>>> On 04.12.17 at 16:45, wrote:
>> On Fri, Oct 13, 2017 at 03:50:57PM +0300, Alexandru Isaila wrote:
>>> This patch adds the old value param and the onchangeonly option
>>> to the VM_EVENT_REASON_MOV_TO_MSR event.
>>>
>>> The param was added to the vm_event_mov_to_msr
>>> On 05.12.17 at 04:59, wrote:
> For porting files from Linux it is useful to have a Linux API to Xen API
> mapping header at a common location.
Looking at what you add here I really think "no, please don't". But
let's see what other maintainers thinks.
Jan
>>> On 04.12.17 at 16:40, wrote:
> On 04/12/17 10:46, Jan Beulich wrote:
>> Use this to cheaply add another assertion.
>>
>> Signed-off-by: Jan Beulich
>> ---
>> TBD: Would it perhaps be better to return after the assertion?
>
> Yes, otherwise we
On 17-12-05 02:09:14, Jan Beulich wrote:
> >>> On 05.12.17 at 03:53, wrote:
> > This patch set has got all Acked-by/Reviewed-by months ago. So, I am
> > wondering when it can be integrated? Any plan? Thanks!
>
> It is not being forgotten. But the tree is not fully open
flight 116832 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116832/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 10 windows-install fail REGR. vs. 116744
Tests which did
>>> On 05.12.17 at 04:59, wrote:
> Port WARN_ON_ONCE macro from Linux. A return value is expected from this
> macro, so the implementation does not follow the Xen convention of wrapping
> macros in a do..while.
There's no such convention for macros producing a value.
>
flight 116849 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116849/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 116770
test-armhf-armhf-libvirt-raw 13
Hi Stefano
On Tue, Dec 5, 2017 at 12:18 AM, Stefano Stabellini
wrote:
> On Sat, 2 Dec 2017, Oleksandr Tyshchenko wrote:
>> On Sat, Dec 2, 2017 at 3:06 AM, Stefano Stabellini
>> wrote:
>> > On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
>> >>
Hi,
On 04/12/17 22:04, Stefano Stabellini wrote:
On Mon, 4 Dec 2017, Volodymyr Babchuk wrote:
Hi Julien,
On Mon, Dec 04, 2017 at 04:27:14PM +, Julien Grall wrote:
[...]
= Error checking / DOS protection =
We need powerful checks on arguments passed by the caller and evaluated
by the
>>> On 05.12.17 at 11:03, wrote:
> On 05/12/2017 09:30, Jan Beulich wrote:
> On 05.12.17 at 09:49, wrote:
>>> flight 116832 xen-unstable real [real]
>>> http://logs.test-lab.xenproject.org/osstest/logs/116832/
>>>
>>> Regressions :-(
On 09/11/17 17:10, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Please explain the rationale behind adding a new field in struct device.
Signed-off-by: Oleksandr Tyshchenko
CC: Stefano Stabellini
On 05/12/2017 10:03, Andrew Cooper wrote:
> On 05/12/2017 09:30, Jan Beulich wrote:
> On 05.12.17 at 09:49, wrote:
>>> flight 116832 xen-unstable real [real]
>>> http://logs.test-lab.xenproject.org/osstest/logs/116832/
>>>
>>> Regressions :-(
>>>
>>> Tests which
>>> On 05.12.17 at 09:49, wrote:
> flight 116832 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/116832/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>
On 05/12/2017 09:30, Jan Beulich wrote:
On 05.12.17 at 09:49, wrote:
>> flight 116832 xen-unstable real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/116832/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> including
>>> On 05.12.17 at 15:00, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 05 December 2017 13:53
>> >>> On 28.11.17 at 15:05, wrote:
>> rc = x86_emulate(_ctxt->ctxt, ops);
>>
>> if ( rc != X86EMUL_RETRY )
>> {
>>
>>> On 05.12.17 at 15:11, wrote:
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
>> Of Paul Durrant
>> Sent: 05 December 2017 14:00
>> To: 'Jan Beulich'
>> > From: Jan Beulich [mailto:jbeul...@suse.com]
>> > Sent: 05
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 05 December 2017 14:32
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org
> Subject: RE: [PATCH v2] x86/hvm: fix interaction between internal and
> external emulation
>
> >>> On
Smatch complains that "len" is uninitialized if xenbus_read() fails so
let's add some error handling.
