On 02/16/16 05:55, Jan Beulich wrote:
> >>> On 16.02.16 at 12:14, wrote:
> > On Mon, 15 Feb 2016, Zhang, Haozhong wrote:
> >> On 02/04/16 20:24, Stefano Stabellini wrote:
> >> > On Thu, 4 Feb 2016, Haozhong Zhang wrote:
> >> > > On 02/03/16 15:22, Stefano Stabellini wrote:
> >> > > > On Wed, 3 Feb
flight 85151 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85151/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-xsm 14 guest-saver
This run is configured for baseline tests only.
flight 44215 linux-3.16 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44215/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 15 guest-start/debia
On 02/03/16 17:51, Daniel Kiper wrote:
> Currently multiboot2 protocol loads image exactly at address specified in
> ELF or multiboot2 header. This solution works quite well on legacy BIOS
> platforms. It is possible because memory regions are placed at predictable
> addresses (though I was not abl
From: Shannon Zhao
Add a new function to parse DT parameters for Xen specific UEFI just
like the way for normal UEFI. Then it could reuse the existing codes.
If Xen supports EFI, initialize runtime services.
Signed-off-by: Shannon Zhao
Reviewed-by: Matt Fleming
Reviewed-by: Stefano Stabellini
From: Shannon Zhao
Sometimes it needs to check if there is a subnode of given node in FDT
by given name. Introduce this helper to get the subnode if it exists.
CC: Rob Herring
Signed-off-by: Shannon Zhao
---
drivers/of/fdt.c | 13 +
include/linux/of_fdt.h | 2 ++
2 files ch
From: Shannon Zhao
Add a "uefi" node under /hypervisor node in FDT, then Linux kernel could
scan this to get the UEFI information.
Signed-off-by: Shannon Zhao
Acked-by: Rob Herring
Reviewed-by: Stefano Stabellini
---
CC: Rob Herring
---
Documentation/devicetree/bindings/arm/xen.txt | 33 +++
From: Shannon Zhao
ACPI 6.0 introduces a new table STAO to list the devices which are used
by Xen and can't be used by Dom0. On Xen virtual platforms, the physical
UART is used by Xen. So here it hides UART from Dom0.
Signed-off-by: Shannon Zhao
---
CC: "Rafael J. Wysocki" (supporter:ACPI)
CC:
From: Shannon Zhao
Move x86 specific codes to architecture directory and export those EFI
runtime service functions. This will be useful for initializing runtime
service on ARM later.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/x86/xen/efi.c| 112 +
From: Shannon Zhao
When running on Xen hypervisor, runtime services are supported through
hypercall. Add a Xen specific function to initialize runtime services.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/include/asm/xen/xen-ops.h | 6 ++
arch/arm/xen/Makef
From: Shannon Zhao
Move xen_early_init() before efi_init(), then when calling efi_init()
could initialize Xen specific UEFI.
Check if it runs on Xen hypervisor through the flat dts.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/xen/enlighten.c | 56 +++
From: Shannon Zhao
When booting with ACPI, it could get the event-channel irq through
HVM_PARAM_CALLBACK_IRQ.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/arm/xen/enlighten.c | 36 +++-
1 file changed, 35 insertions(+), 1 deletion(-)
di
From: Shannon Zhao
Make xen_xlate_map_ballooned_pages work with 64K pages. In that case
Kernel pages are 64K in size but Xen pages remain 4K in size. Xen pfns
refer to 4K pages.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
drivers/xen/xlate_mmu.c | 26 --
From: Shannon Zhao
Sync the changes of HVM_PARAM_CALLBACK_VIA ABI introduced by
Xen commit (public/hvm: export the HVM_PARAM_CALLBACK_VIA
ABI in the API).
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
include/xen/interface/hvm/params.h | 27 +--
1 file
From: Shannon Zhao
Add a new type of Xen map space for Dom0 to map device's MMIO region.
