Hi Julien,
On 08/04/2016 06:51 PM, Julien Grall wrote:
>
>
> On 04/08/16 17:22, Sergej Proskurin wrote:
>>
>> On 08/04/2016 06:04 PM, Julien Grall wrote:
>>>
>>>
>>> On 04/08/16 17:01, Sergej Proskurin wrote:
Hi Julien,
On 08/03/2016 06:54 PM, Julien Grall wrote:
> Hello S
Hi Julien,
On 08/03/2016 08:12 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 01/08/16 18:10, Sergej Proskurin wrote:
>> The p2m initialization now invokes initialization routines responsible
>> for the allocation and initialization of altp2m structures. The same
>> applies to teardown routines.
On 03/08/16 19:22, Boris Ostrovsky wrote:
> Now that Xen no longer allocates irqs in _cpu_up() we can restore
> commit a89941816726 ("hotplug: Prevent alloc/free of irq descriptors
> during cpu up/down")
>
> Signed-off-by: Boris Ostrovsky
> Acked-by: Thomas Gleixner
Reviewed-by: Juergen Gross
On 03/08/16 19:22, Boris Ostrovsky wrote:
> Commit ce0d3c0a6fb1 ("genirq: Revert sparse irq locking around
> __cpu_up() and move it to x86 for now") reverted irq locking
> introduced by commit a89941816726 ("hotplug: Prevent alloc/free
> of irq descriptors during cpu up/down") because of Xen alloca
>>> On 04.08.16 at 18:31, wrote:
> Jan Beulich writes ("[PATCH] domctl: relax getdomaininfo permissions"):
>> Qemu needs access to this for the domain it controls, both due to it
>> being used by xc_domain_memory_mapping() (which qemu calls) and the
>> explicit use in hw/xenpv/xen_domainbuild.c:xe
On 08/04/16 10:51, Konrad Rzeszutek Wilk wrote:
> > > > Such a pmem namespace can be created via a userspace tool ndctl and
> > > > then recognized by Linux NVDIMM driver. However, they currently only
> > > > reserve space for Linux kernel's page structs. Therefore, our design
> > > > need to e
>>> On 05.08.16 at 04:44, wrote:
> On 7/12/2016 5:02 PM, Yu Zhang wrote:
>> XenGT leverages ioreq server to track and forward the accesses to GPU
>> I/O resources, e.g. the PPGTT(per-process graphic translation tables).
>> Currently, ioreq server uses rangeset to track the BDF/ PIO/MMIO ranges
>>
The xen.cfg file seems fine to me. I suggest you try to use the dtb file
compiled from the kernel source and update UEFI bootloader on hikey
board to the latest version.
hope this could help.
On 8/4/2016 11:02 PM, Kamenee Arumugam wrote:
I have already pass hi6220-key.dtb in my xen.cfg:
opti
arm_setup need to return number of pages that vm is allocated. Code is
copied from x64 save ops.
Signed-off-by: Chenxiao Zhao
diff --git a/tools/libxc/xc_sr_save_arm.c b/tools/libxc/xc_sr_save_arm.c
index 611f99a..a2ef2db 100644
--- a/tools/libxc/xc_sr_save_arm.c
+++ b/tools/libxc/xc_sr_save_a
On arm64 VM uses d->arch.type to indicate if the domain is 32-bit or
64-bit. This value is set while parsing kernel image. while restoring
VCPU state, it will use this value to decide the VCPU type. I can not
find a proper place to save/restore this value in state file, this is
surely not a goo
Add arm_check_vm_state function, .check_vm_state can not be NULL in arch
specific ops.
Signed-off-by: Chenxiao Zhao
diff --git a/tools/libxc/xc_sr_save_arm.c b/tools/libxc/xc_sr_save_arm.c
index 1442679..611f99a 100644
--- a/tools/libxc/xc_sr_save_arm.c
+++ b/tools/libxc/xc_sr_save_arm.c
@@ -1
Hi all,
This patch added support VM save/restore for arm64. It is based on
previous work done by Ian Campbell [1] with some bug fixes to make it
work on stable-4.7. You should apply Ian's patch first.
There still some known issues that have not fixed yet.
