>>> On 06.08.18 at 21:07, wrote:
> On Thu, Aug 02, 2018 at 01:09:06AM -0600, Jan Beulich wrote:
>> >>> On 02.08.18 at 00:20, wrote:
>> > On Tue, Jul 31, 2018 at 05:25:27AM -0600, Jan Beulich wrote:
>> >> Code structure wise this looks to undo a fair part of what patch
>> >> 1 has done. It would b
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 03:38
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Suravee Suthikulpanit ; Stefano
> Stabellini ; Julien Grall ; Jan
> Beulich
> Subject: RE: [PATCH v5 02/15] iommu: introduce the con
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 03:56
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Julien Grall
> ; Andrew Cooper ;
> Ian Jackson ; Jan Beulich ;
> Konrad Rzeszutek Wilk ; Tim (Xen.org)
> ; Nakaj
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 04:00
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; George Dunlap ;
> Andrew Cooper ; Ian Jackson
> ; Tim (Xen.org) ; Jan Beulich
> ; Daniel De Graaf
>
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 04:04
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich
> Subject: RE: [PATCH v5 07/15] iommu: track reserved ranges using a rangeset
>
> > From: Paul Durrant [mailto:paul.dur
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 04:25
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; George Dunlap
>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Paul Durrant [ma
flight 125780 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125780/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
Regressions wh
>>> On 07.08.18 at 10:05, wrote:
>> From: Tian, Kevin [mailto:kevin.t...@intel.com]
>> Sent: 07 August 2018 03:56
>> > From: Paul Durrant [mailto:paul.durr...@citrix.com]
>> > Sent: Saturday, August 4, 2018 1:22 AM
>> > if ( need_iommu(p2m->domain) &&
>> > (lpae_valid(orig_pte) || l
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:16 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 04:04
> > To: Paul Durrant ; xen-
> de...@lists.xenproject.org
> > Cc: Jan Beulich
> > Subjec
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 04:41
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Julien Grall
> ; Andrew Cooper ;
> George Dunlap ; Ian Jackson
> ; Jan Beulich ; Konrad
> Rzeszutek Wilk ; Tim (
>>> On 07.08.18 at 10:10, wrote:
>> From: Tian, Kevin [mailto:kevin.t...@intel.com]
>> Sent: 07 August 2018 04:00
>>
>> > From: Paul Durrant
>> > Sent: Saturday, August 4, 2018 1:22 AM
>> >
>> > diff --git a/xen/arch/x86/iommu_op.c b/xen/arch/x86/iommu_op.c
>> > new file mode 100644
>> > index 00
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:00 PM
>
> > > *
> > > * gfn: Guest Frame Number
> > > * The values a guest puts in its own pagetables. For an auto-
> translated
> > > @@ -26,6 +27,11 @@
> > > * A linear idea of a guest physical a
>>> On 07.08.18 at 10:21, wrote:
>> From: Tian, Kevin [mailto:kevin.t...@intel.com]
>> Sent: 07 August 2018 04:25
>>
>> > From: Paul Durrant [mailto:paul.durr...@citrix.com]
>> > Sent: Saturday, August 4, 2018 1:22 AM
>> >
>> > --- a/xen/drivers/passthrough/vtd/iommu.c
>> > +++ b/xen/drivers/pass
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:22 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 04:25
> > To: Paul Durrant ; xen-
> de...@lists.xenproject.org
> > Cc: Jan Beulich ; George Du
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 05:08
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; George Dunlap ;
> Andrew Cooper ; Ian Jackson
> ; Tim (Xen.org) ; Julien Grall
> ; Jan Beulich
> Su
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, August 7, 2018 4:30 PM
>
> >>> On 07.08.18 at 10:21, wrote:
> >> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> >> Sent: 07 August 2018 04:25
> >>
> >> > From: Paul Durrant [mailto:paul.durr...@citrix.com]
> >> > Sent: Saturday, A
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 09:31
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; George Dunlap
>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Paul Durrant [ma
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 09:33
> To: Jan Beulich ; Paul Durrant
>
> Cc: George Dunlap ; xen-devel de...@lists.xenproject.org>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Jan Beul
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:33 PM
>
> >
> > > From: Paul Durrant
> > > Sent: Saturday, August 4, 2018 1:22 AM
> > >
> > > This patch adds an iommu_op which checks whether it is possible or
> > > safe for a domain to modify its own IOMMU m