Signed-off-by: Shannon Zhao
---
include/xen/interface/memory.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/include/xen/interface/memory.h b/include/xen/interface/memory.h
index 2ecfe4f..9aa8988 100
From: Shannon Zhao
When it's a Xen domain0 booting with ACPI, it will supply a /chosen and
a /hypervisor node in DT. So check if it needs to enable ACPI.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
Acked-by: Hanjun Guo
---
arch/arm64/kernel/acpi.c | 12
1 file ch
From: Shannon Zhao
Add a bus_notifier for platform bus device in order to map the device
mmio regions when DOM0 booting with ACPI.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
drivers/xen/Makefile | 1 +
drivers/xen/arm-device.c | 141
From: Shannon Zhao
Add a bus_notifier for AMBA bus device in order to map the device
mmio regions when DOM0 booting with ACPI.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
drivers/xen/arm-device.c | 43 +++
1 file changed, 43 insertio
From: Shannon Zhao
Add a new delivery type:
val[63:56] == 3: val[15:8] is flag: val[7:0] is a PPI.
To the flag, bit 0 stands the interrupt mode is edge(1) or level(0) and
bit 1 stands the interrupt polarity is active low(1) or high(0).
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
-
From: Shannon Zhao
This patch set adds ACPI support for Xen Dom0 on ARM64. The relevant Xen
ACPI on ARM64 design document could be found from [1].
This patch set adds a new FDT node "uefi" under /hypervisor to pass UEFI
information. Introduce a bus notifier of AMBA and Platform bus to map
the ne
From: Shannon Zhao
Use xen_xlate_map_ballooned_pages to setup grant table. Then it doesn't
rely on DT or ACPI to pass the start address and size of grant table.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
arch/arm/xen/enlighten.c | 13 -
1 file changed, 4 insertio
From: Shannon Zhao
Move xlated_setup_gnttab_pages to common place, so it can be reused by
ARM to setup grant table.
Rename it to xen_xlate_map_ballooned_pages.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
arch/x86/xen/grant-table.c | 57 +---
flight 85286 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85286/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 85080
Tests which di
From: Shannon Zhao
Add a new delivery type:
val[63:56] == 3: val[15:8] is flag: val[7:0] is a PPI.
To the flag, bit 8 stands the interrupt mode is edge(1) or level(0) and
bit 9 stands the interrupt polarity is active low(1) or high(0).
Cc: Jan Beulich
Signed-off-by: Shannon Zhao
---
v5: fix th
From: Shannon Zhao
Add a new member in gic_hw_operations which is used to deny Dom0 access
to GIC regions.
Signed-off-by: Shannon Zhao
---
xen/arch/arm/gic-v2.c | 31 +++
xen/arch/arm/gic-v3.c | 44
xen/arch/arm/g
From: Naresh Bhat
Add ACPI support on arm64 xen hypervisor. Enable EFI support on ARM.
Cc: Jan Beulich
Signed-off-by: Naresh Bhat
Signed-off-by: Shannon Zhao
---
v5: make ACPI selectable option
---
xen/arch/arm/Kconfig | 9 +
xen/common/efi/runtime.c | 12 +++-
x
From: Shannon Zhao
It needs to map platform or amba device mmio to Dom0 on ARM. But when
booting with ACPI, it can't get the mmio region in Xen due to lack of
AML interpreter to parse DSDT table. Therefore, let Dom0 call a
hypercall to map mmio region when it adds the devices.
Here we add a new
From: Shannon Zhao
Copy and modify FADT table before passing it to Dom0. Set PSCI_COMPLIANT
and PSCI_USE_HVC.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 43 +++
1 file changed, 43 insertions(+)
diff --
From: Shannon Zhao
Map the UEFI and ACPI tables which we created to non-RAM space in Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 15 +++
1 file changed, 15 insertions(+)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/ar
From: Shannon Zhao
Interrupt information is described in DSDT and is not available at the
time of booting. Check if the interrupt is permitted to access and set
the interrupt type, route it to guest dynamically only for SPI
and Dom0.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
---
v
From: Shannon Zhao
These tables are aligned with 64bit.
