17:58, Paul Durrant wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
>> Beulich
>> Sent: 20 April 2016 17:53
>> To: George Dunlap; Paul Durrant; Wei Liu; yu.c.zh...@linux.intel.com
>> Cc: Kevin Tian; Keir (Xen.org); Andrew
>>> Konrad Rzeszutek Wilk 04/20/16 6:10 PM >>>
>> >+.PHONY: xsplice
>> >+xsplice: config.h
>> >+ # Need to have these done in sequential order
>> >+ $(MAKE) -f $(BASEDIR)/Rules.mk xen_hello_world_func.o
>> >+ $(MAKE) -f $(BASEDIR)/Rules.mk xen_hello_world.o
>>
>> Why do these two need doing
>>> Konrad Rzeszutek Wilk 04/20/16 6:00 PM >>>
>> >+ size_t pages; /* Total pages for [text,rw,ro]_addr */
>>
>> Why size_t and not just unsigned int?
>
>Oh. I was somehow under the impression you liked size_t more than
>unsignged int! I will change it over.
When used where actually talking abou
On Wed, Apr 20, 2016 at 5:30 PM, Paul Durrant wrote:
>> In any case, is it really not the case that the devicemodels on the
>> far side have to re-register which IO ranges they're interested in?
>> Shouldn't the devicemodel on the far side re-register the pfns it
>> wants to watch as well? That a
>>> Konrad Rzeszutek Wilk 04/20/16 6:09 PM >>>
>On Mon, Apr 18, 2016 at 12:23:26AM -0600, Jan Beulich wrote:
>> >>> Konrad Rzeszutek Wilk 04/18/16 7:55 AM >>>
>> >> >+ if ( delta > elf->len )
>> >> >+ {
>> >> >+ dprintk(XENLOG_ERR, XSPLICE "%s: Section table is past end of
>> >> >payload!\n",
>>
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
> Beulich
> Sent: 20 April 2016 17:53
> To: George Dunlap; Paul Durrant; Wei Liu; yu.c.zh...@linux.intel.com
> Cc: Kevin Tian; Keir (Xen.org); Andrew Cooper; Tim (Xen.org); xen-
> de...@lists.xe
>>> George Dunlap 04/20/16 6:30 PM >>>
>On Wed, Apr 20, 2016 at 4:02 PM, George Dunlap
>wrote:
>> On 19/04/16 12:02, Yu, Zhang wrote:
>>> So I suppose the only place we need change for this patch is
>>> for hvmmem_type_t, which should be defined like this?
>>>
>>> typedef enum {
>>> HVMMEM_r
>>> Julien Grall 04/20/16 2:35 PM >>>
>It is a matter of taste.
Indeed.
> Is there any reason to not allow different way to create a mask?
I dislike it, but not so much to stand in the way to get it in. I.e. I'm not
going
to NAK it, but I'm also not currently planning to ACK it.
Jan
___
Xen Developers,
Would there be any interest in replacing some of the
context-sensitive macros in x86_emulate.c, to make it more
maintainable?
I work on the Xenon project, which researches ways to transform
Xen into a higher-security hypervisor. One of the things we do is
modify Xen code to make i
On Wed, Apr 20, 2016 at 4:02 PM, George Dunlap wrote:
> On 19/04/16 12:02, Yu, Zhang wrote:
>>
>>
>> On 4/19/2016 12:58 AM, Paul Durrant wrote:
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
Jan
Beulich
Sent: 18 April 2016
> -Original Message-
> From: George Dunlap
> Sent: 20 April 2016 16:38
> To: Paul Durrant
> Cc: Yu, Zhang; Kevin Tian; jun.nakaj...@intel.com; Andrew Cooper; Tim
> (Xen.org); xen-devel@lists.xen.org; Lv, Zhiyuan; Jan Beulich
> Subject: Re: [Xen-devel] [PATCH v2 3/3] x86/ioreq server: Add HV
On Wed, Apr 20, 2016 at 7:24 AM, Wei Liu wrote:
> On Tue, Apr 19, 2016 at 07:07:01AM -0400, Maryam Masoudian wrote:
> > Thanks.
> > One more thing, is it possible to see the percentage of shared memory
> among
> > VMs by xl tool?
