>>> On 12.03.18 at 16:00, wrote:
> Patch ping. Jan, I would like to touch base once more to see if we can
> get this patch included in 4.11. The patch as-is correctly tells the
> difference between buffers provided by both an EFI shell or by the
> firmware as an EFI_LOAD_OPTION.
Well, I've stated
>>> On 13.03.18 at 05:43, wrote:
> The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
> uninitialized in main_vdisplattach().
>
> Signed-off-by: Doug Goldstein
> ---
> CC: Oleksandr Grytsov
> ---
> tools/xl/xl_vdispl.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-
>>> On 12.03.18 at 14:10, wrote:
> BTW: are you already working on rebasing your XPTI speed up series to
> current staging? I'd like my series to use your series as a base unless
> you are telling me you won't be able to resend your series soon.
Coming back to my reply here yesterday - then again
flight 120486 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120486/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 10 redhat-install fail REGR. vs. 120276
test-amd64-i386-xl-q
flight 120496 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120496/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 120326
test-armhf-armhf-libvirt 14 saveresto
The subject line says to expect 30 patches, but you've only sent 18 to
the list here. I eventually figured out that the first 12 patches were
in Xen code and so not sent to qemu-devel.
For future if you have changes that affect multiple completely separate
projects, send them as separate series. i
On Tue, Mar 13, 2018 at 04:34:01AM +1000, Alexey Gerasimenko wrote:
> Current Xen/QEMU method to control Xen Platform device on i440 is a bit
> odd -- enabling/disabling Xen platform device actually modifies the QEMU
> emulated machine type, namely xenfv <--> pc.
>
> In order to avoid multiplying
>>> On 11.03.18 at 16:26, wrote:
>> -Original Message-
>> From: George Dunlap [mailto:george.dun...@citrix.com]
>> Sent: 09 March 2018 18:04
>> To: xen-devel@lists.xenproject.org
>> Cc: George Dunlap ; Ian Jackson
>> ; Wei Liu ; Andrew Cooper
>> ; Jan Beulich ; Tim
>> (Xen.org) ; Konrad
On 13/03/18 09:07, Jan Beulich wrote:
On 12.03.18 at 14:10, wrote:
>> BTW: are you already working on rebasing your XPTI speed up series to
>> current staging? I'd like my series to use your series as a base unless
>> you are telling me you won't be able to resend your series soon.
>
> Comin
On Mon, Mar 12, 2018 at 11:06:51PM -0500, Doug Goldstein wrote:
> When building debug use -Og as the optimization level if its available,
> otherwise retain the use of -O0. -Og has been added by GCC to enable all
> optimizations that to not affect debugging while retaining full
> debugability.
>
>
On 12/03/18 19:35, Michael Young wrote:
Here is version 4 of the patch where I have replaced the uses of s with b
where the patch changes it from string to bytes. I have also removed the
two trailing spaces and changed stmp back to s.
Michael Young
0001-make-xen-ocaml-safe-strings-compliant
>>> On 12.03.18 at 13:09, wrote:
> On 03/11/2018 08:29 PM, Stefano Stabellini wrote:
>> On Fri, 9 Mar 2018, George Dunlap wrote:
>>> All this information is now covered in SUPPORT.md.
>>>
>>> Most of the emulated hardware is obvious a couple of the items are
>>> worth pointing out specifically.
>>
>>> On 09.03.18 at 19:03, wrote:
> QEMU supports various image formats, but we only provide security
> support for raw, qcow, qcow2, and vhd formats.
>
> Rather than duplicate this information under the "x86/Emulated
> storage" section, just refer to the "Blkback" section.
>
> Signed-off-by: Geo
>>> On 13.03.18 at 10:27, wrote:
> On 13/03/18 09:07, Jan Beulich wrote:
> On 12.03.18 at 14:10, wrote:
>>> BTW: are you already working on rebasing your XPTI speed up series to
>>> current staging? I'd like my series to use your series as a base unless
>>> you are telling me you won't be abl
On 13/03/18 10:35, Jan Beulich wrote:
On 13.03.18 at 10:27, wrote:
>> On 13/03/18 09:07, Jan Beulich wrote:
>> On 12.03.18 at 14:10, wrote:
BTW: are you already working on rebasing your XPTI speed up series to
current staging? I'd like my series to use your series as a base unl
flight 120487 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120487/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-amd 10 redhat-install fail REGR. vs. 120260
Tests which did not s
The respective MSRs are write-only, and hence attempts by guests to
write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong
impression of WRMSR succeeding") no longer ignored. Restore original
behavior for the two affected MSRs.