* GIC v2 not support
* No live migra
added support to save/restore arm64 registers
Signed-off-by: Chenxiao Zhao
diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index aee3353..3073b17 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -120,7 +120,8 @@ static int cpu_save(struct domain *d,
hvm_domain_context_t *h)
On 7/12/2016 5:02 PM, Yu Zhang wrote:
XenGT leverages ioreq server to track and forward the accesses to GPU
I/O resources, e.g. the PPGTT(per-process graphic translation tables).
Currently, ioreq server uses rangeset to track the BDF/ PIO/MMIO ranges
to be emulated. To select an ioreq server, th
This run is configured for baseline tests only.
flight 66919 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66919/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf afd6b28915cac422294a28033ef83727b27ce216
baseline v
flight 99944 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99944/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 99938
test-amd64-amd64-xl-qemuu-wi
flight 99942 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99942/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 6 xen-boot fail REGR. vs. 99917
test-amd64-i386-xl-q
flight 99948 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99948/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
In preparation for moving out ACPI builder make all
BIOSes call hvmloader_acpi_build_tables() instead of
calling ACPI code directly.
No functional changes.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
tools/firmware/hvmloader/ovmf.c| 2 +-
tools/firmware/hvmloader/rombios.c | 2
The goal here is to build ACPI tables for PVHv2/HVMlite guests while reusing
existing
hvmloader's ACPI builder code. The builder is provided as a library in
tools/libacpi.
This version is built on top of Anthony's
git://xenbits.xen.org/people/aperard/xen-unstable.git:hvmloader-with-separated-bi
libxl__domain_make() may want to use b_info so we should set defaults
a little earlier.
Signed-off-by: Boris Ostrovsky
---
v2:
* New patch. The need for this patch was triggered by commit b173750d2bc2
tools/libxl/libxl_create.c | 22 +++---
1 file changed, 11 insertions(+), 11 d
Signed-off-by: Boris Ostrovsky
---
v2:
* Only initialize ACPI tables here but don't load them just yet
(store them in acpi_modeuls[])
* Reorder .gitignore changes
.gitignore | 12 ++-
tools/libacpi/build.c| 7 +-
tools/libacpi/libacpi.h | 15 +++-
tools/libxl
Initialize it in hvmloader, avoiding ACPI code's use of xenstore_read()
Signed-off-by: Boris Ostrovsky
---
v2:
* Dropped pt_ prefix
* Slight change in construct_passthrough_tables() code (thus dropped Jan's R-b)
tools/firmware/hvmloader/acpi/build.c | 28 +---
tools/fi
Components that wish to use ACPI builder will need to provide their own
mem_alloc() and virt_to_phys() routines. Pointers to these routines will
be passed to the builder as memory ops.
Signed-off-by: Boris Ostrovsky
---
v2:
* Added acpi_ctxt.free() op
tools/firmware/hvmloader/acpi/build.c | 9
PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor
objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so
that it can be included in ASLs for both HVM and PVH2.
Signed-off-by: Boris Ostrovsky
---
tools/libacpi/Makefile | 21 +---
With that, xenstore_read() won't need to be done in ACPI code
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
tools/firmware/hvmloader/acpi/build.c | 15 ++-
tools/firmware/hvmloader/acpi/libacpi.h | 4
tools/firmware/hvmloader/util.c | 12
3 fi
Users other than hvmloader may provide TIS address as virtual.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
v2:
* constified tis_hdr.
tools/firmware/hvmloader/acpi/build.c | 9 -
tools/firmware/hvmloader/acpi/libacpi.h | 3 +++
tools/firmware/hvmloader/config.h |
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
tools/firmware/hvmloader/acpi/build.c | 70 ++---
tools/firmware/hvmloader/acpi/libacpi.h | 1 +
tools/firmware/hvmloader/util.c | 2 +-
3 files changed, 40 insertions(+), 33 deletions(-)
diff --
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
v2:
* Added ASSERT(has_vpic(d))
* This patch can go in independent of the rest of the series.
xen/arch/x86/hvm/vlapic.c | 14 --
xen/arch/x86/hvm/vpt.c| 2 +-
2 files changed, 13 insertions(+), 3 deletions(-)
diff --g
Add entry for ACPI tables created for PVHv2 guests to e820 map.
