flight 171540 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171540/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f193b945eac58ca379d3d21c77d5550b063580d6
baseline version:
ovmf e1eef3a8b01a25e75abf6
On 06.07.2022 19:01, Borislav Petkov wrote:
> On Wed, Jul 06, 2022 at 08:17:41AM +0200, Jan Beulich wrote:
>> Sure, but that alone won't help.
>
> Well, the MTRR code looks at X86_FEATURE_MTRR. If Xen doesn't expose the
> MTRRs, then that bit should be clear in the CPUID the guest sees.
>
> So in
On 05.07.2022 14:41, Jan Beulich wrote:
> For a long time we've been rather inefficient with IOMMU page table
> management when not sharing page tables, i.e. in particular for PV (and
> further specifically also for PV Dom0) and AMD (where nowadays we never
> share page tables). While up to about 3
flight 171537 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171537/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit1 8 xen-boot fail REGR. vs. 171277
test-amd64-amd64-li
Hi Stefano and julien
> -Original Message-
> From: Stefano Stabellini
> Sent: Thursday, July 7, 2022 7:53 AM
> To: Penny Zheng
> Cc: Stefano Stabellini ; Julien Grall
> ;
> xen-devel@lists.xenproject.org; Wei Chen ; Bertrand
> Marquis ; Volodymyr Babchuk
>
> Subject: RE: [PATCH v5 7/8]
Hi Xenia,
> -Original Message-
> From: Xen-devel On Behalf Of
> Xenia Ragiadakou
> Sent: Thursday, July 7, 2022 1:50 AM
> To: xen-devel@lists.xenproject.org
> Cc: Andrew Cooper ; George Dunlap
> ; Jan Beulich ; Julien Grall
> ; Stefano Stabellini ; Wei Liu
>
> Subject: [PATCH] xen/char:
> From: Jan Beulich
> Sent: Tuesday, July 5, 2022 8:45 PM
>
> Before actually enabling their use, provide a means to suppress it in
> case of problems. Note that using the option can also affect the sharing
> of page tables in the VT-d / EPT combination: If EPT would use large
> page mappings but
Hi Daniel,
> -Original Message-
> Subject: [PATCH v1 01/18] kconfig: allow configuration of maximum modules
>
> For x86 the number of allowable multiboot modules varies between the
> different
> entry points, non-efi boot, pvh boot, and efi boot. In the case of both Arm
> and
> x86 this v
Hi Daniel,
> -Original Message-
> Subject: [PATCH v1 08/18] kconfig: introduce domain builder config option
>
> Hyperlaunch domain builder is the consolidated boot time domain building
> logic
> framework. This commit introduces the first config option for the domain
> builder to control
Hi Daniel,
> -Original Message-
> Subject: [PATCH v1 06/18] fdt: make fdt handling reusable across arch
>
> This refactors reusable code from Arm's bootfdt.c and device-tree.h that is
> general fdt handling code. The Kconfig parameter CORE_DEVICE_TREE is
> introduced for when the ability
On Thu, 30 Jun 2022, Andrei Cherechesu (OSS) wrote:
> From: Andrei Cherechesu
>
> If the "BOOT_CMD" variable is set to "none" inside the config
> file, the boot command (i.e. "booti") will not by added to the
> generated script, to allow the user to customize the u-boot env
> or the device-tree a
flight 171536 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171536/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-pair broken
test-amd64-amd64-li
On Thu, 30 Jun 2022, Andrei Cherechesu (OSS) wrote:
> From: Andrei Cherechesu
>
> Added the "-a" parameter which stands for APPEND_EXTRA_CMDS option,
> which enables the user to specify the path to a text file that contains,
> on each line, u-boot commands that will be added to the generated scri
On Thu, 30 Jun 2022, Andrei Cherechesu (OSS) wrote:
> From: Andrei Cherechesu
>
> Added support for prepending path to file names in the final generated
> u-boot script, for the use-case where we have the files in a separate
> folder that can be accessed with a given $LOAD_CMD.
