On 15.03.2023 05:14, Huang Rui wrote:
> On Wed, Mar 15, 2023 at 08:52:30AM +0800, Stefano Stabellini wrote:
>> On Mon, 13 Mar 2023, Jan Beulich wrote:
>>> On 12.03.2023 13:01, Huang Rui wrote:
Xen PVH is the paravirtualized mode and takes advantage of hardware
virtualization support when
On 15.03.2023 01:52, Stefano Stabellini wrote:
> On Mon, 13 Mar 2023, Jan Beulich wrote:
>> On 12.03.2023 13:01, Huang Rui wrote:
>>> Xen PVH is the paravirtualized mode and takes advantage of hardware
>>> virtualization support when possible. It will using the hardware IOMMU
>>> support instead of
On 09-03-23, 14:20, Viresh Kumar wrote:
> Hello,
>
> This patchset tries to update the vhost-user protocol to make it support
> special
> memory mapping required in case of Xen hypervisor.
>
> The first patch is mostly cleanup and second one introduces a new xen specific
> feature.
>
> V2->V3:
This patch provides accessor functions as replacements for direct
access to slot_reserved_mask according to the comment at the top
of include/hw/pci/pci_bus.h which advises that data structures for
PCIBus should not be directly accessed but instead be accessed using
accessor functions in pci.h.
Th
This patch series consists of two patches. The first provides accessor
functions in pci.h to avoid direct access of slot_reserved_mask
according to the comment at the top of include/hw/pci/pci_bus.h. No
functional change is intended with this patch.
The second patch replaces slot_reserved_mask wit
Commit 4f67543bb8c5 ("xen/pt: reserve PCI slot 2 for Intel igd-passthru")
uses slot_reserved_mask to reserve slot 2 for the Intel igd for the
xenfv machine when the guest is configured for igd-passthru.
Prior to that commit, a single 32-bit mask was sufficient to meet the
needs of the only machine
flight 179627 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/179627/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-freebsd12-amd64 13 guest-start fail REGR. vs. 178042
test-amd64-amd64-pa
On Wed, Mar 15, 2023 at 08:52:30AM +0800, Stefano Stabellini wrote:
> On Mon, 13 Mar 2023, Jan Beulich wrote:
> > On 12.03.2023 13:01, Huang Rui wrote:
> > > Xen PVH is the paravirtualized mode and takes advantage of hardware
> > > virtualization support when possible. It will using the hardware IO
flight 179636 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/179636/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
Hi Andrew,
> -Original Message-
> From: Andrew Cooper
> Subject: [PATCH 0/7] tools: More Python 3 fixes (part 1 of N)
>
> Relatedly, and a critical/blocker for Xen 4.18. Python 3.12, which will be
> released ahead of the Xen 4.18 release, is deleteing distutils (recommending
> setuputil
Hi all,
I'm looking for some pointers on how Xen's altp2m system works and how it's
meant to be used with Intel's VMFUNC EPT-switching for secure isolation within
an HVM/PVH guest's kernelspace.
Specifically, I am attempting to modify Xen to create (on request by an
already-booted, cooperative
On Mon, 13 Mar 2023, Jan Beulich wrote:
> On 12.03.2023 13:01, Huang Rui wrote:
> > Xen PVH is the paravirtualized mode and takes advantage of hardware
> > virtualization support when possible. It will using the hardware IOMMU
> > support instead of xen-swiotlb, so disable swiotlb if current domain
On Mon, 13 Mar 2023, Christian König wrote:
> Am 13.03.23 um 08:23 schrieb Christian König:
> > Am 12.03.23 um 08:54 schrieb Huang Rui:
> > > From: Chen Jiqian
> > >
> > > When dom0 is PVH and we want to passthrough gpu to guest,
> > > we should allow BAR writes even through BAR is mapped. If
> >
flight 179621 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/179621/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 7 xen-install fail in
179604 pass in 179621
test-amd64-i3
Prior to this change, lifetime of pci_dev objects was protected by global
pcidevs_lock(). Long-term plan is to remove this log, so we need some
other mechanism to ensure that those objects will not disappear under
feet of code that access them. Reference counting is a good choice as
it provides eas
This patch set is spiritual successor of "[PATCH v2 0/4] vpci: first
series in preparation for vpci on ARM". But most of the contents was
reworked. Main aim of those patches is to allow vPCI MMIO handlers to
work with DomUs, not only with Dom0. To do this, we need protect pdev
from being removed wh
We can use reference counter to ease up object lifetime management.
