This run is configured for baseline tests only.
flight 71934 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71934/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf bb4831c03dd15ff8528dcdbc7d2ad1835f55563e
baseline v
On Wed, Aug 02, Olaf Hering wrote:
> +++ b/tools/libxc/xc_sr_restore_x86_hvm.c
> +#define SUPERPAGE_2MB_SHIFT 9
> +#define SUPERPAGE_2MB_NR_PFNS (1UL << SUPERPAGE_2MB_SHIFT)
> +#define SUPERPAGE_1GB_SHIFT 18
> +#define SUPERPAGE_1GB_NR_PFNS (1UL << SUPERPAGE_1GB_SHIFT)
I think these can be m
>>> Yi Sun 08/04/17 5:23 AM >>>
>On 17-08-03 03:37:06, Jan Beulich wrote:
>> >>> On 03.08.17 at 04:10, wrote:
>> > @@ -1283,10 +1344,20 @@ static void psr_cpu_init(void)
>> > feat = feat_l3;
>> > feat_l3 = NULL;
>> >
>> > -if ( !cat_init_feature(®s, feat, info, FEAT_TY
This run is configured for baseline tests only.
flight 71933 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71933/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blo
flight 112427 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112427/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 15 guest-stop fail in
112419 pass in 112427
test-
flight 112435 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112435/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
test-
flight 112423 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112423/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 112286
test-amd64-amd64-x
On 17-08-03 13:26:37, Wei Liu wrote:
> On Tue, Aug 01, 2017 at 04:48:32PM +0800, Yi Sun wrote:
> > This patch creates CAT and CDP feature document in doc/features/. It
> > describes
> > key points to implement L3 CAT/CDP and L2 CAT which is described in details
> > in
> > Intel SDM "INTEL? RESOUR
On 17-08-04 10:21:51, Yi Sun wrote:
> On 17-08-03 18:50:02, Boris Ostrovsky wrote:
> >
> >
> > On 08/03/2017 11:37 AM, Andrew Cooper wrote:
> > >(XEN) [ 1071.542500] Xen call trace:
> > >(XEN) [ 1071.542505][] psr_domain_free+0x23/0xcc
> > >(XEN) [ 1071.542514][] arch_domain_destroy+0x88/
As set value flow is the most complicated one in psr, it will be
divided to some patches to make things clearer. This patch
implements the set value framework to show a whole picture firstly.
It also changes domctl interface to make it more general.
To make the set value flow be general and can s
On 17-08-03 03:37:06, Jan Beulich wrote:
> >>> On 03.08.17 at 04:10, wrote:
> > @@ -1283,10 +1344,20 @@ static void psr_cpu_init(void)
> > feat = feat_l3;
> > feat_l3 = NULL;
> >
> > -if ( !cat_init_feature(®s, feat, info, FEAT_TYPE_L3_CAT) )
> > -feat_props
This patch implements the CPU init flow for CDP. The flow is almost
same as L3 CAT.
Signed-off-by: Yi Sun
---
v15:
- refine process in 'psr_cpu_init' to remove the 'goto' and merge two
if()s.
(suggested by Jan Beulich)
v14:
- remove the 'Notes' in commit message because a stub
flight 112434 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112434/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
test-
Hi,
I should have mentioned that this RFC only adds support to the x86 side.
Sorry for that.
Cheers,
Zhongze Liu
2017-08-04 10:20 GMT+08:00 Zhongze Liu :
> This series implements the new xl config entry proposed in [1]. Users can use
> the new config entry to statically setup shared memory area
On 17-08-03 18:50:02, Boris Ostrovsky wrote:
>
>
> On 08/03/2017 11:37 AM, Andrew Cooper wrote:
> >On 01/08/17 09:48, Yi Sun wrote:
> >>Hi all,
> >>
> >>We plan to bring a new PSR (Platform Shared Resource) feature called
> >>Intel L2 Cache Allocation Technology (L2 CAT) to Xen. It has been enabl
Add the parsing utils for the newly introduced libxl_static_sshm struct
to the libxl/libxlu_* family. And add realated parsing code in xl to
parse the struct from xl config files. This is for the proposal "Allow
setting up shared memory areas between VMs from xl config file" (see [1]).
