flight 112796 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112796/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2
Hello all,
v4:
* Added patch with public definitiod for xen_uuid_t
* Added patch with immediate value mask for SMC, HVC and SVC
* Added patch with header smccc.h (generic SMCCC definitions)
* Added patches that add and enable XENFEAT_ARM_SMCCC_supported
* Removed patch that added
On Mon, Aug 21, 2017 at 12:30 PM, Boris Ostrovsky
wrote:
>
> Adding maintainer (Dmitry).
I can't seem to find the original in my mailbox nor in patchwork. Can
you please resend?
>
>
> -boris
>
> On 08/21/2017 11:41 AM, Liang Yan wrote:
> > Long pressed key could not
On Mon, 21 Aug 2017, Ross Lagerwall wrote:
> When the guest writes to the RTC, Xen emulates it and broadcasts a
> TIMEOFFSET ioreq. Emit an RTC_CHANGE QMP message when this happens
> rather than ignoring it so that something useful can be done with the
> information.
Are there any handlers of the
flight 112767 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112767/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 10 debian-hvm-install fail REGR. vs.
110906
On Tue, 15 Aug 2017, Lan Tianyu wrote:
> Hi Anthony:
>
> On 2017年08月12日 02:04, Anthony PERARD wrote:
> > On Wed, Aug 09, 2017 at 04:51:21PM -0400, Lan Tianyu wrote:
> >> From: Chao Gao
> >>
> >> If a vIOMMU is exposed to guest, guest will configure the msi to remapping
> >>
PSCI handling code had helper routine that checked calling convention.
It does not needed anymore, because:
- Generic handler checks that 64 bit calls can be made only by
64 bit guests.
- SMCCC requires that 64-bit handler should support both 32 and 64 bit
calls even if they originate
As Xen now supports SMCCC, we can enable this feature to tell
guests that it is safe to call generic SMCs and HVCs.
Signed-off-by: Volodymyr Babchuk
---
xen/common/kernel.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/common/kernel.c
This feature indicates that hypervisor is compatible with ARM
SMC calling convention. Hypervisor will not inject an undefined
instruction exception if an invalid SMC function were called and
will not crash a domain if an invlalid HVC functions were called.
Signed-off-by: Volodymyr Babchuk
On Sat, 19 Aug 2017, Zhongze Liu wrote:
> This is for the proposal "Allow setting up shared memory areas between VMs
> from xl config file". See:
>
> https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
>
> Then plan is to use XENMEM_add_to_physmap_batch to map the shared
Anthony,
The code looks good. I tested this patch with Linux guests and seems to
work OK, can you also confirm?
One comment below.
On Wed, 26 Jul 2017, Owen Smith wrote:
> Avoid the unneccessary calls through the input-legacy.c file by
> using the qemu_input_handler_*() calls directly. This
On Wed, 26 Jul 2017, Owen Smith wrote:
> Writes "feature-raw-pointer" during init to indicate the backend
> can pass raw unscaled values for absolute axes to the frontend.
> Frontends set "request-raw-pointer" to indicate the backend should
> not attempt to scale absolute values to console size.
>
On Fri, 11 Aug 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
and applied
> ---
> xen/arch/arm/domain.c | 22 +++---
> 1 file changed, 11 insertions(+), 11 deletions(-)
>
> diff --git
On Fri, 11 Aug 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
and applied
> ---
> xen/arch/arm/vtimer.c | 9 +
> 1 file changed, 5 insertions(+), 4 deletions(-)
>
> diff --git
On Fri, 11 Aug 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
and applied
> ---
> xen/arch/arm/vgic-v3.c | 7 ---
> 1 file changed, 4 insertions(+), 3 deletions(-)
>
> diff --git
On Tue, 8 Aug 2017, Julien Grall wrote:
> Xen allows shared mapping to be Normal inner-cacheable with any inner cache
> allocation strategy and no restriction of the outer-cacheability.