This patch adds very basic support for reference counters. refcnt
should be used in the following way:
1. Protected structure should have refcnt_t field
2. This field should be initialized with refcnt_init() during object
constru
This can be handy during new reference counter approach evaluation.
Signed-off-by: Volodymyr Babchuk
---
v3:
- Moved from another patch series
---
xen/drivers/passthrough/pci.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/passthrough/pci.c b/xen/drivers/pa
From: Oleksandr Andrushchenko
A guest would be able to read and write those registers which are not
emulated and have no respective vPCI handlers, so it will be possible
for it to access the hardware directly.
In order to prevent a guest from reads and writes from/to the unhandled
registers make
In that unlikely case, when map_range() fails to do it's job,
domain memory mapping will be left in inconsistent state. As there is
no easy way to remove stale p2m mapping we need to crash domain, as
FIXME suggests.
Signed-off-by: Volodymyr Babchuk
---
v3:
- new patch
---
xen/drivers/vpci/hea
vPCI MMIO handlers are accessing pdevs without protecting this
access with pcidevs_{lock|unlock}. This is not a problem as of now
as these are only used by Dom0. But, towards vPCI is used also for
guests, we need to properly protect pdev and pdev->vpci from being
removed while still in use.
For th
On Tue, 2023-03-14 at 17:09 +, Andrew Cooper wrote:
> On 14/03/2023 4:00 pm, Oleksii Kurochko wrote:
> > The patch is needed to keep all addresses PC-relative.
> >
> > Pseudoinstruction 'la' can be transformed to 'auipc/addi' or
> > 'auipc/l{w|d}'. It depends on the .option directive: nopic an
From: Mika Westerberg
Instead of open-coding it everywhere introduce a tiny helper that can be
used to iterate over each resource of a PCI device, and convert the most
obvious users into it.
While at it drop doubled empty line before pdev_sort_resources().
No functional changes intended.
Sugge
Provide two new helper macros to iterate over PCI device resources and
convert users.
Looking at it, refactor existing pci_bus_for_each_resource() and convert
users accordingly.
Changelog v5:
- renamed loop variable to minimize the clash (Keith)
- addressed smatch warning (Dan)
- addressed 0-day
The pci_bus_for_each_resource_p() hides the iterator loop since
it may be not used otherwise. With this, we may drop that iterator
variable definition.
Signed-off-by: Andy Shevchenko
Reviewed-by: Krzysztof Wilczyński
Acked-by: Dominik Brodowski
---
drivers/pcmcia/rsrc_nonstatic.c | 9 +++--
The pci_bus_for_each_resource_p() hides the iterator loop since
it may be not used otherwise. With this, we may drop that iterator
variable definition.
Signed-off-by: Andy Shevchenko
Reviewed-by: Krzysztof Wilczyński
---
drivers/eisa/pci_eisa.c | 4 ++--
1 file changed, 2 insertions(+), 2 delet
Refactor pci_bus_for_each_resource() in the same way as it's done in
pci_dev_for_each_resource() case. This will allow to hide iterator
inside the loop, where it's not used otherwise.
No functional changes intended.
Signed-off-by: Andy Shevchenko
Reviewed-by: Krzysztof Wilczyński
---
.clang-fo
On Tue, Mar 14, 2023 at 3:12 PM Oleksii wrote:
> I would like to add the changes from the [PATCH] xen/cpufreq: Remove
> by Jason Andryuk but I don't know how
> correctly do that. I mean should I added one more Signed-off to the
> patch?