Signed-off-by: Shannon Zhao
---
v5: make the return value type and variable type consistent
---
xen/arch/arm/acpi/lib.c| 15 +++
xen/include/asm-arm/acpi.h | 6 ++
2 files changed, 21 insertions(+)
diff --git a/xen/a
From: Shannon Zhao
These patches are Part 4 (and last part) of the previous patch set I
sent which adds ACPI support for arm64 on Xen[1]. Split them as an
individual set for convenient reviewing.
These patches create UEFI and ACPI tables which are mapped to Dom0's
space and add other preparation
From: Shannon Zhao
Permit access all Xen unused SPIs for Dom0 except the interrupts that
Xen uses. Then when Dom0 configures the interrupt, it could set the
interrupt type and route it to Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 31 ++
From: Parth Dixit
Create a helper function for mapping with cached attributes and
read-write range.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
---
v5: use p2m_access_rw and rename to map_regions_rw
---
xen/arch/arm/p2m.c| 26 ++
xen/include/asm-arm/
From: Shannon Zhao
Add a new member in gic_hw_operations which is used to creat MADT table
for Dom0.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/gic-v2.c | 34 ++
xen/arch/arm/gic-v3.c | 47 ++
From: Shannon Zhao
Create a few EFI memory descriptors to tell Dom0 the RAM region
information, ACPI table regions and EFI tables reserved resions.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
---
v5: move to efi-dom0.c
---
xen/arch/arm/domain_build.c | 2 ++
xen/arch/arm/efi/efi-d
From: Shannon Zhao
Create STAO table for Dom0. This table is used to tell Dom0 whether it
should ignore UART defined in SPCR table or the ACPI namespace names.
Look at below url for details:
http://wiki.xenproject.org/mediawiki/images/0/02/Status-override-table.pdf
Signed-off-by: Parth Dixit
S
From: Shannon Zhao
Prepare EFI system table for Dom0 to describe the information of UEFI.
Signed-off-by: Parth Dixit
Signed-off-by: Shannon Zhao
---
v5: move to efi-dom0.c
---
xen/arch/arm/domain_build.c | 2 ++
xen/arch/arm/efi/efi-dom0.c | 44
x
From: Shannon Zhao
Store the event-channel interrupt number and flag in HVM parameter
HVM_PARAM_CALLBACK_IRQ. Then Dom0 could get it through hypercall
HVMOP_get_param.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 10 ++
1 file changed,
From: Shannon Zhao
Copy and modify XSDT table before passing it to Dom0. Repalce the entry
value of the copied table. Add a new entry for STAO table as well. And
keep entry value of other reused tables unchanged.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
xen/arch/arm/domain
From: Shannon Zhao
Create a DT for Dom0 for ACPI-case only. DT contains minimal required
informations such as Dom0 bootargs, initrd, efi description table and
address of uefi memory table.
Also port the document of this device tree bindings from Linux.
Signed-off-by: Naresh Bhat
Signed-off-by:
From: Shannon Zhao
Map all other tables to Dom0 using 1:1 mappings.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 26 ++
1 file changed, 26 insertions(+)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_bui
From: Shannon Zhao
Copy main MADT table contents and distributor subtable from physical
ACPI MADT table. Make other subtables through the callback of
gic_hw_ops.
Signed-off-by: Shannon Zhao
Reviewed-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 50 ++
From: Shannon Zhao
Copy RSDP table and replace rsdp->xsdt_physical_address with new address
of XSDT table, so it can point to the right XSDT table.
Signed-off-by: Shannon Zhao
Acked-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 36
1 file change
From: Shannon Zhao
Estimate the memory required for loading acpi/efi tables in Dom0. Make
the length of each table aligned with 64bit. Alloc the pages to store
the new created EFI and ACPI tables and free these pages when
destroying domain.
