On 2019-04-08 10:04 p.m., Juergen Gross wrote:
On 08/04/2019 19:31, Joao Martins wrote:
On 4/8/19 11:42 AM, Juergen Gross wrote:
On 08/04/2019 12:36, Joao Martins wrote:
On 4/8/19 7:44 AM, Juergen Gross wrote:
On 12/03/2019 18:14, Joao Martins wrote:
On 2/22/19 4:59 PM, Paolo Bonzini wrote:
On 2019-04-08 5:35 p.m., Stefano Stabellini wrote:
On Mon, 8 Apr 2019, Joao Martins wrote:
On 4/8/19 11:42 AM, Juergen Gross wrote:
On 08/04/2019 12:36, Joao Martins wrote:
On 4/8/19 7:44 AM, Juergen Gross wrote:
On 12/03/2019 18:14, Joao Martins wrote:
On 2/22/19 4:59 PM, Paolo Bonzini wrot
flight 134523 linux-4.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134523/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-pvops
flight 134592 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134592/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-xsm 4 hos
flight 134504 qemu-upstream-4.11-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134504/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-
On 06/02/2019 10:54, Jan Beulich wrote:
On 06.02.19 at 10:57, wrote:
>> On 06/02/2019 07:40, Jan Beulich wrote:
>>> Benign exceptions, no matter whether they're first or second, will never
>>> cause #DF (a benign exception being second can basically only be #AC, as
>>> in the XSA-156 scenario
flight 134590 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134590/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-xsm 4 hos
flight 134583 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134583/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-xsm 4 hos
flight 134521 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134521/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
freebsd 58aa509054ac8eaea95e3741132f5f7c7aab7f96
baseline version:
freebsd 77b8255fbc4
This run is configured for baseline tests only.
flight 83915 ovmf real [real]
http://osstest.xensource.com/osstest/logs/83915/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
flight 134491 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134491/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-xsm
The series 832c1803^..f61685a6 was committed without adequate review.
* Fix the shim build by providing a !CONFIG_HVM declaration for
hvm_get_guest_bndcfgs()
* Revert the bogus de-const'ing of the vcpu pointer in
vmx_get_guest_bndcfgs(). vmx_vmcs_enter() really does mutate the vcpu, and
Wei Liu writes ("[PATCH v3 1/3] tools: remove tmem code and commands"):
> Remove all tmem related code in libxc.
Acked-by: Ian Jackson
For the whole series, provided no objections are heard within the next
week. If there are objections we should evaluate them and maybe
invite the objector to be
Fold in acks and some changes, and rebase to staging.
Having got a chance to test build each commit because the tree is
broken at the momemnt.
Wei Liu (3):
tools: remove tmem code and commands
xen: remove tmem from hypervisor
docs: remove tmem related text
MAINTAINERS
Remove all tmem related code in libxc.
Leave some stubs in libxl in case anyone has linked to those functions
before the removal.
Remove all tmem related commands in xl, all tmem related code in other
utilities we ship.
Signed-off-by: Wei Liu
Acked-by: Konrad Rzeszutek Wilk
---
Rebase and fix
Signed-off-by: Wei Liu
Acked-by: Daniel De Graaf
Acked-by: Konrad Rzeszutek Wilk
---
v3: Rebase and fix up conflicts
---
docs/man/xl.1.pod.in | 68 ---
docs/man/xl.conf.5.pod| 9 +-
docs/misc/tmem-internals.html | 789 --
docs/misc/xen
The current lock `domain_userdata_lock' can't be used when modification
to a guest is done by sending command to QEMU, this is a slow process
and requires to call CTX_UNLOCK, which is not possible while holding
the `domain_userdata_lock'.
To resolve this issue, we create a new lock which can take
We are going to create a new lock and want to reuse the same machinery.
Also, hide the detail of struct libxl__domain_userdata_lock as this is
only useful as a pointer by the rest of libxl.
No functional changes.
Signed-off-by: Anthony PERARD
---
tools/libxl/libxl_internal.c | 50 ++
That comment as been separated from the function it defines by
4197d3abbb3055d3798254eb7ba239bfb5824360, but then was not useful
anymore when the libxl__device_disk_add() prototype was removed by
22ea8ad02e465e32cd40887c750b55c3a997a288.
