From: Rajiv M Ranganath
---
build/fedora/xen-unstable-runit/setup.sh | 21
build/fedora/xen-unstable-runit/teardown.sh| 21
.../xen-init-dom0-disk-backend/run |8
build/fedora/xen-unstable-runit/xen-ini
Hi Stefanao,
Following series adds documentation on how to use stage1-xen on Fedora.
It also adds continuous build support using CircleCI.
Xen, Qemu, rkt and stage1 ACI image are built using a Fedora based
container. This setup allows for a reproducible build environment that
we can use locally a
From: Rajiv M Ranganath
---
build/fedora/buildroot-README.md | 50 ++
1 file changed, 50 insertions(+)
create mode 100644 build/fedora/buildroot-README.md
diff --git a/build/fedora/buildroot-README.md b/build/fedora/buildroot-README.md
new file mode 10064
From: Rajiv M Ranganath
---
.gitignore |2 ++
1 file changed, 2 insertions(+)
create mode 100644 .gitignore
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 000..873f8f6
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,2 @@
+# build/fedora
+build/fedora/binutils-*.tar
__
---
build/fedora/RUNNING_STAGE1_XEN.md | 383
1 file changed, 383 insertions(+)
create mode 100644 build/fedora/RUNNING_STAGE1_XEN.md
diff --git a/build/fedora/RUNNING_STAGE1_XEN.md
b/build/fedora/RUNNING_STAGE1_XEN.md
new file mode 100644
index 000..7
---
BUILDING.md | 35 ++-
1 file changed, 30 insertions(+), 5 deletions(-)
diff --git a/BUILDING.md b/BUILDING.md
index 3ef5311..b9ca404 100644
--- a/BUILDING.md
+++ b/BUILDING.md
@@ -1,7 +1,13 @@
# Build
-stage1-xen requires new Xen and QEMU versions at the ti
From: Rajiv M Ranganath
---
build/fedora/buildroot-Dockerfile | 108 +
1 file changed, 108 insertions(+)
create mode 100644 build/fedora/buildroot-Dockerfile
diff --git a/build/fedora/buildroot-Dockerfile
b/build/fedora/buildroot-Dockerfile
new file mode
From: Rajiv M Ranganath
---
build/fedora/run | 87 ++
1 file changed, 87 insertions(+)
create mode 100755 build/fedora/run
diff --git a/build/fedora/run b/build/fedora/run
new file mode 100755
index 000..37e1dac
--- /dev/null
+++ b/bui
From: Rajiv M Ranganath
---
README.md |2 ++
1 file changed, 2 insertions(+)
diff --git a/README.md b/README.md
index 9ea6adf..e1cd40c 100644
--- a/README.md
+++ b/README.md
@@ -1,5 +1,7 @@
# stage1-xen - A Xen based stage1 for CoreOS rkt
+[
create mode 100755 build/fedora/source_path.sh
diff --git a/build/fedora/source_path.sh b/build/fedora/source_path.sh
new file mode 100755
index 000..57ac7ed
--- /dev/null
+++ b/build/fedor
From: Rajiv M Ranganath
---
.circleci/config.yml | 21 +
1 file changed, 21 insertions(+)
create mode 100644 .circleci/config.yml
diff --git a/.circleci/config.yml b/.circleci/config.yml
new file mode 100644
index 000..67ac964
--- /dev/null
+++ b/.circleci/config.yml
> > >
> > >
> > > +/*
> > > + * Because multiple features may co-exist, we need handle all
> > > features to write
> > > + * values of them into a COS register with new COS ID. E.g:
> > > + * 1. L3 CAT and MBA co-exist.
