Hi Stefano,
On 16/06/2017 00:12, Stefano Stabellini wrote:
On Tue, 13 Jun 2017, Julien Grall wrote:
Add more safety when using xenheap_mfn_*.
Signed-off-by: Julien Grall
---
xen/arch/arm/mm.c| 16
xen/arch/arm/setup.c | 18 +-
xen/include/asm-arm/
+ Eric
On Fri, Jun 16, 2017 at 02:48:39PM +0800, Chao Gao wrote:
>The problem is a VF of RC integrated PF (e.g. PF's BDF is 00:02.0),
>we would wrongly use 00:00.0 to search VT-d unit.
>
>To search VT-d unit for a VF, the BDF of the PF is used. And If the
>PF is an Extended Function, the BDF of on
Hi Stefano,
On 15/06/2017 23:31, Stefano Stabellini wrote:
On Tue, 13 Jun 2017, Julien Grall wrote:
Add a new helper clear_table to clear a page table entry and invalidate
the cache.
Signed-off-by: Julien Grall
---
xen/arch/arm/mm.c | 22 --
1 file changed, 12 insertions(
Hi Stefano,
On 15/06/2017 23:28, Stefano Stabellini wrote:
On Tue, 13 Jun 2017, Julien Grall wrote:
xenheap_mfn_end is storing an MFN and not a physical address. Thankfully
xenheap_mfn_end is not used in the arm64 code. So drop it.
That's fine, but in that case I would prefer to move the defi
The problem is a VF of RC integrated PF (e.g. PF's BDF is 00:02.0),
we would wrongly use 00:00.0 to search VT-d unit.
To search VT-d unit for a VF, the BDF of the PF is used. And If the
PF is an Extended Function, the BDF of one traditional function is
used. The following line (from acpi_find_matc
This run is configured for baseline tests only.
flight 71568 xen-4.8-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71568/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-xsm 17 guest-start/
On Thu, 2017-06-15 at 13:14 -0700, Stefano Stabellini wrote:
> On Thu, 15 Jun 2017, Volodymyr Babchuk wrote:
> > Hello Stefano,
> > On 15 June 2017 at 21:21, Stefano Stabellini
> > wrote:
> > > Would you be up for joining a conf call to discuss EL0 apps and
> > > stubdoms
> > > on ARM in preparati
flight 110467 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110467/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 53fa87286b9348d285654dda1ab2274241358ffc
baseline version:
ovmf c314970984065c98a5609
currently there is no wrapper for XENMEM_add_to_physmap_batch in libxc.
add a wrapper to do that.
Signed-off-by: Zhongze Liu
---
Cc: Ian Jackson ,
Cc: Wei Liu ,
Cc: Stefano Stabellini
---
tools/libxc/include/xenctrl.h | 9 +
tools/libxc/xc_domain.c | 44 ++
2017-06-16 11:50 GMT+08:00 Zhongze Liu :
> Hi there,
>
> I was experimenting with the mem_sharing_op and I found a handy tool:
> tools/tests/mem-sharing/memshrtool
> I set up two bare metal x86_64 VMS running some simple code in 16-bit
> real mode and I tried to share the first physical page among
On Thu, Jun 08, 2017 at 03:25:42PM +0200, Christoph Hellwig wrote:
> Signed-off-by: Christoph Hellwig
> ---
> arch/hexagon/include/asm/dma-mapping.h | 2 --
> arch/hexagon/kernel/dma.c | 12 +---
> arch/hexagon/kernel/hexagon_ksyms.c| 1 -
> 3 files changed, 9 insertion
On Thu, Jun 08, 2017 at 03:25:56PM +0200, Christoph Hellwig wrote:
> This implementation is simply bogus - hexagon only has a simple
> direct mapped DMA implementation and thus doesn't care about the
> address.