Signed-off-by: Anthony PERARD
---
tools/libxl/libxl_intern
It is currently difficult to know how/when/why the userdata lock is
supposed to be used. Add some pointers to the hotplug comments.
Signed-off-by: Anthony PERARD
---
tools/libxl/libxl_internal.h | 6 ++
1 file changed, 6 insertions(+)
diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/
.. and rename them to libxl__qmp_param_*.
This is to allow other files than libxl_qmp.c to make QMP calls with
parameters.
Signed-off-by: Anthony PERARD
---
tools/libxl/libxl_internal.h | 15
tools/libxl/libxl_qmp.c | 75 +---
2 files changed, 51 in
libxl_cdrom_insert is now asynchronous when QEMU is involve. And the
cdrom is now openned by libxl before sending a file descriptor to QEMU.
The "opaque" parametre of the "add-fd" can help to figure out what a
fdset in QEMU is used for. It can be queried by "query-fdsets".
Signed-off-by: Anthony
Since the previous patch "libxl_disk: Use ev_qmp in libxl_cdrom_insert",
there are no kind of timeout anymore, add one back.
Signed-off-by: Anthony PERARD
---
tools/libxl/libxl_disk.c | 21 +
1 file changed, 21 insertions(+)
diff --git a/tools/libxl/libxl_disk.c b/tools/libx
Hi,
This patch series fix libxl_cdrom_insert to work with a depriviledge QEMU. For
that, we need to use libxl__ev_qmp. For that, we need a new lock because
userdata_lock can't be used anymore.
Patch series available in this git branch:
https://xenbits.xen.org/git-http/people/aperard/xen-unstable
This is in preparation of cutting libxl_cdrom_insert into several
functions to allow asynchronous callbacks.
No functional changes.
Signed-off-by: Anthony PERARD
---
tools/libxl/libxl_disk.c | 58 ++--
1 file changed, 32 insertions(+), 26 deletions(-)
diff -
.. and use a new "slow" lock.
This patch cut libxl_cdrom_insert into different step/function but there
are still called synchronously. A later patch will call them
asynchronously when QMP is involved.
The json_lock has been replaced by the qmp_lock for protection against
concurrent changes to the
A recent Xen commit [1] clarified the semantics of sector based quantities
used in the blkif protocol such that it is now safe to create a xen-block
device with a logical_block_size != 512, as long as the device only
connects to a frontend advertizing 'feature-large-block-size'.
This patch modifie
flight 134571 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134571/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-xsm 4 hos
On 09/04/2019 16:17, Jan Beulich wrote:
On 09.04.19 at 15:38, wrote:
On 09/04/2019 14:01, Jan Beulich wrote:
@@ -463,9 +463,14 @@ static void timer_softirq_action(void)
if ( unlikely(ts->list != NULL) )
{
/* old_limit == (2^n)-1; new_limit == (2^(n+4))-1 */
-int
Anthony,
looks like this fix missed qemu-4.0.
What is your opinion on this fix? I think there was zero reply...
Olaf
On Mon, Jan 07, Olaf Hering wrote:
> Am Fri, 4 Jan 2019 17:48:31 +0100
> schrieb Olaf Hering :
>
> > Am Fri, 4 Jan 2019 16:57:55 +0100
> > schrieb Olaf Hering :
> >
> > > wort
flight 134509 qemu-upstream-4.10-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134509/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-pvops
On 09.04.2019 18:26, Tamas K Lengyel wrote:
> On Tue, Apr 9, 2019 at 8:48 AM Alexandru Stefan ISAILA
> wrote:
>>
>>
>>
>> On 09.04.2019 17:37, Tamas K Lengyel wrote:
>>> On Tue, Apr 9, 2019 at 8:03 AM Alexandru Stefan ISAILA
>>> wrote:
On 09.04.2019 16:48, Tamas K Lengyel wro
On Tue, Apr 9, 2019 at 8:48 AM Alexandru Stefan ISAILA
wrote:
>
>
>
