This run is configured for baseline tests only.
flight 72004 xen-4.7-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72004/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-rumprun-amd64 17 rumprun-demo-xensto
Hi Roger:
Thanks for your review.
On 2017年08月22日 22:32, Roger Pau Monné wrote:
> On Wed, Aug 09, 2017 at 04:34:02PM -0400, Lan Tianyu wrote:
>> This patch is to introduce create, destroy and query capabilities
>> command for vIOMMU. vIOMMU layer will deal with requests and call
>> arch vIO
flight 112809 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112809/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1 build-che
On 2017年08月22日 21:48, Wei Liu wrote:
>> > Hi, Wei
>> > Thanks for your comments.
>> >
>> > iirc, HVM only supports one module; DMAR cannot be a new module. Joining to
>> > the existing one is the approach we are taking.
>> >
>> > Which kind of conflicts you think should be resolved? If you mean
On Tue, May 16, 2017 at 5:04 AM, Daniel Kiper wrote:
> On Mon, May 15, 2017 at 07:09:54PM +, Bill Jacobs (billjac) wrote:
>> > -Original Message-
>> > From: Daniel Kiper [mailto:daniel.ki...@oracle.com]
>> > Sent: Monday, May 15, 2017 6:13 AM
>> > To: Bill Jacobs (billjac) ; george.dun
flight 112800 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112800/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 16 guest-localmigrate/x10 fail REGR.
vs. 110906
test
On 8/22/2017 8:44 PM, Julien Grall wrote:
Hi,
On 22/08/17 11:22, Yu Zhang wrote:
On 8/21/2017 6:15 PM, Julien Grall wrote:
Hi Paul,
On 21/08/17 11:11, Paul Durrant wrote:
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
Julien Grall
Sent: 2
On 2017年08月22日 20:56, Wei Liu wrote:
> On Wed, Aug 09, 2017 at 04:34:07PM -0400, Lan Tianyu wrote:
>> From: Chao Gao
>>
>> Add dmar table structure according Chapter 8 "BIOS Considerations" of
>> VTd spec Rev. 2.4.
>>
>> VTd
>> spec:http://www.intel.com/content/dam/www/public/us/en/documents/prod
On 2017年08月22日 21:19, Wei Liu wrote:
>> +=over 4
>> > +
>> > +=item B
>> > +
>> > +Possible Bs are:
>> > +
>> > +=over 4
>> > +
>> > +=item B
>> > +
>> > +Currently there is only one valid type:
>> > +
>> > +(x86 only) "intel_vtd" means providing a emulated Intel VT-d to the guest.
>> > +
>> > +=it
Hi Stefano,
2017-08-23 5:31 GMT+08:00 Stefano Stabellini :
> On Wed, 23 Aug 2017, Zhongze Liu wrote:
>> Add libxl__sshm_del to Unmap static shared memory areas mapped by
>> libxl__sshm_add during domain creation. The unmapping process is:
>>
>> * For a master: check if it still has living slaves:
On 2017年08月22日 21:12, Wei Liu wrote:
> On Wed, Aug 09, 2017 at 04:34:08PM -0400, Lan Tianyu wrote:
>> From: Chao Gao
>>
>> The BIOS reports the remapping hardware units in a platform to system
>> software
>> through the DMA Remapping Reporting (DMAR) ACPI table.
