flight 94729 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94729/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-buildfail like 94034
build-i386-rumpuserxen6
On May 18, 2016 4:08 PM, Quan Xu wrote:
> Propagate the IOMMU Device-TLB flush error up to the
> iommu_iotlb_flush{,_all}.
>
> This patch fixes the leaf ones.
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> -static void intel_iommu_iotlb_flush(struct doma
flight 94732 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94732/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REG
flight 94728 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94728/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 94035
build-amd64-rumpuserxen 6
On 5/23/16 10:53 AM, Julien Grall wrote:
> Hi Doug,
>
> On 22/05/16 06:01, Doug Goldstein wrote:
>> diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug
>> index 0678049..303bf36 100644
>> --- a/xen/Kconfig.debug
>> +++ b/xen/Kconfig.debug
>> @@ -27,6 +27,13 @@ config FRAME_POINTER
>> maybe
On Mon, May 23, 2016 at 7:22 AM Julien Grall wrote:
> The ARM errata 819472, 827319 and 824069 define the same workaround for
> these hardware issues in certain Cortex-A53 parts.
>
> The cache instructions "dc cvac" and "dc cvau" need to be upgraded to
> "dc civac".
>
> Use the alternative framew
On 5/23/16 8:19 AM, Konrad Rzeszutek Wilk wrote:
>>
>> +config VERBOSE_DEBUG
>> +bool "Verbose debug messages"
>> +default DEBUG
>> +---help---
>> + Guest output from HYPERVISOR_console_io and hypervisor parsing
>> + ELF images (dom0) is logged in the Xen ring buffer.
>
> i
On 5/23/16 8:22 AM, Konrad Rzeszutek Wilk wrote:
>> +config CRASH_DEBUG
>> +bool "Crash Debugging Support"
>> +depends on X86
>> +---help---
>> + If you want to be able to attach gdb to Xen to be able to debug
>
> s/be able//
>
I'll drop the extra 'to' as well. ;)
"If you want
On 5/23/16 3:39 AM, Jan Beulich wrote:
On 22.05.16 at 21:04, wrote:
>> On 5/22/16 12:01 AM, Doug Goldstein wrote:
>>> --- /dev/null
>>> +++ b/xen/Kconfig.debug
>>> @@ -0,0 +1,13 @@
>>> +
>>> +menu "Debugging Options"
>>> +
>>> +config DEBUG
>>> + bool "Developer Checks"
>>
>> Add the follow
On 5/23/16 8:19 AM, Andrew Cooper wrote:
> On 23/05/16 13:58, Jan Beulich wrote:
> On 22.05.16 at 07:01, wrote:
>>> --- /dev/null
>>> +++ b/xen/Kconfig.debug
>>> @@ -0,0 +1,13 @@
>>> +
>>> +menu "Debugging Options"
>>> +
>>> +config DEBUG
>>> + bool "Developer Checks"
>>> + ---help---
>>>
On May 24, 2016 12:06 AM, Jan Beulich wrote:
> >>> On 18.05.16 at 10:08, wrote:
> > --- a/xen/common/memory.c
> > +++ b/xen/common/memory.c
> > @@ -633,9 +633,9 @@ static long
> memory_exchange(XEN_GUEST_HANDLE_PARAM(xen_memory_exchange_t)
> arg)
> > return rc;
> > }
> >
> > -static int xen
On 5/23/16 7:58 AM, Jan Beulich wrote:
On 22.05.16 at 07:01, wrote:
>> verbose := y
>> frame_pointer := y
>> -else
>> -CFLAGS += -DNDEBUG
>> endif
>> ifeq ($(perfc_arrays),y)
>> perfc := y
>> endif
>>
>> +ifeq ($(origin debug),command line)
>> +$(error "You must use 'make menuc
On Mon, May 23, 2016 at 04:26:37PM -0400, Boris Ostrovsky wrote:
> On 05/21/2016 09:09 AM, Muhammad Falak R Wani wrote:
> > Replace explicit computation of vma page count by a call to
> > vma_pages()
> >
>
> Can you combine all three patches into a single one?