Signed-off-by: Jan Beulich
---
While what is being log
flight 120514 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120514/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539
Tests which are failing
>>> On 13.03.18 at 10:48, wrote:
> On 13/03/18 10:35, Jan Beulich wrote:
> On 13.03.18 at 10:27, wrote:
>>> On 13/03/18 09:07, Jan Beulich wrote:
>>> On 12.03.18 at 14:10, wrote:
> BTW: are you already working on rebasing your XPTI speed up series to
> current staging? I'd like m
On 13/03/2018 10:22, Jan Beulich wrote:
On 13.03.18 at 10:48, wrote:
>> On 13/03/18 10:35, Jan Beulich wrote:
>> On 13.03.18 at 10:27, wrote:
On 13/03/18 09:07, Jan Beulich wrote:
On 12.03.18 at 14:10, wrote:
>> BTW: are you already working on rebasing your XPTI speed
On Mon, Mar 05, 2018 at 08:43:48AM -0600, Doug Goldstein wrote:
> On 3/2/18 5:29 AM, Jan Beulich wrote:
> On 02.03.18 at 12:09, wrote:
> >> On Thu, Mar 01, 2018 at 05:01:55PM +, Roger Pau Monné wrote:
> >>> On Thu, Mar 01, 2018 at 04:01:23PM +, Wei Liu wrote:
> On Thu, Mar 01, 20
On Tue, Mar 13, 2018 at 10:03 AM, Jan Beulich wrote:
> >>> On 13.03.18 at 05:43, wrote:
> > The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
> > uninitialized in main_vdisplattach().
> >
> > Signed-off-by: Doug Goldstein
> > ---
> > CC: Oleksandr Grytsov
> > ---
> > too
On 13/03/2018 10:13, Jan Beulich wrote:
> The respective MSRs are write-only, and hence attempts by guests to
> write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong
> impression of WRMSR succeeding") no longer ignored. Restore original
> behavior for the two affected MSRs.
>
> Sign
flight 120480 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120480/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale broken
test-amd64-amd64-qemuu-nested-intel 14 x
On Fri, Mar 02, 2018 at 12:54:29PM -0800, Maran Wilson wrote:
> The start info structure that is defined as part of the x86/HVM direct boot
> ABI and used for starting Xen PVH guests would be more versatile if it also
> included a way to pass information about the memory map to the guest. This
> wo
On Tue, Mar 06, 2018 at 03:56:58PM +, Ian Jackson wrote:
> Roger Pau Monné writes ("Re: [PATCH] libxl/pvh: force PVH guests to use the
> xenstore shutdown"):
> > On Tue, Dec 19, 2017 at 02:48:47PM +, Ian Jackson wrote:
> > > I think this is a candidate for backporting as far as 4.9 ?
> >
On 03/13/2018 04:43 AM, Doug Goldstein wrote:
> The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
> uninitialized in main_vdisplattach().
>
> Signed-off-by: Doug Goldstein
It looks like that was designed on purpose to use the uninitialized
warnings to catch paths where the
Handle a new parameter of an existing QMP command. See patch 2 (libxl_qmp: Tell
QEMU about live migration or snapshot) for more information.
Anthony PERARD (2):
libxl: Add a version check of QEMU for QMP commands
libxl_qmp: Tell QEMU about live migration or snapshot
tools/libxl/libxl_dom_sav
Since version 2.10, QEMU will lock the disk images so a second QEMU
instance will not try to open it. This would prevent live migration from
working correctly. A new parameter as been added to the QMP command
"xen-save-devices-state" in QEMU version 2.11 which allow to unlock the
disk image for a l
On connection to QEMU via QMP, the version of QEMU is provided, store it
for later use.
Add a function qmp_qemu_check_version that can be used to check if QEMU
is new enough for certain fonctionnality. This will be used in a moment.
As it's a static function, it is commented out until first use,
On Tue, 13 Mar 2018 09:21:54 +
Daniel P. Berrangé wrote:
>The subject line says to expect 30 patches, but you've only sent 18 to
>the list here. I eventually figured out that the first 12 patches were
>in Xen code and so not sent to qemu-devel.
