branch xen-unstable
xenbranch xen-unstable
job build-amd64-xsm
testid xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduce
Ping?
On Wed, 2017-08-30 at 11:34 +0100, Sergey Dyasli wrote:
> Currently there are the following issues with handling guest's RD/WRMSR
> in Xen:
>
> 1. There is no way to configure which MSRs a guest can and can't access.
>And if there is no MSR handler in Xen for a particular MSR then
>
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/cpu/mcheck/mce.c | 536 +++---
xen/arch/x86/cpu/mcheck/mce.h | 21 +-
2 files changed, 311 insertions(+), 246 deletions(-)
diff --git a/xen/arch/x86/cpu/mcheck/mce.c b/xen/arch/x86/cpu/mcheck/mce.c
index 7affe259
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/cpu/mcheck/mcaction.c | 74 +-
1 file changed, 41 insertions(+), 33 deletions(-)
diff --git a/xen/arch/x86/cpu/mcheck/mcaction.c
b/xen/arch/x86/cpu/mcheck/mcaction.c
index f959bed2cb..e42267414e 100644
--- a/xen/
Some files in xen/arch/x86/cpu/mcheck use mixed coding styles. Unify
them to Xen hypervisor coding style. For mctelem.c which is entirely
in one coding style, only remove extra blanks.
No functional change is introduced.
Haozhong Zhang (6):
x86/mce: adapt mce.{c,h} to Xen hypervisor coding styl
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/cpu/mcheck/mce_intel.c | 262 +++-
1 file changed, 142 insertions(+), 120 deletions(-)
diff --git a/xen/arch/x86/cpu/mcheck/mce_intel.c
b/xen/arch/x86/cpu/mcheck/mce_intel.c
index 4c001b407f..e5dd956a24 100644
--- a/
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/cpu/mcheck/vmce.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/cpu/mcheck/vmce.c b/xen/arch/x86/cpu/mcheck/vmce.c
index 9c460c7c6c..e07cd2feef 100644
--- a/xen/arch/x86/cpu/mcheck/vmce.c
+++ b/xen/arch/x86/cpu
mctelem.c uses the tab indention. Add an emacs block to avoid mixed
indention styles in certain editors.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/cpu/mcheck/mctelem.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/xen/arch/x86/cpu/mcheck/mctelem.c
b/xen/arch/x86/cpu/mchec
The entire file of mctelem.c is in Linux coding style, so do not
change the coding style and only remove trailing spaces and extra
blank lines.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/cpu/mcheck/mctelem.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86
flight 113280 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113280/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 6 xen-buildfail REGR. vs. 113143
build-amd64-xsm
flight 113262 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113262/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 7 xen-boot fail REGR. vs. 113031
test-amd64-i386-xl-
On 08/09/17 17:00, Jan Beulich wrote:
On 08.09.17 at 08:56, wrote:
>> --- a/xen/common/grant_table.c
>> +++ b/xen/common/grant_table.c
>> @@ -40,6 +40,44 @@
>> #include
>> #include
>>
>> +/* Per-domain grant information. */
>> +struct grant_table {
>> +/*
>> + * Lock protecting
On Fri, Sep 08, 2017 at 03:04:30PM -0400, Boris Ostrovsky wrote:
> On 09/08/2017 01:11 PM, Roger Pau Monné wrote:
> > On Fri, Sep 08, 2017 at 10:56:33AM -0400, Boris Ostrovsky wrote:
> >> I am slightly confused by the use of 'need_paging' variable in
> >> dom0_compute_nr_pages().
