>>> Wei Liu 06/28/17 4:18 PM >>>
>@@ -1993,7 +1993,7 @@ void vcpu_kick(struct vcpu *v)
>* NB2. We save the running flag across the unblock to avoid a needless
>* IPI for domains that we IPI'd to unblock.
>*/
>-bool_t running = v->is_running;
>+bool running = v->is_running
>>> Andrew Cooper 06/28/17 4:30 PM >>>
>On 28/06/17 15:18, Wei Liu wrote:
>> --- a/xen/arch/x86/irq.c
>> +++ b/xen/arch/x86/irq.c
>> @@ -29,7 +29,7 @@
>> static void parse_irq_vector_map_param(char *s);
>>
>> /* opt_noirqbalance: If true, software IRQ balancing/affinity is disabled.
>> */
>>
>>> Ross Lagerwall 06/28/17 6:14 PM >>>
>--- a/xen/common/Kconfig
>+++ b/xen/common/Kconfig
>@@ -226,7 +226,7 @@ config CRYPTO
>bool
>
>config LIVEPATCH
>- bool "Live patching support (TECH PREVIEW)"
>+ bool "Live patching support"
>default n
I think the patch shouldn'
flight 42 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/42/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 4 host-install(4)broken REGR. vs. 1110
>>> 06/29/17 5:29 AM >>>
>On 06/27/17 01:13 -0600, Jan Beulich wrote:
>> >>> Haozhong Zhang 06/26/17 11:17 AM >>>
>> >+ if (mctctl->pending)
>> >+ mctelem_xchg_head(&mctctl->pending, &tep->mcte_next, tep);
>> >+ else if (lmce)
>> >+ mctelem_xchg_head(&mctctl->lmce_pending,
>>> Yi Sun 06/29/17 7:12 AM >>>
>On 17-06-28 05:43:58, Jan Beulich wrote:
>> >>> Yi Sun 06/28/17 11:10 AM >>>
>> >On 17-06-28 01:14:59, Jan Beulich wrote:
>> >> >>> Yi Sun 06/14/17 3:25 AM >>>
>> >> > @@ -537,7 +556,16 @@ int psr_get_val(struct domain *d, unsigned int
>> >> > socket,
>> >> >
>>> Roger Pau Monne 06/28/17 5:37 PM >>>
>On Mon, May 29, 2017 at 07:29:29AM -0600, Jan Beulich wrote:
>> >>> On 27.04.17 at 16:35, wrote:
>> > +switch ( offset )
>> > +{
>> > +case PCI_MSIX_ENTRY_LOWER_ADDR_OFFSET:
>> > +*data = entry->addr;
>>
>> You're not clipping off the
ping
On 06/23/2017 09:09 AM, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Extend xen_kbdfront to provide multi-touch support
to unprivileged domains.
Signed-off-by: Oleksandr Andrushchenko
---
Changes since initial:
- use input_set_capability instead of setting flags direc
This run is configured for baseline tests only.
flight 71613 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71613/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-i386-libvirt5 libvirt-buildfai
flight 41 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/41/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-xsm 7 xen-boot fail REGR. vs. 111081
test-amd64-amd64-xl-
On 17-06-28 05:43:58, Jan Beulich wrote:
> >>> Yi Sun 06/28/17 11:10 AM >>>
> >On 17-06-28 01:14:59, Jan Beulich wrote:
> >> >>> Yi Sun 06/14/17 3:25 AM >>>
> >> > @@ -537,7 +556,16 @@ int psr_get_val(struct domain *d, unsigned int
> >> > socket,
> >> > return -ENOENT;
> >> > }
> >
On 06/27/17 01:13 -0600, Jan Beulich wrote:
> >>> Haozhong Zhang 06/26/17 11:17 AM >>>
> >+/**
> >+ * Append a telemetry of deferred MCE to a per-cpu pending list,
> >+ * either @pending or @lmce_pending, according to rules below:
> >+ * - if @pending is not empty, then the new telemetry will be
The problem is for a VF of RC integrated PF (e.g. PF's BDF is 00:02.0),
we would wrongly use 00:00.0 to search VT-d unit.
