On Wed, Jul 04, 2018 at 12:49:00PM +0200, Daniel Kiper wrote:
> On Wed, Jul 04, 2018 at 01:57:58AM -0600, Jan Beulich wrote:
> > >>> On 03.07.18 at 18:02, wrote:
> > > On Thu, Jun 28, 2018 at 11:35:24PM -0600, Jan Beulich wrote:
> > >> >>> Roger Pau Monne 06/28/18 5:38 PM >>>
> > >> >lld (the llv
On Wed, Jul 04, 2018 at 05:26:54PM +0100, Ian Jackson wrote:
> Ian Jackson writes ("[PATCH for-4.12 v2 0/8] tools: Depriv fd checking,
> internal fd access"):
> > This series provides the support in xen.git for auditing whether qemu
> > file descriptors are deprivileged, as expected with libxl
> >
On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
>
>
> > On Jul 3, 2018, at 11:07 AM, Roger Pau Monné wrote:
> >
> > On Mon, Jul 02, 2018 at 06:03:39PM +, Lars Kurth wrote:
> >> We then had a discussion around why the positive benefits didn't
> >> materialize:
> >> * Andrew a
On Wed, Jul 04, 2018 at 05:26:54PM +0100, Ian Jackson wrote:
> Ian Jackson writes ("[PATCH for-4.12 v2 0/8] tools: Depriv fd checking,
> internal fd access"):
> > This series provides the support in xen.git for auditing whether qemu
> > file descriptors are deprivileged, as expected with libxl
> >
On Thu, Jul 05, 2018 at 08:53:51AM +0100, Wei Liu wrote:
> On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
> > So a fair amount of the discussion was about what it would look like,
> > and what it would take, to make it such that almost any push from
> > osstest (or whatever testing
On Wed, Jul 04, 2018 at 05:23:56PM +0100, Andrew Cooper wrote:
> On 04/07/18 09:51, Jan Beulich wrote:
> On 04.07.18 at 10:42, wrote:
> >> On Tue, Jul 03, 2018 at 09:55:19PM +0100, Andrew Cooper wrote:
> >>> --- a/xen/include/public/arch-x86/xen.h
> >>> +++ b/xen/include/public/arch-x86/xen.h
On Wed, Jul 04, 2018 at 05:46:29PM +0100, Andrew Cooper wrote:
> On 04/07/18 10:01, Jan Beulich wrote:
> On 03.07.18 at 22:55, wrote:
> >> --- a/xen/common/libx86/cpuid.c
> >> +++ b/xen/common/libx86/cpuid.c
> >> @@ -34,6 +34,100 @@ const uint32_t *x86_cpuid_lookup_deep_deps(uint32_t
> >> fe
>>> On 04.07.18 at 18:35, wrote:
> On Wed, Jul 04, 2018 at 09:27:43AM -0600, Jan Beulich wrote:
>> >>> On 04.07.18 at 16:01, wrote:
>> > On Mon, Jun 25, 2018 at 09:36:07AM -0600, Jan Beulich wrote:
>> >> >>> On 19.06.18 at 16:35, wrote:
>> >> > $(D)$(DEBUG_DIR)/$(T)-syms-$(XEN_FULLVERSION).map
>
On Thu, Jul 05, 2018 at 10:06:52AM +0200, Roger Pau Monné wrote:
> On Thu, Jul 05, 2018 at 08:53:51AM +0100, Wei Liu wrote:
> > On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
> > > So a fair amount of the discussion was about what it would look like,
> > > and what it would take, to
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 04 July 2018 14:32
> To: xen-de...@lists.xen.org
> Cc: Ian Jackson ; Wei Liu ;
> jbeul...@suse.com; Andrew Cooper ; Paul
> Durrant ; Alexandru Isaila
>
> Subject: [PATCH v10 07/11] x86/hvm: Introduce
> v
On Mon, Jun 04, 2018 at 12:47:52PM -0600, Charles Arnold wrote:
> Any opinions regarding this patch?
TBH I don't think blindly bumping the limit is a good idea. There has
been work going on to improve this area, but that's not going to finish
any time soon.
Wei.
