>>> On 15.06.15 at 11:03, wrote:
> Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST,
> sent via HVMOP_request_vm_event. The guest can request that a
> generic vm_event (containing only the vm_event-filled guest registers
> as information) be sent to userspace by setting up the c
On Thu, 2015-06-25 at 13:31 -0400, Konrad Rzeszutek Wilk wrote:
> On Thu, Jun 25, 2015 at 01:36:29PM +0100, Ian Jackson wrote:
> > Ian Campbell writes ("Re: [PATCH OSSTEST v3 21/22] Debian: Arrange to be
> > able to chainload a xen.efi from grub2"):
> > > On Thu, 2015-06-25 at 11:33 +0100, Ian Jac
On Fri, 2015-06-26 at 00:28 -0600, Jim Fehlig wrote:
> On 06/25/2015 05:53 AM, Ian Campbell wrote:
> > On Thu, 2015-06-25 at 12:36 +0100, Anthony PERARD wrote:
> >> Error: argument "tap695cf459-b0-emu" is wrong: "name" too long
> > Under Linux IFNAMSIZ is 16, whereas this is 18 characters.
> >
> >
On 2015/6/25 19:33, Wei Liu wrote:
The subject line should be changed. You're not extending that hypercall.
libxl: construct e820 map with RDM information for HVM guest
Agreed.
On Tue, Jun 23, 2015 at 05:57:27PM +0800, Tiejun Chen wrote:
Here we'll construct a basic guest e820 table via
XE
flight 58905 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58905/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
On 06/26/2015 10:02 AM, Jan Beulich wrote:
On 15.06.15 at 11:03, wrote:
>> Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST,
>> sent via HVMOP_request_vm_event. The guest can request that a
>> generic vm_event (containing only the vm_event-filled guest registers
>> as infor
On Fri, 2015-06-26 at 07:37 +0530, Manish Jaggi wrote:
>
> On Thursday 25 June 2015 10:56 PM, Konrad Rzeszutek Wilk wrote:
> > On Thu, Jun 25, 2015 at 01:21:28PM +0100, Ian Campbell wrote:
> >> On Thu, 2015-06-25 at 17:29 +0530, Manish Jaggi wrote:
> >>> On Thursday 25 June 2015 02:41 PM, Ian Camp
Il 25/06/2015 14:18, Ian Campbell ha scritto:
On Thu, 2015-06-25 at 12:58 +0100, Stefano Stabellini wrote:
On Thu, 25 Jun 2015, Fabio Fantoni wrote:
Il 25/06/2015 12:21, Ian Campbell ha scritto:
On Tue, 2015-06-23 at 11:15 +0200, Fabio Fantoni wrote:
Usage:
ahci=0|1 (default=0)
I think a glo
On 26/06/2015 07:22, Jan Beulich wrote:
On 25.06.15 at 18:22, wrote:
>> On 25/06/15 15:41, Jan Beulich wrote:
>> On 24.06.15 at 18:31, wrote:
The major change here is that v->arch.pv_vcpu.ctrlreg[4] now contains only
CR4
bits which Xen wishes to shadow, rather than contai
On 06/25/2015 06:57 PM, Jan Beulich wrote:
On 15.06.15 at 11:03, wrote:
>> --- a/xen/arch/x86/hvm/emulate.c
>> +++ b/xen/arch/x86/hvm/emulate.c
>> @@ -578,6 +578,28 @@ static int hvmemul_read(
>> container_of(ctxt, struct hvm_emulate_ctxt, ctxt));
>> }
>>
>> +static int hvmemul_re
>>> On 15.06.15 at 11:03, wrote:
> Deny register writes if a vm_client subscribed to mov_to_msr events
> forbids them. Currently supported for MSR, CR0, CR3 and CR4 events.
Is the first sentence referring the mov_to_msr stale?