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 09:38
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; George Dunlap ;
> Andrew Cooper ; Ian Jackson
> ; Tim (Xen.org) ; Julien Grall
> ; Jan Beulich
> Su
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:36 PM
>
> > > > > +static int intel_iommu_lookup_page(struct domain *d, bfn_t bfn,
> > > mfn_t
> > > > > *mfn,
> > > > > + unsigned int *flags)
> > > >
> > > > Not looking at l
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:37 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 09:33
> > To: Jan Beulich ; Paul Durrant
> >
> > Cc: George Dunlap ; xen-devel > de...@lists
flight 125764 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125764/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 09:48
> To: Paul Durrant ; Jan Beulich
>
> Cc: George Dunlap ; xen-devel de...@lists.xenproject.org>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Paul Dur
> From: Paul Durrant
> Sent: Tuesday, August 7, 2018 4:44 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 09:38
> > To: Paul Durrant ; xen-
> de...@lists.xenproject.org
> > Cc: Stefano Stabellini ; Wei Liu
> > ; George Dunlap ;
> > A
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:56 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 09:48
> > To: Paul Durrant ; Jan Beulich
> >
> > Cc: George Dunlap ; xen-devel > de...@lists
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 10:03
> To: Paul Durrant ; Jan Beulich
>
> Cc: George Dunlap ; xen-devel de...@lists.xenproject.org>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Paul Dur
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 10:01
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; Andrew Cooper ; Tim
> (Xen.org) ; George Dunlap ;
> Julien Grall ; Jan Beulich ; Ian
> Jackson
> Su
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 5:12 PM
>
>
> > So here current version pvIOMMU only provides global address space,
> > though unlike any existing IOMMU. maybe we should explicitly call out
> > this fact in some capability field for future ext
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 10:20
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; Andrew Cooper ; Tim
> (Xen.org) ; George Dunlap ;
> Julien Grall ; Jan Beulich ; Ian
> Jackson
> Su
Dear community members,
please send me agenda items for next week’s community call by this Friday.
Note that this a week later than normal, because I had community calls in
my diary as the week before Advisory Board meetings (not the 2nd Wed
of each month) and I forgot to send out the agenda.
* Boris Ostrovsky wrote:
> x86 maintainers, this needs your ack please.
LGTM:
Acked-by: Ingo Molnar
Thanks,
Ingo
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
flight 125766 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125766/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
PV doesn't have RTC. Enclose relevant code in CONFIG_HVM.
Signed-off-by: Wei Liu
---
xen/arch/x86/time.c | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/x86/time.c b/xen/arch/x86/time.c
index 536449b..8d74210 100644
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -1144,6
This function is common to both PV and HVM. Move it to x86 common
code.
Signed-off-by: Wei Liu
---
xen/arch/x86/hvm/mtrr.c | 9 -
xen/arch/x86/mm.c | 9 +
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/hvm/mtrr.c b/xen/arch/x86/hvm/mtrr.c
inde
It is not specific to HVM. It just so happens that PV doesn't need
special handling. Also enclose the code in CONFIG_HVM.
Signed-off-by: Wei Liu
---
xen/arch/x86/hvm/irq.c | 6 --
xen/arch/x86/irq.c | 8
2 files changed, 8 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86
Signed-off-by: Wei Liu
---
xen/include/asm-x86/hvm/guest_access.h | 24
1 file changed, 24 insertions(+)
diff --git a/xen/include/asm-x86/hvm/guest_access.h
b/xen/include/asm-x86/hvm/guest_access.h
index b92dbe9..c7e83dc 100644
--- a/xen/include/asm-x86/hvm/guest_access
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/traps.c | 15 +++
1 file changed, 11 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/x86_64/traps.c b/xen/arch/x86/x86_64/traps.c
index ed02b78..87d5816 100644
--- a/xen/arch/x86/x86_64/traps.c
+++ b/xen/arch/x86/x86_64/traps.c
@
They contain code for compat hypercall for PV guests.
Signed-off-by: Wei Liu
---
xen/arch/x86/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
index 17e7d3f..9b9b63a 100644
--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Ma
This allows us to provide a stub for it in that header file.