From SRIOV spec REV 1.0 section 3.7.3, it says:
"ARI is not applicable to Root Complex integrated Endpoints; all other
SR-IOV Capable Devices (Devices that include at least one
flight 53 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 1fb805b1eb5b6039cb12375f8594aba65bf60a44
baseline version:
ovmf 157fb7bf29eea497b2202
On 06/27/17 00:38 -0600, Jan Beulich wrote:
> >>> Haozhong Zhang 06/26/17 11:17 AM >>>
> >Add a 'nowait' argument to mce_barrier_{enter,exit}() to allow them
> >return immediately without waiting mce_barrier_{enter,exit}() on other
> >CPUs. This is useful when handling LMCE, where mce_barrier_{ent
On 06/27/17 00:28 -0600, Jan Beulich wrote:
> >>> Haozhong Zhang 06/26/17 11:16 AM >>>
> >struct mc_telem_cpu_ctl is now used as the type of per-cpu variables,
> >rather than a globla variable shared by all CPUs, so some of its
> >comment do not apply any more.
> >
> >Signed-off-by: Haozhong Zhang
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-qemut-rhel6hvm-amd
testid guest-start/redhat.repeat
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.or
flight 36 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/36/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-cubietruck 10 debian-install fail REGR. vs. 110465
Regressions which
flight 44 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/44/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-2 59 leak-check/check fail REGR. vs. 111074
test-xtf-amd64-amd64-1
flight 59 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
On Wed, Jun 28, 2017 at 07:16:18PM +0100, Andrew Cooper wrote:
> On 28/06/17 11:10, Marek Marczykowski-Górecki wrote:
> > This is result of parsing cpu_map.xml from libvirt.
> > The most important part is handling leaf 0x0007, but while at it add
> > other bits too.
> >
> > Signed-off-by: Marek
Hi,
> >> On Mon, Jun 26, 2017 at 01:55:56PM -0400, Jason Dickens wrote:
> >>> I would like to inquire about q35 support in Xen? As far as I have been
> >>> able to tell, this has not been done? In the Xen version that I've been
> >>> working with (4.4), libxl_dm overrides any "-machine" argument
flight 33 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/33/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 debian-hvm-install fail
REGR. vs. 111061
Tests
On 28/06/17 20:27, Igor Druzhinin wrote:
> The new function repeats the behavior of the first version
> except it has an extended list of arguments which are subsequently
> passed to mmap() call.
>
> This is needed for QEMU depriviledging.
>
> Signed-off-by: Igor Druzhinin
Reviewed-by: Andrew Coo
The new function repeats the behavior of the first version
except it has an extended list of arguments which are subsequently
passed to mmap() call.
This is needed for QEMU depriviledging.
Signed-off-by: Igor Druzhinin
---
Cc: Ian Jackson
Cc: Wei Liu
Cc: Andrew Cooper
---
tools/libs/foreignm
"Old" tested version had not actually been tested; therefore in this
flight we test it, rather than a new candidate. The baseline, if
any, is the most recent actually tested revision.
flight 31 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/31/
Regressions :
On Wed, Jun 28, 2017 at 3:56 PM, Dario Faggioli
wrote:
> On Wed, 2017-06-28 at 15:28 +0100, George Dunlap wrote:
>> On Fri, Jun 23, 2017 at 5:19 PM, Dario Faggioli
>> wrote:
>> > > > +{
>> > > > +struct csched2_dom *sdom = data;
>> > > > +unsigned long flags;
>> > > > +s_time_t now;
>
On Thu, Jun 8, 2017 at 1:09 PM, Dario Faggioli
wrote:
> Note that a cap is considered valid only if
> it is within the [1, nr_vcpus]% interval.
Oh, I see you added the check here.
Still, I think we should add a check in the hypervisor too. The check
here should mainly be to give a reasonable er
Initialize xenfb properly, as all other backends, from its own
"initialise" function.
Signed-off-by: Stefano Stabellini
---
Changes in v2:
- remove xen_init_display from xen_backend.h
- handle cases where vkbd is missing
diff --git a/hw/display/xenfb.c b/hw/display/xenfb.c
index e76c0d8..3b0168
flight 54 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/54/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
On Wed, 28 Jun 2017, Peter Maydell wrote:
> On 28 June 2017 at 01:06, Stefano Stabellini wrote:
> > On Tue, 27 Jun 2017, Peter Maydell wrote:
> >> So, there is exactly one caller of main_loop_wait() in the tree that
> >> passes it 'true' as an argument. That caller is in xen_init_display()
> >> in
On 28/06/17 11:10, Marek Marczykowski-Górecki wrote:
> This is result of parsing cpu_map.xml from libvirt.