> > As there is a xl sharing and I want to know whether this provid
> >+.PHONY: xsplice
> >+xsplice: config.h
> >+# Need to have these done in sequential order
> >+$(MAKE) -f $(BASEDIR)/Rules.mk xen_hello_world_func.o
> >+$(MAKE) -f $(BASEDIR)/Rules.mk xen_hello_world.o
>
> Why do these two need doing in order? And why can't $(XSPLICE) not just depend
On Mon, Apr 18, 2016 at 12:23:26AM -0600, Jan Beulich wrote:
> >>> Konrad Rzeszutek Wilk 04/18/16 7:55 AM >>>
> >> >+ if ( delta > elf->len )
> >> >+ {
> >> >+ dprintk(XENLOG_ERR, XSPLICE "%s: Section table is past end of
> >> >payload!\n",
> >> >+ elf->name);
> >> >+ return -EINVAL;
> >> >+ }
>
> >+void arch_xsplice_free_payload(void *va)
> >+{
> >+vfree_xen(va);
> >+}
>
> What is the idea behind having this hook (instead of generic code just calling
> vfree_xen() [or really just vfree()])?
To have an symmetry with the allocation one. I don't know enough about
ARM to know whether th
On 20 April 2016 at 12:14, Stefano Stabellini wrote:
> The following changes since commit 42bb626f7ebc9197d2943b897a99e127315275ab:
>
> Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request'
> into staging (2016-04-12 09:34:52 +0100)
>
> are available in the git repository at:
On Wed, Apr 20, 2016 at 3:57 PM, Paul Durrant wrote:
>> -Original Message-
>> From: George Dunlap
>> Sent: 20 April 2016 15:50
>> To: Yu, Zhang
>> Cc: Paul Durrant; xen-devel@lists.xen.org; Kevin Tian; Jan Beulich; Andrew
>> Cooper; Tim (Xen.org); Lv, Zhiyuan; jun.nakaj...@intel.com
>> Sub
On Wed, Apr 20, 2016 at 10:16:35AM -0400, Zhigang Wang wrote:
> xentop will segmentation fault in this case:
>
> # ip link set eth1 down
> # ip link set eth1 name ETH
> # xentop
>
> This patch will let xentop to handle all uppercase network interface name.
>
> Signed-off-by: Zhigang Wang
On Sun, Apr 17, 2016 at 04:02:02AM -0600, Jan Beulich wrote:
> >>> Roger Pau Monne 04/15/16 8:29 PM >>>
> >I've also noticed that Xen always sets "-no-integrated-as" when using clang,
> >because previous versions (<3.8.0) didn't support .code16/.code32/.code64
> >in inline asm. This is solved at l
On Tue, Apr 19, 2016 at 10:51:14AM -0600, Jan Beulich wrote:
> >>> "Yu, Zhang" 04/19/16 1:46 PM >>>
> >On 4/19/2016 7:15 PM, Paul Durrant wrote:
> >> I talked to Wei earlier and he is happy to give a freeze exception to this
> >> change.
> >
> >Great! I really obliged. :)
> >BTW, Does some form o
On 19/04/16 12:02, Yu, Zhang wrote:
>
>
> On 4/19/2016 12:58 AM, Paul Durrant wrote:
>>> -Original Message-
>>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
>>> Jan
>>> Beulich
>>> Sent: 18 April 2016 17:47
>>> To: Paul Durrant
>>> Cc: Kevin Tian; Keir (Xen.org);
> -Original Message-
> From: George Dunlap
> Sent: 20 April 2016 15:50
> To: Yu, Zhang
> Cc: Paul Durrant; xen-devel@lists.xen.org; Kevin Tian; Jan Beulich; Andrew
> Cooper; Tim (Xen.org); Lv, Zhiyuan; jun.nakaj...@intel.com
> Subject: Re: [Xen-devel] [PATCH v2 3/3] x86/ioreq server: Add HV
On Tue, Apr 19, 2016 at 12:59 PM, Yu, Zhang wrote:
>>> So what about the VM suspend case you mentioned above? Will that trigger
>>> the unmapping of ioreq server? Could the device model also take the role
>>> to change the p2m type back in such case?