>
> However, Xen is always mapping those region Normal Inner Write-Back
> Outer Write-Back Inner-shareable. Per
On Fri, 11 Aug 2017, Julien Grall wrote:
> This is a left over of before the P2M code was reworked. So drop it.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/p2m.c | 4
> 1 file changed, 4 deletions(-)
PSCI is part of HVC/SMC interface, so it should be handled in
appropriate place: `vsmc.c`. This patch just moves PSCI
handler calls from `traps.c` to `vsmc.c`.
Older PSCI 0.1 uses SMC function identifiers in range that is
resereved for exisings APIs (ARM DEN 0028B, page 16), while newer
PSCI 0.2
This patch adds generic definitions used in ARM SMC call convention.
Those definitions was taken from linux header arm-smccc.h, extended
and formatted according to XEN coding style.
They can be used by both SMCCC clients (like PSCI) and by SMCCC
servers (like vPSCI or upcoming generic SMCCC
SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs.
SMCCC states that both HVC and SMC are valid conduits to call to different
firmware functions. Thus, for example, PSCI calls can be made both by
SMC or HVC. Also SMCCC defines function number coding for such calls.
Besides
smccc.h provides definitions to construct SMC call function number according
to SMCCC. We don't need multiple definitions for one thing, and definitions
in smccc.h are more generic than ones used in psci.h.
So psci.h will only provide function codes, while whole SMC function
identifier will be
There are standard functions set_user_reg() and get_user_reg(). We can
use them in PSCI_SET_RESULT()/PSCI_ARG() macroses instead of relying on
CONFIG_ARM_64 definition.
Signed-off-by: Volodymyr Babchuk
---
* Added space into reg,n
* Used 32-bit constant tin
Added type xen_uuid_t. This type represents UUID as an array of 16
bytes in big endian format.
Added macro XEN_DEFINE_UUID that constructs UUID in the usual way:
XEN_DEFINE_UUID(00112233, 4455, 6677, 8899, aabbccddeeff)
will construct UUID 00112233-4455-6677-8899-aabbccddeeff presented as
This patch adds definition HSR_XXC_IMM_MASK. It can be used to extract
immediate value for trapped HVC32, HVC64, SMC64, SVC32, SVC64 instructions,
as described at ARM ARM (ARM DDI 0487B.a pages D7-2270, D7-2272).
Signed-off-by: Volodymyr Babchuk
---
Trapped SMC instruction can fail condition check on ARMv8 arhcitecture
(ARM DDI 0487B.a page D7-2271). So we need to check if condition was meet.
Signed-off-by: Volodymyr Babchuk
---
xen/arch/arm/traps.c | 6 ++
1 file changed, 6 insertions(+)
diff --git
These routines are first called via CPU_UP_PREPARE notifier by
the BSP and then by the booting ASP from vmx_cpu_up()/_svm_cpu_up().
Avoid the unnecessary second call. Because BSP doesn't go through
CPU_UP_PREPARE it is a special case. We pass 'bsp' flag to newly
added _vmx_cpu_up() (just like
On 17-08-21 18:14:49, Chao Peng wrote:
>
> >
> > -static void libxl__psr_cat_log_err_msg(libxl__gc *gc, int err)
> > +static void libxl__psr_alloc_log_err_msg(libxl__gc *gc,
> > + int err,
> > + libxl_psr_cbm_type
Long pressed key could not show right in XEN vncviewer after tigervnc client
changed the way how to send repeat keys, from "Down Up Down Up ..." to "Down
Down ... Up". By enable EV_REP bit here, XEN keyboard device will trigger
default auto repeat process from input subsystem, and make auto
On Mon, Aug 21, 2017 at 4:07 AM, Andrii Anisov wrote:
>
> Hello Meng Xu,
>
>
> On 18.08.17 23:43, Meng Xu wrote:
>>
>> The Section 4.1 and 4.2 in [1] explained the whole experiment steps.
