ping
On 06/23/2017 09:09 AM, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Extend xen_kbdfront to provide multi-touch support
to unprivileged domains.
Signed-off-by: Oleksandr Andrushchenko
---
Changes since
This run is configured for baseline tests only.
flight 71613 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71613/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-i386-libvirt5 libvirt-build
flight 41 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/41/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-xsm 7 xen-boot fail REGR. vs. 111081
On 17-06-28 05:43:58, Jan Beulich wrote:
> >>> Yi Sun 06/28/17 11:10 AM >>>
> >On 17-06-28 01:14:59, Jan Beulich wrote:
> >> >>> Yi Sun 06/14/17 3:25 AM >>>
> >> > @@ -537,7 +556,16 @@ int psr_get_val(struct domain *d, unsigned int
> >> >
On 06/27/17 01:13 -0600, Jan Beulich wrote:
> >>> Haozhong Zhang 06/26/17 11:17 AM >>>
> >+/**
> >+ * Append a telemetry of deferred MCE to a per-cpu pending list,
> >+ * either @pending or @lmce_pending, according to rules below:
> >+ * - if @pending is not empty, then
The problem is for a VF of RC integrated PF (e.g. PF's BDF is 00:02.0),
we would wrongly use 00:00.0 to search VT-d unit.
From SRIOV spec REV 1.0 section 3.7.3, it says:
"ARI is not applicable to Root Complex integrated Endpoints; all other
SR-IOV Capable Devices (Devices that include at least
flight 53 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 1fb805b1eb5b6039cb12375f8594aba65bf60a44
baseline version:
ovmf
On 06/27/17 00:38 -0600, Jan Beulich wrote:
> >>> Haozhong Zhang 06/26/17 11:17 AM >>>
> >Add a 'nowait' argument to mce_barrier_{enter,exit}() to allow them
> >return immediately without waiting mce_barrier_{enter,exit}() on other
> >CPUs. This is useful when handling
On 06/27/17 00:28 -0600, Jan Beulich wrote:
> >>> Haozhong Zhang 06/26/17 11:16 AM >>>
> >struct mc_telem_cpu_ctl is now used as the type of per-cpu variables,
> >rather than a globla variable shared by all CPUs, so some of its
> >comment do not apply any more.
> >
>
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-qemut-rhel6hvm-amd
testid guest-start/redhat.repeat
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu
flight 36 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/36/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-cubietruck 10 debian-install fail REGR. vs. 110465
Regressions which
flight 44 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/44/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-2 59 leak-check/check fail REGR. vs. 111074
test-xtf-amd64-amd64-1
flight 59 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13
On Wed, Jun 28, 2017 at 07:16:18PM +0100, Andrew Cooper wrote:
> On 28/06/17 11:10, Marek Marczykowski-Górecki wrote:
> > This is result of parsing cpu_map.xml from libvirt.
> > The most important part is handling leaf 0x0007, but while at it add
> > other bits too.
> >
> > Signed-off-by:
Hi,
> >> On Mon, Jun 26, 2017 at 01:55:56PM -0400, Jason Dickens wrote:
> >>> I would like to inquire about q35 support in Xen? As far as I have been
> >>> able to tell, this has not been done? In the Xen version that I've been
> >>> working with (4.4), libxl_dm overrides any "-machine"
flight 33 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/33/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 debian-hvm-install fail
REGR. vs. 111061
Tests
On 28/06/17 20:27, Igor Druzhinin wrote:
> The new function repeats the behavior of the first version
> except it has an extended list of arguments which are subsequently
> passed to mmap() call.
>
> This is needed for QEMU depriviledging.
>
> Signed-off-by: Igor Druzhinin
The new function repeats the behavior of the first version
except it has an extended list of arguments which are subsequently
passed to mmap() call.
This is needed for QEMU depriviledging.
Signed-off-by: Igor Druzhinin
---
Cc: Ian Jackson
"Old" tested version had not actually been tested; therefore in this
flight we test it, rather than a new candidate. The baseline, if
any, is the most recent actually tested revision.
flight 31 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/31/
Regressions
On Wed, Jun 28, 2017 at 3:56 PM, Dario Faggioli
wrote:
> On Wed, 2017-06-28 at 15:28 +0100, George Dunlap wrote:
>> On Fri, Jun 23, 2017 at 5:19 PM, Dario Faggioli
>> wrote:
>> > > > +{
>> > > > +struct csched2_dom *sdom = data;
>> > > >
On Thu, Jun 8, 2017 at 1:09 PM, Dario Faggioli
wrote:
> Note that a cap is considered valid only if
> it is within the [1, nr_vcpus]% interval.