> > > + * 2. Dom1 and Dom2 share a same COS ID (2). The L3 CAT CBM of
> > >
>>> On 18.08.17 at 20:51, wrote:
> --- a/xen/include/asm-x86/hvm/hvm.h
> +++ b/xen/include/asm-x86/hvm/hvm.h
> @@ -158,7 +158,7 @@ struct hvm_function_table {
> int (*cpu_up_prepare)(unsigned int cpu);
> void (*cpu_dead)(unsigned int cpu);
>
> -int (*cpu_up)(void);
> +int (*
Hello Meng Xu,
On 18.08.17 23:43, Meng Xu wrote:
The Section 4.1 and 4.2 in [1] explained the whole experiment steps.
If you have any question or confusion on a specific step, please feel
free to let me know.
From the document it is not really clear if you ran one guest RT domain
or several si
On 21.08.17 11:07, Andrii Anisov wrote:
Hello Meng Xu,
On 18.08.17 23:43, Meng Xu wrote:
The Section 4.1 and 4.2 in [1] explained the whole experiment steps.
If you have any question or confusion on a specific step, please feel
free to let me know.
From the document it is not really clear if
From: Vivek Kumar Chaubey
Allow setting System Enclosure Asset Tag for HVM guest. Guest OS can
check and perform desired operation like support installation.
Signed-off-by: Vivek Kumar Chaubey
---
tools/firmware/hvmloader/smbios.c | 14 +++---
xen/include/public/hvm/hvm_xs_string
On Sat, Aug 19, 2017 at 04:21:42PM +0200, Thomas Petazzoni wrote:
> From: Bernd Kuhls
>
> The variable domctl.u.address_size.size may remain uninitialized if
> guest_type is not one of xen-3.0-aarch64 or xen-3.0-armv7l. And the
> code precisely checks if this variable is still 0 to decide if the
On Mon, 21 Aug 2017, Rajiv Ranganath wrote:
> +`stage1-xen-fedora-buildroot` has a external dependency
> +on [`binutils`](https://github.com/lambda-linux-fedora/binutils) package
> that is
> +compiled with `i386pe` support. You can download the pre-built RPMs
> +from [here](https://drive.google.c
> -Original Message-
> From: Juergen Gross [mailto:jgr...@suse.com]
> Sent: 16 August 2017 13:52
> To: xen-de...@lists.xenproject.org
> Cc: Juergen Gross ; Paul Durrant
> ; Jan Beulich ; Andrew
> Cooper
> Subject: [PATCH v3 09/52] xen/arch/x86/hvm/viridian.c: let custom
> parameter parsing
The compat mode code also needs adjustment to deal with the changed
return value from gnttab_copy().
Signed-off-by: Jan Beulich
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -258,9 +258,9 @@ int compat_grant_table_op(unsigned int c
rc = gnttab_co
On 18.08.17 23:43, Meng Xu wrote:
Sure. The workload we used in the paper is mainly the cpu-intensive task.
We first calibrate a busy-loop of multiplications that runs for 1ms.
Then for a task that executes for exe(ms), we simply let the task
execute the 1ms busy loop for exe times.
I'm a bit co
>>> On 21.08.17 at 10:16, wrote:
> --- a/tools/firmware/hvmloader/smbios.c
> +++ b/tools/firmware/hvmloader/smbios.c
> @@ -531,6 +531,7 @@ smbios_type_3_init(void *start)
> const char *s;
> void *pts;
> uint32_t length;
> +uint32_t counter = 1;
I think having the counter start
flight 71997 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71997/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-sid-netboot-pygrub 1 build-check(1)blocked n/a
build-arm64-pvops
From: Vivek Kumar Chaubey
Allow setting System Enclosure Asset Tag for HVM guest. Guest OS can
check and perform desired operation like support installation.
Signed-off-by: Vivek Kumar Chaubey
---
tools/firmware/hvmloader/smbios.c | 20 ++--
xen/include/public/hvm/hvm_xs_
On Mon, Aug 21, 2017 at 11:09:01AM +0200, Andreas Kinzler wrote:
> Hello Roger & Jan,
>
> > > > Could you please try the patch below and paste the output you get on
> > > > the Xen console?
> > > Output is in attached file. Does it help?
