>>> On 20.05.16 at 19:56, wrote:
> On Fri, May 20, 2016 at 6:20 AM, Jan Beulich wrote:
> On 19.05.16 at 20:40, wrote:
>>> Does anyone try to install two version of Xen toolstack on the same machine?
>>> Is there any documentation about the best practice to install two
>>> versions of Xen ont
flight 94712 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94712/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail in
94699 REGR. vs. 94580
> -Original Message-
> From: Tian, Kevin
> Sent: Monday, May 23, 2016 2:52 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com;
> george.dun...@eu.citrix.com; dario.faggi...@citrix.com;
> konrad.w...@oracle.com
> Subject: RE: [PATCH
>>> On 20.05.16 at 12:46, wrote:
>
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Friday, May 20, 2016 6:27 PM
>> To: Wu, Feng
>> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
>> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
>> de...@lists.x
> -Original Message-
> From: suravee.suthikulpa...@amd.com
> [mailto:suravee.suthikulpa...@amd.com]
> Sent: 22 May 2016 00:42
> To: xen-devel@lists.xen.org; Paul Durrant; jbeul...@suse.com; George
> Dunlap
> Cc: Keir (Xen.org); Suravee Suthikulpanit; Suravee Suthikulpanit
> Subject: [PATCH
> -Original Message-
> From: suravee.suthikulpa...@amd.com
> [mailto:suravee.suthikulpa...@amd.com]
> Sent: 22 May 2016 00:43
> To: xen-devel@lists.xen.org; Paul Durrant; jbeul...@suse.com; George
> Dunlap
> Cc: Keir (Xen.org); Suravee Suthikulpanit
> Subject: [PATCH v3 2/3] svm: iommu: Onl
> -Original Message-
> From: suravee.suthikulpa...@amd.com
> [mailto:suravee.suthikulpa...@amd.com]
> Sent: 22 May 2016 00:43
> To: xen-devel@lists.xen.org; Paul Durrant; jbeul...@suse.com; George
> Dunlap
> Cc: Keir (Xen.org); Suravee Suthikulpanit; Suravee Suthikulapanit
> Subject: [PATCH
>>> On 22.05.16 at 21:04, wrote:
> On 5/22/16 12:01 AM, Doug Goldstein wrote:
>> --- /dev/null
>> +++ b/xen/Kconfig.debug
>> @@ -0,0 +1,13 @@
>> +
>> +menu "Debugging Options"
>> +
>> +config DEBUG
>> +bool "Developer Checks"
>
> Add the following when committing:
>
> default y
>
> if
>>> On 22.05.16 at 17:03, wrote:
> On 22/05/16 15:58, Wei Liu wrote:
>> On Sun, May 22, 2016 at 09:14:36AM +, osstest service owner wrote:
>>> flight 94672 xen-unstable real [real]
>>> http://logs.test-lab.xenproject.org/osstest/logs/94672/
>>>
>>> Regressions :-(
>>>
>>> Tests which did not
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 4:09 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
>>> On 23.05.16 at 10:44, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Monday, May 23, 2016 4:09 PM
>> >>> On 20.05.16 at 12:46, wrote:
>> > If this is the case, it can address part of my concern. Another
>> > concern is
>> > if a vCPU is blocking on a pCPU, then the pCPU is go
>>> On 23.05.16 at 09:16, wrote:
>
>> -Original Message-
>> From: Tian, Kevin
>> Sent: Monday, May 23, 2016 2:52 PM
>> To: Wu, Feng ; xen-devel@lists.xen.org
>> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com;
>> george.dun...@eu.citrix.com; dario.faggi...@citrix.com;
>>
>>> On 23.05.16 at 07:48, wrote:
>> From: Tian, Kevin
>> Sent: Monday, May 23, 2016 1:19 PM
>> > From: Wu, Feng
>> > Sent: Friday, May 20, 2016 4:54 PM
>> > --- a/xen/arch/x86/hvm/vmx/vmx.c
>> > +++ b/xen/arch/x86/hvm/vmx/vmx.c
>> > @@ -248,6 +248,36 @@ void vmx_pi_hooks_deassign(struct domain *d)
Hello Andrii,
On 20/05/16 18:09, Andrii Anisov wrote:
If I understand correctly, all the initiators but the GPU will be used by
DOM0 which is already direct mapped. The only issue here is allocating
memory enough memory below 4GB.