>
> For example,
On Mon, 4 Jul 2022, Penny Zheng wrote:
> Hi Stefano and Julien
>
> > -Original Message-
> > From: Stefano Stabellini
> > Sent: Saturday, June 25, 2022 5:57 AM
> > To: Julien Grall
> > Cc: Penny Zheng ; xen-devel@lists.xenproject.org;
> > Wei Chen ; Stefano Stabellini
> > ; Bertrand Marqu
On Wed, 6 Jul 2022, Xenia Ragiadakou wrote:
> Remove the definition of the function pv_console_evtchn(),
> when CONFIG_XEN_GUEST is not set, because the function is not used.
>
> Signed-off-by: Xenia Ragiadakou
Reviewed-by: Stefano Stabellini
> ---
> xen/include/xen/pv_console.h | 5 -
>
On Wed, 6 Jul 2022, Xenia Ragiadakou wrote:
> Add the function prototype of show_stack() in header file
> so that it is visible before its definition in traps.c.
>
> Although show_stack() is referenced only in traps.c, it is declared with
> external linkage because, during development, it is ofte
flight 171528 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171528/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit1 8 xen-boot fail REGR. vs. 171277
test-amd64-amd64-li
This commit begins the transtion over to domain builder by coverting
the dom0 creation logic into a generalized domain creation logic.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark
---
xen/arch/x86/Makefile| 1 +
xen/arch/x86/domain_builder.c| 128 +
The existing physmap code is specific to dom0. In this commit, the dom0 physmap
code is generalized for any domain and functions are renamed to reflect their
new general nature.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark
---
xen/arch/x86/include/asm/dom0_build.h | 2 +-
xen/
This enables domain builder to construct a hypfs tree to expose relevant domain
creation information for use by the boot domain and/or the runtime system.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark
---
xen/common/domain-builder/Kconfig | 11 ++
xen/common/domain-builder/Mak
Here, the vcpu initialization code for dom0 creation is generalized for use for
other domains.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark
---
xen/arch/x86/domain_builder.c | 14 +-
xen/arch/x86/hvm/dom0_build.c | 7 ---
xen/arch/x86/pv/dom0_build.c | 2 +-
The late pv helper is an example helper tool for late setup of Xenstore for a
domain that was created by the hypervisor using hyperlaunch.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark christopher.cl...@starlab.io
---
.gitignore| 1 +
tools/helpers/Makefile
This adds the ability to domain builder for the construction of multiple pv
domains at boot.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark
---
xen/arch/x86/dom0_build.c | 31 -
xen/arch/x86/domain_builder.c | 58 ++--
xen/arch/x86/in
This reworks all the dom0 page allocation functions for general domain
construction. Where possible, common logic between the two was split into a
separate function for reuse by the two functions.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark
---
xen/arch/x86/dom0_build.c
This commit introduces the domain builder configuration FDT parser along with
the domain builder core for domain creation. To enable domain builder to be a
cross architecture internal API, a new arch domain creation call is introduced
for use by the domain builder.
Signed-off-by: Daniel P. Smith
This commit is the first step in adopting domain builder. It goes through the
dom0 creation and construction functions, converting them over to consume
struct boot_domaain and changes the startup sequence to use the domain builder
to create and construct dom0.
Signed-off-by: Daniel P. Smith
Revie
This commit is to update the hyperlaunch device tree documentation to align
with the DTB parsing implementation.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark
---
.../designs/launch/hyperlaunch-devicetree.rst | 497 +++---
1 file changed, 306 insertions(+), 191 delet
This refactors reusable code from Arm's bootfdt.c and device-tree.h that is
general fdt handling code. The Kconfig parameter CORE_DEVICE_TREE is
introduced for when the ability of parsing DTB files is needed by a capability
such as hyperlaunch.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christo
Hyperlaunch domain builder is the consolidated boot time domain building logic
framework. This commit introduces the first config option for the domain
builder to control support for loading the domain configurations via the
flattened device tree.
Signed-off-by: Daniel P. Smith
Reviewed-by: Chri
This commit expands the new boot info structs to provide the initial
abstractions for domain builder. Additionally, it reuses the memory allocation
structures previously used for dom0, bring the structures and helper functions
under the domain builder.
Signed-off-by: Daniel P. Smith
Reviewed-by:
This refactors xen cmdline processing into a general framework
under the new boot info abstraction.