>> If you have any question or confusion on a specific step, please feel
>> free to
flight 112799 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112799/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2
find_next_rmrr(base) is used to find the lowest RMRR ending above base
but below 4G. Current method couldn't cover the following situation:
a. two rmrr exist, small gap between them
b. pci_mem_start and mem_resource.base is below the first rmrr.base
c. find_next_rmrr(pci_mem_start) will find the
On Mon, Aug 21, 2017 at 4:38 AM, Andrii Anisov wrote:
>
> On 18.08.17 23:43, Meng Xu wrote:
>>
>> Sure. The workload we used in the paper is mainly the cpu-intensive task.
>> We first calibrate a busy-loop of multiplications that runs for 1ms.
>> Then for a task that
On 17-08-21 18:12:18, Chao Peng wrote:
>
> > * mode: C
> > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> > index 6e80d36..10d317b 100644
> > --- a/tools/libxl/libxl_types.idl
> > +++ b/tools/libxl/libxl_types.idl
> > @@ -977,6 +977,7 @@ libxl_psr_cbm_type =
On 17-08-21 18:13:07, Chao Peng wrote:
>
> > int libxl_psr_cat_get_info(libxl_ctx *ctx, libxl_psr_cat_info **info,
> > int *nr, unsigned int lvl)
> > {
> > GC_INIT(ctx);
> > int rc;
> > -int i = 0, socketid, nr_sockets;
> > -libxl_bitmap socketmap;
On Mon, Aug 21, 2017 at 4:16 AM, Andrii Anisov wrote:
>
> On 21.08.17 11:07, Andrii Anisov wrote:
>>
>> Hello Meng Xu,
>>
>>
>> On 18.08.17 23:43, Meng Xu wrote:
>>>
>>> The Section 4.1 and 4.2 in [1] explained the whole experiment steps.
>>> If you have any question or
Hi,
On Aug 18 2017 16:23, Oleksandr Andrushchenko wrote:
>> You mean that any alsa-lib or libpulse applications run on Dom0 as a
>> backend driver for the frontend driver on DomU?
>>
> No, the sound backend [1] is a user-space application (ALSA/PulseAudio
> client)
> which runs as a Xen
flight 112772 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112772/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 10 debian-hvm-install fail REGR. vs.
112655
> -Original Message-
> From: Juergen Gross [mailto:jgr...@suse.com]
> Sent: 21 August 2017 12:02
> To: Paul Durrant ; xen-de...@lists.xenproject.org
> Cc: Jan Beulich ; Andrew Cooper
>
> Subject: Re: [PATCH v3 09/52]
flight 112757 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112757/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf fa74dd2217aebe6930890e55d58d35e639b18c2e
baseline version:
ovmf
>>> On 21.08.17 at 11:46, wrote:
> Xen never detects the MSIX table entry unmask because it happens
> before the MSIX is bound to the guest, so the Xen msixtbl handlers are
> not aware of this memory region.
>
> The two possible solutions I see to this are:
>
> - Make
>>> On 21.08.17 at 12:07, wrote:
> * Completion of the x86 insn emulator (as far as possible)
> - XEN-46
> - Jan Beulich
Patches for the next step have been pending unreviewed for
exactly 2 months. Considering how much review of new
functionality patches by various
>>> On 21.08.17 at 13:55, wrote:
> This avoids unnecessary updates to the stack shadow copy of cr4 during
> critical regions with interrupts disabled.
Hmm, yes - we don't access CR4 in #MC or NMI handling, do we?
> No change in behaviour.
>
> Signed-off-by: Andrew
From: Vivek Kumar Chaubey
Allow setting system enclosure asset tag for HVM guest. Guest OS can
check and perform desired operation like support installation.
Also added documentation of '~/bios-string/*' xenstore keys into
docs/misc/xenstore-paths.markdown
This avoids unnecessary updates to the stack shadow copy of cr4 during
critical regions with interrupts disabled.
