flight 62316 qemu-upstream-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62316/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-vhd9 debian-di-install fail REGR. vs. 60565
test-am
flight 62313 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62313/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qcow2 9 debian-di-install fail REGR. vs. 60670
test-amd64-amd64-xl-vh
branch xen-unstable
xen branch xen-unstable
job test-amd64-amd64-xl-qemut-debianhvm-amd64
test debian-hvm-install
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org
flight 62308 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62308/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 3 host-install(3) broken REGR. vs. 607
flight 62302 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62302/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
60727
test-amd64-a
flight 62315 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62315/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 18 guest-start.2 fail in 62149
pass in 62315
test-amd64-i386-xl-qemuu-de
flight 62295 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62295/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 59254
test-armhf-armhf-xl-c
flight 62285 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62285/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-i386-i386-xl-qemuu-winxpsp3 15 guest-localmigrate.2 fail REGR. vs. 62129
Regressions which
flight 62281 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62281/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-vhd 9 debian-di-installfail never pass
test-armhf-armhf-libvirt-qcow2 9 debian-di
Hi,
I am an Outreachy 2015 Applicant. I have a background in C, C++ and shell
scripting. I am also familiar with concepts of Operating Systems.
I would like to contribute to the Xen project and it would be very helpful
if I could get some help getting started.
I have gone through the beginner's
On 09/25/2015 03:35 PM, Konrad Rzeszutek Wilk wrote:
On Fri, Sep 25, 2015 at 03:19:57PM -0400, Boris Ostrovsky wrote:
On 09/25/2015 03:01 PM, Konrad Rzeszutek Wilk wrote:
On Fri, Sep 25, 2015 at 01:17:40PM -0400, Boris Ostrovsky wrote:
On 09/25/2015 12:07 PM, Vitaly Kuznetsov wrote:
Also, I a
From: Elena Ufimtseva
This patch addresses a regression introduced by commit
5ae03990c120a7b3067a52d9784c9aa72c0705a6 in new set_identity_p2m_entry.
RMRRs are not being mapped in IOMMU for PVH Dom0. This causes pages faults and
some long 'hang-like' delays during Dom0 PVH boot and device assignm
On Fri, 25 Sep 2015, Ian Campbell wrote:
> On Thu, 2015-09-24 at 23:19 +0100, Stefano Stabellini wrote:
> > On Thu, 24 Sep 2015, Ian Campbell wrote:
> > > On Thu, 2015-09-24 at 20:33 +0100, Stefano Stabellini wrote:
> > > > On Thu, 24 Sep 2015, Ian Campbell wrote:
> > > > > On Wed, 2015-09-23 at 18
On Thu, 24 Sep 2015, Stefano Stabellini wrote:
> On Wed, 23 Sep 2015, Stefano Stabellini wrote:
> > On Wed, 23 Sep 2015, Ian Campbell wrote:
> > > On Wed, 2015-09-23 at 01:18 -0700, Ard Biesheuvel wrote:
> > > > On 23 September 2015 at 01:12, Jan Beulich wrote:
> > > > > > > > On 23.09.15 at 02:49
On Tue, Sep 22, 2015 at 12:28:50PM -0400, Daniel De Graaf wrote:
> On 17/09/15 14:45, Konrad Rzeszutek Wilk wrote:
> >. snip..
> >>The build id of the current running hypervisor should belong in the
> >>xeninfo hypercall. It is not specific to xsplice.
> >However in the previous review
On Tue, Sep 22, 2015 at 12:10:18AM +0100, Julien Grall wrote:
> Hi Konrad,
>
> On 09/09/2015 16:02, Konrad Rzeszutek Wilk wrote:
> >>Konrad, would you like me to resend the patch with the modified commit
> >>message, or do you plan to amend it yourself while committing?