> The most important part is handling leaf 0x0007, but while at it add
> other bits too.
>
> Signed-off-by: Marek Marczykowski-Górecki
Xen's canonical reference is include/asm-x86/cpufea
On 28/06/17 18:51, Wei Liu wrote:
> On Wed, Jun 28, 2017 at 05:20:38PM +0100, Andrew Cooper wrote:
>> On 28/06/17 17:14, Marek Marczykowski-Górecki wrote:
>>> On Wed, Jun 28, 2017 at 11:16:33AM +0100, Andrew Cooper wrote:
On 28/06/17 07:09, Jan Beulich wrote:
Marek Marczykowski-Góreck
On Wed, Jun 28, 2017 at 12:10:20PM +0200, Marek Marczykowski-Górecki wrote:
> This adds handling more cpuid bits by name. Mostly based on cpu_map.xml from
> libvirt.
>
> Marek Marczykowski-Górecki (2):
> libxl: add more cpuid flags handling
> libxl: drop osvw cpuid flag
Given that I prefer to
On Wed, Jun 28, 2017 at 12:10:21PM +0200, Marek Marczykowski-Górecki wrote:
> This is result of parsing cpu_map.xml from libvirt.
> The most important part is handling leaf 0x0007, but while at it add
> other bits too.
>
> Signed-off-by: Marek Marczykowski-Górecki
Subject to an ack from x86
On Wed, Jun 28, 2017 at 05:20:38PM +0100, Andrew Cooper wrote:
> On 28/06/17 17:14, Marek Marczykowski-Górecki wrote:
> > On Wed, Jun 28, 2017 at 11:16:33AM +0100, Andrew Cooper wrote:
> >> On 28/06/17 07:09, Jan Beulich wrote:
> >> Marek Marczykowski-Górecki 06/28/17
> >> 3:09 AM >>>
> >
On Tue, Jun 27, 2017 at 07:35:44PM +0200, Marek Marczykowski-Górecki wrote:
> GCC 7 warns (and thanks to -Werror, fails) about potential string
> truncation by snprintf in get_next_battery_file. Since the code already
> check if string is no longer than 4 chars, tell gcc about it.
>
> Signed-off-b
On Tue, Jun 27, 2017 at 07:35:43PM +0200, Marek Marczykowski-Górecki wrote:
> GCC-7 have -Wimplicit-fallthrough enabled with -Wextra. Add appropriate
> comment which both mute the warning and improve readibility.
>
> Signed-off-by: Marek Marczykowski-Górecki
Acked-by: Wei Liu
_
On Sun, Jun 25, 2017 at 11:15:28PM +0100, Simon Waterman wrote:
> This patch adds support for choosing upstream QEMU as the PV QEMU
> backend for an IOEMU stubdom instead of qemu-xen-traditional.
> The motivation is to expose QEMU features only available in upstream
> like VNC auth options.
>
> It
On Wed, Jun 28, 2017 at 05:13:44PM +0100, Ross Lagerwall wrote:
> See docs/features/livepatch.pandoc for the details.
>
> Signed-off-by: Ross Lagerwall
Reviewed-by: Konrad Rzeszutek Wilk
Thank you for the writeup!
___
Xen-devel mailing list
Xen-deve
On Fri, Jun 23, 2017 at 12:35:28AM +0800, Zhongze Liu wrote:
> This is a preparation for the proposal "allow setting up shared memory areas
> between VMs from xl config file". See:
> V2: https://lists.xen.org/archives/html/xen-devel/2017-06/msg02256.html
> V1: https://lists.xen.org/archives/html/xe
On Thu, Jun 22, 2017 at 01:08:50PM +0530, Bhupinder Thakur wrote:
[...]
> static struct termios stdin_old_attr;
> @@ -343,6 +344,7 @@ int main(int argc, char **argv)
> char *end;
> console_type type = CONSOLE_INVAL;
> bool interactive = 0;
> + char *console_names = "serial, p
On Thu, Jun 22, 2017 at 01:08:49PM +0530, Bhupinder Thakur wrote:
> This patch finally adds the support for vuart console.
