>>> On 08.07.16 at 08:39, wrote:
> From: Quan Xu
>
> these patches fix current timeout concern and also allow limited ATS
> support.
>
> these patches are the rest ones:
> 1. move the domain crash logic up to the generic IOMMU layer
>
> 2. If Device-TLB flush timed out, we hide the target ATS
Hi,
On 06.07.2016 03:34, Michael Turquette wrote:
Hi!
Quoting Dirk Behme (2016-06-30 03:32:32)
Some clocks might be used by the Xen hypervisor and not by the Linux
kernel. If these are not registered by the Linux kernel, they might be
disabled by clk_disable_unused() as the kernel doesn't know
From: Quan Xu
If Device-TLB flush timed out, we hide the target ATS device
immediately. By hiding the device, we make sure it can't be
assigned to any domain any longer (see device_assigned).
Signed-off-by: Quan Xu
Signed-off-by: Jan Beulich
---
v15: Re-base on heavily changed patch 1. Call di
From: Quan Xu
Add domain crash logic to the generic IOMMU layer to benefit
all platforms.
No spamming of the log can occur. For DomU, we avoid logging any
message for already dying domains. For Dom0, that'll still be more
verbose than we'd really like, but it at least wouldn't outright
flood the
From: Quan Xu
Do away with struct pci_ats_dev; integrate the few bits of information
in struct pci_dev (and as a result drop get_ats_device() altogether).
Hook ATS devices onto a linked list off of each IOMMU instead of on a
global one.
Signed-off-by: Quan Xu
Signed-off-by: Jan Beulich
---
v1
From: Quan Xu
these patches fix current timeout concern and also allow limited ATS support.
these patches are the rest ones:
1. move the domain crash logic up to the generic IOMMU layer
2. If Device-TLB flush timed out, we hide the target ATS device
immediately. By hiding the device, we make
flight 96769 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96769/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-buildfail like 96756
build-i386-rumpuserxen
On 08.07.2016 04:50, Michael Turquette wrote:
Quoting Dirk Behme (2016-07-07 00:32:34)
Hi Michael,
On 06.07.2016 22:42, Michael Turquette wrote:
Hi Julien,
Quoting Julien Grall (2016-07-06 06:10:52)
On 06/07/16 02:34, Michael Turquette wrote:
Hi!
Hello Michael,
Quoting Dirk Behme (2016-
On 2016/7/8 0:57, Julien Grall wrote:
> On 07/07/16 17:15, Wei Liu wrote:
>> On Tue, Jul 05, 2016 at 11:12:47AM +0800, Shannon Zhao wrote:
>>> From: Shannon Zhao
>>>
>>> The guest kernel will get the event channel interrupt information via
>>> domain param HVM_PARAM_CALLBACK_IRQ. Initialize it h
On 2016/7/8 6:43, Boris Ostrovsky wrote:
>> +calculate_checksum(rsdp, offsetof(struct acpi_table_rsdp, checksum),
>> > + acpitables[RSDP].size);
> Should this be extended_checksum? checksum is for ACPI v1 (and thus for
> smaller size structure, with only RSDT pointer).
A
Quoting Dirk Behme (2016-07-07 00:32:34)
> Hi Michael,
>
> On 06.07.2016 22:42, Michael Turquette wrote:
> > Hi Julien,
> >
> > Quoting Julien Grall (2016-07-06 06:10:52)
> >> On 06/07/16 02:34, Michael Turquette wrote:
> >>> Hi!
> >>
> >> Hello Michael,
> >>
> >>> Quoting Dirk Behme (2016-06-30 0
This patch implements sending notification to a monitor subscriber when an
x86/vmx guest executes the CPUID instruction.
Signed-off-by: Tamas K Lengyel
---
Cc: Ian Jackson
Cc: Wei Liu
Cc: Razvan Cojocaru
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Jun Nakajima
Cc: Kevin Tian
---
tools/libxc/inc
flight 96765 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96765/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 15 guest-start/debian.repeat fail REGR. vs. 96732
Regressions which a
On Wed, Jul 6, 2016 at 9:54 AM, Corneliu ZUZU wrote:
> Minor fixes:
>
> * vm_event_register_write_resume: ASSERT on non-NULL v->arch.vm_event instead
> of
> &v->arch.vm_event->write_data.