>>
>>
>> Yes. The device model has to be told b
On Sun, Apr 17, 2016 at 02:03:28PM -0600, Jan Beulich wrote:
> >>> Roger Pau Monne 04/15/16 8:27 PM >>>
> >Previously HOSTCC was always hardcoded to gcc
>
> So what is the goal here? Be able to build on a gcc-free system? Or else, how
> does it matter what compiler build elements get built with?
Hello Peng,
On 20/04/16 14:54, Peng Fan wrote:
Use shift operator, but not muliplication.
No function change.
Why? The compiler will calculate the address at compilation time.
Regards,
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/arm64/head.S | 2 +-
Sorry I was at the Xen hackathon in the last two days.
On Tue, Apr 12, 2016 at 11:35:20AM +0800, Zhenzhong Duan wrote:
> 在 2016/4/11 19:27, Wei Liu 写道:
> >On Mon, Apr 11, 2016 at 09:42:57AM +0800, Zhenzhong Duan wrote:
> >>It's tool's duty to pass a correct cpumap to XEN. On a host with less than
xentop will segmentation fault in this case:
# ip link set eth1 down
# ip link set eth1 name ETH
# xentop
This patch will let xentop to handle all uppercase network interface name.
Signed-off-by: Zhigang Wang
---
tools/xenstat/libxenstat/src/xenstat_linux.c | 7 +--
1 file changed, 5
flight 92128 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92128/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-i386-xl-qemuu-ovm
On Tue, Apr 12, 2016 at 03:03:15PM +0100, Wei Liu wrote:
> On Mon, Apr 11, 2016 at 03:04:09PM +0200, Juergen Gross wrote:
> > Document the interface between qemu and libxl regarding backends
> > supported by qemu.
> >
> > Signed-off-by: Juergen Gross
>
> Reviewed-by: Wei Liu
>
Release-acked-b
The 'Base address for 4K mapping' is '(x19 >> THIRD_SHIFT) << THIRD_SHIFT'.
Also we are building 4K page mapping, not section mapping.
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/arm64/head.S | 8
1 file changed, 4 insertions(+), 4 deletions(-)
di
Use shift operator, but not muliplication.
No function change.
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/arm64/head.S | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index 05e3db0..
On 11/04/16 15:04, Juergen Gross wrote:
> Document the interface between qemu and libxl regarding backends
> supported by qemu.
>
> Signed-off-by: Juergen Gross
Anyone to commit this, please?
Juergen
> ---
> v2: - replace variable Xenstore path parts () with bash-like syntax
> ($XYZ) as
Wei Liu writes ("Re: [PATCH 0/3] adjust error return values for cpupool
operations"):
> In principle I agree we need better semantics and documentation of this
> hypercall, and because this is new code so it's risk free, so:
>
> Release-acked-by: Wei Liu
>
> I will leave this series for Ian t
On 20/04/16 13:08, Bob Liu wrote:
>
>
> The "feature-data-integrity" could be extended to "unsigned int" instead of
> "bool",
> so as to report all DIX formats backend supports.
I think it would be preferable to have something string based. I think
Linux reports the formats using a string enco
Wei Liu writes ("Re: [PATCH] tools/libxc: Correct use of X86_XSS_MASK in guest
xstate generation"):
> On Tue, Apr 19, 2016 at 06:27:05PM +0100, Andrew Cooper wrote:
> > Submitted-from: A punt, on the Cam, during the the hackathon, because.
>
> Acked-by: Wei Liu
> Release-acked-by: Wei Liu
>
>
Hello Dirk,
On 20/04/16 14:32, Dirk Behme wrote:
Add PSCI 1.0 compatibility strings to make Xen behave correctly with
device trees having
compatible = "arm,psci-1.0";
You need to explain in the commit message what is the correct behavior.
I.e Xen needs to blacklist any PSCI 1.0 node as it wi
Wei Liu writes ("[PATCH] [[for-4.7]] libxl: fix old style declarations"):
> Fix errors like:
>
> /local/work/xen.git/dist/install/usr/local/include/libxl_uuid.h:59:1: error:
> 'static' is not at beginning of declaration [-Werror=old-style-declaration]
> void static inline libxl_uuid_copy_0x04040
Add PSCI 1.0 compatibility strings to make Xen behave correctly with
device trees having
compatible = "arm,psci-1.0";
Signed-off-by: Dirk Behme
---
xen/arch/arm/domain_build.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index a
On Mon, Apr 18, 2016 at 11:04:39AM -0600, Jim Fehlig wrote:
> On 04/16/2016 05:54 AM, osstest service owner wrote:
> > flight 91597 libvirt real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/91597/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
> > inclu
Hello Dirk,
On 19/04/16 06:59, Dirk Behme wrote:
In some mailing list discussion
http://lists.xen.org/archives/html/xen-devel/2016-04/msg00214.html
some details about the interrupt handling of Xen were given.