Signed-off-by: Daniel P. Smith
Reviewed-by: Christopher Clark
---
xen/arch/x86/include/asm/bootinfo.h | 49
xen/arch/x86/setup.c| 58 -
This previous commit added a transition point from multiboot v1 structures to
the new boot info structures at the earliest common point for all the x86
entrypoints. The result is that each of the entrypoints would construct a
multiboot v1 structure from the structures used by each entrypoint. This
This commit replaces the use of the multiboot v1 structures starting
at __start_xen(). The majority of this commit is converting the fields
being accessed for the startup calculations. While adapting the ucode
boot module location logic, this code was refactored to reduce some
of the unnecessary co
The x86 and Arm architectures represent in memory the general boot information
and boot modules differently despite having commonality. The x86
representations are bound to the multiboot v1 structures while the Arm
representations are a slightly generalized meta-data container for the boot
material
This work being submitted in this series was made possible with a great thanks
to Star Lab Cop ration and their generous funding of this project.
The patch series is based on the existing xsm series for starting the idle
domain privileged. After that, the first four commits were previously submitt
For x86 the number of allowable multiboot modules varies between the different
entry points, non-efi boot, pvh boot, and efi boot. In the case of both Arm and
x86 this value is fixed to values based on generalized assumptions. With
hyperlaunch for x86 and dom0less on Arm, use of static sizes result
On Wed, Jul 6, 2022 at 6:53 AM George Dunlap wrote:
>
Some alternative text for consideration for this patch:
Patch subject line: MAINTAINERS: Reassign XSM maintainership
> While mail hasn't been bouncing, Daniel De Graaf has not been
> responding to patch submissions or otherwise interacting w
On Wed, 6 Jul 2022, George Dunlap wrote:
> While mail hasn't been bouncing, Daniel De Graaf has not been
> responding to patch submissions or otherwise interacting with the
> community for several years. Daniel Smith has at least been working
> with the code, and is a regular member of our communi
On Tue, Jun 28, 2022 at 11:24 PM Juergen Gross wrote:
>
> On 24.03.22 15:01, Juergen Gross wrote:
> > Today most hypercall handlers have a return type of long, while the
> > compat ones return an int. There are a few exceptions from that rule,
> > however.
> >
> > Get rid of the exceptions by lett
flask_domain_alloc_security and flask_domain_create has special code to
magically label dom0 as dom0_t. This can all be streamlined by making
create_dom0 set ssidref before creating dom0.
create_domU is also extended to create domains with domU_t.
xsm_ssidref_domU and xsm_ssidref_dom0 are introd
flight 171525 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171525/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stopfail like 171512
test-armhf-armhf-libvirt 16 sav
flight 171535 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171535/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
Remove the definition of the function pv_console_evtchn(),
when CONFIG_XEN_GUEST is not set, because the function is not used.
Signed-off-by: Xenia Ragiadakou
---
xen/include/xen/pv_console.h | 5 -
1 file changed, 5 deletions(-)
diff --git a/xen/include/xen/pv_console.h b/xen/include/xen/p
On 06.07.2022 17:17, Anthony PERARD wrote:
> On Thu, Jun 09, 2022 at 05:52:45PM +0200, Jan Beulich wrote:
>> --- a/xen/Makefile
>> +++ b/xen/Makefile
>> @@ -465,6 +465,22 @@ endif
>> .PHONY: _build
>> _build: $(TARGET)$(CONFIG_XEN_INSTALL_SUFFIX)
>>
>> +# Strip
>> +#
>> +# INSTALL_EFI_STRIP, if
Reset ports, to force host system to re-enumerate devices. Otheriwse it
will require the cable to be re-plugged, or will wait in the
"configuring" state indefinitely.
Trick and code copied from Linux:
drivers/usb/early/xhci-dbc.c:xdbc_start()->xdbc_reset_debug_port()
Signed-off-by: Marek Marczyko
Re-use rmrr= parameter handling code to handle common device reserved
memory.
Signed-off-by: Marek Marczykowski-Górecki
---
xen/drivers/passthrough/vtd/dmar.c | 201 +-
1 file changed, 119 insertions(+), 82 deletions(-)
diff --git a/xen/drivers/passthrough/vtd/dmar.c
That's possible, because the capability was designed specifically to
allow separate driver handle it, in parallel to unmodified xhci driver
(separate set of registers, pretending the port is "disconnected" for
the main xhci driver etc). It works with Linux dom0, although requires
an awful hack - re
The important part is to include those buffers in IOMMU page table
relevant for the USB controller. Otherwise, DbC will stop working as
soon as IOMMU is enabled, regardless of to which domain device assigned
(be it xen or dom0).