Cc: Jan Beulich
Signed-off-by: Parth Dixit
Signed-off
From: Shannon Zhao
Firstly it permits full MMIO capabilities for Dom0. Then deny MMIO
access of Xen used devices, such as UART, GIC, SMMU. Currently, it only
denies the MMIO access of UART and GIC regions. For other Xen used
devices it could be added later when they are supported.
Signed-off-by:
Add code to support pvusb in domain config file. One could specify
usbctrl and usb in domain's configuration file and create domain,
then usb controllers will be created and usb device would be attached
to guest automatically.
One could specify usb controllers and usb devices in config file
like t
Add pvusb commands: usbctrl-attach, usbctrl-detach, usb-list,
usbdev-attach and usbdev-detach.
To attach a usb device to guest through pvusb, one could follow
following example:
#xl usbctrl-attach test_vm version=1 ports=8
#xl usb-list test_vm
will show the usb controllers and port usage unde
Add pvusb APIs, including:
- attach/detach (create/destroy) virtual usb controller.
- attach/detach usb device
- list usb controller and usb devices
- some other helper functions
Signed-off-by: Simon Cao
Signed-off-by: George Dunlap
Signed-off-by: Chunyan Liu
---
Changes:
* Address George
Add a new function libxl_read_sysfs_file_contents to handle sysfs file
specially. It would be used in later pvusb work.
Signed-off-by: Chunyan Liu
Acked-by: Ian Jackson
---
tools/libxl/libxl_internal.h | 4 +++
tools/libxl/libxl_utils.c| 74
2 f
For some device type, device removal operation needs to be
handled specially, like usbctrl, it needs to remove all usb
devices under it first, then remove usbctrl. Extend
DEFINE_DEVICE_REMOVE to support generic and custom way
For those need to be handled specially, call
DEFINE_DEVICE_REMOVE_CUSTOM,
This patch series is to add pvusb toolstack work, supporting hot add|remove
USB device to|from guest and specify USB device in domain configuration file.
Changes to V15:
* address George's comments (patch 4/6)
V15:
http://lists.xen.org/archives/html/xen-devel/2016-03/msg00040.html
V14:
http://li
Signed-off-by: Chunyan Liu
Signed-off-by: Simon Cao
Reviewed-by: Wei Liu
Acked-by: Ian Jackson
---
tools/libxl/libxl.c | 5 ++---
tools/libxl/libxl_internal.h | 3 +++
2 files changed, 5 insertions(+), 3 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 833fd4
For some device type, device removal operation needs to be
handled specially, like usbctrl, it needs to remove all usb
devices under it first, then remove usbctrl. Extend
DEFINE_DEVICE_REMOVE to support generic and custom way
For those need to be handled specially, call
DEFINE_DEVICE_REMOVE_CUSTOM,
Add a new function libxl_read_sysfs_file_contents to handle sysfs file
specially. It would be used in later pvusb work.
Signed-off-by: Chunyan Liu
Acked-by: Ian Jackson
---
tools/libxl/libxl_internal.h | 4 +++
tools/libxl/libxl_utils.c| 74
2 f
Signed-off-by: Chunyan Liu
Signed-off-by: Simon Cao
Reviewed-by: Wei Liu
Acked-by: Ian Jackson
---
tools/libxl/libxl.c | 5 ++---
tools/libxl/libxl_internal.h | 3 +++
2 files changed, 5 insertions(+), 3 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 833fd4
This patch series is to add pvusb toolstack work, supporting hot add|remove
USB device to|from guest and specify USB device in domain configuration file.