> > Yes, thanks. I'm quite sure the problem is that MSIX tab
On Fri, Aug 4, 2017 at 3:57 PM, Juergen Gross wrote:
> On 04/08/17 15:57, Andrew Cooper wrote:
>> On 04/08/17 14:36, Juergen Gross wrote:
>>> On 04/08/17 15:23, Andrew Cooper wrote:
On 04/08/17 14:20, Juergen Gross wrote:
> Last year Jan posted a patch series to change hypervisor log leve
On 21/08/17 09:34, Jan Beulich wrote:
> The compat mode code also needs adjustment to deal with the changed
> return value from gnttab_copy().
>
> Signed-off-by: Jan Beulich
/sigh - There's always another one, isn't there.
The patch should mention that it is part of XSA-226. With that,
Reviewed-
This email only tracks big items for xen.git tree. Please reply for items you
woulk like to see in 4.10 so that people have an idea what is going on and
prioritise accordingly.
You're welcome to provide description and use cases of the feature you're
working on.
= Timeline =
We now adopt a fixed
On Mon, Aug 21, 2017 at 10:40:39AM +0100, VIVEK KUMAR CHAUBEY wrote:
> From: Vivek Kumar Chaubey
>
> Allow setting System Enclosure Asset Tag for HVM guest. Guest OS can
> check and perform desired operation like support installation.
>
> Signed-off-by: Vivek Kumar Chaubey
> ---
> tools/firmwa
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Julien Grall
> Sent: 21 August 2017 11:08
> To: xen-de...@lists.xenproject.org
> Cc: julien.gr...@arm.com
> Subject: [Xen-devel] Xen 4.10 Development Update
>
> This email only tracks big items f
> * mode: C
> diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> index 6e80d36..10d317b 100644
> --- a/tools/libxl/libxl_types.idl
> +++ b/tools/libxl/libxl_types.idl
> @@ -977,6 +977,7 @@ libxl_psr_cbm_type = Enumeration("psr_cbm_type", [
> (2, "L3_CBM_CODE"),
>
> int libxl_psr_cat_get_info(libxl_ctx *ctx, libxl_psr_cat_info **info,
> int *nr, unsigned int lvl)
> {
> GC_INIT(ctx);
> int rc;
> -int i = 0, socketid, nr_sockets;
> -libxl_bitmap socketmap;
> +unsigned int i;
> +libxl_psr_hw_info *hw_info
On Wed, 2017-08-09 at 15:41 +0800, Yi Sun wrote:
> This patch renames 'xc_psr_cat_type' to 'xc_psr_val_type' so that
> the structure name is common for all allocation features.
>
> Signed-off-by: Yi Sun
Reviewed-by: Chao Peng
___
Xen-devel mailing li
>
> -static void libxl__psr_cat_log_err_msg(libxl__gc *gc, int err)
> +static void libxl__psr_alloc_log_err_msg(libxl__gc *gc,
> + int err,
> + libxl_psr_cbm_type type)
> {
> +/*
> + * Index is 'libxl_psr_cb
On Tue, 2017-08-15 at 12:25 +0100, Wei Liu wrote:
> On Wed, Aug 09, 2017 at 03:41:51PM +0800, Yi Sun wrote:
> >
> > This patch implements a new set value interface in tools suitable
> > for all psr
> > allocation features and the whole flow. It also enables MBA support
> > to set
> > MBA value in
Hi Paul,
On 21/08/17 11:11, Paul Durrant wrote:
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
Julien Grall
Sent: 21 August 2017 11:08
To: xen-de...@lists.xenproject.org
Cc: julien.gr...@arm.com
Subject: [Xen-devel] Xen 4.10 Development Update
T
On 21/08/17 12:07, Julien Grall wrote:
> This email only tracks big items for xen.git tree. Please reply for items you
> woulk like to see in 4.10 so that people have an idea what is going on and
> prioritise accordingly.