Hi, Oleksii,
It's two trivial deletions, so I think you c
On 14.03.2023 18:12, Andrew Cooper wrote:
> On 14/03/2023 4:48 pm, Denis wrote:
> > On 14.03.2023 16:11, Andrew Cooper wrote:
> >> On 14/03/2023 2:53 pm, Denis wrote:
> >>> On 14.03.2023 07:37; Jan Beulich wrote:
> On 14.03.2023 02:15, Denis wrote:
> > On 13.03.2023 10:36, Jan wrote
>
On Mon, 2023-03-13 at 17:26 +0100, Jan Beulich wrote:
> On 09.03.2023 14:33, Oleksii Kurochko wrote:
> > --- /dev/null
> > +++ b/xen/common/bug.c
> > @@ -0,0 +1,107 @@
> > +#include
> > +#include
> > +#include
> > +#include
> > +#include
> > +#include
> > +#include
> > +
> > +#include
> > +
On 14.03.2023 17:59, Jan Beulich wrote:
> On 14.03.2023 17:45, Denis wrote:
> > On 14.03.2023 16:37, Jan Beulich wrote:
> >> On 14.03.2023 15:53, Denis wrote:
> >>> What tests could I do or what info should I provide to help?
> >>
> >> Boot plain Linux (no Xen underneath) and collect the full set o
On Tue, 2023-03-14 at 08:14 -0400, Jason Andryuk wrote:
> On Tue, Mar 14, 2023 at 6:19 AM Jan Beulich
> wrote:
> >
> > On 13.03.2023 18:51, Jason Andryuk wrote:
> > > The header is unneeded - there are no uses of BUG() or WARN() in
> > > these
> > > cpufreq files. Remove the include. It is stil
On Sat, Mar 11, 2023 at 04:54:32PM +0300, Dan Carpenter wrote:
> 059b4a086017fb Mika Westerberg 2023-03-10 246
> unsigned long type = resource_type(r);
> 999ed65ad12e37 Rene Herman 2008-07-25 247
> 059b4a086017fb Mika Westerberg 2023-03-10 @248
On Fri, Mar 10, 2023 at 03:15:38PM -0700, Keith Busch wrote:
> On Fri, Mar 10, 2023 at 07:14:13PM +0200, Andy Shevchenko wrote:
...
> > +#define pci_dev_for_each_resource_p(dev, res)
> > \
> > + __pci_dev_for_each_resource(dev, res, i, unsigned int)
>
> It looks d
flight 179616 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/179616/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-amd64-amd64-libvirt-xsm 15 migrate-s
Hi Bertrand,
On Mon, Mar 13, 2023 at 9:49 AM Bertrand Marquis
wrote:
>
> Hi Jens,
>
> > On 22 Feb 2023, at 16:33, Jens Wiklander wrote:
> >
> > Adds support for a guest to share memory with an SP using FFA_MEM_SHARE
> > and FFA_MEM_RECLAIM. Only small memory regions can be shared using a
> > sin
On 14/03/2023 4:48 pm, Denis wrote:
> On 14.03.2023 16:11, Andrew Cooper wrote:
>> On 14/03/2023 2:53 pm, Denis wrote:
>>> On 14.03.2023 07:37; Jan Beulich wrote:
On 14.03.2023 02:15, Denis wrote:
> On 13.03.2023 10:36, Jan wrote
>> On 10.03.2023 21:50, Denis wrote:
>>> Should I te
On 14/03/2023 4:00 pm, Oleksii Kurochko wrote:
> The patch is needed to keep all addresses PC-relative.
>
> Pseudoinstruction 'la' can be transformed to 'auipc/addi' or
> 'auipc/l{w|d}'. It depends on the .option directive: nopic and pic.
>
> Right now, 'la' transforms to 'auipc/l{w|d}', which in c
On 3/14/2023 10:39 AM, Mark Cave-Ayland wrote:
> On 14/03/2023 14:21, Chuck Zmudzinski wrote:
>
> > On 3/14/2023 9:41 AM, Mark Cave-Ayland wrote:
> >> On 14/03/2023 13:26, Chuck Zmudzinski wrote:
> >>
> >>> On 3/14/2023 9:17 AM, Michael S. Tsirkin wrote:
> On Tue, Mar 14, 2023 at 12:43:12PM +0
On 14.03.2023 17:45, Denis wrote:
> On 14.03.2023 16:37, Jan Beulich wrote:
>> On 14.03.2023 15:53, Denis wrote:
>>> What tests could I do or what info should I provide to help?