_
> On Jul 5, 2018, at 8:53 AM, Wei Liu wrote:
>
> On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
>>
>>
>>> On Jul 3, 2018, at 11:07 AM, Roger Pau Monné wrote:
>>>
>>> On Mon, Jul 02, 2018 at 06:03:39PM +, Lars Kurth wrote:
We then had a discussion around why the posi
>>> On 04.07.18 at 18:44, wrote:
>
>> On Jul 4, 2018, at 4:38 PM, Jan Beulich wrote:
>>
> On 04.07.18 at 16:05, wrote:
On Jul 2, 2018, at 7:34 AM, Jan Beulich wrote:
>>> On 29.06.18 at 18:39, wrote:
> On 06/29/2018 06:38 PM, Jan Beulich wrote:
> On 28.06.18 at 15:00
On 05/07/18 09:53, Wei Liu wrote:
> On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
>>
>>
>>> On Jul 3, 2018, at 11:07 AM, Roger Pau Monné wrote:
>>>
>>> On Mon, Jul 02, 2018 at 06:03:39PM +, Lars Kurth wrote:
We then had a discussion around why the positive benefits didn't
Philippe Mathieu-Daudé writes:
> Nothing exciting here, patches created mechanically
> (common after soft freeze).
Cc: qemu-trivial
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 04 July 2018 14:32
> To: xen-de...@lists.xen.org
> Cc: Ian Jackson ; Wei Liu ;
> jbeul...@suse.com; Andrew Cooper ; Paul
> Durrant ; Alexandru Isaila
>
> Subject: [PATCH v10 08/11] x86/hvm: Add handler f
>>> On 04.07.18 at 18:48, wrote:
> On Wed, Jul 04, 2018 at 09:34:09AM -0600, Jan Beulich wrote:
>> >>> On 04.07.18 at 16:25, wrote:
>> > On Thu, Jun 28, 2018 at 07:51:52AM -0600, Jan Beulich wrote:
>> >> >>> On 19.06.18 at 16:35, wrote:
>> >> > Then rename xen.mb.efi to xen.efi and drop all rela
>>> On 04.07.18 at 18:23, wrote:
> On 04/07/18 09:51, Jan Beulich wrote:
> On 04.07.18 at 10:42, wrote:
>>> On Tue, Jul 03, 2018 at 09:55:19PM +0100, Andrew Cooper wrote:
--- a/xen/include/public/arch-x86/xen.h
+++ b/xen/include/public/arch-x86/xen.h
@@ -314,6 +314,17 @@ struct
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 04 July 2018 14:32
> To: xen-de...@lists.xen.org
> Cc: Ian Jackson ; Wei Liu ;
> jbeul...@suse.com; Andrew Cooper ; Paul
> Durrant ; Alexandru Isaila
>
> Subject: [PATCH v10 01/11] x86/cpu: Introduce vmc
On Thu, Jul 05, 2018 at 09:19:10AM +0100, Wei Liu wrote:
> On Thu, Jul 05, 2018 at 10:06:52AM +0200, Roger Pau Monné wrote:
> > On Thu, Jul 05, 2018 at 08:53:51AM +0100, Wei Liu wrote:
> > > On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
> > > > So a fair amount of the discussion wa
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 04 July 2018 14:32
> To: xen-de...@lists.xen.org
> Cc: Ian Jackson ; Wei Liu ;
> jbeul...@suse.com; Andrew Cooper ; Paul
> Durrant ; Alexandru Isaila
>
> Subject: [PATCH v10 02/11] x86/hvm: Introduce hvm
On Thu, Jul 05, 2018 at 09:28:07AM +0100, George Dunlap wrote:
>
>
> > On Jul 5, 2018, at 8:53 AM, Wei Liu wrote:
> >
> > On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
> >>
> >>
> >>> On Jul 3, 2018, at 11:07 AM, Roger Pau Monné wrote:
> >>>
> >>> On Mon, Jul 02, 2018 at 06
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 04 July 2018 14:32
> To: xen-de...@lists.xen.org
> Cc: Ian Jackson ; Wei Liu ;
> jbeul...@suse.com; Andrew Cooper ; Paul
> Durrant ; Alexandru Isaila
>
> Subject: [PATCH v10 03/11] x86/hvm: Introduce hvm
>>> On 04.07.18 at 18:46, wrote:
> On 04/07/18 10:01, Jan Beulich wrote:
> On 03.07.18 at 22:55, wrote:
>>> --- a/xen/common/libx86/cpuid.c
>>> +++ b/xen/common/libx86/cpuid.c