Oh, I see you added the check here.
Still, I think we should add a check in the hypervisor too. The check
here should
Initialize xenfb properly, as all other backends, from its own
"initialise" function.
Signed-off-by: Stefano Stabellini
---
Changes in v2:
- remove xen_init_display from xen_backend.h
- handle cases where vkbd is missing
diff --git a/hw/display/xenfb.c
flight 54 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/54/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13
On Wed, 28 Jun 2017, Peter Maydell wrote:
> On 28 June 2017 at 01:06, Stefano Stabellini wrote:
> > On Tue, 27 Jun 2017, Peter Maydell wrote:
> >> So, there is exactly one caller of main_loop_wait() in the tree that
> >> passes it 'true' as an argument. That caller is in
On 28/06/17 11:10, Marek Marczykowski-Górecki wrote:
> This is result of parsing cpu_map.xml from libvirt.
> The most important part is handling leaf 0x0007, but while at it add
> other bits too.
>
> Signed-off-by: Marek Marczykowski-Górecki
Xen's canonical
On 28/06/17 18:51, Wei Liu wrote:
> On Wed, Jun 28, 2017 at 05:20:38PM +0100, Andrew Cooper wrote:
>> On 28/06/17 17:14, Marek Marczykowski-Górecki wrote:
>>> On Wed, Jun 28, 2017 at 11:16:33AM +0100, Andrew Cooper wrote:
On 28/06/17 07:09, Jan Beulich wrote:
Marek
On Wed, Jun 28, 2017 at 12:10:20PM +0200, Marek Marczykowski-Górecki wrote:
> This adds handling more cpuid bits by name. Mostly based on cpu_map.xml from
> libvirt.
>
> Marek Marczykowski-Górecki (2):
> libxl: add more cpuid flags handling
> libxl: drop osvw cpuid flag
Given that I prefer
On Wed, Jun 28, 2017 at 12:10:21PM +0200, Marek Marczykowski-Górecki wrote:
> This is result of parsing cpu_map.xml from libvirt.
> The most important part is handling leaf 0x0007, but while at it add
> other bits too.
>
> Signed-off-by: Marek Marczykowski-Górecki
On Wed, Jun 28, 2017 at 05:20:38PM +0100, Andrew Cooper wrote:
> On 28/06/17 17:14, Marek Marczykowski-Górecki wrote:
> > On Wed, Jun 28, 2017 at 11:16:33AM +0100, Andrew Cooper wrote:
> >> On 28/06/17 07:09, Jan Beulich wrote:
> >> Marek Marczykowski-Górecki
On Tue, Jun 27, 2017 at 07:35:44PM +0200, Marek Marczykowski-Górecki wrote:
> GCC 7 warns (and thanks to -Werror, fails) about potential string
> truncation by snprintf in get_next_battery_file. Since the code already
> check if string is no longer than 4 chars, tell gcc about it.
>
>
On Tue, Jun 27, 2017 at 07:35:43PM +0200, Marek Marczykowski-Górecki wrote:
> GCC-7 have -Wimplicit-fallthrough enabled with -Wextra. Add appropriate
> comment which both mute the warning and improve readibility.
>
> Signed-off-by: Marek Marczykowski-Górecki
On Sun, Jun 25, 2017 at 11:15:28PM +0100, Simon Waterman wrote:
> This patch adds support for choosing upstream QEMU as the PV QEMU
> backend for an IOEMU stubdom instead of qemu-xen-traditional.
> The motivation is to expose QEMU features only available in upstream
> like VNC auth options.
>
>
On Wed, Jun 28, 2017 at 05:13:44PM +0100, Ross Lagerwall wrote:
> See docs/features/livepatch.pandoc for the details.
>
> Signed-off-by: Ross Lagerwall
Reviewed-by: Konrad Rzeszutek Wilk
Thank you for the writeup!
On Fri, Jun 23, 2017 at 12:35:28AM +0800, Zhongze Liu wrote:
> This is a preparation for the proposal "allow setting up shared memory areas
> between VMs from xl config file". See:
> V2: https://lists.xen.org/archives/html/xen-devel/2017-06/msg02256.html
> V1:
On Thu, Jun 22, 2017 at 01:08:50PM +0530, Bhupinder Thakur wrote:
[...]