>
> You're welcome to provide description and use cases of the feature you'r
Hi Jan,
On 7 August 2017 at 14:44, Jan Beulich wrote:
Bhupinder Thakur 08/07/17 10:55 AM >>>
>>@@ -1148,6 +1149,24 @@ struct xen_domctl_psr_cat_op {
>>uint32_t target;/* IN */
>>uint64_t data; /* IN/OUT */
>>};
>>+
>>+struct xen_domctl_vuart_op {
>>+#define XEN_DOMCTL_VUART_OP_INIT
On Wed, Aug 9, 2017 at 8:36 AM, Jan Beulich wrote:
On 08.08.17 at 13:16, wrote:
>> On 08/07/2017 04:59 PM, Jan Beulich wrote:
>> George Dunlap 08/07/17 12:27 PM >>>
So it seems that people are still not quite clear about what I'm proposing.
>>>
>>> And indeed your examples helped m
On 21/08/17 10:33, Paul Durrant wrote:
>> -Original Message-
>> From: Juergen Gross [mailto:jgr...@suse.com]
>> Sent: 16 August 2017 13:52
>> To: xen-de...@lists.xenproject.org
>> Cc: Juergen Gross ; Paul Durrant
>> ; Jan Beulich ; Andrew
>> Cooper
>> Subject: [PATCH v3 09/52] xen/arch/x86
flight 112750 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112750/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 10 debian-hvm-install fail REGR. vs.
112647
test-amd
branch xen-4.5-testing
xenbranch xen-4.5-testing
job test-amd64-i386-xl-qemuu-ovmf-amd64
testid debian-hvm-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree:
> -Original Message-
> From: Juergen Gross [mailto:jgr...@suse.com]
> Sent: 21 August 2017 12:02
> To: Paul Durrant ; xen-de...@lists.xenproject.org
> Cc: Jan Beulich ; Andrew Cooper
>
> Subject: Re: [PATCH v3 09/52] xen/arch/x86/hvm/viridian.c: let custom
> parameter parsing routines retu
From: Vivek Kumar Chaubey
Allow setting system enclosure asset tag for HVM guest. Guest OS can
check and perform desired operation like support installation.
Also added documentation of '~/bios-string/*' xenstore keys into
docs/misc/xenstore-paths.markdown
Signed-off-by: Vivek Kumar Chaubey
--
>>> On 21.08.17 at 12:28, wrote:
> Hi Jan,
>
> On 7 August 2017 at 14:44, Jan Beulich wrote:
> Bhupinder Thakur 08/07/17 10:55 AM >>>
>>>@@ -1148,6 +1149,24 @@ struct xen_domctl_psr_cat_op {
>>>uint32_t target;/* IN */
>>>uint64_t data; /* IN/OUT */
>>>};
>>>+
>>>+struct xen_domctl
This avoids unnecessary updates to the stack shadow copy of cr4 during
critical regions with interrupts disabled.
No change in behaviour.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/flushtlb.c | 19 +--
1 file changed, 13 insertions(+), 6 deletions(-)
dif
flight 112757 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112757/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf fa74dd2217aebe6930890e55d58d35e639b18c2e
baseline version:
ovmf ce13d2d8c81f0ba77ac15
>>> On 21.08.17 at 12:59, wrote:
> On Wed, Aug 9, 2017 at 8:36 AM, Jan Beulich wrote:
> On 08.08.17 at 13:16, wrote:
>>> On 08/07/2017 04:59 PM, Jan Beulich wrote:
>>> George Dunlap 08/07/17 12:27 PM >>>
> So it seems that people are still not quite clear about what I'm
> propo
>>> On 21.08.17 at 11:46, wrote:
> Xen never detects the MSIX table entry unmask because it happens
> before the MSIX is bound to the guest, so the Xen msixtbl handlers are
> not aware of this memory region.
>
> The two possible solutions I see to this are:
>
> - Make QEMU setup the vectors whe
- Make QEMU setup the vectors when the table entries are unmasked,
even if MSIX is not enabled.