Signed-off-by: Dan Carpenter
diff --git a/drivers/xen/pvcalls-front.c b/drivers/xen/pvcalls-front.c
index 40caa92bff33..afa3f1b5d807 100644
---
bedata->ref can't be less than zero because it's unsigned. This affects
certain error paths in probe. We first set ->ref = -1 and then we set
it to a valid value later.
Fixes: 219681909913 ("xen/pvcalls: connect to the backend")
Signed-off-by: Dan Carpenter
diff
Hi Stefano
On Tue, Dec 5, 2017 at 12:46 AM, Stefano Stabellini
wrote:
> On Mon, 4 Dec 2017, Oleksandr Tyshchenko wrote:
>> Hi, Stefano
>>
>> On Sat, Dec 2, 2017 at 3:37 AM, Stefano Stabellini
>> wrote:
>> > On Thu, 9 Nov 2017, Oleksandr Tyshchenko
Hi Julien,
On 05.12.17 16:58, Julien Grall wrote:
Hi Oleksandr,
On 09/11/17 17:10, Oleksandr Tyshchenko wrote:
From: Volodymyr Babchuk
Existing SMC wrapper call_smc() allows only 4 parameters and
returns only one value. This is enough for existing
use in PSCI
On Tue, 5 Dec 2017, Volodymyr Babchuk wrote:
> Hi Stefano,
>
> On Mon, Dec 04, 2017 at 06:30:13PM -0800, Stefano Stabellini wrote:
> > On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
> > > From: Volodymyr Babchuk
> > >
> > > Existing SMC wrapper call_smc() allows
>>> On 05.12.17 at 17:44, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 05 December 2017 16:14
>> --- a/xen/arch/x86/hvm/emulate.c
>> +++ b/xen/arch/x86/hvm/emulate.c
>> @@ -2109,20 +2109,22 @@ static int _hvm_emulate_one(struct hvm_e
>>
>>
On Tue, 5 Dec 2017, Dan Carpenter wrote:
> Smatch complains that "len" is uninitialized if xenbus_read() fails so
> let's add some error handling.
>
> Signed-off-by: Dan Carpenter
Reviewed-by: Stefano Stabellini
> diff --git
On Tue, Dec 05, 2017 at 03:09:47PM +, Ian Jackson wrote:
> Roger Pau Monne writes ("[PATCH v17 19/19] osstest: use -DWITHOUT_AUTO_OBJ
> with FreeBSD release targets"):
> > Due to a recent FreeBSD change the default output directory of the release
> > targets is changed to the object directory
On Tue, Dec 5, 2017 at 7:08 PM, Volodymyr Babchuk
wrote:
> Hi Julien,
Hi Julien, Volodymyr.
>
> On 05.12.17 16:58, Julien Grall wrote:
>>
>> Hi Oleksandr,
>>
>> On 09/11/17 17:10, Oleksandr Tyshchenko wrote:
>>>
>>> From: Volodymyr Babchuk
Stefano Stabellini writes ("Re: [OSSTEST PATCH] linux-arm-xen: Get from shared
arm/linux.git xenbits tree"):
> On Tue, 5 Dec 2017, Julien Grall wrote:
> > Acked-by: Julien Grall
>
> Acked-by: Stefano Stabellini
Thanks. This queued for my next
Hi All,
Can you please provide your comments over the changes shared. Thanks in advance.
Regards,
~Praveen.
On Tue, Nov 21, 2017 at 8:49 PM, Praveen Kumar wrote:
> Hi All,
>
> The patch imports the changes and updates of the rbtree implementaiton
> from Linux tree.