> static struct termios stdin_old_attr;
> @@ -343,6 +344,7 @@ int main(int argc, char **argv)
> char *end;
> console_type type = CONSOLE_INVAL;
> bool interactive = 0;
> + char *console_names = "serial,
On Thu, Jun 22, 2017 at 01:08:51PM +0530, Bhupinder Thakur wrote:
> The SBSA UART node format is as specified in
> Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
>
> ARM SBSA defined generic UART
> --
> This UART uses a subset of the PL011
On Thu, Jun 22, 2017 at 01:08:49PM +0530, Bhupinder Thakur wrote:
> This patch finally adds the support for vuart console.
>
[...]
>
> diff --git a/tools/console/daemon/io.c b/tools/console/daemon/io.c
> index baf0e2e..6b0114e 100644
> --- a/tools/console/daemon/io.c
> +++
On Thu, Jun 22, 2017 at 01:08:48PM +0530, Bhupinder Thakur wrote:
> This patch adds the support for multiple consoles and introduces the iterator
> functions to operate on multiple consoles.
>
> This patch is in preparation to support a new vuart console.
>
> Signed-off-by: Bhupinder Thakur
On Thu, Jun 22, 2017 at 01:08:47PM +0530, Bhupinder Thakur wrote:
> Xenconsole functions take domain structure as input. These functions shall be
> modified to take console structure as input since these functions typically
> perform
> console specific operations.
>
> Also the console specific
On Thu, Jun 22, 2017 at 01:08:43PM +0530, Bhupinder Thakur wrote:
[...]
> +#if defined (__arm__) || defined(__aarch64__)
> +/**
> + * This function initializes the vpl011 emulation and returns
> + * the event to be used by the backend for communicating with
> + * the emulation code.
> + *
> + *
On Thu, Jun 22, 2017 at 01:08:46PM +0530, Bhupinder Thakur wrote:
> The console->conspath name is changed to console->xspath as it is
> clear from the name that it is referring to xenstore path.
>
> Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
On Thu, Jun 22, 2017 at 01:08:41PM +0530, Bhupinder Thakur wrote:
> An option is provided in libxl to enable/disable sbsa vuart while
> creating a guest domain.
>
> Libxl now suppots a generic vuart console and sbsa uart is a specific type.
> In future support can be added for multiple vuart of
On Thu, Jun 22, 2017 at 01:08:45PM +0530, Bhupinder Thakur wrote:
> Xenconsole uses a domain structure which contains console specific fields.
> This
> patch defines a new console structure, which would be used by the xenconsole
> functions to perform console specific operations like
On Thu, Jun 22, 2017 at 01:08:38PM +0530, Bhupinder Thakur wrote:
> DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
> xencons_queued() to tell the current size of the ring buffer,
> xencons_mask() to mask off the index, which are useful helper functions.
> pl011 emulation
On Thu, Jun 22, 2017 at 01:08:44PM +0530, Bhupinder Thakur wrote:
> Add a new vuart console node to xenstore. This node is added at
>
> /local/domain/$DOMID/vuart/0.
>
> The node contains information such as the ring-ref, event channel,
> buffer limit and type of console.
>
> Xenconsole reads
On 28/06/17 10:35, Sergey Dyasli wrote:
> If ept_sync_domain() is called for np2m, the following happens:
>
> 1. *np2m*::ept_data::invalidate cpumask is updated
> 2. IPIs are sent for CPUs in domain_dirty_cpumask forcing vmexits
> 3. vmx_vmenter_helper() checks
. snip..
> > Now all of the customers that have applied those patches are vulnerable.
> >
> > Do you:
> >
> > 1. Tell the reporter to post it publicly to xen-devel immediately, since
> > livepatch tools are not security supported -- thus "zero-day"-ing all
> > your customers (as well as anyone
Konrad Rzeszutek Wilk writes:
> On Mon, Jun 26, 2017 at 06:39:30PM +0200, Vitaly Kuznetsov wrote:
>> CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests
>> BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a
>> leftover from ancient
On 28/06/17 15:57, Wei Liu wrote:
> On Wed, Jun 28, 2017 at 03:26:18PM +0100, Andrew Cooper wrote:
>> On 28/06/17 15:18, Wei Liu wrote:
>>> Signed-off-by: Wei Liu
>>> ---
>>> xen/arch/x86/setup.c | 24
>>> 1 file changed, 12 insertions(+), 12
On 28/06/17 17:14, Marek Marczykowski-Górecki wrote:
> On Wed, Jun 28, 2017 at 11:16:33AM +0100, Andrew Cooper wrote:
>> On 28/06/17 07:09, Jan Beulich wrote:
>> Marek Marczykowski-Górecki 06/28/17
>> 3:09 AM >>>
It's bit 9 not 10 (which is ibs).
