On 04/17/2015 10:31 AM, Kai Huang wrote:
On 04/17/2015 06:39 AM, Tian, Kevin wrote:
From: Kai Huang [mailto:kai.hu...@linux.intel.com]
Sent: Wednesday, April 15, 2015 3:04 PM
A new 4K page pointer is added to arch_vmx_struct as PML buffer for
vcpu.
And a
new 'status' field is added to vmx
On 04/20/2015 10:09 AM, Andrew Cooper wrote:
There appears to be no formal statement of what pv_irq_ops.save_fl() is
supposed to return precisely. Native returns the full flags, while lguest and
Xen only return the Interrupt Flag, and both have comments by the
implementations stating that only t
>>> On 4/20/2015 at 04:12 PM, in message <5534b4d8.4010...@suse.com>, Juergen
>>> Gross
wrote:
> On 04/19/2015 05:50 AM, Chunyan Liu wrote:
> > Add pvusb commands: usb-ctrl-attach, usb-ctrl-detach, usb-list,
> > usb-attach and usb-detach.
> >
> > To attach a usb device to guest through pvu
I have a one more question.
In Xen ARM 4.5, All SPI is routed to pcpu0 that run domain0's vcpu0.
If domain0's vcpu0 run on pcpu0 All SPI is routed to pcpu0
If domain0's vcpu0 run on pcpu1 All SPI is routed to pcpu1
these mean that Xen ARM 4.5 can inject spi only to domain0's vcpu0
and Xen ARM
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote:
> This is the xc/xl changes to support Intel Cache Allocation
> Technology(CAT). Two commands are introduced:
> - xl psr-cat-hwinfo
> Show CAT hardware information.
> Examples:
> [root@vmm-psr vmm]# xl psr-cat-hwinfo
> Cache Allocation Technolo
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote:
> Add dedicated one to show hardware information.
>
> [root@vmm-psr]xl psr-cmt-hwinfo
> Cache Monitoring Technology (CMT):
> Enabled : 1
> Total RMID : 63
> Supported monitor types:
> cache-occupancy
> total-mem-bandwidth
> local-mem
Monday, April 20, 2015, 6:11:42 PM, you wrote:
On 16.04.15 at 11:28, wrote:
>> At 22:35 +0100 on 11 Apr (1428791713), Andrew Cooper wrote:
>>> At least we now understand why it happens. I will defer to others CC'd
>>> on this thread for their opinions in the matter.
>>
>> The patch semes
On Fri, Apr 17, Olaf Hering wrote:
> Just to make them public, not meant for merging:
> The scripts used during development to create a bunch of SCSI devices in
> dom0 using the Linux target framework. targetcli3 and rtslib3 is used.
>
> A patch is required for python-rtslib:
> http://article.gma
On Mon, 20 Apr 2015, David Vrabel wrote:
> On 20/04/15 12:07, Chen Baozi wrote:
> > On Mon, Apr 20, 2015 at 11:53:47AM +0100, David Vrabel wrote:
> >> On 20/04/15 11:48, Chen Baozi wrote:
> >>> Make sure that xen_swiotlb_init allocates buffers that is DMA capable.
> >>>
> >>> Signed-off-by: Chen Ba
On Mon, 20 Apr 2015, Ian Campbell wrote:
> On Mon, 2015-04-20 at 11:38 +0100, Stefano Stabellini wrote:
> > On Mon, 20 Apr 2015, Ian Campbell wrote:
> > > On Mon, 2015-04-20 at 10:58 +0100, Stefano Stabellini wrote:
> > > > On Sat, 18 Apr 2015, Chen Baozi wrote:
> > > > > On Fri, Apr 17, 2015 at 05
On Mon, 20 Apr 2015, 신정섭 wrote:
> Thanks your rely. But sorry i can't understand your explanation fully.
>
>
>
> I don't want to change GICD setting. I only want to change target Domain0'
> vcpu injected SPI. vcpu0 or vcpu1.
>
>
>
> I understand like below.