>>> @@ -34,6 +34,100 @@ const uint32_t *x86_cpuid_lookup_deep_deps(uint32_t
>>> feature)
>>> }
>>>
>>> /*
>>> +
On Thu, Jul 05, 2018 at 10:43:38AM +0200, Roger Pau Monné wrote:
> On Thu, Jul 05, 2018 at 09:19:10AM +0100, Wei Liu wrote:
> > On Thu, Jul 05, 2018 at 10:06:52AM +0200, Roger Pau Monné wrote:
> > > On Thu, Jul 05, 2018 at 08:53:51AM +0100, Wei Liu wrote:
> > > > On Wed, Jul 04, 2018 at 03:26:16PM
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 04 July 2018 14:32
> To: xen-de...@lists.xen.org
> Cc: Ian Jackson ; Wei Liu ;
> jbeul...@suse.com; Andrew Cooper ; Paul
> Durrant ; Alexandru Isaila
>
> Subject: [PATCH v10 04/11] x86/hvm: Introduce
> h
On Jo, 2018-07-05 at 08:33 +, Paul Durrant wrote:
> >
> > -Original Message-
> > From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> > Sent: 04 July 2018 14:32
> > To: xen-de...@lists.xen.org
> > Cc: Ian Jackson ; Wei Liu > com>;
> > jbeul...@suse.com; Andrew Cooper ; Paul
> > D
>>> On 04.07.18 at 18:56, wrote:
> On 04/07/18 10:16, Jan Beulich wrote:
>>
>>> @@ -325,6 +325,13 @@ typedef struct xen_cpuid_leaf {
>>> } xen_cpuid_leaf_t;
>>> DEFINE_XEN_GUEST_HANDLE(xen_cpuid_leaf_t);
>>>
>>> +typedef struct xen_msr_entry {
>>> +uint32_t idx;
>>> +uint32_t flags; /*
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 04 July 2018 14:32
> To: xen-de...@lists.xen.org
> Cc: Ian Jackson ; Wei Liu ;
> jbeul...@suse.com; Andrew Cooper ; Paul
> Durrant ; Alexandru Isaila
>
> Subject: [PATCH v10 05/11] x86/hvm: Introduce hvm
>>> On 04.07.18 at 19:15, wrote:
> On 04/07/18 10:22, Jan Beulich wrote:
> On 03.07.18 at 22:55, wrote:
>>> This is mainly prep work for the following patch, but this specific
>>> abstraction is also specifically useful for the future auditing logic.
>>>
>>> Not all of msr_vcpu_policy will be
On Thu, Jul 05, 2018 at 10:31:10AM +0200, Juergen Gross wrote:
> On 05/07/18 09:53, Wei Liu wrote:
> > On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
> >>
> >>
> >>> On Jul 3, 2018, at 11:07 AM, Roger Pau Monné wrote:
> >>>
> >>> On Mon, Jul 02, 2018 at 06:03:39PM +, Lars Kurth
On Jo, 2018-07-05 at 08:41 +, Paul Durrant wrote:
> >
> > -Original Message-
> > From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> > Sent: 04 July 2018 14:32
> > To: xen-de...@lists.xen.org
> > Cc: Ian Jackson ; Wei Liu > com>;
> > jbeul...@suse.com; Andrew Cooper ; Paul
> > D
On Thu, Jul 05, 2018 at 09:47:43AM +0100, Wei Liu wrote:
> On Thu, Jul 05, 2018 at 10:43:38AM +0200, Roger Pau Monné wrote:
> > On Thu, Jul 05, 2018 at 09:19:10AM +0100, Wei Liu wrote:
> > > On Thu, Jul 05, 2018 at 10:06:52AM +0200, Roger Pau Monné wrote:
> > > > On Thu, Jul 05, 2018 at 08:53:51AM
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 04 July 2018 14:32
> To: xen-de...@lists.xen.org
> Cc: Ian Jackson ; Wei Liu ;
> jbeul...@suse.com; Andrew Cooper ; Paul
> Durrant ; Alexandru Isaila
>
> Subject: [PATCH v10 06/11] x86/hvm: Introduce hvm
>>> On 04.07.18 at 19:57, wrote:
> On 04/07/18 10:43, Jan Beulich wrote:
>>> --- a/xen/arch/x86/sysctl.c
>>> +++ b/xen/arch/x86/sysctl.c
>>> @@ -32,22 +32,32 @@
>>> #include
>>>
>>> const struct policy_group system_policies[] = {
>>> -{
>>> +[ XEN_SYSCTL_cpumsr_policy_raw ] = {
>> Aha
On Thu, Jul 05, 2018 at 10:55:49AM +0200, Roger Pau Monné wrote:
> On Thu, Jul 05, 2018 at 09:47:43AM +0100, Wei Liu wrote:
