>> --- a/xen/include/xen/acpi.h
>> +++ b/xen/include/xen/acpi.h
>> @@ -43,7 +43,7 @@
>> * Fixmap pages to reserve for ACPI boot-time tables (see asm-x86/fixmap.h
>or
>> * asm-arm/config.h)
>> */
>> -#define NUM_FIXMAP_ACPI_PAGES 4
>> +#define NUM_FIXMAP_ACPI_PAGES 5
>
>Well, this is the ki
This run is configured for baseline tests only.
flight 71285 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71285/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-libvirt 5 libvirt-buildfai
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-qemuu-debianhvm-amd64
testid xen-boot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-t
On Thu, May 11, 2017 at 12:10:56PM +0800, Gary Lin wrote:
> On Wed, May 10, 2017 at 04:47:49PM +0100, Wei Liu wrote:
> > On Wed, May 10, 2017 at 04:39:32PM +0100, Wei Liu wrote:
> > > On Wed, May 10, 2017 at 08:29:35AM -0600, Charles Arnold wrote:
> > > > I was asked the following question which I
Currently, blocked vCPUs are added to PI blocking list if its
domain has assign devices. Actually, some blocked vCPUs will not
be woken up by wakeup interrupt generated by VT-d hardware. They
may be woken up by IPIs or other interrupts from emulated devices.
For these vCPUs we don't add them to PI
Currently, a blocked vCPU is put in its pCPU's pi blocking list. If
too many vCPUs are blocked on a given pCPU, it will incur that the list
grows too long. After a simple analysis, there are 32k domains and
128 vcpu per domain, thus about 4M vCPUs may be blocked in one pCPU's
PI blocking list. When
This patch adds TRC_HVM_PI_LIST_ADD to track adding one entry to
the per-pcpu blocking list. Also introduce a 'counter' to track
the number of entries in the list.
Signed-off-by: Chao Gao
---
tools/xentrace/formats | 1 +
xen/arch/x86/hvm/vmx/vmx.c | 12 +++-
xen/include/a
This number is used to calculate how many hvm vcpu on a pcpu on average.
Signed-off-by: Chao Gao
---
xen/common/domain.c | 8
xen/include/xen/sched.h | 2 ++
2 files changed, 10 insertions(+)
diff --git a/xen/common/domain.c b/xen/common/domain.c
index b22aacc..d433d9e 100644
--- a
VT-d PI introduces a per-pCPU blocking list to track the blocked vCPU
running on the pCPU. Theoretically, there are 32K domain on single
host, 128 vCPUs per domain. If all vCPUs are blocked on the same pCPU,
4M vCPUs are in the same list. Traversing this list consumes too
much time. More discussion
This patch intruduces a 'refcnt' field in vmx_pi_blocking to track
the reference count of 'pi_desc' of the vCPU. And change this field
every time we re-program one IRTE.
Signed-off-by: Chao Gao
---
xen/arch/x86/hvm/vmx/vmx.c | 29
xen/drivers/passthrough/io.c
On Wed, May 10, 2017 at 04:47:49PM +0100, Wei Liu wrote:
> On Wed, May 10, 2017 at 04:39:32PM +0100, Wei Liu wrote:
> > On Wed, May 10, 2017 at 08:29:35AM -0600, Charles Arnold wrote:
> > > I was asked the following question which I am posting to the list.
> > >
> > > "
> > > My name is Gary Lin,
flight 109291 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109291/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf bcd999d2377d1a34bb3b5c02e4206a8d14a2
baseline version:
ovmf af5fed90bfbf27dc1acaf
flight 109276 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109276/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 5 xen-buildfail REGR. vs. 107636
build-arm64
flight 109260 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109260/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358
Tests which are faili
Hi Julien,
I will resend the series keeping you and Stefano in cc.
Regards,
Bhupinder
On 10 May 2017 at 23:23, Stefano Stabellini wrote:
> On Wed, 10 May 2017, Julien Grall wrote:
>> Hi Bhupinder,
>>
>> I know that Jan requested to only CCed relevant maintainers to each patch.