> * add 'unlikely' in if
>
> Signed-off-by: Corneliu ZUZU
Acked-by: Tamas K Lengyel
___
On 07/04/2016 11:12 PM, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Construct ACPI RSDP table and add a helper to calculate the ACPI table
> checksum.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/libxl_arm_acpi.c | 35 +++
> 1 file changed, 35 insertions(+
flight 96762 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96762/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
flight 96767 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96767/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 96501
Tests which did not succeed, but a
flight 96770 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96770/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On Thu, 7 Jul 2016, Julien Grall wrote:
> The function flush_tlb is called to invalidate the TLBs for the current
> domain when the stage-2 page tables are modified.
>
> On ARMv8, the instruction "tlbi vmalle1is" (resp. "tlbi vmalle1") will
> invalidate stage 1 entries associated to the current VM
The function flush_tlb is called to invalidate the TLBs for the current
domain when the stage-2 page tables are modified.
On ARMv8, the instruction "tlbi vmalle1is" (resp. "tlbi vmalle1") will
invalidate stage 1 entries associated to the current VMID (see D4-1811 in
ARM DDI 0487A.j).
Given that a
ts-* scripts can now create `substeps'. For the purposes of
archaeology etc., a substep is just like a step. But it does
correspond to a single specific ts-* invocation.
Instead, it is started and finished explicitly as required.
The whole job implementation code needs to explicitly assign a un
This is a simple test case for substeps.
Signed-off-by: Ian Jackson
CC: Wei Liu
---
make-flight-substep-test | 14 ++
sg-run-job | 7 +++
2 files changed, 21 insertions(+)
create mode 100755 make-flight-substep-test
diff --git a/make-flight-substep-test b/make-f
On Thu, 7 Jul 2016, Julien Grall wrote:
> The function flush_tlb is called to invalidate the TLBs for the current
> domain when the stage-2 page tables are modified.
>
> On ARMv8, the instruction "tlbi vmalle1is" (resp. "tlbi vmalle1") will
> invalidate stage 1 entries associated to the current VM
flight 96756 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96756/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-xsm 6 xen-boot fail in 96739 pass in 96756
test-amd64-amd64-xl-rtds 6 xe
On 07/07/2016 01:15 PM, Wei Liu wrote:
> On Thu, Jul 07, 2016 at 01:09:28PM -0400, Boris Ostrovsky wrote:
>> On 07/07/2016 12:58 PM, Ian Jackson wrote:
>>> There are two serious problems with this.
>>>
>>> 1. You have dropped the copyright attribution to Intel and Xensource.
>>>
>>> 2. You have cha
On 05/07/16 21:21, Sergej Proskurin wrote:
On 07/05/2016 05:37 PM, Julien Grall wrote:
When altp2m is active, the hostp2m is not used. All changes are applied
directly to the individual altp2m views. As far as I know, the only
situations, where a mapping is removed from a specific p2m view is
Alright,
it appears we are at an impasse here. Not hosting the code on xenbits as
suggested by David, seems to be the worst solution and will benefit
no-one.
> If we can't get consensus on something like this, the sensible thing
> to do would be to vote. Our governance docs don't really cope wit
On Thu, Jul 07, 2016 at 01:02:12PM -0400, Boris Ostrovsky wrote:
> On 07/07/2016 12:47 PM, Wei Liu wrote:
> > On Tue, Jul 05, 2016 at 03:05:18PM -0400, Boris Ostrovsky wrote:
> >>
> >> @@ -1006,10 +1009,21 @@ int libxl__build_hvm(libxl__gc *gc, uint32_t domid,
> >> dom->target_pages = me
On Thu, Jul 07, 2016 at 01:09:28PM -0400, Boris Ostrovsky wrote:
> On 07/07/2016 12:58 PM, Ian Jackson wrote:
> >
> > There are two serious problems with this.
> >
> > 1. You have dropped the copyright attribution to Intel and Xensource.