>> New fields are introduces for D
Hi Stefano,
2017-08-23 5:42 GMT+08:00 Stefano Stabellini :
> On Wed, 23 Aug 2017, Zhongze Liu wrote:
>> Add libxl__sshm_add to map shared pages from one DomU to another, The mapping
>> process involves the follwing steps:
>>
>> * Set defaults and check for further errors in the static_shm config
Hi Stefano,
2017-08-23 3:58 GMT+08:00 Stefano Stabellini :
> On Wed, 23 Aug 2017, Zhongze Liu wrote:
>> The original xsm_map_gmfn_foregin policy checks if source domain has the
>> proper
>> privileges over the target domain. Under this policy, it's not allowed if a
>> Dom0
>> wants to map pages
On 2017年08月22日 19:03, Wei Liu wrote:
> On Tue, Aug 22, 2017 at 04:07:32PM +0800, Lan Tianyu wrote:
>> On 2017年08月18日 18:15, Wei Liu wrote:
>>> On Fri, Aug 18, 2017 at 03:17:37PM +0800, Lan Tianyu wrote:
On 2017年08月17日 19:19, Wei Liu wrote:
> On Wed, Aug 09, 2017 at 04:34:05PM -0400, Lan Ti
On Tue, Aug 22, 2017 at 06:43:49AM -0600, Jan Beulich wrote:
On 21.08.17 at 23:52, wrote:
>> --- a/xen/include/xen/pci.h
>> +++ b/xen/include/xen/pci.h
>> @@ -39,6 +39,10 @@
>> #define PCI_SBDF3(s,b,df) s) & 0x) << 16) | PCI_BDF2(b, df))
>>
>> struct pci_dev_info {
>> +/*
>> +
Hi Stefano,
2017-08-23 4:05 GMT+08:00 Stefano Stabellini :
> On Wed, 23 Aug 2017, Zhongze Liu wrote:
>> Add a new structure to the IDL famliy to represent static shared memory
>> regions,
> ^ family
>
>
>> as proposed in the proposal "Allow setting up shared memo
On Thu, Aug 17, 2017 at 01:47:59AM +0200, Laszlo Ersek wrote:
> On 08/17/17 00:37, Jordan Justen wrote:
> > On 2017-08-16 12:23:49, Leif Lindholm wrote:
>
> [snip]
>
> >> - the value proposition
> >> for Linaro is that having maintainer parity ArmVirtPkg/OvmfPkg
> >> simplifies the task of mainta
flight 112793 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112793/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop fail REGR. vs. 112667
test-amd64-i386-xl-qemut
flight 112808 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112808/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1 build-check(1)
flight 112789 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112789/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-3 48 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 112664
test-xtf-amd64-
flight 112785 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112785/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
test-amd64-amd64-xl
Il 22 Ago 2017 14:59, Jan Beulich ha scritto:
>>> On 18.08.17 at 20:04, wrote:
> Changes from v2:
> * initialize idle_cpumask to "all clear", i.e., all the CPUs are busy;
> they'll clear their bit out themselves as soon as the run the idle
> loop (pretty soon anyway).
Just to make sure I cor
flight 112786 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112786/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-1 48 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 112661
Regressions whi
On Wed, 23 Aug 2017, Zhongze Liu wrote:
> Add libxl__sshm_add to map shared pages from one DomU to another, The mapping
> process involves the follwing steps:
>
> * Set defaults and check for further errors in the static_shm configs:
> overlapping areas, invalid ranges, duplicated master dom
On Wed, 23 Aug 2017, Zhongze Liu wrote:
> Add libxl__sshm_del to Unmap static shared memory areas mapped by
> libxl__sshm_add during domain creation. The unmapping process is:
>
> * For a master: check if it still has living slaves: 1) if yes, mark its
> status as "zombie", and don't destroy the
On Wed, 23 Aug 2017, Zhongze Liu wrote:
> Add the parsing utils for the newly introduced libxl_static_sshm struct
> to the libxl/libxlu_* family. And add realated parsing code in xl to
> parse the struct from xl config files. This is for the proposal "Allow
> setting up shared memory areas between
On 08/22/2017 12:15 PM, Julien Grall wrote:
> Hi,
>
> Gentle ping. This patch was reviewed but not queued. Are we waiting
> for other reviewed?
Applied to for-linus-4.14.
-boris
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/
On Wed, 23 Aug 2017, Zhongze Liu wrote:
> Add a new structure to the IDL famliy to represent static shared memory
> regions,
^ family
> as proposed in the proposal "Allow setting up shared memory areas between VMs
> from xl config file" (see [1]).
>
> [1] https
On Wed, 23 Aug 2017, Zhongze Liu wrote:
> The original xsm_map_gmfn_foregin policy checks if source domain has the
> proper
> privileges over the target domain. Under this policy, it's not allowed if a
> Dom0
> wants to map pages from one DomU to another, this restricts some useful yet
> not
> d
4.12-stable review patch. If anyone has any objections, please let me know.