>>
>> Boot plain Linux (no Xen underneath) and collect the full set of kernel
>> boot messages (some distros store this a
On 14.03.2023 17:34, Roger Pau Monné wrote:
> On Tue, Mar 14, 2023 at 04:46:19PM +0100, Jan Beulich wrote:
>> On 14.03.2023 14:54, Roger Pau Monné wrote:
>>> On Tue, Mar 14, 2023 at 12:56:33PM +0100, Jan Beulich wrote:
On 14.03.2023 11:13, Roger Pau Monne wrote:
I'm also concerned of misa
On 14.03.2023 16:11, Andrew Cooper wrote:
> On 14/03/2023 2:53 pm, Denis wrote:
> > On 14.03.2023 07:37; Jan Beulich wrote:
> >> On 14.03.2023 02:15, Denis wrote:
> >>> On 13.03.2023 10:36, Jan wrote
> On 10.03.2023 21:50, Denis wrote:
> > Should I test something else?
> ... there was
On 12.03.2023 08:54, Huang Rui wrote:
> From: Chen Jiqian
>
> Use new xc_physdev_gsi_from_irq to get the GSI number
Apart from again the "Why?", ...
> --- a/tools/libs/light/libxl_pci.c
> +++ b/tools/libs/light/libxl_pci.c
> @@ -1486,6 +1486,7 @@ static void pci_add_dm_done(libxl__egc *egc,
>
On 12.03.2023 08:54, Huang Rui wrote:
> From: Chen Jiqian
>
> When passthrough gpu to guest, usersapce can only get irq
> instead of gsi. But it should pass gsi to guest, so that
> guest can get interrupt signal. So, provide function to get
> gsi.
>
> Signed-off-by: Chen Jiqian
> Signed-off-by:
On Tue, Mar 14, 2023 at 04:46:19PM +0100, Jan Beulich wrote:
> On 14.03.2023 14:54, Roger Pau Monné wrote:
> > On Tue, Mar 14, 2023 at 12:56:33PM +0100, Jan Beulich wrote:
> >> On 14.03.2023 11:13, Roger Pau Monne wrote:
> >> I'm also concerned of misaligned accesses: While we can't keep the
> >> g
On 12.03.2023 08:54, Huang Rui wrote:
> From: Chen Jiqian
An empty description won't do here. First of all you need to address the Why?
As already hinted at in the reply to the earlier patch, it looks like you're
breaking the intended IRQ model for PVH.
Jan
On 12.03.2023 08:54, Huang Rui wrote:
> From: Chen Jiqian
>
> PVH is also hvm type domain, but PVH hasn't X86_EMU_USE_PIRQ
> flag. So, when dom0 is PVH and call PHYSDEVOP_map_pirq, it
> will fail at check has_pirq();
>
> Signed-off-by: Chen Jiqian
> Signed-off-by: Huang Rui
Please see b96b500
On Tue, Mar 14, 2023 at 06:00:41PM +0200, Oleksii Kurochko wrote:
> The patch is needed to keep all addresses PC-relative.
>
> Pseudoinstruction 'la' can be transformed to 'auipc/addi' or
> 'auipc/l{w|d}'. It depends on the .option directive: nopic and pic.
>
> Right now, 'la' transforms to 'auip
On 14.03.2023 17:00, Oleksii Kurochko wrote:
> The patch is needed to keep all addresses PC-relative.
>
> Pseudoinstruction 'la' can be transformed to 'auipc/addi' or
> 'auipc/l{w|d}'. It depends on the .option directive: nopic and pic.
>
> Right now, 'la' transforms to 'auipc/l{w|d}',
I'm afrai
On 12.03.2023 08:54, Huang Rui wrote:
> From: Chen Jiqian
>
> When dom0 is PVH and we want to passthrough gpu to guest,
> we should allow BAR writes even through BAR is mapped. If
> not, the value of BARs are not initialized when guest firstly
> start.
>From this it doesn't become clear why a GP
The patch is needed to keep all addresses PC-relative.
Pseudoinstruction 'la' can be transformed to 'auipc/addi' or
'auipc/l{w|d}'. It depends on the .option directive: nopic and pic.