> >
> > 2. You have changed the licence to BSD-style, even th
This run is configured for baseline tests only.
flight 66529 xen-unstable running [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66529/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpus
This run is configured for baseline tests only.
flight 66530 qemu-mainline running [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66530/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt
On 07/07/2016 12:58 PM, Ian Jackson wrote:
>
> There are two serious problems with this.
>
> 1. You have dropped the copyright attribution to Intel and Xensource.
>
> 2. You have changed the licence to BSD-style, even though the original
>was GPLv2-only.
I meant this to be a GPLv2 license. An
On 07/07/2016 12:47 PM, Wei Liu wrote:
> On Tue, Jul 05, 2016 at 03:05:18PM -0400, Boris Ostrovsky wrote:
>>
>> @@ -1006,10 +1009,21 @@ int libxl__build_hvm(libxl__gc *gc, uint32_t domid,
>> dom->target_pages = mem_size >> XC_PAGE_SHIFT;
>> if (dom->mmio_size == 0 && device_model)
>
Boris Ostrovsky writes ("[PATCH v1 02/20] acpi/hvmloader: Move acpi_info
initialization out of ACPI code"):
> acpi_info can be initialized by hvmloader itself. Now ACPI code
> doesn't need to use hvmloader-private variables/routines such as
> uart_exists(), lpt_exists() etc.
...
> Signed-off-by: B
Hi Wei,
On 07/07/16 17:15, Wei Liu wrote:
On Tue, Jul 05, 2016 at 11:12:47AM +0800, Shannon Zhao wrote:
From: Shannon Zhao
The guest kernel will get the event channel interrupt information via
domain param HVM_PARAM_CALLBACK_IRQ. Initialize it here.
Signed-off-by: Shannon Zhao
---
tools/l
On Tue, 2016-06-21 at 11:42 +0100, David Vrabel wrote:
> On 18/06/16 00:13, Dario Faggioli wrote:
> >
> > because it is cheaper, and there is no much point in
> > randomizing which cpu gets selected anyway, as such
> > choice will be overridden shortly after, in runq_tickle().
> >
> > If we reall
On Tue, Jul 05, 2016 at 03:05:18PM -0400, Boris Ostrovsky wrote:
> Signed-off-by: Boris Ostrovsky
> ---
>
> New patch
>
> tools/libxl/Makefile|2 ++
> tools/libxl/libxl_dom.c | 22 ++
> 2 files changed, 20 insertions(+), 4 deletions(-)
>
> diff --git a/tools/libxl
Hi Wei,
On 07/07/16 17:11, Wei Liu wrote:
On Tue, Jul 05, 2016 at 11:12:41AM +0800, Shannon Zhao wrote:
From: Shannon Zhao
According to the GIC version, construct the MADT table.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 83
On Thu, 2016-07-07 at 16:17 +0100, George Dunlap wrote:
> On Sat, Jun 18, 2016 at 12:12 AM, Dario Faggioli
> wrote:
> > @@ -680,8 +677,8 @@ __update_svc_load(const struct scheduler *ops,
> > delta = now - svc->load_last_update;
> > if ( unlikely(delta < 0) )
> > {
> > -
Hi Wei,
On 07/07/16 17:07, Wei Liu wrote:
On Tue, Jul 05, 2016 at 11:12:36AM +0800, Shannon Zhao wrote:
int libxl__prepare_acpi(libxl__gc *gc, libxl_domain_build_info *info,
libxl__domain_build_state *state,
struct xc_dom_image *dom)
{
On 07/07/16 16:36, Daniel De Graaf wrote:
On 07/06/2016 12:19 PM, anshul makkar wrote:
On 06/07/16 16:59, Daniel De Graaf wrote:
On 07/06/2016 11:34 AM, anshul makkar wrote:
Hi,
It allows the resource to be added and removed by the source domain to
target domain, but its use by target domain
On Mon, Jul 04, 2016 at 01:45:45PM +0200, Sergej Proskurin wrote:
> The current implementation allows to set the parameter HVM_PARAM_ALTP2M.