--
From: Munehisa Kamata
commit b15bd8cb37598afb2963f7eb9e2de468d2d60a2f upstream.
Since commit d05d7f40791c ("Merge branch 'for-4.8/core' of
git://git.kernel.dk/linux-block") and 3fc9d690936f ("Merge
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Munehisa Kamata
commit b15bd8cb37598afb2963f7eb9e2de468d2d60a2f upstream.
Since commit d05d7f40791c ("Merge branch 'for-4.8/core' of
git://git.kernel.dk/linux-block") and 3fc9d690936f ("Merge b
flight 112825 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112825/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
Add libxl__sshm_add to map shared pages from one DomU to another, The mapping
process involves the follwing steps:
* Set defaults and check for further errors in the static_shm configs:
overlapping areas, invalid ranges, duplicated master domain,
no master domain etc.
* Write infomatio
Add libxl__sshm_del to Unmap static shared memory areas mapped by
libxl__sshm_add during domain creation. The unmapping process is:
* For a master: check if it still has living slaves: 1) if yes, mark its
status as "zombie", and don't destroy the information under
/local/static_shm; 2) if no,
Add the parsing utils for the newly introduced libxl_static_sshm struct
to the libxl/libxlu_* family. And add realated parsing code in xl to
parse the struct from xl config files. This is for the proposal "Allow
setting up shared memory areas between VMs from xl config file" (see [1]).
[1] https:/
Add a new structure to the IDL famliy to represent static shared memory regions,
as proposed in the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu
The original xsm_map_gmfn_foregin policy checks if source domain has the proper
privileges over the target domain. Under this policy, it's not allowed if a Dom0
wants to map pages from one DomU to another, this restricts some useful yet not
dangerous usages of the API, such as sharing pages among D
This is for the proposal "Allow setting up shared memory areas between VMs
from xl config file". See:
https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Then plan is to use XENMEM_add_to_physmap_batch to map the shared pages from
one domU to another and use XENMEM_remove
This series implements the new xl config entry proposed in [1]. Users can use
the new config entry to statically setup shared memory areas among VMs so that
they could communicate with each other through the static shared memory areas.
[1] Proposla to allow setting up shared memory areas between V
On Tue, 22 Aug 2017, Ross Lagerwall wrote:
> On 08/21/2017 11:30 PM, Stefano Stabellini wrote:
> > On Mon, 21 Aug 2017, Ross Lagerwall wrote:
> > > When the guest writes to the RTC, Xen emulates it and broadcasts a
> > > TIMEOFFSET ioreq. Emit an RTC_CHANGE QMP message when this happens
> > > rathe
Hi Jan,
On 22/08/17 09:23, Jan Beulich wrote:
On 14.08.17 at 16:23, wrote:
--- a/xen/include/xen/mm.h
+++ b/xen/include/xen/mm.h
@@ -92,6 +92,9 @@ static inline bool_t mfn_eq(mfn_t x, mfn_t y)
return mfn_x(x) == mfn_x(y);
}
+#define maddr_to_mfn(maddr) _mfn(paddr_to_pfn(maddr))
+#define
On 22/08/17 12:28, Andre Przywara wrote:
Hi,
Hi Andre,
On 14/08/17 15:23, Julien Grall wrote:
The only way alloc_boot_pages will return 0 is during the error case.
This statement is not true. If alloc_boot_pages() returns, it has
succeeded. Returning 0 is nothing special.
Although, Xe
Hello,
Title: xen/arm: ITS: Expose ITS in the MADT table
On 13/08/17 22:30, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Adds gicv3_its_make_hwdom_madt to update hwdom MADT ITS information.
s/Adds/Add/
Signed-off-by: Manish Jaggi
---
xen/arch/arm/gic-v3-its.c| 24 +++
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> We should consider the early boot period to end when we stop using the
> boot allocator. This is inline with x86 and will be helpful to know
> whether we should allocate memory from the boot allocator or xenheap.
>
> Signed-off-by: Julien Grall
Revie
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> DEV_WC is only used for PAGE_HYPERVISOR_WC and does not bring much
> improvement.
>
> Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Cheers,
Andre.