> >>
> >> Because
>>> On 09.09.17 at 14:05, wrote:
> On Fri, Sep 08, 2017 at 03:30:07AM -0600, Jan Beulich wrote:
>> >>> On 07.09.17 at 19:36, wrote:
>> > On Wed, Aug 02, 2017 at 03:20:05AM -0600, Jan Beulich wrote:
>> >> >>> Konrad Rzeszutek Wilk 07/31/17 6:04 PM >>>
>> >> >On Mon, Jul 31, 2017 at 07:55:34AM -06
On 08/09/17 17:28, Jan Beulich wrote:
On 08.09.17 at 08:56, wrote:
>> Delay the allocation of the grant table sub structures in order to
>> allow modifying parameters needed for sizing of these structures at a
>> per domain basis. Either do it from gnttab_setup_table() or just
>> before the d
>>> On 10.09.17 at 01:53, wrote:
> On Wed, Sep 06, 2017 at 08:42:33AM -0600, Jan Beulich wrote:
>> All,
>>
>> I am pleased to announce the release of Xen 4.8.2. This is
>> available immediately from its git repository
>> http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.8
>>> On 08.09.17 at 20:08, wrote:
> On 08/09/17 18:33, Roger Pau Monné wrote:
>> On Fri, Sep 08, 2017 at 10:00:41AM -0600, Jan Beulich wrote:
>> On 08.09.17 at 16:30, wrote:
On Fri, Sep 08, 2017 at 03:15:40PM +0100, Andrew Cooper wrote:
> On 08/09/17 14:34, Roger Pau Monne wrote:
On Mon, Sep 11, 2017 at 09:58:01AM +0800, Chao Gao wrote:
> Hi, Roger.
>
> I meet an error when creating a pvh guest. I am using commit 6e2a4c73564a.
> From the error log, I found bootlate_pv()->pin_table always failed. And the
> failure was caused by is_pv_domain(pg_owner) in do_mmuext_op(). Do
And the one for find_msi_entry.
Signed-off-by: Roger Pau Monné
---
Jan Beulich
Andrew Cooper
---
xen/arch/x86/msi.c| 4 ++--
xen/include/asm-x86/pci.h | 2 +-
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/msi.c b/xen/arch/x86/msi.c
index 77998f4fb3..f9f0d9
>>> On 11.09.17 at 11:03, wrote:
> On 08/09/17 17:28, Jan Beulich wrote:
> On 08.09.17 at 08:56, wrote:
>> And if you special case Dom0,
>> wouldn't it be better to (also) special case the hardware domain
>> (in case that's not Dom0)?
>
> As a hardware domain not being dom0 would need to be
On Mon, Sep 11, 2017 at 03:09:54AM -0600, Jan Beulich wrote:
> >>> On 08.09.17 at 20:08, wrote:
> > As as bdf is also quite a common unit, how about:
> >
> >>
> >> typedef union {
> >> uint32_t sbdf;
> >> struct {
> >
> > union {
> > uint16_t bdf;
> > struct {
>
> Yes.
>
> >>
>>> On 11.09.17 at 11:22, wrote:
> On Mon, Sep 11, 2017 at 03:09:54AM -0600, Jan Beulich wrote:
>> >>> On 08.09.17 at 20:08, wrote:
>> > As as bdf is also quite a common unit, how about:
>> >
>> >>
>> >> typedef union {
>> >> uint32_t sbdf;
>> >> struct {
>> >
>> > union {
>> > uint
1: VMX: convert CPU family numbers to hex
2: VMX: add new CPU families to LBR handling
3: x86/cpuidle: add new CPU families
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 11.09.17 at 10:49, wrote:
> AFAICT even with the change proposed I don't think
> dom0_compute_nr_pages will handle the !iommu_hap_pt_share case
> properly (ie: I don't see specific memory for the IOMMU pages tables
> being reserved anywhere).
Which (sadly) is in line with what the tool sta
On Mon, Sep 11, 2017 at 02:00:48PM +0800, Haozhong Zhang wrote:
> The 64-bit DMAR fault address is composed of two 32 bits registers
> DMAR_FEADDR_REG and DMAR_FEUADDR_REG. According to VT-d spec:
> "Software is expected to access 32-bit registers as aligned doublewords",
> a hypervisor should use
On 11/09/17 11:23, Jan Beulich wrote:
On 11.09.17 at 11:03, wrote:
>> On 08/09/17 17:28, Jan Beulich wrote:
>> On 08.09.17 at 08:56, wrote:
>>> And if you special case Dom0,
>>> wouldn't it be better to (also) special case the hardware domain
>>> (in case that's not Dom0)?
>>
>> As a har
On Mon, Sep 11, 2017 at 10:14:15AM +0100, Roger Pau Monné wrote:
>On Mon, Sep 11, 2017 at 09:58:01AM +0800, Chao Gao wrote:
>> Hi, Roger.