> --- a/xen/arch/x86/hvm/event.c
> +++ b/xen/arch/x86/hvm/event.c
> @
On Thu, 2015-06-25 at 22:11 -0700, Meng Xu wrote:
> 2015-06-25 5:44 GMT-07:00 Dario Faggioli :
> > Signed-off-by: Dario Faggioli
> > ---
> > Cc: George Dunlap
> > Cc: Meng Xu
> > ---
> > MAINTAINERS |5 +
> > 1 file changed, 5 insertions(+)
> >
> > diff --git a/MAINTAINERS b/MAINTAINERS
Thanks for your all corrections.
+=item B
+
+Currently we just have two types:
"Currently there are only two types". Although I would probably just say
"Valid types are"
So let say "Currently there are only two valid types".
+"host" means all reserved device memory on this platform shou
>>> On 26.06.15 at 10:22, wrote:
> On 06/25/2015 06:57 PM, Jan Beulich wrote:
> On 15.06.15 at 11:03, wrote:
>>> --- a/xen/arch/x86/hvm/emulate.c
>>> +++ b/xen/arch/x86/hvm/emulate.c
>>> @@ -578,6 +578,28 @@ static int hvmemul_read(
>>> container_of(ctxt, struct hvm_emulate_ctxt, ctx
Changes in v10:
Address comments from Jan, mainly:
* Check socket < nr_sockets in cat_cpu_prepare().
* Use for_each_set_bit().
* Change psr_get_cat_l3_info to return either errno or psr_cat_socket_info.
Changes in v9:
Address comments from Jan, mainly:
* Move set_nr_sockets() invocation from __star
Use "-" instead of "_" for monitor types.
Signed-off-by: Chao Peng
Reviewed-by: Dario Faggioli
Acked-by: Ian Campbell
---
tools/libxl/xl_cmdimpl.c | 6 +++---
tools/libxl/xl_cmdtable.c | 6 +++---
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools
This is the xc/xl changes to support Intel Cache Allocation
Technology(CAT).
'xl psr-hwinfo' is updated to show CAT info and two new commands
for CAT are introduced:
- xl psr-cat-cbm-set [-s socket]
Set cache capacity bitmasks(CBM) for a domain.
- xl psr-cat-show
Show CAT domain information
For CAT, COS is maintained in hypervisor only while CBM is exposed to
user space directly to allow getting/setting domain's cache capacity.
For each specified CBM, hypervisor will either use a existed COS which
has the same CBM or allocate a new one if the same CBM is not found. If
the allocation f
>>> On 26.06.15 at 09:17, wrote:
> On 06/26/2015 10:02 AM, Jan Beulich wrote:
> On 15.06.15 at 11:03, wrote:
>>> --- a/xen/include/public/hvm/hvm_op.h
>>> +++ b/xen/include/public/hvm/hvm_op.h
>>> @@ -389,6 +389,10 @@
>>> DEFINE_XEN_GUEST_HANDLE(xen_hvm_evtchn_upcall_vector_t);
>>>
>>> #e
Maintain socket_cpumask which contains all the HT and core siblings
in the same socket.
Signed-off-by: Chao Peng
Acked-by: Jan Beulich
---
Changes in v9:
* Add comments for set_nr_sockets.
* Move set_nr_sockets() invocation from __start_xen() to smp_prepare_cpus().
Changes in v8:
* Remove total_
General CAT information such as maximum COS and CBM length are exposed to
user space by a SYSCTL hypercall, to help user space to construct the CBM.
Signed-off-by: Chao Peng
Reviewed-by: Andrew Cooper
---
Changes in v10:
* Change psr_get_cat_l3_info to return either errno or psr_cat_socket_info.
Add libxl_socket_bitmap_alloc() to allow allocating a socket specific
libxl_bitmap (as it is for cpu/node bitmap).
Internal function libxl__count_physical_sockets() is introduced together
to get the socket count when the size of bitmap is not specified.
Signed-off-by: Chao Peng
Acked-by: Ian Cam
Add xsm policies for Cache Allocation Technology(CAT) related hypercalls
to restrict the functions visibility to control domain only.
