flight 105188 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105188/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 15 guest-start/debian.repeat fail REGR. vs. 104989
Regressions which are
The error exits of xen_pv_find_xendev() free the new xen-device via
g_free() which is wrong.
As the xen-device has been initialized as qdev it must be removed
via qdev_unplug().
This bug has been introduced with commit 3a6c9172ac5951e6dac2b3f6
("xen: create qdev for each backend device").
Report
Konrad, would you please ack/nack the changes?
Thank you,
Oleksandr
On 01/26/2017 09:46 AM, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Hi, all!
This series updates existing kbdif protocol documentation
and adds multi-touch support
Thank you,
Oleksandr Andrushchenko
Chan
flight 105122 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105122/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-multivcpu 14 guest-saverestorefail REGR. vs. 59254
test-amd64-i386-xl-
flight 105158 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105158/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12 mig
flight 105113 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105113/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs.
104681
test-amd64-i
On Fri, 27 Jan 2017, Julien Grall wrote:
> (CC Artem as ARM coverity admin)
>
> Hi Stefano,
>
> On 03/01/17 23:29, Stefano Stabellini wrote:
> > Always set the new physical irq affinity at the beginning of
> > vgic_migrate_irq, in all cases.
> >
> > No need to set physical irq affinity in gic_up
On Thu, 26 Jan 2017, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Signed-off-by: Oleksandr Andrushchenko
It looks fine, thank you!
Reviewed-by: Stefano Stabellini
> xen/include/public/io/kbdif.h | 210
> ++
> 1 file changed, 21
On Tue, Jan 31, 2017 at 02:18:40PM -0800, Stefano Stabellini wrote:
> On Tue, 31 Jan 2017, Julien Grall wrote:
> > Hi Edgar,
> >
> > On 26/01/17 13:16, Edgar E. Iglesias wrote:
> > > From: "Edgar E. Iglesias"
> > >
> > > This reverts commit 1e75ed8b64bc1a9b47e540e6f100f17ec6d97f1b.
> >
> > I wo
On Tue, 31 Jan 2017, Julien Grall wrote:
> Hi Edgar,
>
> On 26/01/17 13:16, Edgar E. Iglesias wrote:
> > From: "Edgar E. Iglesias"
> >
> > This reverts commit 1e75ed8b64bc1a9b47e540e6f100f17ec6d97f1b.
>
> I would add a word explain why it is reverted. Something like: "The default
> attribute ma
From: "Edgar E. Iglesias"
This reverts commit 1e75ed8b64bc1a9b47e540e6f100f17ec6d97f1b.
The default attribute mappings for MMIO have been relaxed, we now rely
on the hardware domain to set correct memory attributes.
Signed-off-by: Edgar E. Iglesias
---
xen/arch/arm/domain_build.c | 30 ---
From: "Edgar E. Iglesias"
This relaxes the hw domains S2 mapping attributes to p2m_mmio_direct_c.
Eventually, I think we should allow guests to execute code from on chip
memories. We could follow-up with a patch that allows execution for
p2m_mmio_direct_c and p2m_mmio_direct_nc. Does that sound
From: "Edgar E. Iglesias"
Since the hardware domain is a trusted domain, we extend the
trust to include making final decisions on what attributes to
use when mapping memory regions.
For ACPI configured hardware domains, this patch relaxes the hardware
domains mapping attributes to p2m_mmio_direc
From: "Edgar E. Iglesias"
Since the hardware domain is a trusted domain, we extend the
trust to include making final decisions on what attributes to
use when mapping memory regions.
For device-tree configured hardware domains, this patch relaxes
the hardware domains mapping attributes to p2m_mmi
On Tue, 31 Jan 2017, Julien Grall wrote:
> Hi Dario,
>
> On 25/01/17 16:00, Dario Faggioli wrote:
> > On Wed, 2017-01-25 at 12:38 +, Julien Grall wrote:
> > > On 25/01/17 11:10, Dario Faggioli wrote:
> > And a good one. I may be wrong (I certainly wasn't around at the time),
> > but ISTR out R
On Tue, 31 Jan 2017, Edgar E. Iglesias wrote:
> On Tue, Jan 31, 2017 at 05:09:53PM +, Julien Grall wrote:
> > Hi Edgar,
> >
> > Thank you for the feedbacks.