>
> In Xen4.4, vgic_vcpu_inject_irq(
On 20/04/15 18:09, Andrew Cooper wrote:
> There appears to be no formal statement of what pv_irq_ops.save_fl() is
> supposed to return precisely. Native returns the full flags, while lguest and
> Xen only return the Interrupt Flag, and both have comments by the
> implementations stating that only
On Mon, 20 Apr 2015, George Dunlap wrote:
> On 04/17/2015 11:40 AM, Stefano Stabellini wrote:
> > On Thu, 16 Apr 2015, George Dunlap wrote:
> >> Allow COMPONENTS to be specified in the config (or on the command-line)
> >>
> >> Now you can keep all components enabled in your config but build only
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-132
Information leak through XEN_DOMCTL_gettscinfo
ISSUE DESCRIPTION
=
The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding
field subsequently copied to guest
There appears to be no formal statement of what pv_irq_ops.save_fl() is
supposed to return precisely. Native returns the full flags, while lguest and
Xen only return the Interrupt Flag, and both have comments by the
implementations stating that only the Interrupt Flag is looked at. This may
have
On Fri, 17 Apr 2015, Stefano Stabellini wrote:
> On Fri, 17 Apr 2015, Ian Campbell wrote:
> > On Thu, 2015-04-16 at 17:19 +0100, George Dunlap wrote:
> > > Signed-off-by: George Dunlap
> >
> > AIUI raisin does build dependency handling/tracking. If so then fakeroot
> > ought to be added to it I t
On Fri, 17 Apr 2015, Stefano Stabellini wrote:
> On Thu, 16 Apr 2015, George Dunlap wrote:
> > Signed-off-by: George Dunlap
> > ---
> > CC: Stefano Stabellini
> > ---
> > lib/common-functions.sh | 18 +-
> > 1 file changed, 9 insertions(+), 9 deletions(-)
> >
> > diff --git a/li
On Mon, 20 Apr 2015, Stefano Stabellini wrote:
> On Mon, 20 Apr 2015, George Dunlap wrote:
> > On 04/17/2015 11:14 AM, Stefano Stabellini wrote:
> > > On Thu, 16 Apr 2015, George Dunlap wrote:
> > >> Add package dependencies for CentOS. Also use PKGTYPE rather than
> > >> DISTRO to determine if we
On Mon, 20 Apr 2015, Stefano Stabellini wrote:
> On Mon, 20 Apr 2015, George Dunlap wrote:
> > On 04/17/2015 11:06 AM, Stefano Stabellini wrote:
> > > On Thu, 16 Apr 2015, George Dunlap wrote:
> > >> Because we use "set -e", we can't use the "a && b" construct, as it will
> > >> fail and stop the
On Mon, 20 Apr 2015, George Dunlap wrote:
> On 04/17/2015 02:08 PM, Stefano Stabellini wrote:
> > Hi all,
> >
> > This patch series builds qemu-traditional and seabios separately from the
> > Xen tree. It also change the QEMU build to be more Xen specific,
> > installing the QEMU binary under /usr
On Mon, 20 Apr 2015, George Dunlap wrote:
> On 04/17/2015 11:58 AM, Stefano Stabellini wrote:
> > On Thu, 16 Apr 2015, George Dunlap wrote:
> >> Until we start hosting the blktap repo on xenbits, use the one from github.
> >>
> >> Also, we need to pass in the directories where to find the
> >> libb
On 04/20/2015 04:50 AM, Jan Beulich wrote:
On 09.04.15 at 17:44, wrote:
--- /dev/null
+++ b/xen/include/public/pmu.h
@@ -0,0 +1,38 @@
+#ifndef __XEN_PUBLIC_PMU_H__
+#define __XEN_PUBLIC_PMU_H__
+
+#include "xen.h"
+#if defined(__i386__) || defined(__x86_64__)
+#include "arch-x86/pmu.h"
+#elif
On Sun, Apr 19, Chunyan Liu wrote:
> +++ b/tools/libxl/libxl_internal.h
> +_hidden int libxl__device_nextid(libxl__gc *gc, uint32_t domid, char
> *device);
> +_hidden int libxl__resolve_domid(libxl__gc *gc, const char *name,
> + uint32_t *domid);
> +/* generic ca
Monday, April 20, 2015, 6:11:42 PM, you wrote:
On 16.04.15 at 11:28, wrote:
>> At 22:35 +0100 on 11 Apr (1428791713), Andrew Cooper wrote:
>>> At least we now understand why it happens. I will defer to others CC'd
>>> on this thread for their opinions in the matter.