> > On Thu, Jul 05, 2018 at 10:43:38AM +0200, Roger Pau Monné wrote:
> > > On Thu, Jul 05, 2018 at 09:19:10AM +0100, Wei Liu wrote:
> > > > On Thu, Jul 05, 2018 at 10:06:52AM
flight 74938 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74938/
Perfect :-)
All tests in this flight passed as required
baseline version:
flight 74919
jobs:
build-amd64 pass
build-armh
>>> On 04.07.18 at 20:47, wrote:
> On 04/07/18 11:16, Jan Beulich wrote:
> On 03.07.18 at 22:55, wrote:
>>> From: Sergey Dyasli
>>>
>>> This hypercall allows the toolstack to present one combined CPUID and MSR
>>> policy for a domain, which can be audited in one go by Xen, which is
>>> nece
On Mon, Jul 02, 2018 at 05:18:15PM +0100, Julien Grall wrote:
> Hi Lars,
>
> It looks like this series has never been merged. Do you know that state of
> it?
>
> The first patch is going to avoid contributors to CC both xen.org and
> xenproject.org if they follow the script add_maintainers.pl. Th
On 05/07/18 10:48, Wei Liu wrote:
On Mon, Jul 02, 2018 at 05:18:15PM +0100, Julien Grall wrote:
Hi Lars,
It looks like this series has never been merged. Do you know that state of
it?
The first patch is going to avoid contributors to CC both xen.org and
xenproject.org if they follow the scri
>>> On 05.07.18 at 10:54, wrote:
> On Jo, 2018-07-05 at 08:41 +, Paul Durrant wrote:
>> > From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
>> > Sent: 04 July 2018 14:32
>> > --- a/xen/arch/x86/cpu/mcheck/vmce.c
>> > +++ b/xen/arch/x86/cpu/mcheck/vmce.c
>> > @@ -349,6 +349,18 @@ int vmce
On Tue, Jun 26, 2018 at 01:19:43AM -0600, Jan Beulich wrote:
> When booting Xen via UEFI the Xen config file can contain multiple
> sections each describing different boot options. It is currently only
> possible to choose which section to boot with if the buffer contains a
> string. UEFI provides
On Wed, Jul 04, 2018 at 12:39:15PM -0300, Philippe Mathieu-Daudé wrote:
> Patch created mechanically by rerunning:
>
> $ spatch --sp-file scripts/coccinelle/typecast.cocci \
> --macro-file scripts/cocci-macro-file.h \
> --dir . --in-place
>
> Signed-off-by: Philippe Mat
On 4 July 2018 at 16:39, Philippe Mathieu-Daudé wrote:
> Patch created mechanically by rerunning:
>
> $ spatch --sp-file scripts/coccinelle/typecast.cocci \
> --macro-file scripts/cocci-macro-file.h \
> --dir . --in-place
>
> Signed-off-by: Philippe Mathieu-Daudé
> ---
On 04/07/18 20:16, Karl Johnson wrote:
> Hello,
>
> I'm building dom0 kernel RPMs for the CentOS Xen project
> (https://github.com/CentOS-virt7/xen-kernel) and it seems that the 4.9
> branch isn't booting anymore as dom0. I recently built 4.9.110 and
> 4.9.111, both give black screen and reboot wh
On 05/07/18 09:11, Wei Liu wrote:
> On Wed, Jul 04, 2018 at 05:46:29PM +0100, Andrew Cooper wrote:
>> On 04/07/18 10:01, Jan Beulich wrote:
>> On 03.07.18 at 22:55, wrote:
--- a/xen/common/libx86/cpuid.c
+++ b/xen/common/libx86/cpuid.c
@@ -34,6 +34,100 @@ const uint32_t *x86_cpu
Wei Liu writes ("[PATCH v2 1/6] Tools.mk.in: drop unused variables"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
Wei Liu writes ("[PATCH v2 2/6] ipxe: produce a single binary from its build"):
> And switch hvmloader/Makefile to use that binary. This will help later
> when we change hvmloader to pick a user provided binary.
