> >>Your analysis was absolutely spot on. After re-thinking this for a
> >>moment, I thought going down that route first would make a lot of sense
> >>as PV guests still do work and one of the differences to HVM domUs is
> >>that the former do _not_ require SeaBIOS. Looking at my log files of
>
On Mon, 2015-11-16 at 15:20 +, Ian Jackson wrote:
> This can (and often should) be used to replace $ho->{Name}.
>
> For an L0 host it returns "$ho->{Name}", ie HOST.
>
> For a plain guest or L1 guest it returns
> "$ho->{Host}{Name}_$ho->{Name}", ie HOST_GUEST or HOST_L1.
>
> For an L2 guest
On Mon, 2015-11-16 at 15:20 +, Ian Jackson wrote:
> create_webfile needs a pathname in the shared public-html directory.
> These paths need to be (a) stable (b) unique across all running jobs.
> We achieve this by basing the filenames on the hostname and (for a
> guest) the guest name.
>
>
This flag is defined here only for compatibility with the Linux variant of
this header. The feature has never been documented and should be
considered deprecated.
Signed-off-by: Paul Durrant
Cc: Ian Campbell
Cc: Ian Jackson
On 11/15/2015 01:02 PM, Andy Lutomirski wrote:
On Nov 13, 2015 5:23 PM, "Boris Ostrovsky" wrote:
On 11/13/2015 06:26 PM, Andy Lutomirski wrote:
On Fri, Nov 13, 2015 at 3:18 PM, Boris Ostrovsky
wrote:
After 32-bit syscall rewrite, and
flight 64466 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64466/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
Jan Beulich writes ("Re: [Xen-devel] [xen-4.3-testing test] 63948: regressions
- FAIL [and 1 more messages] [and 1 more messages]"):
> On 16.11.15 at 17:00, wrote:
> > Based on this, which is the only regression in 64287, we could force
> > push this:
...
> Well, yes,
On 16/11/15 10:31, Huaitong Han wrote:
> This patch adds xstate support for pkeys.
>
> Signed-off-by: Huaitong Han
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On Fri, 2015-11-06 at 04:26 -0700, Jan Beulich wrote:
> > > > On 05.11.15 at 18:53, wrote:
> > The 8250-uart.h contains extra serial register definitions
> > for the internal UARTs in TI OMAP SoCs which are used in
> > OMAP UART driver only.
> > In order to
On Wed, 2015-11-11 at 13:44 +, Wei Liu wrote:
> On Wed, Nov 11, 2015 at 01:33:46PM +, Ian Campbell wrote:
> > This avoids various printf formatting warnings when building on arm32.
> >
> > While touching the affected lines make them consistently use %#.
> >
> > Signed-off-by: Ian
On Thu, 2015-11-05 at 12:47 +, Stefano Stabellini wrote:
> Try to use "xen-qemuuser-domid$domid" first, then
> "xen-qemuuser-shared" and root if everything else fails.
>
> The uids need to be manually created by the user or, more likely, by the
> xen package maintainer.
>
> Expose a
>>> On 16.11.15 at 13:01, wrote:
> I think if the 4.6 release cycle is at a suitable point we should backport
> the Cofnig.mk change to switch to the combined trees. If that would be
> inappropriate right now then pushing the tags by hand to the old tree would
> be ok.
On Fri, 2015-11-13 at 15:38 -0500, Daniel De Graaf wrote:
> On 13/11/15 10:02, Ian Campbell wrote:
> > On Wed, 2015-11-11 at 15:03 +, Ian Jackson wrote:
> > > Ian Campbell writes ("[PATCH XEN v5 07/23] tools: Refactor
> > > /dev/xen/gnt{dev,shr} wrappers into libxengnttab."):
> > > >
On 16/11/15 13:09, Ian Campbell wrote:
> On Thu, 2015-11-12 at 13:01 +, Wei Liu wrote:
>> On Mon, Nov 09, 2015 at 04:19:24PM +0100, Juergen Gross wrote:
>>> On 10/23/2015 03:04 PM, Juergen Gross wrote:
This series is a combination of my previous patches:
"libxc: remove most of
On Wed, 2015-10-14 at 17:30 +0100, Wei Liu wrote:
> On Wed, Oct 14, 2015 at 06:24:40PM +0200, Roger Pau Monne wrote:
> > This reverts commit d64dbbcc7c9934a46126c59d78536235908377ad.