>
> Thanks.
> -boris
>
Sure, I hav
Replace explicit computation of vma page count by a call to
vma_pages().
Signed-off-by: Muhammad Falak R Wani
---
drivers/xen/gntalloc.c | 2 +-
drivers/xen/gntdev.c | 2 +-
drivers/xen/privcmd.c | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/xen/gntalloc.c b/d
flight 94724 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94724/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 94716
test-amd64-i386-xl-qemuu-win
flight 94726 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94726/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REG
On 05/22/2016 02:12 AM, osstest service owner wrote:
> flight 94692 libvirt real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/94692/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-i386-libvirt5 libvir
Good question. I ran my tests again, and found I'd misinterpreted the
Fusion behavior.
On Fusion 8.1.1, MSR_IA32_CR_PAT returns a reasonable value:
(XEN) Freed 308kB init memory.
mapping kernel into physical memory
cpu_has_pat=0 cpuid_edx(1)=f89cbf5 pat=65536
pat_init_cache_modes pat=50100070406
flight 94727 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94727/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 60c809f3621039bb1ac6b4c1947baf5a848814b0
baseline version:
ovmf f6190a01c13a6b4dd01a1765b28964db7dc
flight 94718 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94718/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 94580
Tests wh
flight 94725 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94725/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 05/21/2016 09:09 AM, Muhammad Falak R Wani wrote:
> Replace explicit computation of vma page count by a call to
> vma_pages()
>
> Signed-off-by: Muhammad Falak R Wani
> ---
> drivers/xen/privcmd.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/drivers/xen/privcmd.c b/
On 23/05/2016 16:47, Dirk Behme wrote:
Hello,
Hello Dirk,
is there a solution for
arm: domain 0 disables clocks which are in fact being used
http://bugs.xenproject.org/xen/bug/45
?
On an ARM based board I have to use 'clk_ignore_unused' preventing that
Dom0 disables the UART clock for th
On 05/23/2016 10:15 AM, Konrad Rzeszutek Wilk wrote:
> On Fri, May 20, 2016 at 04:58:09PM -0700, Ed Swierk wrote:
>> (XEN) traps.c:459:d0v0 Unhandled invalid opcode fault/trap [#6] on VCPU 0
>> [ec=]
>> (XEN) domain_crash_sync called from entry.S: fault at 82d0802286c3
>> create_bounce_fr
flight 94722 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94722/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REG
flight 94723 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94723/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
flight 94716 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94716/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 94625
test-amd64-i386-xl-qemuu-win
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2014-3672 / XSA-180
Unrestricted qemu logging
ISSUE DESCRIPTION
=
When the libxl toolstack launches qemu for HVM guests, it pipes the
output of stderr to a file in /var/log
On Thu, May 19, Iurii Mykhalskyi wrote:
> +flexarray_append(back, "state");
> +flexarray_append(back, GCSPRINTF("%d", 1));
This should use the enum values instead of hardcoded "1", see the other
users of "state" in staging.
Olaf
___
Xen-devel
Hi, Konrad
It's not same. I am attaching a macro as below.
#define SET_NETDEV_DEV(net, pdev) ((net)->dev.parent = (pdev))
So that's why I was setting the dma mask to ndev.
Thanks,
Wonseok Ko
Thanks,
Wonseok.
2016-05-18 6:10 GMT+09:00 Konrad Rzeszutek Wilk :
> On Fri, Apr 15, 2016 at 12
>>> On 18.05.16 at 10:08, wrote:
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -633,9 +633,9 @@ static long
> memory_exchange(XEN_GUEST_HANDLE_PARAM(xen_memory_exchange_t) arg)
> return rc;
> }
>
> -static int xenmem_add_to_physmap(struct domain *d,
> -
On 05/23/2016 11:34 AM, Jan Beulich wrote:
On 23.05.16 at 16:51, wrote:
--- a/xen/xsm/flask/Makefile
+++ b/xen/xsm/flask/Makefile
@@ -27,6 +27,27 @@ $(FLASK_H_FILES): $(FLASK_H_DEPEND)
$(AV_H_FILES): $(AV_H_DEPEND)
$(CONFIG_SHELL) policy/mkaccess_vector.sh $(AWK) $(AV_H_DEPEND)
+obj-
>>> On 18.05.16 at 10:08, wrote:
> Propagate the IOMMU Device-TLB flush error up to IOMMU mapping.