>
> No functional change.
>
> Signed-off-by: Wei Liu
> Acked-by: Jan Beulich
Acked
Wei Liu writes ("[PATCH v3 3/6] libxc: allow HVM guest to have modules"):
> Lift the loading code out of PVH specific branch. Take the chance to
> make the debug message more useful. Now the code needs to take into
> account virt_base.
I'm afraid this commit message's note about virt_base is a bi
On Thu, Jul 05, 2018 at 11:29:41AM +0100, Ian Jackson wrote:
> Wei Liu writes ("[PATCH v3 3/6] libxc: allow HVM guest to have modules"):
> > Lift the loading code out of PVH specific branch. Take the chance to
> > make the debug message more useful. Now the code needs to take into
> > account virt
On Thu, Jul 05, 2018 at 11:34:27AM +0100, Wei Liu wrote:
> On Thu, Jul 05, 2018 at 11:29:41AM +0100, Ian Jackson wrote:
> > Wei Liu writes ("[PATCH v3 3/6] libxc: allow HVM guest to have modules"):
> > > Lift the loading code out of PVH specific branch. Take the chance to
> > > make the debug messa
Wei Liu writes ("[PATCH v3 5/6] tools: provide --with-system-ipxe"):
> Signed-off-by: Wei Liu
But actually I think the effect of --with-system-ipxe is to simply not
load any ipxe. Surely that isn't right ?
Perhaps I am just misunderstanding something, in which case more
words (perhaps in the co
Wei Liu writes ("[Xen-devel] [PATCH v3 4/6] tools: load IPXE from standalone
file"):
> Do not embed IPXE into Rombios anymore. Instead, it is loaded by the
> toolstack from a file as a separate module.
...
> -void (*bios_load)(const struct bios_config *config, void *addr, uint32_t
> size);
>
Wei Liu writes ("[PATCH v3 6/6] tools: --with-system-{ovmf,seabios,ipxe} should
provide absolute paths"):
> The paths shouldn't be set to "yes".
This is rather anomalous compared to the way that --with-system-blah
normally works. Surely, instead, we should search for the right thing
and use it ?
flight 124938 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124938/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt6 libvirt-buildfail REGR. vs. 123554
test-amd64-amd64-ex
Wei Liu writes ("Re: [PATCH v3 3/6] libxc: allow HVM guest to have modules"):
> In case virt_base is not set, it should be treated as zero.
Why ?
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listin
Wei Liu writes ("Re: [PATCH v3 3/6] libxc: allow HVM guest to have modules"):
> On Thu, Jul 05, 2018 at 11:29:41AM +0100, Ian Jackson wrote:
> > AIUI you mean something more like
> >
> > Now the code needs to handle virt_base being UNSET_ADDR, which it is
> > for HVM guests. In that case seg.
On 05/07/18 10:43, Roger Pau Monné wrote:
> On Thu, Jul 05, 2018 at 09:19:10AM +0100, Wei Liu wrote:
>> On Thu, Jul 05, 2018 at 10:06:52AM +0200, Roger Pau Monné wrote:
>>> On Thu, Jul 05, 2018 at 08:53:51AM +0100, Wei Liu wrote:
On Wed, Jul 04, 2018 at 03:26:16PM +, George Dunlap wrote:
>
The p2m_access_to_xenmem_access() converts a p2m_access_t to a
xenmem_access_t. It is complementary to xenmem_access_to_p2m_access().
It is currently only used by _p2m_get_mem_access().
Signed-off-by: Adrian Pop
---
xen/arch/x86/mm/mem_access.c | 41 +---
1 file
Both altp2m get/set memaccess functions use the struct
xen_hvm_altp2m_mem_access which has now dropped the `set' part and has
been renamed from xen_hvm_altp2m_set_mem_access.
Signed-off-by: Adrian Pop
---
tools/libxc/include/xenctrl.h | 3 +++
tools/libxc/xc_altp2m.c | 33
Currently there is a subop for setting the memaccess of a page, but not
for consulting it. The new HVMOP_altp2m_get_mem_access adds this
functionality.