On 05/12/17 16:23, Julien Grall wrote:
> Hi Juergen,
>
> On 04/12/17 15:49, Juergen Gross wrote:
>> On 21/11/17 12:06, Juergen Gross wrote:
>>> The "special pages" for PVH guests include the frames for console and
>>> Xenstore ring buffers. Those have to be marked as "Reserved" in the
>>> guest's
Hi Ian,
On 05/12/17 18:41, Ian Jackson wrote:
Stefano Stabellini writes ("Re: [OSSTEST PATCH] linux-arm-xen: Get from shared
arm/linux.git xenbits tree"):
On Tue, 5 Dec 2017, Julien Grall wrote:
Acked-by: Julien Grall
Acked-by: Stefano Stabellini
Roger Pau Monné writes ("Re: [PATCH v17 19/19] osstest: use -DWITHOUT_AUTO_OBJ
with FreeBSD release targets"):
> On Tue, Dec 05, 2017 at 03:09:47PM +, Ian Jackson wrote:
> > Is that why you're not just updating osstest to expect the new
> > behaviour ?
>
> Yes, I think it's more sensible to
On Tue, 5 Dec 2017, Julien Grall wrote:
> Hi Ian,
>
> On 05/12/17 18:28, Ian Jackson wrote:
> > This drops the dependency on Stefano's personal git tree.
> > The osstest output branch remains unmoved.
> >
> > CC: Stefano Stabellini
> > CC: Julien Grall
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 05 December 2017 16:14
> To: xen-devel
> Cc: Julien Grall ; Andrew Cooper
> ; Paul Durrant
> Subject:
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 05 December 2017 17:19
> To: Paul Durrant
> Cc: Julien Grall ; Andrew Cooper
> ; xen-devel de...@lists.xenproject.org>
> Subject: RE:
Hi Ian,
On 05/12/17 18:28, Ian Jackson wrote:
This drops the dependency on Stefano's personal git tree.
The osstest output branch remains unmoved.
CC: Stefano Stabellini
CC: Julien Grall
Signed-off-by: Ian Jackson
flight 116840 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116840/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs.
115643
Hi Ian,
On 05/12/17 17:42, Ian Jackson wrote:
Stefano Stabellini writes ("Re: [Xen-devel] linux-arm-xen branch, commit access,
etc."):
let's create a /arm/linux.git tree on xenbits where both Julien and I
can push. The idea is that we'll try to use vanilla kernel releases but
we'll keep it
There are limit on pCPUs, though. But this is not a problem, because
XEN scheduler will decide which guest will access OP-TEE right now.
OP-TEE don't have own scheduler at all, by the way. It is scheduled
by normal world.
Do you mind to give a bit more explanation here? Do you plan to add
This drops the dependency on Stefano's personal git tree.
The osstest output branch remains unmoved.
CC: Stefano Stabellini
CC: Julien Grall
Signed-off-by: Ian Jackson
---
ap-common | 4 ++--
1 file changed, 2
On 05/12/17 17:08, Volodymyr Babchuk wrote:
Hi Julien,
On 05.12.17 16:58, Julien Grall wrote:
Hi Oleksandr,
On 09/11/17 17:10, Oleksandr Tyshchenko wrote:
From: Volodymyr Babchuk
Existing SMC wrapper call_smc() allows only 4 parameters and
returns only one
flight 116858 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116858/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539
Tests which did not
Hi all,
Even though it is an Arm failure, I have CCed x86 folks to get feedback
on the approach. I have a WIP branch I could share if that interest people.
Few months ago, we noticed an heisenbug on jobs run by osstest on the
cubietrucks (see [1]). From the log, we figured out that the guest
vio->mmio_retry is being set when a repeated string insn is being split
up. In that case we'll exit to the guest, expecting immediate re-entry.
Interruptions, however, may be serviced by the guest before re-entry
from the repeated string insn. Any emulation needed in the course of
handling the
On 05/12/17 15:38, Dan Carpenter wrote:
> bedata->ref can't be less than zero because it's unsigned. This affects
> certain error paths in probe. We first set ->ref = -1 and then we set
> it to a valid value later.
>
> Fixes: 219681909913 ("xen/pvcalls: connect to the backend")
> Signed-off-by:
On 05/12/17 15:38, Dan Carpenter wrote:
> Smatch complains that "len" is uninitialized if xenbus_read() fails so
> let's add some error handling.
>
> Signed-off-by: Dan Carpenter
Reviewed-by: Juergen Gross
Juergen
We have the laxtons back and they seem to be working.
This reverts commit 329ef52c9866b2a8608a598836b7d5813de1e979.