>>
>> The patch semes
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote:
> --- a/xen/arch/x86/psr.c
> +++ b/xen/arch/x86/psr.c
> @@ -19,14 +19,25 @@
> #include
>
> #define PSR_CMT(1<<0)
> +#define PSR_CAT(1<<1)
> +
> +struct psr_cat_socket_info {
> +bool_t initialized;
> +bool_t enabled;
>
>>> On 16.04.15 at 11:28, wrote:
> At 22:35 +0100 on 11 Apr (1428791713), Andrew Cooper wrote:
>> At least we now understand why it happens. I will defer to others CC'd
>> on this thread for their opinions in the matter.
>
> The patch semes like a pretty good check to me, though I'm not
> convin
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote:
> Use "-" instead of "_" for monitor types.
>
This easier to type, so I like it. :-)
> Signed-off-by: Chao Peng
>
Reviewed-by: Dario Faggioli
Regards,
Dario
signature.asc
Description: This is a digitally signed message part
___
On 17/04/15 15:33, Chao Peng wrote:
> For CAT, COS is maintained in hypervisor only while CBM is exposed to
> user space directly to allow getting/setting domain's cache capacity.
> For each specified CBM, hypervisor will either use a existed COS which
> has the same CBM or allocate a new one if th
On 17/04/15 15:33, Chao Peng wrote:
> In Xen's implementation, the CAT enforcement granularity is per domain.
> Due to the length of CBM and the number of COS may be socket-different,
> each domain has COS ID for each socket. The domain get COS=0 by default
> and at runtime its COS is then allocate
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote:
> Switching RMID from previous vcpu to next vcpu only needs to write
> MSR_IA32_PSR_ASSOC once. Write it with the value of next vcpu is enough,
> no need to write '0' first. Idle domain has RMID set to 0 and because MSR
> is already updated lazily
On Thu, Mar 26, 2015 at 9:48 AM, Justin T. Weaver wrote:
> * choose_cpu
>
> choose_cpu now tries to find the run queue with the most cpus in the given
> vcpu's soft affinity. It uses minimum run queue load as a tie breaker.
[snip]
> * choose_cpu: added balance loop to find cpu for given vcpu tha
On Mon, Apr 20, 2015 at 5:22 PM, Andrew Cooper
wrote:
> On 20/04/15 16:06, Tamas K Lengyel wrote:
> > The current implementation of three memops, XENMEM_current_reservation,
> > XENMEM_maximum_reservation and XENMEM_maximum_gpfn return values as an
> > int. However, in ARM64 we could potentially
On 20/04/15 16:06, Tamas K Lengyel wrote:
> The current implementation of three memops, XENMEM_current_reservation,
> XENMEM_maximum_reservation and XENMEM_maximum_gpfn return values as an
> int. However, in ARM64 we could potentially have 36-bit pfn's, thus
> in preparation for the ARM patch, in t
On 20/04/15 16:01, HANNAS YAYA Issa wrote:
> Hi
> I really really need help. I continue trying to make it work but
> nothing change.
> Please I need help :(
>
>
Please read an x86 architecture manual before trying to play blindly in
the dark, and particularly the permission checks in paging mode.
The ARM virtualization extension provides 2-stage paging, a similar mechanisms
to Intel's EPT, which can be used to trace the memory accesses performed by
the guest systems. This series sets up the necessary infrastructure in the
ARM code to deliver the event on R/W/X traps. Finally, we turn on the
Add necessary changes for page table construction routines to pass
the default access information and hypercall continuation mask. Also,
define necessary functions and data fields to be used later by mem_access.