> On 09.04.2019 17:37, Tamas K Lengyel wrote:
> > On Tue, Apr 9, 2019 at 8:03 AM Alexandru Stefan ISAILA
> > wrote:
> >>
> >>
> >>
> >> On 09.04.2019 16:48, Tamas K Lengyel wrote:
> >>> On Tue, Apr 9, 2019 at 6:04 AM Alexandru St
>>> On 09.04.19 at 15:38, wrote:
> On 09/04/2019 14:01, Jan Beulich wrote:
>> @@ -463,9 +463,14 @@ static void timer_softirq_action(void)
>> if ( unlikely(ts->list != NULL) )
>> {
>> /* old_limit == (2^n)-1; new_limit == (2^(n+4))-1 */
>> -int old_limit = heap_metadata(h
>>> On 09.04.19 at 16:18, wrote:
> On Tue, Apr 09, 2019 at 07:01:55AM -0600, Jan Beulich wrote:
>> @@ -544,7 +549,7 @@ static void dump_timerq(unsigned char ke
>> struct timers *ts;
>> unsigned long flags;
>> s_time_t now = NOW();
>> -inti, j;
>> +unsigned
>>> On 09.04.19 at 16:38, wrote:
> On 14/03/2019 13:51, Paul Durrant wrote:
>> @@ -1215,8 +1196,11 @@ static bool vmx_set_guest_bndcfgs(struct vcpu *v, u64
>> val)
>> return true;
>> }
>>
>> -static bool vmx_get_guest_bndcfgs(struct vcpu *v, u64 *val)
>> +static bool vmx_get_guest_bndcfgs
The rules to generate xen-syms and xen.efi may run in parallel, but both
recursively invoke $(MAKE) to build symbol/relocation table temporary
object files. These recursive builds would both re-generate the .*.d2
files (where needed). Both would in turn invoke the same rule, thus
allowing for a rac
On 09.04.2019 17:37, Tamas K Lengyel wrote:
> On Tue, Apr 9, 2019 at 8:03 AM Alexandru Stefan ISAILA
> wrote:
>>
>>
>>
>> On 09.04.2019 16:48, Tamas K Lengyel wrote:
>>> On Tue, Apr 9, 2019 at 6:04 AM Alexandru Stefan ISAILA
>>> wrote:
This patch moves common code from p2m_set_altp2m_
On 14/03/2019 13:51, Paul Durrant wrote:
> @@ -1215,8 +1196,11 @@ static bool vmx_set_guest_bndcfgs(struct vcpu *v, u64
> val)
> return true;
> }
>
> -static bool vmx_get_guest_bndcfgs(struct vcpu *v, u64 *val)
> +static bool vmx_get_guest_bndcfgs(const struct vcpu *cv, u64 *val)
> {
> +
On Tue, Apr 9, 2019 at 8:03 AM Alexandru Stefan ISAILA
wrote:
>
>
>
> On 09.04.2019 16:48, Tamas K Lengyel wrote:
> > On Tue, Apr 9, 2019 at 6:04 AM Alexandru Stefan ISAILA
> > wrote:
> >>
> >> This patch moves common code from p2m_set_altp2m_mem_access() and
> >> p2m_change_altp2m_gfn() into one
flight 134515 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134515/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7f33d4f22836226a6a86c3112ac6fcb2f1209152
baseline version:
ovmf 079141ebe7f1bf5f85a0c
The previous certificate had expired, a new one have been generated.
Signed-off-by: Anthony PERARD
---
production-config | 30 +++---
1 file changed, 15 insertions(+), 15 deletions(-)
diff --git a/production-config b/production-config
index 59c74cc..7da7822 100644
--- a/
On Tue, Apr 09, 2019 at 07:01:55AM -0600, Jan Beulich wrote:
> @@ -544,7 +549,7 @@ static void dump_timerq(unsigned char ke
> struct timers *ts;
> unsigned long flags;
> s_time_t now = NOW();
> -inti, j;
> +unsigned int i, j;
A further possible improveme
On 09.04.2019 16:48, Tamas K Lengyel wrote:
> On Tue, Apr 9, 2019 at 6:04 AM Alexandru Stefan ISAILA
> wrote:
>>
>> This patch moves common code from p2m_set_altp2m_mem_access() and
>> p2m_change_altp2m_gfn() into one function
>>
>> Signed-off-by: Alexandru Isaila
>>
>> ---
>> Changes since V2:
flight 134508 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134508/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64
On 09/04/2019 13:14, Jan Beulich wrote:
On 08.04.19 at 19:02, wrote:
>> Currently, a user can in combine the output of `xl info -n`, the APCI tables,
> Stray "in"?
