> From: Julien Grall [mailto:julien.gr...@arm.com]
> Sent: Thursday, September 14, 2017 2:00 AM
>
> Signed-off-by: Julien Grall
>
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Razvan Cojocaru
> Cc: Tamas K Lengyel
> Cc: George Dunlap
> Cc: Jun Nakajima
> Cc: Kevin Tian
Reviewed-by: Kevin T
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, September 14, 2017 4:57 PM
>
> The recent changes to their handling introduced a few false warnings,
> due to checks looking at the wrong string slot. While going through all
> those commits and looking for patterns similar to the "d
On 9/7/2017 10:27 PM, Andre Przywara wrote:
Hi,
On 05/09/17 18:14, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
This patch extends the gicv3_iomem_deny_access functionality by adding
support for ITS region as well. Add function gicv3_its_deny_access.
Signed-off-by: Manish Jaggi
---
On 17-09-19 12:02:08, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:35PM +0800, Yi Sun wrote:
> > diff --git a/tools/libxl/libxl_psr.c b/tools/libxl/libxl_psr.c
> > index c8d2921..78d5bc5 100644
> > --- a/tools/libxl/libxl_psr.c
> > +++ b/tools/libxl/libxl_psr.c
> > @@ -71,16 +71,30 @@ sta
Instead of attaching the ARM specific grant table data to the domain
structure add it to struct grant_table. Add the needed arch functions
to the asm-*/grant_table.h includes.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
---
V7:
- re-add #include in grant_table.h (Julien Grall)
---
x
Instead of using the same global resource limits of grant tables (max.
number of grant frames, max. number of maptrack frames) for all domains
make these limits per domain. Set those per-domain limits in
grant_table_set_limits().
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
---
V6:
- s
The x86 and arm versions of XENMAPSPACE_grant_table handling are nearly
identical. Move the code into a function in grant_table.c and add an
architecture dependant hook to handle the differences.
Switch to mfn_t in order to be more type safe.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durran
The boot parameters gnttab_max_frames and gnttab_max_maptrack_frames
are used for dom0 only now, as all other domains require a
XEN_DOMCTL_set_gnttab_limits call now. So make that explicit by
setting the boot values for dom0 only.
While updating the documentation regarding new scope of the boot
pa
Delay the allocation of the grant table sub structures in order to
allow modifying parameters needed for sizing of these structures at a
per domain basis. Allocate the structures from gnttab_setup_table()
and the table frames only from grant_table_set_limits() (dom0: from
grant_table_create()).
Si
When creating a Xenstore stubdom set the grant limits: the stubdom
will need to setup a very limited amount of grants only, so 4 grant
frames are enough. For being able to support up to 32768 domains it
will need 128 maptrack frames (1 mapping per domain, 256 maptrack
entries per maptrack frame).
Add the maximum possible mfn to struct xen_sysctl_physinfo in order to
enable Xen tools to size the grant table frame limits for a domU.
Signed-off-by: Juergen Gross
---
xen/common/sysctl.c | 1 +
xen/include/public/sysctl.h | 2 ++
2 files changed, 3 insertions(+)
diff --git a/xen/comm
Many definitions can be moved from xen/grant_table.h to
common/grant_table.c now, as they are no longer used in other sources.
Rearrange the elements of struct grant_table to minimize holes due to
alignment of elements.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Reviewed-by: Wei Liu
Add the maximum possible mfn of the host to the libxl_physinfo
data structure.
Signed-off-by: Juergen Gross
Acked-by: Ian Jackson
---
tools/libxl/libxl.c | 1 +
tools/libxl/libxl.h | 9 +
tools/libxl/libxl_types.idl | 1 +
3 files changed, 11 insertions(+)
diff --git a/
Add a domctl hypercall to set the domain's resource limits regarding
grant tables.