Changes to V15:
* address George's comments (patch 4/6)
V15:
http://lists.xen.org/archives/html/xen-devel/2016-03/msg00040.html
V14:
http://li
flight 85270 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85270/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 85080
Tests which ar
On 2016/3/1 20:49, Stefano Stabellini wrote:
> On Tue, 1 Mar 2016, Jan Beulich wrote:
> > >>> On 01.03.16 at 03:35, wrote:
>> >
>>> > >
>>> > > On 2016/2/29 22:36, Jan Beulich wrote:
>>> > > On 29.02.16 at 15:25, wrote:
>> > >>> > On Mon, 29 Feb 2016, Jan Beulich wrote:
>>
On February 16, 2016 1:08am, wrote:
> On Mon, Feb 15, 2016 at 10:45:48AM -0600, Doug Goldstein wrote:
> > On 2/15/16 10:28 AM, Wei Liu wrote:
> > > On Sun, Feb 14, 2016 at 07:39:35PM +1100, Steven Haigh wrote:
> > >> Hi all,
> > >>
> > >> Just been looking at the polarssl parts in Xen 4.6 and othe
>>> On 3/3/2016 at 05:27 PM, in message
, George
Dunlap wrote:
> On Thu, Mar 3, 2016 at 2:59 AM, Chun Yan Liu wrote:
> On 3/3/2016 at 02:46 AM, in message <56d7350f.7010...@citrix.com>, George
> > Dunlap wrote:
> >> Sorry, just looked through the rest of the series, and there's one mor
>>> On 3/3/2016 at 05:20 PM, in message
, George
Dunlap wrote:
> On Thu, Mar 3, 2016 at 3:11 AM, Chun Yan Liu wrote:
> On 3/3/2016 at 02:32 AM, in message <56d731b1.60...@citrix.com>, George
> Dunlap
> > wrote:
> >> On 01/03/16 08:09, Chunyan Liu wrote:
> >> > +static int usbdev_
On March 04, 2016 7:59am, wrote:
> On Wed, 2016-03-02 at 22:31 +0800, Quan Xu wrote:
> > Signed-off-by: Quan Xu
> >
> So, this patch looks ok to me.
>
> I spotted something, though, that I think needs some attention.
>
> Since I'm jumping on this series only now, if this has been discussed befo
flight 85259 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85259/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 85080
Tests which ar
On 03/02/16 06:03, Jan Beulich wrote:
> >>> On 02.03.16 at 08:14, wrote:
> > It means NVDIMM is very possibly mapped in page granularity, and
> > hypervisor needs per-page data structures like page_info (rather than the
> > range set style nvdimm_pages) to manage those mappings.
> >
> > Then we w
On 03/04/2016 10:01 AM, Yu-An(Victor) Chen wrote:
> Hi,
>
> So I git clone https://github.com/wencongyang/qemu-xen.git
>
> but i only see branch "con-xen-v2" instead of " colo-xen-v2" so I assume I
> use just use con-xen-v2.
>
> But then the following step:
>
> in both ~/qemu-colo and ~/qemu-x
Hi,
So I git clone https://github.com/wencongyang/qemu-xen.git
but i only see branch "con-xen-v2" instead of " colo-xen-v2" so I assume I
use just use con-xen-v2.
But then the following step:
in both ~/qemu-colo and ~/qemu-xen
./configure --enable-xen --target-list=x86_64-softmmu
--extra-cflag
On 2016/3/3 23:44, Stefano Stabellini wrote:
> On Thu, 3 Mar 2016, Shannon Zhao wrote:
>> > From: Shannon Zhao
>> >
>> > While to support ACPI, patch "arm/acpi: Parse GTDT to initialize timer"
>> > refactors the functions preinit_xen_time and init_xen_time. But it
>> > wrongly moves the platfor
flight 85248 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85248/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 85080
Tests which di
This run is configured for baseline tests only.
flight 44214 xen-4.4-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44214/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl 19 guest-start/debian.rep
[Trimmed the Cc-list a bit again]
On Wed, 2016-03-02 at 22:31 +0800, Quan Xu wrote:
> Signed-off-by: Quan Xu
>
> diff --git a/xen/drivers/passthrough/vtd/qinval.c
> b/xen/drivers/passthrough/vtd/qinval.c
> index b81b0bd..882b9f4 100644
> --- a/xen/drivers/passthrough/vtd/qinval.c
> +++ b/xen/dr
[I've removed some of the people that shouldn't be involved in this
discussion any longer from the Cc-list]
On Wed, 2016-03-02 at 22:31 +0800, Quan Xu wrote:
> Signed-off-by: Quan Xu
>
So, this patch looks ok to me.