> ---
> xen/include/asm-arm/page.h | 3 +--
> 1 file changed, 1 insertion(+), 2 deletions
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> ioremap_cache is a wrapper of ioremap_attr(...).
>
> Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Cheers,
Andre
> ---
> xen/arch/arm/platforms/exynos5.c | 2 +-
> xen/arch/arm/platforms/omap5.c | 6 ++
> 2 files changed, 3 insert
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> Walk the hypervisor page table for data/prefetch abort fault to help
> diagnostics error in the page tables.
>
> Signed-off-by: Julien Grall
> ---
> xen/arch/arm/traps.c | 19 +++
> 1 file changed, 19 insertions(+)
>
> diff --git a/x
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> While ARM32 has 2 distinct registers for the hypervisor fault register
> (one for prefetch abort, the other for data abort), AArch64 has only
> one.
>
> Currently, the logic is open-code but a follow-up patch will require to
> read it too. So move the
Hello,
On 13/08/17 22:30, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
estimate_acpi_efi_size needs to be updated to provide correct size of
hardware domains MADT, which now adds ITS information as well.
Introducing gic_get_hwdom_madt_size.
Signed-off-by: Manish Jaggi
---
xen/arch/a
On 13/08/17 22:30, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
add_to_host_its_list will update the host_its_list. This common function to
be invoked from gicv3_its_dt_init and gic_v3_its_acpi_init.
Signed-off-by: Manish Jaggi
---
xen/arch/arm/gic-v3-its.c | 36
Hello,
On 13/08/17 22:30, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
This patch extends the gicv3_iomem_deny_access functionality by adding support
for its region as well. Added function gicv3_its_deny_access.
s/its/ITS/ making clearer the commit message.
s/Added/Add/
Signed-off
Hello,
On 13/08/17 22:30, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Added gicv3_its_acpi_init to update host_its_list from MADT table.
For ACPI, host_its sturcture stores dt_node as NULL.
s/sturcture/structure/
Future TOD0:
Cleanup :(1) Remove from host_its dt_node as it is req
On Wed, Aug 09, 2017 at 04:34:09PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> A field, viommu_info, is added to struct libxl_domain_build_info. Several
> attributes can be specified by guest config file for virtual IOMMU. These
> attributes are used for DMAR construction and vIOMMU creation.
>
On Wed, Aug 09, 2017 at 04:34:08PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> The BIOS reports the remapping hardware units in a platform to system software
> through the DMA Remapping Reporting (DMAR) ACPI table.
> New fields are introduces for DMAR table. These new fields are set by
On Wed, Aug 09, 2017 at 04:34:06PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> This patch adds XEN_DOMCTL_viommu_op hypercall. This hypercall
> comprises three sub-command:
^ s
> - query capabilities of one specific type vIOMMU emulated by Xen
Hello,
On 13/08/17 22:30, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
add_to_host_its_list will update the host_its_list. This common function to
be invoked from gicv3_its_dt_init and gic_v3_its_acpi_init.
Signed-off-by: Manish Jaggi
---
xen/arch/arm/gic-v3-its.c | 36 ++
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> This will allow to consolidate some part of the data abort and prefetch
> abort handling in a single function later on.
>
> Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Cheers,
Andre.
> ---
> xen/include/asm-arm/processor.h | 13 ++
Hi,
Gentle ping. This patch was reviewed but not queued. Are we waiting for
other reviewed?
Cheers,
On 18/08/17 11:15, Julien Grall wrote:
Hi Boris,
On 17/08/17 18:36, Boris Ostrovsky wrote:
On 08/17/2017 12:14 PM, Julien Grall wrote:
When booting Linux as Xen guest with CONFIG_DEBUG_ATOM
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> FnV (FAR not Valid) bit was introduced by ARMv8 in both AArch32 and
> AArch64 (See D7-2275, D7-2277, G6-4958, G6-4962 in ARM DDI 0487B.a).
I understand that this just prepares the data structures for patch #14,
but I was wondering if we should update t
On Wed, Aug 09, 2017 at 04:34:05PM -0400, Lan Tianyu wrote:
> This patch is to add Xen virtual IOMMU doc to introduce motivation,
> framework, vIOMMU hypercall and xl configuration.