Signed-off-by: Juergen Gross
Acked-by: Daniel De Graaf
---
V8:
- remove stale #if 0, adjust comments (Paul Durrant)
V6:
- moved earlier in series to support set_gnttab_limits being
mandatory for domain creation
Add a function for obtaining the highest possible physical memory
address of the system. This value is influenced by:
- hypervisor configuration (CONFIG_BIGMEM)
- processor capability (max. addressable physical memory)
- memory map at boot time
- memory hotplug capability
The value is especially
Currently Linux has no support for grant v2 as this would reduce the
maximum number of active grants by a factor of 2 compared to v1,
because the number of possible grants are limited by the allowed number
of grant frames and grant entries of v2 need twice as much bytes as
those of v1.
Unfortunate
On very large hosts a guest needs to know whether it will have to
handle frame numbers larger than 32 bits in order to select the
appropriate grant interface version.
Add a new Xen specific CPUID node to contain the maximum guest address
width similar to the x86 CPUID node 0x8008 containing th
Add xl.conf config items for default values of grant limits:
max_grant_frames will set the default for the maximum number of grant
frames for a domain which will take effect if the domain's config file
doesn't specify a value. If max_grant_frames isn't set in xl.conf it
will default to 32 for host
Add a new libxc function xc_domain_set_gnttbl_limits() setting the
limits for the maximum numbers of grant table frames and maptrack
frames of a domain.
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Acked-by: Wei Liu
Acked-by: Ian Jackson
---
V4:
- use domid_t (Wei Liu)
---
tools/lib
Add new domain config items for setting the limits for the maximum
numbers of grant table frames and maptrack frames of a domain.
Signed-off-by: Juergen Gross
Acked-by: Ian Jackson
---
V6:
- made set_gnttab_limits hypercall mandatory, taking defaults from
xl.conf
V4:
- rename configuration it
>>> On 20.09.17 at 00:23, wrote:
> On Mon, Sep 18, 2017 at 2:58 AM, Jan Beulich wrote:
> On 14.09.17 at 18:20, wrote:
>>> Of course, you can grab them from here:
>>> https://drive.google.com/drive/folders/0B5duyI9SzNtWaXE0cjM1QzZJbVk?usp=shar
>>>
>>> ing
>>
>> So the dumps of the two (usin
On 18/09/17 11:03, Colin King wrote:
> From: Colin Ian King
>
> In the case where sizeof(maddr) != sizeof(long) p is initialized and
> never read and clang throws a warning on this. Move declaration of
> p to clean up the clang build warning:
>
> warning: Value stored to 'p' during its initiali
On 17-09-19 11:34:22, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:34PM +0800, Yi Sun wrote:
> > @@ -325,12 +325,12 @@ int libxl_psr_cat_set_cbm(libxl_ctx *ctx, uint32_t
> > domid,
> > }
> >
> > libxl_for_each_set_bit(socketid, *target_map) {
> > -xc_psr_cat_type xc_t
On 17-09-19 11:32:19, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:33PM +0800, Yi Sun wrote:
> > index 6baaed2..a01245d 100644
> > --- a/tools/xl/xl_cmdtable.c
> > +++ b/tools/xl/xl_cmdtable.c
> > +static int psr_mba_hwinfo(void)
> > +{
> > +int rc;
> > +unsigned int i, nr;
> > +
On 17-09-19 11:28:18, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:32PM +0800, Yi Sun wrote:
> > diff --git a/tools/libxl/libxl_psr.c b/tools/libxl/libxl_psr.c
> > index dd412cc..d534ec2 100644
> > --- a/tools/libxl/libxl_psr.c
> > +++ b/tools/libxl/libxl_psr.c
> > @@ -382,60 +382,49 @@ s
On 17-09-19 11:15:11, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:31PM +0800, Yi Sun wrote:
> > diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h
> > index c7710b8..bbdf8e2 100644
> > --- a/tools/libxc/include/xenctrl.h
> > +++ b/tools/libxc/include/xenctrl.h
> >
flight 113611 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113611/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3866 xen-buildfail REGR. vs. 113387
test-amd64-amd64-x
Per Jan's suggestion, remove people not related to tools/ patches to save
mailbox space.