Btw - there's little reason to repeat the title here.
> @@ -295,12 +297,23 @@ static void __hwdom_init amd_iommu_hwdom_init(struct
> domain *d)
> * a pfn_valid() check would seem des
Hi Doug,
On 22/05/16 06:01, Doug Goldstein wrote:
diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug
index 0678049..303bf36 100644
--- a/xen/Kconfig.debug
+++ b/xen/Kconfig.debug
@@ -27,6 +27,13 @@ config FRAME_POINTER
maybe slower, but it gives very useful debugging information
Wei Liu writes ("Re: [PATCH] libxl: Do not warn about non existing user for the
device model"):
> I would say it is OK to have some WIP options to go undocumented --
> because you don't want users to use them anyway.
I agree.
> Another way is to state explicitly in manpage that people should not
Hello,
is there a solution for
arm: domain 0 disables clocks which are in fact being used
http://bugs.xenproject.org/xen/bug/45
?
On an ARM based board I have to use 'clk_ignore_unused' preventing
that Dom0 disables the UART clock for the console UART configured with
console=hvc0.
Best reg
flight 94721 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94721/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
>>> On 23.05.16 at 17:22, wrote:
> On May 23, 2016 9:31 PM, Jan Beulich wrote:
>> >>> On 18.05.16 at 10:08, wrote:
>> > --- a/xen/drivers/passthrough/vtd/iommu.c
>> > +++ b/xen/drivers/passthrough/vtd/iommu.c
>> > @@ -557,14 +557,16 @@ static void iommu_flush_all(void)
>> > }
>> > }
>> >
>
On Mon, May 23, 2016 at 04:13:53PM +0100, Julien Grall wrote:
> Hi Edgar,
>
> On 23/05/16 15:02, Edgar E. Iglesias wrote:
> >On Mon, May 23, 2016 at 02:02:39PM +0100, Julien Grall wrote:
> >>(CC Wei Liu)
> >>
> >>On 23/05/16 12:56, Edgar E. Iglesias wrote:
> >>>On Mon, May 23, 2016 at 11:29:31AM +
>>> On 23.05.16 at 16:51, wrote:
> --- a/xen/xsm/flask/Makefile
> +++ b/xen/xsm/flask/Makefile
> @@ -27,6 +27,27 @@ $(FLASK_H_FILES): $(FLASK_H_DEPEND)
> $(AV_H_FILES): $(AV_H_DEPEND)
> $(CONFIG_SHELL) policy/mkaccess_vector.sh $(AWK) $(AV_H_DEPEND)
>
> +obj-y += policy.o
> +
> +ifeq ($(X
On 05/23/2016 11:25 AM, Andrew Cooper wrote:
On 23/05/16 15:51, Daniel De Graaf wrote:
diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c
index 634ec98..af1d86f 100644
--- a/xen/xsm/xsm_core.c
+++ b/xen/xsm/xsm_core.c
@@ -47,6 +47,17 @@ static void __init do_xsm_initcalls(void)
}
}
+e
Hi Edgar,
On 20/05/16 16:51, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
Create a helper function to map regions as MEMORY with
cached attributes and read-write-execute permissions.