[1] https:/
creation:
* Check for further errors in the static_shm configs: overlapping
areas, invalid ranges, duplicated master domain, no master domain etc.
* Add code for writing infomations of static shared memory areas
into the appropriate xenstore paths.
* use xc_domain_add_to_physmap_batch to do t
Add a new structure to the IDL famliy to represent static shared memory regions,
as proposed in the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu
Two checks in the p2m code forbids sharing physical pages among DomU's by using
xc_add_to_physmap_batch with XENMAPSPACE_gmfn_foreign. Just simply remove them
in this RFC patch to ask for suggestions on how to properly handle this.
This is for the proposal "Allow setting up shared memory areas bet
This series implements the new xl config entry proposed in [1]. Users can use
the new config entry to statically setup shared memory areas among VMs so that
they could communicate with each other through the static shared memory areas.
[1] Proposla to allow setting up shared memory areas between
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, August 3, 2017 5:44 PM
>
> >>> On 13.06.17 at 10:29, wrote:
> On 13.06.17 at 10:20, wrote:
> >> From the context calling pi_desc_init(), we can conclude the current
> >> implementation of VT-d PI depends on CPU-side PI. If we
flight 112432 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112432/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
test-
flight 112424 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112424/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf bb4831c03dd15ff8528dcdbc7d2ad1835f55563e
baseline version:
ovmf c1acb0f9b8222a97d2ad7
flight 112422 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112422/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-arm64-pvops 2 hosts-allocate broken REGR. vs. 111765
build-arm64-xsm
flight 112429 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112429/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
test-
On 08/03/2017 11:37 AM, Andrew Cooper wrote:
On 01/08/17 09:48, Yi Sun wrote:
Hi all,
We plan to bring a new PSR (Platform Shared Resource) feature called
Intel L2 Cache Allocation Technology (L2 CAT) to Xen. It has been enabled
in Linux Kernel.
Unfortunately, the result is problematic. Th
flight 112421 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112421/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
On Thu, Aug 3, 2017 at 12:03 PM, Dario Faggioli
wrote:
> On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
>> --- a/tools/xl/xl_cmdtable.c
>> +++ b/tools/xl/xl_cmdtable.c
>> @@ -272,12 +272,13 @@ struct cmd_spec cmd_table[] = {
>> { "sched-rtds",
>>&main_sched_rtds, 0, 1,
>>"G
flight 112420 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112420/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
test-amd64-amd64-xl
On Thu, Aug 3, 2017 at 11:53 AM, Dario Faggioli
wrote:
> On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
>> diff --git a/tools/libxl/libxl_types.idl
>> b/tools/libxl/libxl_types.idl
>> index 8a9849c..f6c3ead 100644
>> --- a/tools/libxl/libxl_types.idl
>> +++ b/tools/libxl/libxl_types.idl
>> @@ -
flight 112428 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112428/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
test-
flight 112426 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112426/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 15 guest-saverestorefail REGR. vs. 112402
test-amd64-a
On 08/03/2017 06:20 PM, George Dunlap wrote:
> On 07/03/2017 03:53 PM, Ross Lagerwall wrote:
>> On 06/30/2017 02:42 PM, George Dunlap wrote:
>>> On 06/28/2017 05:18 PM, Ross Lagerwall wrote:
On 06/27/2017 10:17 AM, George Dunlap wrote:
> On 26/06/17 18:30, Andrew Cooper wrote:
>> On 26
On 07/03/2017 03:53 PM, Ross Lagerwall wrote:
> On 06/30/2017 02:42 PM, George Dunlap wrote:
>> On 06/28/2017 05:18 PM, Ross Lagerwall wrote:
>>> On 06/27/2017 10:17 AM, George Dunlap wrote:
On 26/06/17 18:30, Andrew Cooper wrote:
> On 26/06/17 18:00, George Dunlap wrote:
>> On 26/06/1
flight 112419 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112419/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 15 guest-stop fail REGR.