>
> Signed-off-by: Christoph Hellwig
> ---
> arch/hexagon/include/asm/dma-mapping.h |
Hi there,
I was experimenting with the mem_sharing_op and I found a handy tool:
tools/tests/mem-sharing/memshrtool
I set up two bare metal x86_64 VMS running some simple code in 16-bit
real mode and I tried to share the first physical page among them. so
I use:
"./memshrtool enable src_dom "
"./m
flight 110458 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110458/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-vhd 5 xen-install fail in 110428 pass in 110458
test-amd64-amd64-xl-qemuu-win7-
flight 110476 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110476/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12 mig
This run is configured for baseline tests only.
flight 71565 xen-4.7-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71565/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-ins
flight 110456 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110456/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-rumprun-amd64 16 rumprun-demo-xenstorels/xenstorels.repeat
fail REGR. vs. 107358
test-amd64
On Tue, 30 May 2017, Julien Grall wrote:
> > > In this design document, we are considering that the host bridge driver
> > > can
> > > be ported in Xen. In the case it is not possible, a interface to forward
> > > configuration space access would need to be defined. The interface details
> > > is o
On Fri, 26 May 2017, Julien Grall wrote:
> Hi all,
>
> The document below is an RFC version of a design proposal for PCI
> Passthrough in Xen on ARM. It aims to describe from an high level perspective
> the interaction with the different subsystems and how guest will be able
> to discover and acce
flight 110460 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110460/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 110425
test-armhf-armhf-libvirt-raw 12 saveresto
Hi Julien,
thanks for the series!
I committed patches 2, 4-15, 17,18.
Cheers,
Stefano
On Tue, 13 Jun 2017, Julien Grall wrote:
> Hello all,
>
> This patch series extend the usage of typesafe MFN in the ARM code. _mfn(...)
> and mfn_x(...) are pushed further down in the call stack.
>
> Cheers
On Tue, 13 Jun 2017, Julien Grall wrote:
> Add a bit more safety when using create_xen_entries.
>
> Also when destroying/modifying mapping, the MFN is currently not used.
> Rather than passing _mfn(0) use INVALID_MFN to stay consistent with the
> other usage.
>
> Signed-off-by: Julien Grall
Rev
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file xen/arch/arm/livepatch.c is using typesafe MFN in most of
> the place. The only caller to virt_to_mfn is using with _mfn(...).
>
> To avoid extra _mfn(...), re-define virt_to_mfn within
> xen/arch/arm/livepatch.c to handle typesafe MFN.
>
> Sign
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file xen/arch/arm/alternative.c is using typesafe MFN in most of
> the place. The only caller to virt_to_mfn is using with _mfn(...).
>
> To avoid extra _mfn(...), re-define virt_to_mfn within
> xen/arch/arm/alternative.c to handle typesafe MFN.
>
>
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file xen/arch/arm/domain_build.c is using typesafe MFN in most of
> the place. The only caller to virt_to_mfn is using prefixed with
> _mfn(...).
>
> To avoid extra _mfn(...), re-define virt_to_mfn within
> arch/arm/domain_build.c to handle typesafe M
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file xen/arch/arm/mm.c is using the typesafe MFN in most of the
> place. This requires all caller of virt_to_mfn to prefixed by _mfn(...).
>
> To avoid the extra _mfn(...), re-defined virt_to_mfn within arch/arm/mm.c
> to handle typesafe MFN.
>
> Thi
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file xen/arch/arm/p2m.c is using typesafe MFN in most of the place.
> This requires caller to mfn_to_page and page_to_mfn to use _mfn/mfn_x.
>
> To avoid extra _mfn/mfn_x, re-define mfn_to_page and page_to_mfn within
> xen/arch/arm/p2m.c to handle typ
On Tue, 13 Jun 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index 8573192e3a..452c1e26c3 100644
> --- a/xen
On Tue, 13 Jun 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/acpi/lib.c | 4 ++--
> xen/arch/arm/kernel.c | 4 +---
> xen/arch/arm/mm.c | 4 ++--
> xen/arch/arm/platforms/vexpress.c | 2 +-
> x
On Tue, 13 Jun 2017, Julien Grall wrote:
> Add more safety when using xenheap_mfn_*.
>
> Signed-off-by: Julien Grall
> ---
> xen/arch/arm/mm.c| 16
> xen/arch/arm/setup.c | 18 +-
> xen/include/asm-arm/mm.h | 11 ++-
> 3 files changed, 23 inse
On Tue, 13 Jun 2017, Julien Grall wrote:
> Replace the following constructions:
> - _gfn(paddr_to_pfn(...)) => gaddr_to_gfn(...)
> - _mfn(paddr_to_pfn(...)) => maddr_to_mfn(...)
> - pfn_to_paddr(mfn_x(...)) => mfn_to_maddr(...)
> - pfn_to_paddr(gfn_x(...)) => gfn_to_gaddr(...)
