flight 35991 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35991/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 35919
build-amd64-rumpu
On Tue, Mar 10, 2015 at 06:42:30AM +, Liu, SongtaoX wrote:
> > -Original Message-
> > From: xen-devel-boun...@lists.xen.org
> > [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Ian Campbell
> > Sent: Tuesday, March 03, 2015 1:00 AM
> > To: Wei Liu
> > Cc: Samuel Thibault; Stefano S
Add the {xen-pvscsi: } prefix in pr_fmt and remove DPRINTK, then
replace all DPRINTK with pr_debug.
Also fixed up some comments just as eliminate redundant whitespace
and format the code.
These will make the code easier to read.
Signed-off-by: Tao Chen
---
drivers/xen/xen-scsiback.c | 75 +
Hi,
On 27/02/15 11:33, Roger Pau Monne wrote:
> diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> index cc12735..7fcbbb1 100644
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct dom
>>> On 10.03.15 at 13:51, wrote:
> Hi,
>
> On 27/02/15 11:33, Roger Pau Monne wrote:
>> diff --git a/xen/drivers/passthrough/iommu.c
> b/xen/drivers/passthrough/iommu.c
>> index cc12735..7fcbbb1 100644
>> --- a/xen/drivers/passthrough/iommu.c
>> +++ b/xen/drivers/passthrough/iommu.c
>> @@ -332,7
Hi all
Songtao Liu reported some issues with stubdom.
This patch series tights up those loose ends that caused the problem he
saw [0].
I've tested this series myself, but it would be good if Songtao can also
give it a try and confirm it fixes those issues.
Note that the patch marked with mini-o
One place was missed when I did the replacement in 55f7cd7427 ("Mini-OS:
standalone build").
Signed-off-by: Wei Liu
---
Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Makefile b/Makefile
index f16520e..862f766 100644
--- a/Makefile
+++ b/Makefile
@@ -165,7 +165,7 @@
... because XEN_ROOT is used in mini-os's Config.mk.
Signed-off-by: Wei Liu
---
stubdom/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/stubdom/Makefile b/stubdom/Makefile
index f339b20..d9e7e40 100644
--- a/stubdom/Makefile
+++ b/stubdom/Makefile
@@ -1,6 +1,7 @@
XEN_ROOT = $(CURDI
Wei Liu, le Tue 10 Mar 2015 13:14:38 +, a écrit :
> One place was missed when I did the replacement in 55f7cd7427 ("Mini-OS:
> standalone build").
>
> Signed-off-by: Wei Liu
Acked-by: Samuel Thibault
> ---
> Makefile | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git
Wei Liu, le Tue 10 Mar 2015 13:14:39 +, a écrit :
> ... because XEN_ROOT is used in mini-os's Config.mk.
>
> Signed-off-by: Wei Liu
Acked-by: Samuel Thibault
> ---
> stubdom/Makefile | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/stubdom/Makefile b/stubdom/Makefile
> index f339
On 10/03/15 13:06, Jan Beulich wrote:
On 10.03.15 at 13:51, wrote:
>> Hi,
>>
>> On 27/02/15 11:33, Roger Pau Monne wrote:
>>> diff --git a/xen/drivers/passthrough/iommu.c
>> b/xen/drivers/passthrough/iommu.c
>>> index cc12735..7fcbbb1 100644
>>> --- a/xen/drivers/passthrough/iommu.c
>>> +++
I think it is fair to read the PCRs before performing Deep Quote and after
and
to retry if something changed.
It is an interesting suggestion to extend the tpm character device driver
in order
to obtain atomicity. I will think about it.
Thanks for clarifying.
On Mon, Mar 9, 2015 at 7:26 PM, Daniel
On Sun, 2015-03-08 at 21:11 -1000, Justin Weaver wrote:
> Thanks to all for the comments! I've implemented most of the changes
> recommended here in the v2 review. I should have a new patch set ready
> this week (with an updated soft affinity patch as well).
>
Great! :-)
> > Oh, and this is what
On 03/10/2015 07:40 AM, David Vrabel wrote:
On 09/03/15 14:10, David Vrabel wrote:
Memory hotplug doesn't work with PV guests because:
a) The p2m cannot be expanded to cover the new sections.