The p2m_access_t info will be stored in a Radix tree as the PTE lacks
enough software
Define the ARM specific test_and_set_bit functions and switch
to use maximum gpfn as the limit to setting permissions. Also,
move HAS_MEM_ACCESS definition into config.
Signed-off-by: Tamas K Lengyel
---
v15: - Rebase on staging
v6: - Just use xc_domain_maximum_gpfn to get max_gpfn.
v5: - Use the
Signed-off-by: Tamas K Lengyel
Acked-by: Ian Campbell
Reviewed-by: Julien Grall
---
config/arm32.mk | 1 +
config/arm64.mk | 1 +
2 files changed, 2 insertions(+)
diff --git a/config/arm32.mk b/config/arm32.mk
index 268ca9c..cd97e42 100644
--- a/config/arm32.mk
+++ b/config/arm32.mk
@@ -14,6 +
This patch enables to store, set, check and deliver LPAE R/W mem_events.
As the LPAE PTE's lack enough available software programmable bits,
we store the permissions in a Radix tree. The tree is only looked at if
mem_access_enabled is turned on.
Signed-off-by: Tamas K Lengyel
---
v15: - Style fix
Signed-off-by: Tamas K Lengyel
Reviewed-by: Julien Grall
Acked-by: Stefano Stabellini
Acked-by: Ian Campbell
---
tools/libxc/xc_dom_arm.c | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/tools/libxc/xc_dom_arm.c b/tools/libxc/xc_dom_arm.c
index b9fa66d..065debb 100644
-
From: Julien Grall
The function domain_get_maximum_gpfn is returning the maximum gpfn ever
mapped in the guest. We can use d->arch.p2m.max_mapped_gfn for this purpose.
We use this in xenaccess as to avoid the user attempting to set page
permissions on pages which don't exist for the domain, as a
The hypervisor may use the MMU to verify that the given guest has read/write
access to a given page during hypercalls. As we may have custom mem_access
permissions set on these pages, we do a software-based type checking in case
the MMU based approach failed, but only if mem_access_enabled is set.
Add missing structure definition for iabt and update the trap handling
mechanism to only inject the exception if the mem_access checker
decides to do so.
Signed-off-by: Tamas K Lengyel
---
v15: - Use flush_tlb_local
Only get gpa if trap was triggered by permission fault
v14: - Query HPFAR_
The current implementation of three memops, XENMEM_current_reservation,
XENMEM_maximum_reservation and XENMEM_maximum_gpfn return values as an
int. However, in ARM64 we could potentially have 36-bit pfn's, thus
in preparation for the ARM patch, in this patch we update the existing
memop routines to
Hi
I really really need help. I continue trying to make it work but
nothing change.
Please I need help :(
On Sat, 18 Apr 2015 19:25:52 +0200, HANNAS YAYA Issa wrote:
Hi I am working in a research project
I want to incercept pages access by guest virtual machine.
My approach is setting high
>>> On 20.04.15 at 16:32, wrote:
> On Mon, Apr 20, 2015 at 03:08:09PM +0100, Jan Beulich wrote:
>> >>> On 20.04.15 at 15:43, wrote:
>> > did firmware reconfigure this device to report URs as fatal errors then?
>>
>> No, the Unsupported Request Error Serverity flag is zero.