>
> Signed-off-by: Lan Tianyu
> ---
> docs/misc/viommu.txt | 139
> ++
flight 112790 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112790/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf b369b8f9cc89f906deba9ae1b1a6d27ac745cf2d
baseline version:
xtf 24635d9265e70b2d75a17f
On Tue, Aug 22, Wei Liu wrote:
> On Thu, Aug 17, 2017 at 07:01:33PM +0200, Olaf Hering wrote:
> > +/* No superpage in 1st 2MB due to VGA hole */
> > +xc_sr_set_bit(0, &ctx->x86_hvm.restore.attempted_1g);
> > +xc_sr_set_bit(0, &ctx->x86_hvm.restore.attempted_2m);
> I don't quite get thi
On Wed, Aug 09, 2017 at 04:34:04PM -0400, Lan Tianyu wrote:
> This patch is to add get_irq_info callback for platform implementation
> to convert irq remapping request to irq info (E,G vector, dest, dest_mode
> and so on).
>
> Signed-off-by: Lan Tianyu
> ---
> xen/common/viommu.c | 16 +
On Wed, Aug 09, 2017 at 04:34:03PM -0400, Lan Tianyu wrote:
> This patch is to add irq request callback for platform implementation
> to deal with irq remapping request.
>
> Signed-off-by: Lan Tianyu
> ---
> xen/common/viommu.c | 15 +
> xen/include/asm-x86/viommu.h | 73
>
On Thu, Aug 17, 2017 at 07:01:33PM +0200, Olaf Hering wrote:
[...]
> diff --git a/tools/libxc/xc_sr_restore_x86_hvm.c
> b/tools/libxc/xc_sr_restore_x86_hvm.c
> index 1dca85354a..60454148db 100644
> --- a/tools/libxc/xc_sr_restore_x86_hvm.c
> +++ b/tools/libxc/xc_sr_restore_x86_hvm.c
> @@ -135,6 +1
On Thu, Aug 17, 2017 at 08:22:16PM -0400, Lan Tianyu wrote:
> This patch is to introduct an abstract layer for arch vIOMMU implementation
> to deal with requests from dom0. Arch vIOMMU code needs to provide callback
> to perform create, destroy and query capabilities operation.
>
> Signed-off-by:
... XENMEM_resource_ioreq_server
This patch adds support for a new resource type that can be mapped using
the XENMEM_acquire_resource memory op.
If an emulator makes use of this resource type then, instead of mapping
gfns, the IOREQ server will allocate pages from the heap. These pages
will never
A subsequent patch will introduce a new scheme to allow an emulator to
map IOREQ server pages directly from Xen rather than the guest P2M.
This patch lays the groundwork for that change by deferring mapping of
gfns until their values are requested by an emulator. To that end, the
pad field of the
This patch adjusts the IOREQ server code to use type-safe gfn_t values
where possible. No functional change.
Signed-off-by: Paul Durrant
---
Cc: Andrew Cooper
Cc: Jan Beulich
---
xen/arch/x86/hvm/ioreq.c | 42
xen/include/asm-x86/hvm/domain.h |
On Tue, Aug 22, 2017 at 03:34:37PM +0100, Wei Liu wrote:
> > +static inline int pfn_set_populated(struct xc_sr_context *ctx, xen_pfn_t
> > pfn)
> > +{
> > +xc_interface *xch = ctx->xch;
> > +
>
> This is not used, right?
Oh this is acutally used. Please ignore this comment.
Legacy emulators use the 'default' IOREQ server which has slightly
different semantics than other, explicitly created, IOREQ servers.
Because of this, most of the initialization and teardown code needs to
know whether the server is default or not. This is currently achieved
by passing an is_defaul
There is a substantial amount of code duplicated between the x86 and arm
implementations of mm.c:xenmem_add_to_physmap_one() for
XENMAPSPACE_grant_table. Also, the code in question looks like it really
should be in common/grant_table.c
This patch introduces a new function in common/grant_table.c t
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest
resources for direct priv-mapping.
This patch adds new functionality into libxenforeignmemory to make use
of a new privcmd ioctl [1] that uses the new memory op to make such
resources available via mmap(2).