> This parameter allows further usage of altp2m on ARM. For this, we
> define an additional altp2m field for PV domains as part of the
> libxl_domain_type str
On Thu, Jul 07, 2016 at 12:12:48PM -0400, Boris Ostrovsky wrote:
> On 07/07/2016 12:06 PM, Julien Grall wrote:
> >
> >
> > On 07/07/16 16:48, Boris Ostrovsky wrote:
> >> On 07/07/2016 11:41 AM, Wei Liu wrote:
> >>> On Tue, Jul 05, 2016 at 11:12:31AM +0800, Shannon Zhao wrote:
> From: Shannon Z
On Wed, Jul 06, 2016 at 09:31:38AM +0200, Juergen Gross wrote:
> While testing some patches for support of ballooning in Mini-OS by using
> the xenstore domain I realized that each xl create/destroy pair would
> increase memory consumption in Mini-OS by about 5kB. Wondering whether
> this is a xens
On Tue, Jul 05, 2016 at 11:12:47AM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> The guest kernel will get the event channel interrupt information via
> domain param HVM_PARAM_CALLBACK_IRQ. Initialize it here.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/libxl_arm.c | 11 +
On 07/07/16 17:12, Boris Ostrovsky wrote:
On 07/07/2016 12:06 PM, Julien Grall wrote:
On 07/07/16 16:48, Boris Ostrovsky wrote:
On 07/07/2016 11:41 AM, Wei Liu wrote:
On Tue, Jul 05, 2016 at 11:12:31AM +0800, Shannon Zhao wrote:
From: Shannon Zhao
Factor out codes for generating DTB to
On 07/07/2016 12:06 PM, Julien Grall wrote:
>
>
> On 07/07/16 16:48, Boris Ostrovsky wrote:
>> On 07/07/2016 11:41 AM, Wei Liu wrote:
>>> On Tue, Jul 05, 2016 at 11:12:31AM +0800, Shannon Zhao wrote:
From: Shannon Zhao
Factor out codes for generating DTB to prepare for adding ACPI t
On Tue, Jul 05, 2016 at 11:12:41AM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> According to the GIC version, construct the MADT table.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/libxl_arm_acpi.c | 83
>
> 1 file changed, 83 inserti
On Thu, Jul 07, 2016 at 05:06:11PM +0100, Julien Grall wrote:
>
>
> On 07/07/16 16:48, Boris Ostrovsky wrote:
> >On 07/07/2016 11:41 AM, Wei Liu wrote:
> >>On Tue, Jul 05, 2016 at 11:12:31AM +0800, Shannon Zhao wrote:
> >>>From: Shannon Zhao
> >>>
> >>>Factor out codes for generating DTB to prep
On Thu, Jul 07, 2016 at 11:48:49AM -0400, Boris Ostrovsky wrote:
> On 07/07/2016 11:41 AM, Wei Liu wrote:
> > On Tue, Jul 05, 2016 at 11:12:31AM +0800, Shannon Zhao wrote:
> >> From: Shannon Zhao
> >>
> >> Factor out codes for generating DTB to prepare for adding ACPI tables
> >> generation codes.
On Tue, Jul 05, 2016 at 11:12:36AM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Estimate the size of ACPI tables and reserve a memory map space for ACPI
> tables.
>
> Signed-off-by: Shannon Zhao
I will leave this patch to Stefano and Julien.
> ---
> tools/libxl/libxl_arm_acpi.c | 85
On 07/07/16 16:48, Boris Ostrovsky wrote:
On 07/07/2016 11:41 AM, Wei Liu wrote:
On Tue, Jul 05, 2016 at 11:12:31AM +0800, Shannon Zhao wrote:
From: Shannon Zhao
Factor out codes for generating DTB to prepare for adding ACPI tables
generation codes.
Signed-off-by: Shannon Zhao
Acked-by: W
On Sat, Jun 18, 2016 at 12:13 AM, Dario Faggioli
wrote:
> In fact, the data it protects only change either at init-time,
> during cpupools manipulation, or when changing domains' weights.
> In all other cases (namely, load balancing, reading weights
> and status dumping), information is only read.