Signed-off-by: Boris Ostrovsky
---
v2:
* Deal with multiple acpi_modules.
tools/libxl/libxl_dom.c | 8
tools/libxl/libxl_x86.c | 15 +++
2 files changed, 19 insertions(+), 4 deletions(-)
diff --git a/tools/li
PVHv2 guests may request LAPIC emulation (and nothing else)
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
v2:
* Note: I kept the code as is (with minor style adjustments). Roger's
version (with emulation_flags_ok()) has slighly more logic to account
for dom0. Without that I did
Load ACPI modules into guest space
Signed-off-by: Boris Ostrovsky
---
v2:
* New patch, loosely based on Shannon's ARM patch
tools/libxc/xc_dom_core.c | 92 +++
1 file changed, 92 insertions(+)
diff --git a/tools/libxc/xc_dom_core.c b/tools/libxc/xc_d
Provide ability to load multiple ACPI modules. Thie feature is needed
by PVHv2 guests and will be used in subsequent patches.
We assume that PVHv2 guests do not load their ACPI modules specified
in the configuration file. We can extend support for that in the future
if desired.
Signed-off-by: Bor
No need for ACPI code to rely on hvm_info variable.
Signed-off-by: Boris Ostrovsky
---
v2:
* Note: struct acpi_numa's pointers can't be constified due to their
use in later patches
tools/firmware/hvmloader/acpi/build.c | 50 +
tools/firmware/hvmloader/acpi/li
In prepearation to moving acpi sources into generally available
libacpi:
1. Move certain x86-specific definitions into acpi's x86.h
2. Modify include files serach paths to point to acpi
3. Macro-ise include file for build.c that defines various
utilities used by that file. Users of libacpi will
This way ACPI code won't use xenstore-read() and hvm_param_set()
which are private to hvmloader.
Signed-off-by: Boris Ostrovsky
---
v2:
* Pass VM GID address back via acpi_config.vm_gid_addr.
tools/firmware/hvmloader/acpi/build.c | 34 ++---
tools/firmware/hvmloade
ACPI sources will be available to various component which will build
them according to their own rules. ACPI's Makefile will only generate
necessary source files.
Signed-off-by: Boris Ostrovsky
---
v2:
* Reordered .gitignore changes alphabetically
* Dropped trailing slashes
* Use relative path fo
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
v2:
* Note: didn't break "if ( !waet ) return -1" line since that's the style
of the file.
tools/firmware/hvmloader/acpi/build.c | 9 ++---
tools/firmware/hvmloader/acpi/libacpi.h | 1 +
tools/firmware/hvmloader/util.c
By doing this we can move hvmloader-private interfaces (such as
uart_exists(), lpt_exists() etc.) out of the ACPI builder. This will
help us with allowing to call the builder from places other than
hvmloader.
Signed-off-by: Boris Ostrovsky
---
v2:
* Keep struct acpi_info private to build.c and in
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
---
v2:
* Minor cleanup of hvmloader's Makefile
tools/firmware/hvmloader/Makefile | 14 --
tools/firmware/hvmloader/ovmf.c| 2 +-
tools/{firmware/hvmloader/acpi => libacpi}/Mak
Non-hvmloader users may be building tables in virtual address space
and therefore we need to make sure that values that end up in tables
are physical addresses.
Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
---
tools/firmware/hvmloader/acpi/build.c | 47 ++-
Signed-off-by: Boris Ostrovsky
---
tools/libxl/Makefile| 2 ++
tools/libxl/libxl_dom.c | 22 ++
2 files changed, 20 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/Makefile b/tools/libxl/Makefile
index 9fee752..3a2d64a 100644
--- a/tools/libxl/Makefile
+++ b/tools
This run is configured for baseline tests only.