Providing setting the execute bit is useful, I would try to rationalize
the helpers by expanding map_r
On 23/05/16 15:51, Daniel De Graaf wrote:
> diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c
> index 634ec98..af1d86f 100644
> --- a/xen/xsm/xsm_core.c
> +++ b/xen/xsm/xsm_core.c
> @@ -47,6 +47,17 @@ static void __init do_xsm_initcalls(void)
> }
> }
>
> +extern char __xsm_init_policy_st
On May 23, 2016 9:31 PM, Jan Beulich wrote:
> >>> On 18.05.16 at 10:08, wrote:
> > --- a/xen/drivers/passthrough/vtd/iommu.c
> > +++ b/xen/drivers/passthrough/vtd/iommu.c
> > @@ -557,14 +557,16 @@ static void iommu_flush_all(void)
> > }
> > }
> >
> > -static void __intel_iommu_iotlb_flush(s
Hi Edgar,
On 23/05/16 15:02, Edgar E. Iglesias wrote:
On Mon, May 23, 2016 at 02:02:39PM +0100, Julien Grall wrote:
(CC Wei Liu)
On 23/05/16 12:56, Edgar E. Iglesias wrote:
On Mon, May 23, 2016 at 11:29:31AM +0100, Julien Grall wrote:
On 20/05/16 16:51, Edgar E. Iglesias wrote:
From: "Edgar
On Mon, May 23, 2016 at 10:51:29AM -0400, Daniel De Graaf wrote:
> This includes the policy in tools/flask/policy in the hypervisor so that
> the bootloader does not need to load a policy to get sane behavior from
> an XSM-enabled hypervisor.
>
> RFC because this adds a binding between xen's build
This makes it easier to enable or disable parts of the XSM policy.
Signed-off-by: Daniel De Graaf
---
tools/flask/policy/Makefile| 22 +-
tools/flask/policy/modules/default_role.te | 8 +
tools/flask/policy/modules/dom0.te | 74 ++
tools/fl
Signed-off-by: Daniel De Graaf
---
.../policy/policy/support/loadable_module.spt | 166 -
tools/flask/policy/policy/support/misc_macros.spt | 2 +
2 files changed, 2 insertions(+), 166 deletions(-)
delete mode 100644 tools/flask/policy/policy/support/loadable_module.s
The most important patch is the first one, which splits up the XSM
policy into multiple files that can be enabled/disabled to adjust the
policy. The others are just general cleanup of the policy build and a
better xenstore example.
[PATCH 1/5] flask/policy: split into modules
[PATCH 2/5] flask/po
Signed-off-by: Daniel De Graaf
---
tools/flask/policy/policy/access_vectors | 32 +++---
tools/flask/policy/policy/security_classes | 2 +-
2 files changed, 17 insertions(+), 17 deletions(-)
diff --git a/tools/flask/policy/policy/access_vectors
b/tools/flask/policy/po
This also renames the example users created by vm_role.
Signed-off-by: Daniel De Graaf
---
docs/misc/xsm-flask.txt| 34 +++---
tools/flask/policy/Makefile| 9 --
tools/flask/policy/modules/default_role.te | 5
This adds the xenstore_t type to the example policy for use by a
xenstore stub domain.
Signed-off-by: Daniel De Graaf
---
tools/flask/policy/modules/modules.conf | 3 +++
tools/flask/policy/modules/xenstore.te | 21 +
2 files changed, 24 insertions(+)
create mode 100644 to
This includes the policy in tools/flask/policy in the hypervisor so that
the bootloader does not need to load a policy to get sane behavior from
an XSM-enabled hypervisor.
RFC because this adds a binding between xen's build and the tools build.
The inclusion of policy.o could be made conditional o
On 05/17/2016 05:08 PM, Konrad Rzeszutek Wilk wrote:
On Tue, Apr 26, 2016 at 09:57:12AM +0100, Lars Kurth wrote:
Also adding Steve Maresca to the thread, who has been using XSM extensively and
also documenting XSM and can provide some user perspective
Lars
On 25 Apr 2016, at 20:51, Daniel De
On Mon, 2016-05-23 at 13:32 +, Wu, Feng wrote:
>
> > > --- a/xen/arch/x86/hvm/vmx/vmx.c
> > > +++ b/xen/arch/x86/hvm/vmx/vmx.c
> > > @@ -248,6 +248,36 @@ void vmx_pi_hooks_deassign(struct domain *d)
> > > d->arch.hvm_domain.vmx.pi_switch_to = NULL;
> > > }
> > >
> > > +static void vmx_p
On 23/05/16 15:17, Julien Grall wrote:
> The new document will help to keep track of all the erratum that Xen is
> able to handle.