It's not about memory allocation for domain. It is rather about
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 5:08 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
Hello Andrii,
On 20/05/16 17:24, Andrii Anisov wrote:
If a malicious user has access to the Android guest (via USB key, wifi,...)
he would be able to crash the platform using the GPU because there is no
SMMU protection.
That's why we are shadowing GPU MMU translation tables in xen heap.
And thi
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 5:04 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
On 20/05/16 18:45, Wei Liu wrote:
> On Fri, May 20, 2016 at 05:38:44PM +0100, Ian Jackson wrote:
>> Wei Liu writes ("[RFC] libxl hotplug / unplug emulated devices"):
>>> Recently I got a report on xen-users@ about xl network-attach not
>>> working for HVM guest.
>>>
>>> I try to use
>>> xl networ
Hi, Edgar.
On Fri, May 20, 2016 at 7:05 PM, Edgar E. Iglesias
wrote:
> Hi,
>
> We have similar needs (not exactly the same) in some of our setups.
> We need to map certain OCMs (On Chip Memories) to dom0. Among other things,
> these are used to communicate with remote accelerators/CPUs that have
On 22/05/16 01:20, suravee.suthikulpa...@amd.com wrote:
> diff --git a/xen/drivers/passthrough/amd/iommu_acpi.c
> b/xen/drivers/passthrough/amd/iommu_acpi.c
> index 79c1f8c..c4eec50 100644
> --- a/xen/drivers/passthrough/amd/iommu_acpi.c
> +++ b/xen/drivers/passthrough/amd/iommu_acpi.c
> @@ -821,1
On Sun, May 22, 2016 at 05:37:51AM +, osstest service owner wrote:
> branch xen-unstable
> xenbranch xen-unstable
> job test-amd64-amd64-xl-qemuu-ovmf-amd64
> testid guest-start/debianhvm.repeat
>
> Tree: linux git://xenbits.xen.org/linux-pvops.git
> Tree: linuxfirmware git://xenbits.xen.org/o
On Mon, May 23, 2016 at 11:03:52AM +0100, Wei Liu wrote:
> On Sun, May 22, 2016 at 05:37:51AM +, osstest service owner wrote:
> > branch xen-unstable
> > xenbranch xen-unstable
> > job test-amd64-amd64-xl-qemuu-ovmf-amd64
> > testid guest-start/debianhvm.repeat
> >
> > Tree: linux git://xenbit
Whole series:
Release-acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hello Edgar,
I have CCed a couple of people from ARM to get more input on it.
On 20/05/16 16:51, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
This series adds support for mapping mmio-sram nodes into dom0
as MEMORY, cached and with RWX perms.
Can you explain why you chose to map those
On Mon, May 23, 2016 at 10:32:15AM +0100, George Dunlap wrote:
> On 20/05/16 18:45, Wei Liu wrote:
> > On Fri, May 20, 2016 at 05:38:44PM +0100, Ian Jackson wrote:
> >> Wei Liu writes ("[RFC] libxl hotplug / unplug emulated devices"):
> >>> Recently I got a report on xen-users@ about xl network-att
On Sat, May 21, 2016 at 4:42 AM, Marek Marczykowski-Górecki
wrote:
> Hi,
>
> According to xl.cfg(5) " This option defaults to true (1) if any PCI
> passthrough devices are configured and false (0) otherwise."
> And indeed this behaviour is implemented in xl. But not in libxl, which
> means other l
> -Original Message-
> From: Wu, Feng
> Sent: Monday, May 23, 2016 5:18 PM
> To: Jan Beulich
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.org; Wu, Feng
>
> Subject: R
On Fri, May 20, 2016 at 06:45:04PM +0100, Wei Liu wrote:
> On Fri, May 20, 2016 at 05:38:44PM +0100, Ian Jackson wrote:
> > Wei Liu writes ("[RFC] libxl hotplug / unplug emulated devices"):
> > > Recently I got a report on xen-users@ about xl network-attach not
> > > working for HVM guest.
> > >
>
On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki wrote:
> Hi,
>
> According to xl.cfg(5) " This option defaults to true (1) if any PCI
> passthrough devices are configured and false (0) otherwise."