flight 66917 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66917/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
flight 99947 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99947/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
On August 4, 2016 11:49:23 AM EDT, Konrad Rzeszutek Wilk
wrote:
>You could construct _most_ of the names of the functions
>by doing 'nm --defined' but unfortunatly you do not get the
> prefix that is added on in Xen . For example:
>
>$ cat xen-syms.symbols |grep do_domain_pause
>0x82d08010492
On 08/04/16 22:03, Bread Cutter wrote:
> My workaround for now is just something like
>
> int mode = hvm_guest_x86_mode(curr);
>
> uint32_t eax = regs->eax;
>
>
> +if(eax == 0xFACE) {
> +hvm_event_guest_request();
> +return 1;
> +}
> +
>
> switch ( mode )
My workaround for now is just something like
int mode = hvm_guest_x86_mode(curr);
uint32_t eax = regs->eax;
+if(eax == 0xFACE) {
+hvm_event_guest_request();
+return 1;
+}
+
switch ( mode )
{
case 8:
This way I don't have to worry about if it's
On 02/08/16 10:19, Roger Pau Monne wrote:
> On Fri, Jul 29, 2016 at 08:04:12PM +0100, Andrew Cooper wrote:
>> On 29/07/16 17:29, Roger Pau Monne wrote:
>>> Craft the Dom0 e820 memory map and populate it.
>>>
>>> Signed-off-by: Roger Pau Monné
>>> ---
>>> Cc: Jan Beulich
>>> Cc: Andrew Cooper
>>>
On 01/08/16 12:36, Roger Pau Monne wrote:
> On Fri, Jul 29, 2016 at 06:57:08PM +0100, Andrew Cooper wrote:
>> On 29/07/16 17:28, Roger Pau Monne wrote:
>>> Split the Dom0 builder into two different functions, one for PV (and classic
>>> PVH), and another one for PVHv2. Introduce a new command line
On Fri, 29 Jul 2016, Julien Grall wrote:
> The following message flood the console when memaccess is enabled on
> various platforms:
>
> traps.c:2510:d1v0 HSR=0x9383004f pc=0x08b7d4c4 gva=0x08eeb8e0
> gpa=0x004903f8e0
>
> This is because a data abort from a guest was received
On 04/08/16 17:13, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf
> tree"):
>> On 04/08/16 16:21, Ian Jackson wrote:
>>> Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf
>>> tree"):
We should also clarify the force push cri
Andrew Cooper writes ("Re: [Xen-devel] [OSSTEST PATCH RFC 06/14] Introduce
ts-xtf-build [and 1 more messages]"):
> The current hard-coded paths exist only because of current limitiations
> in xl/libxl (identified here:
> http://xenbits.xen.org/people/andrewcoop/xen-test-framework/#errata)
>
> Wit
On 04/08/16 17:05, Ian Jackson wrote:
> Wei Liu writes ("Re: [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1
> more messages]"):
>> On Thu, Aug 04, 2016 at 04:17:45PM +0100, Ian Jackson wrote:
>>> The ability to coinstall multiple different xtfs was my reason for
>>> suggesting that the xt
On Thu, 4 Aug 2016, Julien Grall wrote:
> The current data/instruction abort paths contain unnecessary code and
> translate too often a VA to a IPA. This series aim to simplify this path.
>
> Now that the register HPFAR_EL2 is read in some case that can be affected
> by the erratum 834220 on Corte
Hi,
On 04/08/16 18:50, Julien Grall wrote:
Currently, Xen is accessing the stored MIDR everytime it has to check
whether the processor is affected by the erratum 766422.
This could take advantage of the new capability bitfields to detect
whether the processor is affected at boot time.
With thi
Hi,
On 04/08/16 18:50, Julien Grall wrote:
Workarounds may require to execute a different path when the platform
is affected by the associated erratum. Furthermore, this may need to
be called in the common code.
To avoid too much intrusion/overhead, the workaround helpers need to
be a nop on ar
Hi,
On 04/08/16 18:50, Julien Grall wrote:
The fault status we care are in the form xx where xx is the lookup
level that gave the fault. We can simplify the code by masking the 2 least
significant bits.
Signed-off-by: Julien Grall
I forgot to retain the reviewed-by from Stefano given on
Workarounds may require to execute a different path when the platform
is affected by the associated erratum. Furthermore, this may need to
be called in the common code.
To avoid too much intrusion/overhead, the workaround helpers need to
be a nop on architecture which will never have the workaroun
The ARM erratum applies to certain revisions of Cortex-A57. The
processor may report a Stage 2 translation fault as the result of
Stage 1 fault for load crossing a page boundary when there is a
permission fault or device memory fault at stage 1 and a translation
fault at Stage 2.
So Xen needs to c
The fault status we care are in the form xx where xx is the lookup
level that gave the fault. We can simplify the code by masking the 2 least
significant bits.