> >
> > Xen always set the FPU as initialized when loading a HVM context, so
> > libxc
> > has to provide a valid
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> The offset is 0x0D00 and not 0x0F80.
>
> Also re-order the definition to keep all the definitions ordered.
>
> Signed-off-by: Julien Grall
Acked-by: Ian Campbell
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> A read to a write only register is unknown. Use a memorable value to
> differentiate from an actual RAZ register.
Shame it's the same memorable value as every other memorable value in the
world ;-)
> Signed-off-by: Julien Grall
Thank you for your quick responses.
Gesendet: Montag, 16. November 2015 um 13:41 Uhr
Von: "Wei Liu"
An: "Ian Campbell"
Cc: "Peter Schmid" , xen-devel@lists.xen.org, "Wei Liu"
Betreff: Re: [Xen-devel] Unable
flight 64453 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64453/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
Because GSO metadata is passed from backend to frontend using
netif_extra_info segments, which do not carry information stating which
netif_rx_request_t was consumed to free up their slot, frontends must
assume some form of identity relation between ring slot and request.
Hence, so that it is able
>>> On 16.11.15 at 17:14, wrote:
> Jan Beulich writes ("Re: [Xen-devel] [xen-4.3-testing test] 63948:
> regressions -
> FAIL [and 1 more messages] [and 1 more messages]"):
>> On 16.11.15 at 17:00, wrote:
>> > Based on this, which is the
On 16/11/15 10:31, Huaitong Han wrote:
> This patch adds functions to support PKRU access/write
>
> Signed-off-by: Huaitong Han
>
> diff --git a/xen/include/asm-x86/processor.h b/xen/include/asm-x86/processor.h
> index f507f5e..427eb84 100644
> ---
On Mon, Nov 16, 2015 at 09:36:24AM -0700, Linda wrote:
> Hi Wei,
>
> On 11/16/2015 8:16 AM, Wei Liu wrote:
> >Hi Linda
> >
> >On Fri, Nov 13, 2015 at 10:23:22AM -0700, Linda wrote:
> >>Hello,
> >> I worked this summer as an intern under Julien Grall and Wei Liu. My
> >>project was to
On Thu, 2015-11-12 at 16:58 +, Andrew Cooper wrote:
> On 12/11/15 15:52, Jan Beulich wrote:
> > Re-using the possibly non-zero value from a previous iteration can't
> > do any good.
> >
> > Take the opportunity and
> > - limit a few other variables' scopes at once,
> > - adjust a few types.
>
On 16/11/15 10:31, Huaitong Han wrote:
> This patch adds pkeys support for guest_walk_tables.
>
> Signed-off-by: Huaitong Han
>
> diff --git a/xen/arch/x86/mm/guest_walk.c b/xen/arch/x86/mm/guest_walk.c
> index 773454d..7a7ae96 100644
> --- a/xen/arch/x86/mm/guest_walk.c
>
Jan Beulich writes ("Re: [Xen-devel] [xen-4.3-testing test] 63948: regressions
- FAIL [and 1 more messages] [and 1 more messages]"):
> On 16.11.15 at 17:14, wrote:
> > This will allow us to think about the medium-term fix without the
> > short-term breakage causing
Now that requests and response types and extra info segments are
documented in block comments, we can get rid of the inline comments
in the structures. This has the happy side-effect of making the Linux
checkpatch.pl script make fewer complaints after import.
This patch also fixes a small
v5 of this series included updates to support NDIS RSS for Windows
frontends. Since review concluded that some more fundamental changes
were needed in the protocol, v6 is just the surrounding cleanup patches
which are still relevant.
Another series will be posted for RSS related infrastructure.