>
[...]
>
> diff --git a/tools/console/daemon/io.c b/tools/console/daemon/io.c
> index baf0e2e..6b0114e 100644
> --- a/tools/console/daemon/io.c
> +++ b/tools/console/daemon
On Thu, Jun 22, 2017 at 01:08:51PM +0530, Bhupinder Thakur wrote:
> The SBSA UART node format is as specified in
> Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
>
> ARM SBSA defined generic UART
> --
> This UART uses a subset of the PL011 r
On Thu, Jun 22, 2017 at 01:08:48PM +0530, Bhupinder Thakur wrote:
> This patch adds the support for multiple consoles and introduces the iterator
> functions to operate on multiple consoles.
>
> This patch is in preparation to support a new vuart console.
>
> Signed-off-by: Bhupinder Thakur
> --
On Thu, Jun 22, 2017 at 01:08:47PM +0530, Bhupinder Thakur wrote:
> Xenconsole functions take domain structure as input. These functions shall be
> modified to take console structure as input since these functions typically
> perform
> console specific operations.
>
> Also the console specific fu
On Thu, Jun 22, 2017 at 01:08:43PM +0530, Bhupinder Thakur wrote:
[...]
> +#if defined (__arm__) || defined(__aarch64__)
> +/**
> + * This function initializes the vpl011 emulation and returns
> + * the event to be used by the backend for communicating with
> + * the emulation code.
> + *
> + * @pa
On Thu, Jun 22, 2017 at 01:08:46PM +0530, Bhupinder Thakur wrote:
> The console->conspath name is changed to console->xspath as it is
> clear from the name that it is referring to xenstore path.
>
> Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
_
On Thu, Jun 22, 2017 at 01:08:41PM +0530, Bhupinder Thakur wrote:
> An option is provided in libxl to enable/disable sbsa vuart while
> creating a guest domain.
>
> Libxl now suppots a generic vuart console and sbsa uart is a specific type.
> In future support can be added for multiple vuart of di
On Thu, Jun 22, 2017 at 01:08:45PM +0530, Bhupinder Thakur wrote:
> Xenconsole uses a domain structure which contains console specific fields.
> This
> patch defines a new console structure, which would be used by the xenconsole
> functions to perform console specific operations like reading/writi
On Thu, Jun 22, 2017 at 01:08:38PM +0530, Bhupinder Thakur wrote:
> DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
> xencons_queued() to tell the current size of the ring buffer,
> xencons_mask() to mask off the index, which are useful helper functions.
> pl011 emulation code
On Thu, Jun 22, 2017 at 01:08:44PM +0530, Bhupinder Thakur wrote:
> Add a new vuart console node to xenstore. This node is added at
>
> /local/domain/$DOMID/vuart/0.
>
> The node contains information such as the ring-ref, event channel,
> buffer limit and type of console.
>
> Xenconsole reads th
On 28/06/17 10:35, Sergey Dyasli wrote:
> If ept_sync_domain() is called for np2m, the following happens:
>
> 1. *np2m*::ept_data::invalidate cpumask is updated
> 2. IPIs are sent for CPUs in domain_dirty_cpumask forcing vmexits
> 3. vmx_vmenter_helper() checks *hostp2m*::ept_data::inva
. snip..
> > Now all of the customers that have applied those patches are vulnerable.
> >
> > Do you:
> >
> > 1. Tell the reporter to post it publicly to xen-devel immediately, since
> > livepatch tools are not security supported -- thus "zero-day"-ing all
> > your customers (as well as anyone el
Konrad Rzeszutek Wilk writes:
> On Mon, Jun 26, 2017 at 06:39:30PM +0200, Vitaly Kuznetsov wrote:
>> CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests
>> BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a
>> leftover from ancient times when CPU0 hotplug w
On 28/06/17 15:57, Wei Liu wrote:
> On Wed, Jun 28, 2017 at 03:26:18PM +0100, Andrew Cooper wrote:
>> On 28/06/17 15:18, Wei Liu wrote:
>>> Signed-off-by: Wei Liu
>>> ---
>>> xen/arch/x86/setup.c | 24
>>> 1 file changed, 12 insertions(+), 12 deletions(-)
>>>
>>> diff --g
On 28/06/17 17:14, Marek Marczykowski-Górecki wrote:
> On Wed, Jun 28, 2017 at 11:16:33AM +0100, Andrew Cooper wrote:
>> On 28/06/17 07:09, Jan Beulich wrote:
>> Marek Marczykowski-Górecki 06/28/17
>> 3:09 AM >>>
It's bit 9 not 10 (which is ibs).