Signed-off-by: Julien Grall
---
The switch has not been replaced by a simple if because more case
will be added in follow-up
Translating a VA to a IPA is expensive. Currently, Xen is assuming that
HPFAR_EL2 is only valid when the stage-2 data/instruction abort happened
during a translation table walk of a first stage translation (i.e S1PTW
is set).
However, based on the ARM ARM (D7.2.34 in DDI 0487A.j), the register is
Currently, Xen is accessing the stored MIDR everytime it has to check
whether the processor is affected by the erratum 766422.
This could take advantage of the new capability bitfields to detect
whether the processor is affected at boot time.
With this patch, the number of instructions to check t
The current data/instruction abort paths contain unnecessary code and
translate too often a VA to a IPA. This series aim to simplify this path.
Now that the register HPFAR_EL2 is read in some case that can be affected
by the erratum 834220 on Cortex-A57, we need to implement a workaround
for it (s
The function do_trap_data_abort_guest assumes that a stage-2 data abort
can only be taken for a translation fault or permission fault today.
Whilst this is true today, it might not be in the future. Rather than
emulating the MMIO for any fault other than the permission one, print
a warning message
From: Bruce Rogers
Commit 5a11d0f7 mistakenly converted a log message into an error
condition when no pin interrupt is found for the pci device being
passed through. Revert that part of the commit.
Signed-off-by: Bruce Rogers
Signed-off-by: Stefano Stabellini
Acked-by: Anthony PERARD
---
hw/
t tags/xen-20160804-tag
for you to fetch changes up to 0968c91ce00f42487fb11de5da38e53b5dc6bc7f:
Xen PCI passthrough: fix passthrough failure when no interrupt pin
(2016-08-04 10:42:48 -0700)
Xen
Hi all,
This is the design document of the PV Calls protocol. You can find
prototypes of the Linux frontend and backend drivers here:
git://git.kernel.org/pub/scm/linux/kernel/git/sstabellini/xen.git pvcalls-5
To use them, make sure to enable CONFIG_PVCALLS in your kernel config
and add "pvcalls
On Thu, Aug 4, 2016 at 10:45 AM, Julien Grall wrote:
> Hello Tamas,
>
> On 04/08/16 17:12, Tamas K Lengyel wrote:
>>
>> On Thu, Aug 4, 2016 at 8:10 AM, George Dunlap
>> wrote:
>>>
>>> On 03/08/16 17:31, Tamas K Lengyel wrote:
I understand and that's fine. However, for our components we
Hi Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 12be7c9..628abd7 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
[...]
@@ -2403,35 +2405,64 @@ static void do_trap_instr_abort_guest(struct
cpu_user_regs *regs,
On 04/08/16 17:22, Sergej Proskurin wrote:
On 08/04/2016 06:04 PM, Julien Grall wrote:
On 04/08/16 17:01, Sergej Proskurin wrote:
Hi Julien,
On 08/03/2016 06:54 PM, Julien Grall wrote:
Hello Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
This commit moves the altp2m-related code f
On 04/08/16 17:07, Jan Beulich wrote:
On 04.08.16 at 17:55, wrote:
>> On 04/08/16 16:44, Jan Beulich wrote:
>> On 04.08.16 at 17:22, wrote:
On 04/08/16 09:41, Jan Beulich wrote:
> @@ -817,14 +816,22 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe
>
> case XEN_DOMCTL_g
Hello Tamas,
On 04/08/16 17:12, Tamas K Lengyel wrote:
On Thu, Aug 4, 2016 at 8:10 AM, George Dunlap wrote:
On 03/08/16 17:31, Tamas K Lengyel wrote:
I understand and that's fine. However, for our components we may
prefer a different style of workflow on occasion as our definition of
what con
flight 99943 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99943/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf afd6b28915cac422294a28033ef83727b27ce216
baseline version:
ovmf 365a3aab857a2820d36d2ae
Jan Beulich writes ("[PATCH] domctl: relax getdomaininfo permissions"):
> Qemu needs access to this for the domain it controls, both due to it
> being used by xc_domain_memory_mapping() (which qemu calls) and the
> explicit use in hw/xenpv/xen_domainbuild.c:xen_domain_poll().