>
> Hi Julien,
>
> >
> > On 31/01/17 16:53, Edgar E. Iglesias wrote:
> > >On Wed, Jan 25, 2017 at 06:53:20PM +, Julien Grall wrote
On Tue, 31 Jan 2017, Julien Grall wrote:
> > > > > By default all the PCI devices will be assigned to DOM0. So Xen would
> > > > > have
> > > > > to configure the SMMU and Interrupt Controller to allow DOM0 to use
> > > > > the PCI
> > > > > devices. As mentioned earlier, those subsystems will requ
On Wed, 25 Jan 2017, Julien Grall wrote:
> > > > > whilst for Device Tree the segment number is not available.
> > > > >
> > > > > So Xen needs to rely on DOM0 to discover the host bridges and notify
> > > > > Xen
> > > > > with all the relevant informations. This will be done via a new
> > > > >
On Wed, Jan 18, 2017 at 06:51:02PM +0530, bharat gohil wrote:
> Hello
Hey!
CC-ing one of the XenGT folks who I hope can help you.
>
> I am new to GPU and GPU virtualization and found that xen support intel GPU
> virtualization using XenGT.
> I want to know,
> 1) What are the critical GPU command
> static int assemble_val_array(uint64_t *val,
> @@ -550,7 +641,25 @@ static int assemble_val_array(uint64_t *val,
>const struct psr_socket_info *info,
>unsigned int old_cos)
> {
> -return -EINVAL;
> +const struct feat_node *
On Thu, Jan 19, 2017 at 02:01:09PM +0800, Yi Sun wrote:
> This patch implements get value flow including L3 CAT callback
> function.
>
> It also changes domctl interface to make it more general.
>
> With this patch, 'psr-cat-show' can work for L3 CAT.
Could you add:
"but not for L3 code/data wh
.snip..
> +static enum psr_feat_type psr_cbm_type_to_feat_type(enum cbm_type type)
> +{
> +enum psr_feat_type feat_type;
> +
> +/* Judge if feature is enabled. */
> +switch ( type ) {
The { should be on its own line.
> +case PSR_CBM_TYPE_L3:
> +feat_type = PSR_SOCKET_L3_CA
The parameter to compat_dm_op() is a pointer to an array of
compat_dm_op_buf_t's in guest RAM.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Paul Durrant
CC: Ian Jackson
CC: Wei Liu
What is the pupose of COMPAT_HANDLE_PARAM()? It is a packed structure of one
and a half pointers, so is
On Thu, Jan 19, 2017 at 02:01:07PM +0800, Yi Sun wrote:
> This patch implements the Domain init/free and schedule flows.
>
> Signed-off-by: Yi Sun
> ---
> v5:
> - define macro 'PSR_ASSOC_REG_POS' to replace integer 32.
> - rename 'l3_cat_get_max_cos_max' to 'l3_cat_get_cos_max'.
> - m
On Tue, 31 Jan 2017, Konrad Rzeszutek Wilk wrote:
> On Tue, Jan 31, 2017 at 11:15:50AM -0800, Stefano Stabellini wrote:
> > On Tue, 31 Jan 2017, Konrad Rzeszutek Wilk wrote:
> > > On Tue, Jan 31, 2017 at 08:30:26PM +0200, Andrii Anisov wrote:
> > > > From: Andrii Anisov
> > > >
> > > > Signed-off
On Tue, Jan 31, 2017 at 11:15:50AM -0800, Stefano Stabellini wrote:
> On Tue, 31 Jan 2017, Konrad Rzeszutek Wilk wrote:
> > On Tue, Jan 31, 2017 at 08:30:26PM +0200, Andrii Anisov wrote:
> > > From: Andrii Anisov
> > >
> > > Signed-off-by: Andrii Anisov
> > > Signed-off-by: Stefano Stabellini
>
On Tue, Jan 31, 2017 at 04:35:09PM +, Julien Grall wrote:
> Hi Edgar,
>
> On 26/01/17 13:16, Edgar E. Iglesias wrote:
> >From: "Edgar E. Iglesias"
> >
> >This reverts commit 1e75ed8b64bc1a9b47e540e6f100f17ec6d97f1b.