- Provide an hypercall so QEMU can unmask MSIX vectors on behalf of
the guest. This would be used to unmask the entries if MSIX is
enabled with table entries already unmasked.
Neither sounds
>>> On 21.08.17 at 12:07, wrote:
> * Completion of the x86 insn emulator (as far as possible)
> - XEN-46
> - Jan Beulich
Patches for the next step have been pending unreviewed for
exactly 2 months. Considering how much review of new
functionality patches by various people I've been doing d
>>> On 21.08.17 at 14:32, wrote:
>> > - Make QEMU setup the vectors when the table entries are unmasked,
>>>even if MSIX is not enabled.
>>> - Provide an hypercall so QEMU can unmask MSIX vectors on behalf of
>>>the guest. This would be used to unmask the entries if MSIX is
>>>enable
>>> On 21.08.17 at 13:55, wrote:
> This avoids unnecessary updates to the stack shadow copy of cr4 during
> critical regions with interrupts disabled.
Hmm, yes - we don't access CR4 in #MC or NMI handling, do we?
> No change in behaviour.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beul
On 21/08/17 13:46, Jan Beulich wrote:
On 21.08.17 at 13:55, wrote:
>> This avoids unnecessary updates to the stack shadow copy of cr4 during
>> critical regions with interrupts disabled.
> Hmm, yes - we don't access CR4 in #MC or NMI handling, do we?
#MC and NMI are always able to observe st
On 06/19/2017 09:00 AM, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH] ipxe: update to newer commit"):
>> On Mon, Jun 12, 2017 at 04:04:17PM +0100, Wei Liu wrote:
>>> To get 5f85cbb9ee1c00cec81a848a9e871ad5d1e7f53f to placate gcc 7.
>>>
>>> The only patch we have applies cleanly.
>>>
>>> Reporte
On 06/08/17 18:44, Mikko Rapeli wrote:
> Both are needed to compile in userspace. Fixes these
> userspace compile errors:
>
> xen/gntdev.h:151:4: error: unknown type name ‘grant_ref_t’
> grant_ref_t ref;
> ^
> xen/gntdev.h:153:4: error: unknown type name ‘domid_t’
> domid_t domid;
>
On Wed, Aug 16, 2017 at 05:12:35PM +0200, Ingo Molnar wrote:
> Unfortunately mcmodel=large looks pretty heavy too AFAICS, at the machine
> instruction level.
>
> Function calls look like this:
>
> -mcmodel=medium:
>
>757: e8 98 ff ff ff callq 6f4
>
> -mcmodel=large
>
>7
On Mon, Aug 21, 2017 at 09:28:15AM -0400, Boris Ostrovsky wrote:
> On 06/19/2017 09:00 AM, Ian Jackson wrote:
> > Wei Liu writes ("Re: [PATCH] ipxe: update to newer commit"):
> >> On Mon, Jun 12, 2017 at 04:04:17PM +0100, Wei Liu wrote:
> >>> To get 5f85cbb9ee1c00cec81a848a9e871ad5d1e7f53f to placa
On 08/21/2017 09:33 AM, Wei Liu wrote:
> On Mon, Aug 21, 2017 at 09:28:15AM -0400, Boris Ostrovsky wrote:
>> On 06/19/2017 09:00 AM, Ian Jackson wrote:
>>> Wei Liu writes ("Re: [PATCH] ipxe: update to newer commit"):
On Mon, Jun 12, 2017 at 04:04:17PM +0100, Wei Liu wrote:
> To get 5f85cbb
>>> On 17.08.17 at 12:30, wrote:
> On 16/08/17 19:33, Boris Ostrovsky wrote:
>> .. so that it's easy to find pages that need to be scrubbed (those pages are
>> now marked with _PGC_need_scrub bit).