>>
>> I meet an error when creating a pvh guest. I am using commit 6e2a4c73564a.
>> From the error log, I found bootlate_pv()->pin_table always failed. And the
>>> On 11.09.17 at 05:20, wrote:
> Hi.
> I'm working on a scheduling code by which I received a patch regarding
> credit scheduler from my professor.
> I have had some troubles during that work and I need to make the Xen binary
> with 'debug=y' option.
> But there was a kernel panic caused by the
Signed-off-by: Ian Jackson
---
cr-daily-branch | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/cr-daily-branch b/cr-daily-branch
index 39483cd..cf00db8 100755
--- a/cr-daily-branch
+++ b/cr-daily-branch
@@ -88,7 +88,7 @@ check_tested () {
if [ "x$OLD_REVISION" = x ]; then
Discuss preliminary setup (hardware and BIOS).
Invent "mudcake0" and "mudcake1" as machines being added and use them
consistently in the example runes.
Recommend to run a host examination flight first. (NB I am still
testing that this actually works as expected. Host examination is a
bit new.)
CC: George Dunlap
Signed-off-by: Ian Jackson
---
README | 75 --
1 file changed, 60 insertions(+), 15 deletions(-)
diff --git a/README b/README
index ffe0018..93129e3 100644
--- a/README
+++ b/README
@@ -8,32 +8,55 @@ Terminology
Clarify documentation on mg-blockage, and also suggest using
allocation instead.
No longer advise removing crontab as a way to shut osstest down. The
stop file approach works fine and is less disruptive.
Minor formatting changes.
Signed-off-by: Ian Jackson
---
README.dev | 14 --
>>> On 11.09.17 at 09:29, wrote:
> Ping?
From a purely formal perspective, with Andrew's review there's only
an ack missing for the VMX changes afaict (and I think Andrew did ask
for one or two description changes, which might be best if you carried
them out and re-sent). While I would like to lo
On Mon, Sep 11, 2017 at 04:45:59PM +0800, Chao Gao wrote:
> On Mon, Sep 11, 2017 at 10:14:15AM +0100, Roger Pau Monné wrote:
> >On Mon, Sep 11, 2017 at 09:58:01AM +0800, Chao Gao wrote:
> >> Hi, Roger.
> >>
> >> I meet an error when creating a pvh guest. I am using commit 6e2a4c73564a.
> >> From
>>> On 11.09.17 at 08:00, wrote:
> The 64-bit DMAR fault address is composed of two 32 bits registers
> DMAR_FEADDR_REG and DMAR_FEUADDR_REG. According to VT-d spec:
> "Software is expected to access 32-bit registers as aligned doublewords",
> a hypervisor should use two 32-bit writes to DMAR_FEAD
This makes it easier to match them against SDM updates. Also update a
few comments with names as per SDM version 063.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -2723,39 +2723,39 @@ static const struct lbr_info *last_branc
switch ( bo
Bring code up-to-date with SDM version 063, including the LBR format
enumeration.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -2726,6 +2726,8 @@ static const struct lbr_info *last_branc
case 0x0f:
/* Enhanced Core */
Bring code up-to-date with SDM version 063.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/acpi/cpu_idle.c
+++ b/xen/arch/x86/acpi/cpu_idle.c
@@ -162,7 +162,13 @@ static void do_get_hw_residencies(void *
case 0x56:
/* Skylake */
case 0x4E:
+case 0x55:
case 0x5E:
+/* Ca
On 11/09/17 10:32, Jan Beulich wrote:
> 1: VMX: convert CPU family numbers to hex
> 2: VMX: add new CPU families to LBR handling
> 3: x86/cpuidle: add new CPU families
>
> Signed-off-by: Jan Beulich
>
Acked-by: Andrew Cooper
___
Xen-devel mailing list
>>> On 11.09.17 at 11:16, wrote:
This being an x86 only change, the subject prefix would presumably
better be "x86/msi".