No change in behaviour.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/flushtlb.c | 19 +--
1 file
>>> On 21.08.17 at 12:28, wrote:
> Hi Jan,
>
> On 7 August 2017 at 14:44, Jan Beulich wrote:
> Bhupinder Thakur 08/07/17 10:55 AM >>>
>>>@@ -1148,6 +1149,24 @@ struct xen_domctl_psr_cat_op {
>>>uint32_t target;
On 21/08/17 10:33, Paul Durrant wrote:
>> -Original Message-
>> From: Juergen Gross [mailto:jgr...@suse.com]
>> Sent: 16 August 2017 13:52
>> To: xen-de...@lists.xenproject.org
>> Cc: Juergen Gross ; Paul Durrant
>> ; Jan Beulich
flight 112750 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112750/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 10 debian-hvm-install fail REGR. vs.
112647
branch xen-4.5-testing
xenbranch xen-4.5-testing
job test-amd64-i386-xl-qemuu-ovmf-amd64
testid debian-hvm-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree:
>>> On 21.08.17 at 12:59, wrote:
> On Wed, Aug 9, 2017 at 8:36 AM, Jan Beulich wrote:
> On 08.08.17 at 13:16, wrote:
>>> On 08/07/2017 04:59 PM, Jan Beulich wrote:
>>> George Dunlap
On 21.08.17 11:07, Andrii Anisov wrote:
Hello Meng Xu,
On 18.08.17 23:43, Meng Xu wrote:
The Section 4.1 and 4.2 in [1] explained the whole experiment steps.
If you have any question or confusion on a specific step, please feel
free to let me know.
From the document it is not really clear if
The compat mode code also needs adjustment to deal with the changed
return value from gnttab_copy().
Signed-off-by: Jan Beulich
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -258,9 +258,9 @@ int compat_grant_table_op(unsigned int c
>>> On 21.08.17 at 10:16, wrote:
> --- a/tools/firmware/hvmloader/smbios.c
> +++ b/tools/firmware/hvmloader/smbios.c
> @@ -531,6 +531,7 @@ smbios_type_3_init(void *start)
> const char *s;
> void *pts;
> uint32_t length;
> +uint32_t counter = 1;
I
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Julien Grall
> Sent: 21 August 2017 11:08
> To: xen-de...@lists.xenproject.org
> Cc: julien.gr...@arm.com
> Subject: [Xen-devel] Xen 4.10 Development Update
>
> This email only tracks big items
On Wed, Aug 9, 2017 at 8:36 AM, Jan Beulich wrote:
On 08.08.17 at 13:16, wrote:
>> On 08/07/2017 04:59 PM, Jan Beulich wrote:
>> George Dunlap 08/07/17 12:27 PM >>>
So it seems that people are still not quite
- Make QEMU setup the vectors when the table entries are unmasked,
even if MSIX is not enabled.
- Provide an hypercall so QEMU can unmask MSIX vectors on behalf of
the guest. This would be used to unmask the entries if MSIX is
enabled with table entries already unmasked.
Neither
>>> On 21.08.17 at 14:32, wrote:
>> > - Make QEMU setup the vectors when the table entries are unmasked,
>>>even if MSIX is not enabled.
>>> - Provide an hypercall so QEMU can unmask MSIX vectors on behalf of
>>>the guest. This would be used to unmask the entries if MSIX
From: Rajiv M Ranganath
---
build/fedora/xen-unstable-runit/setup.sh | 21
build/fedora/xen-unstable-runit/teardown.sh| 21
.../xen-init-dom0-disk-backend/run |8
Hi Stefanao,
Following series adds documentation on how to use stage1-xen on Fedora.
It also adds continuous build support using CircleCI.