>>>
On 06/27/2017 10:17 AM, George Dunlap wrote:
On 26/06/17 18:30, Andrew Cooper wrote:
On 26/06/17 18:00, George Dunlap wrote:
On 26/06/17 16:36, Ross Lagerwall wrote:
...
We absolutely cannot be in the position of issuing XSAs for situations
like this, because there are too many ways where
On Wed, Jun 28, 2017 at 11:16:33AM +0100, Andrew Cooper wrote:
> On 28/06/17 07:09, Jan Beulich wrote:
> Marek Marczykowski-Górecki 06/28/17
> 3:09 AM >>>
> >> It's bit 9 not 10 (which is ibs).
> > Indeed, but shouldn't it rather be removed? We don't
See docs/features/livepatch.pandoc for the details.
Signed-off-by: Ross Lagerwall
---
Moved it into a feature document.
Clarified a few bits and pieces based on feedback.
docs/features/livepatch.pandoc | 103 +
flight 34 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/34/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-amd 12 guest-start/redhat.repeat fail REGR. vs.
110441
Sorry for the late reply.
I can see the thread already contains answers to some of my questions so
I will just reply to the bits that are still relevant.
On Fri, Jun 23, 2017 at 01:27:24AM +0800, Zhongze Liu wrote:
> Hi Wei,
>
> Thank you for your valuable comments.
>
> 2017-06-21 23:09
On Thu, Jun 8, 2017 at 1:09 PM, Dario Faggioli
wrote:
> Instead of letting the vCPU that for first tries to get
s/for//;
> some budget take it all (although temporarily), allow each
> vCPU to only get a specific quota of the total budget.
>
> This improves fairness,
On Wed, Jun 28, 2017 at 08:57:28PM +0800, Dongli Zhang wrote:
> This patch partially reverts 3df0e50 ("xen/blkfront: pseudo support for
> multi hardware queues/rings"). The xen-blkfront queue/ring might hang due
> to grants allocation failure in the situation when gnttab_free_head is
> almost
On Mon, Jun 26, 2017 at 06:39:30PM +0200, Vitaly Kuznetsov wrote:
> CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests
> BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a
> leftover from ancient times when CPU0 hotplug was impossible, it works
> just fine
On Mon, May 29, 2017 at 07:29:29AM -0600, Jan Beulich wrote:
> >>> On 27.04.17 at 16:35, wrote:
> > +static int vpci_msix_control_write(struct pci_dev *pdev, unsigned int reg,
> > + union vpci_val val, void *data)
> > +{
> > +uint8_t seg
On 20/06/17 01:19, Vikram Sethi wrote:
Hi Julien,
Hi Vikram,
Thank you for your feedbacks.
Thanks for posting this. I think some additional topics need to be covered in
the design document, under 3 main topics:
I wanted to limit the scope of the PCI passthrough work to the strict
On Thu, Jun 8, 2017 at 1:08 PM, Dario Faggioli
wrote:
> As cap is already present in Credit1, as a parameter, all
> the wiring is there already for it to be percolate down
> to csched2_dom_cntl() too.
>
> In this commit, we actually deal with it, and implement
>
On Wed, Jun 28, 2017 at 03:26:18PM +0100, Andrew Cooper wrote:
> On 28/06/17 15:18, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > xen/arch/x86/setup.c | 24
> > 1 file changed, 12 insertions(+), 12 deletions(-)
> >
> > diff --git
On Wed, 2017-06-28 at 15:28 +0100, George Dunlap wrote:
> On Fri, Jun 23, 2017 at 5:19 PM, Dario Faggioli
> wrote:
> > > > +{
> > > > +struct csched2_dom *sdom = data;
> > > > +unsigned long flags;
> > > > +s_time_t now;
> > > > +LIST_HEAD(parked);
> > >
On Fri, Jun 23, 2017 at 5:19 PM, Dario Faggioli
wrote:
>> > +{
>> > +struct csched2_dom *sdom = data;
>> > +unsigned long flags;
>> > +s_time_t now;
>> > +LIST_HEAD(parked);
>> > +
>> > +spin_lock_irqsave(>budget_lock, flags);
>> > +
>> > +/*
>>
On 28/06/17 15:18, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> xen/arch/x86/setup.c | 24
> 1 file changed, 12 insertions(+), 12 deletions(-)
>
> diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
> index f7b927858c..db5df6956d 100644
> ---
On 28/06/17 15:18, Wei Liu wrote:
> Signed-off-by: Wei Liu
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 28/06/17 15:18, Wei Liu wrote:
> Replace bool_t with bool and adjust code accordingly.