Broken by 054954eb051f35e74b75a566a96fe756015352c8 (xen: switch to
linear virtual mapped sparse p2m
>>> On 10.03.15 at 14:18, wrote:
> On 10/03/15 13:06, Jan Beulich wrote:
> On 10.03.15 at 13:51, wrote:
>>> Hi,
>>>
>>> On 27/02/15 11:33, Roger Pau Monne wrote:
diff --git a/xen/drivers/passthrough/iommu.c
>>> b/xen/drivers/passthrough/iommu.c
index cc12735..7fcbbb1 100644
--
On 03/10/2015 04:20 AM, Jan Beulich wrote:
On 10.03.15 at 03:27, wrote:
Changes in v4:
* Split cputopology and NUMA info changes into separate patches
* Added patch#1 (partly because patch#4 needs to know when when distance is
invalid,
i.e. NUMA_NO_DISTANCE)
* Split sysctl version update in
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
> xc_cputopoinfo() is not expected to be used on a hot path and therefore
> hypercall buffer management can be pushed into libxc. This will simplify
> life for callers.
>
> Also update error reporting macros.
>
> Signed-off-by: Boris Ostro
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
> xc_numainfo() is not expected to be used on a hot path and therefore
> hypercall buffer management can be pushed into libxc. This will simplify
> life for callers.
>
> Also update error logging macros.
>
> Signed-off-by: Boris Ostrovsky
>>> On 10.03.15 at 14:39, wrote:
> On 03/10/2015 04:20 AM, Jan Beulich wrote:
> On 10.03.15 at 03:27, wrote:
>>> Changes in v4:
>>> * Split cputopology and NUMA info changes into separate patches
>>> * Added patch#1 (partly because patch#4 needs to know when when distance is
>>> invalid,
>>>
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
> .. and use this new interface to display it along with CPU topology
> and NUMA information when 'xl info -n' command is issued
>
> The output will look like
> ...
> cpu_topology :
> cpu:coresocket node
> 0: 0
On 03/10/2015 07:53 AM, Andrew Cooper wrote:
On 10/03/15 02:27, Boris Ostrovsky wrote:
SLIT values are byte-sized and some of them (0-9 and 255) have
special meaning. Adjust __node_distance() to reflect this and
modify scrub_heap_pages() to deal with __node_distance() returning
an invalid SLIT e
On 03/10/2015 03:35 AM, Jan Beulich wrote:
On 09.03.15 at 20:02, wrote:
I agree that having the IO page tables on the NUMA node that is closest
to the IOMMU would be beneficial.
And I already withdrew this patch and the corresponding VT-d one.
However, I am not sure at the moment
that this i
On 23/02/15 16:27, Ian Campbell wrote:
> On Mon, 2015-02-23 at 16:01 +, Julien Grall wrote:
>> Hi Ian,
>>
>> On 23/02/15 15:30, Ian Campbell wrote:
>>> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
>>>
+/* This limit is used by the hypercalls to restrict the size of the path
On 10/03/15 02:27, Boris Ostrovsky wrote:
> Instead of copying data for each field in xen_sysctl_topologyinfo separately
> put cpu/socket/node into a single structure and do a single copy for each
> processor.
>
> Do not use max_cpu_index, which is almost always used for calculating number
> CPUs (
On 10/03/15 02:27, Boris Ostrovsky wrote:
> Make sysctl NUMA topology query use fewer copies by combining some
> fields into a single structure and copying distances for each node
> in a single copy.
>
> Instead of using max_node_index for passing number of nodes keep this
> value in num_nodes: alm
On 03/10/2015 10:29 AM, Andrew Cooper wrote:
On 10/03/15 02:27, Boris Ostrovsky wrote:
Instead of copying data for each field in xen_sysctl_topologyinfo separately
put cpu/socket/node into a single structure and do a single copy for each
processor.