> --- a/xen/arch/x86/msi.c
> +++ b/xen/arch/x86/msi.c
> @@ -657,7 +657,7 @@ int msi_free_irq(struct msi_desc *entry)
> return 0;
> }
>
> -static struct msi_desc *find_
Hi Oleksandr,
On 06/09/17 10:16, Oleksandr Tyshchenko wrote:
ping
Sorry I was on holidays, I will try to have a look today.
Cheers,
On Mon, Aug 28, 2017 at 8:32 PM, Oleksandr Tyshchenko
wrote:
From: Oleksandr Tyshchenko
Oleksandr Tyshchenko (2):
xen/arm: vgic: Check for vgic handler
Hi all,
This call will be moved by a week as requested by Stefano. The next call
will be on Wednesday 20th September 2017 5pm BST.
Do you have any specific topic you would like to discuss?
Cheers,
On 25/08/17 11:42, Julien Grall wrote:
Hi all,
I would suggest to have the next community cal
On Mon, Sep 11, 2017 at 03:06:48AM -0600, Jan Beulich wrote:
> >>> On 10.09.17 at 01:53, wrote:
> > On Wed, Sep 06, 2017 at 08:42:33AM -0600, Jan Beulich wrote:
> >> All,
> >>
> >> I am pleased to announce the release of Xen 4.8.2. This is
> >> available immediately from its git repository
> >> h
On 08/09/17 17:44, Jan Beulich wrote:
On 08.09.17 at 08:56, wrote:
>> @@ -1843,6 +1838,14 @@ gnttab_setup_table(
>> gt = d->grant_table;
>> grant_write_lock(gt);
>>
>> +if ( unlikely(op.nr_frames > gt->max_grant_frames) )
>> +{
>> +gdprintk(XENLOG_INFO, "Domain is
On 08/09/17 17:48, Jan Beulich wrote:
On 08.09.17 at 08:56, wrote:
>> --- a/xen/common/grant_table.c
>> +++ b/xen/common/grant_table.c
>> @@ -3824,8 +3824,15 @@ static int __init gnttab_usage_init(void)
>> {
>> BUILD_BUG_ON(DEFAULT_MAX_MAPTRACK_FRAMES < DEFAULT_MAX_NR_GRANT_FRAMES);
>>
flight 113296 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113296/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 6 xen-buildfail REGR. vs. 113143
build-amd64-xsm
On 08/09/17 17:55, Jan Beulich wrote:
On 08.09.17 at 08:56, wrote:
>> --- a/xen/common/grant_table.c
>> +++ b/xen/common/grant_table.c
>> @@ -3667,6 +3667,32 @@ void grant_table_init_vcpu(struct vcpu *v)
>> v->maptrack_tail = MAPTRACK_TAIL;
>> }
>>
>> +int grant_table_set_limits(struc
On Mon, Sep 11, 2017 at 04:11:41AM -0600, Jan Beulich wrote:
> >>> On 11.09.17 at 11:16, wrote:
>
> This being an x86 only change, the subject prefix would presumably
> better be "x86/msi".
Right. I guess you don't mind changing this upon commit if it gets
accepted.
> > --- a/xen/arch/x86/msi.c
>>> On 11.09.17 at 11:39, wrote:
> On 11/09/17 11:23, Jan Beulich wrote:
> On 11.09.17 at 11:03, wrote:
>>> On 08/09/17 17:28, Jan Beulich wrote:
>>> On 08.09.17 at 08:56, wrote:
And if you special case Dom0,
wouldn't it be better to (also) special case the hardware domain
>>> On 11.09.17 at 12:40, wrote:
> On 08/09/17 17:44, Jan Beulich wrote:
> On 08.09.17 at 08:56, wrote:
>>> @@ -3755,6 +3763,12 @@ static void gnttab_usage_print(struct domain *rd)
>>>
>>> grant_read_lock(gt);
>>>
>>> +printk("grant-table for remote domain:%5d (v%d)\n"
>>> +
On 05/09/17 09:57, Sergej Proskurin wrote:
Hi all,
Hello,
I am pretty sure I already said it before. It is quite annoying to have
to search for the cover letter because you don't CC person involved in
this. More that it contains useful details to understand the rest of
this series...