>
>For future if you have changes that affect mu
On Tue, Mar 13, 2018 at 09:37:55PM +1000, Alexey G wrote:
> On Tue, 13 Mar 2018 09:21:54 +
> Daniel P. Berrangé wrote:
>
> >The subject line says to expect 30 patches, but you've only sent 18 to
> >the list here. I eventually figured out that the first 12 patches were
> >in Xen code and so no
Hi,
On 03/12/2018 08:26 AM, Oleksandr Andrushchenko wrote:
On 03/11/2018 10:15 AM, Takashi Iwai wrote:
Hi,
sorry for the long latency.
Hi, no problem, thank you
On Wed, 07 Mar 2018 09:49:24 +0100,
Oleksandr Andrushchenko wrote:
Suppose that we negotiate from the frontend to the backend lik
>>> On 13.03.18 at 11:36, wrote:
> On 13/03/2018 10:13, Jan Beulich wrote:
>> The respective MSRs are write-only, and hence attempts by guests to
>> write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong
>> impression of WRMSR succeeding") no longer ignored. Restore original
>> beha
branch xen-unstable
xenbranch xen-unstable
job build-amd64-rumprun
testid rumprun-build
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: rumprun https://github.com/rumpkernel/rumprun
Tree: rumprun_buildrumpsh https://github.com/rumpkern
On Mon, Mar 12, 2018 at 04:45:51PM +0100, Olaf Hering wrote:
> The usage of DEBUG_DIR breaks OVMF build. Rename it to XEN_DEBUG_DIR.
>
> The default DEBUG_DIR=/usr/lib/debug can not be used for rpm builds
> because that directory is "owned" by rpm-packaging itself to store the
> autogenerated ${pk
On Fri, Mar 09, 2018 at 01:18:39PM +, Andrew Cooper wrote:
> Neither domcr_flags nor config are used on either side. Drop them, making
> {hvm,pv}_domain_initialise() symmetric with all the other domain/vcpu
> initialise/destroy calls.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau
Am Tue, 13 Mar 2018 11:56:51 +
schrieb Roger Pau Monné :
> Do you think that would solve your issues?
This will most likely work, yes. Thanks.
Olaf
pgpOkexrAA35u.pgp
Description: Digitale Signatur von OpenPGP
___
Xen-devel mailing list
Xen-devel@
Hi,
Manish, I don't monitor my linaro email and would appreciate if you use
the e-mail address provided by MAINTAINERS.
Cheers,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
This patchset is a Xen port of Marc's patchset.
arm64: KVM: Mediate access to GICv3 sysreg
Hi,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Rename the menu text to Errata Workarounds. Subsequent patches will
add config options for SoC specific erratas.
Well, your SoC is an Arm SoC, right? So what is the benefits of this new
name? More that it still depen
Hi,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Add MIDR values for Cavium ThunderX1 SoC's (88xx, 81xx, 83xx).
Signed-off-by: Manish Jaggi
---
xen/include/asm-arm/processor.h | 9 +
1 file changed, 9 insertions(+)
diff --git a/xen/include/asm-arm/proces
On Fri, Mar 09, 2018 at 01:18:40PM +, Andrew Cooper wrote:
> The only relevent initialisation for the idle domain is the context switch and
^ relevant
> poisoned pointers. Collect these bits together early in the function and exit
> when complete (although as a consequence, the e820
Hi,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Some Cavium Thunder CPUs suffer a problem where a KVM guest may
inadvertently cause the host kernel to quit receiving interrupts.
This patch adds CONFIG_CAVIUM_ERRATUM_30115. Subsequent patches will
provide workaround.
Hi,
title: "arm64: ...".
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Enable trapping for Group1 register access when
CONFIG_CAVIUM_ERRATUM_30115 is enabled.