Signed-off-by: Chao Peng
Acked-by: Daniel De Graaf
---
tools/flask/policy/policy/modules/xen/xen.if | 2 +-
tools/flask/policy/policy/modules/xen/xen.te | 4 +++
Detect Intel Cache Allocation Technology(CAT) feature and store the
cpuid information for later use. Currently only L3 cache allocation is
supported. The L3 CAT features may vary among sockets so per-socket
feature information is stored. The initialization can happen either at
boot time or when CPU
For each socket, a COS to CBM mapping structure is maintained for each
COS. The mapping is indexed by COS and the value is the corresponding
CBM. Different VMs may use the same CBM, a reference count is used to
indicate if the CBM is available.
Signed-off-by: Chao Peng
---
Changes in v10:
* Check
Add dedicated one to show hardware information.
[root@vmm-psr]xl psr-hwinfo
Cache Monitoring Technology (CMT):
Enabled : 1
Total RMID : 63
Supported monitor types:
cache-occupancy
total-mem-bandwidth
local-mem-bandwidth
Signed-off-by: Chao Peng
Reviewed-by: Dario Faggioli
Acked-by:
On context switch, write the the domain's Class of Service(COS) to MSR
IA32_PQR_ASSOC, to notify hardware to use the new COS.
For performance reason, the COS mask for current cpu is also cached in
the local per-CPU variable.
Signed-off-by: Chao Peng
Acked-by: Jan Beulich
---
Changes in v5:
* Re
In Xen's implementation, the CAT enforcement granularity is per domain.
Due to the length of CBM and the number of COS may be socket-different,
each domain has COS ID for each socket. The domain get COS=0 by default
and at runtime its COS is then allocated dynamically when user specifies
a CBM for
Add document to introduce basic concepts and terms in PSR family
technologies and the xl interfaces.
Signed-off-by: Chao Peng
Acked-by: Ian Campbell
---
Changes in v7:
* Correct 'xl psr-hwinfo'.
Changes in v6:
* Address comments from Ian.
Changes in v5:
* Address comments from Andrew/Ian.
---
d
>>> On 26.06.15 at 10:10, wrote:
> On 26/06/2015 07:22, Jan Beulich wrote:
> On 25.06.15 at 18:22, wrote:
>>> After recent consideration, I am still not sure if we want to support
>>> SMAP in 32bit PV guests or not. The trapping of stac/clac would be a
>>> high overhead, although the guest c
On Friday 26 June 2015 01:02 PM, Ian Campbell wrote:
On Fri, 2015-06-26 at 07:37 +0530, Manish Jaggi wrote:
On Thursday 25 June 2015 10:56 PM, Konrad Rzeszutek Wilk wrote:
On Thu, Jun 25, 2015 at 01:21:28PM +0100, Ian Campbell wrote:
On Thu, 2015-06-25 at 17:29 +0530, Manish Jaggi wrote:
On
B is the PCI Bus/Device/Function of the physical device to pass-through.
+B is about how to handle conflict between reserving reserved device
s/is about/specifies/
Okay.
and I think s/between/while/
+memory and guest address space. "strict" means an unsolved conflict leads to
I think y
On Wed, 2015-06-24 at 16:32 +0100, Ian Campbell wrote:
> TODO: Find out why!
>
> This is just a placeholder/reminder, do not apply.
This turned out to be a known upstream issue (thanks to Mark Rutland for
the tip) which has just been fixed for 4.2 and tagged for stable
backport.
Ian.
> ---
> t
On Fri, 2015-06-26 at 16:38 +0800, Chen, Tiejun wrote:
> Thanks for your all corrections.
>
>
> >> +=item B
> >> +
> >> +Currently we just have two types:
> >
> > "Currently there are only two types". Although I would probably just say
> > "Valid types are"
>
> So let say "Currently there are on
On 25/06/15 22:18, Daniel Kiper wrote:
> On Thu, Jun 25, 2015 at 06:11:01PM +0100, David Vrabel wrote:
>> Now that we track the total number of pages (included hotplugged
>> regions), it is easy to determine if more memory needs to be
>> hotplugged.
>>
>> Signed-off-by: David Vrabel
>> ---
>> dri
On 25/06/15 22:31, Daniel Kiper wrote:
> On Thu, Jun 25, 2015 at 08:54:45PM +0200, Daniel Kiper wrote:
>
> It looks that balloon_stats.total_pages is used only in memory hotplug case.