> On Tue, Sep 05, 2017 at 05:32:30PM +0800, Yi Sun wrote:
> > diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
> > index 484b5b7..9744087 100644
> > --- a/tools/libxl/libxl.h
> > +++ b/tools/libxl/libxl.
On 17-09-19 10:57:16, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:29PM +0800, Yi Sun wrote:
[...]
> > +static bool cat_check_cbm(const struct feat_node *feat, unsigned long cbm)
> > +{
> > +unsigned int first_bit, zero_bit;
> > +unsigned int cbm_len = feat->cat.cbm_len;
> > +
>
On 17-09-19 10:15:42, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:28PM +0800, Yi Sun wrote:
> > diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
> > index 696eff2..7902af7 100644
> > --- a/xen/arch/x86/domctl.c
> > +++ b/xen/arch/x86/domctl.c
> > @@ -1496,6 +1496,13 @@ long arc
On 17-09-19 10:08:22, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:27PM +0800, Yi Sun wrote:
> > diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c
> > index 10776d2..0486d2d 100644
> > --- a/xen/arch/x86/psr.c
> > +++ b/xen/arch/x86/psr.c
> > @@ -491,7 +495,18 @@ static const struct fe
This run is configured for baseline tests only.
flight 72129 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72129/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 424a5ec33b3d5a842bff3f4695d0bd709c91a163
baseline v
This run is configured for baseline tests only.
flight 72128 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72128/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 7 xen-boot
On 17-09-19 09:55:28, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:26PM +0800, Yi Sun wrote:
> > This patch implements main data structures of MBA.
> >
> > Like CAT features, MBA HW info has cos_max which means the max thrtl
> > register number, and thrtl_max which means the max throttle
On 17-09-19 09:03:38, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:24PM +0800, Yi Sun wrote:
> > diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
> > index 0669c31..a953157 100644
> > --- a/xen/include/public/domctl.h
> > +++ b/xen/include/public/domctl.h
> > -struct
On 17-09-18 18:16:40, Roger Pau Monn� wrote:
> On Tue, Sep 05, 2017 at 05:32:23PM +0800, Yi Sun wrote:
> > +* xl interfaces:
> > +
> > + 1. `psr-mba-show [domain-id]`:
>
> Is this limited to domain-id, or one can also use the domain name?
> Most of the xl commands accept either a domain-id or a d
On 17-09-19 00:07:36, Jan Beulich wrote:
> >>> Roger Pau Monné 09/18/17 7:21 PM >>>
> >On Tue, Sep 05, 2017 at 05:32:23PM +0800, Yi Sun wrote:
> >> +## Hardware perspective
> >> +
> >> + MBA defines a range of MSRs to support specifying a delay value (Thrtl)
> >> per
> >> + COS, with details be
> From: Roger Pau Monné [mailto:roger@citrix.com]
> Sent: Monday, September 18, 2017 5:10 PM
>
> On Mon, Sep 18, 2017 at 05:05:18PM +0800, Haozhong Zhang wrote:
> > On 09/18/17 02:30 -0600, Jan Beulich wrote:
> > > >>> On 18.09.17 at 10:18, wrote:
> > > >> From: Jan Beulich [mailto:jbeul...@
flight 113612 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113612/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
flight 113607 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113607/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
113302
test-armhf
flight 113605 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113605/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemut-win7-amd64 18 guest-start/win.repeat fail blocked in
113594
test-amd64-amd64-xl-qemuu-win7
On Wed, 20 Sep 2017, Lars Kurth wrote:
> Felipe, Simon,
> a quick note to let you know that the Advisory Board in today’s AB meeting
> decided to endorse your proposal.
> Let me know how you proceed: from my perspective, we can kick off a formal
> vote before you make modifications to the proposa
On Tue, 12 Sep 2017, Julien Grall wrote:
> Hi all,
>
> This patch series contains clean-up for the ARM memory subsystem in
> preparation
> of reworking the page tables handling.
>
> A branch with the patches can be found on xenbits:
>
> https://xenbits.xen.org/git-http/people/julieng/xen-unstab
Felipe, Simon,
a quick note to let you know that the Advisory Board in today’s AB meeting
decided to endorse your proposal.