>>> Indeed, but shouldn't it rather b
On 06/27/2017 10:17 AM, George Dunlap wrote:
On 26/06/17 18:30, Andrew Cooper wrote:
On 26/06/17 18:00, George Dunlap wrote:
On 26/06/17 16:36, Ross Lagerwall wrote:
...
We absolutely cannot be in the position of issuing XSAs for situations
like this, because there are too many ways where it
On Wed, Jun 28, 2017 at 11:16:33AM +0100, Andrew Cooper wrote:
> On 28/06/17 07:09, Jan Beulich wrote:
> Marek Marczykowski-Górecki 06/28/17
> 3:09 AM >>>
> >> It's bit 9 not 10 (which is ibs).
> > Indeed, but shouldn't it rather be removed? We don't expose it from the
> > hypervisor at
See docs/features/livepatch.pandoc for the details.
Signed-off-by: Ross Lagerwall
---
Moved it into a feature document.
Clarified a few bits and pieces based on feedback.
docs/features/livepatch.pandoc | 103 +
xen/common/Kconfig | 2 +-
2
flight 34 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/34/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-amd 12 guest-start/redhat.repeat fail REGR. vs.
110441
build-armhf-
Sorry for the late reply.
I can see the thread already contains answers to some of my questions so
I will just reply to the bits that are still relevant.
On Fri, Jun 23, 2017 at 01:27:24AM +0800, Zhongze Liu wrote:
> Hi Wei,
>
> Thank you for your valuable comments.
>
> 2017-06-21 23:09 GMT+08:
On Thu, Jun 8, 2017 at 1:09 PM, Dario Faggioli
wrote:
> Instead of letting the vCPU that for first tries to get
s/for//;
> some budget take it all (although temporarily), allow each
> vCPU to only get a specific quota of the total budget.
>
> This improves fairness, allows for more parallelism,
On Wed, Jun 28, 2017 at 08:57:28PM +0800, Dongli Zhang wrote:
> This patch partially reverts 3df0e50 ("xen/blkfront: pseudo support for
> multi hardware queues/rings"). The xen-blkfront queue/ring might hang due
> to grants allocation failure in the situation when gnttab_free_head is
> almost empty
On Mon, Jun 26, 2017 at 06:39:30PM +0200, Vitaly Kuznetsov wrote:
> CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests
> BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a
> leftover from ancient times when CPU0 hotplug was impossible, it works
> just fine f
On Mon, May 29, 2017 at 07:29:29AM -0600, Jan Beulich wrote:
> >>> On 27.04.17 at 16:35, wrote:
> > +static int vpci_msix_control_write(struct pci_dev *pdev, unsigned int reg,
> > + union vpci_val val, void *data)
> > +{
> > +uint8_t seg = pdev->seg, bus = pde
On 20/06/17 01:19, Vikram Sethi wrote:
Hi Julien,
Hi Vikram,
Thank you for your feedbacks.
Thanks for posting this. I think some additional topics need to be covered in
the design document, under 3 main topics:
I wanted to limit the scope of the PCI passthrough work to the strict
minim
On Thu, Jun 8, 2017 at 1:08 PM, Dario Faggioli
wrote:
> As cap is already present in Credit1, as a parameter, all
> the wiring is there already for it to be percolate down
> to csched2_dom_cntl() too.