>> But
>> can yo
On Thu, May 11, 2017 at 01:23:47AM +1000, Jan Beulich wrote:
> >>> On 10.05.17 at 16:29, wrote:
> > I was asked the following question which I am posting to the list.
> >
> > "
> > My name is Gary Lin, and I am the maintainer of the OVMF package, a UEFI
> > implementation for the virtual machines
flight 109257 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109257/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 3 host-install(3) broken REGR. vs. 59254
test-amd64-i386-qem
On Tue, May 9, 2017, 11:02 Fu Wei wrote:
> Hi Vladimir
>
> On 9 May 2017 at 14:59, Vladimir 'phcoder' Serbinenko
> wrote:
> >
> >
> > Le Tue, May 2, 2017 à 9:06 AM, a écrit :
> >>
> >> From: Fu Wei
> >>
> >> This patch adds the support of xen_boot command for aarch64:
> >> xen_hypervisor
>
flight 109261 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109261/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 5 xen-buildfail REGR. vs. 107636
build-arm64
flight 109254 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109254/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 9 debian-install fail REGR. vs. 109238
Regressions which ar
This run is configured for baseline tests only.
flight 71284 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71284/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-libvirt 5 libvirt-buildfail bl
On 05/10/2017 06:37 PM, Volodymyr Babchuk wrote:
Hi Julien,
Hi Volodymyr,
Returning back to Native apps, I think we can make ctx switch even
faster by dropping p2m code. Imagine that we already created stage 1
MMU for native application. Then to switch to app it we need only:
1. Enable TGE b
Hello everybody,
While looking into Coverity ID 1350942 I ran into the following piece
of code at drivers/block/xen-blkback/xenbus.c:490:
490static int xen_blkbk_remove(struct xenbus_device *dev)
491{
492struct backend_info *be = dev_get_drvdata(&dev->dev);
493
494pr_debug("%
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-libvirt
testid xen-boot
Tree: libvirt git://xenbits.xen.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xen
On Wed, 10 May 2017, Andrii Anisov wrote:
> On 10.05.17 12:56, George Dunlap wrote:
> > But the context here is that Andrii asked something about whether this
> > "EL0 App" functionality could be used to service Xen as well as a
> > domain. You said it didn't make sense, and Dario (as I understand
flight 109268 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109268/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf af5fed90bfbf27dc1acafbd69b98f4968a97ef3a
baseline version:
ovmf d547b32dccbef8bd4fedd
The patch contains the updated version of rbtree implementation from linux
kernel tree containing the fixes so far handled.
Signed-off-by: Praveen Kumar
---
xen/common/rbtree.c| 755 -
xen/include/xen/compiler.h | 60 +++
xen/include/x
Hi All,
The subject patch imports the changes and updates of the rbtree implementaiton
from linux tree. But since, the only current implementation is with tmem.c,
which
I am not much aware of, and therefore, was unable to test the changes
thoroughly.
Having said that, I do have plans of adding
Hello All,
On 10.05.17 12:56, George Dunlap wrote:
But the context here is that Andrii asked something about whether this
"EL0 App" functionality could be used to service Xen as well as a
domain. You said it didn't make sense, and Dario (as I understand it)
was pointing out that we already did
On Wed, 10 May 2017, Volodymyr Babchuk wrote:
> Hi Julien,
>
> Returning back to Native apps, I think we can make ctx switch even
> faster by dropping p2m code. Imagine that we already created stage 1
> MMU for native application. Then to switch to app it we need only:
>
> 1. Enable TGE bit in HC
On Wed, 10 May 2017, Julien Grall wrote:
> Hi Bhupinder,
>
> I know that Jan requested to only CCed relevant maintainers to each patch. But
> can you keep me CCed to all patches?
>
> I'd like to follow all the discussion on this series.
>
> @Stefano: I assume you want to be CCed on this series t
Hello Julien,
On 10.05.17 20:40, Julien Grall wrote:
Have you tried to define an interface using C structure?
Not yet.
If not, my suggestion would be to first do that so we can discuss on
other alternative.
Going to take this action soon.