Add that so it's not forgotten.
For your information, this is described on the wiki
On Tue, Apr 19, 2016 at 07:07:01AM -0400, Maryam Masoudian wrote:
> Thanks.
> One more thing, is it possible to see the percentage of shared memory among
> VMs by xl tool?
> As there is a xl sharing and I want to know whether this provides this
> facility ...
>
Not sure. You can check xl manpage
(CC REST maintainers)
Hello Dirk,
Please CC the relevant maintainers for this patch. You can use
scripts/get_maintainers.pl for this purpose.
On 19/04/16 06:59, Dirk Behme wrote:
On ARM64 Linux the HVC instruction is used to trap into Xen. As this
can be set only at EL3, i.e. outside from Xe
On 04/13/2016 10:09 PM, Konrad Rzeszutek Wilk wrote:
snip
+static int xsplice_action(xen_sysctl_xsplice_action_t *action)
+{
+struct payload *data;
+char n[XEN_XSPLICE_NAME_SIZE];
+int rc;
+
+rc = verify_name(&action->name, n);
+if ( rc )
+return rc;
+
+spin_lock(&
b4ff8389ed14 is incomplete: relies on nr_legacy_irqs() to get the number
of legacy interrupts when actually nr_legacy_irqs() returns 0 after
probe_8259A(). Use NR_IRQS_LEGACY instead.
Signed-off-by: Stefano Stabellini
diff --git a/arch/x86/pci/xen.c b/arch/x86/pci/xen.c
index beac4df..349b8ce 10
On 04/19/2016 08:31 PM, Jan Beulich wrote:
snip
+ASSERT(spin_is_locked(&payload_lock));
+list_for_each_entry ( data, &payload_list, list )
+{
+unsigned int i;
+
+for ( i = 0; i < data->nsyms; i++ )
+{
+if ( !data->symtab[i].new_symbol )
+
On 14/04/16 20:52, Ben Sanda wrote:
Julien, George, Andrew, and Stefano,
Hello Ben,
Sorry for the late answer, we were at the Xen hackathon.
Thank you for the explanation.
The ARM implementation of share_xen_page_with_guest is nearly the same
as the x86 one. However, the type is never use
flight 92124 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/92124/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-xsm 15 guest-localmigratefail REGR. vs. 60684
build-i386
Hi Jan,
On 14/04/16 16:23, Jan Beulich wrote:
Julien Grall 04/14/16 5:08 PM >>>
On 14/04/16 15:56, Jan Beulich wrote:
Julien Grall 04/14/16 10:55 AM >>>
On 14/04/2016 05:01, Jan Beulich wrote:
Julien Grall 04/13/16 6:01 PM >>>
--- a/xen/include/xen/bitops.h
+++ b/xen/include/xen/bitops.h
On 04/20/2016 04:59 PM, David Vrabel wrote:
> On 20/04/16 08:26, Bob Liu wrote:
>>
>> /*
>> + * Recognized only if "feature-data-integrity" is present in backend xenbus
>> info.
>> + * A request with BLKIF_OP_DIX_FLAG indicates the following request is a
>> special
>> + * request which only con
I wasn't CC'ed so this fled my attention.
On Fri, Mar 11, 2016 at 03:18:01PM -0500, Zhigang Wang wrote:
> xentop will segmentation fault in this case:
>
> # ip link set eth1 down
> # ip link set eth1 name ETH
> # xentop
>
> This patch will let xentop to handle all uppercase network interfa
Hi Jan,
On 20/04/16 12:26, Jan Beulich wrote:
Tamas K Lengyel 04/14/16 6:34 PM >>>
+static inline uint32_t arch_monitor_get_capabilities(struct domain *d)
+{
+uint32_t capabilities = 0;
Pointless initializer.
+capabilities = (1U << XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST);
+
+re
1 - 100 of 128 matches
Mail list logo