Right now, 'la' transforms to 'auipc/l{w|d}', which in case of
cpu0_boot_stack[] will lead to the usage of _GLOBA
On 14.03.2023 14:54, Roger Pau Monné wrote:
> On Tue, Mar 14, 2023 at 12:56:33PM +0100, Jan Beulich wrote:
>> On 14.03.2023 11:13, Roger Pau Monne wrote:
>>> --- a/xen/drivers/vpci/msix.c
>>> +++ b/xen/drivers/vpci/msix.c
>>> @@ -27,6 +27,13 @@
>>> ((addr) >= vmsix_table_addr(vpci, nr) &&
On Tue, Mar 14, 2023 at 03:59:22PM +0100, Jan Beulich wrote:
> On 14.03.2023 15:45, Roger Pau Monne wrote:
> > Slightly change the meaning of the command line
> > gnttab_max_{maptrack_,}frames: do not use them as upper bounds for the
> > passed values at domain creation, instead just use them as de
On 14.03.2023 15:53, Denis wrote:
> On 14.03.2023 07:37; Jan Beulich wrote:
>> On 14.03.2023 02:15, Denis wrote:
>>> On 13.03.2023 10:36, Jan wrote
On 10.03.2023 21:50, Denis wrote:
> Should I test something else?
... there was no request for any further testing here, for the mom
On 14.03.2023 15:27, Michal Orzel wrote:
> At the moment, we direct serial input to hardware domain by default.
> This does not make any sense when running in true dom0less mode, since
> such domain does not exist. As a result, users wishing to write to
> an emulated UART of a domU are always force
flight 179625 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/179625/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 961792c9d61f7e03e0c1b6b9f93b8b306df94bf9
baseline version:
ovmf a1386bb252066262c0b66
On 13.03.23 20:57, Jason Andryuk wrote:
Don't use the LOG*D macros. They expect a domid, but "domain" here is
the PCI domain. Hence it is inappropriate for this use.
Make the write error messages uniform with LOGE. errno has the
interesting information while rc is just -1. Drop printing rc a
On 14/03/2023 2:53 pm, Denis wrote:
> On 14.03.2023 07:37; Jan Beulich wrote:
>> On 14.03.2023 02:15, Denis wrote:
>>> On 13.03.2023 10:36, Jan wrote
On 10.03.2023 21:50, Denis wrote:
> Should I test something else?
... there was no request for any further testing here, for the moment
On 14.03.2023 15:45, Roger Pau Monne wrote:
> Slightly change the meaning of the command line
> gnttab_max_{maptrack_,}frames: do not use them as upper bounds for the
> passed values at domain creation, instead just use them as defaults
> in the absence of any provided value.
>
> It's not very use
On 14.03.2023 07:37; Jan Beulich wrote:
> On 14.03.2023 02:15, Denis wrote:
> > On 13.03.2023 10:36, Jan wrote
> >> On 10.03.2023 21:50, Denis wrote:
> >>> Should I test something else?
> >>
> >> ... there was no request for any further testing here, for the moment.
> >
> > ah...sorry, going by "Wo
On 14/03/2023 2:15 pm, Andrew Cooper wrote:
> diff --git a/tools/pygrub/Makefile b/tools/pygrub/Makefile
> index 29ad0513212f..04b3995cc0f6 100644
> --- a/tools/pygrub/Makefile
> +++ b/tools/pygrub/Makefile
> @@ -7,7 +7,7 @@ PY_LDFLAGS = $(SHLIB_LDFLAGS) $(APPEND_LDFLAGS)
> INSTALL_LOG = build/ins
Slightly change the meaning of the command line
gnttab_max_{maptrack_,}frames: do not use them as upper bounds for the
passed values at domain creation, instead just use them as defaults
in the absence of any provided value.
It's not very useful for the options to be used both as defaults and
as c
On 14.03.23 15:33, Jan Beulich wrote:
On 14.03.2023 15:27, Juergen Gross wrote:
V2:
- add const, use unsigned int for loop counters (Roger Pau Monné)
Hmm, ...