Ian Jackson writes ("Re: [Xen-devel] [xen-4.3-testing test] 63948: regressions
- FAIL [and 1 more messages]"):
> I wonder how easy it would be to filter out the wrong advertisement,
> during outgoing migration, in the toolstack in 4.2. I appreciate that
> 4.2 is long-dead. So maybe we should
>>> On 16.11.15 at 17:00, wrote:
> Ian Jackson writes ("Re: [Xen-devel] [xen-4.3-testing test] 63948:
> regressions -
> FAIL [and 1 more messages]"):
>> I wonder how easy it would be to filter out the wrong advertisement,
>> during outgoing migration, in the toolstack
>>> On 16.11.15 at 13:02, wrote:
> On 16/11/15 11:52, Jan Beulich wrote:
> On 13.11.15 at 19:49, wrote:
>>> @@ -2805,6 +2806,9 @@ int p2m_add_foreign(struct domain *tdom, unsigned
>>> long
> fgfn,
>>> prev_mfn = mfn_x(get_gfn(tdom,
On 16/11/15 11:52, Jan Beulich wrote:
On 13.11.15 at 19:49, wrote:
>> @@ -2805,6 +2806,9 @@ int p2m_add_foreign(struct domain *tdom, unsigned long
>> fgfn,
>> prev_mfn = mfn_x(get_gfn(tdom, gpfn, _prev));
>> if ( mfn_valid(_mfn(prev_mfn)) )
>> {
>> +
>>> On 06.11.15 at 17:05, wrote:
> --- a/xen/include/public/arch-x86/xen.h
> +++ b/xen/include/public/arch-x86/xen.h
> @@ -265,7 +265,31 @@ typedef struct arch_shared_info arch_shared_info_t;
> * XEN_DOMCTL_INTERFACE_VERSION.
> */
> struct xen_arch_domainconfig {
> -
flight 64300 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64300/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 5 kernel-build fail REGR. vs. 62642
Tests which are
On Mon, 2015-11-16 at 13:16 +, Paul Durrant wrote:
> >
> > > +ret = vasprintf(, fmt, ap);
> > > if (ret == -1) {
> > > return -1;
> > > }
> > > xs_write(ctx->xsh, t, path, s, ret);
> > > +if (perms)
> > > +xs_set_permissions(ctx->xsh, t, path, perms,
On Mon, Nov 16, 2015 at 02:36:51PM +0100, Peter Schmid wrote:
[...]
> xl create -p guest.cfg doesn't create any domains
>
That's probably stubdom already crashed and it triggered domain
destruction.
> so xl list has only dom0 in the output:
>
> xl list
> Name
On 16/11/15 10:31, Huaitong Han wrote:
> This patch disables pkeys for guest in non-paging mode, However XEN always
> uses
> paging mode to emulate guest non-paging mode, To emulate this behavior, pkeys
> needs to be manually disabled when guest switches to non-paging mode.
>
> Signed-off-by:
On Mon, 2015-11-16 at 13:30 +0100, Juergen Gross wrote:
> On 16/11/15 13:09, Ian Campbell wrote:
> > On Thu, 2015-11-12 at 13:01 +, Wei Liu wrote:
> > > On Mon, Nov 09, 2015 at 04:19:24PM +0100, Juergen Gross wrote:
> > > > On 10/23/2015 03:04 PM, Juergen Gross wrote:
> > > > > This series is
On Thu, 2015-11-12 at 17:46 +, Stefano Stabellini wrote:
> Remove dummy arm implementation of wallclock_time.
> Use shared_info() in common code rather than x86-ism to access it, when
> possible.
>
> Define the static variable wc_sec, and the local variale sec in
On Thu, 2015-11-12 at 17:46 +, Stefano Stabellini wrote:
> Call update_domain_wallclock_time at domain initialization.
> Set time_offset_seconds to the number of seconds between physical boot
> and domain initialization: it is going to be used to get/set the
> wallclock time.
> Add
On Thu, 2015-11-12 at 17:46 +, Stefano Stabellini wrote:
> This is just a cleanup, not required at the moment.
>
> Signed-off-by: Stefano Stabellini
Acked-by: Ian Campbell
___
On Thu, 2015-11-12 at 17:45 +, Stefano Stabellini wrote:
> Hi all,
>
> this small series enables the wallclock time on arm and it consists
> mostly in code movement from x86 to common.
AFAICT this is all now suitably acked, but I wanted to coordinate with you
on the guest side changes before
Thanks!
On Mon, Nov 16, 2015 at 2:07 PM, Ian Campbell wrote:
> On Fri, 2015-11-06 at 04:26 -0700, Jan Beulich wrote:
>> > > > On 05.11.15 at 18:53, wrote:
>> > The 8250-uart.h contains extra serial register definitions
>> > for the
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> Our vGIC emulation have GICD_TYPER.MBIS set to 0 which means that
> GICD_*SPI_* registers are reserved. Implement them using the *_reserved
> labels.