>
> Signed-off-by: Wei Liu
> ---
> xen/arch/x86/irq.c | 25 +
> 1 file changed, 13 insertions(+), 12 deletions(-)
>
> diff --git a/xen/arch/x86/irq.c
On 28/06/17 15:18, Wei Liu wrote:
> Signed-off-by: Wei Liu
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Signed-off-by: Wei Liu
---
xen/arch/x86/dom0_build.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c
index cc8acad688..0c125e61eb 100644
--- a/xen/arch/x86/dom0_build.c
+++
While at it, change check_nmi_watchdog to return void because its
return value is not used anyway.
Signed-off-by: Wei Liu
---
xen/arch/x86/nmi.c | 34 +-
xen/include/asm-x86/apic.h | 4 ++--
2 files changed, 19 insertions(+), 19
Signed-off-by: Wei Liu
---
xen/arch/x86/platform_hypercall.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/platform_hypercall.c
b/xen/arch/x86/platform_hypercall.c
index 10e7bcc161..ebc2f394ee 100644
---
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c| 16
xen/include/asm-x86/domain.h | 2 +-
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index f7873da323..4e176e4d56 100644
---
Replace bool_t with bool and adjust code accordingly.
Signed-off-by: Wei Liu
---
xen/arch/x86/irq.c | 25 +
1 file changed, 13 insertions(+), 12 deletions(-)
diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
index 113667cdea..32800ce165 100644
Did some cleanup while I'm looking for files to break apart under x86/.
Wei Liu (8):
x86/irq.c: use plain bool
x86/platform_hypercall.c: use plain bool
x86/domain.c: use plain bool
x86/dom0_build.c: use plain bool
x86/crash.c: use plain bool
x86/time.c: use plain bool
x86/nmi.c: use
Signed-off-by: Wei Liu
---
xen/arch/x86/time.c | 28 ++--
xen/include/asm-x86/domain.h | 4 ++--
2 files changed, 16 insertions(+), 16 deletions(-)
diff --git a/xen/arch/x86/time.c b/xen/arch/x86/time.c
index 655af33cb3..75ea695ac5 100644
Signed-off-by: Wei Liu
---
xen/arch/x86/setup.c | 24
1 file changed, 12 insertions(+), 12 deletions(-)
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index f7b927858c..db5df6956d 100644
--- a/xen/arch/x86/setup.c
+++
Signed-off-by: Wei Liu
---
xen/arch/x86/crash.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/crash.c b/xen/arch/x86/crash.c
index f28f527912..82535c4df0 100644
--- a/xen/arch/x86/crash.c
+++ b/xen/arch/x86/crash.c
@@ -33,7 +33,7 @@
FEATURE_CONTROL is already read with LOCK bit set (so is unmodifiable), and
all VMX MSRs are read-only. Also, fix the MSR_IA32_VMX_TRUE_ENTRY_CTLS bound
to be MSR_IA32_VMX_VMFUNC, rather than having the intervening MSRs falling
into the default case.
Raise #GP faults if the guest tries to modify
On 6/28/2017 4:36 AM, Joerg Roedel wrote:
Hi Tom,
Hi Joerg,
On Tue, Jun 27, 2017 at 10:12:30AM -0500, Tom Lendacky wrote:
---
drivers/iommu/amd_iommu.c | 30 --
drivers/iommu/amd_iommu_init.c | 34 --
Hi,
At 12:16 +0100 on 28 Jun (1498652182), Andrew Cooper wrote:
> sh_pin() has boolean properties, so switch its return type.
>
> Signed-off-by: Andrew Cooper
Good idea, thanks.