Just a grammar nit (which most native English speakers get wrong, given
its Latin roots)
An erratum, or Many errata.
In this case, I would suggest "... to keep track
>>> On 18.05.16 at 10:08, wrote:
> --- a/xen/arch/x86/mm.c
> +++ b/xen/arch/x86/mm.c
> @@ -2463,11 +2463,12 @@ static int __put_page_type(struct page_info *page,
> }
>
>
> -static int __get_page_type(struct page_info *page, unsigned long type,
> - int preemptible)
>
The header asm-arm/page.h makes use of the macro dsb defined in the header
asm-arm/system.h. Currently, the includer has to specify both of them.
This can be avoided by including asm-arm/system.h in asm-arm/page.h.
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v2:
The ARM erratum 832075 applies to certain revisions of Cortex-A57, one
of the workarounds is to change device loads into using load-acquire
semantics.
Use the alternative framework to enable the workaround only on affected
cores.
Whilst a guest could trigger the deadlock, it can be broken when th
The ARM erratum applies to certain revisions of Cortex-A57. The
processor may report a Stage 2 translation fault as the result of
Stage 1 fault for load crossing a page boundary when there is a
permission fault or device memory fault at stage 1 and a translation
fault at Stage 2.
So Xen needs to c
Hello,
Some of the processor erratum will require to modify code sequence. As those
modifications may impact the performance, they should only be enabled on
affected cores. Furthermore, Xen may also want to take advantage of new
hardware features coming up with v8.1 and v8.2.
The first part of th
The new document will help to keep track of all the erratum that Xen is
able to handle.
The text is based on the Linux doc in Documents/arm64/silicon-errata.txt.
Also list the current errata that Xen is aware of.
Signed-off-by: Julien Grall
---
docs/misc/arm/silicon-errata.txt | 45 +++
Based on ARM ARM (D4.5.3 in ARM DDI 0486A and B3.12.7 in ARM DDI 0406C.c),
a Stage 1 translation error has priority over a Stage 2 translation error.
Therefore gva_to_ipa can only fail if another vCPU is playing with the
page table.
Rather than injecting a custom fault, replay the instruction and
Add new macros to easily get different parts of the register and to
check if a given MIDR match a CPU model range. The latter will be really
useful to handle errata later.
The macros have been imported from the header
arch/arm64/include/asm/cputype.h in Linux v4.6-rc3.
Also remove MIDR_MASK which
The ARM errata 819472, 827319 and 824069 define the same workaround for
these hardware issues in certain Cortex-A53 parts.
The cache instructions "dc cvac" and "dc cvau" need to be upgraded to
"dc civac".
Use the alternative framework to replace those instructions only on
affected cores.
Whilst
After each CPU has been started, we iterate through a list of CPU
errata to detect CPUs which need from hypervisor code patches.
For each bug there is a function which check if that a particular CPU is
affected. This needs to be done on every CPUs to cover heterogenous
system properly.
If a certa
Some of the processor erratum will require to modify code sequence.
As those modifications may impact the performance, they should only
be enabled on affected cores. Furthermore, Xen may also want to take
advantage of new hardware features coming up with v8.1 and v8.2.
This patch adds an infrastru
It may not possible to return a proper error when encoding an
instruction. Instead, a handcrafted instruction will be returned.
Also, provide the encoding for the faulting instruction.
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's acked
We may need to update branch instruction when patching Xen.
The code has been imported from the files arch/arm64/kernel/insn.c
and arch/arm64/include/asm/insn.h in Linux v4.6.
Note that only the necessary helpers have been imported.
Signed-off-by: Julien Grall
---
Changes in v2:
-
This will be used to know if a feature, which Xen cares, is available accross
all the CPUs.
This code is a light version of arch/arm64/kernel/cpufeature.c from
Linux v4.6-rc3.
Signed-off-by: Julien Grall
---
xen/arch/arm/Makefile| 1 +
xen/arch/arm/cpufeature.c| 34
New immediates will be defined in the future. To keep track of the
immediates allocated, gather all of them in a separate header.