Signed-off-by: Wei Liu
---
xen/include/asm-x86/event.h | 3 ++-
xen/include/asm-x86/hvm/event.h | 14 ++
2 files changed, 16 insertions(+), 1 deletion(-)
create mode 100644 xen/include/asm-x86/hvm/event.h
diff --git
Wei Liu (9):
x86: put compat.o and x86_64/compat.o under CONFIG_PV
x86: add missing "inline" keyword
x86: enclose hypercall page initialisation code in CONFIG_{HVM,PV}
x86/hvm: provide stubs for HVM guest accessors
x86/hvm: put hvm_local_events_need_delivery into a header file
x86: move
Signed-off-by: Wei Liu
---
xen/include/asm-x86/pv/traps.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/include/asm-x86/pv/traps.h b/xen/include/asm-x86/pv/traps.h
index 7279d16..89985d1 100644
--- a/xen/include/asm-x86/pv/traps.h
+++ b/xen/include/asm-x86/pv/traps.h
@@
While at it, remove declaration of vcpu_hvm_context and use the proper
header.
Signed-off-by: Wei Liu
---
xen/include/asm-x86/domain.h | 3 ---
xen/include/asm-x86/hvm/domain.h | 17 +
2 files changed, 17 insertions(+), 3 deletions(-)
diff --git a/xen/include/asm-x86/domain
My recent patch [1] to qemu-xen-traditional removes the last use of the
'default' ioreq server in Xen. (This is a catch-all ioreq server that is
used if no explicitly registered I/O range is targetted).
This patch can be applied once that patch is committed, to remove the
(>100 lines of) redundant
On 08/07/2018 10:26 AM, Lars Kurth wrote:
> Dear community members,
>
> please send me agenda items for next week’s community call by this Friday.
> Note that this a week later than normal, because I had community calls in
> my diary as the week before Advisory Board meetings (not the 2nd Wed
On 07/08/18 11:03, Paul Durrant wrote:
> My recent patch [1] to qemu-xen-traditional removes the last use of the
> 'default' ioreq server in Xen. (This is a catch-all ioreq server that is
> used if no explicitly registered I/O range is targetted).
>
> This patch can be applied once that patch is co
flight 125765 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125765/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64-xsm
>>> On 07.08.18 at 12:03, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4098,7 +4098,6 @@ static int hvm_allow_set_param(struct domain *d,
> * since the domain may need to be paused.
> */
> case HVM_PARAM_IDENT_PT:
> -case HVM_PARAM_DM_DOMAIN:
>
>>> On 07.08.18 at 12:00, wrote:
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
>>> On 07.08.18 at 12:00, wrote:
> They contain code for compat hypercall for PV guests.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-d
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/arch/x86/x86_64/traps.c
> +++ b/xen/arch/x86/x86_64/traps.c
> @@ -352,12 +352,19 @@ void subarch_percpu_traps_init(void)
> void hypercall_page_initialise(struct domain *d, void *hypercall_page)
> {
> memset(hypercall_page, 0xCC, PAGE_SIZE);
> +#i
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/include/asm-x86/hvm/guest_access.h
> +++ b/xen/include/asm-x86/hvm/guest_access.h
> @@ -1,8 +1,32 @@
> #ifndef __ASM_X86_HVM_GUEST_ACCESS_H__
> #define __ASM_X86_HVM_GUEST_ACCESS_H__
>
> +#if CONFIG_HVM
> +
> unsigned long copy_to_user_hvm(void *to
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 07 August 2018 11:37
> To: Paul Durrant
> Cc: Andrew Cooper ; xen-devel de...@lists.xenproject.org>
> Subject: Re: [PATCH] x86/hvm: remove default ioreq server
>
> >>> On 07.08.18 at 12:03, wrote:
> > --- a/xen/
On 07/08/18 11:44, Jan Beulich wrote:
On 07.08.18 at 12:00, wrote:
>> --- a/xen/arch/x86/x86_64/traps.c
>> +++ b/xen/arch/x86/x86_64/traps.c
>> @@ -352,12 +352,19 @@ void subarch_percpu_traps_init(void)
>> void hypercall_page_initialise(struct domain *d, void *hypercall_page)
>> {
>> m
>>> On 07.08.18 at 12:00, wrote:
> --- /dev/null
> +++ b/xen/include/asm-x86/hvm/event.h
> @@ -0,0 +1,14 @@
> +#ifndef ASM_HVM_EVENT_H
> +#define ASM_HVM_EVENT_H
> +
> +#if CONFIG_HVM
> +
> +int hvm_local_events_need_delivery(struct vcpu *v);
> +
> +#else
> +
> +static inline int hvm_local_events_
flight 125767 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125767/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64-xsm
>>> On 07.08.18 at 12:48, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 07 August 2018 11:37
>>
>> >>> On 07.08.18 at 12:03, wrote:
>> > @@ -4373,13 +4372,6 @@ static int hvm_allow_get_param(struct domain
>> *d,
>> > case HVM_PARAM_ALTP2M:
>> > case HVM_PARAM_X87_FIP_
>>> On 07.08.18 at 12:00, wrote:
> This function is common to both PV and HVM. Move it to x86 common
> code.
