flight 112976 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112976/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
On 17-08-30 10:47:37, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:48AM +0800, Yi Sun wrote:
> > int libxl_psr_cat_get_cbm(libxl_ctx *ctx, uint32_t domid,
> > @@ -457,7 +431,33 @@ int libxl_psr_set_val(libxl_ctx *ctx, uint32_t domid,
> >libxl_psr_cbm_type type, li
On 17-08-30 10:23:18, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:45AM +0800, Yi Sun wrote:
> > +static int psr_mba_hwinfo(void)
> > +{
> > +int rc;
> > +unsigned int i, nr;
> > +libxl_psr_hw_info *info;
> > +
> > +rc = libxl_psr_get_hw_info(ctx, &info, &nr,
> > +
Hi all,
After merging the xen-tip tree, today's linux-next build (x86_64
allmodconfig) failed like this:
arch/x86/xen/xen-asm_64.o: In function `xen_trace_page_fault':
(.text+0x174): undefined reference to `trace_page_fault'
Caused by commit
ad5b8c4ba323 ("xen: get rid of paravirt op adjust_e
Sorry for the delay, it looks like this patch resolves the issue.
Tested-by: Crawford, Eric R
-Eric
-Original Message-
From: Gao, Chao
Sent: Monday, August 28, 2017 12:27 AM
To: Crawford, Eric R
Cc: Andrew Cooper ; Roger Pau Monné
; Wei Liu ; George Dunlap
; Ian Jackson ;
Crawford,
flight 112972 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112972/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
Hi all,
Today's linux-next merge of the xen-tip tree got a conflict in:
arch/x86/xen/enlighten_pv.c
between commit:
64b163fab684 ("x86/idt: Unify gate_struct handling for 32/64-bit kernels")
from the tip tree and commit:
ad5b8c4ba323 ("xen: get rid of paravirt op adjust_exception_frame"
Hi all,
Today's linux-next merge of the xen-tip tree got a conflict in:
arch/x86/include/asm/traps.h
between commit:
11a7ffb01703 ("x86/traps: Simplify pagefault tracing logic")
from the tip tree and commit:
ad5b8c4ba323 ("xen: get rid of paravirt op adjust_exception_frame")
from the x
This run is configured for baseline tests only.
flight 72043 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72043/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5202e6c907e5769ac8ecb024b7a07509bdba6181
baseline v
This run is configured for baseline tests only.
flight 72042 xen-4.7-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72042/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64 21
On 17-08-30 10:15:22, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:44AM +0800, Yi Sun wrote:
> > diff --git a/tools/libxl/libxl_psr.c b/tools/libxl/libxl_psr.c
> > index b183305..d7da7d7 100644
> > --- a/tools/libxl/libxl_psr.c
> > +++ b/tools/libxl/libxl_psr.c
> > @@ -382,56 +382,51 @@ s
On 17-08-30 09:58:03, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:43AM +0800, Yi Sun wrote:
> > diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h
> > index c7710b8..81a6f48 100644
> > --- a/tools/libxc/include/xenctrl.h
> > +++ b/tools/libxc/include/xenctrl.h
> >
flight 112953 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112953/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
112863
Tests which did
On 17-08-30 09:42:56, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:42AM +0800, Yi Sun wrote:
> > This patch creates general interfaces in libxl to support all psr
> > allocation features.
> >
> > Add 'LIBXL_HAVE_PSR_MBA' to indicate interface change.
>
> I'm not sure this is enough to c
flight 112969 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112969/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
On 17-08-30 09:31:04, Roger Pau Monn� wrote:
> On Thu, Aug 24, 2017 at 09:14:41AM +0800, Yi Sun wrote:
> > It also changes the memebers in 'cos_write_info' to transfer the
> > feature array, feature properties array and value array. Then, we
> > can write all features values on the cos id into MSRs
flight 112958 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112958/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5202e6c907e5769ac8ecb024b7a07509bdba6181
baseline version:
ovmf c1d799b915096b79b5c5d
flight 112952 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112952/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
On Wed, Aug 30, 2017 at 10:00:49AM -0600, Jan Beulich wrote:
On 16.08.17 at 07:14, wrote:
>> @@ -100,6 +101,24 @@ void vmx_pi_per_cpu_init(unsigned int cpu)
>> spin_lock_init(&per_cpu(vmx_pi_blocking, cpu).lock);
>> }
>>
>> +static void vmx_pi_add_vcpu(struct pi_blocking_vcpu *pbv,
>>
This run is configured for baseline tests only.