Do not use max_cpu_index, which is almost alwa
On 10/03/15 02:27, Boris Ostrovsky wrote:
> Signed-off-by: Boris Ostrovsky
> ---
>
> Changes in v4:
> * No buffer allocation in sysctl, copy data device-by-device
> * Replace INVALID_TOPOLOGY_ID with XEN_INVALID_NODE_ID
>
> xen/common/sysctl.c | 59
> +++
Hi,
On 23/02/15 15:34, Ian Campbell wrote:
> On Mon, 2015-02-23 at 10:10 +, Julien Grall wrote:
>>
>> On 20/02/2015 17:04, Ian Campbell wrote:
>>> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
Currently, when the device is deassigned from a domain, we directly
reassign
>>> On 10.03.15 at 12:24, wrote:
> On 10/03/15 07:30, Jan Beulich wrote:
> On 09.03.15 at 19:49, wrote:
>>> On 09/03/15 16:08, Jan Beulich wrote:
Both PV and HVM logic have similar but not similar enough code here.
Synchronize the two so that
- in the HVM case we don't uncondit
flight 36006 xen-4.5-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36006/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-pvh-intel 3 host-install(3) broken pass in 35937
test-amd64-amd64-xl-multivcpu
On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
> > Sent: Monday, March 09, 2015 10:43 PM
> >
> > From: Elena Ufimtseva
> >
> > On some platforms RMRR regions may be not specified
> > in ACPI and thus will not
The problem requiring the first patch here is actually what lead to
XSA-120.
1: be more careful during teardown
2: access MSI-X table only after having enabled MSI-X
3: reduce fiddling with control register during restore
4: cleanup
Signed-off-by: Jan Beulich
__
When a device gets detached from a guest, pciback will clear its
command register, thus disabling both memory and I/O decoding. The
disabled memory decoding, however, has an effect on the MSI-X table
accesses the hypervisor does: These won't have the intended effect
anymore. Even worse, for PCIe de
As done in Linux by f598282f51 ("PCI: Fix the NIU MSI-X problem in a
better way") and its broken predecessor, make sure we don't access the
MSI-X table without having enabled MSI-X first, using the mask-all flag
instead to prevent interrupts from occurring.
Signed-off-by: Jan Beulich
--- a/xen/a
Rather than disabling and enabling MSI-X once per vector, do it just
once per device.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/msi.c
+++ b/xen/arch/x86/msi.c
@@ -1218,6 +1218,9 @@ int pci_restore_msi_state(struct pci_dev
struct msi_desc *entry, *tmp;
struct irq_desc *desc;
st
>>> On 10.03.15 at 17:16, wrote:
> On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
>> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
>> > --- a/xen/drivers/passthrough/vtd/iommu.c
>> > +++ b/xen/drivers/passthrough/vtd/iommu.c
>> > @@ -1232,6 +1232,38 @@ static
1: drop unused "bigval" fields from struct operand
2: simplify asm() constraints
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi Gareth,
I think this counts as a -devel question, so I've added -devel and moved
-users to bcc (-users is more for end users). I've done less quote
trimming than usual for the other folks on -devel.
On Tue, 2015-03-10 at 14:15 +, Gareth Stockwell wrote:
> What is the recommended way to tra
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -313,17 +313,11 @@ struct operand {
enum { OP_REG, OP_MEM, OP_IMM, OP_NONE } type;
unsigned int bytes;
-/* Up to 128-byte operand value, addressable as ulong or
Hi Daniel,
On 23/02/15 16:25, Daniel De Graaf wrote:
> On 02/20/2015 12:17 PM, Ian Campbell wrote:
>> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
>>> TODO: Update the commit message
>>>
>>> A device node is described by a path. It will be used to retrieved the
>>> node in the device tre
Signed-off-by: Quan Xu
---
extras/mini-os/tpmback.c | 21 -
1 file changed, 16 insertions(+), 5 deletions(-)
diff --git a/extras/mini-os/tpmback.c b/extras/mini-os/tpmback.c
index 8a0a983..b8f4c8f 100644
--- a/extras/mini-os/tpmback.c
+++ b/extras/mini-os/tpmback.c
@@ -732,11
when virtual machine is destroyed.
Signed-off-by: Quan Xu
---
tools/libxl/libxl_device.c | 61 +++---
1 file changed, 57 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/libxl_device.c b/tools/libxl/libxl_device.c
index b1a71fe..668bf71 100644
--- a
Signed-off-by: Quan Xu
---
Config.mk | 4
tools/Makefile | 7 +++
2 files changed, 11 insertions(+)
diff --git a/Config.mk b/Config.mk
index a5b6c41..5a5f413 100644
--- a/Config.mk
+++ b/Config.mk
@@ -254,6 +254,10 @@ endif
OVMF_UPSTREAM_REVISION ?= 447d264115c476142f884af0be28762
refactor libxl__device_vtpm_add to call the right helpers
libxl__device_vtpm_add_{pv,hvm}. For HVM virtual machine,
it does not support hot-plug and hot-unplug, as it requires
SeaBios to initalize ACPI and virtual MMIO space for TPM
TIS when virtual machine starts.