--- a/drivers/block/xen-blkback/blkback.c
+++ b/drivers/block/xen-blkback/blkback.c
@@ -1072,7 +1072,111 @@ static void end_block_io_
On 14/03/2023 14:21, Chuck Zmudzinski wrote:
On 3/14/2023 9:41 AM, Mark Cave-Ayland wrote:
On 14/03/2023 13:26, Chuck Zmudzinski wrote:
On 3/14/2023 9:17 AM, Michael S. Tsirkin wrote:
On Tue, Mar 14, 2023 at 12:43:12PM +, Mark Cave-Ayland wrote:
On 14/03/2023 06:33, Michael S. Tsirkin w
flight 179609 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/179609/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 14 guest-start fail REGR. vs. 179518
test-amd64-i386-l
On 14.03.2023 15:27, Juergen Gross wrote:
> V2:
> - add const, use unsigned int for loop counters (Roger Pau Monné)
Hmm, ...
> --- a/drivers/block/xen-blkback/blkback.c
> +++ b/drivers/block/xen-blkback/blkback.c
> @@ -1072,7 +1072,111 @@ static void end_block_io_op(struct bio *bio)
> bio_p
There is no need to have the functions blkif_get_x86_32_req() and
blkif_get_x86_64_req() in a header file, as they are used in one place
only.
So move them into the using source file and drop the inline qualifier.
While at it fix some style issues, and simplify the code by variable
reusing and us
The interface of free_persistent_gnts() can be simplified, as there is
only a single caller of free_persistent_gnts() and the 2nd and 3rd
parameters are easily obtainable via the ring pointer, which is passed
as the first parameter anyway.
Signed-off-by: Juergen Gross
Acked-by: Roger Pau Monné
-
At the moment, we direct serial input to hardware domain by default.
This does not make any sense when running in true dom0less mode, since
such domain does not exist. As a result, users wishing to write to
an emulated UART of a domU are always forced to execute CTRL-AAA first.
The same issue is wh
There is no function xen_blkif_purge_persistent(), so remove its
prototype from common.h.
Signed-off-by: Juergen Gross
Acked-by: Roger Pau Monné
---
drivers/block/xen-blkback/common.h | 1 -
1 file changed, 1 deletion(-)
diff --git a/drivers/block/xen-blkback/common.h
b/drivers/block/xen-blkb
Signed-off-by: Juergen Gross
Acked-by: Roger Pau Monné
---
drivers/block/xen-blkback/blkback.c | 2 +-
drivers/block/xen-blkback/common.h | 6 +++---
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/block/xen-blkback/blkback.c
b/drivers/block/xen-blkback/blkback.c
index a
Some small cleanup patches I had lying around for some time now.
Juergen Gross (4):
xen/blkback: fix white space code style issues
xen/blkback: remove stale prototype
xen/blkback: simplify free_persistent_gnts() interface
xen/blkback: move blkif_get_x86_*_req() into blkback.c
drivers/blo
On 3/14/2023 9:41 AM, Mark Cave-Ayland wrote:
> On 14/03/2023 13:26, Chuck Zmudzinski wrote:
>
> > On 3/14/2023 9:17 AM, Michael S. Tsirkin wrote:
> >> On Tue, Mar 14, 2023 at 12:43:12PM +, Mark Cave-Ayland wrote:
> >>> On 14/03/2023 06:33, Michael S. Tsirkin wrote:
> >>>
> On Tue, Mar 14,
On Tue, Mar 14, 2023 at 10:11 AM Jan Beulich wrote:
>
> On 14.03.2023 14:20, Jason Andryuk wrote:
> > This patch should have had v2 in the subject (it has a v2 change log).
> > The next one will have v3.
>
> Will it? I've committed it earlier today ...
Not any more! Thank you. I had not checke
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Wei Liu
CC: Anthony PERARD
CC: Marek Marczykowski-Górecki
CC: Bernhard Kaindl
---
tools/misc/xencov_split| 1 -
tools/pygrub/src/ExtLinuxConf.py | 2 +-
tools/pygrub/src/GrubConf.py | 30 ++---
tools/pygrub/s
* Add X86_{CPUID,MSR}_POLICY_FORMAT checks which were missed previously.
* Drop test_suite(). It hasn't been necessary since the Py2.3 era.
* Drop the __main__ logic. This can't be used without manually adjusting the
include path, and `make test` knows how to do the right thing.
* For `mak
These aren't runable scripts, so shouldn't have shebangs.