>
> In this commit, we actually deal with it, and implement
> setting, changing or disabling the
On Wed, Jun 28, 2017 at 03:26:18PM +0100, Andrew Cooper wrote:
> On 28/06/17 15:18, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > xen/arch/x86/setup.c | 24
> > 1 file changed, 12 insertions(+), 12 deletions(-)
> >
> > diff --git a/xen/arch/x86/setup.c b/xen/arch/
On Wed, 2017-06-28 at 15:28 +0100, George Dunlap wrote:
> On Fri, Jun 23, 2017 at 5:19 PM, Dario Faggioli
> wrote:
> > > > +{
> > > > +struct csched2_dom *sdom = data;
> > > > +unsigned long flags;
> > > > +s_time_t now;
> > > > +LIST_HEAD(parked);
> > > > +
> > > > +spin_lock_
On Fri, Jun 23, 2017 at 5:19 PM, Dario Faggioli
wrote:
>> > +{
>> > +struct csched2_dom *sdom = data;
>> > +unsigned long flags;
>> > +s_time_t now;
>> > +LIST_HEAD(parked);
>> > +
>> > +spin_lock_irqsave(&sdom->budget_lock, flags);
>> > +
>> > +/*
>> > + * It is possib
On 28/06/17 15:18, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> xen/arch/x86/setup.c | 24
> 1 file changed, 12 insertions(+), 12 deletions(-)
>
> diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
> index f7b927858c..db5df6956d 100644
> --- a/xen/arch/x86/setup.
On 28/06/17 15:18, Wei Liu wrote:
> Signed-off-by: Wei Liu
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 28/06/17 15:18, Wei Liu wrote:
> Replace bool_t with bool and adjust code accordingly.
>
> Signed-off-by: Wei Liu
> ---
> xen/arch/x86/irq.c | 25 +
> 1 file changed, 13 insertions(+), 12 deletions(-)
>
> diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
> index 1136
On 28/06/17 15:18, Wei Liu wrote:
> Signed-off-by: Wei Liu
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Signed-off-by: Wei Liu
---
xen/arch/x86/dom0_build.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c
index cc8acad688..0c125e61eb 100644
--- a/xen/arch/x86/dom0_build.c
+++ b/xen/arch/x86/dom0_build.c
@@ -83,7
While at it, change check_nmi_watchdog to return void because its
return value is not used anyway.
Signed-off-by: Wei Liu
---
xen/arch/x86/nmi.c | 34 +-
xen/include/asm-x86/apic.h | 4 ++--
2 files changed, 19 insertions(+), 19 deletions(-)
diff --git a
Signed-off-by: Wei Liu
---
xen/arch/x86/platform_hypercall.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/platform_hypercall.c
b/xen/arch/x86/platform_hypercall.c
index 10e7bcc161..ebc2f394ee 100644
--- a/xen/arch/x86/platform_hypercall.c
+++ b/xen/
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c| 16
xen/include/asm-x86/domain.h | 2 +-
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index f7873da323..4e176e4d56 100644
--- a/xen/arch/x86/domain.c
+++ b/x
Replace bool_t with bool and adjust code accordingly.
Signed-off-by: Wei Liu
---
xen/arch/x86/irq.c | 25 +
1 file changed, 13 insertions(+), 12 deletions(-)
diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
index 113667cdea..32800ce165 100644
--- a/xen/arch/x86/irq.c
Signed-off-by: Wei Liu
---
xen/arch/x86/setup.c | 24
1 file changed, 12 insertions(+), 12 deletions(-)
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index f7b927858c..db5df6956d 100644
--- a/xen/arch/x86/setup.c
+++ b/xen/arch/x86/setup.c
@@ -53,7 +53,7 @@
#
Did some cleanup while I'm looking for files to break apart under x86/.
Wei Liu (8):
x86/irq.c: use plain bool
x86/platform_hypercall.c: use plain bool
x86/domain.c: use plain bool
x86/dom0_build.c: use plain bool
x86/crash.c: use plain bool
x86/time.c: use plain bool
x86/nmi.c: use
Signed-off-by: Wei Liu
---
xen/arch/x86/time.c | 28 ++--
xen/include/asm-x86/domain.h | 4 ++--
2 files changed, 16 insertions(+), 16 deletions(-)
diff --git a/xen/arch/x86/time.c b/xen/arch/x86/time.c
index 655af33cb3..75ea695ac5 100644
--- a/xen/arch/x86/time
Signed-off-by: Wei Liu
---
xen/arch/x86/crash.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/crash.c b/xen/arch/x86/crash.c
index f28f527912..82535c4df0 100644
--- a/xen/arch/x86/crash.c
+++ b/xen/arch/x86/crash.c
@@ -33,7 +33,7 @@
static cpumask_t waiti
FEATURE_CONTROL is already read with LOCK bit set (so is unmodifiable), and
all VMX MSRs are read-only. Also, fix the MSR_IA32_VMX_TRUE_ENTRY_CTLS bound
to be MSR_IA32_VMX_VMFUNC, rather than having the intervening MSRs falling
into the default case.