> And indeed this behaviour is implemented in xl. But not in libxl, which
> mean
Hi Stefano,
On 09/05/16 14:04, Julien Grall wrote:
On 09/05/16 11:05, Stefano Stabellini wrote:
On Thu, 5 May 2016, Julien Grall wrote:
+u32 aarch64_insn_encode_immediate(enum aarch64_insn_imm_type type,
+ u32 insn, u64 imm)
+{
+u32 immlo, immhi, mask;
+int shift;
He
On 23/05/16 11:47, Wei Liu wrote:
> On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki wrote:
>> Hi,
>>
>> According to xl.cfg(5) " This option defaults to true (1) if any PCI
>> passthrough devices are configured and false (0) otherwise."
>> And indeed this behaviour is implement
>>> On 23.05.16 at 11:21, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Monday, May 23, 2016 5:04 PM
>> >>> On 23.05.16 at 09:16, wrote:
>> >> From: Tian, Kevin
>> >> Sent: Monday, May 23, 2016 2:52 PM
>> >> Somehow I'm thinking whether we really need such dynamic
>> >> callback
On Thu, May 19, 2016 at 4:01 PM, Jan Beulich wrote:
On 19.05.16 at 16:53, wrote:
>> On Thu, May 19, 2016 at 08:44:59AM -0600, Jan Beulich wrote:
>>> >>> On 19.05.16 at 16:34, wrote:
>>> > We could even have the
>>> > library name versions be set based on XEN_VERSION and XEN_SUBVERSION, so
>
>>> On 23.05.16 at 12:35, wrote:
>> From: Wu, Feng
>> Sent: Monday, May 23, 2016 5:18 PM
>> > From: Jan Beulich [mailto:jbeul...@suse.com]
>> > Sent: Monday, May 23, 2016 5:08 PM
>> > To: Wu, Feng
>> > >>> On 23.05.16 at 07:48, wrote:
>> > > Yes, indeed it is more natural to add this function wh
Hi Stefano,
On 21/05/16 16:09, Stefano Stabellini wrote:
On Thu, 5 May 2016, Julien Grall wrote:
+void __init apply_alternatives_all(void)
+{
+int ret;
+
+ /* better not try code patching on a live SMP system */
+ret = stop_machine_run(__apply_alternatives_multi_stop, NULL, NR_CPU
State that only attaching PV interface is supported.
Signed-off-by: Wei Liu
---
It's probably safe to claim the same for other device types, but I will just
stick with the ones I tested at this stage of the release.
Cc: Ian Jackson
---
docs/man/xl.pod.1 | 6 --
1 file changed, 4 insertions
On Fri, May 20, 2016 at 5:53 PM, Wei Liu wrote:
> On Fri, May 20, 2016 at 05:48:37PM +0100, Anthony PERARD wrote:
>> On Fri, May 20, 2016 at 05:34:10PM +0100, Ian Jackson wrote:
>> > Anthony PERARD writes ("[PATCH] docs: Fix device_model_user description of
>> > its default value"):
>> > > docs/m
On Mon, May 23, 2016 at 11:59:10AM +0100, Andrew Cooper wrote:
> On 23/05/16 11:47, Wei Liu wrote:
> > On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki wrote:
> >> Hi,
> >>
> >> According to xl.cfg(5) " This option defaults to true (1) if any PCI
> >> passthrough devices are con
Running QEMU as non-root user is not ready yet, so avoid avertising it
with a warning.
Also improve the doc to include more potential issue with running QEMU
as non-root.
Signed-off-by: Anthony PERARD
---
docs/man/xl.cfg.pod.5 | 5 +++--
docs/misc/qemu-deprivilege.txt | 4 ++--
tools/l
On Thu, May 19, 2016 at 05:37:29PM +0300, Iurii Mykhalskyi wrote:
> This patches introduce set of pv drivers interfaces.