Signed-off-by: Andrew Cooper
---
CC: Wei Liu
CC: Anthony PERARD
CC: Marek Marczykowski-Górecki
CC: Bernhard Kaindl
---
tools/python/xen/migration/legacy.py | 1 -
tools/python/xen/migration/libxc.py | 1 -
tools/python/xen/migration/
... to mirror the tools/python side in c/s 2b8314a3c354.
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Wei Liu
CC: Anthony PERARD
CC: Marek Marczykowski-Górecki
CC: Bernhard Kaindl
---
tools/pygrub/Makefile | 11 ++-
1 file changed, 6 insertions(+), 5 deletions(-)
diff
This is a python script which has it's shebang modified by be python3, but
was never converted to be python3 compatible.
The most recent reference I can find to this script (which isn't incidental
adjustments in the makefile) is from the Xen book, fileish 561e30b80402 which
says
%% Alternativ
This was added in 2004 in c/s b7d4a69f0ccb5 and has never been referenced
since. Given the the commit message of simply "Added .", it was quite
possibly a mistake in the first place.
Signed-off-by: Andrew Cooper
---
CC: Wei Liu
CC: Anthony PERARD
CC: Marek Marczykowski-Górecki
CC: Bernhard Ka
Despite previous statements to the contrary, Xen still does not support Python
3.
Various notes are on https://gitlab.com/xen-project/xen/-/issues/114
The following scripts are installed, and given a python3 shebang, but are not
Py3 compatible:
xencov_split
xentrace_format
xencons
xenpv
This is mandated by the Fedora packaging guidelines because it is a security
vulnerability otherwise in suid scripts. It's a very good idea generally,
because it prevents the users local python environment interfering from system
packaged scripts.
Signed-off-by: Andrew Cooper
---
CC: Wei Liu
CC
On 14.03.2023 14:20, Jason Andryuk wrote:
> On Tue, Mar 14, 2023 at 2:42 AM Jan Beulich wrote:
>>
>> On 13.03.2023 22:11, dpsmith.dev wrote:
>>> On 3/13/23 15:14, Jason Andryuk wrote:
On Mon, Mar 13, 2023 at 2:49 PM Daniel P. Smith
wrote:
> On 3/13/23 13:50, Jason Andryuk wrote:
>>>
On 3/14/2023 9:41 AM, Mark Cave-Ayland wrote:
> On 14/03/2023 13:26, Chuck Zmudzinski wrote:
>
> > On 3/14/2023 9:17 AM, Michael S. Tsirkin wrote:
> >> On Tue, Mar 14, 2023 at 12:43:12PM +, Mark Cave-Ayland wrote:
> >>> On 14/03/2023 06:33, Michael S. Tsirkin wrote:
> >>>
> On Tue, Mar 14,
13.03.2023, 19:15, "Jan Beulich" :On 11.03.2023 15:50, Tamas K Lengyel wrote: On Fri, Mar 10, 2023 at 10:57 PM Dmitry Isaykin --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -4579,6 +4579,8 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs)
On Fri, Dec 16, 2022 at 03:58:12PM +0100, Juergen Gross wrote:
> Some small cleanup patches I had lying around for some time now.
>
> Juergen Gross (4):
> xen/blkback: fix white space code style issues
> xen/blkback: remove stale prototype
> xen/blkback: simplify free_persistent_gnts() inter
On Fri, Dec 16, 2022 at 03:58:16PM +0100, Juergen Gross wrote:
> There is no need to have the functions blkif_get_x86_32_req() and
> blkif_get_x86_64_req() in a header file, as they are used in one place
> only.
>
> So move them into the using source file and drop the inline qualifier.