On Tue, 13 Jun 2017, Julien Grall wrote:
> The new wrappers will add more safety when converting an address to a
> frame number (either machine or guest). A follow-up patch will use them
> to simplify the code.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/inclu
On Tue, 13 Jun 2017, Julien Grall wrote:
> gfn_to_mfn is a wrapper of p2m_lookup which does not return the
> p2m_type.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/traps.c | 8
> 1 file changed, 4 insertions(+), 4 deletions(-)
>
> diff --git
On Tue, 13 Jun 2017, Julien Grall wrote:
> DIV_ROUND_UP(..., PAGE_SIZE) and PFN_UP(...) are equivalent.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/domain_build.c | 4 ++--
> xen/arch/arm/gic-v2.c | 2 +-
> xen/arch/arm/gic-v3.c | 8 --
On Tue, 13 Jun 2017, Julien Grall wrote:
> __va(pfn_to_paddr(...)) and mfn_to_virt are equivalent.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/xen/arch/arm/mm.c b/xen/arch/
On Tue, 13 Jun 2017, Julien Grall wrote:
> paddr_to_pfn(virt_to_maddr(.)) and virt_to_mfn(.) are equivalent.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/domain_build.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/xen/arch/a
On Tue, 13 Jun 2017, Julien Grall wrote:
> This is matching the x86 side where the __* version is used if you need
> to override the helpers in source files.
>
> At the same time, move the non-underscore version at the end of the
> defintion and add a comment to explain them.
>
> Signed-off-by: J
On Tue, 13 Jun 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 33 +
> 1 file changed, 17 insertions(+), 16 deletions(-)
>
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index d164ed2e
On Tue, 13 Jun 2017, Julien Grall wrote:
> The physical address is computed from the machine frame number, so
> checking if the physical address is page aligned is pointless.
>
> Furthermore, directly assigned the MFN to the corresponding field in the
> entry rather than converting to a physical a
On Tue, 13 Jun 2017, Julien Grall wrote:
> Fix the comment coding style and add a newline before the return.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 18 --
> 1 file changed, 12 insertions(+), 6 deletions(-)
>
> diff --git a/
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file mm.c is the only user of mfn_to_xen_entry. This will also help
> to use the typesafe MFN.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 65
> +++
On Tue, 13 Jun 2017, Julien Grall wrote:
> Add a new helper clear_table to clear a page table entry and invalidate
> the cache.
>
> Signed-off-by: Julien Grall
> ---
> xen/arch/arm/mm.c | 22 --
> 1 file changed, 12 insertions(+), 10 deletions(-)
>
> diff --git a/xen/arch/ar
On Tue, 13 Jun 2017, Julien Grall wrote:
> xenheap_mfn_end is storing an MFN and not a physical address. Thankfully
> xenheap_mfn_end is not used in the arm64 code. So drop it.
That's fine, but in that case I would prefer to move the definition of
xenheap_mfn_end under #ifdef CONFIG_ARM_32. In fac
flight 71566 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71566/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
build-arm64 2 hosts-allocate broken never pass
build-arm64-pvops
On Tue, 13 Jun 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/gic-v2.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/xen/arch/arm/gic-v2.c b/xen/arch/arm/gic-v2.c
> index 270a1362ec..f8124e5e54 10064
On 15/06/2017 21:30, Julien Grall wrote:
> Also adding one missing full stop.
>
> Signed-off-by: Julien Grall
> ---
> xen/include/asm-arm/lpae.h | 45 ++---
> 1 file changed, 30 insertions(+), 15 deletions(-)
>
> diff --git a/xen/include/asm-arm/lpae.h b/xe
flight 110453 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110453/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
110417
test-amd6
flight 71561 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71561/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-i386-squeeze-netboot-pygrub 9 debian-di-install fail like
71523
test-amd64-i
This run is configured for baseline tests only.
flight 71559 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71559/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-120 xtf/test-hvm32-
On 15 June 2017 at 23:14, Stefano Stabellini wrote:
>> > If so, would Wednesday the 28th of June at 9AM PST work for you?
>> I would prefer later time (like 5PM), but 9AM also works for me.
>
> Wait, did you get the timezone right?