>
> I would add a word explain why it is reverted. Something like: "The defa
On Tue, 31 Jan 2017, Konrad Rzeszutek Wilk wrote:
> On Tue, Jan 31, 2017 at 08:30:26PM +0200, Andrii Anisov wrote:
> > From: Andrii Anisov
> >
> > Signed-off-by: Andrii Anisov
> > Signed-off-by: Stefano Stabellini
> > ---
> > arch/arm/xen/mm.c | 1 +
> > drivers/xen/swiotlb-xen.c | 22
On Tue, 31 Jan 2017, Konrad Rzeszutek Wilk wrote:
> On Tue, Jan 31, 2017 at 08:30:25PM +0200, Andrii Anisov wrote:
> > From: Stefano Stabellini
> >
> > This function creates userspace mapping for the DMA-coherent memory.
> >
> > Signed-off-by: Stefano Stabellini
> > Signed-off-by: Oleksandr Dmy
On Tue, Jan 31, 2017 at 05:09:53PM +, Julien Grall wrote:
> Hi Edgar,
>
> Thank you for the feedbacks.
Hi Julien,
>
> On 31/01/17 16:53, Edgar E. Iglesias wrote:
> >On Wed, Jan 25, 2017 at 06:53:20PM +, Julien Grall wrote:
> >>On 24/01/17 20:07, Stefano Stabellini wrote:
> >>>On Tue, 24
On Tue, Jan 31, 2017 at 08:30:25PM +0200, Andrii Anisov wrote:
> From: Stefano Stabellini
>
> This function creates userspace mapping for the DMA-coherent memory.
>
> Signed-off-by: Stefano Stabellini
> Signed-off-by: Oleksandr Dmytryshyn
> Signed-off-by: Andrii Anisov
> ---
> arch/arm/xen/m
On Tue, Jan 31, 2017 at 08:30:26PM +0200, Andrii Anisov wrote:
> From: Andrii Anisov
>
> Signed-off-by: Andrii Anisov
> Signed-off-by: Stefano Stabellini
> ---
> arch/arm/xen/mm.c | 1 +
> drivers/xen/swiotlb-xen.c | 22 ++
> include/xen/swiotlb-xen.h | 6 ++
>
On Tue, Jan 31, 2017 at 3:24 AM, George Dunlap wrote:
> On 30/01/17 17:07, Tamas K Lengyel wrote:
>> Hi George,
>> yeap, this solves old mem_access settings being triggered when I
>> recreate altp2m views. Thanks!
>>
>> On Mon, Jan 30, 2017 at 8:17 AM, George Dunlap
>> wrote:
>>> Commit 71bb7304
From: Andrii Anisov
Signed-off-by: Andrii Anisov
Signed-off-by: Stefano Stabellini
---
arch/arm/xen/mm.c | 1 +
drivers/xen/swiotlb-xen.c | 22 ++
include/xen/swiotlb-xen.h | 6 ++
3 files changed, 29 insertions(+)
diff --git a/arch/arm/xen/mm.c b/arch/arm/xe
From: Andrii Anisov
Some drivers need additional dma ops to be provided by xen swiotlb. Because
common operations implementation came from x86 world and does not suite ARM
needs we have to provide needed XEN SWIOTLB for ARM callbacks.
dma_mmap patch is a port of an antique and lost patch discuss
From: Stefano Stabellini
This function creates userspace mapping for the DMA-coherent memory.
Signed-off-by: Stefano Stabellini
Signed-off-by: Oleksandr Dmytryshyn
Signed-off-by: Andrii Anisov
---
arch/arm/xen/mm.c | 1 +
drivers/xen/swiotlb-xen.c | 18 ++
include/xe
On 01/30/2017 02:31 PM, Boris Ostrovsky wrote:
> On 01/30/2017 02:06 PM, Eric Dumazet wrote:
>> On Mon, 2017-01-30 at 13:23 -0500, Boris Ostrovsky wrote:
>>
>>> We do netif_carrier_off() first thing in xennet_disconnect_backend() and
>>> the only place where the timer is rearmed is xennet_alloc_rx_
On Tue, Jan 31, Ian Jackson wrote:
> Olaf Hering writes ("Re: [Xen-devel] [PATCH qemu-xen-traditional 1/2]
> xen_platform: unplug also SCSI disks [and 1 more messages]"):
> > So what should be done with the two patches?
> > Are they acceptable for staging, or will they be rejected?