>
> OK, that's the co
On Mon, Apr 20, 2015 at 03:08:09PM +0100, Jan Beulich wrote:
> >>> On 20.04.15 at 15:43, wrote:
> > On Mon, Apr 13, 2015 at 01:51:06PM +0100, Jan Beulich wrote:
> >> >>> On 13.04.15 at 14:47, wrote:
> >> > Can you check device capabilities register, offset 0x4 within
> >> > pci express capability
>>> On 10.04.15 at 11:22, wrote:
> --- a/tools/firmware/hvmloader/e820.c
> +++ b/tools/firmware/hvmloader/e820.c
> @@ -73,7 +73,8 @@ int build_e820_table(struct e820entry *e820,
> unsigned int lowmem_reserved_base,
> unsigned int bios_image_base)
> {
>
flight 50568 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50568/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 3 host-install(3) broken REGR. vs. 50368
buil
On Mon, Apr 20, Olaf Hering wrote:
> With this change the following domU.cfg will show the VM window on the
> local dom0 display, instead of the remote side (it via ssh -X login):
> vnc=0
> sdl=1
> display=":0"
> xauthority="/run/gdm/auth-for-olaf-nMXhOi/database"
libvirt works as well wi
>>> On 10.04.15 at 11:22, wrote:
> --- a/tools/firmware/hvmloader/pci.c
> +++ b/tools/firmware/hvmloader/pci.c
> @@ -59,8 +59,8 @@ void pci_setup(void)
> uint32_t bar_reg;
> uint64_t bar_sz;
> } *bars = (struct bars *)scratch_start;
> -unsigned int i, nr_bars = 0;
> -
flight 50650 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50650/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 3 host-install(3) broken REGR. vs. 36656
buil
I updated xen and qemu from xen 4.5.0 with its upstream qemu included to
xen 4.5.1-pre with qemu upstream from stable-4.5 (changed Config.mk to
use revision "master").
After few minutes I booted windows 7 64 bit domU qemu crash, tried 2
times with same result.
In the domU's qemu log:
qemu-syst
Xen toolstack references many variables in Paths.mk when building and
installing, so tools' configure should generate Paths.mk if it's not
available. Also make inclusion of Paths.mk mandatory in Tools.mk.
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
Please rerun autogen.sh
---
c
>>> On 20.04.15 at 15:43, wrote:
> On Mon, Apr 13, 2015 at 01:51:06PM +0100, Jan Beulich wrote:
>> >>> On 13.04.15 at 14:47, wrote:
>> > Can you check device capabilities register, offset 0x4 within
>> > pci express capability structure?
>> > Bit 15 is 15 Role-Based Error Reporting.
>> > Is it se
flight 50565 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50565/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 3 host-install(3) broken REGR. vs. 367
>>> On 10.04.15 at 11:22, wrote:
> --- a/tools/firmware/hvmloader/util.c
> +++ b/tools/firmware/hvmloader/util.c
> @@ -27,6 +27,16 @@
> #include
> #include
>
> +int check_hole_conflict(uint64_t start, uint64_t size,
> +uint64_t reserved_start, uint64_t reserved_size)
>>> On 10.04.15 at 11:22, wrote:
> --- a/tools/libxl/libxl_dom.c
> +++ b/tools/libxl/libxl_dom.c
> @@ -787,6 +787,70 @@ out:
> return rc;
> }
>
> +static int libxl__domain_construct_memmap(libxl_ctx *ctx,
> + libxl_domain_config *d_config,
> +
>>> On 10.04.15 at 11:22, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4729,7 +4729,6 @@ static long hvm_memory_op(int cmd,
> XEN_GUEST_HANDLE_PARAM(void) arg)
>
> switch ( cmd & MEMOP_CMD_MASK )
> {
> -case XENMEM_memory_map:
Title and description t
flight 50696 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50696/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 3 host-install(3) broken REGR. vs. 50391
On Mon, Apr 13, 2015 at 01:51:06PM +0100, Jan Beulich wrote:
> >>> On 13.04.15 at 14:47, wrote:
> > On Mon, Apr 13, 2015 at 01:40:59PM +0100, Jan Beulich wrote:
> >> Quite possible. Looking at the ITP log we were provided, the UR
> >> severity bit is clear (non-fatal), yet the error got surfaced t
With this change the following domU.cfg will show the VM window on the
local dom0 display, instead of the remote side (it via ssh -X login):
vnc=0
sdl=1
display=":0"
xauthority="/run/gdm/auth-for-olaf-nMXhOi/database"
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc:
Prepare device-model setup functions to pass also environment variables
to the spawned process. This is required for upcoming changes which will
set DISPLAY and XAUTHORITY for SDL.