Let me know how you proceed: from my perspective, we can kick off a formal vote
before you make modifications to the proposal, but I think it is better to post
v2 first.
La
On Tue, 12 Sep 2017, Julien Grall wrote:
> This will help to consolidate the page-table code and avoid different
> path depending on the action to perform.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Andre Przywara
Much better now, thanks!
Reviewed-by: Stefano Stabellini
> ---
>
> Cc: K
On Tue, 12 Sep 2017, Julien Grall wrote:
> Currently, it is not possible to specify the permission of a new
> mapping. It would be necessary to use the function modify_xen_mappings
> with a different set of flags.
>
> Introduce a couple of new flags for the permissions (Non-eXecutable,
> Read-Only
On Tue, 12 Sep 2017, Julien Grall wrote:
> Currently MAIRVAL is defined in term of MAIR0VAL and MAIR1VAL which are
> both hardcoded value. This makes quite difficult to understand the value
> written in both registers.
>
> Rework the definition by using value of each attribute shifted by their
> a
flight 113608 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113608/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 424a5ec33b3d5a842bff3f4695d0bd709c91a163
baseline version:
ovmf a3a4737051010a94832f7
On Tue, 12 Sep 2017, Julien Grall wrote:
> This is based on the Linux ARMv8 naming scheme (see arch/arm64/mm/proc.S).
> Each
> type will contain "NORMAL" or "DEVICE" to make clear whether each attribute
> targets device or normal memory.
>
> Signed-off-by: Julien Grall
>
> ---
>
> Changes
On Tue, 12 Sep 2017, Julien Grall wrote:
> DEV_WC is only used for PAGE_HYPERVISOR_WC and does not bring much
> improvement.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Andre Przywara
>
> ---
>
> Changes in v2:
> - Remove DEV_WC from the comment as well
> - Add Andre's r
On Tue, 12 Sep 2017, Julien Grall wrote:
> They were imported from non-LPAE Linux, but Xen is LPAE only. It is time
> to do some clean-up in the memory attribute and keep only what make
> sense for Xen. Follow-up patch will do more clean-up.
>
> Also, update the comment saying our attribute matche
On Tue, 12 Sep 2017, Julien Grall wrote:
> Currently, all the new mappings will be read-write non-executable. Allow the
> caller to use other permissions.
>
> Signed-off-by: Julien Grall
>
> ---
> Changes in v2:
> - Switch the runtime check to a BUG_ON()
Since you are at it, could y
On Tue, 12 Sep 2017, Julien Grall wrote:
> The parameter 'ai' is used either for attribute index or for
> permissions. Follow-up patch will rework that parameters to carry more
> information. So rename the parameter to 'flags'.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Andre Przywara
Revie
On Tue, 12 Sep 2017, Julien Grall wrote:
> Currently, the flags used to update page tables (i.e PAGE_HYPERVISOR_*)
> only contains the memory attribute index. Follow-up patches will add
> more information in it. So document the current layout.
>
> At the same time introduce PAGE_AI_MASK to get the
On Tue, 12 Sep 2017, Julien Grall wrote:
> We should consider the early boot period to end when we stop using the
> boot allocator. This is inline with x86 and will be helpful to know
> whether we should allocate memory from the boot allocator or xenheap.
>
> Signed-off-by: Julien Grall
> Reviewe
On Tue, 12 Sep 2017, Julien Grall wrote:
> The description of AP[1] in Xen is based on testing rather than the ARM
> ARM.
>
> Per the ARM ARM, on EL2 stage-1 page table, AP[1] is RES1 as the
> translation regime applies to only one exception level (see D4.4.4 and
> G4.6.1 in ARM DDI 0487B.a).
>
>
On Sat, 16 Sep 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 09/16/2017 12:56 AM, Stefano Stabellini wrote:
> > On Tue, 12 Sep 2017, Julien Grall wrote:
> > > This add a bit more safety in the memory subsystem code.