If the device is passed through to dom0 or other domain (see later
pat
Register common device reserved memory similar to how ivmd= parameter is
handled.
Signed-off-by: Marek Marczykowski-Górecki
---
xen/drivers/passthrough/amd/iommu_acpi.c | 16
1 file changed, 16 insertions(+)
diff --git a/xen/drivers/passthrough/amd/iommu_acpi.c
b/xen/drivers/p
This is integration of https://github.com/connojd/xue into mainline Xen.
This patch series includes several patches that I made in the process, some are
very loosely related.
The driver developed by Connor supports output-only console via USB3 debug
capability. The capability is designed to operat
Previously only one serial console was supported at the same time. Using
console=com1,dbgp,vga silently ignored all but last serial console (in
this case: only dbgp and vga were active).
Fix this by storing not a single sercon_handle, but an array of them, up
to MAX_SERCONS entries. The value of M
From: Connor Davis
[Connor]
Xue is a cross-platform USB 3 debugger that drives the Debug
Capability (DbC) of xHCI-compliant host controllers. This patch
implements the operations needed for xue to initialize the host
controller's DbC and communicate with it. It also implements a struct
uart_drive
Handle parameters similar to dbgp=ehci.
Implement this by not resettting xhc_cf8 again in xue_init_xhc(), but
using a value found there if non-zero. Additionally, add xue->xhc_num to
select n-th controller.
Signed-off-by: Marek Marczykowski-Górecki
---
Changes in v2:
- unsigned int xhc_num
- c
Add API similar to rmrr= and ivmd= arguments, but in a common code. This
will allow drivers to register reserved memory regardless of the IOMMU
vendor.
The direct reason for this API is xhci-dbc console driver (aka xue),
that needs to use DMA. But future change may unify command line
arguments for
branch xen-unstable-smoke
xenbranch xen-unstable-smoke
job test-arm64-arm64-xl-xsm
testid xen-boot
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/x
On Thu, Jun 09, 2022 at 05:52:45PM +0200, Jan Beulich wrote:
> With debug info retained, xen.efi can be quite large. Unlike for xen.gz
> there's no intermediate step (mkelf32 there) involved which would strip
> debug info kind of as a side effect. While the installing of xen.efi on
> the EFI partit
flight 171529 xen-unstable-smoke real [real]
flight 171533 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/171529/
http://logs.test-lab.xenproject.org/osstest/logs/171533/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which co
On Wed, Jun 8, 2022 at 4:47 PM Peter Zijlstra wrote:
>
> vmlinux.o: warning: objtool: io_idle+0xc: call to __inb.isra.0() leaves
> .noinstr.text section
> vmlinux.o: warning: objtool: acpi_idle_enter+0xfe: call to num_online_cpus()
> leaves .noinstr.text section
> vmlinux.o: warning: objtool: ac
On Wed, Jun 8, 2022 at 4:46 PM Peter Zijlstra wrote:
>
> Current arch_cpu_idle() is called with IRQs disabled, but will return
> with IRQs enabled.
>
> However, the very first thing the generic code does after calling
> arch_cpu_idle() is raw_local_irq_disable(). This means that
> architectures th
On Wed, Jun 8, 2022 at 4:46 PM Peter Zijlstra wrote:
>
> The __cpuidle functions will become a noinstr class, as such they need
> explicit annotations.
>
> Signed-off-by: Peter Zijlstra (Intel)
Reviewed-by: Rafael J. Wysocki
> ---
> drivers/cpuidle/poll_state.c |6 +-
> 1 file changed
On Wed, Jun 8, 2022 at 4:47 PM Peter Zijlstra wrote:
>
> All the idle routines are called with RCU disabled, as such there must
> not be any tracing inside.