This is really odd to enable group1 trapping before the sysreg are
actually emulated. This will be impossi
On Fri, Mar 09, 2018 at 01:18:42PM +, Andrew Cooper wrote:
> The share_xen_page_with_guest() functions are used by common code, and are
> implemented the same by each arch. Move the declarations into the common mm.h
> rather than duplicating them in each arch/mm.h
>
> Turn an int readonly int
On 13/03/18 12:34, Sander Eikelenboom wrote:
> On 12/03/18 21:04, Boris Ostrovsky wrote:
>> On 03/12/2018 03:05 PM, Andrew Cooper wrote:
>>> On 10/03/18 16:27, Andrew Cooper wrote:
On 10/03/2018 16:14, Sander Eikelenboom wrote:
> Hi Andrew,
>
> It seems commit "x86/pv: Drop int80_b
flight 120538 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120538/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-ws16-amd64 10 windows-install fail REGR. vs. 12
test-amd64-amd6
From: Oleksandr Andrushchenko
Introduce skeleton of the para-virtualized Xen display
frontend driver. This patch only adds required
essential stubs.
Signed-off-by: Oleksandr Andrushchenko
---
drivers/gpu/drm/Kconfig | 2 ++
drivers/gpu/drm/Makefile| 1 +
drivers/gpu/d
From: Oleksandr Andrushchenko
Provide kernel documentation for the Xen para-virtualized
frontend DRM driver.
Signed-off-by: Oleksandr Andrushchenko
---
Documentation/gpu/index.rst | 1 +
Documentation/gpu/xen-front.rst | 77 +
2 files changed, 78 in
From: Oleksandr Andrushchenko
Handle Xen event channels:
- create for all configured connectors and publish
corresponding ring references and event channels in Xen store,
so backend can connect
- implement event channels interrupt handlers
- create and destroy event channels with re
From: Oleksandr Andrushchenko
Implement shared buffer handling according to the
para-virtualized display device protocol at xen/interface/io/displif.h:
- handle page directories according to displif protocol:
- allocate and share page directories
- grant references to the required set o
From: Oleksandr Andrushchenko
Initial handling for Xen bus states: implement
Xen bus state machine for the frontend driver according to
the state diagram and recovery flow from display para-virtualized
protocol: xen/interface/io/displif.h.
Signed-off-by: Oleksandr Andrushchenko
---
drivers/gpu
From: Oleksandr Andrushchenko
Implement essential initialization of the display driver:
- introduce required data structures
- handle DRM/KMS driver registration
- register driver on backend connection
- remove driver on backend disconnect
Implement kernel modesetiing/connector handling
From: Oleksandr Andrushchenko
Implement GEM handling depending on driver mode of operation:
depending on the requirements for the para-virtualized environment, namely
requirements dictated by the accompanying DRM/(v)GPU drivers running in both
host and guest environments, number of operating mode
From: Oleksandr Andrushchenko
Hello!
This patch series adds support for Xen [1] para-virtualized
frontend display driver. It implements the protocol from
include/xen/interface/io/displif.h [2].
Accompanying backend [3] is implemented as a user-space application
and its helper library [4], capabl
From: Oleksandr Andrushchenko
Read configuration values from Xen store according
to xen/interface/io/displif.h protocol:
- read connector(s) configuration
- read buffer allocation mode (backend/frontend)
Signed-off-by: Oleksandr Andrushchenko
---
drivers/gpu/drm/xen/Makefile|
1: NOP out most XPTI entry/exit code when it's not in use
2: disable XPTI when RDCL_NO
3: x86: log XPTI enabled status
4: use %r12 to write zero into xen_cr3
5: reduce .text.entry
6: avoid double CR3 reload when switching to guest user mode
Signed-off-by: Jan Beulich
__
Introduce a synthetic feature flag to use alternative instruction
patching to NOP out all code on entry/exit paths. Having NOPs here is
generally better than using conditional branches.
Also change the limit on the number of bytes we can patch in one go to
that resulting from the encoding in struc
Use the respective ARCH_CAPABILITIES MSR bit, but don't expose the MSR
to guests yet.
Signed-off-by: Jan Beulich
Tested-by: Juergen Gross
Reviewed-by: Juergen Gross
---
v3: Re-base.
v2: New.
--- a/tools/libxl/libxl_cpuid.c
+++ b/tools/libxl/libxl_cpuid.c
@@ -204,6 +204,7 @@ int libxl_cpuid_par
At the same time also report the state of the two defined
ARCH_CAPABILITIES MSR bits. To avoid further complicating the
conditional around that printk(), drop it (it's a debug level one only
anyway).