--
*Andrii Anisov*
_
On 05/10/2017 04:30 PM, Andrii Anisov wrote:
Julien,
Hi Andrii,
On 05.05.17 20:51, Julien Grall wrote:
The code is not set in stone. It can be reworked to avoid that.
Yep.
I would like to not introduce changes related to dtb into
libxl_create.c, keep as much as possible in libxl_arm.c .
Hi Julien,
Returning back to Native apps, I think we can make ctx switch even
faster by dropping p2m code. Imagine that we already created stage 1
MMU for native application. Then to switch to app it we need only:
1. Enable TGE bit in HCR
2. Disable VM bit in HCR
3. Save/Program EL1_TTBR and frie
flight 109246 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109246/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 109203
test-armhf-armhf-libvirt-xsm 13 saveresto
On 05/10/2017 06:14 PM, Andre Przywara wrote:
Hi,
On 10/05/17 12:07, Julien Grall wrote:
On 05/10/2017 11:47 AM, Andre Przywara wrote:
Hi,
Hi Andre,
On 12/04/17 11:44, Julien Grall wrote:
On 12/04/17 01:44, Andre Przywara wrote:
+/* Retrieve the priority of an LPI from its struct pen
Hi,
On 10/05/17 12:07, Julien Grall wrote:
>
>
> On 05/10/2017 11:47 AM, Andre Przywara wrote:
>> Hi,
>
> Hi Andre,
>
>> On 12/04/17 11:44, Julien Grall wrote:
>>> On 12/04/17 01:44, Andre Przywara wrote:
+/* Retrieve the priority of an LPI from its struct pending_irq. */
+static int
Hello George,
On 09.05.17 11:53, George Dunlap wrote:
A few years ago I'd have said ACPI was an x86 concept as well. :-) But
my point was mainly to give examples to Andrii of other ways stubdomains
were used.
-George
Thanks for mentioning the PV vTPM in this thread.
It looks really intere
On Wed, May 10, 2017 at 11:12:39AM +0100, Roger Pau Monne wrote:
> Current code in backend_watch_callback forgets to remove a
> libxl__ddomain_guest
> from the list of tracked domains when the related data is freed, causing
> dereferences later on when the list is traversed. Make sure that a domai
On 10.05.17 17:22, Ian Jackson wrote:
The IO access emulation just directs the access to somewhere where it
can be emulated. Does that mean you intend for there to be a software
emulation of the vcoproc, as well as hardware passthrough (with
context switching) ?
The concept of an "access emul
On Wed, May 10, 2017 at 11:12:38AM +0100, Roger Pau Monne wrote:
> Current code can free the libxl__device inside of the libxl__ddomain_device
> before the addition has finished if a removal happens while an addition is
> still in process:
>
> backend_watch_callback
> |
>
Add name=value parsing options for com1 and com2 to add flexibility
in setting register values for MMIO UART devices.
Maintain backward compatibility with previous positional parameter
specfications.
eg. com1=115200,8n1,0x3f8,4
eg. com1=115200,8n1,0x3f8,4,reg_width=4,reg_shift=2
eg. com1=baud=115
flight 109245 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109245/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 17 guest-start/win.repeat fail REGR.
vs. 109136
test-am
Hi Bhupinder,
I know that Jan requested to only CCed relevant maintainers to each
patch. But can you keep me CCed to all patches?
I'd like to follow all the discussion on this series.
@Stefano: I assume you want to be CCed on this series too?
Cheers,
--
Julien Grall
___
On 10/05/17 16:59, Lars Kurth wrote:
>
>> On 10 May 2017, at 15:37, Lars Kurth wrote:
>>
>>>
>>> On 10 May 2017, at 15:31, Juergen Gross wrote:
>>>
>>> On 10/05/17 16:07, Ian Jackson wrote:
(dropping announce)
Juergen Gross writes ("Re: [Xen-devel] Vulnerability embargo dates - ad
flight 109263 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109263/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12 mig
On Wed, May 10, 2017 at 04:39:32PM +0100, Wei Liu wrote:
> On Wed, May 10, 2017 at 08:29:35AM -0600, Charles Arnold wrote:
> > I was asked the following question which I am posting to the list.