Xen, Qemu, rkt and stage1 ACI image are built using a Fedora based
container. This setup allows for a reproducible build environment that
we can use locally
From: Rajiv M Ranganath
---
build/fedora/buildroot-README.md | 50 ++
1 file changed, 50 insertions(+)
create mode 100644 build/fedora/buildroot-README.md
diff --git a/build/fedora/buildroot-README.md
From: Rajiv M Ranganath
---
.gitignore |2 ++
1 file changed, 2 insertions(+)
create mode 100644 .gitignore
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 000..873f8f6
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,2 @@
+# build/fedora
---
build/fedora/RUNNING_STAGE1_XEN.md | 383
1 file changed, 383 insertions(+)
create mode 100644 build/fedora/RUNNING_STAGE1_XEN.md
diff --git a/build/fedora/RUNNING_STAGE1_XEN.md
b/build/fedora/RUNNING_STAGE1_XEN.md
new file mode 100644
index
From: Rajiv M Ranganath
---
build/fedora/run | 87 ++
1 file changed, 87 insertions(+)
create mode 100755 build/fedora/run
diff --git a/build/fedora/run b/build/fedora/run
new file mode 100755
index
From: Rajiv M Ranganath
---
README.md |2 ++
1 file changed, 2 insertions(+)
diff --git a/README.md b/README.md
index 9ea6adf..e1cd40c 100644
--- a/README.md
+++ b/README.md
@@ -1,5 +1,7 @@
# stage1-xen - A Xen based stage1 for CoreOS rkt
+[![Build
From: Rajiv M Ranganath
---
build/fedora/source_path.sh |3 +++
1 file changed, 3 insertions(+)
create mode 100755 build/fedora/source_path.sh
diff --git a/build/fedora/source_path.sh b/build/fedora/source_path.sh
new file mode 100755
index 000..57ac7ed
---
BUILDING.md | 35 ++-
1 file changed, 30 insertions(+), 5 deletions(-)
diff --git a/BUILDING.md b/BUILDING.md
index 3ef5311..b9ca404 100644
--- a/BUILDING.md
+++ b/BUILDING.md
@@ -1,7 +1,13 @@
# Build
-stage1-xen requires new Xen and QEMU versions at the
From: Rajiv M Ranganath
---
build/fedora/buildroot-Dockerfile | 108 +
1 file changed, 108 insertions(+)
create mode 100644 build/fedora/buildroot-Dockerfile
diff --git a/build/fedora/buildroot-Dockerfile
On 21/08/17 09:34, Jan Beulich wrote:
> The compat mode code also needs adjustment to deal with the changed
> return value from gnttab_copy().
>
> Signed-off-by: Jan Beulich
/sigh - There's always another one, isn't there.
The patch should mention that it is part of XSA-226.
On Mon, Aug 21, 2017 at 11:09:01AM +0200, Andreas Kinzler wrote:
> Hello Roger & Jan,
>
> > > > Could you please try the patch below and paste the output you get on
> > > > the Xen console?
> > > Output is in attached file. Does it help?
> > Yes, thanks. I'm quite sure the problem is that MSIX
On 21/08/17 12:07, Julien Grall wrote:
> This email only tracks big items for xen.git tree. Please reply for items you
> woulk like to see in 4.10 so that people have an idea what is going on and
> prioritise accordingly.
>
> You're welcome to provide description and use cases of the feature
Hello Meng Xu,
On 18.08.17 23:43, Meng Xu wrote:
The Section 4.1 and 4.2 in [1] explained the whole experiment steps.
If you have any question or confusion on a specific step, please feel
free to let me know.
From the document it is not really clear if you ran one guest RT domain
or several
On Sat, Aug 19, 2017 at 04:21:42PM +0200, Thomas Petazzoni wrote:
> From: Bernd Kuhls
>
> The variable domctl.u.address_size.size may remain uninitialized if
> guest_type is not one of xen-3.0-aarch64 or xen-3.0-armv7l. And the
> code precisely checks if this variable is
> -Original Message-
> From: Juergen Gross [mailto:jgr...@suse.com]
> Sent: 16 August 2017 13:52
> To: xen-de...@lists.xenproject.org
> Cc: Juergen Gross ; Paul Durrant
> ; Jan Beulich ; Andrew
> Cooper
On Wed, 2017-08-09 at 15:41 +0800, Yi Sun wrote:
> This patch renames 'xc_psr_cat_type' to 'xc_psr_val_type' so that
> the structure name is common for all allocation features.