Signed-off-by: Quan Xu
---
too
*INTRODUCTION*
The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM
functionality to virtual machines (Fedora, Ubuntu, Redhat, Windows .etc). This
allows programs to interact with a TPM in a virtual machine the same way they
interact with a TPM on the physical system. Each virt
This drvier transfers any request/repond between TPM xenstubdoms
driver and Xen vTPM stubdom, and facilitates communications between
Xen vTPM stubdom domain and vTPM xenstubdoms driver. It is a glue for
the TPM xenstubdoms driver and Xen stubdom vTPM domain that provides
the actual TPM functionalit
This patch series are only the Xen part to enable stubdom vTPM for HVM virtual
machine.
it will work w/ Qemu patch series and seaBios patch series. Change
QEMU_STUBDOM_VTPM compile
option from 'n' to 'y', when the Qemu/SeaBios patch series are merged.
*INTRODUCTION*
make sure QEMU machine class is initialized and QEMU has registered
Xen stubdom vTPM driver when call tpm_init()
Signed-off-by: Quan Xu
---
vl.c | 17 +++--
1 file changed, 11 insertions(+), 6 deletions(-)
diff --git a/vl.c b/vl.c
index f6b3546..0bbdaa1 100644
--- a/vl.c
+++ b/vl.c
--Changes in v4:
-qapi schema enhancement.
-remove no need code.
Signed-off-by: Quan Xu
---
configure| 14 ++
hmp.c| 2 ++
qapi-schema.json | 18 --
qemu-options.hx | 13 +++--
tpm.c| 7 ++-
5 files changed, 49 insertio
Signed-off-by: Quan Xu
---
tools/libxl/libxl_create.c | 11 +--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c
index b1ff5ae..66877b3 100644
--- a/tools/libxl/libxl_create.c
+++ b/tools/libxl/libxl_create.c
@@ -1358,8
Signed-off-by: Quan Xu
---
tools/firmware/hvmloader/acpi/build.c | 7 ---
tools/libxl/libxl_create.c| 5 -
2 files changed, 8 insertions(+), 4 deletions(-)
diff --git a/tools/firmware/hvmloader/acpi/build.c
b/tools/firmware/hvmloader/acpi/build.c
index 1431296..49f6772 10064
Signed-off-by: Quan Xu
Signed-off-by: Stefan Berger
---
Makefile | 2 +-
src/post.c | 3 +
src/tpm.c | 309 +
src/tpm.h | 141
4 files changed, 454 insertions(+), 1 deletion(-)
create mode 100644 sr
This patch series are only the SeaBios part to enable stubdom vTPM for HVM
virtual machine. It will work with Qemu patch series and Xen patch series.
*INTRODUCTION*
The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM
functio
This patch adds infrastructure for xen front drivers living in qemu,
so drivers don't need to implement common stuff on their own. It's
mostly xenbus management stuff: some functions to access XenStore,
setting up XenStore watches, callbacks on device discovery and state
changes, and handle event
flight 36177 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36177/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
On Tue, Mar 10, 2015 at 04:27:15PM +, Jan Beulich wrote:
> >>> On 10.03.15 at 17:16, wrote:
> > On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
> >> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
> >> > --- a/xen/drivers/passthrough/vtd/iommu.c
> >> > +++ b
On 10/03/15 16:35, Jan Beulich wrote:
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 10/03/15 16:36, Jan Beulich wrote:
> Use + on outputs instead of = and a matching input. Allow not just
> memory for the _eflags operand (it turns out that recent gcc produces
> worse code when also doing this for _dst.val, so the latter is being
> avoided).