> -static bool_t
> +static bool
> sh_write_guest_entry(struct vcpu *v, intpte_t *p,
On 28/06/17 14:53, Konrad Rzeszutek Wilk wrote:
> On Wed, Jun 28, 2017 at 12:16:19PM +0100, Andrew Cooper wrote:
>> * Drop redundant initialisers
>> * Style corrections while changing client_over_quota()
>> * Drop all write-only bools from do_tmem_op()
> s/write-only/useless write-only/
:) The
On Wed, Jun 28, 2017 at 12:16:19PM +0100, Andrew Cooper wrote:
> * Drop redundant initialisers
> * Style corrections while changing client_over_quota()
> * Drop all write-only bools from do_tmem_op()
s/write-only/useless write-only/
>
> Signed-off-by: Andrew Cooper
There doesn't seem to be a cover letter.
All four patches:
Reviewed-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Dear community members,
I'm pleased to announce that Xen 4.9.0 is released.
Please find the tarball and its signature at:
https://xenproject.org/downloads/xen-archives/xen-project-49-series/xen-project-490.html
You can also check out the tag in xen.git:
flight 46 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/46/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13
This patch partially reverts 3df0e50 ("xen/blkfront: pseudo support for
multi hardware queues/rings"). The xen-blkfront queue/ring might hang due
to grants allocation failure in the situation when gnttab_free_head is
almost empty while many persistent grants are reserved for this queue/ring.
As
> -Original Message-
> From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> Sent: 27 June 2017 23:07
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org; qemu-
> bl...@nongnu.org
> Subject: Re: [Xen-devel] [PATCH v2 0/3] xen-disk:
The old tools are no longer working.
Signed-off-by: Ian Jackson
CC: Andrew Cooper
---
production-config | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/production-config b/production-config
index 96831c7..1bc56d8 100644
>>> Andrew Cooper 06/28/17 1:17 PM >>>
>Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
flight 24 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/24/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
110515
>>> Yi Sun 06/28/17 11:10 AM >>>
>On 17-06-28 01:14:59, Jan Beulich wrote:
>> >>> Yi Sun 06/14/17 3:25 AM >>>
>> > @@ -537,7 +556,16 @@ int psr_get_val(struct domain *d, unsigned int socket,
>> > return -ENOENT;
>> > }
>> >
>> >
On 27/06/17 19:19, Jan Beulich wrote:
Andrew Cooper 06/27/17 8:06 PM >>>
>> On 26/06/17 17:28, Wei Liu wrote:
>>> --- a/xen/arch/x86/traps.c
>>> +++ b/xen/arch/x86/traps.c
>>> @@ -1934,21 +1934,29 @@ void __init init_idt_traps(void)
>>>
flight 40 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/40/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 8b9793bfe614ee53029d2b1672e1080170809dcd
baseline version:
xen
* Drop redundant initialisers
* Style corrections while changing client_over_quota()
* Drop all write-only bools from do_tmem_op()
Signed-off-by: Andrew Cooper
---
CC: Konrad Rzeszutek Wilk
---
xen/common/tmem.c | 39
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/arm/efi/efi-boot.h | 7 +++---
xen/arch/x86/efi/efi-boot.h | 4 ++--
xen/arch/x86/efi/stub.c | 6 ++---
xen/common/efi/boot.c | 58
sh_pin() has boolean properties, so switch its return type.
Signed-off-by: Andrew Cooper
---
CC: Tim Deegan
---
xen/arch/x86/mm/shadow/common.c | 4 ++--
xen/arch/x86/mm/shadow/multi.c | 38 +++---
Signed-off-by: Andrew Cooper
---
CC: Daniel De Graaf
---
xen/xsm/flask/flask_op.c| 4 ++--
xen/xsm/flask/include/avc.h | 2 +-
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/xen/xsm/flask/flask_op.c b/xen/xsm/flask/flask_op.c
Split it into two sections, one for obj-y and the other for
obj-bin-y.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/Makefile | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/pv/Makefile b/xen/arch/x86/pv/Makefile
index
On 28/06/17 12:11, Wei Liu wrote:
> Split it into two sections, one for obj-y and the other for
> obj-bin-y.
>
> Signed-off-by: Wei Liu
Acked-by: Andrew Cooper
___
Xen-devel mailing list
On 28/06/17 07:09, Jan Beulich wrote:
Marek Marczykowski-Górecki 06/28/17 3:09
AM >>>
>> It's bit 9 not 10 (which is ibs).
> Indeed, but shouldn't it rather be removed? We don't expose it from the
> hypervisor at all anymore:
>
> XEN_CPUFEATURE(OSVW,
1 - 100 of 125 matches
Mail list logo