Changes in v2:
- use the _p2m_get_mem_access helper from p2m_get_mem_access
- minor Arm adjustments
- move out the addition of a memaccess helper
On Thu, Jul 05, 2018 at 11:41:32AM +0100, Ian Jackson wrote:
> Wei Liu writes ("[PATCH v3 6/6] tools: --with-system-{ovmf,seabios,ipxe}
> should provide absolute paths"):
> > The paths shouldn't be set to "yes".
>
> This is rather anomalous compared to the way that --with-system-blah
> normally w
On Thu, Jul 05, 2018 at 11:40:36AM +0100, Ian Jackson wrote:
> Wei Liu writes ("[PATCH v3 5/6] tools: provide --with-system-ipxe"):
> > Signed-off-by: Wei Liu
>
> But actually I think the effect of --with-system-ipxe is to simply not
> load any ipxe. Surely that isn't right ?
Its purpose is for
On Thu, Jul 05, 2018 at 11:42:50AM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH v3 3/6] libxc: allow HVM guest to have modules"):
> > In case virt_base is not set, it should be treated as zero.
>
> Why ?
Virt_base is the virtual address base for loading a binary. If it is not
set it sh
On Thu, Jul 05, 2018 at 11:42:34AM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH v3 3/6] libxc: allow HVM guest to have modules"):
> > On Thu, Jul 05, 2018 at 11:29:41AM +0100, Ian Jackson wrote:
> > > AIUI you mean something more like
> > >
> > > Now the code needs to handle virt_base
On Thu, Jul 05, 2018 at 11:39:46AM +0100, Ian Jackson wrote:
> Wei Liu writes ("[Xen-devel] [PATCH v3 4/6] tools: load IPXE from standalone
> file"):
> > Do not embed IPXE into Rombios anymore. Instead, it is loaded by the
> > toolstack from a file as a separate module.
> ...
> > -void (*bios_
On 05/07/18 12:19, Juergen Gross wrote:
> On 04/07/18 20:16, Karl Johnson wrote:
>> Hello,
>>
>> I'm building dom0 kernel RPMs for the CentOS Xen project
>> (https://github.com/CentOS-virt7/xen-kernel) and it seems that the 4.9
>> branch isn't booting anymore as dom0. I recently built 4.9.110 and
>
On 05/07/2018, 10:50, "Julien Grall" wrote:
On 05/07/18 10:48, Wei Liu wrote:
> On Mon, Jul 02, 2018 at 05:18:15PM +0100, Julien Grall wrote:
>> Hi Lars,
>>
>> It looks like this series has never been merged. Do you know that state
of
>> it?
>>
>> The
Lars Kurth writes ("Re: [Xen-devel] [Notes for xen summit 2018 design session]
Process changes: is the 6 monthly release Cadence too short, Security Process,
..."):
> * The Gitlab machinery will do build tests (and the discussion
> showed that we should be able to do this via cross compilation
Juergen Gross writes ("Re: [Xen-devel] [Notes for xen summit 2018 design
session] Process changes: is the 6 monthly release Cadence too short, Security
Process, ..."):
> We didn't look at the sporadic failing tests thoroughly enough. The
> hypercall buffer failure has been there for ages, a newer
> On Jul 5, 2018, at 12:05 PM, Ian Jackson wrote:
>
> Lars Kurth writes ("Re: [Xen-devel] [Notes for xen summit 2018 design
> session] Process changes: is the 6 monthly release Cadence too short,
> Security Process, ..."):
>> * The Gitlab machinery will do build tests (and the discussion
>>
Wei Liu writes ("Re: [Xen-devel] [Notes for xen summit 2018 design session]
Process changes: is the 6 monthly release Cadence too short, Security Process,
..."):
> Osstest is really resource intense and heavy weight. We need to think of
> a way to reduce its turnaround time. Or we can introduce
Wei Liu writes ("Re: [Xen-devel] [Notes for xen summit 2018 design session]
Process changes: is the 6 monthly release Cadence too short, Security Process,
..."):
> It is more the case that one incomplete fix blocks all other valid
> fixes, so the time from staging to msater is even longer.