>
> Signed-off-by: Jan Beulich
>
> -
flight 36062 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36062/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 35887
On 10/03/15 16:27, Jan Beulich wrote:
> When a device gets detached from a guest, pciback will clear its
> command register, thus disabling both memory and I/O decoding. The
> disabled memory decoding, however, has an effect on the MSI-X table
> accesses the hypervisor does: These won't have the in
On 03/10/2015 12:52 PM, Julien Grall wrote:
Hi Daniel,
On 23/02/15 16:25, Daniel De Graaf wrote:
On 02/20/2015 12:17 PM, Ian Campbell wrote:
On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
TODO: Update the commit message
A device node is described by a path. It will be used to retriev
Hi Daniel,
On 10/03/2015 22:45, Daniel De Graaf wrote:
BTW, do you have any pointer on how to write a policy for device/IRQ
passthrough?
There is a bit of documentation in xsm-flask.txt about device labeling,
which is the hard part of making passthrough work. Labels can be set
either statical
On 03/10/2015 07:07 PM, Julien Grall wrote:
Hi Daniel,
On 10/03/2015 22:45, Daniel De Graaf wrote:
BTW, do you have any pointer on how to write a policy for device/IRQ
passthrough?
There is a bit of documentation in xsm-flask.txt about device labeling,
which is the hard part of making passthr
On Tue, Mar 10, 2015 at 11:30:10AM +, Julien Grall wrote:
> Hello Edgar,
>
> Thank you for adding support of the ZynqMP.
>
> On 10/03/15 02:49, Edgar E. Iglesias wrote:
> > From: "Edgar E. Iglesias"
> >
> > Adds support for the Cadence UART in Xilinx ZynqMP. The
> > rest of the ZynqMP platf
Hi
Some more progress and then PANIC.. says (XEN) GICv2: Cannot find the
maintenance IRQ
Here is the log:
U-Boot SPL 2015.04-rc1 (Mar 10 2015 - 13:35:08)
DRA752 ES1.1
reading args
spl_load_image_fat_os: error reading image args, err - -1
reading u-boot.img
reading u-boot.img
U-Boot 2015.04-rc
On Wed, Feb 18, 2015 at 11:53:22AM +, David Vrabel wrote:
> On 16/02/15 23:05, Mikko Rapeli wrote:
> > Fixes compilation error:
> >
> > xen/gntalloc.h:22:2: error: unknown type name ‘uint16_t’
> >
> > Signed-off-by: Mikko Rapeli
> > ---
> > include/uapi/xen/gntalloc.h | 6 ++
> > 1 file
Hi
Got some progress in loading xen hyp and then sits blank.
Here is the log:
U-Boot SPL 2015.04-rc1 (Mar 10 2015 - 13:35:08)
DRA752 ES1.1
reading args
spl_load_image_fat_os: error reading image args, err - -1
reading u-boot.img
reading u-boot.img
U-Boot 2015.04-rc1 (Mar 10 2015 - 13:35:08)
=
CALL FOR PAPERS
10th Workshop on Virtualization in High-Performance Cloud Computing (VHPC
'15)
held in conjunction with Euro-Par 2015, August 24-28, Vienna, Austria
(Springer LNCS)
===
From: "Edgar E. Iglesias"
Changelog:
v3 -> v4:
* Move the grant table range to a reserved area. (Julien review)
v2 -> v3:
* Fix coding style issues. (Julien review)
v1 -> v2:
* Rebase with upstream/staging to fix the device-tree device matching. (Ian
review)
Edgar E. Iglesias (3):
xen/arm
From: "Edgar E. Iglesias"
Signed-off-by: Edgar E. Iglesias
---
xen/arch/arm/platforms/Makefile| 1 +
xen/arch/arm/platforms/xilinx-zynqmp.c | 41 ++
2 files changed, 42 insertions(+)
create mode 100644 xen/arch/arm/platforms/xilinx-zynqmp.c
diff --git
Reviewed-by: Julien Grall
Signed-off-by: Edgar E. Iglesias
---
config/arm64.mk| 1 +
xen/drivers/char/Makefile | 1 +
xen/drivers/char/cadence-uart.c| 224 +
xen/include/asm-arm/cadence-uart.h | 55 +
4 files chang
From: "Edgar E. Iglesias"
Reviewed-by: Julien Grall
Signed-off-by: Edgar E. Iglesias
---
docs/misc/arm/early-printk.txt | 1 +
xen/arch/arm/Rules.mk| 6 +
xen/arch/arm/arm64/debug-cadence.inc | 45
3 files changed, 52 insertions(
flight 36074 qemu-upstream-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36074/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rhel6hvm-amd 6 leak-check/basis(6) running in 34247
[st=running!]