>
> I am happ
On Tue, Jan 31, 2017 at 09:02:46AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 16:51, wrote:
> > On Tue, Jan 31, 2017 at 06:33:11AM -0700, Jan Beulich wrote:
> >> >>> On 31.01.17 at 12:08, wrote:
> >> > +static int _fuzz_rep_read(const char *why, unsigned long *reps)
> >> > +{
> >> > +int
Olaf Hering writes ("Re: [Xen-devel] [PATCH qemu-xen-traditional 1/2]
xen_platform: unplug also SCSI disks [and 1 more messages]"):
> So what should be done with the two patches?
> Are they acceptable for staging, or will they be rejected?
I am happy with the first patch, as I say. Would you lik
On Tue, Jan 31, 2017 at 08:07:17AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 15:12, wrote:
> > On Tue, Jan 31, 2017 at 03:10:14AM -0700, Jan Beulich wrote:
> >> >>> On 30.01.17 at 23:20, wrote:
> >> >> --- a/xen/arch/x86/psr.c
> >> >> +++ b/xen/arch/x86/psr.c
> >> >> @@ -17,12 +17,116 @@
> >
On Tue, Jan 10, George Dunlap wrote:
> On Mon, Jan 9, 2017 at 4:39 PM, Olaf Hering wrote:
> > The protocol was introduced before upstream had one, xen-3.0 vs.
> > xen-3.x. I have not digged into 10 year old emails why it was done that
> > way, if it was ever proposed for upstream inclusion. Meanw
Hi Edgar,
Thank you for the feedbacks.
On 31/01/17 16:53, Edgar E. Iglesias wrote:
On Wed, Jan 25, 2017 at 06:53:20PM +, Julien Grall wrote:
On 24/01/17 20:07, Stefano Stabellini wrote:
On Tue, 24 Jan 2017, Julien Grall wrote:
For generic host bridge, the initialization is inexistent. Ho
On Tue, Jan 31, 2017 at 08:56:09AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 16:22, wrote:
> > On Tue, Jan 31, 2017 at 02:55:50AM -0700, Jan Beulich wrote:
> >> >>> On 30.01.17 at 22:09, wrote:
> >> > On Mon, Jan 30, 2017 at 03:39:23AM -0700, Jan Beulich wrote:
> >> >> I notice, however, tha
>>> On 31.01.17 at 14:50, wrote:
> flight 105080 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/105080/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-xl-qemuu-debianhvm-amd64 9 debi
On Wed, Jan 25, 2017 at 06:53:20PM +, Julien Grall wrote:
> Hi Stefano,
>
> On 24/01/17 20:07, Stefano Stabellini wrote:
> >On Tue, 24 Jan 2017, Julien Grall wrote:
> ## Discovering and register hostbridge
>
> Both ACPI and Device Tree do not provide enough information to fully
>
On 01/30/2017 08:47 AM, Vineeth Remanan Pillai wrote:
On 01/29/2017 03:09 PM, Boris Ostrovsky wrote:
There are couple of problems with this patch.
1. The 'if' clause now evaluates to true on pretty much every call to
xennet_alloc_rx_buffers().
Thanks for catching this. In my testing I did no
Hi Edgar,
On 26/01/17 13:16, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
Since the hardware domain is a trusted domain, we extend the
trust to include making final decisions on what attributes to
use when mapping memory regions.
For ACPI configured hardware domains, this patch relaxes
Hi Edgar,
On 26/01/17 13:16, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
This reverts commit 1e75ed8b64bc1a9b47e540e6f100f17ec6d97f1b.
I would add a word explain why it is reverted. Something like: "The
default attribute mapping for MMIO as been relaxed and now rely on the
hardware
Hi Edgar,
On 26/01/17 13:16, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
Since the hardware domain is a trusted domain, we extend the
trust to include making final decisions on what attributes to
use when mapping memory regions.