>
> 1) 9AM PST = 5PM London = 7PM Kyiv
>
>
> I could do 5PM PST wi
page.h is getting bigger. Move out every LPAE definitions in a separate
header. There is no functional changes.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/lpae.h | 169 +
xen/include/asm-arm/page.h | 152 +--
Also adding one missing full stop.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/lpae.h | 45 ++---
1 file changed, 30 insertions(+), 15 deletions(-)
diff --git a/xen/include/asm-arm/lpae.h b/xen/include/asm-arm/lpae.h
index 1e6a68926e..6244240ca0 1
This small patch series is moving out LPAE definition from page.h. This is
based on my series "xen/arm: Extend usage of typesafe MFN" [1] due to a small
conflict with patch #5.
Cheers,
[1] https://lists.xen.org/archives/html/xen-devel/2017-06/msg01361.html
Julien Grall (2):
xen/arm: Move LPAE
On Thu, 15 Jun 2017, Volodymyr Babchuk wrote:
> Hello Stefano,
>
> On 15 June 2017 at 21:21, Stefano Stabellini wrote:
> > Would you be up for joining a conf call to discuss EL0 apps and stubdoms
> > on ARM in preparation for Xen Developer Summit?
> >
> > If so, would Wednesday the 28th of June a
Hi Sergej,
On 06/15/2017 12:05 PM, Sergej Proskurin wrote:
We extend the current implementation by an additional permission,
GV2M_EXEC, which will be used to describe execute permissions of PTE's
as part of our guest translation table walk implementation.
Signed-off-by: Sergej Proskurin
Acke
Hi Sergej,
On 06/15/2017 12:05 PM, Sergej Proskurin wrote:
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective translation table entries.
Signed-off-by: Sergej P
Hi Sergej,
On 06/15/2017 12:05 PM, Sergej Proskurin wrote:
In this commit we make the p2m_* helpers, which access PTE properties in
a simplified way, publicly available. This is due to the fact that the
helpers will be used in guest_walk.c in one of the following commits.
Signed-off-by: Sergej
On 15/06/17 20:44, Julien Grall wrote:
> Hi Andrew,
>
> On 06/15/2017 01:03 PM, Andrew Cooper wrote:
>> On 15/06/17 12:05, Sergej Proskurin wrote:
>>> The current implementation does not provide appropriate types for
>>> short-descriptor translation table entries. As such, this commit
>>> adds new
Hi Andrew,
On 06/15/2017 01:03 PM, Andrew Cooper wrote:
On 15/06/17 12:05, Sergej Proskurin wrote:
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective translatio
Hi Sergej,
On 06/15/2017 12:05 PM, Sergej Proskurin wrote:
The ARMv8 architecture supports pages with different (4K, 16K, and 64K) sizes.
To enable guest page table walks for various configurations, this commit
extends the defines and helpers of the current implementation.
Signed-off-by: Sergej
Hello Stefano,
On 15 June 2017 at 21:21, Stefano Stabellini wrote:
> Would you be up for joining a conf call to discuss EL0 apps and stubdoms
> on ARM in preparation for Xen Developer Summit?
>
> If so, would Wednesday the 28th of June at 9AM PST work for you?
I would prefer later time (like 5PM)
Implement poll on passive sockets by requesting a delayed response with
mappass->reqcopy, and reply back when there is data on the passive
socket.
Poll on active socket is unimplemented as by the spec, as the frontend
should just wait for events and check the indexes on the indexes page.
Only sup
Hi all,
this series introduces the backend for the newly introduced PV Calls
procotol.
PV Calls is a paravirtualized protocol that allows the implementation of
a set of POSIX functions in a different domain. The PV Calls frontend
sends POSIX function calls to the backend, which implements them an
Implement backend_disconnect. Call pvcalls_back_release_active on active
sockets and pvcalls_back_release_passive on passive sockets.
Implement module_exit by calling backend_disconnect on frontend
connections.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
Introduce the code to handle xenbus state changes.
Implement the probe function for the pvcalls backend. Write the
supported versions, max-page-order and function-calls nodes to xenstore,
as required by the protocol.
Introduce stub functions for disconnecting/connecting to a frontend.
Signed-off
Just reply with success to the other end for now. Delay the allocation
of the actual socket to bind and/or connect.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/pvcalls-back.c | 27 +++
1 file changed, 27 insertions(
Introduce the C header file which defines the PV Calls interface. It is
imported from xen/include/public/io/pvcalls.h.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
CC: konrad.w...@oracle.com
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
include/xen/interface/io/pvcall
Release both active and passive sockets. For active sockets, make sure
to avoid possible conflicts with the ioworker reading/writing to those
sockets concurrently. Set map->release to let the ioworker know
atomically that the socket will be released soon, then wait until the
ioworker finishes (flus
Introduce a xenbus backend for the pvcalls protocol, as defined by
https://xenbits.xen.org/docs/unstable/misc/pvcalls.html.