Signed-off-by: Jan Beulich
Tested-by: Juergen Gross
Reviewed-by: Juergen Gross
---
v2: Re-base
Now that we zero all registers early on all entry paths, use that to
avoid a couple of immediates here.
Signed-off-by: Jan Beulich
---
We may want to consider eliminating a few more $0 this way. But
especially for byte ones I'm not sure it's worth it, due to the REX
prefix the use of %r12 would i
This exposes less code pieces and at the same time reduces the range
covered from slightly above 3 pages to a little below 2 of them.
The code being moved is unchanged, except for the removal of trailing
blanks, insertion of blanks between operands, and a pointless q suffix
from "retq".
A few mor
When XPTI is active, the CR3 load in restore_all_guest is sufficient
when switching to user mode, improving in particular system call and
page fault exit paths for the guest.
Signed-off-by: Jan Beulich
Tested-by: Juergen Gross
Reviewed-by: Juergen Gross
---
v2: Add ASSERT(!in_irq()).
--- a/xen
1: remove page.h and processor.h inclusion from asm_defns.h
2: x86: fix OLDINSTR_2()
3: use PDEP for PTE flags insertion when available
4: use PDEP/PEXT for maddr/direct-map-offset conversion when available
5: use PDEP/PEXT for PFN/PDX conversion when available
6: use MOV for PFN/PDX conversion whe
On Tue, Feb 27, 2018 at 01:28:08PM -0800, Stefano Stabellini wrote:
> Add pvcalls support to libxl and xl. Create the appropriate pvcalls
> entries in xenstore.
>
> Signed-off-by: Stefano Stabellini
The code looks fine.
I only want to have a second opinion on
> @@ -829,6 +835,7 @@ libxl_domain
Its as_max() invocation was wrongly parenthesized.
Signed-off-by: Jan Beulich
---
v3: New.
--- a/xen/include/asm-x86/alternative.h
+++ b/xen/include/asm-x86/alternative.h
@@ -54,8 +54,8 @@ extern void alternative_instructions(voi
#define OLDINSTR_2(oldinstr, n1, n2)
Subsequent changes require this (too wide anyway imo) dependency to be
dropped.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/boot/head.S
+++ b/xen/arch/x86/boot/head.S
@@ -5,6 +5,7 @@
#include
#include
#include
+#include
#include
#include
#include
--- a/xen/arch/x86/x86_64/compat/e
This allows to fold 5 instructions into a single one, reducing code size
quite a bit, especially when not considering the fallback functions
(which won't ever need to be brought into iCache or their mappings into
iTLB on systems supporting BMI2).
Make use of gcc's new V operand modifier, even if t
Both replace 6 instructions by a single one, further reducing code size,
cache, and TLB footprint (in particular on systems supporting BMI2).
Signed-off-by: Jan Beulich
---
v2: Avoid quoted symbols; use gcc's new V operand modifier instead.
Re-base.
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86
On Tue, Mar 13, 2018 at 10:31:20AM +, Roger Pau Monné wrote:
> On Mon, Mar 05, 2018 at 08:43:48AM -0600, Doug Goldstein wrote:
> > On 3/2/18 5:29 AM, Jan Beulich wrote:
> > On 02.03.18 at 12:09, wrote:
> > >> On Thu, Mar 01, 2018 at 05:01:55PM +, Roger Pau Monné wrote:
> > >>> On Thu,
... and (of course) also maddr / direct-map-offset ones.
Most x86 systems don't actually require the use of PDX compression. Now
that we have patching for the conversion code in place anyway, extend it
to use simple MOV when possible. Introduce a new pseudo-CPU-feature to
key the patching off of.
Both replace 6 instructions by a single one, further reducing code size,
cache, and TLB footprint (in particular on systems supporting BMI2).
Signed-off-by: Jan Beulich
---
v2: Avoid quoted symbols; use gcc's new V operand modifier instead.
Re-base.
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86
On Tue, Mar 13, 2018 at 10:56:35AM +, George Dunlap wrote:
> On 03/13/2018 04:43 AM, Doug Goldstein wrote:
> > The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
> > uninitialized in main_vdisplattach().
> >
> > Signed-off-by: Doug Goldstein
>
> It looks like that was de
Hi Manish,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Since this is a SoC errata and trapping of certain group1 registers
should not affect the normal flow. A new file vsysreg_errata.c is added.