> > >
> > > Signed-off-by: Julien Grall
> > > ---
> > > xen/arch/arm/mm.c | 1
On Mon, 18 Sep 2017, Felipe Huici wrote:
> Hi Lars, all,
>
> [cc’ing authors of Erlang on Xen, HalVM and Rump].
>
> Thanks everyone for all of the support and useful comments. We’ve
> incorporated a number of them into a new version of the document (attached
> and pasted at the bottom for conveni
On Mon, Sep 18, 2017 at 2:58 AM, Jan Beulich wrote:
On 14.09.17 at 18:20, wrote:
>> Of course, you can grab them from here:
>> https://drive.google.com/drive/folders/0B5duyI9SzNtWaXE0cjM1QzZJbVk?usp=shar
>> ing
>
> So the dumps of the two (using my own tool) are identical except for
> the ex
flight 113603 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113603/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 18 guest-start/win.repeat fail blocked in
112503
test-amd64-amd64-xl-qemut-win7-
Hi Julien,
On 13.09.17 14:11, Julien Grall wrote:
Hi,
On 08/31/2017 09:09 PM, Volodymyr Babchuk wrote:
+static void fill_uuid(struct cpu_user_regs *regs, const xen_uuid_t *u)
Actually why do you pass a pointer for u? This requires every caller to
introduce temporary variable because the U
flight 113602 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113602/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 15 guest-saverestorefail REGR. vs. 113387
Tests which are fa
On Tue, 19 Sep 2017, Boris Ostrovsky wrote:
> On 09/18/2017 06:35 PM, Tycho Andersen wrote:
> > This is unused, and conflicts with the definition that we'll add for XPFO.
> >
> > Signed-off-by: Tycho Andersen
> > CC: Boris Ostrovsky
> > CC: Juergen Gross
> > CC: Stefano Stabellini
> > ---
> > T
flight 113610 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113610/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Hey,
This is v4 taking into consideration all comments received from v3 (changelog
in the first patch). The specification is right after the diffstat.
Reference implementation also here (on top of net-next):
https://github.com/jpemartins/linux.git xen-net-stg-gnts-v3
Cheers,
Joao Martins (1):
Adds 3 messages to allow guest to let backend keep grants mapped,
such that 1) guests allowing fast recycling of pages can avoid doing
grant ops for those cases, or otherwise 2) preferring copies over
grants and 3) always using a fixed set of pages for network I/O.
The three control ring messages
On Tue, 19 Sep 2017, Wei Liu wrote:
> On Tue, Sep 19, 2017 at 12:25:53PM +0100, Julien Grall wrote:
> > The header public/arch-arm.h contains mostly ARM specific code. Avoid CC
> > the "THE REST" maintainers on it.
> >
> > Signed-off-by: Julien Grall
>
> Acked-by: Wei Liu
Reviewed-by: Stefano
This run is configured for baseline tests only.
flight 72127 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72127/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a3a4737051010a94832f7bceaa1fa414d7259da0
baseline v
flight 113606 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113606/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl broken
test-armhf-arm
Provide an implementation of the old policy as a callback in
libxl and plumb it through the IPC machinery to libxc.
This serves as an example for defining a libxl policy,
and provides no advantage over the default policy in libxc.
Signed-off-by: Joshua Otto
---
I have included this patch, as rf
This Patch allows a migration precopy policy to be specified.
The precopy phase of the xc_domain_save() live migration algorithm has
historically been implemented to run until either a) (almost) no pages
are dirty or b) some fixed, hard-coded maximum number of precopy
iterations has been exceeded.
Tidy up libxc's xc_domain_save, removing unused paramaters
max_iters and max_factor, making matching changes to libxl.