> Please do references (and definition) to it inside #ifdef
> CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
> like it is done
On Fri, 2015-06-26 at 16:53 +0800, Chen, Tiejun wrote:
> >> B is the PCI Bus/Device/Function of the physical device to
> >> pass-through.
> >> +B is about how to handle conflict between reserving reserved
> >> device
> >
> > s/is about/specifies/
>
> Okay.
>
> and I think s/between/while/
> >
flight 58882 xen-4.1-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58882/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-i386-i386-pair 21 guest-migrate/src_host/dst_host fail like 27420
test-amd64-amd64-pair
Some of the generic hooks were unused altogether - drop them.
Some of the hooks were used only to handle calls from the specific
vendor's code (SVM) - drop them too.
Several more hooks were pointlessly implementaed as out-of-line
functions, when most (all?) other HVM hooks use inline ones - make
On 26/06/15 10:02, Jan Beulich wrote:
> Some of the generic hooks were unused altogether - drop them.
>
> Some of the hooks were used only to handle calls from the specific
> vendor's code (SVM) - drop them too.
>
> Several more hooks were pointlessly implementaed as out-of-line
> functions, when m
On Fri, 2015-06-26 at 14:20 +0530, Manish Jaggi wrote:
>
> On Friday 26 June 2015 01:02 PM, Ian Campbell wrote:
> > On Fri, 2015-06-26 at 07:37 +0530, Manish Jaggi wrote:
> >> On Thursday 25 June 2015 10:56 PM, Konrad Rzeszutek Wilk wrote:
> >>> On Thu, Jun 25, 2015 at 01:21:28PM +0100, Ian Campbe
On 06/26/2015 11:28 AM, Jan Beulich wrote:
On 15.06.15 at 11:03, wrote:
>> Deny register writes if a vm_client subscribed to mov_to_msr events
>> forbids them. Currently supported for MSR, CR0, CR3 and CR4 events.
>
> Is the first sentence referring the mov_to_msr stale?
Yes, the patch now
Hello Experts.
What is Mirage OS ? Is it a Platform for Develop applications or...
Thank you.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi Julien,
On Mon, Jun 22, 2015 at 10:46 PM, Julien Grall wrote:
> Hi,
>> +cmd->mapd.cmd = GITS_CMD_MAPD;
>> +cmd->mapd.devid = desc->its_mapd_cmd.dev->device_id;
>> +cmd->mapd.size = size - 1;
>> +cmd->mapd.itt = itt_addr >> 8;
>
> I think the code is more difficult to read with
On Fri, 2015-06-26 at 09:19 +, Jason Long wrote:
> Hello Experts.
>
> What is Mirage OS ? Is it a Platform for Develop applications or...
While Mirage is indeed part of the Xen Project this particular list is
for questions relating to the development of the hypervisor subproject.
The OpenMir
I will delete this last sentence and add this,
Please refer "reserve" option to the rdm option in xl.cfg.5.txt.
Say "xl.cfg(5)" which is a neutral reference to the manpage in any form.
I'm trying to follow an existing example here, so
This is same as "reserve" option to the rdm option, plea
Hi all,
This patch series adds support for GICv2 on GICv3. This feature is available
only when the GICv3 hardware is compatible with GICv2.
When it's the case, the same interface is provided in order to use a
virtualize GICv2 (i.e GICC and GICV). That will allow us to re-use same
vGIC drivers.
C
The function vgic_vN_init only calls register_vgic_ops. As it will never
contain anything else, domain initialization code should be in the
callback domain_init, remove them and directly use the VGIC ops in the
commmon vGIC code.
Signed-off-by: Julien Grall
---
Changes in v2:
- Gate
It's not easy to understand PAGE_SIZE * 0x10 and PAGE_SIZE * 16 at the
first glance.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
Cc: Zoltan Kiss
---
Changes in v2:
- Add Ian's ack
- Merge "xen/arm: gic-v2: Use SZ_64K rather than our custom
value" and "xen/arm
On GICv3, the default size of the distributor region is 64kB (see 5.3
in PRD03-GENC-010745 24.0). This region can be extended to provide an
implementation defined set of pages containing additional aliases for MSI.