> Drivers interfaces list:
> - PV RTC - real-time clock
> - PV TTY - interface for pv version for device controlled by
> via tty (e.g. GPS)
> - PV Audio - sound interface
>>> On 22.05.16 at 01:42, wrote:
> --- a/xen/arch/x86/hvm/intercept.c
> +++ b/xen/arch/x86/hvm/intercept.c
> @@ -258,6 +258,8 @@ struct hvm_io_handler *hvm_next_io_handler(struct domain
> *d)
> {
> unsigned int i = d->arch.hvm_domain.io_handler_count++;
>
> +ASSERT( d->arch.hvm_domain
>>> On 22.05.16 at 01:42, wrote:
> From: Suravee Suthikulpanit
>
> The guest_iommu_init() is currently called by the following code path:
>
> arch/x86/domain.c: arch_domain_create()
> ]- drivers/passthrough/iommu.c: iommu_domain_init()
> |- drivers/passthrough/amd/pci_amd_iomm
On Mon, May 23, 2016 at 11:29:31AM +0100, Julien Grall wrote:
> Hello Edgar,
>
> I have CCed a couple of people from ARM to get more input on it.
Thanks Julien,
> On 20/05/16 16:51, Edgar E. Iglesias wrote:
> >From: "Edgar E. Iglesias"
> >
> >This series adds support for mapping mmio-sram node
On Mon, May 23, 2016 at 12:35:02PM +0100, Anthony PERARD wrote:
> Running QEMU as non-root user is not ready yet, so avoid avertising it
> with a warning.
>
> Also improve the doc to include more potential issue with running QEMU
> as non-root.
>
> Signed-off-by: Anthony PERARD
> ---
> docs/man
On Fri, May 20, 2016 at 09:52:40AM -0400, Boris Ostrovsky wrote:
> Recent changes in ACPICA (specifically, Linux commit 66b1ed5aa8dd ("ACPICA:
> ACPI 2.0, Hardware: Add access_width/bit_offset support for
> acpi_hw_write()") result in guests issuing 32-bit accesses to IO space.
>
> QEMU needs to b
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 7:11 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
>>> On 20.05.16 at 10:53, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -107,12 +107,22 @@ void vmx_pi_per_cpu_init(unsigned int cpu)
> static void vmx_vcpu_block(struct vcpu *v)
> {
> unsigned long flags;
> -unsigned int dest;
> +unsigned int des
On Fri, 2016-05-20 at 16:53 +0800, Feng Wu wrote:
> We need to make sure the bocking vcpu is not in any per-cpu blocking
> list
> when the associated domain is going to be destroyed.
>
> Signed-off-by: Feng Wu
> ---
>
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -24
>>> On 20.05.16 at 10:53, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -233,7 +233,6 @@ void vmx_pi_hooks_assign(struct domain *d)
> d->arch.hvm_domain.vmx.vcpu_block = vmx_vcpu_block;
> d->arch.hvm_domain.vmx.pi_switch_from = vmx_pi_switch_from;
>
>>> On 20.05.16 at 10:53, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -248,6 +248,36 @@ void vmx_pi_hooks_deassign(struct domain *d)
> d->arch.hvm_domain.vmx.pi_switch_to = NULL;
> }
>
> +static void vmx_pi_blocking_list_cleanup(struct domain *d)
> +{
On Mon, 2016-05-23 at 02:51 -0600, Jan Beulich wrote:
> > > > On 23.05.16 at 10:44, wrote:
> > >
> > > vCPU-s currently having their v->processor set to the pCPU being
> > > hot removed would simply get migrated elsewhere. If that's not
> > > accompanied by respective PI blocking list adjustments
flight 94720 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94720/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 3 host-install(3) broken REGR. vs.
>>> On 23.05.16 at 14:24, wrote:
>
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Monday, May 23, 2016 7:11 PM
>> To: Wu, Feng
>> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
>> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
>> de...@lists.x
On Mon, 2016-05-23 at 06:32 -0600, Jan Beulich wrote:
> > > > On 20.05.16 at 10:53, wrote:
> > @@ -247,13 +246,14 @@ void vmx_pi_hooks_deassign(struct domain *d)
> > d->arch.hvm_domain.vmx.vcpu_block = NULL;
> > d->arch.hvm_domain.vmx.pi_switch_from = NULL;
> > d->arch.hvm_domain.vm
>>> On 22.05.16 at 07:01, wrote:
> --- /dev/null
> +++ b/xen/Kconfig.debug
> @@ -0,0 +1,13 @@
> +
> +menu "Debugging Options"
> +
> +config DEBUG
> + bool "Developer Checks"
> + ---help---
> + Enables developer checks such as asserts and extra printks, this
> + option is intend
(CC Wei Liu)
On 23/05/16 12:56, Edgar E. Iglesias wrote:
On Mon, May 23, 2016 at 11:29:31AM +0100, Julien Grall wrote:
On 20/05/16 16:51, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
This series adds support for mapping mmio-sram nodes into dom0
as MEMORY, cached and with RWX perms.