> >
> > "
> > My name is Gary Lin, and I am the maintainer of the OVMF package, a UEFI
> > implementatio
On Wed, May 10, 2017 at 08:29:35AM -0600, Charles Arnold wrote:
> I was asked the following question which I am posting to the list.
>
> "
> My name is Gary Lin, and I am the maintainer of the OVMF package, a UEFI
> implementation for the virtual machines.
>
> Recently, I was testing an upstream
Julien,
On 05.05.17 20:51, Julien Grall wrote:
The code is not set in stone. It can be reworked to avoid that.
Yep.
I would like to not introduce changes related to dtb into
libxl_create.c, keep as much as possible in libxl_arm.c . The only
common data structure between libxl__arch_domain_pr
>>> On 10.05.17 at 16:29, wrote:
> I was asked the following question which I am posting to the list.
>
> "
> My name is Gary Lin, and I am the maintainer of the OVMF package, a UEFI
> implementation for the virtual machines.
>
> Recently, I was testing an upstream patchset[*] and encountered so
Hi,
On 12/04/17 18:20, Julien Grall wrote:
> Hi Andre,
>
> On 12/04/17 01:44, Andre Przywara wrote:
>> The INV command instructs the ITS to update the configuration data for
>> a given LPI by re-reading its entry from the property table.
>> We don't need to care so much about the priority value,
Hi, Jan, all.
On Wed, May 10, 2017 at 5:50 PM, Jan Beulich wrote:
On 10.05.17 at 16:03, wrote:
>> From: Oleksandr Tyshchenko
>>
>> Port Linux helper of_count_phandle_with_args for counting
>> number of phandles in a property.
>>
>> Signed-off-by: Oleksandr Tyshchenko
>> Reviewed-by: Julie
> On 10 May 2017, at 15:37, Lars Kurth wrote:
>
>>
>> On 10 May 2017, at 15:31, Juergen Gross wrote:
>>
>> On 10/05/17 16:07, Ian Jackson wrote:
>>> (dropping announce)
>>>
>>> Juergen Gross writes ("Re: [Xen-devel] Vulnerability embargo dates - add
>>> your public holidays"):
On 10/05
>>> On 10.05.17 at 16:03, wrote:
> From: Oleksandr Tyshchenko
>
> Port Linux helper of_count_phandle_with_args for counting
> number of phandles in a property.
>
> Signed-off-by: Oleksandr Tyshchenko
> Reviewed-by: Julien Grall
>
> ---
>Changes in v1:
> - Add Julien's reviewed-by
>
Eric Blake writes:
> On 05/09/2017 06:56 AM, Markus Armbruster wrote:
>> Eric Blake writes:
>>
>>> Time to wire up all the call sites that request a shutdown or
>>> reset to use the enum added in the previous patch.
>>>
>>> It would have been less churn to keep the common case with no
>>> argum
QEMU-traditional implements non-standard VBE registers for getting LFB
physical address from inside of VGA BIOS code. QEMU doesn't have
those registers implemented and returns 0 when an HVM guest is trying to
access them from the existing ROMBIOS code. This eventually leads to
a triple fault inside
1. Update documentation for a new vuart option added.
2. Update documentation about SPI irq reserved for vpl011.
Signed-off-by: Bhupinder Thakur
---
Changes since v2:
- Incorporated the review comments on the documentation.
docs/man/xl.cfg.pod.5.in | 9 +
docs/misc/console.txt| 3
Add a new console type VUART to connect to guest's emualated vuart
console.
Signed-off-by: Bhupinder Thakur
---
tools/console/client/main.c | 8 +++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/tools/console/client/main.c b/tools/console/client/main.c
index 99f..6f4405f
The SBSA uart node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and consequently lives
in the PL011 driver. It's baudrate and other c
> On 10 May 2017, at 15:31, Juergen Gross wrote:
>
> On 10/05/17 16:07, Ian Jackson wrote:
>> (dropping announce)
>>
>> Juergen Gross writes ("Re: [Xen-devel] Vulnerability embargo dates - add
>> your public holidays"):
>>> On 10/05/17 15:38, Ian Jackson wrote:
Please see:
https://w
Xenconsole supports only PV console currently. This patch adds support
for vuart console, which allows emulated pl011 UART to be accessed
as a console.