Function vgic_v3_handle_cpuif_access is called from do_trap_guest_sync
On Mon, Mar 05, 2018 at 11:36:58AM +, Ian Jackson wrote:
> Roger Pau Monne writes ("[PATCH] xl: remove apic option for PVH guests"):
> > XSA-256 forces the local APIC to always be enabled for PVH guests, so
> > ignore any apic option for PVH guests. Update the documentation
> > accordingly.
> .
flight 120679 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120679/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
gicv3_ich_read/write_lr functions are duplicated in vsysreg_errata.c
Please explain the rationale. I.e we want to have the workaround standalone.
Cheers,
Signed-off-by: Manish Jaggi
---
xen/arch/arm/arm64/vsysreg_
On Tue, Mar 13, 2018 at 2:13 PM, Wei Liu wrote:
> On Tue, Feb 27, 2018 at 01:28:08PM -0800, Stefano Stabellini wrote:
>> Add pvcalls support to libxl and xl. Create the appropriate pvcalls
>> entries in xenstore.
>>
>> Signed-off-by: Stefano Stabellini
>
> The code looks fine.
>
> I only want to
On 3/13/18 3:03 AM, Jan Beulich wrote:
On 13.03.18 at 05:43, wrote:
>> The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
>> uninitialized in main_vdisplattach().
>>
>> Signed-off-by: Doug Goldstein
>> ---
>> CC: Oleksandr Grytsov
>> ---
>> tools/xl/xl_vdispl.c | 2 +-
>>> On 13.03.18 at 13:28, wrote:
> On Fri, Mar 09, 2018 at 01:18:42PM +, Andrew Cooper wrote:
>> --- a/xen/arch/arm/mm.c
>> +++ b/xen/arch/arm/mm.c
>> @@ -1187,8 +1187,8 @@ unsigned long domain_get_maximum_gpfn(struct domain *d)
>> return gfn_x(d->arch.p2m.max_mapped_gfn);
>> }
>>
>> -
Hi,
I got duplicated e-mails on my inbox for this series. Each version have
a different series and all in the same threading.
I have no idea which emails to answer properly. So please do a proper
resend of this series and this time with my correct e-mail address.
Cheers,
On 12/03/18 07:49,
Hi,
On 12/03/18 16:32, Wei Liu wrote:
On Sun, Mar 11, 2018 at 07:59:16PM +, Julien Grall wrote:
Hi Andrew,
On 03/09/2018 01:18 PM, Andrew Cooper wrote:
ARM guests are HVM and have hardware assisted paging. There are no PV guests
or shadow paging, and all other creation flags are x86 spec
Hi Doug,
On 13/03/18 03:31, Doug Goldstein wrote:
+# work around https://github.com/moby/moby/issues/10180
+# and install Xen depends
+RUN rpm --rebuilddb && \
+yum -y install \
+yum-plugin-ovl \
+gcc \
+gcc-c++ \
+ncurses-devel \
+zlib-devel \
+
On 03/13/2018 08:09 PM, Julien Grall wrote:
Hi,
I got duplicated e-mails on my inbox for this series. Each version
have a different series and all in the same threading.
I have no idea which emails to answer properly. So please do a proper
resend of this series and this time with my correc
>>> On 07.03.18 at 19:58, wrote:
> @@ -554,13 +551,11 @@ static void update_reference_tsc(struct domain *d,
> bool_t initialize)
> put_page_and_type(page);
> }
>
> -int wrmsr_viridian_regs(uint32_t idx, uint64_t val)
> +int guest_wrmsr_viridian(struct vcpu *v, uint32_t idx, uint64_t val)
>>> On 07.03.18 at 19:58, wrote:
> --- a/xen/arch/x86/msr.c
> +++ b/xen/arch/x86/msr.c
> @@ -185,6 +185,10 @@ int guest_rdmsr(const struct vcpu *v, uint32_t msr,
> uint64_t *val)
> }
>
> /* Fallthrough. */
> +case MSR_XEN_ALT_START ... MSR_XEN_ALT_START + NR_XEN_MSRS - 1:
On Tue, Mar 13, 2018 at 09:29:49AM +, Christian Lindig wrote:
> On 12/03/18 19:35, Michael Young wrote:
>
> > Here is version 4 of the patch where I have replaced the uses of s with b
> > where the patch changes it from string to bytes. I have also removed the
> > two trailing spaces and chang
On 08/03/2018 20:02, Ian Jackson wrote:
> This avoids checkpatch misparsing (as statements) long function
> definitions or declarations, which sometimes start with constructs
> like this:
>
> static inline int xendevicemodel_relocate_memory(
> xendevicemodel_handle *dmod, domid_t domid, ..