Signed-off-by: Ian Jackson
---
make-flight | 2 +-
make-hosts-flight | 2 +-
mfi-common| 6 +++---
3 files changed, 5 insertions(+), 5
On Thu, 23 Nov 2017, Julien Grall wrote:
> The function copy_to_guest can easily be extended to support zeroing
> guest VA. To avoid using a new bit, it is considered that a NULL buffer
> (i.e buf == NULL) means the guest memory will be zeroed.
>
> Lastly, reimplement raw_clear_guest using
On Thu, 23 Nov 2017, Julien Grall wrote:
> Currently, guest_copy assumes the copy will only be done for the current
> vCPU. A follow-up patch will require to use a different vCPU.
>
> So extend the prototype to pass the vCPU.
>
> Signed-off-by: Julien Grall
flight 116861 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116861/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
116754
On Thu, 23 Nov 2017, Julien Grall wrote:
> Hi Andrew,
>
> On 23/11/17 18:49, Andrew Cooper wrote:
> > On 23/11/17 18:32, Julien Grall wrote:
> > > This new function will be used in a follow-up patch to copy data to the
> > > guest
> > > using the IPA (aka guest physical address) and then clean
On 05/12/2017 22:35, Stefano Stabellini wrote:
On Tue, 5 Dec 2017, Julien Grall wrote:
Hi all,
Even though it is an Arm failure, I have CCed x86 folks to get feedback on the
approach. I have a WIP branch I could share if that interest people.
Few months ago, we noticed an heisenbug on jobs
flight 116862 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116862/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm broken
build-armhf-xsm 5
On Tue, 5 Dec 2017, Julien Grall wrote:
> Hi all,
>
> Even though it is an Arm failure, I have CCed x86 folks to get feedback on the
> approach. I have a WIP branch I could share if that interest people.
>
> Few months ago, we noticed an heisenbug on jobs run by osstest on the
> cubietrucks (see
On Tue, 5 Dec 2017, Stefano Stabellini wrote:
> On Thu, 23 Nov 2017, Julien Grall wrote:
> > The only differences between copy_to_guest and access_guest_memory_by_ipa
> > are:
> > - The latter does not support copying data crossing page boundary
> > - The former is copying from/to guest
flight 116857 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116857/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 10 windows-install fail REGR. vs. 116744
Tests which are
On Thu, 23 Nov 2017, Julien Grall wrote:
> The only differences between copy_to_guest (formerly called
> raw_copy_to_guest_helper) and raw_copy_from_guest is:
> - The direction of the memcpy
> - The permission use for translating the address
>
> Extend copy_to_guest to support copying
On Thu, 23 Nov 2017, Julien Grall wrote:
> The only differences between copy_to_guest and access_guest_memory_by_ipa are:
> - The latter does not support copying data crossing page boundary
> - The former is copying from/to guest VA whilst the latter from
> guest PA
>
> copy_to_guest
On Thu, 23 Nov 2017, Julien Grall wrote:
> In a follow-up patch, it will be necessary to pass more flags to the
> function.
>
> Rename flush_dcache to flags and introduce a define to tell whether the
> cache needs to be flushed after the copy.
>
> Signed-off-by: Julien Grall
On Tue, 5 Dec 2017, Stefano Stabellini wrote:
> On Thu, 23 Nov 2017, Julien Grall wrote:
> > The function kernel_zimage is dealing with IPA but uses gvirt_to_maddr to
> > do the translation. This is currently working fine because the stage-1 MMU
> > is disabled.
> >
> > Furthermore, the function
Using a period after a newline causes bad output.
Signed-off-by: Joe Perches
---
drivers/net/xen-netback/interface.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/net/xen-netback/interface.c
b/drivers/net/xen-netback/interface.c
index
On Thu, 23 Nov 2017, Julien Grall wrote:
> The function initrd_load is dealing with IPA but uses gvirt_to_maddr to
> do the translation. This is currently working fine because the stage-1 MMU
> is disabled.