flight 72041 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72041/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c1d799b915096b79b5c5d035b134ffbccc6d1469
baseline v
flight 112967 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112967/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
This run is configured for baseline tests only.
flight 72040 xen-4.8-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72040/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win10-i386 16 gues
flight 112963 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112963/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
flight 112951 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112951/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
112938
test-amd64-i386-
flight 112949 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112949/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-17 xen-boot fail REGR. vs. 112809
Tests which did no
flight 112962 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112962/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
On 08/29/2017 07:54 PM, Jérôme Glisse wrote:
> Call to mmu_notifier_invalidate_page() are replaced by call to
> mmu_notifier_invalidate_range() and thus call are bracketed by
> call to mmu_notifier_invalidate_range_start()/end()
>
> Remove now useless invalidate_page callback.
>
> Signed-off-by: Jé
Hi Razvan,
[...]
>> +
>> +*gfn_new = ++(xenaccess->max_gpfn);
> Unnecessary parentheses.
>
Thanks.
>> +rc = xc_domain_populate_physmap_exact(xenaccess->xc_handle, domain_id,
>> 1, 0, 0, gfn_new);
>> +if ( rc < 0 )
>> +goto err;
>> +
>> +/* Copy content of the old gfn i
Hi Razvan,
On 08/30/2017 08:42 PM, Razvan Cojocaru wrote:
> On 08/30/2017 09:32 PM, Sergej Proskurin wrote:
>> diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c
>> index 42e6f09029..66f1d83d84 100644
>> --- a/xen/common/vm_event.c
>> +++ b/xen/common/vm_event.c
>> @@ -29,6 +29,7 @@
>> #
At 13:19 +0100 on 30 Aug (1504099173), Andrew Cooper wrote:
> No functional change.
>
> Signed-off-by: Andrew Cooper
Acked-by: Tim Deegan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
If case of a vm_event with the emulate_flags set, if the instruction
is not implemented by the emulator, the monitor should be notified instead
of directly injecting a hw exception.
This behavior can be used to re-execute an instruction not supported by
the emulator using the real processor (e.g. a
This patchset implements a mechanism which allows XEN to send first an event
if the emulator encountered an unsupported instruction.
The monitor application can choose to mitigate the error, for example to
singlestep
the instruction using the real processor and then resume execution of the normal
Enforce the distinction between an instruction not implemented by the
emulator and the failure to emulate that instruction by defining a new
return code, X86EMUL_UNIMPLEMENTED.
This value should only be used by the core emulator if it fails to decode
the current instruction, and not by any of the
On 08/30/2017 09:32 PM, Sergej Proskurin wrote:
> This commit extends xen-access by a simple test of the functionality
> provided by "xc_altp2m_change_gfn". The idea is to dynamically remap a
> trapping gfn to another mfn, which holds the same content as the
> original mfn. On success, the guest wi
On 08/30/2017 09:32 PM, Sergej Proskurin wrote:
> diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c
> index 42e6f09029..66f1d83d84 100644
> --- a/xen/common/vm_event.c
> +++ b/xen/common/vm_event.c
> @@ -29,6 +29,7 @@
> #include
> #include
> #include
> +#include
Any reason why this
This commit adopts the x86 HVMOP_altp2m_get_domain_state implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v3: Removed the "altp2m_enabled" check in HVMOP_altp2m_get_domain_state
case as it has been moved in front of the switch statement in
This commit extends the function "p2m_mem_access_check" and
"p2m_mem_access_check_and_get_page" to consider altp2m. The function
"p2m_mem_access_check_and_get_page" needs to translate the gva upon the
hostp2m's vttbr, as it contains all valid mappings while the currently
active altp2m view might no
This commit extends xen-access by a simple test of the functionality
provided by "xc_altp2m_change_gfn". The idea is to dynamically remap a
trapping gfn to another mfn, which holds the same content as the
original mfn. On success, the guest will continue to run. Subsequent
altp2m access violations
This commit pulls out generic init/teardown functionality out of
"p2m_init" and "p2m_teardown" into "p2m_init_one", "p2m_teardown_one",
and "p2m_flush_table" functions. This allows our future implementation
to reuse existing code for the initialization/teardown of altp2m views.