>>
>> We keep track of the first unscrubbed page in a page buddy using first_dirty
>> field. For now
On Mon, Aug 21, 2017 at 09:49:01AM -0400, Boris Ostrovsky wrote:
> On 08/21/2017 09:33 AM, Wei Liu wrote:
> > On Mon, Aug 21, 2017 at 09:28:15AM -0400, Boris Ostrovsky wrote:
> >> On 06/19/2017 09:00 AM, Ian Jackson wrote:
> >>> Wei Liu writes ("Re: [PATCH] ipxe: update to newer commit"):
> On
When the guest writes to the RTC, Xen emulates it and broadcasts a
TIMEOFFSET ioreq. Emit an RTC_CHANGE QMP message when this happens
rather than ignoring it so that something useful can be done with the
information.
Signed-off-by: Ross Lagerwall
---
hw/i386/xen/xen-hvm.c | 2 ++
1 file changed,
That header file is only used by x86. Merge is into the x86 header.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
The code is only used by x86 at this point. Merge common/hvm/save.c
into x86 hvm/save.c. Move the headers and fix up inclusions. Remove
the now empty common/hvm directory.
Also fix some issues while moving:
1. removing trailing spaces;
2. fix multi-line comment;
3. make "i" in hvm_save unsigned in
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/drivers/passthrough/io.c | 16
xen/include/asm-x86/hvm/irq.h | 6 +++---
2 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/xen/drivers/passthrough/io.c b/xen/drivers/passthrough/io.c
index e30
Wei Liu (3):
xen: move hvm save code under common to x86
xen: merge common hvm/irq.h into x86 hvm/irq.h
x86: switch to plain bool in passthrough code
xen/arch/x86/cpu/mcheck/vmce.c | 2 +-
xen/arch/x86/cpu/vpmu_amd.c | 2 +-
xen/arch/x86/hvm/save.c |
On Mon, Aug 21, 2017 at 03:09:12PM +0100, Wei Liu wrote:
> That header file is only used by x86. Merge is into the x86 header.
>
> Signed-off-by: Wei Liu
[...]
> +#define HVM_IRQ_DPCI_MACH_PCI(1 << _HVM_IRQ_DPCI_MACH_PCI_SHIFT)
> +#define HVM_IRQ_DPCI_MACH_MSI(1 << _HVM_IRQ_DPCI_M
On Mon, Aug 21, 2017 at 03:32:22PM +0200, Peter Zijlstra wrote:
> On Wed, Aug 16, 2017 at 05:12:35PM +0200, Ingo Molnar wrote:
> > Unfortunately mcmodel=large looks pretty heavy too AFAICS, at the machine
> > instruction level.
> >
> > Function calls look like this:
> >
> > -mcmodel=medium:
> >
On 08/21/2017 09:33 AM, Juergen Gross wrote:
> On 06/08/17 18:44, Mikko Rapeli wrote:
>> Both are needed to compile in userspace. Fixes these
>> userspace compile errors:
>>
>> xen/gntdev.h:151:4: error: unknown type name ‘grant_ref_t’
>> grant_ref_t ref;
>> ^
>> xen/gntdev.h:153:4: error:
On Tue, Aug 15, 2017 at 07:20:38AM -0700, Thomas Garnier wrote:
> On Tue, Aug 15, 2017 at 12:56 AM, Ingo Molnar wrote:
> > Have you considered a kernel with -mcmodel=small (or medium) instead of
> > -fpie
> > -mcmodel=large? We can pick a random 2GB window in the (non-kernel)
> > canonical
> >
flight 112749 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112749/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
test-amd64-amd64-xl
On 21/08/17 16:31, Boris Ostrovsky wrote:
> On 08/21/2017 09:33 AM, Juergen Gross wrote:
>> On 06/08/17 18:44, Mikko Rapeli wrote:
>>> Both are needed to compile in userspace. Fixes these
>>> userspace compile errors:
>>>
>>> xen/gntdev.h:151:4: error: unknown type name ‘grant_ref_t’
>>> grant
On Mon, Aug 21, 2017 at 06:22:05AM -0600, Jan Beulich wrote:
> >>> On 21.08.17 at 11:46, wrote:
> > Xen never detects the MSIX table entry unmask because it happens
> > before the MSIX is bound to the guest, so the Xen msixtbl handlers are
> > not aware of this memory region.