>>> On 07.07.16 at 17:37, wrote:
> On Thu, Jul 07, 2016 at 10:52:18AM +0100, Andrew Cooper wrote:
>> On 07/07/16 10:45, Roger Pau Monne wrote:
>> > On Thu, Jul 07, 2016 at 01:38:58AM -0600, Jan Beulich wrote:
>> >> The functions such get passed to have been taking pointers to const
>> >> since at
On Thu, Jul 7, 2016 at 4:05 AM, Julien Grall wrote:
>
>
> On 05/07/16 19:37, Tamas K Lengyel wrote:
>>
>> +#if defined(__arm__) || defined(__aarch64__)
>> +case VM_EVENT_REASON_PRIVILEGED_CALL:
>> +{
>> +const struct vm_event_regs_arm *in_regs =
>> &
>>> On 07.07.16 at 17:27, wrote:
>> > @@ -451,7 +462,10 @@ void pci_setup(void)
>> > resource = &mem_resource;
>> > bar_data &= ~PCI_BASE_ADDRESS_MEM_MASK;
>> > }
>> > -mmio_total -= bar_sz;
>> > +if ( bars[i].is_64bar && bar_s
On Thu, Jul 7, 2016 at 4:09 AM, Julien Grall wrote:
>
>
> On 07/07/16 10:57, Jan Beulich wrote:
>
> On 07.07.16 at 11:46, wrote:
>>>
>>> Anyway, I think this patch was in a good state (though few registers
>>> were needed clarification). Assuming it is ok to break the compatibility
>>> la
On Tue, Jul 05, 2016 at 11:12:35AM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> It uses static DSDT table like the way x86 uses. Currently the DSDT
> table only contains processor device objects and it generates the
> maximal objects which so far is 128.
>
> Signed-off-by: Shannon Zhao
>
On Tue, Jul 05, 2016 at 11:12:34AM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> It only constructs the ACPI tables for 64-bit ARM DomU when user enables
> acpi because 32-bit DomU doesn't support ACPI.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/Makefile | 4
> too
On Tue, Jul 05, 2016 at 11:12:33AM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Add a configuration option for ARM DomU so that user can deicde to use
> ACPI or not. This option is defaultly false.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/libxl.h | 5 +
> tools/li
On Sat, Jun 18, 2016 at 12:13 AM, Dario Faggioli
wrote:
> Signed-off-by: Dario Faggioli
> @@ -1696,10 +1702,8 @@ static void balance_load(const struct scheduler *ops,
> int cpu, s_time_t now)
>
> cpus_max = cpumask_weight(&st.lrqd->active);
> i = cpumask_weight(&st.orqd->activ
On Sat, Jun 18, 2016 at 12:13 AM, Dario Faggioli
wrote:
> more specifically, with: TICKLE_NEW, RUNQ_MAX_WEIGHT,
> MIGRATE, LOAD_CHECK, LOAD_BALANCE and PICKED_CPU, and
> in both both xenalyze and formats (for xentrace_format).
>
> Signed-off-by: Dario Faggioli
Acked-by: George Dunlap
_
On Mon, Jun 20, 2016 at 9:15 AM, Jan Beulich wrote:
On 18.06.16 at 01:12, wrote:
>> @@ -1484,6 +1489,23 @@ csched2_cpu_pick(const struct scheduler *ops, struct
>> vcpu *vc)
>> out_up:
>> spin_unlock(&prv->lock);
>>
>> +/* TRACE */
>> +{
>> +struct {
>> +uin
On Sat, Jun 18, 2016 at 12:12 AM, Dario Faggioli
wrote:
> Mainly, almost all of the BUG_ON-s can be converted into
> ASSERTS, and the debug printk either removed or turned
> into tracing.
>
> The 'TODO' list, in a comment at the beginning of the file,
> was also stale, so remove items that were st
On 07/07/2016 11:41 AM, Wei Liu wrote:
> On Tue, Jul 05, 2016 at 11:12:31AM +0800, Shannon Zhao wrote:
>> From: Shannon Zhao
>>
>> Factor out codes for generating DTB to prepare for adding ACPI tables
>> generation codes.
>>
>> Signed-off-by: Shannon Zhao
>> Acked-by: Wei Liu
>> ---
>> tools/li
On Tue, Jul 05, 2016 at 11:12:32AM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Add placeholders for ACPI tables blob and size here so that ACPI blob
> can be accessed from libxl and libxc.