>
> Signed-off-by: Yi Sun
Reviewed-by: Chao Peng
> * mode: C
> diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> index 6e80d36..10d317b 100644
> --- a/tools/libxl/libxl_types.idl
> +++ b/tools/libxl/libxl_types.idl
> @@ -977,6 +977,7 @@ libxl_psr_cbm_type = Enumeration("psr_cbm_type", [
> (2, "L3_CBM_CODE"),
>
> int libxl_psr_cat_get_info(libxl_ctx *ctx, libxl_psr_cat_info **info,
> int *nr, unsigned int lvl)
> {
> GC_INIT(ctx);
> int rc;
> -int i = 0, socketid, nr_sockets;
> -libxl_bitmap socketmap;
> +unsigned int i;
> +libxl_psr_hw_info
>>> On 18.08.17 at 20:51, wrote:
> --- a/xen/include/asm-x86/hvm/hvm.h
> +++ b/xen/include/asm-x86/hvm/hvm.h
> @@ -158,7 +158,7 @@ struct hvm_function_table {
> int (*cpu_up_prepare)(unsigned int cpu);
> void (*cpu_dead)(unsigned int cpu);
>
> -int
> > >
> > >
> > > +/*
> > > + * Because multiple features may co-exist, we need handle all
> > > features to write
> > > + * values of them into a COS register with new COS ID. E.g:
> > > + * 1. L3 CAT and MBA co-exist.
> > > + * 2. Dom1 and Dom2 share a same COS ID (2). The L3 CAT CBM of
> >
Hi Paul,
On 21/08/17 11:11, Paul Durrant wrote:
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
Julien Grall
Sent: 21 August 2017 11:08
To: xen-de...@lists.xenproject.org
Cc: julien.gr...@arm.com
Subject: [Xen-devel] Xen 4.10 Development Update
On Tue, 2017-08-15 at 12:25 +0100, Wei Liu wrote:
> On Wed, Aug 09, 2017 at 03:41:51PM +0800, Yi Sun wrote:
> >
> > This patch implements a new set value interface in tools suitable
> > for all psr
> > allocation features and the whole flow. It also enables MBA support
> > to set
> > MBA value in
Hi Jan,
On 7 August 2017 at 14:44, Jan Beulich wrote:
Bhupinder Thakur 08/07/17 10:55 AM >>>
>>@@ -1148,6 +1149,24 @@ struct xen_domctl_psr_cat_op {
>>uint32_t target;/* IN */
>>uint64_t data; /* IN/OUT */
>>};
>>+
>>+struct
From: Rajiv M Ranganath
---
.circleci/config.yml | 21 +
1 file changed, 21 insertions(+)
create mode 100644 .circleci/config.yml
diff --git a/.circleci/config.yml b/.circleci/config.yml
new file mode 100644
index 000..67ac964
---
On Mon, 21 Aug 2017, Rajiv Ranganath wrote:
> +`stage1-xen-fedora-buildroot` has a external dependency
> +on [`binutils`](https://github.com/lambda-linux-fedora/binutils) package
> that is
> +compiled with `i386pe` support. You can download the pre-built RPMs
> +from
From: Vivek Kumar Chaubey
Allow setting System Enclosure Asset Tag for HVM guest. Guest OS can
check and perform desired operation like support installation.
Signed-off-by: Vivek Kumar Chaubey
---
tools/firmware/hvmloader/smbios.c
On Fri, Aug 4, 2017 at 3:57 PM, Juergen Gross wrote:
> On 04/08/17 15:57, Andrew Cooper wrote:
>> On 04/08/17 14:36, Juergen Gross wrote:
>>> On 04/08/17 15:23, Andrew Cooper wrote:
On 04/08/17 14:20, Juergen Gross wrote:
> Last year Jan posted a patch series to change
On Mon, Aug 21, 2017 at 10:40:39AM +0100, VIVEK KUMAR CHAUBEY wrote:
> From: Vivek Kumar Chaubey
>
> Allow setting System Enclosure Asset Tag for HVM guest. Guest OS can
> check and perform desired operation like support installation.