Raise #GP faults if the guest tries to modify
On 6/28/2017 4:36 AM, Joerg Roedel wrote:
Hi Tom,
Hi Joerg,
On Tue, Jun 27, 2017 at 10:12:30AM -0500, Tom Lendacky wrote:
---
drivers/iommu/amd_iommu.c | 30 --
drivers/iommu/amd_iommu_init.c | 34 --
drivers/iommu/a
Hi,
At 12:16 +0100 on 28 Jun (1498652182), Andrew Cooper wrote:
> sh_pin() has boolean properties, so switch its return type.
>
> Signed-off-by: Andrew Cooper
Good idea, thanks.
> -static bool_t
> +static bool
> sh_write_guest_entry(struct vcpu *v, intpte_t *p, intpte_t new, mfn_t gmfn)
Can
On 28/06/17 14:53, Konrad Rzeszutek Wilk wrote:
> On Wed, Jun 28, 2017 at 12:16:19PM +0100, Andrew Cooper wrote:
>> * Drop redundant initialisers
>> * Style corrections while changing client_over_quota()
>> * Drop all write-only bools from do_tmem_op()
> s/write-only/useless write-only/
:) The
On Wed, Jun 28, 2017 at 12:16:19PM +0100, Andrew Cooper wrote:
> * Drop redundant initialisers
> * Style corrections while changing client_over_quota()
> * Drop all write-only bools from do_tmem_op()
s/write-only/useless write-only/
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Konrad Rzesz
There doesn't seem to be a cover letter.
All four patches:
Reviewed-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Dear community members,
I'm pleased to announce that Xen 4.9.0 is released.
Please find the tarball and its signature at:
https://xenproject.org/downloads/xen-archives/xen-project-49-series/xen-project-490.html
You can also check out the tag in xen.git:
https://xenbits.xen.org/git-http/xe
flight 46 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/46/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
This patch partially reverts 3df0e50 ("xen/blkfront: pseudo support for
multi hardware queues/rings"). The xen-blkfront queue/ring might hang due
to grants allocation failure in the situation when gnttab_free_head is
almost empty while many persistent grants are reserved for this queue/ring.
As pe
> -Original Message-
> From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> Sent: 27 June 2017 23:07
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org; qemu-
> bl...@nongnu.org
> Subject: Re: [Xen-devel] [PATCH v2 0/3] xen-disk: performance
> improvements
The old tools are no longer working.
Signed-off-by: Ian Jackson
CC: Andrew Cooper
---
production-config | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/production-config b/production-config
index 96831c7..1bc56d8 100644
--- a/production-config
+++ b/production-config
@@ -114
>>> Andrew Cooper 06/28/17 1:17 PM >>>
>Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
flight 24 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/24/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
110515
test-amd64-a
>>> Yi Sun 06/28/17 11:10 AM >>>
>On 17-06-28 01:14:59, Jan Beulich wrote:
>> >>> Yi Sun 06/14/17 3:25 AM >>>
>> > @@ -537,7 +556,16 @@ int psr_get_val(struct domain *d, unsigned int socket,
>> > return -ENOENT;
>> > }
>> >
>> > +domain_lock(d);
>> > +if ( !test_bit(d->dom
On 27/06/17 19:19, Jan Beulich wrote:
Andrew Cooper 06/27/17 8:06 PM >>>
>> On 26/06/17 17:28, Wei Liu wrote:
>>> --- a/xen/arch/x86/traps.c
>>> +++ b/xen/arch/x86/traps.c
>>> @@ -1934,21 +1934,29 @@ void __init init_idt_traps(void)
>>> this_cpu(compat_gdt_table) = boot_cpu_compat_gdt_ta
flight 40 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/40/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 8b9793bfe614ee53029d2b1672e1080170809dcd
baseline version:
xen d5f6
1 - 100 of 129 matches
Mail list logo