I'm afraid that's the wrong way round: p2m_memory_type_changed()
is HVM (in fact EPT) specific. The only uses of the function that aren't
already HVM-specific are from domctl.c and from io
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/arch/x86/irq.c
> +++ b/xen/arch/x86/irq.c
> @@ -2732,3 +2732,11 @@ int allocate_and_map_msi_pirq(struct domain *d, int
> index, int *pirq_p,
>
> return ret;
> }
> +
> +void arch_evtchn_inject(struct vcpu *v)
> +{
> +#if CONFIG_HVM
> +if ( i
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/arch/x86/time.c
> +++ b/xen/arch/x86/time.c
> @@ -1144,6 +1144,7 @@ void force_update_vcpu_system_time(struct vcpu *v)
>
> static void update_domain_rtc(void)
> {
> +#if CONFIG_HVM
> struct domain *d;
>
> rcu_read_lock(&domlist_read_lock
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/include/asm-x86/hvm/domain.h
> +++ b/xen/include/asm-x86/hvm/domain.h
> @@ -34,6 +34,7 @@
> #include
> #include
> #include
> +#include
Why? struct vcpu_hvm_context only needs a forward declaration, just
like was the case originally. Full structu
flight 75051 distros-debian-snapshot real [real]
http://osstest.xensource.com/osstest/logs/75051/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 6 xen-build fail REGR. vs. 75030
test-amd64-i386-
>>> On 03.08.18 at 15:53, wrote:
> +for ( i = 0; i < MASK_EXTR(hw_mtrr.msr_mtrr_cap, MTRRcap_VCNT); i++ )
> +{
> +/* save physbase */
> +hw_mtrr.msr_mtrr_var[i * 2] = mtrr_state->var_ranges->base;
> +/* save physmask */
> +hw_mtrr.msr_mtrr_var[i * 2 + 1] = m
flight 125782 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125782/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
Regressions wh
>>> On 03.08.18 at 15:53, wrote:
> This is used to save data from a single instance.
>
> Signed-off-by: Alexandru Isaila
> ---
> xen/arch/x86/hvm/vlapic.c | 27 +++
> 1 file changed, 19 insertions(+), 8 deletions(-)
>
> diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/
>>> On 03.08.18 at 15:53, wrote:
> --- a/xen/arch/x86/hvm/save.c
> +++ b/xen/arch/x86/hvm/save.c
> @@ -196,7 +196,10 @@ int hvm_save(struct domain *d, hvm_domain_context_t *h)
> struct hvm_save_header hdr;
> struct hvm_save_end end;
> hvm_save_handler handler;
> +hvm_save_vcpu_h
>>> On 03.08.18 at 15:53, wrote:
> This patch drops the use of save functions in hvm_save.
But quite a few types still have this set to NULL? How do things work
at this point of the series? Am I overlooking anything? I think this
needs to be swapped with patch 13.
Jan
On Ma, 2018-08-07 at 06:09 -0600, Jan Beulich wrote:
> >
> > >
> > > >
> > > > On 03.08.18 at 15:53, wrote:
> > This is used to save data from a single instance.