I spotted something, though, that I think needs some attention.
Since I'm jump
On Thu, Mar 3, 2016 at 2:18 AM, Borislav Petkov wrote:
> On Wed, Mar 02, 2016 at 04:47:38PM -0800, Andy Lutomirski wrote:
>> Because I'm mixing paravirt and cpufeatures a bit oddly.
>
> That's fine. All X86_BUG_* are synthetic and exactly for stuff like
> that.
>
> --
> Regards/Gruss,
> Boris.
flight 85082 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85082/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-i386-xl-qemuu-ovm
flight 85076 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85076/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-vhd 14 guest-start/debian.repeat fail REGR. vs. 84935
Regressions which a
flight 85238 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85238/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 85080
Tests which di
>>> With that said, another thing crossed my mind. Since the DENY flag will
>>> be implemented for ARM w/ the next
>>> revision and the actual write will be done on the scheduler tail,
>>> similarly to X86 ((hvm_do_resume), wouldn't
>>> it be good if we separated the code that checks monitor_write_
flight 85064 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85064/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 11 guest-start fail like 84610
build-i386-rumpuserxen
On 3/3/2016 8:51 PM, Razvan Cojocaru wrote:
On 03/03/2016 08:04 PM, Corneliu ZUZU wrote:
On 3/3/2016 6:15 PM, Razvan Cojocaru wrote:
On 03/03/2016 04:10 PM, Corneliu ZUZU wrote:
Q2) About VM_EVENT_FLAG_DENY
Q2.1)
Doesn't it require sync = 1 (i.e. the vcpu to be paused) to work?
flight 85226 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85226/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 85080
Tests which di
flight 44213 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44213/
Perfect :-)
All tests in this flight passed
baseline version:
flight 38737
jobs:
build-amd64 pass
build-armhf
On Thu, Mar 03, 2016 at 05:18:31PM +, David Vrabel wrote:
> On 03/03/16 17:02, Wei Liu wrote:
> > On Thu, Mar 03, 2016 at 04:47:12PM +, David Vrabel wrote:
> >> On 01/03/16 20:17, Sergei Lebedev wrote:
> >>> Hi list,
> >>>
> >>> I’ve initially wanted to report another inconsistency in
> >>>
Daniel, (added Jan - search for @Jan)
thanks for the feedback
> On 2 Mar 2016, at 22:45, Daniel Izquierdo wrote:
>
> On 01/03/16 18:04, Lars Kurth wrote:
>> Daniel, Jesus,
>>
>> I am going to break my comments down into different sections to make this
>> more consumable. Let's focus on the A1
On 03/03/2016 08:04 PM, Corneliu ZUZU wrote:
> On 3/3/2016 6:15 PM, Razvan Cojocaru wrote:
>> On 03/03/2016 04:10 PM, Corneliu ZUZU wrote:
>>> Q2) About VM_EVENT_FLAG_DENY
>>>
>>>Q2.1)
>>> Doesn't it require sync = 1 (i.e. the vcpu to be paused) to work?
>>> If so, shouldn't we call v
flight 85216 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/85216/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 85080
Tests which di
* Change block-common.sh on Linux to write physical-device-path with
the path of the device node, rather than physical-device with its
major:minor numbers.
* Have the libxl Linux hotplug script scheduler convert this, by
reading physical-device-path and writing physical-device. This
happe
In this series, there are plenty of places where one blob loaded by libxl
to be consume by hvmloader is called acpi_module or acpi_table... where in
fact it is only the DSDT table. I think I'm going to do some renaming to
include "dsdt" into those names.
--
Anthony PERARD
___
On 3/3/2016 6:15 PM, Razvan Cojocaru wrote:
On 03/03/2016 04:10 PM, Corneliu ZUZU wrote:
Q2) About VM_EVENT_FLAG_DENY
Q2.1)
Doesn't it require sync = 1 (i.e. the vcpu to be paused) to work?