vs. 111017
>>> Andrew Cooper 08/03/17 6:01 PM >>>
>On 03/08/17 16:51, Jan Beulich wrote:
> Andrew Cooper 07/27/17 7:48 PM >>>
>>> +#define COPY_LEAF(l, s, data) \
>>> +({ int ret; /* Elide leaves which are fully empty. */ \
>>> +if ( (*(uint64_t *)(&(d
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
> --- a/tools/xl/xl_cmdtable.c
> +++ b/tools/xl/xl_cmdtable.c
> @@ -272,12 +272,13 @@ struct cmd_spec cmd_table[] = {
> { "sched-rtds",
> &main_sched_rtds, 0, 1,
> "Get/set rtds scheduler parameters",
> - "[-d [-v[=VCPUID/al
On 03/08/17 16:51, Jan Beulich wrote:
Andrew Cooper 07/27/17 7:48 PM >>>
>> @@ -599,6 +600,93 @@ int init_domain_cpuid_policy(struct domain *d)
>> return 0;
>> }
> >
>> +/*
>> + * Copy a single cpuid_leaf into a guest-provided xen_cpuid_leaf_t buffer,
>> + * performing boundary checking agai
Hello James, Julien,
regarding your previous mails. I was able to single step every instruction
of my module. The problem (or rather the solution) was to _disable_ the IRQ
interrupts from within my guest module. This solves the problem of
singlestepping a module which previously ended in a spinloc
>>> Alexandru Isaila 08/03/17 5:29 PM >>>
>--- a/xen/arch/x86/hvm/hypercall.c
>+++ b/xen/arch/x86/hvm/hypercall.c
>@@ -152,9 +152,17 @@ int hvm_hypercall(struct cpu_user_regs *regs)
>{
>case 8:
>eax = regs->rax;
>+if ( currd->monitor.guest_request_userspace_vmcall &&
>+ eax ==
On Thu, Aug 3, 2017 at 11:47 AM, Dario Faggioli
wrote:
> On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
>> --- a/xen/include/public/domctl.h
>> +++ b/xen/include/public/domctl.h
>> @@ -360,6 +360,7 @@ typedef struct xen_domctl_sched_credit2 {
>> typedef struct xen_domctl_sched_rtds {
>> u
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
> diff --git a/tools/libxl/libxl_types.idl
> b/tools/libxl/libxl_types.idl
> index 8a9849c..f6c3ead 100644
> --- a/tools/libxl/libxl_types.idl
> +++ b/tools/libxl/libxl_types.idl
> @@ -401,6 +401,7 @@ libxl_sched_params = Struct("sched_params",[
>
>>> Andrew Cooper 07/27/17 7:48 PM >>>
>@@ -599,6 +600,93 @@ int init_domain_cpuid_policy(struct domain *d)
>return 0;
>}
>
>+/*
>+ * Copy a single cpuid_leaf into a guest-provided xen_cpuid_leaf_t buffer,
>+ * performing boundary checking against the guests array size.
>+ */
>+static int copy_le
On 03/08/17 16:29, Alexandru Isaila wrote:
> Allow guest userspace code to request that a vm_event be sent out
> via VMCALL. This functionality seems to be handy for a number of
> Xen developers, as stated on the mailing list (thread "[Xen-devel]
> HVMOP_guest_request_vm_event only works from guest
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -360,6 +360,7 @@ typedef struct xen_domctl_sched_credit2 {
> typedef struct xen_domctl_sched_rtds {
> uint32_t period;
> uint32_t budget;
> +bool is_work
When running as Xen pv-guest the exception frame on the stack contains
%r11 and %rcx additional to the other data pushed by the processor.
Instead of having a paravirt op being called for each exception type
prepend the Xen specific code to each exception entry. When running as
Xen pv-guest just u
On 01/08/17 09:48, Yi Sun wrote:
> Hi all,
>
> We plan to bring a new PSR (Platform Shared Resource) feature called
> Intel L2 Cache Allocation Technology (L2 CAT) to Xen. It has been enabled
> in Linux Kernel.