Also rename BRK_BUG_FRAME to BKR_BUG_FRAME_IMM.
Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's reviewed-
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's acked-by
---
xen/include/asm-arm/arm64/page.h | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/include/asm-arm/arm64/page.h b/xen/include/asm-arm/arm64/page.h
index 29a32cf..fbdc
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's acked-by
---
xen/arch/arm/Makefile | 38 --
xen/arch/arm/arm32/Makefile | 9 -
xen/arch/arm/arm64/Makefile | 12 +---
xe
On Fri, May 20, 2016 at 04:58:09PM -0700, Ed Swierk wrote:
> I've encountered two problems booting a Linux 4.4 dom0 on recent
> stable xen 4.5 on VMware ESXi 5.5.0.
>
> One has the same "ata_piix: probe of :00:07.1 failed with error
> -22" symptom discussed some time ago, and prevents the kern
On Mon, May 23, 2016 at 03:09:17PM +0100, Anthony PERARD wrote:
> On Mon, May 23, 2016 at 12:57:26PM +0100, Wei Liu wrote:
> > On Mon, May 23, 2016 at 12:35:02PM +0100, Anthony PERARD wrote:
> > > Running QEMU as non-root user is not ready yet, so avoid avertising it
> > > with a warning.
> > >
>
flight 94717 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94717/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REG
On Mon, May 23, 2016 at 12:57:26PM +0100, Wei Liu wrote:
> On Mon, May 23, 2016 at 12:35:02PM +0100, Anthony PERARD wrote:
> > Running QEMU as non-root user is not ready yet, so avoid avertising it
> > with a warning.
> >
> > Also improve the doc to include more potential issue with running QEMU
>
On Mon, May 23, 2016 at 02:02:39PM +0100, Julien Grall wrote:
> (CC Wei Liu)
>
> On 23/05/16 12:56, Edgar E. Iglesias wrote:
> >On Mon, May 23, 2016 at 11:29:31AM +0100, Julien Grall wrote:
> >>On 20/05/16 16:51, Edgar E. Iglesias wrote:
> >>>From: "Edgar E. Iglesias"
> >>>
> >>>This series adds
On May 20, 2016 5:59 PM, Jan Beulich wrote:
> >>> On 20.05.16 at 09:15, wrote:
> > On May 17, 2016 10:00 PM, Jan Beulich wrote:
> >> >>> On 22.04.16 at 12:54, wrote:
> >> > --- a/xen/drivers/passthrough/vtd/qinval.c
> >> > +++ b/xen/drivers/passthrough/vtd/qinval.c
> >> > @@ -206,10 +206,71 @@
flight 94719 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94719/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf f6190a01c13a6b4dd01a1765b28964db7dc58e35
baseline version:
ovmf edddb945519cf71c048e82a2f009db3e1e7
Hi Stefano,
On 21/05/16 15:51, Stefano Stabellini wrote:
On Sat, 21 May 2016, Stefano Stabellini wrote:
On Thu, 5 May 2016, Julien Grall wrote:
Based on ARM ARM (D4.5.3 in ARM DDI 0486A and B3.12.7 in ARM DDI 0406C.c),
a Stage 1 translation error has priority over a Stage 2 translation error.
On Fri, May 20, 2016 at 09:52:40AM -0400, Boris Ostrovsky wrote:
> Recent changes in ACPICA (specifically, Linux commit 66b1ed5aa8dd ("ACPICA:
> ACPI 2.0, Hardware: Add access_width/bit_offset support for
> acpi_hw_write()") result in guests issuing 32-bit accesses to IO space.
>
> QEMU needs to b
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 8:47 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
>>> On 18.05.16 at 10:08, wrote:
> No spamming can occur.
May I suggest "No spamming of the log can occur", to set some
context for what follows?
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -240,21 +240,49 @@ int iommu_map_page(struct domain *d, unsigned
Hello Stefano,
On 21/05/16 15:40, Stefano Stabellini wrote:
On Thu, 5 May 2016, Julien Grall wrote:
+ bool "Cortex-A53: 819472: Store exclusive instructions might cause data
corruption"
+ default y
+ depends on ARM_64
+ help
+ This option adds an alternative cod
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 8:36 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Monday, May 23, 2016 8:31 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: k...@xen.org; Tian, Kevin ; jbeul...@suse.com;
> andrew.coop...@citrix.com; george.dun...@eu.citrix.com;
> konrad.w...@oracle.