> >
> >I will amend it. Tha
On Fri, Sep 25, 2015 at 03:19:57PM -0400, Boris Ostrovsky wrote:
> On 09/25/2015 03:01 PM, Konrad Rzeszutek Wilk wrote:
> >On Fri, Sep 25, 2015 at 01:17:40PM -0400, Boris Ostrovsky wrote:
> >>On 09/25/2015 12:07 PM, Vitaly Kuznetsov wrote:
> Also, I am not sure I see how this new op will be use
On 09/25/2015 03:01 PM, Konrad Rzeszutek Wilk wrote:
On Fri, Sep 25, 2015 at 01:17:40PM -0400, Boris Ostrovsky wrote:
On 09/25/2015 12:07 PM, Vitaly Kuznetsov wrote:
Also, I am not sure I see how this new op will be used in the
hypervisor --- currently AFAICS it is only processed under
is_hardw
Signed-off-by: Ian Jackson
---
v14: New patch
---
cs-adjust-flight |8
1 file changed, 8 insertions(+)
diff --git a/cs-adjust-flight b/cs-adjust-flight
index 834e2c8..a7b50f5 100755
--- a/cs-adjust-flight
+++ b/cs-adjust-flight
@@ -22,6 +22,14 @@
# . means all job
Make this function suitable for running on targets with static IP
addresses. (Ie, on physical hosts.) Accordingly, rename it and
adjust all call sites.
Signed-off-by: Ian Jackson
---
v14: New patch
---
Osstest/TestSupport.pm | 11 ++-
ts-guest-localmigrate |2 +-
ts-guest-migrat
We introduce a new syntax: instead of a hostname (which might appear
in a command line argument to a ts-* script and hence be passed to
selecthost, or which might be in a runvar), we now support
:.
Such `hosts' (let us refer to such a thing as an L1, although in
principle further nesting may be po
From: Robert Ho
* Provide the L1 with some storage for its own guests' disks
* Install some packages in the L1
* Optionally, set a runvar defining the L1 for the rest of the job
The recipe is going to run ts-xen-install etc.
Signed-off-by: longtao.pang
Signed-off-by: Robert Ho
Signed-off-by:
From: Robert Ho
await_tcp is often invoked after a reboot.
In this situation the target's IP address may change. If this happens
while await_tcp is running, we would continue to poll the old IP address.
Fix this by running target_check_ip on each iteration.
Signed-off-by: Robert Ho
Signed-off
This function does not (now) always undo the DHCP configuration.
Sometimes it leaves it. Its main function is to ensure that we have
a bridge for use by guests.
So rename the function.
Signed-off-by: Ian Jackson
---
v14: This patch was previously 4/4 of a miniature series containing
a dif
We are going to want to reuse this.
Signed-off-by: Ian Jackson
---
v14: New patch
---
Osstest/TestSupport.pm | 15 +++
1 file changed, 11 insertions(+), 4 deletions(-)
diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm
index ad017a4..2d1db5d 100644
--- a/Osstest/TestSupp
This allows cs-adjust-flight to be run by hand to adjust runvars, in a
flight being used with hand-invocation of ./ts-* scripts.
Signed-off-by: Ian Jackson
---
v14: New patch
---
cs-adjust-flight |8
1 file changed, 8 insertions(+)
diff --git a/cs-adjust-flight b/cs-adjust-flight
i
Provides nested-layer-descend, which can be called in an individual
test job at the appropriate point (after the L1 has been set up).
The inner host is a guest of the outer host; powering it off means
destroying it. Putting the poweroff at this point in the loop, rather
than in per-host-finish, a
It is possible that this may work some of the time with xm, so I have
taken no measures to prevent it running then.
Signed-off-by: Ian Jackson
v14: New patch
---
Osstest/Toolstack/xl.pm |8
1 file changed, 8 insertions(+)
diff --git a/Osstest/Toolstack/xl.pm b/Osstest/Toolstac
This is the second part of v14 Robert Ho's osstest patch series to
support nested HVM tests.
It is also available here:
git://xenbits.xen.org/people/iwj/xen.git
http://xenbits.xen.org/git-http/people/iwj/xen.git
in wip.nested-hvm.v14.part1..wip.nested-hvm.v14
Compared to Robert's v13, which w
From: Robert Ho
Check IpStatic, and if it is not set, provide a dhcp stanza in
/etc/network/interfaces, rather than an `inet static' one.
This is necessary for L1 nested hosts, because they don't have a
static IP address.
In principle this makes matters more correct for physical hosts
without s
From: Robert Ho
Signed-off-by: Robert Ho
Signed-off-by: Ian Jackson
---
v14: ts-nested-setup command line syntax updated.