On 08/03/2018 20:03, Ian Jackson wrote:
> If you pass scripts/get_maintainer.pl the name of a FIFO or other
> exciting object (/dev/stdin, for example), it would falsely print
> "file not found". Instead: stat the object rather than using -f so
> that we do not mind if the object is not a file; an
>>> On 07.03.18 at 19:58, wrote:
> --- a/xen/include/asm-x86/msr-index.h
> +++ b/xen/include/asm-x86/msr-index.h
> @@ -312,18 +312,21 @@
>
> #define MSR_IA32_TSC_ADJUST 0x003b
>
> -#define MSR_IA32_APICBASE0x001b
> -#define MSR_IA32_APICBASE_BSP(1<
branch xen-4.9-testing
xenbranch xen-4.9-testing
job test-amd64-amd64-xl-qemut-ws16-amd64
testid windows-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qe
>>> On 07.03.18 at 19:58, wrote:
> @@ -175,11 +177,26 @@ int guest_rdmsr(const struct vcpu *v, uint32_t msr,
> uint64_t *val)
> _MSR_MISC_FEATURES_CPUID_FAULTING;
> break;
>
> +case MSR_HYPERVISOR_START ... MSR_HYPERVISOR_START + NR_VIRIDIAN_MSRS -
> 1:
> +
From: Manish Jaggi
IORT has a hierarchical structure containing PCIRC nodes, IORT nodes
and SMMU nodes. Each node has with it an array of ids and a mapping
which maps a range of ids to another node's ids.
PCIRC(requesterid)->SMMU(streamid)->ITS(devid) or PCIRC->ITS
IORT is parsed multiple times
From: Manish Jaggi
Code to query estimated IORT size for hardware domain.
IORT for hardware domain is generated using the requesterid and
deviceid map. Xen code requires the size to be predeterminded.
Signed-off-by: Manish Jaggi
---
xen/arch/arm/acpi/Makefile | 1 +
xen/arch/arm/acp
From: Manish Jaggi
Structure of Hardware domain's (hwdom) IORT
hwdom's IORT will only have PCIRC nodes and ITS group nodes
in the following order. SMMU nodes as they are hidden from hardware
domain.
[IORT Header]
[ITS Group 1 ]
...
[ITS Group n ]
[PCIRC Node 1]
[PCIRC IDMAP entry 1]
...
[
From: Manish Jaggi
This patch aims to add the support of IORT in Xen. Below is the list
of major components which this patchset provides.
a. Add support for parsing the IORT
b. Provides API to populate/query requesterid - streamID mappings and
reuqesterid - deviceid mappings
c. The requesteri
From: Manish Jaggi
to_pci_dev for ARM was todo till now.
Provide definition for this macro.
Signed-off-by: Manish Jaggi
---
xen/drivers/passthrough/arm/smmu.c | 3 ++-
xen/include/asm-arm/pci.h | 6 ++
2 files changed, 8 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/passt
From: Manish Jaggi
Remove the parts of acpi_iort.h which are not required for Xen.
Signed-off-by: Manish Jaggi
---
xen/include/asm-arm/acpi/acpi_iort.h | 10 ++
1 file changed, 2 insertions(+), 8 deletions(-)
diff --git a/xen/include/asm-arm/acpi/acpi_iort.h
b/xen/include/asm-arm/acp
From: Manish Jaggi
fwnode is firmware device node object handle type definition. This can
be used either for device tree node or ACPI table node.
However in the context of this patchset it is used mainly for ACPI
nodes.
iommu_fwspec defines set of opeations associated with fwnode.
This patch do
From: Manish Jaggi
dev_is_pci for ARM was todo till now.
Provide definition for this macro.
Signed-off-by: Manish Jaggi
---
xen/include/asm-arm/device.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/include/asm-arm/device.h b/xen/include/asm-arm/device.h
index 7f2
1 - 100 of 218 matches
Mail list logo