If so, shouldn't we call vm_event_register_write_resume only after checking
that VM_EVE
On Tue, Mar 01, 2016 at 09:17:25AM -0700, Jan Beulich wrote:
> >>> On 25.02.16 at 15:56, wrote:
> > --- a/tools/firmware/hvmloader/hvmloader.c
> > +++ b/tools/firmware/hvmloader/hvmloader.c
> > @@ -365,8 +365,26 @@ int main(void)
> >
> > if ( bios->acpi_build_tables )
> > {
> >
On 03/03/16 16:36, Jan Beulich wrote:
> Its return value can easily serve the purpose. We cannot, however,
> return unspecific "success" anymore for a domain of the wrong type -
> since no caller exists that would call this for PV domains, simply add
> an ASSERT().
>
> Signed-off-by: Jan Beulich
On Tue, Mar 01, 2016 at 09:03:42AM -0700, Jan Beulich wrote:
> >>> On 25.02.16 at 15:56, wrote:
> > --- a/tools/firmware/hvmloader/ovmf.c
> > +++ b/tools/firmware/hvmloader/ovmf.c
> > @@ -34,17 +34,10 @@
> > #include
> > #include
> >
> > -#define ROM_INCLUDE_OVMF
> > -#include "roms.inc"
> >
On 03/03/16 16:38, Jan Beulich wrote:
> No intended functional change, albeit it includes ditching a redundant
> is_hvm_domain().
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists
On 03/03/16 16:38, Jan Beulich wrote:
> Make it gfn_t and rename it accordingly.
>
> Suggested-by: Andrew Cooper
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 03/03/16 16:37, Jan Beulich wrote:
> Avoid cache flush on EPT when removing a UC- range, since when used
> this type gets converted to UC anyway (there's no UC- among the types
> valid in MTRRs and hence EPT's emt field).
>
> We might further wwant to consider only forcing write buffer flushes
>
On 03/03/16 16:33, Jan Beulich wrote:
> Call hvm_get_mem_pinned_cacheattr() for RAM ranges only, and only when
> the guest has a physical device assigned: XEN_DOMCTL_pin_mem_cacheattr
> is documented to be intended for RAM only.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
On 03/03/16 16:37, Jan Beulich wrote:
> Make it return an error on bad domain kind or obviously bad GFN range.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 03/03/16 17:02, Wei Liu wrote:
> On Thu, Mar 03, 2016 at 04:47:12PM +, David Vrabel wrote:
>> On 01/03/16 20:17, Sergei Lebedev wrote:
>>> Hi list,
>>>
>>> I’ve initially wanted to report another inconsistency in
>>> ``xen.lowlevel.xs`` documentation, but this time the issue is more
>>> subt
On Tue, Mar 01, 2016 at 11:51:40AM +, Wei Liu wrote:
> On Thu, Feb 25, 2016 at 02:56:03PM +, Anthony PERARD wrote:
> > The path to the BIOS blob can be override by the xl's bios_override option,
> > or provided by u.hvm.bios_firmware in the domain_build_info struct by other
> > libxl user.
On Tue, Mar 01, 2016 at 11:51:43AM +, Wei Liu wrote:
> On Thu, Feb 25, 2016 at 02:56:04PM +, Anthony PERARD wrote:
> > A user can provide a different ACPI tables than the default one by using
> > the existing "acpi_firmware" xl's config option or the field
> > u.hvm.acpi_firmware.
> >
> >
On Thu, Mar 03, 2016 at 04:59:22PM +, Wei Liu wrote:
> On Thu, Mar 03, 2016 at 09:36:19AM -0700, Jan Beulich wrote:
> [...]
> > sflags |= pat_type_2_pte_flags(type);
> > else if ( d->arch.hvm_domain.is_in_uc_mode )
> > sflags |= pat_type_2_pte_flags(PAT_TYPE_U
1 - 100 of 212 matches
Mail list logo