Although, the GICv3 driver only access to register within the default
distributor re
The domain_init callback can return error. Check it and progate the
error if necessary.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
Changes in v2:
- Add Ian's ack
---
xen/arch/arm/vgic.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm
for clarity and it will be easier to understand some follow-up patches.
Also gate gic_v3 structure is HAS_GICV3.
Signed-off-by: Julien Grall
---
Changes in v2:
- Patch added
---
config/arm64.mk | 1 +
xen/arch/arm/Makefile| 2 +-
xen/arch/arm/Rules.mk|
- Print all the redistributor regions rather than only the first
one...
- Add # in the format to print 0x for hexadecimal. It's easier to
differentiation from decimal
- Re-order informations printed
- Drop print of the virtual addresses. It makes the log more
difficult t
Make clear that the callback is only used to make the device tree node
for the hardware domain.
Signed-off-by: Julien Grall
---
Changes in v2:
- Patch added
---
xen/arch/arm/domain_build.c | 2 +-
xen/arch/arm/gic-hip04.c| 7 ---
xen/arch/arm/gic-v2.c | 7 ---
xen/
It's not necessary to get again from the hardware DT the redistributor
informations. We already have it stored in the gic_info and the domain.
Use the latter to be consistent with the rest of the function.
Signed-off-by: Julien Grall
---
Changes in v2:
- Typo in the commit message
-
There is a global check for page alignment later within the same function.
Signed-off-by: Julien Grall
Cc: Zoltan Kiss
Acked-by: Ian Campbell
---
Changes in v2:
- Add Ian's ack
- Merge "gic-v2: Remove redundant check in gicv2_init" and
"gic-hip04: Remove redundant c
TODO: in the future this parameter may be further extended to allow
specifying arbitrary regions, e.g. even those belonging to another
platform as a preparation for live migration with passthrough devices.
I don't think this needs to be explained in this document at all.
Whenever someone does th
>>> On 26.06.15 at 11:17, wrote:
> On 06/26/2015 11:28 AM, Jan Beulich wrote:
> On 15.06.15 at 11:03, wrote:
>>> @@ -109,7 +109,10 @@ void hvm_event_cr(unsigned int index, unsigned long
>>> value, unsigned long old)
>>>
>>> hvm_event_traps(currad->monitor.write_ctrlreg_sync &
>>>
xen-*-syms cannot actually be booted, so putting it in /boot is a bit
misleading. It also happens to cause a warning from update-grub (so at
least it doesn't end up in grub.cfg)
/usr/lib/debug seems to be a pretty common path for installing such
debug info.
Signed-off-by: Ian Campbell
---
INSTA
Currently, it's hard to decide whether a part of the domain
initialization should live in gicv_setup (part of the GIC
driver) and domain_init (part of the vGIC driver).
The code to initialize the domain for a specific vGIC version is always
the same no matter the version of the GIC.
Move all the
* Modify the GICv3 driver to recognize a such device. I wasn't able
to find a register which tell if GICv2 is supported on GICv3. The only
way to find it seems to check if the DT node provides GICC and GICV.
* Disable access to ICC_SRE_EL1 to guest using vGICv2
* The LR is slightly different
0 is a valid physical address and dt_device_get_address would return
an error if a problem during the retrieving happen.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
Cc: Zoltan Kiss
---
Changes in v2:
- Add Ian's acked
- Merge "xen/arm: gic-v2: Allow the base address
The driver only needs to know the base address of the hypervisor
register during the GIC initialization (see {gicv2,hip04}_init).
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
Cc: Zoltan Kiss
---
Changes in v2:
- Add Ian's acked
- Merge "xen/arm: gic-v2: Remove hbase f
... in order to decouple the vGIC driver from the GIC driver.
Each vGIC HW structure contains a boolean to indicate if the current GIC is
able to support this specific version of virtual GIC.
Helpers have been introduced in order to help the GIC to setup correctly
the vGIC. The GIC will have to c
A platform may have a GIC compatible with previous version of the
device.