>
> Furthermore, the function is implementing its own copy to guest resulting
> in code
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-xl-raw
testid xen-boot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
flight 116868 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116868/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
116683
Tests
This run is configured for baseline tests only.
flight 72519 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72519/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 15
>>> On 05.12.17 at 21:48, wrote:
> You are right. We need to define a new struct for internal usage, for
> example:
>
> struct xen_processor_performance_internal {
> uint32_t flags; /* flag for Px sub info type */
> uint32_t platform_limit; /* Platform
>>> On 04.12.17 at 17:39, wrote:
> On 04/12/17 10:16, Jan Beulich wrote:
> On 25.08.17 at 16:59, wrote:
>> On 10.08.17 at 09:19, wrote:
>>> On 10.07.17 at 12:39, wrote:
> Real hardware wraps silently in most
There were two places where the lapic_id is computed, one in hvmloader and one
in libacpi. Unify them by defining LAPIC_ID in a header file and incluing it
in both places.
To address compilation issue and make libacpi.h self-contained, include
stdint.h in libacpi.h.
Signed-off-by: Chao Gao
From: Lan Tianyu
This patch contains the following changes:
1. add x2apic entry support for ACPI MADT table according to
ACPI spec 5.2.12.12 Processor Local x2APIC Structure.
2. add x2apic entry support for ACPI SRAT table according to
ACPI spec 5.2.16.3 Processor Local
Signed-off-by: Chao Gao
---
xen/include/public/hvm/hvm_info_table.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/include/public/hvm/hvm_info_table.h
b/xen/include/public/hvm/hvm_info_table.h
index 08c252e..6833a4c 100644
---
This series is based on Paul Durrant's "x86: guest resource mapping"
(https://lists.xenproject.org/archives/html/xen-devel/2017-11/msg01735.html)
and "add vIOMMU support with irq remapping function of virtual VT-d"
(https://lists.xenproject.org/archives/html/xen-devel/2017-11/msg01063.html).
It is a preparation to support multiple IOREQ pages.
No functional change.
Signed-off-by: Chao Gao
---
v4:
-new
---
xen/arch/x86/hvm/ioreq.c | 48 +++-
1 file changed, 23 insertions(+), 25 deletions(-)
diff --git
Hi all,
Xen 4.10 RC8 is tagged. You can check that out from xen.git:
git://xenbits.xen.org/xen.git 4.10.0-rc8
For your convenience, there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.10.0-rc8/xen-4.10.0-rc8.tar.gz
And the signature is at:
On 04/12/17 15:07, Thomas Gleixner wrote:
> From: Boris Ostrovsky
>
> Commit 1d3e53e8624a ("x86/entry/64: Refactor IRQ stacks and make them
> NMI-safe") added DEBUG_ENTRY_ASSERT_IRQS_OFF macro that acceses eflags
> using 'pushfq' instruction when testing for IF bit.
On 05/12/17 11:16, Jan Beulich wrote:
On 05.12.17 at 11:03, wrote:
>> On 05/12/2017 09:30, Jan Beulich wrote:
>> On 05.12.17 at 09:49, wrote:
flight 116832 xen-unstable real [real]
Hi, Julien.
On Tue, Dec 5, 2017 at 1:26 PM, Julien Grall wrote:
>
>
> On 09/11/17 17:10, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>
>
> Please explain the rationale behind adding a new field in struct device.
Basically
Hi Stefano,
On 05.12.17 00:06, Stefano Stabellini wrote:
On Mon, 4 Dec 2017, Volodymyr Babchuk wrote:
= Xen command forwarding =
In the code below, it looks like Xen is forwarding everything to OP-TEE.
Are there some commands Xen should avoid forwarding? Should we have a
whitelist or a
Hi Sameer,
On 05/12/17 03:59, Sameer Goel wrote:
For porting files from Linux it is useful to have a Linux API to Xen API
mapping header at a common location.
This file adds common API functions and other defines that are needed for
porting arm SMMU drivers.
---
Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 116832: regressions -
FAIL [and 1 more messages]"):
> Oh, that's pretty unfortunate. I think we'll then need a custom flight
> tied to the box that this failure occurred on, to have a way to tell
> whether the fix I'm about to prepare has
Hi,
Ping? This is going to be very helpful for bringing up osstest on Thunder-X.