> >
> > Signed-off-by: Alexandru Isaila
> > ---
> > xen/arch/x86/hvm/vlapic.c | 27 +++
> > 1 file changed
>>> On 03.08.18 at 15:53, wrote:
> @@ -226,15 +225,14 @@ int hvm_save(struct domain *d, hvm_domain_context_t *h)
> /* Save all available kinds of state */
> for ( i = 0; i <= HVM_SAVE_CODE_MAX; i++ )
> {
> -handler = hvm_sr_handlers[i].save;
> -save_one_handler = hvm
>>> On 03.08.18 at 15:53, wrote:
> @@ -155,7 +152,7 @@ int hvm_save_one(struct domain *d, unsigned int typecode,
> unsigned int instance,
> if ( !ctxt.data )
> return -ENOMEM;
>
> -if ( (rv = hvm_sr_handlers[typecode].save(d, &ctxt)) != 0 )
> +if ( (rv = hvm_sr_handlers[ty
flight 125771 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125771/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
>>> On 03.08.18 at 15:53, wrote:
> --- a/xen/arch/x86/domctl.c
> +++ b/xen/arch/x86/domctl.c
> @@ -591,12 +591,12 @@ long arch_do_domctl(
> !is_hvm_domain(d) )
> break;
>
> -domain_pause(d);
> +vcpu_pause(d->vcpu[domctl->u.hvmcontext_partial.instance]);
>>> On 03.08.18 at 15:53, wrote:
> Alexandru Isaila (14):
>
> x86/cpu: Introduce vmce_save_vcpu_ctxt_one() func
> x86/hvm: Introduce hvm_save_tsc_adjust_one() func
> x86/hvm: Introduce hvm_save_cpu_ctxt_one func
> x86/hvm: Introduce hvm_save_cpu_xsave_states_one
> x86/hvm: Introduce hvm_save_cpu_
On 17/07/18 14:01, Juergen Gross wrote:
> Some Xen related cleanups:
> - move some pv-only code from CONFIG_XEN to CONFIG_XEN_PV
> - use CONFIG_XEN_PVHVM in Makefile instead of #ifdef around a complete source
> - add SPDX identifier where missing
>
> Juergen Gross (4):
> xen: move pv irq related
On 13/06/18 11:58, Juergen Gross wrote:
> Using privcmd_call() for a singleton multicall seems to be wrong, as
> privcmd_call() is using stac()/clac() to enable hypervisor access to
> Linux user space.
>
> Add a new xen_single_call() function to be use for that purpose.
>
> Reported-by: Jan Beuli
Hi Oleksandr,
On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Signed-off-by: Oleksandr Tyshchenko
CC: Stefano Stabellini
CC: Julien Grall
Acked-by: Julien Grall
Cheers,
---
xen/drivers/char/scif-uart.c| 4
xen/include/asm-arm/scif-uart.h | 11 ---
>>> On 06.08.18 at 14:54, wrote:
> --- a/xen/common/grant_table.c
> +++ b/xen/common/grant_table.c
> @@ -3860,6 +3860,38 @@ int mem_sharing_gref_to_gfn(struct grant_table *gt,
> grant_ref_t ref,
> }
> #endif
>
> +/* caller must hold read or write lock */
> +static int gnttab_get_status_frame_
flight 125769 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125769/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64
On Tue, Aug 07, 2018 at 10:26:11AM +0100, Lars Kurth wrote:
> Dear community members,
>
> please send me agenda items for next week’s community call by this Friday.
> Note that this a week later than normal, because I had community calls in
> my diary as the week before Advisory Board meetings
Hi Oleksandr,
On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Extend existing driver to be able to handle SCIFA interface as well.
SCIF and SCIFA have lot in common, though SCIFA has different
offsets and bits for some registers.
Use compatible string to recognize wh
Hi,
On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Add support for Renesas "Stout" development board based on
R-Car H2 SoC which has SCIFA compatible UART.
Actually existing SCIF UART support (debug-scif.inc) and
newly added SCIFA UART support (debug-scifa.inc) diff
On Fri, Aug 03, 2018 at 04:20:31PM -0700, Srivatsa S. Bhat wrote:
> On 8/2/18 3:22 PM, Kees Cook wrote:
> > On Thu, Aug 2, 2018 at 12:22 PM, Srivatsa S. Bhat
> > wrote:
> >> On 7/26/18 4:09 PM, Kees Cook wrote:
> >>> On Tue, Jul 24, 2018 at 3:02 PM, Jiri Kosina wrote:
> On Tue, 24 Jul 2018,
On 08/07/2018 09:10 AM, Juergen Gross wrote:
> On 17/07/18 14:01, Juergen Gross wrote:
>> Some Xen related cleanups:
>> - move some pv-only code from CONFIG_XEN to CONFIG_XEN_PV
>> - use CONFIG_XEN_PVHVM in Makefile instead of #ifdef around a complete source
>> - add SPDX identifier where missing
>
On 08/07/2018 09:11 AM, Juergen Gross wrote:
> On 13/06/18 11:58, Juergen Gross wrote:
>> Using privcmd_call() for a singleton multicall seems to be wrong, as
>> privcmd_call() is using stac()/clac() to enable hypervisor access to
>> Linux user space.
>>
>> Add a new xen_single_call() function to b
My recent patch [1] to qemu-xen-traditional removes the last use of the
'default' ioreq server in Xen. (This is a catch-all ioreq server that is
used if no explicitly registered I/O range is targetted).