T
>>> On 11.09.17 at 12:48, wrote:
> On 08/09/17 17:55, Jan Beulich wrote:
> On 08.09.17 at 08:56, wrote:
>>> --- a/xen/common/grant_table.c
>>> +++ b/xen/common/grant_table.c
>>> @@ -3667,6 +3667,32 @@ void grant_table_init_vcpu(struct vcpu *v)
>>> v->maptrack_tail = MAPTRACK_TAIL;
>>> }
Hi,
Sorry for the late reply.
On 04/09/17 10:05, Roger Pau Monné wrote:
On Mon, Sep 04, 2017 at 11:07:14AM +0800, Lan Tianyu wrote:
On 2017年09月01日 17:41, Roger Pau Monné wrote:
On Fri, Sep 01, 2017 at 10:54:02AM +0800, Lan Tianyu wrote:
On 2017年08月31日 23:38, Roger Pau Monné wrote:
On Thu, A
Signed-off-by: Wei Liu
---
Cc: Razvan Cojocaru
Cc: Tamas K Lengyel
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/arm/mem_access.c| 4 ++--
xen/arch/x86/mm/mem_access.c | 16
xen/include/asm-arm/mem_acc
On 11/09/17 13:14, Jan Beulich wrote:
On 11.09.17 at 12:48, wrote:
>> On 08/09/17 17:55, Jan Beulich wrote:
>> On 08.09.17 at 08:56, wrote:
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -3667,6 +3667,32 @@ void grant_table_init_vcpu(struct vcpu *v)
On 04/09/17 10:57, Sergej Proskurin wrote:
Hi Julien,
On 09/04/2017 08:07 AM, Julien Grall wrote:
Hello,
Sorry for the formatting, writing from my phone. Ki
On Thu, 31 Aug 2017, 22:18 Sergej Proskurin wrote:
[...]
On your first mail, you started with "smc injection doesn't work", th
On 11/09/17 13:02, Jan Beulich wrote:
On 11.09.17 at 11:39, wrote:
>> On 11/09/17 11:23, Jan Beulich wrote:
>> On 11.09.17 at 11:03, wrote:
On 08/09/17 17:28, Jan Beulich wrote:
On 08.09.17 at 08:56, wrote:
> And if you special case Dom0,
> wouldn't it be better to
On 09/08/2017 07:56 AM, Juergen Gross wrote:
> The x86 and arm versions of XENMAPSPACE_grant_table handling are nearly
> identical. Move the code into a function in grant_table.c and add an
> architecture dependant hook to handle the differences.
>
> Switch to mfn_t in order to be more type safe.
flight 113266 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113266/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-amd 12 host-ping-check-native/l1running
te
Hi Alexander,
thanks a lot for your review.
On 10.09.2017 22:48, Alexander Dubinin wrote:
Hi Felipe, all,
Great that it's going to start :) Looking forward to join :)
I am looking forward to your contributions. ;)
Just my 2 cents:
1. Is this academic project, or it have specific goals an
On 09/11/17 10:38 +0100, Roger Pau Monné wrote:
> On Mon, Sep 11, 2017 at 02:00:48PM +0800, Haozhong Zhang wrote:
> > The 64-bit DMAR fault address is composed of two 32 bits registers
> > DMAR_FEADDR_REG and DMAR_FEUADDR_REG. According to VT-d spec:
> > "Software is expected to access 32-bit regis
On Fri, Sep 08, 2017 at 04:21:36PM +0100, Paul Durrant wrote:
> A subsequent patch will introduce a new scheme to allow an emulator to
> map ioreq server pages directly from Xen rather than the guest P2M.
>
> This patch lays the groundwork for that change by deferring mapping of
> gfns until their
flight 113307 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113307/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 6 xen-buildfail REGR. vs. 113143
build-amd64-xsm
flight 72091 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72091/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-sid-netboot-pygrub 1 build-check(1)blocked n/a
build-arm64-pvops
On Fri, Sep 08, 2017 at 04:21:37PM +0100, Paul Durrant wrote:
> +static int hvm_ioreq_server_alloc_pages(struct hvm_ioreq_server *s)
> +{
> +int rc = -ENOMEM;
> +
Pointless initialisation.