---
sg-run-job | 10 ++
1 file changed, 10 insertions(+)
diff --git a/sg-run-job b/sg-run-job
index 8174ef7..6b59ab3 100755
--- a/sg-run-job
+++ b/sg-run-job
@@
From: Robert Ho
Signed-off-by: longtao.pang
Signed-off-by: Robert Ho
Signed-off-by: Ian Jackson
---
v14: Use default gueststorage_size, rather than setting runvar.
Dropped acked from Ian Campbell.
---
make-flight | 28
1 file changed, 28 insertions(+)
diff
This talks about `guest_check_ip', but this code is now factored out
into a method. Use the correct method name in reporting.
Signed-off-by: Ian Jackson
---
v14: New patch
---
Osstest/DhcpWatch/leases.pm |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/DhcpWatch/le
Document the syntax for $ident.
Log the ident as well as the selected hostname.
Signed-off-by: Ian Jackson
---
v14: New patch
---
Osstest/TestSupport.pm | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm
index 1
From: Robert Ho
This `guest' power method uses VM create/destroy. It is automatically
used for nested hosts. It would not make much sense to configure it
manually.
For nested host/guest, its power on/off method shall be
its host invoke $(toolstack)->create/destroy method.
XXX Missing Signed-o
No functional change.
We now call the per-host-ts finish steps unconditionally, rather than
only if !$need_build_host, per-host-ts is (complicated) no-op if
$need_build_host, since in that case $need_xen_hosts is {}.
Signed-off-by: Ian Jackson
Signed-off-by: Robert Ho
Tested by: Robert Ho
---
On Fri, Sep 25, 2015 at 01:17:40PM -0400, Boris Ostrovsky wrote:
> On 09/25/2015 12:07 PM, Vitaly Kuznetsov wrote:
> >>Also, I am not sure I see how this new op will be used in the
> >>hypervisor --- currently AFAICS it is only processed under
> >>is_hardware_domain(). Are there other patches that
On Fri, Sep 25, 2015 at 03:22:35PM +0800, Quan Xu wrote:
> Bit 0:29 in Fault Event Control Register are 'Reserved and Preserved',
> software cannot write 0 to it unconditionally. Software must preserve
> the value read for writes.
>
> Signed-off-by: Quan Xu
> Reported-by: Jan Beulich
Release-ac
flight 62363 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62363/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Ian Jackson writes ("[OSSTEST PATCH 3/4] ts-xen-install: networking: Never
rewrite the interface config"):
> Instead, if we need to, simply change the physical interface in the
> `iface' line to refer to xenbr0, and add the physical interface as a
> `bridge_ports' along with the other bridge setti
flight 62291 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62291/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Tests which are failin
On 09/25/2015 12:07 PM, Vitaly Kuznetsov wrote:
Also, I am not sure I see how this new op will be used in the
hypervisor --- currently AFAICS it is only processed under
is_hardware_domain(). Are there other patches that will support HVM
guests?
Please see my Xen series:
http://lists.xenproject.o
Robert Ho writes ("[OSSTest Nested v12 19/21] Selecthost uses dynamic IP
address if the host is not configured static IP."):
> In this patch
> 1. in check_ip(), we change $lstash to use {Name} key-value, rather
> than {Guest}, because {Name} is both usable by $ho and $gho hash.
> 2. $ho->{Ether} a
Boris Ostrovsky writes:
> On 09/25/2015 09:59 AM, Konrad Rzeszutek Wilk wrote:
>> On Fri, Sep 25, 2015 at 11:59:52AM +0200, Vitaly Kuznetsov wrote:
>>> Currently there is a number of issues preventing PVHVM Xen guests from
>>> doing successful kexec/kdump:
>>> - Bound event channels.
>>> - Regist
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
> Only coding style changes. No functional changes.
>
> Signed-off-by: Julien Grall
Acked + applied since it was obvious.
> ---
> xen/arch/arm/domain_build.c | 9 ++---
> 1 file changed, 6 insertions(+), 3 deletions(-)
>
> diff --git
On Fri, 2015-09-25 at 15:51 +0100, Julien Grall wrote:
> Signed-off-by: Julien Grall
Acked-by: Ian Campbell
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Fri, 2015-09-25 at 15:51 +0100, Julien Grall wrote:
> The guest may try to load data from the emulated MMIO region using
> instruction with Sign-Extension (i.e ldrs*). This can happen for any
> access smaller than the register size (byte/half-word for aarch32,
> byte/half-word/word for aarch64).