This patch only adds the stubs, the code will be added by the following
patches.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
CC: boris.ostrov...@oracle.
Call inet_listen to implement the listen command.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/pvcalls-back.c | 19 +++
1 file changed, 19 insertions(+)
diff --git a/drivers/xen/pvcalls-back.c b/drivers/xen/pvcalls-back.c
i
Allocate a socket. Keep track of socket <-> ring mappings with a new data
structure, called sock_mapping. Implement the connect command by calling
inet_stream_connect, and mapping the new indexes page and data ring.
Allocate a workqueue and a work_struct, called ioworker, to perform
reads and write
When an active socket has data available, increment the io and read
counters, and schedule the ioworker.
Implement the read function by reading from the socket, writing the data
to the data ring.
Set in_error on error.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@
When the other end notifies us that there is data to be written
(pvcalls_back_conn_event), increment the io and write counters, and
schedule the ioworker.
Implement the write function called by ioworker by reading the data from
the data ring, writing it to the socket by calling inet_sendmsg.
Set
Allocate a socket. Track the allocated passive sockets with a new data
structure named sockpass_mapping. It contains an unbound workqueue to
schedule delayed work for the accept and poll commands. It also has a
reqcopy field to be used to store a copy of a request for delayed work.
Reads/writes to
We have one ioworker per socket. Each ioworker goes through the list of
outstanding read/write requests. Once all requests have been dealt with,
it returns.
We use one atomic counter per socket for "read" operations and one
for "write" operations to keep track of the reads/writes to do.
We also u
When the other end notifies us that there are commands to be read
(pvcalls_back_event), wake up the backend thread to parse the command.
The command ring works like most other Xen rings, so use the usual
ring macros to read and write to it. The functions implementing the
commands are empty stubs f
Implement the accept command by calling inet_accept. To avoid blocking
in the kernel, call inet_accept(O_NONBLOCK) from a workqueue, which get
scheduled on sk_data_ready (for a passive socket, it means that there
are connections to accept).
Use the reqcopy field to store the request. Accept the ne
Introduce a per-frontend data structure named pvcalls_fedata. It
contains pointers to the command ring, its event channel, a list of
active sockets and a tree of passive sockets (passing sockets need to be
looked up from the id on listen, accept and poll commands, while active
sockets only on relea
Also add pvcalls-back to the Makefile.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/Kconfig | 12
drivers/xen/Makefile | 1 +
2 files changed, 13 insertions(+)
diff --git a/drivers/xen/Kconfig b/drivers/xen/Kconfig
index f15
Keep a list of connected frontends. Use a semaphore to protect list
accesses.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/pvcalls-back.c | 22 ++
1 file changed, 22 insertions(+)
diff --gi
On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote:
> Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a
> privileged domain to change the value of the #VE suppress bit for a
> page.
>
> Add a libxc wrapper for invoking this hvmop.
>
> Signed-off-by: Adrian Pop
> ---
> tools/libx
On Thu, 15 Jun 2017, Boris Ostrovsky wrote:
> On 06/14/2017 05:03 PM, Stefano Stabellini wrote:
> > On Mon, 12 Jun 2017, Boris Ostrovsky wrote:
> >>> +
> >>> static void pvcalls_back_work(struct work_struct *work)
> >>> {
> >>> + struct pvcalls_fedata *priv = container_of(work,
> >>> + st
On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote:
> From: Vlad Ioan Topan
>
> The default value for the "suppress #VE" bit set by set_mem_access()
> currently depends on whether the call is made from the same domain (the
> bit is set when called from another domain and cleared if called from
> t
On Tue, Jun 13, 2017 at 10:13 AM, Julien Grall wrote:
> Replace the following constructions:
> - _gfn(paddr_to_pfn(...)) => gaddr_to_gfn(...)
> - _mfn(paddr_to_pfn(...)) => maddr_to_mfn(...)
> - pfn_to_paddr(mfn_x(...)) => mfn_to_maddr(...)