With this fixed:
Reviewed-by: Wei Liu
___
Xen-devel maili
On 09/08/2017 05:05 PM, Alexandru Isaila wrote:
> diff --git a/xen/include/asm-x86/hvm/support.h
> b/xen/include/asm-x86/hvm/support.h
> index b18dbb6..e3b035d 100644
> --- a/xen/include/asm-x86/hvm/support.h
> +++ b/xen/include/asm-x86/hvm/support.h
> @@ -53,23 +53,23 @@ extern unsigned int opt_h
On Mon, Sep 11, 2017 at 02:27:34PM +0100, George Dunlap wrote:
> On 09/08/2017 05:05 PM, Alexandru Isaila wrote:
> > diff --git a/xen/include/asm-x86/hvm/support.h
> > b/xen/include/asm-x86/hvm/support.h
> > index b18dbb6..e3b035d 100644
> > --- a/xen/include/asm-x86/hvm/support.h
> > +++ b/xen/in
On 11/09/17 14:27, George Dunlap wrote:
> On 09/08/2017 05:05 PM, Alexandru Isaila wrote:
>> diff --git a/xen/include/asm-x86/hvm/support.h
>> b/xen/include/asm-x86/hvm/support.h
>> index b18dbb6..e3b035d 100644
>> --- a/xen/include/asm-x86/hvm/support.h
>> +++ b/xen/include/asm-x86/hvm/support.h
On Mon, 2017-09-11 at 02:00 +0900, Minjun Hong wrote:
> I made the new Xen4.5 binary with 'debug=y' option that I modified
> and install it.
> Then, there was a kernel panic caused by the debugging code triggered
> by 'debug=y' during booting process(of dom0):
>
Once again, can you show us here wh
e2fc5bb5cb4 ("hvmloader: dynamically determine scratch memory range
for tests") makes the test dependent on _end. Coverity reported that
the shift might overflow and suggested we cast i to uint64_t.
Coverity-ID: 1417660
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
tools/fi
On Mon, 11 Sep 2017 12:41:47 +0800
Haozhong Zhang wrote:
> This is the QEMU part patches that works with the associated Xen
> patches to enable vNVDIMM support for Xen HVM domains. Xen relies on
> QEMU to build guest NFIT and NVDIMM namespace devices, and allocate
> guest address space for vNVDIM
On 09/07/2017 10:54 PM, Stefano Stabellini wrote:
> On Thu, 31 Aug 2017, George Dunlap wrote:
>> +### Direct-boot kernel image format
>> +
>> +Supported, x86: bzImage
>> +Supported, ARM32: zImage
>> +Supported, ARM64: Image [XXX - Not sure if this is correct]
>
> On ARM64 it's called I
On 09/07/2017 03:56 PM, Wei Liu wrote:
> On Thu, Sep 07, 2017 at 02:52:49PM +0100, George Dunlap wrote:
>> On 09/01/2017 04:00 PM, Wei Liu wrote:
>>> On Thu, Aug 31, 2017 at 11:27:19AM +0100, George Dunlap wrote:
+### Direct-boot kernel image format
+
+Supported, x86: bzImage
>>>
On 11.09.2017 14:16, Wei Liu wrote:
Signed-off-by: Wei Liu
---
Cc: Razvan Cojocaru
Cc: Tamas K Lengyel
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/arm/mem_access.c| 4 ++--
xen/arch/x86/mm/mem_access.c | 16 +
>>> On 11.09.17 at 16:07, wrote:
> e2fc5bb5cb4 ("hvmloader: dynamically determine scratch memory range
> for tests") makes the test dependent on _end. Coverity reported that
> the shift might overflow and suggested we cast i to uint64_t.