Signed-off-by: Olaf Hering
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl/
For some reason DISPLAY and XAUTHORITY are not set by libxl.
Thats not an issue for xl(1) because it can reuse the DISPLAY from the
calling process. But libvirtd will benefit from being able to pass the
configured display and xauth settings.
Olaf
Olaf Hering (2):
libxl: pass environment to dev
>>> On 10.04.15 at 11:21, wrote:
> --- a/tools/libxc/xc_domain.c
> +++ b/tools/libxc/xc_domain.c
> @@ -1654,13 +1654,15 @@ int xc_domain_setdebugging(xc_interface *xch,
> int xc_assign_device(
> xc_interface *xch,
> uint32_t domid,
> -uint32_t machine_sbdf)
> +uint32_t machine_s
On Mon, Apr 20, 2015 at 06:48:24PM +0800, Chen Baozi wrote:
> Make sure that xen_swiotlb_init allocates buffers that is DMA capable.
>
> Signed-off-by: Chen Baozi
> ---
> drivers/xen/swiotlb-xen.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/drivers/xen/swiotlb-xen
>>> On 10.04.15 at 11:21, wrote:
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -1793,8 +1793,14 @@ static void iommu_set_pgd(struct domain *d)
> hd->arch.pgd_maddr = pagetable_get_paddr(pagetable_from_mfn(pgd_mfn));
> }
>
> +/*
> + * In some c
On Mon, 2015-04-20 at 14:14 +0100, Ian Campbell wrote:
> I'm about to kick off an adhoc test on the Cambridge VM
Except the filer seems to have just died for the second time today. I
suspect I'll be putting a hold on this work until we can switch over to
reliable infrastructure (which is in progre
On 15/04/15 11:55, Ian Campbell wrote:
> On Fri, 2015-04-10 at 18:15 +0100, Andrew Cooper wrote:
>> Not everything which needs reporting as progress comes with a range. Extend
>> the interface to allow reporting of a single statement.
>>
>> The programming interface now looks like:
>> xc_set_pro
On Wed, 2015-04-15 at 11:04 +0100, Ian Campbell wrote:
> If the option is set then osstest branch flights proceed by merging,
> the referenced branch into the local pretest branch and testing the
> result.
This turned out to not be quite right in practice. Since pretest is not
updated, in the abse
On Mon, Apr 20, 2015 at 01:15:29PM +0100, Ian Campbell wrote:
> This series adds parsing of the DT ranges and interrupt-map properties
> for PCI devices, these contain the MMIOs and IRQs used by children on
> the bus. This replaces the specific mapping stuff on xgene.
>
> Since last time I've adde
flight 50657 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50657/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 3 host-install(3) broken REGR. vs. 33866
flight 50437 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50437/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen3 host-install(3) broken REGR. vs. 36512
test-amd64-i386-p
Thanks your rely. But sorry i can't understand your explanation fully.
I don't want to change GICD setting. I only want to change target Domain0' vcpu
injected SPI. vcpu0 or vcpu1.
I understand like below.
In Xen4.4, vgic_vcpu_inject_irq() can inject SPI to any Domain0's vcpu on any
pcpu.
But
flight 50465 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/50465/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REGR. vs. 50329
test-amd64-amd64-xl-q
all gics.
Although in principal #interrupt-cells can vary it must always be 3
for a GIC (and we only support GIC as a guest interrupt controller),
so putting it in common code is OK.
Signed-off-by: Ian Campbell
---
v3: Retitle and reword, was "xen: arm: propagate gic's
#interrupt-cells prope
This function iterates over a nodes interrupt-map property and calls a
callback for each interrupt. For now it only supplies the raw IRQ
since my use case has no need of e.g. child unit address. These can be
added as needed by any future users.