Oh yes. I think I first phrased this as "can in principle combine",
then changed my mind.
>
>> and some manual CPUID data to f
On Tue, Apr 9, 2019 at 6:04 AM Alexandru Stefan ISAILA
wrote:
>
> This patch moves common code from p2m_set_altp2m_mem_access() and
> p2m_change_altp2m_gfn() into one function
>
> Signed-off-by: Alexandru Isaila
>
> ---
> Changes since V2:
> - Change var name from found_in_hostp2m to copi
On Tue, Apr 9, 2019 at 6:04 AM Alexandru Stefan ISAILA
wrote:
>
> This patch moves common code from p2m_set_altp2m_mem_access() and
> p2m_change_altp2m_gfn() into one function
>
> Signed-off-by: Alexandru Isaila
> ---
> xen/arch/x86/mm/mem_access.c | 2 +-
> xen/include/asm-x86/p2m.h| 11 ++
On 09/04/2019 14:01, Jan Beulich wrote:
> @@ -463,9 +463,14 @@ static void timer_softirq_action(void)
> if ( unlikely(ts->list != NULL) )
> {
> /* old_limit == (2^n)-1; new_limit == (2^(n+4))-1 */
> -int old_limit = heap_metadata(heap)->limit;
> -int new_limit = (
On 4/9/19 12:46 PM, Juergen Gross wrote:
On 09/04/2019 11:33, Oleksandr Andrushchenko wrote:
On 4/9/19 12:28 PM, Juergen Gross wrote:
On 09/04/2019 11:15, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This is the ABI for the two halves of a para-virtualized
camera driver which
>>> On 09.04.19 at 14:59, wrote:
> On Tue, Apr 09, 2019 at 06:49:34AM -0600, Jan Beulich wrote:
>> >>> On 09.04.19 at 14:22, wrote:
>> > On Fri, Mar 15, 2019 at 09:36:37AM -0600, Jan Beulich wrote:
>> >> >>> On 07.02.19 at 17:44, wrote:
>> >> > The pl2e and pl1e variables are heavily (ab)used in
On Wed 2019-04-03 14:28:14, Sakari Ailus wrote:
> Ping.
>
> On Tue, Mar 26, 2019 at 02:35:10PM +0100, Petr Mladek wrote:
> > Linus,
> >
> > On Mon 2019-03-25 21:32:28, Sakari Ailus wrote:
> > > %pF and %pf are functionally equivalent to %pS and %ps conversion
> > > specifiers. The former are depr
First and foremost make timer_softirq_action() avoid growing the heap
if its new size can't be stored without truncation. 64k entries is a
lot, and I don't think we're at high risk of running into the issue,
but I think it's better to not allow for hard to debug problems to
occur in the first place
On Tue, Apr 09, 2019 at 06:56:56AM -0600, Jan Beulich wrote:
> >>> On 09.04.19 at 14:23, wrote:
> > On Mon, Mar 18, 2019 at 09:14:44PM +, Nuernberger, Stefan wrote:
> >> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> >> > This requires storing the MFN instead of linear address of the L4
>
On Tue, Apr 09, 2019 at 06:49:34AM -0600, Jan Beulich wrote:
> >>> On 09.04.19 at 14:22, wrote:
> > On Fri, Mar 15, 2019 at 09:36:37AM -0600, Jan Beulich wrote:
> >> >>> On 07.02.19 at 17:44, wrote:
> >> > The pl2e and pl1e variables are heavily (ab)used in that function. It
> >> > is fine at the
>>> On 09.04.19 at 14:23, wrote:
> On Mon, Mar 18, 2019 at 09:14:44PM +, Nuernberger, Stefan wrote:
>> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
>> > This requires storing the MFN instead of linear address of the L4
>> > table. Adjust code accordingly.
>> >
>> > Signed-off-by: Wei Liu
>>> On 09.04.19 at 14:27, wrote:
> On Mon, Apr 08, 2019 at 09:55:47AM -0600, Jan Beulich wrote:
>> >>> On 07.02.19 at 17:44, wrote:
>> > @@ -4769,45 +4769,70 @@ void free_xen_pagetable_new(mfn_t mfn)
>> >
>> > static DEFINE_SPINLOCK(map_pgdir_lock);
>> >
>> > +/*
>> > + * Given a virtual add
>>> On 09.04.19 at 14:22, wrote:
> On Fri, Mar 15, 2019 at 09:40:39AM -0600, Jan Beulich wrote:
>> >>> On 07.02.19 at 17:44, wrote:
>> > We will soon need to clean up mappings whenever the out most loop is
>> > ended. Add a new label and turn relevant continue's into goto's.