[1]
http://xenbit
This patch re-works much of the IOREQ server initialization and teardown
code:
- The hvm_map/unmap_ioreq_gfn() functions are expanded to call through
to hvm_alloc/free_ioreq_gfn() rather than expecting them to be called
separately by outer functions.
- Several functions now test the validity o
(REPOST after rebase and reference fix in patch #4 comment)
This series introduces support for direct mapping of guest resources.
The resources are:
- Grant tables
- IOREQ server pages
Paul Durrant (12):
[x86|arm]: remove code duplication
x86/mm: allow a privileged PV domain to map guest mf
A previous patch added support for priv-mapping guest resources directly
(rather than having to foreign-map, which requires P2M modification for
HVM guests).
This patch makes use of the new API to seed the guest grant table unless
the underlying infrastructure (i.e. privcmd) doesn't support it, in
In the case where a PV domain is mapping guest resources then it needs make
the HYPERVISOR_mmu_update call using DOMID_SELF, rather than the guest
domid, so that the passed in gmfn values are correctly treated as mfns
rather than gfns present in the guest p2m.
This patch removes a check which curr
Certain memory resources associated with a guest are not necessarily
present in the guest P2M and so are not necessarily available to be
foreign-mapped by a tools domain unless they are inserted, which risks
shattering a super-page mapping.
This patch adds a new memory op to allow such resourced t
Since IOREQ servers are only relevant to HVM guests and all the names in
question unequivocally refer to guest frame numbers, name them all .*gfn
to avoid any confusion.
This patch is purely cosmetic. No semantic or functional change.
Signed-off-by: Paul Durrant
---
Cc: Jan Beulich
Cc: Andrew C
This patch changes use of bool_t to bool in the IOREQ server code. It also
fixes an incorrect indentation in a continuation line.
This patch is purely cosmetic. No semantic or functional change.
Signed-off-by: Paul Durrant
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/dm.c
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> Aliasing FAR_EL1 to IFAR is wrong because on ARMv8 FAR_EL1[31:0] is
> architecturally mapped to DFAR and FAR_EL1[63:32] to DFAR.
Should be IFAR, I guess?
Please put a quid into the copy-and-pas
Hi Jan,
On 22.08.17 10:26, Jan Beulich wrote:
On 21.08.17 at 22:27, wrote:
--- a/xen/include/public/xen.h
+++ b/xen/include/public/xen.h
@@ -930,6 +930,15 @@ __DEFINE_XEN_GUEST_HANDLE(uint16, uint16_t);
__DEFINE_XEN_GUEST_HANDLE(uint32, uint32_t);
__DEFINE_XEN_GUEST_HANDLE(uint64, uint64_t
Hi,
A quick update below.
On 14/08/17 14:54, Julien Grall wrote:
On 14/08/17 08:52, Bhupinder Thakur wrote:
I could not reproduce the issue with the reduced buffer of 16 bytes
also. I think it may not be reproducible on the foundation model. I am
trying to bring up xen on an ARM machine here t
On Thu, Aug 17, 2017 at 07:01:32PM +0200, Olaf Hering wrote:
> Extend API for managing bitmaps. Each bitmap is now represented by a
> generic struct xc_sr_bitmap.
> Switch the existing populated_pfns to this API.
>
> Signed-off-by: Olaf Hering
> +
[...]
> +static inline void xc_sr_bitmap_free(str
On Wed, Aug 09, 2017 at 04:34:02PM -0400, Lan Tianyu wrote:
> This patch is to introduce create, destroy and query capabilities
> command for vIOMMU. vIOMMU layer will deal with requests and call
> arch vIOMMU ops.
>
> Signed-off-by: Lan Tianyu
> ---
> xen/common/domctl.c | 3 +++
> xen
On 22/08/17 15:21, Andre Przywara wrote:
Hi,
Hi Andre,
On 14/08/17 15:23, Julien Grall wrote:
Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
---
xen/include/asm-arm/processor.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/include/asm-arm/proc
On Thu, Aug 17, 2017 at 07:01:31PM +0200, Olaf Hering wrote:
> The macros SUPERPAGE_2MB_SHIFT and SUPERPAGE_1GB_SHIFT will be used by
> other code in libxc. Move the macros to a header file.