Signed-off-by: Bhupinder Thakur
---
One review comment was to keep the vuart code under CONFIG_ARM64 && CONFIG_ACPI
flags.
This code review cou
Xenconsole supports only PV console currently. This patch adds support
for supporting multiple consoles.
This patch modifies different data structures and APIs used
in xenconsole to support multiple consoles.
Change summary:
1. Split the domain structure into a console structure and the
domai
Allocate a new gfn to be used as a ring buffer between xenconsole
and Xen for sending/receiving pl011 data.
Signed-off-by: Bhupinder Thakur
---
Changes since v2:
- Removed the DOMCTL call to set the GFN as now this information is passed
in the DOMCTL call to initialize vpl011 emulation.
too
Add a new vuart console node to xenstore. This node is added at
/local/domain/$DOMID/vuart/0.
The node contains information such as the ring-ref, event channel,
buffer limit and type of console.
Signed-off-by: Bhupinder Thakur
---
tools/libxl/libxl_console.c | 33 +
Add two new domctl APIs to initialize and de-initialize vpl011. It takes the
GFN and console
backend domid as input and returns an event channel to be used for
sending and receiving events from Xen.
Xen will communicate with xenconsole using GFN as the ring buffer and
the event channel to transmi
On 10/05/17 16:07, Ian Jackson wrote:
> (dropping announce)
>
> Juergen Gross writes ("Re: [Xen-devel] Vulnerability embargo dates - add your
> public holidays"):
>> On 10/05/17 15:38, Ian Jackson wrote:
>>> Please see:
>>> https://wiki.xenproject.org/wiki/HolidayCalendar
>>
>> Are you planning
An option is provided in libxl to enable/disable pl011 vuart while
creating a guest domain.
Libxl now suppots a generic vuart console and pl011 is a specific type.
In future support can be added for multiple vuart of different types.
User can enable pl011 vuart by adding the following line in the
I was asked the following question which I am posting to the list.
"
My name is Gary Lin, and I am the maintainer of the OVMF package, a UEFI
implementation for the virtual machines.
Recently, I was testing an upstream patchset[*] and encountered some
problems in Xen. Maybe you can help me or giv
On Wed, May 10, 2017 at 02:03:58PM +0100, Roger Pau Monne wrote:
> On Wed, May 10, 2017 at 11:47:31AM +0100, Wei Liu wrote:
> > On Wed, May 10, 2017 at 11:43:57AM +0100, Roger Pau Monne wrote:
> > > On Wed, May 10, 2017 at 11:32:45AM +0100, Ian Jackson wrote:
> > > > Roger Pau Monne writes ("[PATCH
These functions are generic in nature and can be reused by other emulation
code in Xen. One recent example is pl011 emulation, which needs similar
funictions to read/write the registers.
This patch moves the register access function definitions from vgic.h to
vreg.h.
Signed-off-by: Bhupinder Thak
Add emulation code to emulate read/write access to pl011 registers
and pl011 interrupts:
- Emulate DR read/write by reading and writing from/to the IN
and OUT ring buffers and raising an event to the backend when
there is data in the OUT ring buffer and injecting an interrupt
This patch redefines the vgic_reg* access functions to vreg_reg* functions.
These are generic functions, which will be used by the vgic emulation code
to access the vgic registers.
PL011 emulation code will also use vreg_reg* access functions.
Signed-off-by: Bhupinder Thakur
---
xen/arch/arm/vg
PL011 emulation for guests in Xen
===
Linaro has published VM System specification for ARM Processors, which
provides a set of guidelines for both guest OS and hypervisor implementations,
such that building OS images according to these guidelines guarantees
that tho
Dear Community,
I have realised that an scsih issue timeout occurs with my
Broadcom/Avago/LSI 9305-16i (SAS3224) HDA controller in Dom0, Ubuntu
17.04. The same issue derives also in a DomU guest using virtual block
disks.