>>
>> To be honest,
>>> On 09.04.19 at 14:22, wrote:
> On Fri, Mar 15, 2019 at 09:36:37AM -0600, Jan Beulich wrote:
>> >>> On 07.02.19 at 17:44, wrote:
>> > The pl2e and pl1e variables are heavily (ab)used in that function. It
>> > is fine at the moment because all page tables are always mapped so
>> > there is no n
On Fri, Apr 05, 2019 at 06:58:11PM +0100, Anthony PERARD wrote:
> Commit 03e1a56d81c16eece735e4d0ef74bfb10eaaba07 replaced DEVICE_ADD()
> calls by device_add_domain_config() calls but also removed the comment
> of DEVICE_ADD(). Copy the useful part of that comment to
> device_add_domain_config().
>
On Fri, Apr 05, 2019 at 06:58:09PM +0100, Anthony PERARD wrote:
> Signed-off-by: Anthony PERARD
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Fri, Apr 05, 2019 at 06:58:10PM +0100, Anthony PERARD wrote:
> All functions libxl_device_*_copy which implements device_compare_fn_t
> already have the `src' parameter defined with const.
>
> Signed-off-by: Anthony PERARD
Acked-by: Wei Liu
___
Xe
On Tue, Apr 09, 2019 at 01:01:58PM +0100, Igor Druzhinin wrote:
> Parsing the config seems to be an overkill for this particular task
> and the config might simply be absent. Type returned from libxl_domain_info
> should be either LIBXL_DOMAIN_TYPE_HVM or LIBXL_DOMAIN_TYPE_PV but in
> that context
On Mon, Apr 08, 2019 at 06:02:19PM +0100, Andrew Cooper wrote:
> Currently, a user can in combine the output of `xl info -n`, the APCI tables,
> and some manual CPUID data to figure out which CPU numbers to feed into
> `xen-hptool cpu-offline` to effectively disable SMT at runtime.
>
> A more conv
On Mon, Mar 18, 2019 at 09:14:38PM +, Nuernberger, Stefan wrote:
> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > xen/arch/x86/x86_64/mm.c | 16
> > 1 file changed, 12 insertions(+), 4 deletions(-)
> >
> > diff --git a/xen/arch/x86/x
On Mon, Apr 08, 2019 at 09:55:47AM -0600, Jan Beulich wrote:
> >>> On 07.02.19 at 17:44, wrote:
> > @@ -4769,45 +4769,70 @@ void free_xen_pagetable_new(mfn_t mfn)
> >
> > static DEFINE_SPINLOCK(map_pgdir_lock);
> >
> > +/*
> > + * Given a virtual address, return a pointer to xen's L3 entry. C
On Mon, Mar 18, 2019 at 09:14:19PM +, Nuernberger, Stefan wrote:
> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> > Rewrite that function to use the new APIs. Modify its callers to
> > unmap
> > the pointer returned.
> >
> > Signed-off-by: Wei Liu
> > ---
>
> nit: the commit title shoul
On Mon, Mar 18, 2019 at 09:14:44PM +, Nuernberger, Stefan wrote:
> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> > This requires storing the MFN instead of linear address of the L4
> > table. Adjust code accordingly.
> >
> > Signed-off-by: Wei Liu
> > ---
> > xen/arch/x86/efi/runtime.h
On Tue, Mar 19, 2019 at 04:45:24PM +, Nuernberger, Stefan wrote:
> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> > This then requires moving declaration of root page table mfn into
> > mm.h
> > and modify setup_cpu_root_pgt to have a single exit path.
> >
> > We also need to force map_do
On Mon, Mar 18, 2019 at 09:14:28PM +, Nuernberger, Stefan wrote:
> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> > Page tables allocated in that function should be mapped and unmapped
> > now.
> >
> > Signed-off-by: Wei Liu
> > ---
> > xen/arch/x86/mm.c | 31 ++-
On Fri, Mar 15, 2019 at 09:40:39AM -0600, Jan Beulich wrote:
> >>> On 07.02.19 at 17:44, wrote:
> > We will soon need to clean up mappings whenever the out most loop is
> > ended. Add a new label and turn relevant continue's into goto's.