Signed-off-by: Joshua Otto
Signed-off-by: Jennifer Herbert
Reviewed-by: Paul Durrant
Acked-by: Wei Liu
---
tools/libxc/include/xenguest.h | 4 ++--
tools/libxc/xc_nomigrate
Hi all,
v2:
Have tidied some formatting, s.o.b Joshua, and added a RFC patch
showing how to use this in libxl.
v1:
Here I present a updated/modified subset of patch 7/20, part of
Joshua Otto's "Add postcopy live migration support." patch,
dated 27th March 2017. As indicated on the original th
flight 72123 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72123/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-daily-netboot-pvgrub 10 debian-di-install fail REGR.
vs. 7209
Hi all,
Quick reminder, the call will be tomorrow (Wednesday 20th) at 5pm BST.
The details to join the call are:
Call+44 1223 406065 (Local dial in)
and enter the access code below followed by # key.
Participant code: 4915191
Mobile Auto Dial:
VoIP: voip://+441223406065;491
>>> On 19.09.17 at 17:40, wrote:
>> --- a/xen/arch/x86/hvm/io.c
>> +++ b/xen/arch/x86/hvm/io.c
>> @@ -257,17 +257,11 @@ void register_g2m_portio_handler(struct domain *d)
>> }
>>
>> unsigned int hvm_pci_decode_addr(unsigned int cf8, unsigned int addr,
>> - unsign
On 19/09/17 17:55, Jan Beulich wrote:
On 19.09.17 at 11:58, wrote:
>> --- a/xen/common/grant_table.c
>> +++ b/xen/common/grant_table.c
>> @@ -40,6 +40,45 @@
>> #include
>> #include
>>
>> +/* Per-domain grant information. */
>> +struct grant_table {
>> +/*
>> + * Lock protecting
>>> On 19.09.17 at 11:58, wrote:
> --- a/xen/common/grant_table.c
> +++ b/xen/common/grant_table.c
> @@ -40,6 +40,45 @@
> #include
> #include
>
> +/* Per-domain grant information. */
> +struct grant_table {
> +/*
> + * Lock protecting updates to grant table state (version, active
> +
This run is configured for baseline tests only.
flight 72125 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72125/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 91cc526b15ffbbbdec5a57906596f37e059f80be
baseline v
flight 113596 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113596/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-armhf-pvops 5 host-bui
> -Original Message-
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: 19 September 2017 16:29
> To: xen-de...@lists.xenproject.org
> Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
> ; Paul Durrant ; Jan
> Beulich ; Andrew Cooper
> ; George Dunlap
> ; Ia
>>> On 19.09.17 at 17:28, wrote:
> On Ma, 2017-09-19 at 00:11 -0600, Jan Beulich wrote:
>> > > > Razvan Cojocaru 09/18/17 7:05 PM
>> > On 09/18/2017 06:35 PM, Jan Beulich wrote:
>> > > > > > On 12.09.17 at 15:53, wrote:
>> > > > --- a/xen/arch/x86/domctl.c
>> > > > +++ b/xen/arch/x86/domctl.c
>>
On Tue, Sep 19, 2017 at 09:02:06AM -0600, Jan Beulich wrote:
> >>> On 19.09.17 at 16:13, wrote:
> > We need to be careful to not create local APIC entries with either
> > APIC or ACPI ID equal to 255 (and to also not create Processor objects
> > with ACPI ID of 255).
>
> Why? An ACPI or APIC ID i
>>> On 19.09.17 at 12:08, wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
>> Juergen Gross
>> Sent: 19 September 2017 10:59
>> To: xen-de...@lists.xenproject.org
>> Cc: Juergen Gross ; sstabell...@kernel.org; Wei Liu
>> ; George Dunla
On September 19, 2017 11:31:40 AM EDT, Jan Beulich wrote:
On 12.09.17 at 17:10, wrote:
>> --- a/xen/common/livepatch.c
>> +++ b/xen/common/livepatch.c
>> @@ -104,7 +104,7 @@ static struct livepatch_work livepatch_w
>> */
>> static DEFINE_PER_CPU(bool_t, work_to_do);
>>
>> -static int ge
Add handlers for accesses to the MSI-X message control field on the
PCI configuration space, and traps for accesses to the memory region
that contains the MSI-X table and PBA. This traps detect attempts from
the guest to configure MSI-X interrupts and properly sets them up.