>
> (
> On Jul 5, 2018, at 12:16 PM, Ian Jackson wrote:
>
> Juergen Gross writes ("Re: [Xen-devel] [Notes for xen summit 2018 design
> session] Process changes: is the 6 monthly release Cadence too short,
> Security Process, ..."):
>> We didn't look at the sporadic failing tests thoroughly enough.
On 05/07/18 13:16, Ian Jackson wrote:
> Juergen Gross writes ("Re: [Xen-devel] [Notes for xen summit 2018 design
> session] Process changes: is the 6 monthly release Cadence too short,
> Security Process, ..."):
>> We didn't look at the sporadic failing tests thoroughly enough. The
>> hypercall b
On 05/07/18 12:18, George Dunlap wrote:
>
>>>Another potential problems showed up last week: OSSTEST is using the
>>>Debian servers for doing the basic installation. A change there (e.g.
>>>a new point release) will block tests. I'd prefer to have a local cache
>>>of the last known
>>> On 05.07.18 at 11:59, wrote:
> On Tue, Jun 26, 2018 at 01:19:43AM -0600, Jan Beulich wrote:
>> When booting Xen via UEFI the Xen config file can contain multiple
>> sections each describing different boot options. It is currently only
>> possible to choose which section to boot with if the buf
Hi,
I started to work on building Vagrant boxes for Xen, in order to
have reproducible environments when testing my VMI tools,
and try out the latest release without having to mess with my distro.
I want to share my work as it might be useful for other Xen developers as well:
https://github.com/W
On 05/07/18 13:51, Andrew Cooper wrote:
> On 05/07/18 12:18, George Dunlap wrote:
>>
Another potential problems showed up last week: OSSTEST is using the
Debian servers for doing the basic installation. A change there (e.g.
a new point release) will block tests. I'd prefer t
Hi all,
at some point we need to take a step back and summarize this discussion and
establish
a) what seems to be agreed
b) what is possible
c) and what is controversial
I am sort of volunteering for this and was planning to do so tomorrow.
Lars
On 05/07/2018, 13:20, "Juergen Gross" wrote:
On 05/07/18 13:00, Jan Beulich wrote:
On 05.07.18 at 11:59, wrote:
>> On Tue, Jun 26, 2018 at 01:19:43AM -0600, Jan Beulich wrote:
>>> When booting Xen via UEFI the Xen config file can contain multiple
>>> sections each describing different boot options. It is currently only
>>> possible to c
>>> On 05.07.18 at 14:57, wrote:
> On 05/07/18 13:00, Jan Beulich wrote:
> On 05.07.18 at 11:59, wrote:
>>> On Tue, Jun 26, 2018 at 01:19:43AM -0600, Jan Beulich wrote:
When booting Xen via UEFI the Xen config file can contain multiple
sections each describing different boot options
>>> On 07.05.18 at 15:40, wrote:
> --- a/xen/include/asm-x86/monitor.h
> +++ b/xen/include/asm-x86/monitor.h
> @@ -84,7 +84,8 @@ static inline uint32_t arch_monitor_get_capabilities(struct
> domain *d)
> (1U << XEN_DOMCTL_MONITOR_EVENT_DEBUG_EXCEPTION) |
>
On 05/07/18 09:46, Jan Beulich wrote:
On 04.07.18 at 18:46, wrote:
>> On 04/07/18 10:01, Jan Beulich wrote:
>> On 03.07.18 at 22:55, wrote:
--- a/xen/common/libx86/cpuid.c
+++ b/xen/common/libx86/cpuid.c
@@ -34,6 +34,100 @@ const uint32_t *x86_cpuid_lookup_deep_deps(uint32
>>> On 11.05.18 at 13:11, wrote:
> Signed-off-by: Alexandru Isaila
> ---
> xen/include/asm-x86/monitor.h | 13 +
> 1 file changed, 5 insertions(+), 8 deletions(-)
>
> diff --git a/xen/include/asm-x86/monitor.h b/xen/include/asm-x86/monitor.h
> index c5a86d1..7ef2aa2 100644
> --- a/x
On 05/07/18 09:40, Jan Beulich wrote:
On 04.07.18 at 18:23, wrote:
>> On 04/07/18 09:51, Jan Beulich wrote:
>> On 04.07.18 at 10:42, wrote:
On Tue, Jul 03, 2018 at 09:55:19PM +0100, Andrew Cooper wrote:
> --- a/xen/include/public/arch-x86/xen.h
> +++ b/xen/include/public/arc
flight 124942 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124942/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64
On Wed, Jul 04, 2018 at 12:39:11PM -0300, Philippe Mathieu-Daudé wrote:
> Nothing exciting here, patches created mechanically
> (common after soft freeze).