>
> To be honest, I was on the edge of already suggesting l
On Fri, Mar 15, 2019 at 08:38:38AM -0600, Jan Beulich wrote:
> >>> On 07.02.19 at 17:44, wrote:
> > --- a/xen/arch/x86/mm.c
> > +++ b/xen/arch/x86/mm.c
> > @@ -4752,13 +4752,13 @@ static l3_pgentry_t *virt_to_xen_l3e(unsigned long
> > v)
> >
> > if ( !pl3e )
> > return NUL
On Fri, Mar 15, 2019 at 09:36:37AM -0600, Jan Beulich wrote:
> >>> On 07.02.19 at 17:44, wrote:
> > The pl2e and pl1e variables are heavily (ab)used in that function. It
> > is fine at the moment because all page tables are always mapped so
> > there is no need to track the life time of each varia
On Mon, Mar 18, 2019 at 09:14:14PM +, Nuernberger, Stefan wrote:
> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> > We will soon rewrite the function to handle dynamically mapping and
> > unmapping of page tables.
> >
> > No functional change.
> >
> > Signed-off-by: Wei Liu
> > ---
> >
On Mon, Mar 18, 2019 at 09:14:41PM +, Nuernberger, Stefan wrote:
> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > xen/common/efi/boot.c | 10 ++
> > 1 file changed, 10 insertions(+)
> >
> > diff --git a/xen/common/efi/boot.c b/xen/common/efi/
On Mon, Mar 18, 2019 at 09:14:34PM +, Nuernberger, Stefan wrote:
> On Thu, 2019-02-07 at 16:44 +, Wei Liu wrote:
> > Signed-off-by: Wei Liu
>
> Any reason why this isn't squashed with the previous patch?
Because of how I classified changes -- lXe_to_lYe belongs to their own
group.
I can
>>> On 09.04.19 at 11:50, wrote:
> On 08/04/2019 15:29, Jan Beulich wrote:
> On 08.04.19 at 13:47, wrote:
>>> de-allocation step aside, I am not really convinced you can reuse
>>> guest_remove_page() here. On x86, the function will not work on certain
>>> p2m types. Is it what we really want?
flight 83913 distros-debian-snapshot real [real]
http://osstest.xensource.com/osstest/logs/83913/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-i386
>>> On 08.04.19 at 19:02, wrote:
> Currently, a user can in combine the output of `xl info -n`, the APCI tables,
Stray "in"?
> and some manual CPUID data to figure out which CPU numbers to feed into
> `xen-hptool cpu-offline` to effectively disable SMT at runtime.
>
> A more convenient option i
Hi Andrew,
On 27/03/2019 19:10, Andrew Cooper wrote:
On 27/03/2019 18:45, Julien Grall wrote:
Clang will throw an error if a function is unused unless you tell
to ignore it. This can be done using __maybe_unused.
Signed-off-by: Julien Grall
---
xen/arch/arm/mm.c | 3 ++-
1 file changed, 2
flight 134507 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134507/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
This patch moves common code from p2m_set_altp2m_mem_access() and
p2m_change_altp2m_gfn() into one function
Signed-off-by: Alexandru Isaila
---
Changes since V2:
- Change var name from found_in_hostp2m to copied_from_hostp2m
- Move the type check from altp2m_get_gfn_type_access()
This patch moves common code from p2m_set_altp2m_mem_access() and
p2m_change_altp2m_gfn() into one function
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/mm/mem_access.c | 2 +-
xen/include/asm-x86/p2m.h| 11 +++
2 files changed, 12 insertions(+), 1 deletion(-)
diff --git a/xen/
On a new altp2m view the p2m_set_suppress_ve() func will fail with invalid mfn
from p2m->get_entry() if p2m->set_entry() was not called before.
This patch solves the problem by getting the mfn from hostp2m.
Signed-off-by: Alexandru Isaila
---
xen/arch/x86/mm/p2m.c | 3 ++-
1 file changed, 2 ins
Parsing the config seems to be an overkill for this particular task
and the config might simply be absent. Type returned from libxl_domain_info
should be either LIBXL_DOMAIN_TYPE_HVM or LIBXL_DOMAIN_TYPE_PV but in
that context distinction between PVH and HVM should be irrelevant.