Signed-off-by: Ser
This commit introduces the function "altp2m_propagate_change" that is
responsible to propagate changes applied to the host's p2m to a specific
or even all altp2m views. In this way, Xen can in-/decrease the guest's
physmem at run-time without leaving the altp2m views with
stalled/invalid entries.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v3: Extended the function "altp2m_switch_domain_altp2m_by_id" so that if
the guest domain indirectly calles this function, the current vcpu also
changes the altp2m view without performing an explicit context
In this commit, we rename the function "p2m_altp2m_check" to
"altp2m_check". This is a preparation measure for the following commit
which moves the renamed function "altp2m_check" from p2m.c to altp2m.c
in order to group all altp2m-related functions to one spot (which is
altp2m.c). The reason for
This commit changes the prototype and implementation of the functions
"p2m_alloc_vmid" and "p2m_free_vmid". The function "p2m_alloc_vmid" does
not expect the struct domain as argument anymore and returns an
allocated vmid. The function "p2m_free_vmid" takes only the vmid that is
to be freed as argu
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Dump p2m information of the hostp2m and all altp2m views.
v4: Adjust printk format.
---
xen/arch/arm/p2m.c | 20
1 file changed, 20 insertions(+)
diff --git a/xen/arch/arm/p2m.c b/xen/arch
In this commit, we move the function "altp2m_check" from p2m.h to altp2m.h in
order to group all altp2m-related functions in one point, namely in
altp2m.{c|h}. This commit moves solely the arm code.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v4: This commit
This commit makes sure that the page reference count is updated through
the function "p2m_put_l3_page" only when the entries have been freed
from the host's p2m.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
v4: Moved the check for the host's p2m from "p2m_free_en
The function "p2m_alloc_table" should be able to allocate 2nd stage
translation tables not only for the host's p2m but also for alternate
p2m's.
Signed-off-by: Sergej Proskurin
Acked-by: Julien Grall
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Removed altp2m table initialization from "
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/include/asm-arm/altp2m.h | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/xen/include/asm-arm/altp2m.h b/xen/include/asm-arm/altp2m.h
index f9e14ab1dc..eff6bd5a38 100644
--- a/xen/include/a
We move the macros (MAX|INVALID)_ALTP2M out of x86-related code to
common code, as the following patches will make use of them on ARM.
Signed-off-by: Sergej Proskurin
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc:
The function get_page_from_gva uses ARM's hardware support to translate
gva's to machine addresses. This function is used, among others, for
memory regulation purposes, e.g, within the context of memory ballooning.
To ensure correct behavior while altp2m is in use, we use the host's p2m
table for t
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Substituted the call to tlb_flush for p2m_flush_table.
Added comments.
Cosmetic fixes.
v3: Changed the locking mechanism to "p2m_write_lock" inside the
function "altp2m_destroy_by_id".
Do not fl
This commit adapts the function "p2m_restore_state" in a way that the
currently active altp2m table is considered during state restoration.
Signed-off-by: Sergej Proskurin
Acked-by: Julien Grall
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v3: Moved declaration of "altp2m_switch_domain_altp
In this commit, we move the function "altp2m_check" from p2m.c to altp2m.c in
order to group all altp2m-related functions in one point, namely in
altp2m.{c|h}. This commit moves solely the x86 code.
Signed-off-by: Sergej Proskurin
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Raz
The HVMOP_altp2m_set_mem_access allows to set gfn permissions of
(currently one page at a time) of a specific altp2m view. In case the
view does not hold the requested gfn entry, it will be first copied from
the host's p2m table and then modified as requested.