>
> Coverity-ID: 1417660
>
> Signed-off-by: Wei Liu
> ---
On Mon, Sep 11, 2017 at 08:55:53AM -0600, Jan Beulich wrote:
> >>> On 11.09.17 at 16:07, wrote:
> > e2fc5bb5cb4 ("hvmloader: dynamically determine scratch memory range
> > for tests") makes the test dependent on _end. Coverity reported that
> > the shift might overflow and suggested we cast i to u
On Mon, Sep 11, 2017 at 03:16:13PM +0100, George Dunlap wrote:
> On 09/07/2017 10:54 PM, Stefano Stabellini wrote:
> > On Thu, 31 Aug 2017, George Dunlap wrote:
> >> +### Netback
> >> +
> >> +Status, Linux (netback): Supported
> >> +Status, FreeBSD (netback): Supported
> >> +Status, QEM
On 09/11/2017 04:02 PM, Anthony PERARD wrote:
> On Mon, Sep 11, 2017 at 03:16:13PM +0100, George Dunlap wrote:
>> On 09/07/2017 10:54 PM, Stefano Stabellini wrote:
>>> On Thu, 31 Aug 2017, George Dunlap wrote:
+### Netback
+
+Status, Linux (netback): Supported
+Status, F
On Mon, Sep 11, 2017 at 04:07:08PM +0100, George Dunlap wrote:
> On 09/11/2017 04:02 PM, Anthony PERARD wrote:
> > On Mon, Sep 11, 2017 at 03:16:13PM +0100, George Dunlap wrote:
> >> On 09/07/2017 10:54 PM, Stefano Stabellini wrote:
> >>> On Thu, 31 Aug 2017, George Dunlap wrote:
> +### Netbac
>>> On 11.09.17 at 17:01, wrote:
> On Mon, Sep 11, 2017 at 08:55:53AM -0600, Jan Beulich wrote:
>> >>> On 11.09.17 at 16:07, wrote:
>> > e2fc5bb5cb4 ("hvmloader: dynamically determine scratch memory range
>> > for tests") makes the test dependent on _end. Coverity reported that
>> > the shift mig
On Jo, 2017-09-07 at 09:08 -0600, Jan Beulich wrote:
> >
> > >
> > > >
> > > > On 07.09.17 at 16:26, wrote:
> > After discussing with Andrew I'm willing to agree with the changes
> > you do here, with one extra requirement: At least on non-debug
> > builds X86EMUL_UNIMPLEMENTED should always re
Hi,
Sorry I missed e-mail. It seems I was not CCed on it.
On 07/09/17 22:36, Stefano Stabellini wrote:
On Thu, 31 Aug 2017, Roger Pau Monne wrote:
+### ARM/Non-PCI device passthrough
+
+Status: Supported
I guess non-pci devices on ARM also use the IOMMU? (SMMU)
Yes, they do.
+### AR
On 07/09/17 22:54, Stefano Stabellini wrote:
On Thu, 31 Aug 2017, George Dunlap wrote:
+### Direct-boot kernel image format
+
+Supported, x86: bzImage
+Supported, ARM32: zImage
+Supported, ARM64: Image [XXX - Not sure if this is correct]
On ARM64 it's called Image.gz.
That's no
On 09/11/2017 05:00 PM, Julien Grall wrote:
>
>
> On 07/09/17 22:54, Stefano Stabellini wrote:
>> On Thu, 31 Aug 2017, George Dunlap wrote:
>>> +### Direct-boot kernel image format
>>> +
>>> + Supported, x86: bzImage
>>> + Supported, ARM32: zImage
>>> + Supported, ARM64: Image [XXX - Not
Fixed
Apologies
Lars
On 11/09/2017, 03:26, "Marek Marczykowski-Górecki"
wrote:
On Mon, Sep 11, 2017 at 03:06:48AM -0600, Jan Beulich wrote:
> >>> On 10.09.17 at 01:53, wrote:
> > On Wed, Sep 06, 2017 at 08:42:33AM -0600, Jan Beulich wrote:
> >> All,
> >>
> >> I am plea
On 09/11/2017 04:54 PM, Julien Grall wrote:
> Hi,
>
> Sorry I missed e-mail. It seems I was not CCed on it.
Sorry -- already had a pretty large CC list. I'll add you for the next one.
+### ARM/SMMU
+
+ Status: Supported, with caveats
+
+Only ARM SMMU hardware is sup
On 11/09/17 15:16, George Dunlap wrote:
On 09/07/2017 10:54 PM, Stefano Stabellini wrote:
On Thu, 31 Aug 2017, George Dunlap wrote:
+### Direct-boot kernel image format
+
+Supported, x86: bzImage
+Supported, ARM32: zImage
+Supported, ARM64: Image [XXX - Not sure if this is correct
On 11/09/17 17:15, George Dunlap wrote:
On 09/11/2017 04:54 PM, Julien Grall wrote:
Hi,
Sorry I missed e-mail. It seems I was not CCed on it.