Signed-off-by: Ig
flight 134566 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/134566/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-xsm 4 hos
>>> On 09.04.19 at 13:26, wrote:
> On 03/04/2019 14:04, Jan Beulich wrote:
>> Also please note the quotation used by the mentioned
>> existing doc comments, as well as a few other formal aspects
>> (like them also making clear what the return type is). I think
>> that's a model used elsewhere as w
That value is used by SecPeiDxeTimerLibCpu, the TimerLib implementation.
It will also be used by XenTimerDxe.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Anthony PERARD
---
Notes:
new patch in v2.
OvmfPkg/XenOvmf.dsc | 3 +++
1 file changed, 3 insertions(+)
diff
When running as a Xen PVH guest, there is no CMOS to read the memory
size from. Rework GetSystemMemorySize(Below|Above)4gb() so they can
works without CMOS by reading the e820 table.
Rework XenPublishRamRegions for PVH, handle the Reserve type and explain
about the ACPI type. MTRR settings aren't
Check if there's a start of the day struct provided to PVH guest, save
the ACPI RSDP address for later.
This patch import import arch-x86/hvm/start_info.h from xen.git.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Anthony PERARD
---
OvmfPkg/XenPlatformPei/XenPlatformPe
Use the already checked pointer mXenHvmloaderInfo to retrieve the E820
table produced by hvmloader.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Anthony PERARD
---
OvmfPkg/XenPlatformPei/Xen.c | 18 +-
1 file changed, 9 insertions(+), 9 deletions(-)
dif
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Anthony PERARD
---
OvmfPkg/XenPlatformPei/Xen.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/OvmfPkg/XenPlatformPei/Xen.c b/OvmfPkg/XenPlatformPei/Xen.c
index 89933ec3e9..22c7a22c88 100644
--- a/OvmfP
Allow to use Xen hypercalls earlier, during the PEIM stage, but
XenHypercallLibReInit() must be called once the XenInfo HOB is created
with the HyperPage setup.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Anthony PERARD
---
OvmfPkg/Library/XenHypercallLib/XenHypercallL
Linux panic if this region isn't reserved.
When Linux is booted on EFI system, it expects the memory at 0xa to
_not_ be conventional memory. Otherwise a variable isn't initialised
properly and Linux panic when a virtual console/terminal is asked to be
created.
See for more detail:
https://lis
This "device" use XenIoMmioLib to reserve some space to be use by the
Grant Tables.
The call is only done if it is necessary, we simply detect if the guest
is probably PVH, as in this case there is currently no PCI bus, and no
PCI Xen platform device which would start the XenIoPciDxe and allocate
On a Xen PVH guest, none of the existing serial or console interface
works, so we add a new one, based on XenConsoleSerialPortLib, and
implemeted via SerialDxe.
That a simple console implementation that can works on both PVH guest
and HVM guests, even if it rarely going to be use on HVM.
Have Pla
So it can be used from the OvmfPkg by the following patch,
"OvmfPkg/XenOvmf: use RealTimeClockRuntimeDxe from EmbeddedPkg"
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Anthony PERARD
---
ArmVirtPkg/ArmVirtXen.dsc |
2 +-
"PcAtChipsetPkg/8254TimerDxe" is replaced with a Xen-specific
EFI_TIMER_ARCH_PROTOCOL implementation. Also remove
8259InterruptControllerDxe as it is not used anymore.
This Timer uses the local APIC timer as time source as it can work on
both a Xen PVH guest and an HVM one.
Based on the "PcAtChip
A Xen PVH guest doesn't have a RTC that OVMF would expect, so
PcatRealTimeClockRuntimeDxe fails to initialize and prevent the firmware
from finish to boot. To prevent that, we will use the
XenRealTimeClockLib from ArmVirtPkg which simply always return the same
time. This will work on both Xen PVH a
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Anthony PERARD
---
OvmfPkg/XenPlatformPei/Platform.h | 5 +
OvmfPkg/XenPlatformPei/Xen.c | 7 +++
2 files changed, 12 insertions(+)
diff --git a/OvmfPkg/XenPlatformPei/Platform.h
b/OvmfPkg/XenPlatformPei/Platfor
1 - 100 of 149 matches
Mail list logo