Robert Ho writes ("[OSSTest Nested v12 16/21] Add PDU power method for nested
L1 and L2 guest"):
> For nested host/guest, its power on/off method shall be
> its host invoke $(toolstack)->create/destroy method.
Thanks for this patch, which I have substantially edited for my v14.
However, I notice
On Fri, 2015-09-25 at 15:51 +0100, Julien Grall wrote:
> From: Julien Grall
>
> Rather than letting each handler to retrieve the register used by the
> I/O access, add a new parameter to pass the register in parameter.
>
> This will help to implement generic register manipulation on I/O access
>
On Fri, 2015-09-25 at 15:51 +0100, Julien Grall wrote:
> From: Julien Grall
>
> This typedef is a left-over of the previous MMIO emulation
> implementation.
>
> Signed-off-by: Julien Grall
Acked-by: Ian Campbell
___
Xen-devel mailing list
Xen-devel
On Fri, 2015-09-25 at 16:45 +0100, Anthony PERARD wrote:
> On Fri, Sep 25, 2015 at 04:37:19PM +0100, Ian Campbell wrote:
> > On Thu, 2015-09-17 at 10:49 +0100, Anthony PERARD wrote:
> > > On Wed, Sep 16, 2015 at 07:56:44PM +0100, Andrew Cooper wrote:
> >
> > > > I highly recommend that you build o
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
> All the quirks has been replaced by proper detection. Lets drop the
> callback and hope that no one will need new quirks.
Hah!
> At the same time, remove the definition platform_dom0_evtchn_ppi with is
> not used any more.
>
> Signed-off-b
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
Subject: "automatically detect..."
> We are currently using a per-platform quirk to know if the 2 4KB region of
> the GIC CPU interface are each aligned to 64KB. Although, it may be
> possible to have different layout on a same platform (depe
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
> The size of the CPU interface will used in a follow-up patch to map the
> region in Xen memory.
>
> Based on GICv2 spec, the CPU interface should at least be 8KB, although
> most of the platform we are supporting use the GICv1 size (i.e 4KB)
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
> The field value is only used within a single function in the vgic-v2
> emulation. So it's not necessary to store the value in the domain
> structure.
>
> This is also saving 8 bytes on a structure which begin to be constrained
> (the maximum
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
> Xen is using unconditionnally some device tree path to create DOM0
"unconditionally"
> specific node (for instance /psci, /memory and /hypervisor).
>
> Rather than blindly add new nodes with the same, print a warning message
> on the conso
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
> Only coding style changes. No functional changes.
>
> Signed-off-by: Julien Grall
Acked + applied since it was so trivial and standalone.
> ---
> xen/arch/arm/domain_build.c | 9 ++---
> 1 file changed, 6 insertions(+), 3 deletions(-
On 09/25/2015 09:59 AM, Konrad Rzeszutek Wilk wrote:
On Fri, Sep 25, 2015 at 11:59:52AM +0200, Vitaly Kuznetsov wrote:
Currently there is a number of issues preventing PVHVM Xen guests from
doing successful kexec/kdump:
- Bound event channels.
- Registered vcpu_info.
- PIRQ/emuirq mappings.
- sh
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
> The function dt_n_*_cells will retrieve the number of cells for a given
> node. Those numbers may not be correct to use for the child "reg"
> property if the parent is passed.
I think a clearer way to express this is that the functions retur
>>> On 25.09.15 at 17:16, wrote:
> On 21/09/15 16:44, Jan Beulich wrote:
>>> +uint32_t cr0;
>>> +uint32_t cr3;
>>> +uint32_t cr4;
>>> +uint64_t efer;
>> What again was the point of having EFER here?
>
> EFER.NX must match what the BSP chose to set up in the pagetables
> pointed t
>>> On 25.09.15 at 17:18, wrote:
> On Fri, Sep 25, 2015 at 12:36:09AM -0600, Jan Beulich wrote:
>> >>> On 25.09.15 at 01:53, wrote:
>> > --- a/xen/arch/x86/mm/p2m.c
>> > +++ b/xen/arch/x86/mm/p2m.c
>> > @@ -971,7 +971,17 @@ int set_identity_p2m_entry(struct domain *d, unsigned
>> > long gfn,
>>
On Tue, 2015-09-22 at 18:47 +0100, Julien Grall wrote:
"Make it clear..." in the subject.