Acked-by: Michael S. Tsirkin
> Philippe Mathieu-Daudé (8):
> qobject: Catch another straggler for use of qdict_put_str()
> error: Remove
During early boot timestamps aren't very useful, as they're all zero
(in "boot" mode) or absent altogether (in "date" and "datems" modes).
Log "boot" format timestamps when the date formats aren't available yet,
and log raw timestamps when boot ones are still all zero. Also add a
"raw" mode.
For t
First of all introduce a helper function instead of replicating almost
the same code for PV and HVM. The differences between the two pieces of
code actually points out an issue (which is also addressed here): In
the HVM case FCW would not have been set to FCW_RESET in certain cases
(note for exampl
>>> On 05.07.18 at 15:39, wrote:
> On 05/07/18 09:40, Jan Beulich wrote:
> On 04.07.18 at 18:23, wrote:
>>> On 04/07/18 09:51, Jan Beulich wrote:
>>> On 04.07.18 at 10:42, wrote:
> On Tue, Jul 03, 2018 at 09:55:19PM +0100, Andrew Cooper wrote:
>> --- a/xen/include/public/arch-x86
On 05/07/18 10:08, Jan Beulich wrote:
On 04.07.18 at 19:57, wrote:
>> On 04/07/18 10:43, Jan Beulich wrote:
--- a/xen/arch/x86/sysctl.c
+++ b/xen/arch/x86/sysctl.c
@@ -32,22 +32,32 @@
#include
const struct policy_group system_policies[] = {
-{
From: Ian Jackson
So that the contents of the runvar can be expanded. There are
currently two ways to do this:
- Using += will append to the end of the runvar.
- Using ,= will append to the end of the runvar using ',' as the
separator.
Note that if the runvar is empty {,|+}= just sets the
The default make on FreeBSD is the BSD make, and Xen requires the GNU
make in order to build. Set the make command based on the OS for the
Xen build.
Signed-off-by: Roger Pau Monné
---
Changes since v1:
- Use gmake for all BSDs.
---
ts-xen-build | 11 ++-
1 file changed, 6 insertions(+)
Hello,
The first 4 patches in this patch series prevent FreeBSD jobs from
running on boxes booting from UEFI. This is needed due to osstest lack
of support for installing FreeBSD from UEFI at the moment.
Last two patches add support for creating Xen build jobs running on
FreeBSD. Such a job is ad
Into a helper.
Signed-off-by: Roger Pau Monné
---
make-freebsd-flight | 24 +---
mfi-common | 14 ++
2 files changed, 19 insertions(+), 19 deletions(-)
diff --git a/make-freebsd-flight b/make-freebsd-flight
index 1a2b359c..6c530ebe 100755
--- a/make-free
The set_freebsd_runvars helper in mfi-common is a superset of the
original function present in make-freebsd-flight, and will attempt to
fetch the last anointed FreeBSD build as a last resort option if no
FreeBSD build is signaled from the FreeBSD env vars. There's no reason
to have this duplication
To both the FreeBSD and the xen-unstable flights.
This is the runvar difference of a xen-unstable flight:
+build-amd64-xen-freebsd all_host_os freebsd
+build-amd64-xen-xsm-freebsd all_host_os freebsd
+build-amd64-xen-freebsd all_hostflagsPropEq:Firmware:bios:bios
+build-amd6
There's no support yet in osstest to install FreeBSD from UEFI, so for
the time being limit the FreeBSD jobs to boxes booting with legacy
BIOS.
The hostflags are not set for examine jobs, in order to avoid them
from only running on BIOS boxes.
Signed-off-by: Roger Pau Monné
---
Note that this pa
On Tue, 2018-07-03 at 21:55 +0100, Andrew Cooper wrote:
> From: Sergey Dyasli
>
> This finally (after literally years of work!) marks the point where the
> toolstack can ask the hypervisor for the current CPUID configuration of a
> specific domain.
>
> Also extend xen-cpuid's --policy mode to be
1 - 100 of 167 matches
Mail list logo