Sorry -- already had a pretty large CC list. I'll add you for the next one.
+### ARM/SMMU
+
+Status: Supported, with caveats
+
+Only ARM SMMU
On 09/11/2017 05:16 PM, Julien Grall wrote:
>
>
> On 11/09/17 15:16, George Dunlap wrote:
>> On 09/07/2017 10:54 PM, Stefano Stabellini wrote:
>>> On Thu, 31 Aug 2017, George Dunlap wrote:
+### Direct-boot kernel image format
+
+ Supported, x86: bzImage
+ Supported, ARM3
On Sun, Sep 10, 2017 at 10:39 PM, Haozhong Zhang
wrote:
> On 09/10/17 22:10 -0700, Dan Williams wrote:
>> On Sun, Sep 10, 2017 at 9:37 PM, Haozhong Zhang
>> wrote:
>> > The kernel NVDIMM driver and the traditional NVDIMM management
>> > utilities in Dom0 does not work now. 'xen-ndctl' is added as
Hi Andre,
>> diff --git a/xen/arch/arm/vpl011.c b/xen/arch/arm/vpl011.c
>> index 56d9cbe..1e72fca 100644
>> --- a/xen/arch/arm/vpl011.c
>> +++ b/xen/arch/arm/vpl011.c
>> @@ -152,12 +152,20 @@ static void vpl011_write_data(struct domain *d,
>> uint8_t data)
>> else
>> gprintk(XENLOG
On Mon, 11 Sep 2017, Julien Grall wrote:
> On 07/09/17 22:54, Stefano Stabellini wrote:
> > On Thu, 31 Aug 2017, George Dunlap wrote:
> > > +### Direct-boot kernel image format
> > > +
> > > +Supported, x86: bzImage
> > > +Supported, ARM32: zImage
> > > +Supported, ARM64: Image [XXX - N
Add a machine-readable file to describe what features are in what
state of being 'supported', as well as information about how long this
release will be supported, and so on.
The document should be formatted using "semantic newlines" [1], to make
changes easier.
Signed-off-by: Ian Jackson
Signed
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
Acked-by: Wei Liu
---
tools/libxl/libxl_device.c | 6 ++---
tools/libxl/libxl_disk.c | 5 +++--
tools/libxl/libxl_internal.h | 52 +++-
tools/libxl/libxl_pci.c | 3 ++-
tools/libxl/li
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 9 +++-
tools/libxl/libxl_checkpoint_device.c | 7 ++-
tools/libxl/libxl_create.c| 4 +-
tools/libxl/libxl_disk.c | 83 +--
tools/libx
From: Oleksandr Grytsov
Add libxl__device_list and libxl__device_list_free
functions to handle device list using the device
framework.
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_device.c | 61
tools/libxl/libxl_internal.h | 8 ++
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_9pfs.c | 59
tools/libxl/libxl_create.c | 2 +-
tools/libxl/libxl_internal.h | 7 +-
3 files changed, 23 insertions(+), 45 deletions(-)
diff --git a/tools/lib
From: Oleksandr Grytsov
Add commands: vdispl-attach, vdispl-list, vdispl-detach
and domain config vdispl parser
Signed-off-by: Oleksandr Grytsov
Acked-by: Wei Liu
---
tools/xl/Makefile | 1 +
tools/xl/xl.h | 3 +
tools/xl/xl_cmdtable.c | 19 ++
tools/xl/xl_parse.c|
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_console.c | 74 +++-
tools/libxl/libxl_create.c | 5 +--
tools/libxl/libxl_dm.c | 6 ++--
tools/libxl/libxl_internal.h | 6 +---
4 files changed, 19 insertions(+),
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 9 +-
tools/libxl/libxl_checkpoint_device.c | 9 +-
tools/libxl/libxl_colo_save.c | 4 +-
tools/libxl/libxl_dm.c| 4 +-
tools/libxl/libxl_internal.h |
1 - 100 of 153 matches
Mail list logo