>
> This at once avoi
flight 99945 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99945/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
>>> On 04.08.16 at 18:16, wrote:
> On Thu, Aug 4, 2016 at 1:51 AM, Jan Beulich wrote:
> On 04.08.16 at 08:36, wrote:
>>> On Thu, Aug 4, 2016 at 12:29 AM, Jan Beulich wrote:
>>> On 03.08.16 at 20:41, wrote:
> @@ -1846,11 +1846,15 @@ int hvm_hap_nested_page_fault(paddr_t gpa,
>
On 08/04/2016 06:04 PM, Julien Grall wrote:
>
>
> On 04/08/16 17:01, Sergej Proskurin wrote:
>> Hi Julien,
>>
>>
>> On 08/03/2016 06:54 PM, Julien Grall wrote:
>>> Hello Sergej,
>>>
>>> On 01/08/16 18:10, Sergej Proskurin wrote:
This commit moves the altp2m-related code from x86 to ARM. Funct
On Thu, Aug 4, 2016 at 1:51 AM, Jan Beulich wrote:
On 04.08.16 at 08:36, wrote:
>> On Thu, Aug 4, 2016 at 12:29 AM, Jan Beulich wrote:
>> On 03.08.16 at 20:41, wrote:
@@ -1846,11 +1846,15 @@ int hvm_hap_nested_page_fault(paddr_t gpa,
unsigned long gla,
On 04/08/16 17:11, Sergej Proskurin wrote:
diff --git a/xen/include/asm-arm/processor.h
b/xen/include/asm-arm/processor.h
index 15bf890..f8ca18c 100644
--- a/xen/include/asm-arm/processor.h
+++ b/xen/include/asm-arm/processor.h
@@ -529,6 +529,22 @@ union hsr {
};
+
+/* VTTBR: Virtualization
Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf tree"):
> On 04/08/16 16:21, Ian Jackson wrote:
> > Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf
> > tree"):
> >> We should also clarify the force push criteria. It is moderately likely
> >> that we
On Thu, Aug 4, 2016 at 8:10 AM, George Dunlap wrote:
> On 03/08/16 17:31, Tamas K Lengyel wrote:
>> On Wed, Aug 3, 2016 at 10:10 AM, George Dunlap
>> wrote:
>>> On 03/08/16 16:58, Tamas K Lengyel wrote:
On Wed, Aug 3, 2016 at 9:44 AM, George Dunlap
wrote:
> On 03/08/16 16:40, Tam
Hi Julien,
>> Hello Sergej,
>>
>> Title: s/altp2m/p2m/
I will adapt the titles of all patches, thank you.
>>
>> On 01/08/16 18:10, Sergej Proskurin wrote:
>>> The struct vttbr introduces a simple way to precisely access the
>>> individual fields of the vttbr.
>>
>> I am not sure whether this is
>>> On 04.08.16 at 17:16, wrote:
> Using mlock() for hypercall buffers is not sufficient since mlocked
> pages are still subject to compaction and page migration. Page
> migration can be prevented by taking additional references to the
> pages.
>
> Introduce two new ioctls: IOCTL_PRIVCMD_HCALL_B
>>> On 04.08.16 at 17:55, wrote:
> On 04/08/16 16:44, Jan Beulich wrote:
> On 04.08.16 at 17:22, wrote:
>>> On 04/08/16 09:41, Jan Beulich wrote:
@@ -817,14 +816,22 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe
case XEN_DOMCTL_getdomaininfo:
{
-domid
Wei Liu writes ("Re: [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1
more messages]"):
> On Thu, Aug 04, 2016 at 04:17:45PM +0100, Ian Jackson wrote:
> > The ability to coinstall multiple different xtfs was my reason for
> > suggesting that the xtfdist should be unpacked into a job-specifi
On 04/08/16 17:01, Sergej Proskurin wrote:
Hi Julien,
On 08/03/2016 06:54 PM, Julien Grall wrote:
Hello Sergej,
On 01/08/16 18:10, Sergej Proskurin wrote:
This commit moves the altp2m-related code from x86 to ARM. Functions
that are no yet supported notify the caller or print a BUG message
Hi Julien,
On 08/03/2016 06:54 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 01/08/16 18:10, Sergej Proskurin wrote:
>> This commit moves the altp2m-related code from x86 to ARM. Functions
>> that are no yet supported notify the caller or print a BUG message
>> stating their absence.