On 05/23/2016 08:02 AM, Wei Liu wrote:
> On Fri, May 20, 2016 at 09:52:40AM -0400, Boris Ostrovsky wrote:
>> Recent changes in ACPICA (specifically, Linux commit 66b1ed5aa8dd ("ACPICA:
>> ACPI 2.0, Hardware: Add access_width/bit_offset support for
>> acpi_hw_write()") result in guests issuing 32-bi
On Mon, May 23, 2016 at 09:02:58AM -0400, Boris Ostrovsky wrote:
> On 05/23/2016 08:02 AM, Wei Liu wrote:
> > On Fri, May 20, 2016 at 09:52:40AM -0400, Boris Ostrovsky wrote:
> >> Recent changes in ACPICA (specifically, Linux commit 66b1ed5aa8dd ("ACPICA:
> >> ACPI 2.0, Hardware: Add access_width/b
On Mon, May 23, 2016 at 11:47:48AM +0100, Wei Liu wrote:
> On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki wrote:
> > Hi,
> >
> > According to xl.cfg(5) " This option defaults to true (1) if any PCI
> > passthrough devices are configured and false (0) otherwise."
> > And indee
From: Juergen Gross
Introduce a new dummy system device serving as parent for virtual
buses. This will enable new pv backends to introduce virtual buses
which are removable again opposed to system buses which are meant
to stay once added.
Signed-off-by: Juergen Gross
Acked-by: Anthony PERARD
R
From: Juergen Gross
Add a backend for para-virtualized USB devices for xen domains.
The backend is using host-libusb to forward USB requests from a
domain via libusb to the real device(s) passed through.
Signed-off-by: Juergen Gross
Acked-by: Anthony PERARD
Message-id: 1463062421-613-4-git-se
From: Juergen Gross
Add a Xenstore directory for each supported pv backend. This will allow
Xen tools to decide which backend type to use in case there are
multiple possibilities.
The information is added under
/local/domain//device-model//backends
before the "running" state is written to Xensto
>>> On 22.05.16 at 07:01, wrote:
> This converts the debug options from xen/Rules.mk to Kconfig. Hopefully
> I haven't missed anything in the back and forth.
>
> change since v3:
> - wrap all options in 'if DEBUG || EXPERT' (except DEBUG)
> - wording update to DEBUG option and some commit message
On Mon, May 23, 2016 at 01:27:31PM +0200, Marek Marczykowski-Górecki wrote:
> On Mon, May 23, 2016 at 11:59:10AM +0100, Andrew Cooper wrote:
> > On 23/05/16 11:47, Wei Liu wrote:
> > > On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki
> > > wrote:
> > >> Hi,
> > >>
> > >> Accord
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 8:31 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
On 23/05/16 13:58, Jan Beulich wrote:
On 22.05.16 at 07:01, wrote:
>> --- /dev/null
>> +++ b/xen/Kconfig.debug
>> @@ -0,0 +1,13 @@
>> +
>> +menu "Debugging Options"
>> +
>> +config DEBUG
>> +bool "Developer Checks"
>> +---help---
>> + Enables developer checks such as asserts and
>
> +config VERBOSE_DEBUG
> + bool "Verbose debug messages"
> + default DEBUG
> + ---help---
> + Guest output from HYPERVISOR_console_io and hypervisor parsing
> + ELF images (dom0) is logged in the Xen ring buffer.
is logged?
or will be logged?
___
> +config CRASH_DEBUG
> + bool "Crash Debugging Support"
> + depends on X86
> + ---help---
> + If you want to be able to attach gdb to Xen to be able to debug
s/be able//
> + Xen if it crashes then say Y.
> +
___
Xen-devel maili
> +config PERF_COUNTERS
> + bool "Performance Counters"
> + ---help---
> + Enables software performance counters that allows you to analyze
> + bottlenecks in the system. To access this data you must use the
> + 'xenperf' tool.