This follows much the same logic as dt_irq_map_raw wh
This function iterates over a node's ranges property and calls a
callback for each region. For now it only supplies the MMIO range (in
terms of CPU addresses, i.e. already translated).
Signed-off-by: Ian Campbell
---
xen/common/device_tree.c | 85 +
This uses the dt_for_each_{irq_map,range} helpers to map the interrupt
and child MMIO regions to dom0. Since PCI busses are enumerable these
resources may not be otherwise described in the DT (although they can
be).
Although PCI is the only bus we handle this way the code should be
generic enough
This provides specific handlers for the PCI bus relating to matching
and translating. It's mostly similar to the defaults but includes some
additional error checks and other PCI specific bits.
Functions/types renamed and reindented (because apparently we do
that for these).
Needs a selection of I
This series adds parsing of the DT ranges and interrupt-map properties
for PCI devices, these contain the MMIOs and IRQs used by children on
the bus. This replaces the specific mapping stuff on xgene.
Since last time I've added a dt_for_each_range helper, which cleans
things up considerably and in
>>> On 20.04.15 at 13:55, wrote:
> On 20/04/15 12:48, Jan Beulich wrote:
> On 20.04.15 at 12:49, wrote:
>>> --- a/docs/Makefile
>>> +++ b/docs/Makefile
>>> @@ -73,13 +73,11 @@ endif
>>>
>>> man1/%.1: man/%.pod.1 Makefile
>>> $(INSTALL_DIR) $(@D)
>>> - $(POD2MAN) --release=$(VERSION)
On 20/04/15 12:07, Chen Baozi wrote:
> On Mon, Apr 20, 2015 at 11:53:47AM +0100, David Vrabel wrote:
>> On 20/04/15 11:48, Chen Baozi wrote:
>>> Make sure that xen_swiotlb_init allocates buffers that is DMA capable.
>>>
>>> Signed-off-by: Chen Baozi
>>> ---
>>> drivers/xen/swiotlb-xen.c | 3 ++-
>
On 20/04/15 12:57, Jan Beulich wrote:
On 20.04.15 at 12:49, wrote:
>> @@ -103,12 +88,20 @@ install: install-man-pages install-html
>>
>> # Individual file build targets
>> man1/%.1: man/%.pod.1 Makefile
>> +ifdef POD2MAN
> Perhaps better to use ifneq($(POD2MAN),) in such cases?
I was fol
On Mon, Apr 20, 2015 at 7:07 AM, 蒋雄伟(蒋冲) wrote:
> Hi, everyone,
>
> I would like to use xenmon to gain insight into xen environment. What I
> know about xenmon is that xentrace is used to catch events and xenbaked is
> used to processes events and xenmon is used to display and/or log the data.
>
>>> On 20.04.15 at 12:49, wrote:
> @@ -103,12 +88,20 @@ install: install-man-pages install-html
>
> # Individual file build targets
> man1/%.1: man/%.pod.1 Makefile
> +ifdef POD2MAN
Perhaps better to use ifneq($(POD2MAN),) in such cases?
> @$(INSTALL_DIR) $(@D)
> $(POD2MAN) --rel
On 20/04/15 12:48, Jan Beulich wrote:
On 20.04.15 at 12:49, wrote:
>> --- a/docs/Makefile
>> +++ b/docs/Makefile
>> @@ -73,13 +73,11 @@ endif
>>
>> man1/%.1: man/%.pod.1 Makefile
>> $(INSTALL_DIR) $(@D)
>> -$(POD2MAN) --release=$(VERSION) --name=`echo $@ | sed 's/^man1.//'| \
>> -
>>> On 20.04.15 at 12:49, wrote:
> --- a/docs/Makefile
> +++ b/docs/Makefile
> @@ -73,13 +73,11 @@ endif
>
> man1/%.1: man/%.pod.1 Makefile
> $(INSTALL_DIR) $(@D)
> - $(POD2MAN) --release=$(VERSION) --name=`echo $@ | sed 's/^man1.//'| \
> - sed 's/.1//'` -s 1 -c "Xen" $< $
On 04/17/2015 02:08 PM, Stefano Stabellini wrote:
> Hi all,
>
> This patch series builds qemu-traditional and seabios separately from the
> Xen tree. It also change the QEMU build to be more Xen specific,
> installing the QEMU binary under /usr/lib/xen/bin.