> - pfn_to_paddr(gfn_x(...)) => gfn
On Thu, Jun 15, 2017 at 5:05 AM, Sergej Proskurin
wrote:
> In this commit, we make use of the gpt walk functionality introduced in
> the previous commits. If mem_access is active, hardware-based gva to ipa
> translation might fail, as gva_to_ipa uses the guest's translation
> tables, access to whi
On Thu, 15 Jun 2017, Julien Grall wrote:
> Hi all,
>
> I would suggest to organize the next Xen ARM community on Wednesday 21st June
> at 5PM BST. Any opinions?
It works for me. FYI I sent a separate invite to discuss EL0 apps and
stubdoms on ARM (alpine.DEB.2.10.1706151117090.12156@sstabellini-T
Hi all,
Would you be up for joining a conf call to discuss EL0 apps and stubdoms
on ARM in preparation for Xen Developer Summit?
If so, would Wednesday the 28th of June at 9AM PST work for you?
I realize we also have the ARM community call next well, but this is a
large topic which deserves an e
On Thu, 15 Jun 2017, Juergen Gross wrote:
> On 14/06/17 21:27, Stefano Stabellini wrote:
> > On Wed, 14 Jun 2017, Juergen Gross wrote:
> >> On 14/06/17 02:47, Stefano Stabellini wrote:
> >>> On Tue, 13 Jun 2017, Juergen Gross wrote:
> On 02/06/17 21:31, Stefano Stabellini wrote:
> > Implem
On Thu, 15 Jun 2017, Jan Beulich wrote:
> >>> Stefano Stabellini 06/15/17 2:27 AM >>>
> >On Wed, 14 Jun 2017, Jan Beulich wrote:
> >> >>> Stefano Stabellini 06/14/17 8:45 PM >>>
> >> >On Wed, 14 Jun 2017, Jan Beulich wrote:
> >> >> > +What ACCESS_ONCE does *not* guarantee though is this access is
flight 71558 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71558/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-amd64-current-netinst-pygrub 9 debian-di-install fail blocked
in 71515
test
Hi Jan,
thanks for spending your time on this mind boggling exercise!
On 14/06/17 10:12, Jan Beulich wrote:
On 13.06.17 at 17:25, wrote:
>> as mentioned in my previous mail, I consider this more of a discussion
>> base that an actual patch. I am by no means an expert in this area, so
>> par
Your commit:
scsi: xen-scsifront: Remove code that zeroes driver-private command data
Since the SCSI core zeroes driver-private command data, remove
that code from the xen-scsifront driver.
Signed-off-by: Bart Van Assche
Reviewed-by: Hannes Reinecke
Reviewed-by:
On 13/06/2017 22:13, Dario Faggioli wrote:
On Tue, 2017-06-13 at 17:07 +0100, Anshul Makkar wrote:
On 12/06/2017 14:19, Dario Faggioli wrote:
@@ -92,6 +92,82 @@
*/
what I want to ask is that if the budget of the domain is
replenished,
but credit for the vcpus of that domain is not available
flight 110441 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110441/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1 build-check
This run is configured for baseline tests only.
flight 71567 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71567/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-libvirt 5 libvirt-buildfai
>>> Wei Liu 06/14/17 7:19 PM >>>
>It has always been the case that different xl processes can manipulate the same
>domain at the same time. This could be problematic.
>
>This series attempts to provide facility for xl to have a per-domain lock. This
>lock should be used whenever xl manipulates an
On 06/14/2017 05:03 PM, Stefano Stabellini wrote:
> On Mon, 12 Jun 2017, Boris Ostrovsky wrote:
>>> +
>>> static void pvcalls_back_work(struct work_struct *work)
>>> {
>>> + struct pvcalls_fedata *priv = container_of(work,
>>> + struct pvcalls_fedata, register_work);
>>> + int notif
flight 110437 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110437/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 16 guest-start.2fail in 110387 pass in 110437
test-amd64-amd64-xl-qemut-deb
flight 110434 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110434/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-pair 20 guest-start/debian fail REGR. vs. 110427
test-amd64-i386-libv
On 15/06/17 12:05, Sergej Proskurin wrote:
> The current implementation does not provide appropriate types for
> short-descriptor translation table entries. As such, this commit adds new
> types, which simplify managing the respective translation table entries.
>
> Signed-off-by: Sergej Proskurin
1 - 100 of 125 matches
Mail list logo