>
> Also, implement thoses registers for the read part.
"those" ("these" might be better
On Mon, 2015-11-16 at 11:45 +0100, Peter Schmid wrote:
> Dear all
> I have been trying to setup stubdomains for added security on a test
> machine so I could then suggest to use xen at work with some added
> "backbone" and practical experience.
>
> Unfortunately I am unable to launch domains with
On Mon, Nov 16, Andrew Cooper wrote:
> On 16/11/15 06:36, Zhangbo (Oscar) wrote:
> > Hi all:
> > I'd like to SLEEP a while in xen kernel during VMEXIT, the easiest way
> > is to call "udelay" or "mdelay" there. However, these 2 functions use busy
> > wait to sleep, which is a waste.
> > In
On Thu, 2015-11-05 at 12:47 +, Stefano Stabellini wrote:
> diff --git a/docs/misc/qemu-deprivilege.txt b/docs/misc/qemu-
> deprivilege.txt
> new file mode 100644
> index 000..dde74ab
> --- /dev/null
> +++ b/docs/misc/qemu-deprivilege.txt
> @@ -0,0 +1,31 @@
> +For security reasons, libxl
The cxenstored implementation can't handle cross ring boundary read and
write. It gets aways with buggy behaviour because upper layer won't
sleep when short-write or short-read occurs.
It would be nice, however, to make the low level routine correct
regardless of what upper layer is doing. This
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: 16 November 2015 12:55
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Cc: Ian Jackson; Stefano Stabellini; Wei Liu
> Subject: Re: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir() for
>
On Wed, 2015-10-21 at 17:08 +0800, Chunyan Liu wrote:
> Sysfs file has size=4096 but actual file content is less than that.
> Current libxl_read_file_contents will treat it as error when file size
> and actual file content differs, so reading sysfs file content with
> this function always fails.
...in libxl__xs_writev_perms() and libxl__xs_printf()
ERROR_FAIL is returned when any underlying operation fails. This is a
semantic change in the case of a vasprintf() failure in libxl__xs_printf(),
but appears to be better than returning a hardcoded -1.
Signed-off-by: Paul Durrant
On Tue, 2015-10-27 at 16:46 +0100, Samuel Thibault wrote:
> Wei Liu, le Tue 27 Oct 2015 15:43:28 +, a écrit :
> > The xenbus thread didn't send notification to other end when it
> > expected
> > more data or consumed responses, which led to stalling the ring from
> > time to time.
> >
> >
On Mon, Nov 16, 2015 at 12:08:45PM +, Ian Campbell wrote:
> On Thu, 2015-11-12 at 10:06 +, Wei Liu wrote:
> > The new osstest tested head contains a fix for gcc-4.4 toolchain.
> >
> > Signed-off-by: Wei Liu
> > ---
> > Cc: "Hao, Xudong"
> > Cc:
On Thu, 2015-11-12 at 10:06 +, Wei Liu wrote:
> The new osstest tested head contains a fix for gcc-4.4 toolchain.
>
> Signed-off-by: Wei Liu
> ---
> Cc: "Hao, Xudong"
> Cc: Ian Campbell
>
> Please pull from
>
On Fri, 2015-11-13 at 09:56 -0700, Jim Fehlig wrote:
> On 11/12/2015 07:40 PM, Jim Fehlig wrote:
> > The fix for XSA-142 is quite a big hammer, rejecting readonly
> > disk configuration even when the requested backend is known to
> > support readonly. While it is true that qemu doesn't support
> >
On Wed, 2015-11-11 at 16:09 +, Julien Grall wrote:
>
> I will either resend this whole series or only this patch depending on
> the reviews.
I don't think I've got anything to add to my existing acks or Stefano's
comments. Best resend I think.
Ian.
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> The 2 registers are not described in the software spec (ARM IHI 0069A)
> and their offsets are marked "implementation defined".
They do exist in "PRD03-GENC-010745 24.0", in that they are mentioned as
having corresponding completion bits in
On 16/11/15 10:31, Huaitong Han wrote:
> This patch adds functions to get pkeys value from PTE.