This patch can be applied once that patch is committed, to remove the
(>100 lines of) redundant
Several people have reported hardware issues (malfunctioning USB
controllers) due to iommu page faults on Intel hardware. Those faults
are caused by missing RMRR (VTd) entries in the ACPI tables. Those can
be worked around on VTd hardware by manually adding RMRR entries on
the command line, this is
Hello,
The following series implement a workaround for missing RMRR
entries for a PVH Dom0. It's based on the iommu_inclusive_mapping VTd
option.
The PVH workaround identity maps all regions marked as reserved in the
memory map.
Note that this workaround is enabled by default on Intel hardware.
Introduce a new dom0-iommu=inclusive generic option that supersedes
iommu_inclusive_mapping. The previous behaviour is preserved and the
option should only be enabled by default on Intel hardware.
No functional change intended.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
- Fix typo in
To select the iommu configuration used by Dom0. This option supersedes
iommu=dom0-strict|dom0-passthrough.
No functional change.
Signed-off-by: Roger Pau Monné
Reviewed-by: Paul Durrant
---
Changes since v2:
- Change the style and text used in the xen command line document.
- Don't allow none
So it's done before the iommu is initialized. This is required in
order to be able to fetch the MMCFG regions from the domain struct.
No functional change.
Signed-off-by: Roger Pau Monné
---
Changes since v1:
- New in this version.
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/d
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 07 August 2018 14:38
> To: Paul Durrant
> Cc: Andrew Cooper ; Wei Liu
> ; George Dunlap ; Ian
> Jackson ; Stefano Stabellini
> ; xen-devel ;
> Konrad Rzeszutek Wilk ; Tim (Xen.org)
>
> Subject: Re: [PATCH v20 1/2]
On Tue, Aug 07, 2018 at 08:31:31AM +0200, Juergen Gross wrote:
> On 06/08/18 18:16, Roger Pau Monné wrote:
> > On Mon, Aug 06, 2018 at 01:34:01PM +0200, Juergen Gross wrote:
> >> Add a periodic cleanup function to remove old persistent grants which
> >> are no longer in use on the backend side. Thi
On Mon, Aug 06, 2018 at 06:20:50PM +0100, Anthony PERARD wrote:
> On Thu, Aug 02, 2018 at 05:50:52PM +0200, Roger Pau Monné wrote:
> > On Fri, Jul 27, 2018 at 03:06:13PM +0100, Anthony PERARD wrote:
> > Can you provide a comment explaining how is this supposed to work? The
> > current code is alrea
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Roger Pau Monne
> Sent: 07 August 2018 15:03
> To: xen-devel@lists.xenproject.org
> Cc: Kevin Tian ; Stefano Stabellini
> ; Wei Liu ; George Dunlap
> ; Andrew Cooper
> ; Ian Jackson ; Tim
>
On Tue, Aug 7, 2018 at 4:48 PM, Julien Grall wrote:
> Hi,
Hi, Julien
>
> On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Add support for Renesas "Stout" development board based on
>> R-Car H2 SoC which has SCIFA compatible UART.
>>
>> Actually existing SCIF
On Tue, Aug 7, 2018 at 8:04 AM Roger Pau Monne wrote:
>
> Hello,
>
> The following series implement a workaround for missing RMRR
> entries for a PVH Dom0. It's based on the iommu_inclusive_mapping VTd
> option.
>
> The PVH workaround identity maps all regions marked as reserved in the
> memory ma
>>> On 07.08.18 at 16:02, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4093,12 +4093,15 @@ static int hvm_allow_set_param(struct domain *d,
> case HVM_PARAM_CONSOLE_EVTCHN:
> case HVM_PARAM_X87_FIP_WIDTH:
> break;
> +/* The following parameters
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Roger Pau Monne
> Sent: 07 August 2018 15:03
> To: xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; George Dunlap ;
> Andrew Cooper ; Ian Jackson
> ; Tim (Xen.org) ; Ju
>>> On 07.08.18 at 16:14, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 07 August 2018 14:38
>>
>> >>> On 06.08.18 at 14:54, wrote:
>> > --- a/xen/common/grant_table.c
>> > +++ b/xen/common/grant_table.c
>> > @@ -3860,6 +3860,38 @@ int mem_sharing_gref_to_gfn(struct
>> grant_ta
On Tue, Aug 07, 2018 at 08:29:49AM -0600, Tamas K Lengyel wrote:
> On Tue, Aug 7, 2018 at 8:04 AM Roger Pau Monne wrote:
> >
> > Hello,
> >
> > The following series implement a workaround for missing RMRR
> > entries for a PVH Dom0. It's based on the iommu_inclusive_mapping VTd
> > option.
> >
> >
1 - 100 of 155 matches
Mail list logo