>
> Signed-off-by: Peter Zijlstra (Intel)
This actually does some additional code duplication cleanup which
would be good to mention in the
On Wed, Jun 8, 2022 at 4:47 PM Peter Zijlstra wrote:
>
> cpuidle_state::enter() methods should be IRQ invariant
>
> Signed-off-by: Peter Zijlstra (Intel)
Reviewed-by: Rafael J. Wysocki
> ---
> drivers/cpuidle/poll_state.c |4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
> --- a
On Wed, Jun 8, 2022 at 4:47 PM Peter Zijlstra wrote:
>
> Make cpuidle_enter_state() consistent with the s2idle variant and
> verify ->enter() always returns with interrupts disabled.
>
> Signed-off-by: Peter Zijlstra (Intel)
> ---
> drivers/cpuidle/cpuidle.c | 10 +-
> 1 file changed,
While mail hasn't been bouncing, Daniel De Graaf has not been
responding to patch submissions or otherwise interacting with the
community for several years. Daniel Smith has at least been working
with the code, and is a regular member of our community; and he has
agreed to step up into the role.
flight 171520 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171520/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 151777
build-arm64-libvirt
flight 171516 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171516/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
build-arm64-pvops
Add the function prototype of show_stack() in header file
so that it is visible before its definition in traps.c.
Although show_stack() is referenced only in traps.c, it is declared with
external linkage because, during development, it is often called also by
other files for debugging purposes. D
Hi Jan
> On 5 Jul 2022, at 4:42 pm, Jan Beulich wrote:
>
> On 05.07.2022 17:22, Julien Grall wrote:
>> Hi Jan,
>>
>> On 05/07/2022 16:11, Jan Beulich wrote:
>>> On 22.06.2022 16:38, Rahul Singh wrote:
@@ -387,8 +392,19 @@ int evtchn_bind_interdomain(evtchn_bind_interdomain_t
*bind)
>
Hi Julien,
> On 5 Jul 2022, at 4:22 pm, Julien Grall wrote:
>
> Hi Jan,
>
> On 05/07/2022 16:11, Jan Beulich wrote:
>> On 22.06.2022 16:38, Rahul Singh wrote:
>>> @@ -387,8 +392,19 @@ int evtchn_bind_interdomain(evtchn_bind_interdomain_t
>>> *bind)
>>> spin_lock(&ld->event_lock);
>>> }
>>> - i
Add the function prototype of show_stack() in header file
so that it is visible before its definition in traps.c.
Although show_stack() is referenced only in traps.c, it is declared with
external linkage because, during development, it is often called also by
other files for debugging purposes. D
Hi Jan,
> On 5 Jul 2022, at 4:13 pm, Jan Beulich wrote:
>
> On 22.06.2022 16:38, Rahul Singh wrote:
>> evtchn_bind_interdomain() finds the local domain from "current->domain"
>> pointer.
>>
>> evtchn_bind_interdomain() will be called from the XEN to support static
>> event channel during domain
Hi Jan,
> On 5 Jul 2022, at 3:56 pm, Jan Beulich wrote:
>
> On 22.06.2022 16:37, Rahul Singh wrote:
>> Event channel support will be added for dom0less domains to allocate
>> static event channel. It is necessary to have access to the
>> evtchn_bind_interdomain function to do that, so make
>> e
On 06.07.22 13:04, Julien Grall wrote:
(+ Juergen for the Linux question)
On 06/07/2022 11:42, Rahul Singh wrote:
Hi Julien,
On 5 Jul 2022, at 2:56 pm, Julien Grall wrote:
On 05/07/2022 14:28, Rahul Singh wrote:
Hi Julien,
Hi Rahul,
On 28 Jun 2022, at 4:18 pm, Julien Grall wrote:
a
(+ Juergen for the Linux question)