> >
> > The two poss
flight 112752 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112752/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 112661
test-amd64-i38
On 08/21/2017 10:46 AM, Juergen Gross wrote:
> On 21/08/17 16:31, Boris Ostrovsky wrote:
>> On 08/21/2017 09:33 AM, Juergen Gross wrote:
>>> On 06/08/17 18:44, Mikko Rapeli wrote:
Both are needed to compile in userspace. Fixes these
userspace compile errors:
xen/gntdev.h:151:4:
>>> On 21.08.17 at 16:49, wrote:
> Another option is to (ab)use the msi.gflags field to add another flag
> in order to signal Xen whether the interrupt should be unmasked. This
> is in line with what you suggest below.
From a brief look it looks like this would be doable, but the way these
flags
On Mon, Aug 21, 2017 at 09:14:45AM -0600, Jan Beulich wrote:
> >>> On 21.08.17 at 16:49, wrote:
> > Another option is to (ab)use the msi.gflags field to add another flag
> > in order to signal Xen whether the interrupt should be unmasked. This
> > is in line with what you suggest below.
>
> From
On 08/21/2017 01:07 PM, Jan Beulich wrote:
And remember, this is not "We have tested all compiler versions and
promise you there are no bugs." It's, "If someone finds a bug for this
set of compilers, we will tell you about it so you can do something
about it."
>>>
>>> I can see
Long pressed key could not show right in XEN vncviewer after tigervnc client
changed the way how to send repeat keys, from "Down Up Down Up ..." to "Down
Down Dow." By enable EV_REP bit here, XEN keyboard device will trigger default
auto repeat process from input subsystem, and make auto repeat
Hi, Julien.
Sorry for the late response.
On Thu, Aug 10, 2017 at 6:13 PM, Julien Grall wrote:
> Hi,
>
> On 10/08/17 15:27, Oleksandr Tyshchenko wrote:
>>
>> On Tue, Aug 8, 2017 at 2:34 PM, Julien Grall wrote:
>>>
>>> On 26/07/17 16:09, Oleksandr Tyshchenko wrote:
@@ -355,6 +557,10 @@
On Mon, Aug 21, 2017 at 7:31 AM, Peter Zijlstra wrote:
> On Tue, Aug 15, 2017 at 07:20:38AM -0700, Thomas Garnier wrote:
>> On Tue, Aug 15, 2017 at 12:56 AM, Ingo Molnar wrote:
>
>> > Have you considered a kernel with -mcmodel=small (or medium) instead of
>> > -fpie
>> > -mcmodel=large? We can p
flight 112784 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112784/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
Hi, all.
Any comments?
On Thu, Aug 3, 2017 at 3:32 PM, Oleksandr Tyshchenko
wrote:
> Hi, Julien
>
> On Thu, Aug 3, 2017 at 2:21 PM, Julien Grall wrote:
>> Hi Oleksandr,
>>
>> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>>
>>> diff --git a/xen/drivers/passthrough/arm/smmu.c
>>> b/xen/drivers
Hi, all.
Any comments?
On Tue, Jul 25, 2017 at 8:26 PM, Oleksandr Tyshchenko
wrote:
> From: Oleksandr Tyshchenko
>
> The presence of this flag lets us know that the guest domain has statically
> assigned devices which will most likely be used for passthrough
> and as the result the IOMMU is exp
Hi, all.
Any comments?
On Tue, Jul 25, 2017 at 8:26 PM, Oleksandr Tyshchenko
wrote:
> From: Oleksandr Tyshchenko
>
> The hardware domains require IOMMU to be used in the most cases and
> a decision to use it is made at hardware domain construction time.