Note that accesses to t
Add handlers for the MSI control, address, data and mask fields in
order to detect accesses to them and setup the interrupts as requested
by the guest.
Note that the pending register is not trapped, and the guest can
freely read/write to it.
Signed-off-by: Roger Pau Monné
Reviewed-by: Paul Durra
So that it can be called from outside in order to get the size of regular PCI
BARs. This will be required in order to map the BARs from PCI devices into PVH
Dom0 p2m.
Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
---
Cc: Jan Beulich
---
Changes since v5:
- Introduce a flags field for
This function allows to iterate over a rangeset while removing the
processed regions.
It will be used by the following patches in order to store memory
regions in rangesets, and remove them while iterating.
Signed-off-by: Roger Pau Monné
---
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
C
That provides direct access to all the members that constitute a SBDF.
The only function switched to use it is hvm_pci_decode_addr, because
it makes following patches simpler.
Suggested-by: Andrew Cooper
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
Cc:
Introduce a set of handlers for the accesses to the MMCFG areas. Those
areas are setup based on the contents of the hardware MMCFG tables,
and the list of handled MMCFG areas is stored inside of the hvm_domain
struct.
The read/writes are forwarded to the generic vpci handlers once the
address is d
Introduce a set of handlers that trap accesses to the PCI BARs and the command
register, in order to snoop BAR sizing and BAR relocation.
The command handler is used to detect changes to bit 2 (response to
memory space accesses), and maps/unmaps the BARs of the device into
the guest p2m. A rangese
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
---
Changes since v5:
- Use the flags field.
- Introduce a mask local variable.
- Simplify return.
Changes since v4:
- New in this version.
---
xen/drivers/passthrough/pci.c | 29 +++--
xen/include/xen/pci.h
This is needed for MSI-X, since MSI-X will need to be initialized
before parsing the BARs, so that the header BAR handlers are aware of
the MSI-X related holes and make sure they are not mapped in order for
the trap handlers to work properly.
Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulic
Hello,
The following series contain an implementation of handlers for the PCI
configuration space inside of Xen. This allows Xen to detect accesses
to the PCI configuration space and react accordingly.
Why is this needed? IMHO, there are two main points of doing all this
emulation inside of Xen,
This functionality is going to reside in vpci.c (and the corresponding
vpci.h header), and should be arch-agnostic. The handlers introduced
in this patch setup the basic functionality required in order to trap
accesses to the PCI config space, and allow decoding the address and
finding the correspo
So that MMCFG regions not present in the MCFG ACPI table can be added
at run time by the hardware domain.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v5:
- Check for has_vpci before calling register_vpci_mmcfg_handler
instead of checking for is_hvm
On 09/18/2017 08:59 PM, Konrad Rzeszutek Wilk wrote:
> On Thu, Sep 14, 2017 at 05:08:18PM +0100, Joao Martins wrote:
>> [ Realized that I didn't CC the maintainers,
>> so doing that now, +Linux folks +PV interfaces czar
>> Sorry for the noise! ]
>>
>> On 09/08/2017 09:49 AM, Joao Martins wrote:
>>> On 12.09.17 at 17:10, wrote:
> --- a/xen/common/livepatch.c
> +++ b/xen/common/livepatch.c
> @@ -104,7 +104,7 @@ static struct livepatch_work livepatch_w
> */
> static DEFINE_PER_CPU(bool_t, work_to_do);
>
> -static int get_name(const xen_livepatch_name_t *name, char *n)
> +static int get
>>> On 12.09.17 at 17:08, wrote:
> --- a/xen/arch/x86/mm/hap/hap.c
> +++ b/xen/arch/x86/mm/hap/hap.c
> @@ -608,8 +608,8 @@ out:
> paging_unlock(d);
> }
>
> -int hap_domctl(struct domain *d, xen_domctl_shadow_op_t *sc,
> - XEN_GUEST_HANDLE_PARAM(void) u_domctl)
> +int hap_domc
1 - 100 of 259 matches
Mail list logo