This is allow to virtualize an unmodified OS on new hardware if the GIC
is compatible with older version.
When a guest is created, the vGIC will emulate same version as the
hardware. Although, the user can specify in the co
On 26/06/15 10:41, Ian Campbell wrote:
> xen-*-syms cannot actually be booted, so putting it in /boot is a bit
> misleading. It also happens to cause a warning from update-grub (so at
> least it doesn't end up in grub.cfg)
>
> /usr/lib/debug seems to be a pretty common path for installing such
> de
On 06/26/2015 11:44 AM, Jan Beulich wrote:
@@ -891,14 +934,37 @@ static int hvmemul_rep_outs(
>>>!!(ctxt->regs->eflags & X86_EFLAGS_DF),
>>> NULL);
>>> }
>>>
>>> -static int hvmemul_rep_movs(
>>> +static int hvmemul_rep_outs_set_con
On 26/06/2015 11:19, Vijay Kilari wrote:
Hi Julien,
Hi Vijay,
On Mon, Jun 22, 2015 at 10:46 PM, Julien Grall wrote:
Hi,
+cmd->mapd.cmd = GITS_CMD_MAPD;
+cmd->mapd.devid = desc->its_mapd_cmd.dev->device_id;
+cmd->mapd.size = size - 1;
+cmd->mapd.itt = itt_addr >> 8;
I
On Fri, 2015-06-26 at 10:48 +0100, Andrew Cooper wrote:
> > +BOOT_DIR defaults to /boot, DERBUG_DIR defaults to /usr/lib/debugt and
>
> DERBUG and /debugt
Gah!
> > +EFI_DIR to /usr/lib64/efi.
> > BOOT_DIR=
> > +DEBUG_DIR=
> > EFI_DIR=
> >
> > The make target 'rpmball' will build a xen.rpm.
>>> On 25.06.15 at 14:02, wrote:
> Thursday, June 25, 2015, 1:29:39 PM, you wrote:
> On 25.06.15 at 12:51, wrote:
>>> Attached is the xl-dmesg output of:
>>>
>>> - debug-keys M and i before guest boot
>>> - guest boot
>>> - debug-keys M and i after lsusb in the guest that hangs.
>
>> Intere
>>> On 26.06.15 at 11:49, wrote:
> Sorry, I don't follow - I did truncate the data if bytes_per_rep >
> curr->arch.vm_event.emul_read_data->size. But I'm passing reps on
> untouched to hvmemul_do_pio(). Did I misunderstand the hvmemul_do_pio()
> code? Should I pass a (*reps * bytes_per_rep) sized
>>> On 26.06.15 at 11:55, wrote:
> On Fri, 2015-06-26 at 10:48 +0100, Andrew Cooper wrote:
>> > +BOOT_DIR defaults to /boot, DERBUG_DIR defaults to /usr/lib/debugt and
>>
>> DERBUG and /debugt
>
> Gah!
>
>> > +EFI_DIR to /usr/lib64/efi.
>> > BOOT_DIR=
>> > +DEBUG_DIR=
>> > EFI_DIR=
>> >
>>
If the host EPT entry is changed, the nested EPT should be updated.
the current code does not do this, and it's wrong.
I have tested this patch, the L2 guest can boot and run as normal.
Signed-off-by: Liang Li
Signed-off-by: Yang Zhang
Reported-by: Tim Deegan
---
xen/arch/x86/mm/p2m-ept.c | 4
If the host EPT entry is changed, the nested EPT should be updated.
the current code does not do this, and it's wrong.
I have tested this patch, the L2 guest can boot and run as normal.
Signed-off-by: Liang Li
Signed-off-by: Yang Zhang
Reported-by: Tim Deegan
---
xen/arch/x86/mm/p2m-ept.c | 4
Sorry for the wrong email of Yang's, please ignore. I will resend.