> The callback make_hwdom_dt_node already have the gic node in parameter.
"...already has the..." or "...already takes the..."
> Rather than using a weird mix between "dt_interrupt_controller" (aliased
> t
On Fri, Sep 25, 2015 at 04:37:19PM +0100, Ian Campbell wrote:
> On Thu, 2015-09-17 at 10:49 +0100, Anthony PERARD wrote:
> > On Wed, Sep 16, 2015 at 07:56:44PM +0100, Andrew Cooper wrote:
>
> > > I highly recommend that you build on top of Rogers DMlite series, which
> > > already offers a multibo
On 09/25/2015 11:22 AM, Roger Pau Monné wrote:
El 25/09/15 a les 17.13, Jan Beulich ha escrit:
On 25.09.15 at 17:07, wrote:
El 21/09/15 a les 16.48, Boris Ostrovsky ha escrit:
On 09/21/2015 10:36 AM, Jan Beulich wrote:
On 04.09.15 at 14:08, wrote:
Hmm - this seems questionable to me: Isn't
>>> On 25.09.15 at 13:54, wrote:
> Per-VCPU pause flags in sched.h are defined as bit positions and as
> values derived from the bit defines. There is only one user of a value
> which can be easily converted to use a bit number as well.
I'm not convinced:
> --- a/xen/common/domctl.c
> +++ b/xen/
On Fri, 2015-09-11 at 13:45 +0100, Ian Jackson wrote:
> Juergen Gross writes ("[PATCH 2/5] libxc: do initrd processing of domain
> builder in own function"):
> > Factor out the initrd processing in xc_dom_build_image() into an own
> > function to prepare starting a domain with unmapped initrd.
>
>
On Fri, 2015-09-11 at 16:01 +0200, Juergen Gross wrote:
> > The reason I asked is that the first thing Roger's series does is cause HVM
> > domains to be built using the PV domain builder...
>
> Aah, okay.
>
> OTOH I'm doing nothing different than the hypervisor when loading dom0.
> As long as th
On Wed, 2015-09-23 at 14:21 +0100, Wei Liu wrote:
> On Tue, Sep 22, 2015 at 02:20:52PM +0200, Juergen Gross wrote:
> > Remove unused fields from the domain builder and associated functions.
> >
> > Signed-off-by: Juergen Gross
>
> Acked-by: Wei Liu
This doesn't appear to overlap with Roger's b
On Fri, 2015-09-11 at 13:44 +0100, Ian Jackson wrote:
> Juergen Gross writes ("[PATCH 1/5] libxc: remove allocate member from
> struct xc_dom_image"):
> > The allocate() callback in struct xc_dom_image is never set. Remove it.
>
> Acked-by: Ian Jackson
Applied to staging.
This will have a trivi
On Fri, 2015-09-18 at 16:30 +0800, Tiejun Chen wrote:
> Although we already have 'gfx_passthru' in b_info, this doesn't suffice
> after we want to handle IGD specifically. Now we define a new field of
> type, gfx_passthru_kind, to indicate we're trying to pass IGD. Actually
> this means we can bene
On Thu, 2015-09-17 at 10:49 +0100, Anthony PERARD wrote:
> On Wed, Sep 16, 2015 at 07:56:44PM +0100, Andrew Cooper wrote:
> > I highly recommend that you build on top of Rogers DMlite series, which
> > already offers a multiboot-style way of adding extra modules to HVM
> > guests. (That was the w
flight 62306 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62306/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 19 guest-start/debianhvm.repeat fail
REGR. vs. 62244
version targeted
On Mon, 2015-09-21 at 16:31 +0300, Razvan Cojocaru wrote:
> diff --git a/tools/libxc/include/xenctrl.h
> b/tools/libxc/include/xenctrl.h
> index 3482544..3bfa00b 100644
> --- a/tools/libxc/include/xenctrl.h
> +++ b/tools/libxc/include/xenctrl.h
> @@ -2428,6 +2428,18 @@ int xc_monitor_software_break
>>> On 25.09.15 at 13:54, wrote:
> Instead of using hard coded values for the possible values of parms.pae
> make use of the new libelf enum.