Unfortunately, the result is problematic. This is from XenServers basic
sanity testing
>>> Anthony PERARD 07/18/17 7:10 PM >>>
>--- a/xen/arch/x86/hvm/vlapic.c
>+++ b/xen/arch/x86/hvm/vlapic.c
>@@ -671,12 +671,13 @@ static void vlapic_tdt_pt_cb(struct vcpu *v, void *data)
>
>/*
>* This function is used when a register related to the APIC timer is updated.
>- * It expect the new val
Allow guest userspace code to request that a vm_event be sent out
via VMCALL. This functionality seems to be handy for a number of
Xen developers, as stated on the mailing list (thread "[Xen-devel]
HVMOP_guest_request_vm_event only works from guest in ring0").
This is a use case in communication be
>>> Anthony PERARD 07/18/17 7:12 PM >>>
>@@ -678,18 +679,29 @@ static void vlapic_tdt_pt_cb(struct vcpu *v, void *data)
>static void vlapic_update_timer(struct vlapic *vlapic, uint32_t lvtt);
>{
>uint64_t period;
>-uint64_t delta;
>-bool is_periodic;
>+uint64_t delta = 0;
>+bool is
flight 112425 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112425/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 15 guest-saverestorefail REGR. vs. 112402
test-amd64-a
>>> Anthony PERARD 07/18/17 7:10 PM >>>
>There should not be any functionality change with this patch.
>
>This function is used when the APIC_TMICT register is updated.
>
>vlapic_update_timer is introduce as it will be use also when the
>registers APIC_LVTT and APIC_TDCR are updated.
>
>Signed-off
>>> Sergey Dyasli 08/03/17 4:20 PM >>>
>On Tue, 2017-08-01 at 09:55 +0200, Egger, Christoph wrote:
>> On 18.07.17 12:34, Sergey Dyasli wrote:
>> > @@ -1773,6 +1780,27 @@ p2m_flush_nestedp2m(struct domain *d)
>> > p2m_flush_table(d->arch.nested_p2m[i]);
>> > }
>> >
>> > +void np2m_flush
On Tue, 2017-08-01 at 09:55 +0200, Egger, Christoph wrote:
> On 18.07.17 12:34, Sergey Dyasli wrote:
> > The new function finds all np2m objects with the specified eptp and
> > flushes them. p2m_flush_table_locked() is added in order not to release
> > the p2m lock after np2m_base check.
> >
> > S
On 03.08.17 16:58, Andrii Anisov wrote:
Let me check with a block device root.
It does work with root on mmcblk1p1.
So I suggest to George to update his XEN by moving to 4.9 or by
backporting mentioned patch.
Not sure what is broken for nfs-root. Would not deal with it now, maybe
later.
On 02/08/17 01:52, Andy Lutomirski wrote:
> On Tue, Aug 1, 2017 at 4:38 PM, Andrew Cooper
> wrote:
>> On 01/08/2017 20:45, Andy Lutomirski wrote:
>>> Also, IMO it would be nice to fully finish the job. Remaining steps are:
>>>
>>> 1. Unsuck the SYSCALL entries on Xen PV.
>>> 2. Unsuck the SYENTE
Hi,
Intel GVT-g supports Intel Core platform, E3 server platform but we haven't
tried your Atom Minnowboard.
The GPU generation delta needs additional GPU device model development work.
If you're using Skylake architecture based Atom (Apollo lake) platform, GVT-g
can work with additional SoC pat
>>> Asharaf Perinchikkal 08/03/17 3:30
>>> PM >>>
>We have lunched a guest with AGL(Automotive Grade Linux).But its performance
>very low. To overcome this limitation we have updated our host (Dom0) kernel to
>4.13 rc3. Now the xen is not booting with updated kernel from UEFI shell.
>Ubuntu
>alo
On 03.08.17 16:49, Julien Grall wrote:
Looking at the log, there is 640MB of RAM allocated below 4GB. So is
it the same issue?
I do not know what the issue George exactly has. I do not see his log.
Let me check with a block device root.
Also, which version of Xen are you comparing with?