Detailed output:
mpt3sas_cm0:
mpt3sas_scsih_issue_tm:timeout
The i
Andrii Anisov writes ("Re: [RFC] scf: SCF device tree and configuration
documentation"):
> On 05.05.17 20:20, Ian Jackson wrote:
> > Why wouldn't the toolstack simply choose appropriate irqs/mmio
> > ranges ? I would expect the virtual irqs/mmio ranges to not
> > necessarily match the physical on
On 10/05/17 15:45, Boris Ostrovsky wrote:
> On 05/10/2017 12:08 AM, Juergen Gross wrote:
>> When booted as pv-guest the p2m list presented by the Xen is already
>> mapped to virtual addresses. In dom0 case the hypervisor might make use
>> of 2M- or 1G-pages for this mapping. Unfortunately while bei
(dropping announce)
Juergen Gross writes ("Re: [Xen-devel] Vulnerability embargo dates - add your
public holidays"):
> On 10/05/17 15:38, Ian Jackson wrote:
> > Please see:
> > https://wiki.xenproject.org/wiki/HolidayCalendar
>
> Are you planning to add a link to this page somewhere in the wik
From: Oleksandr Tyshchenko
Not every integrated into ARM SoCs IOMMU can share page tables
with the CPU and as result the iommu_use_hap_pt(d) is not always true.
Reuse x86's iommu_hap_pt_share flag to indicate whether the IOMMU
page table is shared or not.
Now all IOMMU drivers on ARM are able to
From: Oleksandr Tyshchenko
Update IOMMU mapping if the IOMMU doesn't share page table with the CPU.
The best place to do so on ARM is __p2m_set_entry(). Use mfn as an indicator
of the required action. If mfn is valid call iommu_map_pages(),
otherwise - iommu_unmap_pages().
Signed-off-by: Oleksan
From: Oleksandr Tyshchenko
This flag is intended to let Xen know that the guest has devices
which will most likely be used for passthrough and as the result
the use of IOMMU is expected for this domain.
The primary aim of this knowledge is to help the IOMMUs that don't
share page tables with the
From: Oleksandr Tyshchenko
The presence of this flag lets us know that the guest
has devices which will most likely be used for passthrough
and as the result the use of IOMMU is expected for this domain.
In that case we have to call iommu_construct(), actually
what the real assign_device call usu
From: Oleksandr Tyshchenko
The "retrieving mapping" code has never executed since
iommu_use_hap_pt(d) always returned true on ARM so far. But, with
introducing the non-shared IOMMU patch series we can no longer keep
this code as is due to the lack of M2P support.
In order to retain the current b
From: Oleksandr Tyshchenko
Port Linux helper of_count_phandle_with_args for counting
number of phandles in a property.
Signed-off-by: Oleksandr Tyshchenko
Reviewed-by: Julien Grall
---
Changes in v1:
- Add Julien's reviewed-by
---
xen/common/device_tree.c | 7 +++
xen/incl
From: Oleksandr Tyshchenko
The helper has the same purpose as existing for x86 one.
It is used for choosing IOMMU mapping attribute according to
the memory type.
Signed-off-by: Oleksandr Tyshchenko
Reviewed-by: Julien Grall
---
Changes in v1:
- Add Julien's reviewed-by
---
xen/inclu
From: Oleksandr Tyshchenko
We don't passthrough IOMMU device to DOM0 even if it is not used by
Xen. Therefore exposing the property that describes the IOMMU
master interfaces of the device does not make any sense.
Signed-off-by: Oleksandr Tyshchenko
---
xen/arch/arm/domain_build.c | 4
1
From: Oleksandr Tyshchenko
The alloc_page_table callback is a mandatory thing
for the IOMMUs that don't share page table with the CPU on ARM.
The non-shared IOMMUs have to perform all required actions here
to be ready to handle IOMMU mapping updates right after completing it.
The arch_iommu_popu
From: Oleksandr Tyshchenko
Replace existing single-page stuff (IOMMU APIs and platform callbacks)
with the multi-page one followed by modifications of all related parts.
These new map_pages/unmap_pages APIs do almost the same thing
as old map_page/unmap_page ones except the formers have extra
or
Hi, all.