> But, it is not the best moment for the
Hi, all.
Any comments?
On Tue, Jul 25, 2017 at 8:26 PM, Oleksandr Tyshchenko
wrote:
> From: Oleksandr Tyshchenko
>
> Reduce the scope of the TODO by squashing single-page stuff with
> multi-page one. Next target is to use large pages whenever possible
> in the case that hardware supports them.
Hi, all.
Any comments?
On Tue, Jul 25, 2017 at 8:26 PM, Oleksandr Tyshchenko
wrote:
> From: Oleksandr Tyshchenko
>
> Reduce the scope of the TODO by squashing single-page stuff with
> multi-page one. Next target is to use large pages whenever possible
> in the case that hardware supports them.
Hi Jan,
On 21/08/17 14:49, Jan Beulich wrote:
On 17.08.17 at 12:30, wrote:
On 16/08/17 19:33, Boris Ostrovsky wrote:
.. so that it's easy to find pages that need to be scrubbed (those pages are
now marked with _PGC_need_scrub bit).
We keep track of the first unscrubbed page in a page buddy u
flight 112759 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112759/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4 host-install(4)broken REGR. vs. 112664
test-amd64-i386
This run is configured for baseline tests only.
flight 72000 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72000/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf fa74dd2217aebe6930890e55d58d35e639b18c2e
baseline v
On Mon, Aug 21, 2017 at 11:07:39AM +0100, Julien Grall wrote:
> This email only tracks big items for xen.git tree. Please reply for items you
> woulk like to see in 4.10 so that people have an idea what is going on and
> prioritise accordingly.
>
> You're welcome to provide description and use cas
The x86 and arm versions of XENMAPSPACE_grant_table handling are nearly
identical. Move the code into a function in grant_table.c and add an
architecture dependant hook to handle the differences.
This at once fixes a bug in the arm code which didn't unlock the grant
table in error case.
Signed-of
Currently Linux has no support for grant v2 as this would reduce the
maximum number of active grants by a factor of 2 compared to v1,
because the number of possible grants are limited by the allowed number
of grant frames and grant entries of v2 need twice as much bytes as
those of v1.
Unfortunate
The number of grants a domain can setup is limited by the maximum
number of grant frames it is allowed to use. Today the limit is the
same regardless whether the domain uses grant v1 or v2. Using v2
will therefor be a disadvantage for the domain as only half the
number of grants compared to v1 can
The boot parameter gnttab_max_nr_frames has been deprecated in Xen 4.5.
Remove it now.
Signed-off-by: Juergen Gross
---
xen/common/grant_table.c | 19 +--
1 file changed, 1 insertion(+), 18 deletions(-)
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index 36895
Today a guest can get the maximum grant table frame number for the
currently selected grant table interface version (1 or 2) only. Add
a new grant table operation to get the limits of both variants in
order to give the guest an opportunity to select the version serving
its needs best.
Background f
Many definitions can be moved from xen/grant_table.h to
common/grant_table.c now, as they are no longer used in other sources.
Signed-off-by: Juergen Gross
---
xen/common/grant_table.c | 81 +++-
xen/include/xen/grant_table.h | 86 +---
flight 112763 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112763/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 10 debian-hvm-install
fail REGR. vs. 1126
Adding maintainer (Dmitry).
-boris
On 08/21/2017 11:41 AM, Liang Yan wrote:
> Long pressed key could not show right in XEN vncviewer after tigervnc
> client changed the way how to send repeat keys, from "Down Up Down Up
> ..." to "Down Down Dow." By enable EV_REP bit here, XEN keyboard
> device w
On Tue, 8 Aug 2017, Julien Grall wrote:
> Xen allows shared mapping to be Normal inner-cacheable with any inner cache
> allocation strategy and no restriction of the outer-cacheability.
>
> However, Xen is always mapping those region Normal Inner Write-Back
> Outer Write-Back Inner-shareable. Per
1 - 100 of 142 matches
Mail list logo