>
> Signed-off-by: Olaf Hering
Acked-by: Wei Liu
___
Xen-de
Hi,
On 14/08/17 15:23, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
> ---
> xen/include/asm-arm/processor.h | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h
> index
On Thu, Aug 17, 2017 at 03:57:13PM +0100, Igor Druzhinin wrote:
> We need to choose ACPI tables and ACPI IO port location
> properly depending on the device model version we are running.
> Previously, this decision was made by BIOS type specific
> code in hvmloader, e.g. always load QEMU traditiona
On Thu, Aug 17, 2017 at 02:50:19PM +0300, Alexandru Isaila wrote:
> In some introspection usecases, an in-guest agent needs to communicate
> with the external introspection agent. An existing mechanism is
> HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
> like all other hy
On Wed, Aug 16, 2017 at 02:52:19PM +0200, Juergen Gross wrote:
> Support modifying conswitch, console_timestamps, loglvl and
> guest_loglvl at runtime.
>
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim
On Wed, Aug 16, 2017 at 02:52:17PM +0200, Juergen Gross wrote:
> Add a new libxl function to set hypervisor parameters at runtime
> similar to boot time parameters via command line.
>
> Cc: Ian Jackson
> Cc: Wei Liu
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
> ---
> V2:
> - corrected
On Wed, Aug 16, 2017 at 02:52:16PM +0200, Juergen Gross wrote:
> Add a new libxc function to set hypervisor parameters at runtime
> similar to boot time parameters via command line.
>
> Cc: Ian Jackson
> Cc: Wei Liu
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
___
Hi,
On 14/08/17 15:24, Julien Grall wrote:
> Aliasing FAR_EL2 to HIFAR makes the code confusing because on ARMv8
> FAR_EL2[31:0] is architecturally mapped to HDFAR and FAR_EL2[63:32] to
> FAR_EL2.
^^^
I guess you mean HIFAR here.
Otherwise the patch makes sense.
> See D7.2.30 in ARM DDI 048
On Tue, Aug 22, 2017 at 06:37:15AM -0600, Jan Beulich wrote:
> >>> On 11.08.17 at 18:43, wrote:
> > Make sure the reserved regions are setup before enabling the DMA
> > remapping in the IOMMU, by calling dom0_setup_permissions before
> > iommu_hwdom_init.
>
> I can't match up this part with ...
>
On Tue, Aug 22, 2017 at 06:31:27AM -0600, Jan Beulich wrote:
> >>> On 11.08.17 at 18:43, wrote:
> > On certain Intel systems, as far as I can tell almost all pre-Haswell ones,
> > trying to boot a PVH Dom0 will freeze the box completely, up to the point
> > that
> > not even the watchdog works. T
On Mon, Aug 21, 2017 at 6:07 AM, Julien Grall wrote:
> This email only tracks big items for xen.git tree. Please reply for items you
> woulk like to see in 4.10 so that people have an idea what is going on and
> prioritise accordingly.
>
> You're welcome to provide description and use cases of the
On Tue, Aug 22, 2017 at 06:26:23AM -0600, Jan Beulich wrote:
> >>> On 11.08.17 at 18:43, wrote:
> > They are emulated by Xen, so they must not be mapped into Dom0 p2m.
> > Introduce a helper function to add the MMCFG areas to the list of
> > denied iomem regions for PVH Dom0.
>
> "They are" or "T
flight 112778 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112778/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 7 xen-boot fail REGR. vs. 112673
test-amd64-i386-xl-q
On Fri, Aug 18, 2017 at 01:45:50PM +0800, Chao Gao wrote:
> On Thu, Aug 17, 2017 at 01:28:21PM +0100, Wei Liu wrote:
> >On Thu, Aug 17, 2017 at 12:32:17PM +0100, Wei Liu wrote:
> >> On Wed, Aug 09, 2017 at 04:34:10PM -0400, Lan Tianyu wrote:
> >> > diff --git a/tools/libxl/libxl_dom.c b/tools/libxl
1 - 100 of 196 matches
Mail list logo