The purpose of this patch series is to create a base for porting
any "Non-shared" IOMMUs to Xen on ARM. Saying "Non-shared" IOMMU I mean
the IOMMU that can't share the page table with the CPU.
Primarily, we are interested in IPMMU-VMSA and I hope that it will be the first
candidate.
It i
On 10/05/17 15:38, Ian Jackson wrote:
> When the Xen Project Security Team talks to discoverers about choice
> of release dates for security vulnerabilities, we generally try to
> avoid known public holidays (subject to other constraints such as the
> discoverer's requirements, the Xen Project poli
On 05/10/2017 12:08 AM, Juergen Gross wrote:
> When booted as pv-guest the p2m list presented by the Xen is already
> mapped to virtual addresses. In dom0 case the hypervisor might make use
> of 2M- or 1G-pages for this mapping. Unfortunately while being properly
> aligned in virtual and machine ad
When the Xen Project Security Team talks to discoverers about choice
of release dates for security vulnerabilities, we generally try to
avoid known public holidays (subject to other constraints such as the
discoverer's requirements, the Xen Project policy, and so on).
We wish to make this arrangem
Wei Liu writes ("[PATCH for-4.9] libxenforeignmemory: bump minor version
number"):
> Signed-off-by: Wei Liu
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 11:42 +0100 on 10 May (1494416566), Andrew Cooper wrote:
> sh_emulate_map_dest() predates the introduction of the generic ERR_PTR()
> infrasturcture, but take the opportunity to avoid opencoding it.
>
> The chosen error constants require negating to work with IS_ERR(), but no
> other changes.
>
On Wed, May 10, 2017 at 11:47:31AM +0100, Wei Liu wrote:
> On Wed, May 10, 2017 at 11:43:57AM +0100, Roger Pau Monne wrote:
> > On Wed, May 10, 2017 at 11:32:45AM +0100, Ian Jackson wrote:
> > > Roger Pau Monne writes ("[PATCH 1/2] libxl/devd: fix a race with
> > > concurrent device addition/remov
On 10/05/17 01:20, M A Young wrote:
> On Tue, 9 May 2017, Steven Haigh wrote:
>
>> I'm trying to use the same build procedure I had for working correctly
>> for Xen 4.7 & 4.8.1 - but am coming across this error:
>>
>> gcc -DPIC -m64 -DBUILD_ID -fno-strict-aliasing -std=gnu99 -Wall
>> -Wstrict-pro
>>> On 10.05.17 at 12:45, wrote:
> Use X86_CR0_CD rather than opencoding it (and its inversion). Drop the
> pointless cr0 variable.
>
> Xen always uses CR4.PGE, and altering PGE is a full TLB flush. There is no
> need to call flush_tlb_local() (which itself, toggles CR4.PGE rather than
> writin
>>> On 10.05.17 at 12:42, wrote:
> sh_emulate_map_dest() predates the introduction of the generic ERR_PTR()
> infrasturcture, but take the opportunity to avoid opencoding it.
>
> The chosen error constants require negating to work with IS_ERR(), but no
> other changes.
>
> Signed-off-by: Andrew
flight 109248 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109248/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 5 xen-buildfail REGR. vs. 107636
build-arm64
>>> On 10.05.17 at 13:13, wrote:
> The same set of functions is used to set as well as to clean
> P2M entries, except that for clean operations INVALID_MFN (~0UL)
> is passed as a parameter. Unfortunately, when calculating an
> appropriate target order for a particular mapping INVALID_MFN
> is not
>>> On 10.05.17 at 12:51, wrote:
> On 10/05/17 11:26, Jan Beulich wrote:
> On 10.05.17 at 11:43, wrote:
>>> --- a/xen/arch/x86/mm/p2m-ept.c
>>> +++ b/xen/arch/x86/mm/p2m-ept.c
>>> @@ -681,6 +681,7 @@ ept_set_entry(struct p2m_domain *p2m, unsigned long
>>> gfn, mfn_t mfn,
>>> ept_entry_t
1 - 100 of 142 matches
Mail list logo