>>
>> Also,
From: Ross Lagerwall
Add hook functions which run during patch apply and patch revert.
Hook functions are used by livepatch payloads to manipulate data
structures during patching, etc.
One use case is the XSA91. As Martin mentions it:
"If we have shadow variables, we also need an unload hook to
You could construct _most_ of the names of the functions
by doing 'nm --defined' but unfortunatly you do not get the
prefix that is added on in Xen . For example:
$ cat xen-syms.symbols |grep do_domain_pause
0x82d080104920 t domain.c#do_domain_pause
$ nm --defined xen-syms|grep do_domain_paus
On 04/08/16 16:44, Jan Beulich wrote:
On 04.08.16 at 17:22, wrote:
>> On 04/08/16 09:41, Jan Beulich wrote:
>>> @@ -817,14 +816,22 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe
>>>
>>> case XEN_DOMCTL_getdomaininfo:
>>> {
>>> -domid_t dom = op->domain;
>>> -
>>> -rcu
We don't print at bootup time the build-id. The reason is
that xen_build_init and livepatch_init are both __initcall
type routines. This meant that when livepatch_init called
xen_build_id, it would return -ENODATA as build_id_len was
not setup yet (b/c xen_build_init would be called later).
We fix
Attached are thee patches for v4.8. The first one had been posted
during v4.7 but we decided to punt to v4.8:
[PATCH v2 1/3] livepach: Add .livepatch.hooks functions and test-case
The other one is to make it easier to make sure that the livepatch
symbols match with the hypervisor one and not have
>>> On 04.08.16 at 17:22, wrote:
> On 04/08/16 09:41, Jan Beulich wrote:
>> @@ -817,14 +816,22 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe
>>
>> case XEN_DOMCTL_getdomaininfo:
>> {
>> -domid_t dom = op->domain;
>> -
>> -rcu_read_lock(&domlist_read_lock);
>> +dom
On 04/08/16 16:21, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf
> tree"):
>> On 04/08/16 12:49, Ian Jackson wrote:
>>> Andrew, do you want to have osstest run its xtf push gate between
>>> `staging' and `master' branches of xtf, or do you want to jus
On Thu, Aug 04, 2016 at 04:17:45PM +0100, Ian Jackson wrote:
> Wei Liu writes ("[OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build"):
> > > > +sub stash () {
> > > > +built_stash($ho, $builddir, "xtfdist", "xtfdist");
> > > > +}
> > >
> > > Can you post a tar zvvtf of a sample xtfdist tarball ?
Wei Liu writes ("Re: [Xen-devel] [OSSTEST PATCH RFC 01/14] ts-xen-build: always
compile in FEP support"):
> On Thu, Aug 04, 2016 at 04:22:58PM +0100, Ian Jackson wrote:
> > Why not just report the fep test as having failed, in old branches,
> > and then carry on ?
>
> How to do that? If the test
>>> On 04.08.16 at 17:08, wrote:
> crash> x /130x 0x830bd0da1000
> 0x830bd0da1000: 0x000e 0x
> 0x830bd0da1010: 0x 0x
> 0x830bd0da1020: 0x 0x
> 0x830bd0da1030:
Wei Liu writes ("Re: [OSSTEST PATCH RFC 11/14] Introduce ts-xtf-run"):
> On Thu, Aug 04, 2016 at 01:19:15PM +0100, Ian Jackson wrote:
> > Please arrange that all problems which ought to cause "record step as
> > `fail' and run no more tests" are handled by:
> >
> > - having the code which d
On Thu, Aug 04, 2016 at 04:22:58PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [Xen-devel] [OSSTEST PATCH RFC 01/14] ts-xen-build:
> always compile in FEP support"):
> > On Thu, Aug 04, 2016 at 02:28:01PM +0100, Andrew Cooper wrote:
> > > However, it might be useful to confirm that fep doesn'
Using mlock() for hypercall buffers is not sufficient since mlocked
pages are still subject to compaction and page migration. Page
migration can be prevented by taking additional references to the
pages.
Introduce two new ioctls: IOCTL_PRIVCMD_HCALL_BUF_LOCK and
IOCTL_PRIVCMD_HCALL_BUF_UNLOCK whi
1 - 100 of 223 matches
Mail list logo