On Mon, May 23, 2016 at 11:59:10AM +0100, Andrew Cooper wrote:
> On 23/05/16 11:47, Wei Liu wrote:
> > On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki wrote:
> >> Hi,
> >>
> >> According to xl.cfg(5) " This option defaults to true (1) if any PCI
> >> passthrough devices are con
>>> On 18.05.16 at 10:08, wrote:
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -557,14 +557,16 @@ static void iommu_flush_all(void)
> }
> }
>
> -static void __intel_iommu_iotlb_flush(struct domain *d, unsigned long gfn,
> -int dma_old_
On Sun, May 22, 2016 at 12:33:23PM +0100, Andrew Cooper wrote:
> On 22/05/16 06:01, Doug Goldstein wrote:
> > This converts the debug options from xen/Rules.mk to Kconfig. Hopefully
> > I haven't missed anything in the back and forth.
> >
> > change since v3:
> > - wrap all options in 'if DEBUG ||
> +config PERF_COUNTERS
> + bool "Performance Counters"
> + ---help---
> + Enables software performance counters that allows you to analyze
> + bottlenecks in the system. To access this data you must use the
> + 'xenperf' tool.
I would reword this as :
"To access this da
> +config CRASH_DEBUG
> + bool "Crash Debugging Support"
> + depends on X86
> + ---help---
> + If you want to be able to attach gdb to Xen to be able to debug
s/be able//
> + Xen if it crashes then say Y.
> +
___
Xen-devel maili
>
> +config VERBOSE_DEBUG
> + bool "Verbose debug messages"
> + default DEBUG
> + ---help---
> + Guest output from HYPERVISOR_console_io and hypervisor parsing
> + ELF images (dom0) is logged in the Xen ring buffer.
is logged?
or will be logged?
___
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 8:31 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
On 23/05/16 13:58, Jan Beulich wrote:
On 22.05.16 at 07:01, wrote:
>> --- /dev/null
>> +++ b/xen/Kconfig.debug
>> @@ -0,0 +1,13 @@
>> +
>> +menu "Debugging Options"
>> +
>> +config DEBUG
>> +bool "Developer Checks"
>> +---help---
>> + Enables developer checks such as asserts and
On Mon, May 23, 2016 at 01:27:31PM +0200, Marek Marczykowski-Górecki wrote:
> On Mon, May 23, 2016 at 11:59:10AM +0100, Andrew Cooper wrote:
> > On 23/05/16 11:47, Wei Liu wrote:
> > > On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki
> > > wrote:
> > >> Hi,
> > >>
> > >> Accord
>>> On 22.05.16 at 07:01, wrote:
> This converts the debug options from xen/Rules.mk to Kconfig. Hopefully
> I haven't missed anything in the back and forth.
>
> change since v3:
> - wrap all options in 'if DEBUG || EXPERT' (except DEBUG)
> - wording update to DEBUG option and some commit message
From: Juergen Gross
Add a Xenstore directory for each supported pv backend. This will allow
Xen tools to decide which backend type to use in case there are
multiple possibilities.
The information is added under
/local/domain//device-model//backends
before the "running" state is written to Xensto
From: Juergen Gross
Introduce a new dummy system device serving as parent for virtual
buses. This will enable new pv backends to introduce virtual buses
which are removable again opposed to system buses which are meant
to stay once added.
Signed-off-by: Juergen Gross
Acked-by: Anthony PERARD
R
From: Juergen Gross
Add a backend for para-virtualized USB devices for xen domains.
The backend is using host-libusb to forward USB requests from a
domain via libusb to the real device(s) passed through.
Signed-off-by: Juergen Gross
Acked-by: Anthony PERARD
Message-id: 1463062421-613-4-git-se
1 - 100 of 159 matches
Mail list logo