I would reword this as :
"To access this da
On Sun, May 22, 2016 at 12:33:23PM +0100, Andrew Cooper wrote:
> On 22/05/16 06:01, Doug Goldstein wrote:
> > This converts the debug options from xen/Rules.mk to Kconfig. Hopefully
> > I haven't missed anything in the back and forth.
> >
> > change since v3:
> > - wrap all options in 'if DEBUG ||
>>> On 18.05.16 at 10:08, wrote:
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -557,14 +557,16 @@ static void iommu_flush_all(void)
> }
> }
>
> -static void __intel_iommu_iotlb_flush(struct domain *d, unsigned long gfn,
> -int dma_old_
On Mon, May 23, 2016 at 11:59:10AM +0100, Andrew Cooper wrote:
> On 23/05/16 11:47, Wei Liu wrote:
> > On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki wrote:
> >> Hi,
> >>
> >> According to xl.cfg(5) " This option defaults to true (1) if any PCI
> >> passthrough devices are con
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Monday, May 23, 2016 8:31 PM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: k...@xen.org; Tian, Kevin ; jbeul...@suse.com;
> andrew.coop...@citrix.com; george.dun...@eu.citrix.com;
> konrad.w...@oracle.
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 8:36 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
Hello Stefano,
On 21/05/16 15:40, Stefano Stabellini wrote:
On Thu, 5 May 2016, Julien Grall wrote:
+ bool "Cortex-A53: 819472: Store exclusive instructions might cause data
corruption"
+ default y
+ depends on ARM_64
+ help
+ This option adds an alternative cod
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, May 23, 2016 8:47 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or
>>> On 18.05.16 at 10:08, wrote:
> No spamming can occur.
May I suggest "No spamming of the log can occur", to set some
context for what follows?
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -240,21 +240,49 @@ int iommu_map_page(struct domain *d, unsigned
On Fri, May 20, 2016 at 09:52:40AM -0400, Boris Ostrovsky wrote:
> Recent changes in ACPICA (specifically, Linux commit 66b1ed5aa8dd ("ACPICA:
> ACPI 2.0, Hardware: Add access_width/bit_offset support for
> acpi_hw_write()") result in guests issuing 32-bit accesses to IO space.
>
> QEMU needs to b
Hi Stefano,
On 21/05/16 15:51, Stefano Stabellini wrote:
On Sat, 21 May 2016, Stefano Stabellini wrote:
On Thu, 5 May 2016, Julien Grall wrote:
Based on ARM ARM (D4.5.3 in ARM DDI 0486A and B3.12.7 in ARM DDI 0406C.c),
a Stage 1 translation error has priority over a Stage 2 translation error.
flight 94719 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94719/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf f6190a01c13a6b4dd01a1765b28964db7dc58e35
baseline version:
ovmf edddb945519cf71c048e82a2f009db3e1e7
On May 20, 2016 5:59 PM, Jan Beulich wrote:
> >>> On 20.05.16 at 09:15, wrote:
> > On May 17, 2016 10:00 PM, Jan Beulich wrote:
> >> >>> On 22.04.16 at 12:54, wrote:
> >> > --- a/xen/drivers/passthrough/vtd/qinval.c
> >> > +++ b/xen/drivers/passthrough/vtd/qinval.c
> >> > @@ -206,10 +206,71 @@
On Mon, May 23, 2016 at 02:02:39PM +0100, Julien Grall wrote:
> (CC Wei Liu)
>
> On 23/05/16 12:56, Edgar E. Iglesias wrote:
> >On Mon, May 23, 2016 at 11:29:31AM +0100, Julien Grall wrote:
> >>On 20/05/16 16:51, Edgar E. Iglesias wrote:
> >>>From: "Edgar E. Iglesias"
> >>>
> >>>This series adds
On Mon, May 23, 2016 at 12:57:26PM +0100, Wei Liu wrote:
> On Mon, May 23, 2016 at 12:35:02PM +0100, Anthony PERARD wrote:
> > Running QEMU as non-root user is not ready yet, so avoid avertising it
> > with a warning.