test-a
On Tue, Mar 10, 2015 at 5:22 PM, Ian Campbell wrote:
> On Tue, 2015-03-10 at 11:45 +, Julien Grall wrote:
>> On 09/03/15 16:08, Vijay Kilari wrote:
>> > On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall
>> > wrote:
>> >> Hi Vijay,
>> >>
>> >> Given the introduction of the new helper, the title lo
Hi Andrew,
From Ian & Stefano, I came to know that you have introduced
Migration framework v2
under below patch series
http://marc.info/?l=xen-devel&m=141036915311145
I have few queries:
1) Is there any plans/timeline to support for ARM32/ARM64?.
2) Also does the Domain Image format specifi
flight 36080 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36080/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 3 host-install(3) broken REGR. vs. 35893
Thanks for your mail.
My architecture is x86 compatible. I have just added new instructions over
existing x86 ISA.
These new instructions are now to be taught to the CPU. In QEMU, I was able
to mimic the new CPU working with software changes (changes involved in
both kernel and QEMU source tree).
>>> On 09.03.15 at 19:49, wrote:
> On 09/03/15 16:08, Jan Beulich wrote:
>> Both PV and HVM logic have similar but not similar enough code here.
>> Synchronize the two so that
>> - in the HVM case we don't unconditionally try to access extended
>> config space
>> - in the PV case we pass a corre
>>> On 09.03.15 at 20:02, wrote:
> I agree that having the IO page tables on the NUMA node that is closest
> to the IOMMU would be beneficial.
And I already withdrew this patch and the corresponding VT-d one.
> However, I am not sure at the moment
> that this information could be easily determ
>>> On 10.03.15 at 03:27, wrote:
> Changes in v4:
> * Split cputopology and NUMA info changes into separate patches
> * Added patch#1 (partly because patch#4 needs to know when when distance is
> invalid,
> i.e. NUMA_NO_DISTANCE)
> * Split sysctl version update into a separate patch
Why?
Jan
On Mon, 9 Mar 2015, Korupol, Naveen (EXT) wrote:
> Hi Ian
>
> I am (awesome) glad to see your response.
>
>
> [IC] J6 EVM?
> [NK] is a TI (& Spectrum Digital) evaluation board built on OMAP 5
> architecture which has 2 ARM Cortex-A15 core(s), 2 Cortex-M4 cores and SGX544
> 3D graphics core(s)
>>> On 10.03.15 at 03:47, wrote:
>> From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
>> Format for rmrr Xen command line option:
>> rmrr=[sbdf]start<:end>,[sbdf]start:
>
> how about sticking to rmrr structure, i.e.
>
> rmrr=start<:end>[sbdf1, sbdf2, ...], ...
+1
>> +
>>> On 09.03.15 at 17:47, wrote:
> Copy the entire output buffer to the guest because it may contain data beyond
> the output size that the firmware requires on a subsequent
> GetNextVariableName() call (e.g. a NULL character).
>
> The spec requires that on each call, "the previous results" be pa
Probably better done with improvements to DT/PCI parsing code and doesn't seem
to dpo any harm not to have this patch anyway.
Signed-off-by: Ian Campbell
---
xen/arch/arm/domain_build.c | 18 ++
1 file changed, 14 insertions(+), 4 deletions(-)
diff --git a/xen/arch/arm/domain_bu
Signed-off-by: Ian Campbell
---
docs/misc/arm/early-printk.txt | 1 +
xen/arch/arm/Rules.mk | 5 +
2 files changed, 6 insertions(+)
diff --git a/docs/misc/arm/early-printk.txt b/docs/misc/arm/early-printk.txt
index 1ca2a55..4354e2d 100644
--- a/docs/misc/arm/early-printk.txt
+++ b/d
Not to be applied until better understood.
Linux has these hooks and uses them on Tegra.
However I don't think they are strictly needed (only for power gating stuff
perhaps?). I implemented them while investigating some other issues, used by
later "Tegra hacking" patch which isn't actually needed
We can't seem to hanle /pcie-controller@0,01003000/pci@1,0 and
/pcie-controller@0,01003000/pci@2,0. Perhaps better solved by DT/PCI series.