>
> Signed-off-by: Juergen Gross
Along the same lines as just said in reply to patch 2, I don't think the
changes here should be split off of that one ei
>>> On 25.09.15 at 13:54, wrote:
> --- a/xen/arch/x86/domain_build.c
> +++ b/xen/arch/x86/domain_build.c
> @@ -953,8 +953,8 @@ int __init construct_dom0(
> compat32 = 0;
> machine = elf_uval(&elf, elf.ehdr, e_machine);
> printk(" Xen kernel: 64-bit, lsb, compat32\n");
> -if (
El 25/09/15 a les 17.13, Jan Beulich ha escrit:
On 25.09.15 at 17:07, wrote:
>> El 21/09/15 a les 16.48, Boris Ostrovsky ha escrit:
>>> On 09/21/2015 10:36 AM, Jan Beulich wrote:
>>> On 04.09.15 at 14:08, wrote:
Hmm - this seems questionable to me: Isn't the vPMU an optional
fe
On Fri, 2015-09-11 at 15:39 +0200, Juergen Gross wrote:
> > > > -/* load ramdisk */
> > > > -if ( dom->ramdisk_blob )
> > > > +/* Load ramdisk if initial mapping required. */
> > > > +if ( dom->ramdisk_blob &&
> > > > + (!dom
> > > > ->parms.elf_notes[XEN_ELFNOTE_MOD_START_
On Fri, Sep 25, 2015 at 12:36:09AM -0600, Jan Beulich wrote:
> >>> On 25.09.15 at 01:53, wrote:
> > Permissions for p2m entry of read-only
> > mmio regions are left unchanged as leaving only 'r' cause page faults. I am
> > not sure what the reason of it yet, will try to dig it further.
>
> Yes
On 21/09/15 16:44, Jan Beulich wrote:
+uint32_t cr0;
+uint32_t cr3;
+uint32_t cr4;
+uint64_t efer;
What again was the point of having EFER here?
EFER.NX must match what the BSP chose to set up in the pagetables
pointed to in %cr3, or a triple fault will occur.
~Andrew
___
>>> On 25.09.15 at 17:07, wrote:
> El 21/09/15 a les 16.48, Boris Ostrovsky ha escrit:
>> On 09/21/2015 10:36 AM, Jan Beulich wrote:
>> On 04.09.15 at 14:08, wrote:
>>> Hmm - this seems questionable to me: Isn't the vPMU an optional
>>> feature anyway? I.e. doesn't need separate handling here
El 21/09/15 a les 16.48, Boris Ostrovsky ha escrit:
> On 09/21/2015 10:36 AM, Jan Beulich wrote:
> On 04.09.15 at 14:08, wrote:
>> Hmm - this seems questionable to me: Isn't the vPMU an optional
>> feature anyway? I.e. doesn't need separate handling here? Boris?
>
> It is optional system-wise
>>> On 25.09.15 at 15:42, wrote:
>> From: Wei Liu [mailto:wei.l...@citrix.com]
>> Sent: Friday, September 25, 2015 6:55 PM
>> On Fri, Sep 25, 2015 at 01:16:38AM -0600, Jan Beulich wrote:
>> > >>> On 25.09.15 at 04:29, wrote:
>> > > Bit 0:29 in Fault Event Control Register are 'Reserved and
>> > >
El 21/09/15 a les 16.34, Jan Beulich ha escrit:
On 04.09.15 at 14:08, wrote:
>> @@ -425,6 +431,9 @@ void vpic_reset(struct domain *d)
>>
>> void vpic_init(struct domain *d)
>> {
>> +if ( !has_vpic(d) )
>> +return;
>
> vpic_reset() above this function as well as functions furt
Xen is currently directly storing the value of register GICD_ITARGETSR
(for GICv2) and GICD_IROUTER (for GICv3) in the rank. This makes the
emulation of the registers access very simple but makes the code to get
the target vCPU for a given IRQ more complex.
While the target vCPU of an IRQ is retri
Please ignore this version, I've sent it to the wrong mailing list.
Sorry for the noise.
On 25/09/15 15:50, Julien Grall wrote:
> Hi all,
>
> This series aims to fix the 32-bit access on 64-bit register. Some guest
> OS such as FreeBSD and Linux (only in the ITS) use 32-bit access and will
> cra
Hi all,
This series aims to fix the 32-bit access on 64-bit register. Some guest
OS such as FreeBSD and Linux (only in the ITS) use 32-bit access and will
crash at boot time.