>
> Signed-off-by: Huaitong Han
>
> diff --git a/xen/include/asm-x86/page.h b/xen/include/asm-x86/page.h
> index 87b3341..1cdbfc8 100644
> --- a/xen/include/asm-x86/page.h
> +++
On 16/11/15 14:40, Ian Campbell wrote:
> On Thu, 2015-11-12 at 14:48 +0100, Juergen Gross wrote:
>> On 12/11/15 14:47, Wei Liu wrote:
>>> On Thu, Nov 12, 2015 at 02:43:35PM +0100, Juergen Gross wrote:
In order to prepare a p2m list outside of the initial kernel mapping
do a rework of the
flight 64297 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/64297/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 6 xen-boot fail REGR. vs. 62277
On Thu, 2015-11-12 at 13:01 +, Wei Liu wrote:
> On Mon, Nov 09, 2015 at 04:19:24PM +0100, Juergen Gross wrote:
> > On 10/23/2015 03:04 PM, Juergen Gross wrote:
> > > This series is a combination of my previous patches:
> > >
> > > "libxc: remove most of tools/libxc/xc_dom_compat_linux.c"
> >
On Wed, 2015-11-11 at 15:24 +, Ian Jackson wrote:
> Jonathan Davies writes ("[PATCH] oxenstored: Quota.merge: don't assume
> domain already exists"):
> > In Quota.merge, we merge two quota hashtables, orig_quota and
> > mod_quota, putting
> > the results into dest_quota. These hashtables map
On Thu, 2015-11-05 at 11:56 +, David Scott wrote:
> > On 5 Nov 2015, at 11:39, Simon Rowe wrote:
> >
> > As defined by the Xen public header the fifth value of
> > shutdown_reason is watchdog.
>
> I’ve always been a bit suspicious about having both “Poweroff” and
On Thu, 2015-11-12 at 14:48 +0100, Juergen Gross wrote:
> On 12/11/15 14:47, Wei Liu wrote:
> > On Thu, Nov 12, 2015 at 02:43:35PM +0100, Juergen Gross wrote:
> > > In order to prepare a p2m list outside of the initial kernel mapping
> > > do a rework of the domain builder's page table handler.
On Mon, 2015-11-16 at 14:36 +0100, Peter Schmid wrote:
>
> so xl list has only dom0 in the output:
>
> xl list
> NameID Mem VCPUs State
> Time(s)
> (null) 0 1024 8 r-
> 230.7
The "(null)"
On 16/11/15 10:31, Huaitong Han wrote:
> This patch adds the flag to enable Memory Protection Keys.
>
> Signed-off-by: Huaitong Han
>
> diff --git a/docs/misc/xen-command-line.markdown
> b/docs/misc/xen-command-line.markdown
> index a565c1b..0ded4bf 100644
> ---
This series is v2 since patches #1 and #3 were part of my previous
RFC posting.
Patch #1 is a cosmetic change to re-name a function so that the name of
a function introduced in a subsequent patch makes more sense
Patch #2 passes back errors from libx__xs_printf() and
libxl__xs_writev_perms() if
As documented in docs/misc/xenstore, the XS_MKDIR operation merely makes
sure a path exists whereas ~/control/shutdown needs to start empty. Also
using XS_MKDIR for a node which is never supposed to have children is
somewhat counterintuitive.
This patch introduces a new libxl__xs_printf_perms()
On 16/11/15 10:31, Huaitong Han wrote:
> This patch adds pkeys support when setting CR4
>
> Signed-off-by: Huaitong Han
Again, this patch is in need of a rebase (although it should be entirely
mechanical).
~Andrew
>
> diff --git a/xen/arch/x86/hvm/hvm.c
Am Fri, 13 Nov 2015 14:36:54 -0700
schrieb Jim Fehlig :
Hi,
i have tested the patches provide by Jim Fehlig.
The setup consist of xen 4.6.0 with libvirt 1.2.19 and the patches.
As i describe in my posting in the libvirt-user list
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> Most of the identification registers space contains implementation
> defined registers (see 8.1.13 in ARM IHI 0069A) and only GIC{D,R}_PIDR2
> is required to be implemented.
I think you mean s/requested/required/ in the subject too?
>
>
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> Signed-off-by: Julien Grall
Acked-by: Ian Campbell
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> The GICD_ICACTIVER registers are missing in the read emulation of the
> distributor.
>
> Call the common emulation for the whole range.