Signed-off-by: Ian Campbell
---
xen/arch/arm/domain_build.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm/domain_bui
As used on the Jetson board.
This platform has a bunch of specific mappings and, more importantly, an
additional interrupt controller (which is used alongside the main GIC and
covers the same interrupts etc, so it is not a secondary or chained interrupt
controller) which dom0 really wants to poke
DO NOT APPLY. Doesn't work without sync_console *and* the changes from "HACK:
xen: arm: trying to figure out ns16550 vs. Tegra issue".
I suspect and IRQ or FIFO depth issue. Linux has a separate serial-tegra driver
so perhaps the device is just not as compatible as I think.
Signed-off-by: Ian Cam
Rename the existing gic_dump_info to gic_dump_info_guest reduce confusion.
Signed-off-by: Ian Campbell
---
v2: s/gic_dump_info/gic_dump_info_guest/
---
xen/arch/arm/domain.c | 2 +-
xen/arch/arm/gic-v2.c | 66 ++-
xen/arch/arm/gic-v3.c |
Works without all this stuff.
---
xen/arch/arm/platforms/tegra.c | 68 +-
1 file changed, 67 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/platforms/tegra.c b/xen/arch/arm/platforms/tegra.c
index 189ef44..5ec9dda 100644
--- a/xen/arch/arm/platforms
Tegra contains a secondary set of IRQ registers which dom0 wants to poke at, we
will use this for that.
Signed-off-by: Ian Campbell
---
xen/arch/arm/irq.c | 4
xen/arch/arm/platform.c| 6 ++
xen/include/asm-arm/platform.h | 5 +
3 files changed, 15 insertions(+)
Messing with the FIFO depths and trigger levels seems to help, as does messing
with the interrupt enable state at various points. The latter might be better
handled via the start/stop_tx hooks which were added a while ago.
Signed-off-by: Ian Campbell
---
xen/drivers/char/ns16550.c | 16 +
There is a lot of hacky and WIP stuff here, including a serial driver
issue (FIFO depth? Interrupts?) which I haven't gotten to the bottom of
yet. But with these hacks and sync_console I can boot on the platform
and run guests etc.
Actually only up to and including patch #7 "HACK: xen: arm: tryin
On Tue, Mar 10, 2015 at 02:28:16PM +0800, Tiejun Chen wrote:
> Its pointless because internally, libxl__calloc() would always
> terminate program execution if failed,
>
> libxl__calloc()
> |
> + void *ptr = calloc(nmemb, size);
> + if (!ptr) libxl__alloc_failed(CTX, __func__, nmemb, si
On Mon, 2015-03-09 at 17:54 -0400, Don Slutz wrote:
>
> On 03/09/15 11:40, Ian Campbell wrote:
> > Refactor the $kvp_replace helper in ts-xen-install into a generic
> > helper (which requires using ::EO and ::EI for namespacing) for use
> > with target_editfile and use it to edit /etc/sysctl.conf
v2:
* Refine patch #2's head description
* Improve codes quality inside patch #1 based on Wei's comments
* Refill the summary inside patch #0 based on Konrad and Wei's suggestion
When we're working to support IGD GFX passthrough with qemu
upstream, instead of "-gfx_passthru" we'd like to make th
Although we already have 'gfx_passthru' in b_info, this doesn' suffice
after we want to handle IGD specifically. Now we define a new field of
type, gfx_passthru_kind, to indicate we're trying to pass IGD. Actually
this means we can benefit this to support other specific devices just
by extending gf
While working with qemu, IGD is a specific device in the case of pass through
so we need to identify that to handle more later. Here we define a table to
record all IGD types currently we can support. Also we need to introduce two
helper functions to get vendor and device ids to lookup that table.
On Tue, 2015-03-10 at 09:01 +, Ian Campbell wrote:
Forgot to say -- this needs some u-boot patches to enable booting in
hypmode. Jan Kiska has picked up the dev work of those, I tested using
v4 from http://lists.denx.de/pipermail/u-boot/2015-February/206557.html
applied on top of u-boot-tegra.
1 - 100 of 114 matches
Mail list logo