>
> While
13.03.2023, 15:33, "Andrew Cooper" :On 11/03/2023 3:57 am, Dmitry Isaykin wrote: Adds monitor support for I/O instructions. Signed-off-by: Dmitry Isaykin Signed-off-by: Anton Belousov Thankyou for the patch. A couple of questions.Right now, yo
On Tue, Mar 14, 2023 at 12:56:33PM +0100, Jan Beulich wrote:
> On 14.03.2023 11:13, Roger Pau Monne wrote:
> > --- a/xen/drivers/vpci/msix.c
> > +++ b/xen/drivers/vpci/msix.c
> > @@ -27,6 +27,13 @@
> > ((addr) >= vmsix_table_addr(vpci, nr) && \
> > (addr) < v
On 14/03/2023 13:26, Chuck Zmudzinski wrote:
On 3/14/2023 9:17 AM, Michael S. Tsirkin wrote:
On Tue, Mar 14, 2023 at 12:43:12PM +, Mark Cave-Ayland wrote:
On 14/03/2023 06:33, Michael S. Tsirkin wrote:
On Tue, Mar 14, 2023 at 12:01:09AM -0400, Chuck Zmudzinski wrote:
Commit 4f67543bb8c5
On 14.03.23 13:52, osstest service owner wrote:
flight 179607 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/179607/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-freebsd12-amd64 13 guest-start
On 3/14/2023 9:17 AM, Michael S. Tsirkin wrote:
> On Tue, Mar 14, 2023 at 12:43:12PM +, Mark Cave-Ayland wrote:
> > On 14/03/2023 06:33, Michael S. Tsirkin wrote:
> >
> > > On Tue, Mar 14, 2023 at 12:01:09AM -0400, Chuck Zmudzinski wrote:
> > > > Commit 4f67543bb8c5 ("xen/pt: reserve PCI slot
On Tue, Mar 14, 2023 at 2:42 AM Jan Beulich wrote:
>
> On 13.03.2023 22:11, dpsmith.dev wrote:
> > On 3/13/23 15:14, Jason Andryuk wrote:
> >> On Mon, Mar 13, 2023 at 2:49 PM Daniel P. Smith
> >> wrote:
> >>> On 3/13/23 13:50, Jason Andryuk wrote:
> usage(argCnt, argv);
>
On Tue, Mar 14, 2023 at 12:43:12PM +, Mark Cave-Ayland wrote:
> On 14/03/2023 06:33, Michael S. Tsirkin wrote:
>
> > On Tue, Mar 14, 2023 at 12:01:09AM -0400, Chuck Zmudzinski wrote:
> > > Commit 4f67543bb8c5 ("xen/pt: reserve PCI slot 2 for Intel igd-passthru")
> > > uses slot_reserved_mask t
On Tue, Mar 14, 2023 at 08:33:02AM -0400, Chuck Zmudzinski wrote:
> On 3/14/2023 2:33 AM, Michael S. Tsirkin wrote:
> > On Tue, Mar 14, 2023 at 12:01:09AM -0400, Chuck Zmudzinski wrote:
> > > Commit 4f67543bb8c5 ("xen/pt: reserve PCI slot 2 for Intel igd-passthru")
> > > uses slot_reserved_mask to
flight 179607 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/179607/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-freebsd12-amd64 13 guest-start fail REGR. vs. 178042
test-amd64-amd64-xl
On 14/03/2023 06:33, Michael S. Tsirkin wrote:
On Tue, Mar 14, 2023 at 12:01:09AM -0400, Chuck Zmudzinski wrote:
Commit 4f67543bb8c5 ("xen/pt: reserve PCI slot 2 for Intel igd-passthru")
uses slot_reserved_mask to reserve slot 2 for the Intel IGD for the
xenfv machine when the guest is configur
On 3/14/2023 2:33 AM, Michael S. Tsirkin wrote:
> On Tue, Mar 14, 2023 at 12:01:09AM -0400, Chuck Zmudzinski wrote:
> > Commit 4f67543bb8c5 ("xen/pt: reserve PCI slot 2 for Intel igd-passthru")
> > uses slot_reserved_mask to reserve slot 2 for the Intel IGD for the
> > xenfv machine when the guest
On 09.01.23 16:05, Juergen Gross wrote:
On 16.12.22 15:58, Juergen Gross wrote:
Some small cleanup patches I had lying around for some time now.
Juergen Gross (4):
xen/blkback: fix white space code style issues
xen/blkback: remove stale prototype
xen/blkback: simplify free_persistent_g
Hi Andrew,
On Tue, Mar 14, 2023 at 11:41:08AM +, Andrew Cooper wrote:
On 14/03/2023 11:23 am, Juergen Gross wrote:
> On 14.03.23 12:17, Joost Roeleveld wrote:
>>> On Mon, Oct 24, 2022 at 05:28:05PM +, Andrew Cooper wrote:
I don't know exactly how this translates to Linux internals,
1 - 100 of 122 matches
Mail list logo