I'm
On 03/08/17 00:43, Boris Ostrovsky wrote:
> On 08/02/2017 08:01 AM, Juergen Gross wrote:
>> On 01/08/17 16:28, PGNet Dev wrote:
>>> On 7/28/17 9:02 AM, PGNet Dev wrote:
On 7/27/17 11:23 PM, Juergen Gross wrote:
> Can you please post the domain's config file used to create the domain
>
On 03/08/17 14:46, Andrii Anisov wrote:
On 03.08.17 16:38, Andrii Anisov wrote:
If I recall correctly related issue was fixed in 4.9.
It's ugly.
I've reproduced the setup on my table, with the current master. It does
not work.
XEN allocated Dom0 memory properly:
(XEN) *** LOADING DOMAIN
On 03.08.17 16:38, Andrii Anisov wrote:
If I recall correctly related issue was fixed in 4.9.
It's ugly.
I've reproduced the setup on my table, with the current master. It does
not work.
XEN allocated Dom0 memory properly:
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Loading kernel from boot
On 03/08/17 14:38, Andrii Anisov wrote:
Hello Julien, George
On 03.08.17 16:11, Julien Grall wrote:
... I am not sure to understand the relation between the file system
crashing and the amount of RAM. Having the full log here would be
helpful. Is it because all the memory allocated is above
Hello Julien, George
On 03.08.17 16:11, Julien Grall wrote:
... I am not sure to understand the relation between the file system
crashing and the amount of RAM. Having the full log here would be
helpful. Is it because all the memory allocated is above 4GB?
Yep, the salvator-x board has 1GB RAM
Hi All,
We are trying to do para virtualization in intel(r) Atom(tm) E3845(MinnowBoard
Turbot Quad-Core board). We are using xen 4.9.0 and linux 4.10.
We have lunched a guest with AGL(Automotive Grade Linux).But its performance
very low. To overcome this limitation we have updated our host (Dom
Hi All,
We are trying to do para virtualization in intel(r) Atom(tm) E3845(MinnowBoard
Turbot Quad-Core board). We are using xen 4.9.0 and linux 4.10.
We have lunched a guest with AGL(Automotive Grade Linux).But its performance
very low. To overcome this limitation we have updated our host (Dom
Hi, Julien
On Thu, Aug 3, 2017 at 3:36 PM, Julien Grall wrote:
> Hi,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Eliminate TODO by squashing single-page stuff with multi-page one.
>>
>> Signed-off-by: Oleksandr Tyshchenko
>> CC: Julien Grall
>
>
>
Hi, Julien
On Thu, Aug 3, 2017 at 2:37 PM, Julien Grall wrote:
> Hi Oleksandr,
>
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> We don't passthrough IOMMU device to DOM0 even if it is not used by
>> Xen. Therefore exposing the properties that describe r
On 03/08/17 09:57, George John wrote:
Hi,
Hello,
I am running Xen on Rcar H3 which is now configured Dom0 memory as 752M
and need to change it as 2048M.I attempted to change it by
xl mem-set (xl mem-set 0 2048M) where 0 is Dom0 ID.It result following
error
root@salvator-x-xen-dom0:~# xl
Hi Florian,
On 03/08/17 13:29, Florian Jakobsmeier wrote:
> So as far as I understood both of you don't see a general problem with
> (timer) interrupts or the scheduler while being single stepped? Because in
> my opinion after enabling singlestep the system will go into a "spinlock"
> routine.
In
Hi,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Eliminate TODO by squashing single-page stuff with multi-page one.
Signed-off-by: Oleksandr Tyshchenko
CC: Julien Grall
Acked-by: Julien Grall
Cheers,
--
Julien Grall
On 03/08/17 13:31, Oleksandr Tyshchenko wrote:
Hi, Julien
On Thu, Aug 3, 2017 at 2:33 PM, Julien Grall wrote:
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index ec19310..3079bbe 100644
--- a/xen/arch/arm/domain.c
+
Hi, Julien
On Thu, Aug 3, 2017 at 2:31 PM, Julien Grall wrote:
> Hi Oleksandr,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> 1. Add missing return in case if IOMMU ops have been already set.