>
> Signed-off-by: Julien Grall
Acked-by: Ian Campbell
According to public/sched.h, there is a new shutdown_reason called
soft_reset. Propagate that value to ocaml.
Signed-off-by: Wei Liu
---
Cc: David Scott
Cc: Ian Jackson
Cc: Stefano Stabellini
On 13/11/15 18:10, Dario Faggioli wrote:
> In fact, with 2 cpupools, one (the default) Credit and
> one Credit2 (with at least 1 pCPU in the latter), trying
> a (e.g., ACPI S3) suspend/resume crashes like this:
>
> (XEN) [ 150.587779] [ Xen-4.7-unstable x86_64 debug=y Not tainted
> ]
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> The offset in the emulation is based on byte. As most of the registers
> are 64/32 bits, they will span over multiple bytes.
>
> However, the current emulation only care about the first offset. This
"cares"
> will result to not emulate
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: 16 November 2015 13:43
> To: Paul Durrant; xen-de...@lists.xenproject.org
> Cc: Ian Jackson; Stefano Stabellini; Wei Liu
> Subject: Re: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir() for
>
On Mon, Nov 16, 2015 at 12:11:14PM +, Ian Campbell wrote:
> On Mon, 2015-11-16 at 11:45 +0100, Peter Schmid wrote:
> > Dear all
> > I have been trying to setup stubdomains for added security on a test
> > machine so I could then suggest to use xen at work with some added
> > "backbone" and
On Wed, 2015-11-11 at 16:18 +, Paul Durrant wrote:
> As documented in docs/misc/xenstore, the XS_MKDIR operation merely makes
> sure a path exists whereas ~/control/shutdown needs to start empty. Also
> using XS_MKDIR for a node which is never supposed to have children is
> somewhat
On Mon, 2015-11-09 at 15:49 +, Julien Grall wrote:
> #define GICD_ITARGETSR (0x800)
> +#define GICD_ITARGETSR7 (0x81C)
> +#define GICD_ITARGETSR8 (0x820)
As a future change, I wonder if making these take a parameter (N) and do
the necessary arithmetic would be less error prone?
> #define
On Fri, 2015-11-13 at 11:54 +, Julien Grall wrote:
> It helps to find quickly whether we forgot to emulate a register or not.
>
> At the same time add the missing reserved/implementation defined
> registers. All other missing registers will be added in a follow-up if
> necessary.
>
> Note
On 16/11/15 10:31, Huaitong Han wrote:
> This patch adds pku support for x86_capability.
>
> Signed-off-by: Huaitong Han
Please rebase your series (preferably on staging). There are some
recent changes in this area.
As rebasing (and correcting patch 1) will drop this
>>> On 16.11.15 at 15:16, wrote:
> On 16/11/15 10:31, Huaitong Han wrote:
>> +#define _PAGE_PKEY_BIT0 19 /* Protection Keys, bit 1/4 */
>> +#define _PAGE_PKEY_BIT1 20 /* Protection Keys, bit 2/4 */
>> +#define _PAGE_PKEY_BIT2 21 /* Protection Keys, bit
Paul Durrant writes ("[RFC PATCH 6/6] libxl: create path for advertisement of
network attributes..."):
> -frontend_perms[0].id = device->domid;
> -frontend_perms[0].perms = XS_PERM_NONE;
> -frontend_perms[1].id = device->backend_domid;
> -frontend_perms[1].perms = XS_PERM_READ;
>
On Mon, Nov 16, 2015 at 06:09:54PM +, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [PATCH] cxenstored: correct calculation of
> data/space in the ring"):
> > On 16/11/15 18:01, Ian Jackson wrote:
> > > Wei Liu writes ("[PATCH] cxenstored: correct calculation of data/space in
> > > the
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 16 November 2015 17:20
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Stefano Stabellini; Ian Campbell; Wei Liu
> Subject: Re: [RFC PATCH 2/6] libxl: stop using libxl__xs_mkdir() for
>
Wei Liu writes ("[PATCH] cxenstored: correct calculation of data/space in the
ring"):
> The cxenstored implementation can't handle cross ring boundary read and
> write. It gets aways with buggy behaviour because upper layer won't
> sleep when short-write or short-read occurs.