For device-tree configured hardware domains, this patch r
Hi Dario,
On 25/01/17 16:00, Dario Faggioli wrote:
On Wed, 2017-01-25 at 12:38 +, Julien Grall wrote:
On 25/01/17 11:10, Dario Faggioli wrote:
And a good one. I may be wrong (I certainly wasn't around at the time),
but ISTR out RCU code is imported/inspired by Linux... Looking there
again
>>> On 31.01.17 at 17:05, wrote:
> On 01/31/2017 10:56 AM, Jan Beulich wrote:
> On 31.01.17 at 16:52, wrote:
>>> On 01/31/2017 06:01 AM, Jan Beulich wrote:
>>> On 30.01.17 at 19:26, wrote:
> We can switch ACPI from using fixmap to dynamic mapping as soon as
> the system enters SY
On 31/01/17 16:02, Jaggi, Manish wrote:
On 1/31/2017 8:47 PM, Julien Grall wrote:
On 31/01/17 14:08, Jaggi, Manish wrote:
Hi Julien,
On 1/31/2017 7:16 PM, Julien Grall wrote:
On 31/01/17 13:19, Jaggi, Manish wrote:
On 1/31/2017 6:13 PM, Julien Grall wrote:
On 31/01/17 10:29, Jaggi, Ma
>>> On 31.01.17 at 16:57, wrote:
> On 31/01/17 15:51, Wei Liu wrote:
>> On Tue, Jan 31, 2017 at 06:33:11AM -0700, Jan Beulich wrote:
+static void setup_fpu_exception_handler(void)
+{
+/* FIXME - just disable exceptions for now */
+unsigned long a;
+
+asm v
On 01/31/2017 10:56 AM, Jan Beulich wrote:
On 31.01.17 at 16:52, wrote:
>> On 01/31/2017 06:01 AM, Jan Beulich wrote:
>> On 30.01.17 at 19:26, wrote:
We can switch ACPI from using fixmap to dynamic mapping as soon as
the system enters SYS_STATE_boot. This will allow us, for exa
>>> On 31.01.17 at 16:51, wrote:
> On Tue, Jan 31, 2017 at 06:33:11AM -0700, Jan Beulich wrote:
>> >>> On 31.01.17 at 12:08, wrote:
>> > +static int _fuzz_rep_read(const char *why, unsigned long *reps)
>> > +{
>> > +int rc;
>> > +unsigned long bytes_read = 0;
>> > +
>> > +rc = data_re
On 1/31/2017 8:47 PM, Julien Grall wrote:
>
>
> On 31/01/17 14:08, Jaggi, Manish wrote:
>> Hi Julien,
>>
>> On 1/31/2017 7:16 PM, Julien Grall wrote:
>>> On 31/01/17 13:19, Jaggi, Manish wrote:
On 1/31/2017 6:13 PM, Julien Grall wrote:
> On 31/01/17 10:29, Jaggi, Manish wrote:
>>>
>>
On 31/01/17 15:57, Andrew Cooper wrote:
> On 31/01/17 15:51, Wei Liu wrote:
>> On Tue, Jan 31, 2017 at 06:33:11AM -0700, Jan Beulich wrote:
+static void setup_fpu_exception_handler(void)
+{
+/* FIXME - just disable exceptions for now */
+unsigned long a;
+
+
Hi Roger,
On 25/01/17 11:42, Roger Pau Monné wrote:
On Tue, Jan 24, 2017 at 05:17:06PM +, Julien Grall wrote:
On 06/01/17 15:12, Roger Pau Monné wrote:
On Thu, Dec 29, 2016 at 02:04:15PM +, Julien Grall wrote:
* Add a device
* Remove a device
* Assign a device to a guest
>>> On 31.01.17 at 16:52, wrote:
> On 01/31/2017 06:01 AM, Jan Beulich wrote:
> On 30.01.17 at 19:26, wrote:
>>> We can switch ACPI from using fixmap to dynamic mapping as soon as
>>> the system enters SYS_STATE_boot. This will allow us, for example,
>>> to map MADT on systems with large numb
On 31/01/17 15:51, Wei Liu wrote:
> On Tue, Jan 31, 2017 at 06:33:11AM -0700, Jan Beulich wrote:
>>> +static void setup_fpu_exception_handler(void)
>>> +{
>>> +/* FIXME - just disable exceptions for now */
>>> +unsigned long a;
>>> +
>>> +asm volatile ( "fnclex");
>>> +a=0x37f;
On Tue, Jan 31, 2017 at 06:33:11AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 12:08, wrote:
> > @@ -16,26 +17,79 @@
> >
> > #include "x86_emulate.h"
> >
> > -static unsigned char data[4096];
> > +#include "../../../xen/include/asm-x86/msr-index.h"
> > +
> > +#define MSR_INDEX_MAX 16
> > +
On 01/31/2017 06:01 AM, Jan Beulich wrote:
On 30.01.17 at 19:26, wrote:
>> We can switch ACPI from using fixmap to dynamic mapping as soon as
>> the system enters SYS_STATE_boot. This will allow us, for example,
>> to map MADT on systems with large number of processors where the
>> table migh
flight 105087 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105087/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm6 xen-boot fail REGR. vs. 59254
test-amd64-amd64-xl
>>> On 31.01.17 at 15:55, wrote:
> On Tue, Jan 31, 2017 at 05:56:38AM -0700, Jan Beulich wrote:
>> With this taken care of and the #include style matching whatever
>> is chosen as the final model in the earlier patch,
>> Reviewed-by: Jan Beulich
>> However, I'd appreciate if you took the opportun
>>> On 31.01.17 at 16:11, wrote:
> OK, I've rewritten the section thus:
>
> ---
>
> 4. The security team will only issue an advisory if there is a known
> combination of software in which the vulnerability can be exploited.