Signed-off-by: Sergej Proskurin
---
The current implementation differentiates between flushing and
destroying altp2m views. This commit adds the function altp2m_flush,
which allows to release all of the alternate p2m views. To make sure
that we flush alternate p2m's only if they are not used by any vCPU, we
introduce a counter that t
This commit introduces macros for switching and restoring the vttbr
considering the currently set irq flags. We define these macros, as the
following commits will use the associated functionality multiple times
throughout different files.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
The p2m initialization now invokes initialization routines responsible
for the allocation and initialization of altp2m structures. The same
applies to teardown routines. The functionality has been adopted from
the x86 altp2m implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabelli
Signed-off-by: Sergej Proskurin
Acked-by: Julien Grall
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Cosmetic fixes.
v3: Cosmetic fixes.
Renamed the function "altp2m_init_next" to
"altp2m_init_next_available".
Exchanged the check "altp2m_vttbr[idx] == INVALID_VTTBR" for
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a
specific domain. This commit adopts the x86
HVMOP_altp2m_set_domain_state implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Dynamically allocate memory for altp2m views only when n
This commit copies and extends the altp2m-related code from x86 to ARM.
Functions that are no yet supported notify the caller or print a BUG
message stating their absence.
Currently, we prohibit concurrent access of the altp2m interface by
locking the entire domain. As stated in the provided TODO
This commit introduces the macro "p2m_get_active_p2m" returning the
currently active (alt)p2m. The need for this macro will be shown in the
following commits.
Signed-off-by: Sergej Proskurin
Acked-by: Julien Grall
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v4: Moved the introduced macro f
The previous libxl implemention limited the use of altp2m to x86 HVM domains.
This commit extends libxl by introducing the altp2m switch to ARM domains.
Additionally, we introduce the macro LIBXL_HAVE_ARM_ALTP2M in parallel to the
former LIBXL_HAVE_ALTP2M to differentiate between altp2m for x86 an
From: Tamas K Lengyel
Currently, the altp2m feature has been used and thus documented for the
x86 architecture. As we aim to introduce altp2m to ARM, in this commit,
we adjust the documentation by pointing out x86 only parts and thus make
clear that the modes XEN_ALTP2M_external and XEN_ALTP2M_di
This commit introduces the functions hvm_allow_(set|get)_param. These
can be used as a filter controlling access to HVM params. This
functionality has been inspired by the x86 implementation.
The introduced filter ensures that the HVM param HVM_PARAM_ALTP2M is set
once and not altered by guest dom
This commit adds a p2m class to the struct p2m_domain to distinguish
between the host's original p2m and alternate p2m's. The need for this
functionality will be shown in the following commits.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v4: Change return typ
In this commit, we extend the function prototype of "__p2m_get_mem_access" to
hold an argument of type "struct p2m_domain*", as we need to distinguish
between the host's p2m and different altp2m views.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v3: Changed t
Signed-off-by: Sergej Proskurin
Acked-by: Razvan Cojocaru
---
Cc: Razvan Cojocaru
Cc: Tamas K Lengyel
Cc: Ian Jackson
Cc: Wei Liu
---
tools/tests/xen-access/xen-access.c | 33 -
1 file changed, 20 insertions(+), 13 deletions(-)
diff --git a/tools/tests/xen-ac
This commit does not change or introduce any additional functionality
but rather is a part of the following commit that alters the
functionality of the function "p2m_alloc_vmid".
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/p2m.c | 12 ++-
This commit adds the functionality to change mfn mappings for specified
gfn's in altp2m views. This mechanism can be used within the context of
VMI, e.g., to establish stealthy debugging.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v3: Moved the altp2m_lock t
This commit extends the prototype of the function "p2m_put_l3_page" by
an additional function parameter of type "struct p2m_domain*". This is
needed as a future commit will extend the function "p2m_put_l3_page" so
that we can call "put_page" only if the p2m being modified is the
hostp2m.