>
> Signed-off-by: Shannon Zhao
Acked-by: Wei Liu
Though this patch is simple, it seems that th
On Thu, 2016-07-07 at 13:48 +0100, George Dunlap wrote:
> On 07/07/16 12:03, Dario Faggioli wrote:
> > On Thu, 2016-07-07 at 10:36 +0100, George Dunlap wrote:
> > > Could you re-send this with the trace change moved from the
> > > previous
> > > patch to this patch?
> > >
> > So, you're saying I s
On Tue, Jul 05, 2016 at 11:12:31AM +0800, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Factor out codes for generating DTB to prepare for adding ACPI tables
> generation codes.
>
> Signed-off-by: Shannon Zhao
> Acked-by: Wei Liu
> ---
> tools/libxl/libxl_arm.c | 18 --
> 1 fil
On 07/07/2016 11:25 AM, Konrad Rzeszutek Wilk wrote:
> On Thu, Jul 07, 2016 at 11:28:18AM +0800, Wei Jiangang wrote:
>> verify_local_APIC() had been removed by
>> commit 4399c03c6780 ("x86/apic: Remove verify_local_APIC()"),
>> so apic_id_mask isn't used by it.
Is anyone actually using this field?
On Thu, Jul 07, 2016 at 10:52:18AM +0100, Andrew Cooper wrote:
> On 07/07/16 10:45, Roger Pau Monne wrote:
> > On Thu, Jul 07, 2016 at 01:38:58AM -0600, Jan Beulich wrote:
> >> The functions such get passed to have been taking pointers to const
> >> since at least 2.6.16.
> >>
> >> Signed-off-by: J
On 07/06/2016 12:19 PM, anshul makkar wrote:
On 06/07/16 16:59, Daniel De Graaf wrote:
On 07/06/2016 11:34 AM, anshul makkar wrote:
Hi,
It allows the resource to be added and removed by the source domain to
target domain, but its use by target domain is blocked.
This rule only mandates the
On Thu, Jun 23, 2016 at 07:46:42PM +0100, Julien Grall wrote:
> Hi Shannon,
>
> On 23/06/2016 04:17, Shannon Zhao wrote:
> >From: Shannon Zhao
> >
> >Copy all the ACPI tables to guest space so that UEFI or guest could
> >access them.
> >
> >Signed-off-by: Shannon Zhao
> >---
> > tools/libxc/xc_d
This makes the buffers function parameters instead of globals, in
preparation for adding alternate locations for the policy.
Signed-off-by: Daniel De Graaf
---
This patch is new in v5.
xen/include/xsm/xsm.h| 13 ++---
xen/xsm/flask/hooks.c| 2 +-
xen/xsm/flask/
This adds a Kconfig option and support for including the XSM policy from
tools/flask/policy in the hypervisor so that the bootloader does not
need to provide a policy to get sane behavior from an XSM-enabled
hypervisor. The policy provided by the bootloader, if present, will
override the built-in
On Sat, Jun 18, 2016 at 12:12 AM, Dario Faggioli
wrote:
> (and fix the style of two labels as well.)
>
> Signed-off-by: Dario Faggioli
Acked-by: George Dunlap
> ---
> Cc: George Dunlap
> Cc: Anshul Makkar
> Cc: David Vrabel
> ---
> xen/common/sched_credit2.c | 58
> +
On Thu, Jul 07, 2016 at 11:17:14AM +0200, Roger Pau Monne wrote:
> On Thu, Jul 07, 2016 at 01:38:13AM -0600, Jan Beulich wrote:
> > Commit 9d092603cc ("xen-blkback: do not leak mode property") left one
> > path unfixed; correct this.
> >
> > Signed-off-by: Jan Beulich
>
> Acked-by: Roger Pau Mon
On Mon, Jun 27, 2016 at 11:40:32AM +0100, Julien Grall wrote:
> Hi Shannon,
>
> On 23/06/16 15:34, Shannon Zhao wrote:
> >On 2016年06月23日 21:39, Stefano Stabellini wrote:
> >>On Thu, 23 Jun 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Add a configuration option for ARM DomU so t
On Thu, Jul 07, 2016 at 09:07:59AM -0600, Jan Beulich wrote:
> >>> On 07.07.16 at 16:55, wrote:
> > Cc HV maintainers
> >
> > I'm of course fine with moving this structure somewhere else.