>
> Signed-off-by: Vivek
On 21/08/17 16:31, Boris Ostrovsky wrote:
> On 08/21/2017 09:33 AM, Juergen Gross wrote:
>> On 06/08/17 18:44, Mikko Rapeli wrote:
>>> Both are needed to compile in userspace. Fixes these
>>> userspace compile errors:
>>>
>>> xen/gntdev.h:151:4: error: unknown type name ‘grant_ref_t’
>>>
On Mon, Aug 21, 2017 at 06:22:05AM -0600, Jan Beulich wrote:
> >>> On 21.08.17 at 11:46, wrote:
> > Xen never detects the MSIX table entry unmask because it happens
> > before the MSIX is bound to the guest, so the Xen msixtbl handlers are
> > not aware of this memory
On Mon, Aug 21, 2017 at 09:14:45AM -0600, Jan Beulich wrote:
> >>> On 21.08.17 at 16:49, wrote:
> > Another option is to (ab)use the msi.gflags field to add another flag
> > in order to signal Xen whether the interrupt should be unmasked. This
> > is in line with what you
On Mon, Aug 21, 2017 at 7:31 AM, Peter Zijlstra wrote:
> On Tue, Aug 15, 2017 at 07:20:38AM -0700, Thomas Garnier wrote:
>> On Tue, Aug 15, 2017 at 12:56 AM, Ingo Molnar wrote:
>
>> > Have you considered a kernel with -mcmodel=small (or medium) instead of
From: Vivek Kumar Chaubey
Allow setting System Enclosure Asset Tag for HVM guest. Guest OS can
check and perform desired operation like support installation.
Signed-off-by: Vivek Kumar Chaubey
---
tools/firmware/hvmloader/smbios.c
On 18.08.17 23:43, Meng Xu wrote:
Sure. The workload we used in the paper is mainly the cpu-intensive task.
We first calibrate a busy-loop of multiplications that runs for 1ms.
Then for a task that executes for exe(ms), we simply let the task
execute the 1ms busy loop for exe times.
I'm a bit
flight 71997 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71997/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-sid-netboot-pygrub 1 build-check(1)blocked n/a
build-arm64-pvops
This email only tracks big items for xen.git tree. Please reply for items you
woulk like to see in 4.10 so that people have an idea what is going on and
prioritise accordingly.
You're welcome to provide description and use cases of the feature you're
working on.
= Timeline =
We now adopt a
>
> -static void libxl__psr_cat_log_err_msg(libxl__gc *gc, int err)
> +static void libxl__psr_alloc_log_err_msg(libxl__gc *gc,
> + int err,
> + libxl_psr_cbm_type type)
> {
> +/*
> + * Index is
flight 112752 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112752/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 112661
>>> On 21.08.17 at 16:49, wrote:
> Another option is to (ab)use the msi.gflags field to add another flag
> in order to signal Xen whether the interrupt should be unmasked. This
> is in line with what you suggest below.
From a brief look it looks like this would be doable,
On 08/21/2017 01:07 PM, Jan Beulich wrote:
And remember, this is not "We have tested all compiler versions and
promise you there are no bugs." It's, "If someone finds a bug for this
set of compilers, we will tell you about it so you can do something
about it."
>>>
>>> I can
Hi, Julien.
Sorry for the late response.
On Thu, Aug 10, 2017 at 6:13 PM, Julien Grall wrote:
> Hi,
>
> On 10/08/17 15:27, Oleksandr Tyshchenko wrote:
>>
>> On Tue, Aug 8, 2017 at 2:34 PM, Julien Grall wrote:
>>>
>>> On 26/07/17 16:09, Oleksandr
On 08/21/2017 10:46 AM, Juergen Gross wrote:
> On 21/08/17 16:31, Boris Ostrovsky wrote:
>> On 08/21/2017 09:33 AM, Juergen Gross wrote:
>>> On 06/08/17 18:44, Mikko Rapeli wrote:
Both are needed to compile in userspace. Fixes these
userspace compile errors:
Long pressed key could not show right in XEN vncviewer after tigervnc client
changed the way how to send repeat keys, from "Down Up Down Up ..." to "Down
Down Dow." By enable EV_REP bit here, XEN keyboard device will trigger default
auto repeat process from input subsystem, and make auto repeat
1 - 100 of 137 matches
Mail list logo