Signed-of
Hi all,
The following patch series can be found on Github[0] and is part of my
contribution to last year's Google Summer of Code (GSoC)[1]. My project is
managed by the organization The Honeynet Project. As part of GSoC, I was being
supervised by the Xen maintainer Tamas K. Lengyel , George
D. Web
This commit adds the function "altp2m_lazy_copy" implementing the altp2m
paging mechanism. The function "altp2m_lazy_copy" lazily copies the
hostp2m's mapping into the currently active altp2m view on 2nd stage
translation faults on instruction or data access.
Signed-off-by: Sergej Proskurin
---
C
In ./xen/arch/arm/p2m.c, we compare the gfn's with INVALID_GFN
throughout the code. Thus it makes sense to use the macro INVALID_GFN
instead of a hard coded value to initialize "p2m->lowest_mapped_gfn".
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/ar
This commit changes the prototypes of the following functions:
- p2m_insert_mapping
- p2m_remove_mapping
These changes are required as our implementation reuses most of the
existing ARM p2m implementation to set page table attributes of the
individual altp2m views. Therefore, exiting function prot
This commit adds the function "altp2m_switch_vcpu_altp2m_by_id" that is
executed after checking whether the vcpu should be switched to a different
altp2m within the function "altp2m_check".
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v3: This commit has been
flight 112950 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112950/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 debian-hvm-install fail
REGR. vs. 112918
Tests w
Signed-off-by: Jianfeng Tan
---
MAINTAINERS |1 -
examples/Makefile |1 -
examples/vhost_xen/Makefile | 52 --
examples/vhost_xen/main.c | 1522 ---
examples/vhost_xen/main.h | 66 --
Following the calls on the mailing list:
http://dpdk.org/ml/archives/dev/2017-June/068151.html
The Technical Board decided to drop Xen dom0 support from EAL:
http://dpdk.org/ml/archives/dev/2017-June/068615.html
This series remove xen dom0 support in DPDK, as well as xenvirt PMD and
vhost_
Signed-off-by: Jianfeng Tan
---
MAINTAINERS | 2 -
app/test-pmd/Makefile | 4 -
app/test-pmd/testpmd.c | 12 -
config/common_base | 5 -
config/defconfig_arm-armv7a-linuxapp-
Signed-off-by: Jianfeng Tan
---
drivers/crypto/qat/qat_qp.c | 7 +--
drivers/net/i40e/i40e_rxtx.c | 8 ++--
lib/librte_ether/rte_ethdev.c| 7 +--
lib/librte_mempool/rte_mempool.c | 8 ++--
4 files changed, 6 insertions(+), 24 deletions(-)
diff --git a/drivers/crypto/
Previously, to get MFN address in dom0, this API is a wrapper to
obtain the "physical address".
As we removed xen dom0 support, this API is not necessary.
Signed-off-by: Jianfeng Tan
---
doc/guides/rel_notes/release_17_11.rst | 2 ++
drivers/net/e1000/em_rxtx.c| 4 ++--
driv
Signed-off-by: Jianfeng Tan
---
app/test-pmd/testpmd.c | 2 +-
examples/ip_pipeline/app.h | 4 --
examples/ip_pipeline/config_parse.c | 19 -
examples/ip_pipeline/init.c | 5 ---
examples/kni/main.c | 3 --
test/test/process.h
On 30/08/17 18:11, Wei Liu wrote:
> Provide a unified entry to avoid going through pte look-up, decode and
> emulation cycle more than necessary. The path taken is determined by
> the faulting address.
>
> Note that the order of checks is changed in the new function, but the
> order of the checks i
flight 112960 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112960/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
On 10/08/17 14:26, Andrew Cooper wrote:
> On 10/08/17 12:24, Juergen Gross wrote:
>> Today the maximum record lenth in a migration stream is 8MB. This
>> limits the size of a PV domain to a little bit less than 1TB in the
>> migration case, as the P2M frame list will exceed 8MB in this case.