Liang
> -Original Message-
> From: Li, Liang Z
> Sent: Saturday, June 27, 2015 5:57 AM
> To: xen-devel@lists.xen.org
> Cc: t...@xen.org; k...@xen.org; jbeul...@suse.com;
> andrew.coop...@citrix.com; Tian, Kevin; Li, Lian
Hi Iurii,
On 08/04/2015 16:14, Iurii Konovalenko wrote:
From: Iurii Konovalenko
Changes in v3:
- Julien Grall's comment added to commit message
Changes in v2:
- Commit message edited
- Signed-off is set
Iurii Konovalenko (1):
arm: irq: increase size of irq from uint8_t to u
>>> On 26.06.15 at 23:57, wrote:
> If the host EPT entry is changed, the nested EPT should be updated.
> the current code does not do this, and it's wrong.
> I have tested this patch, the L2 guest can boot and run as normal.
>
> Signed-off-by: Liang Li
> Signed-off-by: Yang Zhang
> Reported-by:
Hi Ian,
Do you plan to resend this patch?
Regards,
On 20/01/2015 11:52, Ian Campbell wrote:
A few folks have been caught out by OSes which call e.g.
HYPERVISOR_event_channel_op_compat which has been deprecated since
3.2.2 (i.e. long before Xen on ARM). Existing x86 code can still
safely and qu
Ian Jackson writes ("[PATCH v4 00/35] libxl ao abort request (cancellation)"):
> This is v4 of my series to provide support for abandoning a
> long-running libxl operation.
I've pushed it here
http://xenbits.xen.org/gitweb/?p=people/iwj/xen.git;a=summary
git://xenbits.xen.org/people/iwj/xen.g
Hi All,
Here is a design for allowing guests to control the IOMMU. This
allows for the guest GFN mapping to be programmed into the IOMMU and
avoid using the SWIOTLB bounce buffer technique in the Linux kernel
(except for legacy 32 bit DMA IO devices).
Draft C has been reordered to explain expecte
> Please don't forget to Cc the maintainer (recently changed, now added).
>
> > @@ -1076,6 +1077,9 @@ void ept_sync_domain(struct p2m_domain *p2m)
> >
> > ASSERT(local_irq_is_enabled());
> >
> > +if ( nestedhvm_enabled(d) && !p2m_is_nestedp2m(p2m) ) {
> > +p2m_flush_nestedp2m(d);
Where "appropriate" means if TftpDiVersion is set to current, which is
the default in standalone mode. The assumption is that someone wuth
that configration runs mg-debian-installer-update then they would
expected the update to be immediately effective.
There was some existing, but commented, code
That is, the date without the suite suffix.
Signed-off-by: Ian Campbell
---
v2: Output suitable for direct cut-n-paste
---
mg-debian-installer-update | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/mg-debian-installer-update b/mg-debian-installer-update
index ba2fdc4.
On 06/26/2015 12:39 PM, Jan Beulich wrote:
@@ -1249,15 +1250,16 @@ static void load_vvmcs_host_state(struct vcpu *v)
>>> __vmwrite(vmcs_h2g_field[i].guest_field, r);
>>> }
>>>
>>> -hvm_set_cr0(__get_vvmcs(vvmcs, HOST_CR0));
>>> -hvm_set_cr4(__ge
On Wed, 2015-06-24 at 10:38 +0100, Ian Campbell wrote:
> TL;DR osstest is exposing issues running on "AMD Opteron(tm) Processor
> 6376" in at least a couple of test cases. It would be good if someone
> from AMD could have a look.
At Andy Cooper's request I ran a quick job with mtrr.show=true
http:
>>> On 26.06.15 at 12:37, wrote:
> At Andy Cooper's request I ran a quick job with mtrr.show=true
> http://logs.test-lab.xenproject.org/osstest/logs/58909/
>
> I think the relevant serial output is:
> Jun 26 09:57:42.325077 (XEN) MTRR default type: uncachable
> Jun 26 09:57:42.325111 (XEN) MTRR
This is under #ifdef HAVE_LIBC so went unnoticed before.
Signed-off-by: Ian Campbell
---
tpm_tis.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tpm_tis.c b/tpm_tis.c
index 98fe837..475ac5d 100644
--- a/tpm_tis.c
+++ b/tpm_tis.c
@@ -1429,7 +1429,7 @@ struct tpm_chip* ini
the SEDF scheduler is about to be deprecated and go
away (see [1]). OTOH, the RTDS scheduler is here to
stay.