>> 2. Add check for shared IOMMU before returning an error.
>
Hi, Julien
On Thu, Aug 3, 2017 at 2:23 PM, Julien Grall wrote:
> Hi Oleksandr,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Not every integrated into ARM SoCs IOMMU can share page tables
>> with the CPU and as the result the iommu_use_hap_pt(d) mustn'
Hi, Julien
On Thu, Aug 3, 2017 at 2:21 PM, Julien Grall wrote:
> Hi Oleksandr,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> diff --git a/xen/drivers/passthrough/arm/smmu.c
>> b/xen/drivers/passthrough/arm/smmu.c
>> index 74c09b0..7c313c0 100644
>> --- a/xen/drivers/passthrough/arm/smm
Hi, Julien
On Thu, Aug 3, 2017 at 2:33 PM, Julien Grall wrote:
> Hi Oleksandr,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
>> index ec19310..3079bbe 100644
>> --- a/xen/arch/arm/domain.c
>> +++ b/xen/arch/arm/domain.c
>> @@ -
> Sets TDE to trap debug exceptions to EL2 from lower exception levels. I'm
>> surprised this isn't always set for Xen. Do you allow guests to use the
>> debug
>> features for their own purposes?
>>
>
> No. We already trap debug exceptions to EL2 by default and MDCR_EL2 should
> already be configur
On Tue, Aug 01, 2017 at 04:48:32PM +0800, Yi Sun wrote:
> This patch creates CAT and CDP feature document in doc/features/. It describes
> key points to implement L3 CAT/CDP and L2 CAT which is described in details in
> Intel SDM "INTEL® RESOURCE DIRECTOR TECHNOLOGY (INTEL® RDT) ALLOCATION
> FEATU
flight 112418 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112418/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 host-install(4)broken REGR. vs. 112402
test-amd64-a
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
We don't passthrough IOMMU device to DOM0 even if it is not used by
Xen. Therefore exposing the properties that describe relationship
between master devices and IOMMUs does not make any sense.
According to
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index ec19310..3079bbe 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -569,7 +569,7 @@ int arch_domain_create(struct domain *d, unsigned int
domcr_flags,
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
1. Add missing return in case if IOMMU ops have been already set.
2. Add check for shared IOMMU before returning an error.
Technically 1. is a fix, 2. is a new feature as sharing IOMMU is not
supported t
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Not every integrated into ARM SoCs IOMMU can share page tables
with the CPU and as the result the iommu_use_hap_pt(d) mustn't
always be true.
Reuse x86's iommu_hap_pt_share flag to indicate whether the IOMM
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
diff --git a/xen/drivers/passthrough/arm/smmu.c
b/xen/drivers/passthrough/arm/smmu.c
index 74c09b0..7c313c0 100644
--- a/xen/drivers/passthrough/arm/smmu.c
+++ b/xen/drivers/passthrough/arm/smmu.c
[...]
+static int __must_check ar
On 03/08/17 11:46, James Morse wrote:
Hi Florian,
On 03/08/17 11:16, Florian Jakobsmeier wrote:
This is the current version:
I'm not familiar with Xen, so forgive my annotations:
asmlinkage void leave_hypervisor_tail(void)
{
+/*This methode will be called after the 'guest_entry' mac
On Wed, Aug 02, 2017 at 07:46:18AM +0100, Wei Liu wrote:
> Hi all
>
> OSSTest is shut down for maintenance at the moment. It will be brought
> back either later today or tomorrow. I will send out another email when
> the maintenance is done.
>
The hardware maintenance is now complete. I have res
Hi Florian,
On 03/08/17 11:16, Florian Jakobsmeier wrote:
> This is the current version:
I'm not familiar with Xen, so forgive my annotations:
> asmlinkage void leave_hypervisor_tail(void)
>> {
>> +/*This methode will be called after the 'guest_entry' macro in
>> /arch/arm64/entry.S set gue
On Fri, 2017-07-14 at 07:05 -0600, Jan Beulich wrote:
> > > > On 14.07.17 at 14:51, wrote:
> >
> > Agreed, I shouldn't have added.