>
> In most cases, the software which contains the bug is also the targ
On 31/01/17 14:08, Jaggi, Manish wrote:
Hi Julien,
On 1/31/2017 7:16 PM, Julien Grall wrote:
On 31/01/17 13:19, Jaggi, Manish wrote:
On 1/31/2017 6:13 PM, Julien Grall wrote:
On 31/01/17 10:29, Jaggi, Manish wrote:
From: Xen-devel on behalf of Andre
Przywara
Sent: Tuesday, January 31, 2
On Tue, Jan 31, 2017 at 08:16:00AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 15:36, wrote:
> > On Tue, Jan 31, 2017 at 05:50:09AM -0700, Jan Beulich wrote:
> >> >>> On 31.01.17 at 12:08, wrote:
> >> > --- a/tools/tests/x86_emulator/x86_emulate.h
> >> > +++ b/tools/tests/x86_emulator/x86_emul
>>> On 31.01.17 at 15:36, wrote:
> On Tue, Jan 31, 2017 at 05:50:09AM -0700, Jan Beulich wrote:
>> >>> On 31.01.17 at 12:08, wrote:
>> > --- a/tools/tests/x86_emulator/x86_emulate.h
>> > +++ b/tools/tests/x86_emulator/x86_emulate.h
>> > @@ -6,6 +6,8 @@
>> > #include
>> > #include
>> >
>> >
>>> On 31.01.17 at 15:23, wrote:
> On Tue, Jan 31, 2017 at 05:33:12AM -0700, Jan Beulich wrote:
>> >>> On 25.01.17 at 23:49, wrote:
>> > On Wed, Jan 25, 2017 at 04:20:30PM -0600, Doug Goldstein wrote:
>> > @@ -123,6 +116,15 @@ efi_platform:
>> > .Lbad_ldr_nih: .asciz "ERR: EFI ImageHandle is not
On Wed, Jan 25, 2017 at 8:40 AM, Jan Beulich wrote:
On 24.01.17 at 17:33, wrote:
>>> On Jan 24, 2017, at 3:08 PM, Jan Beulich wrote:
>> On 24.01.17 at 16:01, wrote:
> On Jan 24, 2017, at 11:43 AM, Jan Beulich wrote:
On 24.01.17 at 12:33, wrote:
>> Jan Beulich writes
>>> On 31.01.17 at 15:12, wrote:
> On Tue, Jan 31, 2017 at 03:10:14AM -0700, Jan Beulich wrote:
>> >>> On 30.01.17 at 23:20, wrote:
>> >> --- a/xen/arch/x86/psr.c
>> >> +++ b/xen/arch/x86/psr.c
>> >> @@ -17,12 +17,116 @@
>> >> #include
>> >> #include
>> >> #include
>> >> +#include
>> >> #
On Tue, Jan 31, 2017 at 05:56:38AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 12:08, wrote:
> > @@ -5016,20 +5004,20 @@ x86_emulate(
> >
> > /*
> > * SYSCALL (unlike most instructions) evaluates its singlestep
> > action
> > - * based on the resulting EFLG_TF, not
On Tue, Jan 31, 2017 at 05:50:09AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 12:08, wrote:
> > --- a/tools/tests/x86_emulator/x86_emulate.h
> > +++ b/tools/tests/x86_emulator/x86_emulate.h
> > @@ -6,6 +6,8 @@
> > #include
> > #include
> >
> > +#include "../../../xen/include/asm-x86/x86-
On Tue, Jan 31, 2017 at 05:33:12AM -0700, Jan Beulich wrote:
> >>> On 25.01.17 at 23:49, wrote:
> > On Wed, Jan 25, 2017 at 04:20:30PM -0600, Doug Goldstein wrote:
> >> This is a huge change and would really be helpful to have the diff of
> >> what's changed to work from.