I don't understand
Ian Jackson writes ("Re: [RFC PATCH 4/6] libxl: add guest writable xenstore
area for driver versions"):
> > diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c
> > index cc82311..389427f 100644
> > --- a/tools/libxl/libxl_create.c
> > +++ b/tools/libxl/libxl_create.c
> > @@
Paul Durrant writes ("[RFC PATCH 4/6] libxl: add guest writable xenstore area
for driver versions"):
> docs/misc/xenstore-paths documents a path format that can be used by
> guests to supply version information for PV drivers.
>
> This patch creates a guest writable ~/drivers area for these
On Mon, Nov 16, 2015 at 10:22:41AM -0700, Linda wrote:
>
>
> On 11/16/2015 9:51 AM, Wei Liu wrote:
> >On Mon, Nov 16, 2015 at 09:36:24AM -0700, Linda wrote:
> >>Hi Wei,
> >>
> >>On 11/16/2015 8:16 AM, Wei Liu wrote:
> >>>Hi Linda
> >>>
> >>>On Fri, Nov 13, 2015 at 10:23:22AM -0700, Linda wrote:
Paul Durrant writes ("[PATCH v4 2/4] docs: Introduce xenstore paths for PV
driver information"):
> For domain management purposes it is convenient to be able to see
> information about PV drivers in xenstore. The XAPI toolstack in
> XenServer has always created a ~/drivers path for this purpose.
Ian Campbell writes ("Re: [PATCH V8 2/7] libxl_read_file_contents: add new
entry to read sysfs file"):
> @@ -359,20 +360,35 @@ int libxl_read_file_contents(libxl_ctx *ctx, const
> > char *filename,
> > datalen = stab.st_size;
> >
> > if (stab.st_size && data_r) {
> > -data =
On 16/11/15 12:18, Jan Beulich wrote:
On 06.11.15 at 17:05, wrote:
>> --- a/xen/include/public/arch-x86/xen.h
>> +++ b/xen/include/public/arch-x86/xen.h
>> @@ -265,7 +265,31 @@ typedef struct arch_shared_info arch_shared_info_t;
>> * XEN_DOMCTL_INTERFACE_VERSION.
>>
On Mon, Nov 16, 2015 at 8:25 AM, Boris Ostrovsky
wrote:
> On 11/15/2015 01:02 PM, Andy Lutomirski wrote:
>>
>> On Nov 13, 2015 5:23 PM, "Boris Ostrovsky"
>> wrote:
>>>
>>>
>>>
>>> On 11/13/2015 06:26 PM, Andy Lutomirski wrote:
On
On Tue, Nov 10, 2015 at 02:51:35PM -0500, Daniel De Graaf wrote:
> On 06/11/15 14:36, Konrad Rzeszutek Wilk wrote:
> >All of XENVER_* have now an XSM check.
> >
> >The subops for XENVER_[compile_info|changeset|commandline|
> >extraversion] are now priviliged operations. To not break
> >guests we
Paul Durrant writes ("[RFC PATCH 5/6] libxl: add guest writable xenstore area
for feature advertisement"):
> docs/misc/xenstore-paths documents a paths under a top-level ~/features
> area that a guest can use to advertise the ability to react to vif
> or vbd hotplug.
Acked-by: Ian Jackson
Paul Durrant writes ("[PATCH v4 4/4] docs: Introduce xenstore paths for guest
network address information"):
> +* MAC_ADDRESS -- 6 integers, in hexadecimal form, separated by ':',
> + specifying an ethernet MAC address.
> +* IPV4_ADDRESS -- 4 integers, in decimal form, separated
> -Original Message-
> From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
> Sent: 16 November 2015 17:36
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Campbell; Jan Beulich; Keir (Xen.org);
> Tim (Xen.org)
> Subject: Re: [PATCH v4 2/4] docs: Introduce xenstore paths for PV
If for any reason it's powered down, this is useful.
(In theory for a nested host, we could get the logs by grobbling in
its parent's view of its filesystem, but that is too much work.)
We do not trap the errors from this, so that if the PDU is broken (or
the L1 has not been created), we can
These methods are supposed to succeed, silently, if the host is
already in the required power state.
Signed-off-by: Ian Jackson
---
Osstest/PDU/guest.pm | 13 +++--
Osstest/TestSupport.pm |3 ++-
2 files changed, 13 insertions(+), 3 deletions(-)
diff
1 - 100 of 203 matches
Mail list logo