It therefore makes sense to stop smoke testing the
former in favour of the latter. Note that the
-sedf-pin jobs where only added in order to try to
debug a long standing issue with SEDF; i
On 2015-06-26 11:56, Jan Beulich wrote:
On 25.06.15 at 14:02, wrote:
Thursday, June 25, 2015, 1:29:39 PM, you wrote:
On 25.06.15 at 12:51, wrote:
Attached is the xl-dmesg output of:
- debug-keys M and i before guest boot
- guest boot
- debug-keys M and i after lsusb in the guest that hangs.
+ARM devs.
On Fri, 2015-06-26 at 11:23 +0100, Malcolm Crossley wrote:
> Hi All,
I had a chat with Malcolm about this with respect to ARM.
The upshot is that this does not help us to remove the dom0 1:1
workaround or associated swiotlb uses on systems without an SMMU, nor
does it allow us to sens
On Wed, 2015-06-24 at 16:32 +0100, Ian Campbell wrote:
> Note: ARM testing currently uses a 3.16 based linux-arm-xen kernel
> (compared to 3.14 currently used as the default). In order to support
> Mustang something newer is needed, I've been testing 4.1 (next LTS
> kernel), 3.18 (the intervening L
Also contains a fix from Thomas Leonard (to use %u for "4 + 32", not
%lu) previously posted as part of "mini-os: enable compiler check for
printk format types" but with mini-os now having been split a separate
repo most of that change has been applied there.
This fixes the 32-bit build with update
On Fri, 2015-06-26 at 12:58 +0200, Dario Faggioli wrote:
> the SEDF scheduler is about to be deprecated and go
> away (see [1]). OTOH, the RTDS scheduler is here to
> stay.
>
> It therefore makes sense to stop smoke testing the
> former in favour of the latter. Note that the
> -sedf-pin jobs where
XenGT leverages ioreq server to track and forward the accesses to
GPU IO resources, e.g. the PPGTT(per-process graphic translation
tables). Currently, ioreq server uses rangeset to track the BDF/
PIO/MMIO ranges to be emulated. To select an ioreq server, the
rangeset is searched to see if the IO
On Fri, 2015-06-26 at 12:08 +0100, Ian Campbell wrote:
> On Fri, 2015-06-26 at 12:58 +0200, Dario Faggioli wrote:
> > the SEDF scheduler is about to be deprecated and go
> > away (see [1]). OTOH, the RTDS scheduler is here to
> > stay.
> >
> > It therefore makes sense to stop smoke testing the
> >
flight 58884 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58884/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boot fail in 58848 pass in 58884
test-amd64-amd64-xl-sedf-pin 17
On Fri, 2015-06-26 at 11:49 +0100, Jan Beulich wrote:
> >>> On 26.06.15 at 12:37, wrote:
> > At Andy Cooper's request I ran a quick job with mtrr.show=true
> > http://logs.test-lab.xenproject.org/osstest/logs/58909/
> >
> > I think the relevant serial output is:
> > Jun 26 09:57:42.325077 (XEN)
(Note, please trim your quotes when replying, and also trim the CC list if
necessary. You might also consider changing the subject line of your reply to
"Status of FOO (Was: Xen 4.6 Development Update (X months reminder)")
Hi all
We are now more than 5 months into 4.6 development window. This is
AIUI the runes used will only result in an ESP if the system was
booted via UEFI. IOW I don't think there should be any change for
existing systems.
Signed-off-by: Ian Campbell
Acked-by: Ian Jackson
---
Osstest.pm| 1 +
Osstest/Debian.pm | 6 ++
2 files changed, 7 insertions(+)
dif
Other bootloaders handle this with an explicit separate option rather
than parsing it out of the command line as pxelinux does. Prepare for
supporting these.
Signed-off-by: Ian Campbell
Acked-by: Ian Jackson
---
ts-host-install | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff -
1 - 100 of 294 matches
Mail list logo