> >
> > Please look below
On Tue, Jan 31, 2017 at 03:10:14AM -0700, Jan Beulich wrote:
> >>> On 30.01.17 at 23:20, wrote:
> >> --- a/xen/arch/x86/psr.c
> >> +++ b/xen/arch/x86/psr.c
> >> @@ -17,12 +17,116 @@
> >> #include
> >> #include
> >> #include
> >> +#include
> >> #include
> >>
> >> +/*
> >> + * Terminology
On Tue, Jan 31, 2017 at 03:14:25AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 03:44, wrote:
> > On Thu, Jan 19, 2017 at 02:01:06PM +0800, Yi Sun wrote:
> >> @@ -127,6 +130,13 @@ struct feat_node {
> >> struct list_head list;
> >> };
> >>
> >> +struct cpuid_leaf_regs {
> >> +unsigne
Hi Julien,
On 1/31/2017 7:16 PM, Julien Grall wrote:
> On 31/01/17 13:19, Jaggi, Manish wrote:
>> On 1/31/2017 6:13 PM, Julien Grall wrote:
>>> On 31/01/17 10:29, Jaggi, Manish wrote:
>
> From: Xen-devel on behalf of Andre
> Przywara
> Sent: Tuesday, January 31, 2017 12:01 AM
>>
>>> On 31.01.17 at 14:22, wrote:
> Starting from ee3e265688, $(CC) is used for linking. That means all
> default $(CC) flags coming from distro takes effect.
First of all I think $(CC) containing any flags is wrong - that's what
$(CFLAGS) is for. Or are you saying the compiler's built in default
On 31/01/17 10:44, Jan Beulich wrote:
On 30.01.17 at 16:17, wrote:
>> Commit 71bb7304e7a7a35ea6df4b0cedebc35028e4c159 added flushing of
>> nested p2m tables whenever the host p2m table changed. Unfortunately
>> in the process, it added a filter to the generic p2m_flush_table()
>> function so
On Tue, Jan 31, 2017 at 06:40:43AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 14:22, wrote:
> > Starting from ee3e265688, $(CC) is used for linking. That means all
> > default $(CC) flags coming from distro takes effect.
>
> First of all I think $(CC) containing any flags is wrong - that's wh
On 31/01/17 13:40, Jan Beulich wrote:
On 31.01.17 at 14:22, wrote:
>> Starting from ee3e265688, $(CC) is used for linking. That means all
>> default $(CC) flags coming from distro takes effect.
> First of all I think $(CC) containing any flags is wrong - that's what
> $(CFLAGS) is for. Or are
On 01/30/2017 05:33 PM, Julien Grall wrote:
This email only tracks big items for xen.git tree. Please reply for items you
woulk like to see in 4.9 so that people have an idea what is going on and
prioritise accordingly.
== PV Drivers ==
* Xen transport for 9pfs
- Stefano Stabellini
* PV
flight 105080 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105080/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs.
104681
test-amd64-i
On 31/01/17 13:19, Jaggi, Manish wrote:
On 1/31/2017 6:13 PM, Julien Grall wrote:
On 31/01/17 10:29, Jaggi, Manish wrote:
From: Xen-devel on behalf of Andre
Przywara
Sent: Tuesday, January 31, 2017 12:01 AM
To: Stefano Stabellini; Julien Grall
Cc: xen-de...@lists.xenproject.org; Vijay Kilari
On 01/31/2017 03:05 AM, Doug Goldstein wrote:
On 5/6/16 10:48 AM, Ross Lagerwall wrote:
Here is a set of changes to make building xSplice patches easier.
Tested to boot on x86.
Compile-tested on arm.