> >
> > Also improve the doc to include more potential issue with running QEMU
>
flight 94717 qemu-upstream-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/94717/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 3 host-install(3) broken REG
On Mon, May 23, 2016 at 03:09:17PM +0100, Anthony PERARD wrote:
> On Mon, May 23, 2016 at 12:57:26PM +0100, Wei Liu wrote:
> > On Mon, May 23, 2016 at 12:35:02PM +0100, Anthony PERARD wrote:
> > > Running QEMU as non-root user is not ready yet, so avoid avertising it
> > > with a warning.
> > >
>
On Fri, May 20, 2016 at 04:58:09PM -0700, Ed Swierk wrote:
> I've encountered two problems booting a Linux 4.4 dom0 on recent
> stable xen 4.5 on VMware ESXi 5.5.0.
>
> One has the same "ata_piix: probe of :00:07.1 failed with error
> -22" symptom discussed some time ago, and prevents the kern
This will be used to know if a feature, which Xen cares, is available accross
all the CPUs.
This code is a light version of arch/arm64/kernel/cpufeature.c from
Linux v4.6-rc3.
Signed-off-by: Julien Grall
---
xen/arch/arm/Makefile| 1 +
xen/arch/arm/cpufeature.c| 34
New immediates will be defined in the future. To keep track of the
immediates allocated, gather all of them in a separate header.
Also rename BRK_BUG_FRAME to BKR_BUG_FRAME_IMM.
Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's reviewed-
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's acked-by
---
xen/include/asm-arm/arm64/page.h | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/include/asm-arm/arm64/page.h b/xen/include/asm-arm/arm64/page.h
index 29a32cf..fbdc
After each CPU has been started, we iterate through a list of CPU
errata to detect CPUs which need from hypervisor code patches.
For each bug there is a function which check if that a particular CPU is
affected. This needs to be done on every CPUs to cover heterogenous
system properly.
If a certa
Some of the processor erratum will require to modify code sequence.
As those modifications may impact the performance, they should only
be enabled on affected cores. Furthermore, Xen may also want to take
advantage of new hardware features coming up with v8.1 and v8.2.
This patch adds an infrastru
It may not possible to return a proper error when encoding an
instruction. Instead, a handcrafted instruction will be returned.
Also, provide the encoding for the faulting instruction.
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's acked
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's acked-by
---
xen/arch/arm/Makefile | 38 --
xen/arch/arm/arm32/Makefile | 9 -
xen/arch/arm/arm64/Makefile | 12 +---
xe
We may need to update branch instruction when patching Xen.
The code has been imported from the files arch/arm64/kernel/insn.c
and arch/arm64/include/asm/insn.h in Linux v4.6.
Note that only the necessary helpers have been imported.
Signed-off-by: Julien Grall
---
Changes in v2:
-
The ARM erratum 832075 applies to certain revisions of Cortex-A57, one
of the workarounds is to change device loads into using load-acquire
semantics.
Use the alternative framework to enable the workaround only on affected
cores.
Whilst a guest could trigger the deadlock, it can be broken when th
The ARM erratum applies to certain revisions of Cortex-A57. The
processor may report a Stage 2 translation fault as the result of
Stage 1 fault for load crossing a page boundary when there is a
permission fault or device memory fault at stage 1 and a translation
fault at Stage 2.
So Xen needs to c
The new document will help to keep track of all the erratum that Xen is
able to handle.
The text is based on the Linux doc in Documents/arm64/silicon-errata.txt.
Also list the current errata that Xen is aware of.
Signed-off-by: Julien Grall
---
docs/misc/arm/silicon-errata.txt | 45 +++
Based on ARM ARM (D4.5.3 in ARM DDI 0486A and B3.12.7 in ARM DDI 0406C.c),
a Stage 1 translation error has priority over a Stage 2 translation error.
Therefore gva_to_ipa can only fail if another vCPU is playing with the
page table.
Rather than injecting a custom fault, replay the instruction and
Add new macros to easily get different parts of the register and to
check if a given MIDR match a CPU model range. The latter will be really
useful to handle errata later.
The macros have been imported from the header
arch/arm64/include/asm/cputype.h in Linux v4.6-rc3.
Also remove MIDR_MASK which
The ARM errata 819472, 827319 and 824069 define the same workaround for
these hardware issues in certain Cortex-A53 parts.
The cache instructions "dc cvac" and "dc cvau" need to be upgraded to
"dc civac".
Use the alternative framework to replace those instructions only on
affected cores.
Whilst
1 - 100 of 159 matches
Mail list logo