On 06/07/2022 11:42, Rahul Singh wrote:
Hi Julien,
On 5 Jul 2022, at 2:56 pm, Julien Grall wrote:
On 05/07/2022 14:28, Rahul Singh wrote:
Hi Julien,
Hi Rahul,
On 28 Jun 2022, at 4:18 pm, Julien Grall wrote:
a new driver in linux kernel, etc where r
> On 6 Jul 2022, at 11:59, Jan Beulich wrote:
>
> On 06.07.2022 12:58, Demi Marie Obenour wrote:
>> On Wed, Jul 06, 2022 at 12:55:50PM +0200, Jan Beulich wrote:
>>> On 06.07.2022 12:44, Andrew Cooper wrote:
On 06/07/2022 11:32, Luca Fancellu wrote:
>> On 24 Jun 2022, at 19:17, Demi Mar
On 06.07.2022 12:58, Demi Marie Obenour wrote:
> On Wed, Jul 06, 2022 at 12:55:50PM +0200, Jan Beulich wrote:
>> On 06.07.2022 12:44, Andrew Cooper wrote:
>>> On 06/07/2022 11:32, Luca Fancellu wrote:
> On 24 Jun 2022, at 19:17, Demi Marie Obenour
> wrote:
>
> diff --git a/xen/com
Hi Andrew,
On 06/07/2022 11:44, Andrew Cooper wrote:
On 06/07/2022 11:32, Luca Fancellu wrote:
@@ -1051,6 +1110,70 @@ static void __init
efi_set_gop_mode(EFI_GRAPHICS_OUTPUT_PROTOCOL *gop, UINTN gop
#define INVALID_VIRTUAL_ADDRESS (0xBAAADUL << \
(EFI_PAGE_SHI
On Wed, Jul 06, 2022 at 12:55:50PM +0200, Jan Beulich wrote:
> On 06.07.2022 12:44, Andrew Cooper wrote:
> > On 06/07/2022 11:32, Luca Fancellu wrote:
> >>> On 24 Jun 2022, at 19:17, Demi Marie Obenour
> >>> wrote:
> >>>
> >>> diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c
> >>> index
On 06.07.2022 12:44, Andrew Cooper wrote:
> On 06/07/2022 11:32, Luca Fancellu wrote:
>>> On 24 Jun 2022, at 19:17, Demi Marie Obenour
>>> wrote:
>>>
>>> diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c
>>> index a25e1d29f1..f6f34aa816 100644
>>> --- a/xen/common/efi/boot.c
>>> +++ b/xe
On Wed, Jul 06, 2022 at 10:44:46AM +, Andrew Cooper wrote:
> On 06/07/2022 11:32, Luca Fancellu wrote:
> >> On 24 Jun 2022, at 19:17, Demi Marie Obenour
> >> wrote:
> >>
> >> diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c
> >> index a25e1d29f1..f6f34aa816 100644
> >> --- a/xen/com
On Wed, Jun 29, 2022 at 08:29:02AM +0200, Jan Beulich wrote:
> (Cc-ing maintainers / reviewers)
>
> On 28.06.2022 18:09, Charles Arnold wrote:
> > From 359f490021e69220313ca8bd2981bad4fcfea0db Mon Sep 17 00:00:00 2001
> > From: Charles Arnold
> > Date: Tue, 28 Jun 2022 09:55:28 -0600
> > Subject
Hi Julien,
> On 5 Jul 2022, at 2:56 pm, Julien Grall wrote:
>
>
>
> On 05/07/2022 14:28, Rahul Singh wrote:
>> Hi Julien,
>
> Hi Rahul,
>
>>> On 28 Jun 2022, at 4:18 pm, Julien Grall wrote:
a new driver in linux kernel, etc where right now we just need to
introduce an extra IOCTL
+ CC Julien Grall
> On 24 Jun 2022, at 19:17, Demi Marie Obenour
> wrote:
>
> The EFI System Resource Table (ESRT) is necessary for fwupd to identify
> firmware updates to install. According to the UEFI specification §23.4,
> the ESRT shall be stored in memory of type EfiBootServicesData. Ho
On Wed, Jun 8, 2022 at 4:46 PM Peter Zijlstra wrote:
> Idle code is very like entry code in that RCU isn't available. As
> such, add a little validation.
>
> Signed-off-by: Peter Zijlstra (Intel)
> arch/m68k/kernel/vmlinux-nommu.lds |1 -
> arch/m68k/kernel/vmlinux-std.lds |1 -
>
Hi Jan,
> -Original Message-
> From: Jan Beulich
> Subject: Re: [PATCH v6 0/9] xen: drop hypercall function tables
>
> On 06.07.2022 09:30, Henry Wang wrote:
> > It seems that this series has been stale for more than 3 months, with:
> >
> > Patch #1 merged.