> > rbtree.h file does include incline functions which are actually
> > commented, and in order to have complete similarity I did include
> > the
> > same here.
> >
Hey Julien,
Would you mind sharing the latest version of your code?
>
>
Of course not. This is the current version:
asmlinkage void leave_hypervisor_tail(void)
> {
> +/*This methode will be called after the 'guest_entry' macro in
> /arch/arm64/entry.S set guest registers
> +Check single
>>> On 14.07.17 at 10:26, wrote:
> --- a/xen/common/rbtree.c
> +++ b/xen/common/rbtree.c
> @@ -250,15 +250,16 @@ void rb_erase(struct rb_node *node, struct rb_root
> *root)
> if (child)
> rb_set_parent(child, parent);
> par
Yes I am looking myself too.
Thanks
Amna
__
From: Juergen Gross
Sent: Thursday, August 3, 2017 12:07 PM
To: Waseem, Amna; Julien Grall; xen-devel
Subject: Re: [Xen-devel] Xenstore filling information about Dom0
On 03/08/17 11:54, Waseem, Amna wrote:
> Thanks a
On Thu, Aug 03, Jan Beulich wrote:
> >>> On 01.08.17 at 11:43, wrote:
> > Please backport the following changes for docs/ for the Xen 4.9.1
> > release:
> >
> > aa4eb460bc docs: add pod variant of xl-numa-placement
> > 458df9f374 docs: add pod variant of xl-network-configuration.5
> > 4359b86f31
On 03/08/17 11:54, Waseem, Amna wrote:
> Thanks a lot for information.
> Is there any other function to add more than one child per node besides
> manual node before starting xendameon ?
Maybe you should look around yourself a little bit?
It is okay to ask for some hints where to look for some f
Hi Florian, Julien,
On 02/08/17 14:32, Julien Grall wrote:
> On 26/07/17 14:12, Florian Jakobsmeier wrote:
>> i was just testing the single step implementation and realized that the
>> before mentioned solution is not fully working. I'm still trying to
>> enable SS for a VM on Xen.
>> To test my
>>> On 01.08.17 at 11:43, wrote:
> Please backport the following changes for docs/ for the Xen 4.9.1
> release:
>
> aa4eb460bc docs: add pod variant of xl-numa-placement
> 458df9f374 docs: add pod variant of xl-network-configuration.5
> 4359b86f31 docs: add pod variant of xen-pv-channel.7
I'm no
Thanks a lot for information.
Is there any other function to add more than one child per node besides manual
node before starting xendameon ?
Thanks
Amna
From: Juergen Gross
Sent: Thursday, August 3, 2017 11:23 AM
To: Waseem, Amna; Julien Grall; xen-devel
>>> On 14.07.17 at 16:04, wrote:
> By moving its bridge special casing to amd_iommu_add_device(), we can
> pass the latter to setup_hwdom_pci_devices() and at once consistently
> handle bridges discovered at boot time as well as such reported by Dom0
> later on.
>
> Signed-off-by: Jan Beulich
S
>>> On 13.06.17 at 10:29, wrote:
On 13.06.17 at 10:20, wrote:
>> From the context calling pi_desc_init(), we can conclude the current
>> implementation of VT-d PI depends on CPU-side PI. If we enable VT-d PI
>> and disable CPU-side PI by disabling APICv explicitly in xen boot
>> command line
Hi,
Will it work for Arm?
I have seen usb passthrough support in kernel 2.6 but not in 4.12.
Has it been merged with the latest kernel?
Regards,
Ajmal
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 03.08.17 at 04:10, wrote:
> @@ -1283,10 +1344,20 @@ static void psr_cpu_init(void)
> feat = feat_l3;
> feat_l3 = NULL;
>
> -if ( !cat_init_feature(®s, feat, info, FEAT_TYPE_L3_CAT) )
> -feat_props[FEAT_TYPE_L3_CAT] = &l3_cat_props;
> -else
> -
1 - 100 of 108 matches
Mail list logo