I took the opportunity to go further and optimize the way Xen is storing
registers such as GICD_IPRIORITYR, GICD_ITARGETR
The guest may try to load data from the emulated MMIO region using
instruction with Sign-Extension (i.e ldrs*). This can happen for any
access smaller than the register size (byte/half-word for aarch32,
byte/half-word/word for aarch64).
The support of sign-extension was limited for byte access in
Based on 8.1.3 (IHI 0069A), unless stated otherwise, the 64-bit registers
supports both 32-bit and 64-bits access.
All the registers we properly emulate (i.e not RAZ/WI) supports 32-bit access.
For RAZ/WI, it's also seems to be the case but I'm not 100% sure. Anyway,
emulating 32-bit access for t
The guest may try to load data from the emulated MMIO region using
instruction with Sign-Extension (i.e ldrs*). This can happen for any
access smaller than the register size (byte/half-word for aarch32,
byte/half-word/word for aarch64).
The support of sign-extension was limited for byte access in
From: Julien Grall
This typedef is a left-over of the previous MMIO emulation
implementation.
Signed-off-by: Julien Grall
---
Changes in v2:
- Patch added
---
xen/include/asm-arm/mmio.h | 1 -
1 file changed, 1 deletion(-)
diff --git a/xen/include/asm-arm/mmio.h b/xen/include/asm-
Xen is currently directly storing the value of register GICD_ITARGETSR
(for GICv2) and GICD_IROUTER (for GICv3) in the rank. This makes the
emulation of the registers access very simple but makes the code to get
the target vCPU for a given IRQ more complex.
While the target vCPU of an IRQ is retri
Based on 8.1.3 (IHI 0069A), unless stated otherwise, the 64-bit registers
supports both 32-bit and 64-bits access.
All the registers we properly emulate (i.e not RAZ/WI) supports 32-bit access.
For RAZ/WI, it's also seems to be the case but I'm not 100% sure. Anyway,
emulating 32-bit access for t
and use them in the vGIC emulation.
The GIC registers may support different access sizes. Rather than open
coding the access for every registers, provide a set of helpers to access
them.
The caller will have to call vgic_regN_* where N is the size of the
emulated registers.
The new helpers suppo
and use them in the vGIC emulation.
The GIC registers may support different access sizes. Rather than open
coding the access for every registers, provide a set of helpers to access
them.
The caller will have to call vgic_regN_* where N is the size of the
emulated registers.
The new helpers suppo
From: Julien Grall
Rather than letting each handler to retrieve the register used by the
I/O access, add a new parameter to pass the register in parameter.
This will help to implement generic register manipulation on I/O access
such as sign-extension and endianess.
Read handlers need to modify
Xen is currently directly storing the value of register GICD_IPRIORITYR
in the rank. This makes emulation of the register access very simple
but makes the code to get the priority for a given IRQ more complex.
While the priority of an IRQ is retrieved everytime an IRQ is injected
to the guest, the
Xen is currently directly storing the value of register GICD_IPRIORITYR
in the rank. This makes emulation of the register access very simple
but makes the code to get the priority for a given IRQ more complex.
While the priority of an IRQ is retrieved everytime an IRQ is injected
to the guest, the
From: Julien Grall
Rather than letting each handler to retrieve the register used by the
I/O access, add a new parameter to pass the register in parameter.
This will help to implement generic register manipulation on I/O access
such as sign-extension and endianess.
Read handlers need to modify
Signed-off-by: Julien Grall
---
Changes in v2:
- Patch added
---
xen/include/asm-arm/domain.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/include/asm-arm/domain.h b/xen/include/asm-arm/domain.h
index c3f5a95..1a5bfd7 100644
--- a/xen/include/asm-arm/domain.
Hi all,
This series aims to fix the 32-bit access on 64-bit register. Some guest
OS such as FreeBSD and Linux (only in the ITS) use 32-bit access and will
crash at boot time.
I took the opportunity to go further and optimize the way Xen is storing
registers such as GICD_IPRIORITYR, GICD_ITARGETR
1 - 100 of 183 matches
Mail list logo