This is probably too late to make it into 4.7, but hey, if someone wants
to put it in I've CC'd
>>> On 31.01.17 at 12:08, wrote:
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 31.01.17 at 12:08, wrote:
> ... so that users can know how big the initial input should be.
>
> Signed-off-by: Wei Liu
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 31.01.17 at 12:08, wrote:
> @@ -16,26 +17,79 @@
>
> #include "x86_emulate.h"
>
> -static unsigned char data[4096];
> +#include "../../../xen/include/asm-x86/msr-index.h"
> +
> +#define MSR_INDEX_MAX 16
> +
> +#define SEG_NUM x86_seg_none
> +
> +struct input_struct {
> +unsigned lon
On 30/01/17 07:41, Manish Jaggi wrote:
Hello Julien,
On 01/25/2017 08:55 PM, Julien Grall wrote:
Hello Manish,
On 25/01/17 04:37, Manish Jaggi wrote:
On 01/24/2017 11:13 PM, Julien Grall wrote:
On 19/01/17 05:09, Manish Jaggi wrote:
I think, PCI passthrough and DOM0 w/ACPI enumerating d
On Tue, Jan 31, 2017 at 05:45:59AM -0700, Jan Beulich wrote:
> >>> On 31.01.17 at 12:07, wrote:
> > +/*
> > + * Trap/fault mnemonics.
> > + */
> > +#define TRAP_divide_error 0
> > +#define TRAP_debug 1
> > +#define TRAP_nmi 2
> > +#define TRAP_int3 3
> >
Hi Julien,
On 1/31/2017 6:13 PM, Julien Grall wrote:
>
>
> On 31/01/17 10:29, Jaggi, Manish wrote:
>>>
>>> From: Xen-devel on behalf of Andre
>>> Przywara
>>> Sent: Tuesday, January 31, 2017 12:01 AM
>>> To: Stefano Stabellini; Julien Grall
>>> Cc: xen-de...@lists.xenproject.org; Vijay Kilari
On Tue, Jan 31, 2017 at 01:22:42PM +, Wei Liu wrote:
> Starting from ee3e265688, $(CC) is used for linking. That means all
> default $(CC) flags coming from distro takes effect.
>
> On Debian Stretch, gcc contains -pie by default, which makes the final
> object fail to link. We need to explici
Starting from ee3e265688, $(CC) is used for linking. That means all
default $(CC) flags coming from distro takes effect.
On Debian Stretch, gcc contains -pie by default, which makes the final
object fail to link. We need to explicitly disable pie when linking.
Example error message:
/usr/bin/ld:
>>> On 31.01.17 at 12:08, wrote:
> And remove the duplicates.
>
> No functional change.
>
> Signed-off-by: Wei Liu
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi Julien,
On 1/31/2017 6:13 PM, Julien Grall wrote:
>
>
> On 31/01/17 10:29, Jaggi, Manish wrote:
>>>
>>> From: Xen-devel on behalf of Andre
>>> Przywara
>>> Sent: Tuesday, January 31, 2017 12:01 AM
>>> To: Stefano Stabellini; Julien Grall
>>> Cc: xen-de...@lists.xenproject.org; Vijay Kilari
>>> On 31.01.17 at 12:08, wrote:
> It will be used later to remove duplicates in x86emul.
>
> Signed-off-by: Wei Liu
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 31.01.17 at 12:08, wrote:
> Change the names used in code according to numeric values. Remove the
> now unused macros in x86_emualte.c and fix indentation. This in turns
> requires including msr-index.h and removing duplicates in userspace
> x86_emulate.c in userspace harness program.
>
>
>>> On 31.01.17 at 12:08, wrote:
> @@ -5016,20 +5004,20 @@ x86_emulate(
>
> /*
> * SYSCALL (unlike most instructions) evaluates its singlestep action
> - * based on the resulting EFLG_TF, not the starting EFLG_TF.
> + * based on the resulting X86_EFLAGS_TF, not
>>> On 31.01.17 at 12:08, wrote:
> --- a/tools/tests/x86_emulator/x86_emulate.h
> +++ b/tools/tests/x86_emulator/x86_emulate.h
> @@ -6,6 +6,8 @@
> #include
> #include
>
> +#include "../../../xen/include/asm-x86/x86-vendors.h"
I think we'd better avoid includes of this style. May I suggest
s
1 - 100 of 152 matches
Mail list logo