Cheers,
On 02/11/17 13:34, Julien Grall wrote:
Hi,
On 23/10/17 22:33, Stefano Stabellini wrote:
On Fri, 20 Oct 2017, Julien Grall wrote:
Julien, do you think we need to keep a special linux tree
around
On 05/12/17 15:31, Jan Beulich wrote:
On 05.12.17 at 16:05, wrote:
>> Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 116832: regressions
>> -
>> FAIL"):
>>> This is a blue screen, recurring, and has first been reported in flight
>>> 116779, i.e. was
Signed-off-by: Ian Jackson
---
README.dev | 7 +++
1 file changed, 7 insertions(+)
diff --git a/README.dev b/README.dev
index dc0dafd..37e2953 100644
--- a/README.dev
+++ b/README.dev
@@ -132,6 +132,13 @@ If that works, a more thorough test:
This should show no
Roger Pau Monne writes ("[PATCH v17 17/19] osstest: remove the loader timeout
from the install image"):
> When the FreeBSD installer is booted on the godello{0/1} boxes it
> receives spurious key strokes. This doesn't happen so far when booted
> from disk, or with any other boxes.
>
> In order
Roger Pau Monne writes ("[PATCH v17 19/19] osstest: use -DWITHOUT_AUTO_OBJ with
FreeBSD release targets"):
> Due to a recent FreeBSD change the default output directory of the release
> targets is changed to the object directory instead of the source
> directory. Use WITHOUT_AUTO_OBJ to restore
Hi Juergen,
On 04/12/17 15:49, Juergen Gross wrote:
On 21/11/17 12:06, Juergen Gross wrote:
The "special pages" for PVH guests include the frames for console and
Xenstore ring buffers. Those have to be marked as "Reserved" in the
guest's E820 map, as otherwise conflicts might arise later e.g.
Hi Stefano,
On Mon, Dec 04, 2017 at 06:30:13PM -0800, Stefano Stabellini wrote:
> On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
> > From: Volodymyr Babchuk
> >
> > Existing SMC wrapper call_smc() allows only 4 parameters and
> > returns only one value. This is
osstest service owner writes ("[xen-unstable test] 116832: regressions - FAIL"):
> flight 116832 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/116832/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>
Hi Oleksandr,
On 09/11/17 17:10, Oleksandr Tyshchenko wrote:
From: Volodymyr Babchuk
Existing SMC wrapper call_smc() allows only 4 parameters and
returns only one value. This is enough for existing
use in PSCI code, but TEE mediator will need a call that is
fully
>>> On 05.12.17 at 16:05, wrote:
> Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 116832: regressions
> -
> FAIL"):
>> This is a blue screen, recurring, and has first been reported in flight
>> 116779, i.e. was likely introduced in the batch ending in commit
Julien Grall writes ("[for-4.10] Re: [Xen-devel] [PATCH v2] tools/libxl: mark
special pages as reserved in e820 map for PVH"):
> I would recommend to tag your patch is 4.10 to help reviewers prioritize
> review on your patch. I have done it now.
Thanks. Looking at the thread, I would have
>>> On 28.11.17 at 15:05, wrote:
> --- a/xen/arch/x86/hvm/io.c
> +++ b/xen/arch/x86/hvm/io.c
> @@ -88,7 +88,7 @@ bool hvm_emulate_one_insn(hvm_emulate_validate_t *validate,
> const char *descr)
>
> rc = hvm_emulate_one();
>
> -if (
Hello,
On 05/12/17 03:59, Sameer Goel wrote:
This driver follows an approach similar to smmu driver. The intent here
is to reuse as much Linux code as possible.
- Glue code has been introduced in headers to bridge the API calls.
- Called Linux functions from the Xen IOMMU function calls.
- Xen
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Paul Durrant
> Sent: 05 December 2017 14:00
> To: 'Jan Beulich'
> Cc: xen-devel@lists.xenproject.org
> Subject: Re: [Xen-devel] [PATCH v2] x86/hvm: fix interaction
Hi, Stefano
On Tue, Dec 5, 2017 at 1:24 AM, Stefano Stabellini
wrote:
> On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
>> From: Oleksandr Tyshchenko
>>
>> This is a port from Linux.
>
> When you port stuff from Linux you have to retain the
93 matches
Mail list logo