>
>
> Changes compared to the previous
>>> On 10.04.15 at 11:21, wrote:
> --- a/tools/libxc/xc_domain.c
> +++ b/tools/libxc/xc_domain.c
> @@ -1665,6 +1665,46 @@ int xc_assign_device(
> return do_domctl(xch, &domctl);
> }
>
> +struct xen_reserved_device_memory
> +*xc_device_get_rdm(xc_interface *xch,
> + uint32
On Mon, 2015-04-20 at 11:38 +0100, Stefano Stabellini wrote:
> On Mon, 20 Apr 2015, Ian Campbell wrote:
> > On Mon, 2015-04-20 at 10:58 +0100, Stefano Stabellini wrote:
> > > On Sat, 18 Apr 2015, Chen Baozi wrote:
> > > > On Fri, Apr 17, 2015 at 05:13:16PM +0100, Stefano Stabellini wrote:
> > > > >
On Mon, 2015-04-20 at 12:32 +0200, Olaf Hering wrote:
> On Mon, Apr 20, Ian Campbell wrote:
>
> > It makes no sense to do that at init time, the whole purpose of a
> > defbool is to allow the calling application to choose a value or to
> > explicitly leave it as a request to for the default (which
On Mon, Apr 20, 2015 at 11:53:47AM +0100, David Vrabel wrote:
> On 20/04/15 11:48, Chen Baozi wrote:
> > Make sure that xen_swiotlb_init allocates buffers that is DMA capable.
> >
> > Signed-off-by: Chen Baozi
> > ---
> > drivers/xen/swiotlb-xen.c | 3 ++-
> > 1 file changed, 2 insertions(+), 1
On Thu, Apr 16, 2015 at 1:42 PM, Eric Dumazet wrote:
> On Thu, 2015-04-16 at 11:01 +0100, George Dunlap wrote:
>
>> He suggested that after he'd been prodded by 4 more e-mails in which two
>> of us guessed what he was trying to get at. That's what I was
>> complaining about.
>
> My big complain i
On 04/17/2015 11:58 AM, Stefano Stabellini wrote:
> On Thu, 16 Apr 2015, George Dunlap wrote:
>> Until we start hosting the blktap repo on xenbits, use the one from github.
>>
>> Also, we need to pass in the directories where to find the
>> libblktapctl headers in the Xen build.
>>
>> Signed-off-by
On 20/04/15 11:48, Chen Baozi wrote:
> Make sure that xen_swiotlb_init allocates buffers that is DMA capable.
>
> Signed-off-by: Chen Baozi
> ---
> drivers/xen/swiotlb-xen.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotl
In Xen 4.5 we rely on the fact that the physical irq is routed to the
physical cpu running the vcpu of the domain that needs to receive the
corresponding virq.
So if you want to inject IRQ 100 to CPU 1, while Dom0 is set to receive
vIRQ 100 (virtual irq corresponding to IRQ 100) to vcpu0, running
This is the results of shaving a yak which started while introducing a pandoc
document in the Migration v2 libxc series
Andrew Cooper (7):
docs/build: Misc cleanup
docs/build: Do not open-code $*
docs/build: Move two rules for consistency, and comment sections
docs/build: Do not use move-i
For top-level targets which use more than a single program to produce content
(txt already, pdf once pandoc is supported), these current checks are
unsuitable.
By moving the the install checks to the rules which actually use the programs,
it is now possible to build a subset of a top-level target
osstest service user writes ("[qemu-mainline test] 50651: trouble:
blocked/broken"):
> flight 50651 qemu-mainline real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/50651/
>
> Failures and problems with tests :-(
>
> Tests which did not succeed and are blocking,
> including tests whi
1 - 100 of 147 matches
Mail list logo