>>
>>
On 30/08/17 18:11, Wei Liu wrote:
> diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
> index ed80df02fa..5b840cc603 100644
> --- a/xen/arch/x86/mm.c
> +++ b/xen/arch/x86/mm.c
> @@ -4956,9 +4956,9 @@ long arch_memory_op(unsigned long cmd,
> XEN_GUEST_HANDLE_PARAM(void) arg)
> */
>
> struct p
Wei Liu (3):
x86/mm: introduce trace point for mmio_ro emulation
x86/mm: don't wrap x86_emulate_ctxt in ptwr_emulate_ctxt
x86/mm: merge ptwr and mmio_ro page fault handlers
xen/arch/x86/mm.c| 325 +++
xen/arch/x86/traps.c | 20
Provide a unified entry to avoid going through pte look-up, decode and
emulation cycle more than necessary. The path taken is determined by
the faulting address.
Note that the order of checks is changed in the new function, but the
order of the checks is performed shouldn't matter.
The sole calle
Using ptrw_emulation trace point is wrong.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 2 +-
xen/include/asm-x86/perfc_defn.h | 1 +
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 1f23470cef..ed80df02fa 100644
--- a/xen
Rewrite the code so that it has the same structure as
mmio_ro_emualte_ctxt. The new code doesn't contain x86_emulate_ctxt
anymore but a pointer to the x86_emulate_ctxt; x86_emulate_ctxt now
also points to ptwr_emulate_ctxt via its data pointer.
This patch will help unify mmio_ro and ptwr code path
Hi Jan,
The main use-case for the new return code is to have a clear distinction
between an instruction not implemented by the emulator (e.g. ?fldenv or
fnstenv) and the failure to emulate .
- hvm_process_io_incercept returns X86EMUL_UNHANDLEABLE if one of the
hvm_io_ops (read/write) failed
flight 112948 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112948/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1 build-chec
This run is configured for baseline tests only.
flight 72039 xen-4.9-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72039/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 16 guest
Hi Jan,
On 23.08.17 14:29, Jan Beulich wrote:
On 23.08.17 at 13:08, wrote:
On 23.08.17 11:10, Jan Beulich wrote:
On 22.08.17 at 16:37, wrote:
I can't see why you want to map UUID to a certain structure.
This is so that the type cannot mistakenly be passed to a function
taking unsigned cha
On Tue, Aug 29, 2017 at 2:01 PM, Daniel Kiper wrote:
> Hey Tamas,
>
> Sorry for late reply. I was on vacation.
>
> On Tue, Aug 22, 2017 at 09:01:06PM -0600, Tamas K Lengyel wrote:
>> On Tue, May 16, 2017 at 5:04 AM, Daniel Kiper
>> wrote:
>
> [...]
>
>> > UEFI will verify shim secure boot signat
>>> On 30.08.17 at 17:57, wrote:
> On 30/08/17 16:45, Jan Beulich wrote:
> On 30.08.17 at 14:19, wrote:
>>> @@ -2772,23 +2772,23 @@ int vcpu_destroy_pagetables(struct vcpu *v)
>>> return rc != -EINTR ? rc : -ERESTART;
>>> }
>>>
>>> -int new_guest_cr3(unsigned long mfn)
>>> +int new_gu
>>> On 16.08.17 at 07:14, wrote:
> @@ -100,6 +101,24 @@ void vmx_pi_per_cpu_init(unsigned int cpu)
> spin_lock_init(&per_cpu(vmx_pi_blocking, cpu).lock);
> }
>
> +static void vmx_pi_add_vcpu(struct pi_blocking_vcpu *pbv,
> +struct vmx_pi_blocking_vcpu *vpbv)
> +
On 30/08/17 16:45, Jan Beulich wrote:
On 30.08.17 at 14:19, wrote:
>> @@ -2772,23 +2772,23 @@ int vcpu_destroy_pagetables(struct vcpu *v)
>> return rc != -EINTR ? rc : -ERESTART;
>> }
>>
>> -int new_guest_cr3(unsigned long mfn)
>> +int new_guest_cr3(mfn_t mfn)
>> {
>> struct vcp
flight 112959 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112959/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956
Tests which
On Wed, Aug 30, Wei Liu wrote:
> > Can this actually happen with the available senders? If not, this is
> > again the missing memory map.
> Probably not now, but as said, you shouldn't rely on the structure of
> the stream unless it is stated in the spec.
Well, what can happen with todays impleme
1 - 100 of 198 matches
Mail list logo