> >
> > On Wed, Jun 22, 2016 at 06:15:37PM +0100, Anthony PERARD wrote:
> >
> >> diff --git a/xen/include/p
> > +{
> > +/* If bigger than 4GB, don't try to put under 4GB. */
> > +if ( is_64bar && bar_sz > (1ull<<32) )
>
> Clearly at the very least this should be >=. However, even when
> it's a 2Gb BAR, we won't be able to fit it (as it can't go at address
> ze
On Thu, Jul 07, 2016 at 11:28:18AM +0800, Wei Jiangang wrote:
> verify_local_APIC() had been removed by
> commit 4399c03c6780 ("x86/apic: Remove verify_local_APIC()"),
> so apic_id_mask isn't used by it.
CC-ing the proper maintainers.
>
> Signed-off-by: Wei Jiangang
> ---
> arch/x86/xen/apic.c
>>> On 07.07.16 at 17:12, wrote:
>
> On 07/07/16 16:08, Boris Ostrovsky wrote:
>> On 07/07/2016 04:38 AM, Jan Beulich wrote:
>> On 06.07.16 at 19:33, wrote:
On 07/06/2016 01:03 PM, Julien Grall wrote:
>
> On 06/07/16 17:30, Boris Ostrovsky wrote:
>> On 07/06/2016 12:04 PM,
On Thu, Jul 07, 2016 at 12:26:09PM +0100, Andrew Cooper wrote:
> On 07/07/16 12:10, Lars Kurth wrote:
> >> On 6 Jul 2016, at 15:22, Konrad Rzeszutek Wilk
> >> wrote:
> >>
> >>> Looking at the above, it occurs to me that, this whole area seems to be a
> >>> little inconsistent anyway and could do
flight 96766 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96766/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On 07/07/16 16:08, Boris Ostrovsky wrote:
On 07/07/2016 04:38 AM, Jan Beulich wrote:
On 06.07.16 at 19:33, wrote:
On 07/06/2016 01:03 PM, Julien Grall wrote:
On 06/07/16 17:30, Boris Ostrovsky wrote:
On 07/06/2016 12:04 PM, Julien Grall wrote:
Hi Boris,
On 06/07/16 16:50, Boris Ostrovsk
On 07/07/16 16:09, Jan Beulich wrote:
On 07.07.16 at 17:02, wrote:
>> On 22/06/16 18:15, Anthony PERARD wrote:
>>> Instead of having several representation of hvm_start_info in C, define
>>> it in public/xen.h so both libxc and hvmloader can use it.
>>>
>>> Signed-off-by: Anthony PERARD
>>>
>>> On 07.07.16 at 17:04, wrote:
> On 07/07/2016 04:35 AM, Jan Beulich wrote:
> On 06.07.16 at 18:32, wrote:
>>> On 07/06/2016 12:04 PM, Roger Pau Monné wrote:
On Tue, Jul 05, 2016 at 03:04:59PM -0400, Boris Ostrovsky wrote:
> * Don't set HW_REDUCED_ACPI flags: this flag is only avai
On 07/07/2016 04:38 AM, Jan Beulich wrote:
On 06.07.16 at 19:33, wrote:
>> On 07/06/2016 01:03 PM, Julien Grall wrote:
>>>
>>> On 06/07/16 17:30, Boris Ostrovsky wrote:
On 07/06/2016 12:04 PM, Julien Grall wrote:
> Hi Boris,
>
> On 06/07/16 16:50, Boris Ostrovsky wrote:
>
On 22/06/16 18:15, Anthony PERARD wrote:
> Instead of having several representation of hvm_start_info in C, define
> it in public/xen.h so both libxc and hvmloader can use it.
>
> Signed-off-by: Anthony PERARD
> ---
> Change in V5:
> - remove packed attribute.
>
> New in V4.