> > Patch #2 need feedback reg
Hi Jan,
> -Original Message-
> From: Jan Beulich
> Subject: Re: [PATCH] iommu: add preemption support to iommu_{un,}map()
>
> On 06.07.2022 09:31, Henry Wang wrote:
> > It seems that this patch has been stale for a month, with actions needed
> > from the author. So sending this email as
Hi Jan,
> -Original Message-
> From: Jan Beulich
> Subject: Re: [RFC PATCH 0/4] Introducing a common representation of boot
> info
>
> On 06.07.2022 09:30, Henry Wang wrote:
> > It seems that this series has been stale for more than a month, with:
> >
> > Patch #1 has some discussions in
flight 171514 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171514/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit1 8 xen-boot fail REGR. vs. 171277
test-amd64-amd64-li
Hi Jan,
> -Original Message-
> From: Jan Beulich
>
> On 06.07.2022 09:31, Henry Wang wrote:
> > It seems that this series has been stale for nearly a month, with nothing
> heard
> > from maintainers. So I am sending this email as a gentle reminder for
> maintainers.
>
> A month? That's
On 29.06.2022 08:29, Jan Beulich wrote:
> (Cc-ing maintainers / reviewers)
>
> On 28.06.2022 18:09, Charles Arnold wrote:
>> From 359f490021e69220313ca8bd2981bad4fcfea0db Mon Sep 17 00:00:00 2001
>> From: Charles Arnold
>> Date: Tue, 28 Jun 2022 09:55:28 -0600
>> Subject: Fix compilation error w
flight 171519 xen-unstable-smoke real [real]
flight 171526 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/171519/
http://logs.test-lab.xenproject.org/osstest/logs/171526/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which co
Hi Julien,
> On 5 Jul 2022, at 23:01, Julien Grall wrote:
>
> Hi Xenia,
>
> On 05/07/2022 13:21, Xenia Ragiadakou wrote:
>> Add the function prototype of show_stack() in header file
>> so that it is visible before its definition in traps.c.
>> Although show_stack() is referenced only in traps.
On 06.07.2022 09:31, Henry Wang wrote:
> It seems that this series has been stale for nearly a month, with nothing
> heard
> from maintainers. So I am sending this email as a gentle reminder for
> maintainers.
A month? That's only since v2 submission. See ...
>> -Original Message-
>> Su
On 06.07.2022 09:31, Henry Wang wrote:
> It seems that this patch has been stale for a month, with actions needed
> from the author. So sending this email as a gentle reminder. Thanks!
There's no action needed here from the author. See
https://lists.xen.org/archives/html/xen-devel/2022-07/msg00166
On 06.07.2022 09:30, Henry Wang wrote:
> It seems that this series has been stale for more than a month, with:
>
> Patch #1 has some discussions in thread.
> Patch #2 #3 #4 need some feedback from maintainers.
>
> So sending this email as a gentle reminder. Thanks!
As a general remark: RFCs, at
On 06.07.2022 09:30, Henry Wang wrote:
> It seems that this series has been stale for more than 3 months, with:
>
> Patch #1 merged.
> Patch #2 need feedback regarding the kexec and argo changes.
> Patch #3 #4 #5 #6 #7 #8 #9 reviewed/acked.
>
> So sending this as a gentle reminder for kexec and a
On 06.07.2022 10:43, Xenia Ragiadakou wrote:
> On 7/6/22 10:10, Jan Beulich wrote:
>> On 05.07.2022 23:02, Xenia Ragiadakou wrote:
>>> The function idle_loop() is referenced only in domain.c.
>>> Change its linkage from external to internal by adding the storage-class
>>> specifier static to its de
> On 6 Jul 2022, at 09:05, Demi Marie Obenour
> wrote:
>
> On Wed, Jul 06, 2022 at 08:53:49AM +0100, Julien Grall wrote:
>> Hi Jan,
>>
>> On 06/07/2022 07:44, Jan Beulich wrote:
>>> On 06.07.2022 05:39, osstest service owner wrote:
flight 171511 xen-unstable-smoke real [real]
flight
On 06.07.2022 10:17, Julien Grall wrote:
> Hi Demi,
>
> On 06/07/2022 09:05, Demi Marie Obenour wrote:
>> On Wed, Jul 06, 2022 at 08:53:49AM +0100, Julien Grall wrote:
>>> Hi Jan,
>>>
>>> On 06/07/2022 07:44, Jan Beulich wrote:
On 06.07.2022 05:39, osstest service owner wrote:
> flight 17
1 - 100 of 123 matches
Mail list logo