> ---
> tools/libxc/i
>>> On 07.07.16 at 17:02, wrote:
> On 22/06/16 18:15, Anthony PERARD wrote:
>> Instead of having several representation of hvm_start_info in C, define
>> it in public/xen.h so both libxc and hvmloader can use it.
>>
>> Signed-off-by: Anthony PERARD
>> ---
>> Change in V5:
>> - remove packed attri
>>> On 07.07.16 at 16:55, wrote:
> Cc HV maintainers
>
> I'm of course fine with moving this structure somewhere else.
>
> On Wed, Jun 22, 2016 at 06:15:37PM +0100, Anthony PERARD wrote:
>
>> diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h
>
>
> I suspect it would make more s
On 07/07/2016 04:35 AM, Jan Beulich wrote:
On 06.07.16 at 18:32, wrote:
>> On 07/06/2016 12:04 PM, Roger Pau Monné wrote:
>>> On Tue, Jul 05, 2016 at 03:04:59PM -0400, Boris Ostrovsky wrote:
* Don't set HW_REDUCED_ACPI flags: this flag is only available starting
with ACPI v5
>>> Hm
Ian Jackson writes ("Re: [Xen-devel] xenbits "official" repo for XTF (was Re:
[PATCH 0/2] xtf: add launcher (+1 bugfix)"):
> David Vrabel writes ("Re: [Xen-devel] xenbits "official" repo for XTF (was
> Re: [PATCH 0/2] xtf: add launcher (+1 bugfix)"):
> > Really? Is it that difficult to accept th
>>> On 07.07.16 at 16:44, wrote:
> On 07/07/2016 06:30 AM, Jan Beulich wrote:
> On 05.07.16 at 19:44, wrote:
>>> +static inline void xsm_policy_init(void)
>>> +{
>>> +#ifdef CONFIG_XSM_POLICY
>>> +if ( policy_size == 0 )
>>> +{
>>> +policy_buffer = (char*)xsm_init_policy;
>>
>
David Vrabel writes ("Re: [Xen-devel] xenbits "official" repo for XTF (was Re:
[PATCH 0/2] xtf: add launcher (+1 bugfix)"):
> Really? Is it that difficult to accept that the original project author
> gets to choose the name?
Yes.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614907#113
As
On Wed, Jun 22, 2016 at 06:15:36PM +0100, Anthony PERARD wrote:
> The path to the BIOS blob can be overriden by the xl's
> bios_path_override option, or provided by u.hvm.bios_firmware in the
> domain_build_info struct by other libxl user.
>
> Signed-off-by: Anthony PERARD
>
> ---
> Changes in V
Cc HV maintainers
I'm of course fine with moving this structure somewhere else.
On Wed, Jun 22, 2016 at 06:15:37PM +0100, Anthony PERARD wrote:
> diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h
I suspect it would make more sense to move it to public/arch-x86/xen.h.
__
On Wed, Jun 22, 2016 at 06:15:33PM +0100, Anthony PERARD wrote:
[...]
> * Allocate and clear additional ioreq server pages. The default
> * server will use the IOREQ and BUFIOREQ special pages above.
> @@ -672,6 +675,14 @@ static int alloc_magic_pages_hvm(struct xc_dom_image
>
On Wed, Jun 22, 2016 at 06:15:35PM +0100, Anthony PERARD wrote:
> ... into the firmware directory, along with hvmloader.
>
> Signed-off-by: Anthony PERARD
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-
On Wed, Jun 22, 2016 at 06:15:32PM +0100, Anthony PERARD wrote:
> This patch use xc_dom_alloc_segment() to allocate the memory space for the
> ACPI modules and the SMBIOS modules. This is to replace the arbitrary
> placement of 1MB (+ extra for MB alignement) after the hvmloader image.
>
> This pa
On Thu, Jul 07, 2016 at 10:49:01AM -0400, Daniel De Graaf wrote:
> On 07/07/2016 09:45 AM, anshul.makkar.anshul.mak...@citrix.com wrote:
> >From: Anshul Makkar
> >
> >This patch resolves the following permission denied scenarios while creating
> >new domU :
> >avc: denied { setdomainhandle } for
1 - 100 of 245 matches
Mail list logo