branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-xl-qemut-win7-amd64
testid xen-boot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditi
This is a note to let you know that I've just added the patch titled
x86/entry/64: Remove %ebx handling from error_entry/exit
to the 4.9-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the patch is:
On Tue, Aug 21, 2018 at 06:42:56PM -0700, Andy Lutomirski wrote:
> On Thu, Aug 16, 2018 at 9:19 PM, Sarah Newman wrote:
> > commit b3681dd548d06deb2e1573890829dff4b15abf46 upstream.
> >
> > This version applies to v4.9.
>
> ...
>
> Looks okay to me.
Thanks for the review, and Sarah, thanks for
On Tue, Aug 21, 2018 at 09:53:08PM -0700, Zhenzhong Duan wrote:
> pci_conf_read8() needs pci mmcfg mapping to work on multiple pci
> segments system such as HPE Superdome-Flex.
>
> Move acpi_mmcfg_init() call in acpi_boot_init() before calling
> acpi_parse_dmar() so that when pci_conf_read8() is c
flight 126287 xen-4.11-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/126287/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-rtds broken
Regressions whic
Introduce a new dom0-iommu=map-inclusive generic option that
supersedes iommu_inclusive_mapping. The previous behavior is preserved
and the option should only be enabled by default on Intel hardware.
Signed-off-by: Roger Pau Monné
Reviewed-by: Paul Durrant
Reviewed-by: Jan Beulich
Reviewed-by:
This avoids repeated calls to page_is_ram_type which improves
performance and makes the code easier to read.
Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
---
Changes since v4:
- New in this version.
---
Cc: Jan Beulich
---
xen/drivers/passthrough/x86/iommu.c | 60 +++---
To iommu_hwdom_strict and iommu_hwdom_passthrough which is more
descriptive of their usage. Also change their type from bool_t to
bool.
No functional change.
Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
Reviewed-by: Kevin Tian
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Suravee Suth
Hello,
The following series implement a workaround for missing RMRR
entries for a PVH Dom0. It's based on the iommu_inclusive_mapping VTd
option.
The PVH workaround identity maps all regions marked as reserved in the
memory map.
Note that this workaround is enabled by default on Intel hardware.
Several people have reported hardware issues (malfunctioning USB
controllers) due to iommu page faults on Intel hardware. Those faults
are caused by missing RMRR (VTd) entries in the ACPI tables. Those can
be worked around on VTd hardware by manually adding RMRR entries on
the command line, this is
Returns all the memory types applicable to a page.
This function is unimplemented for ARM.
Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
---
Changes since v5:
- Return all types that apply to a page, since the types themselves
are flags that can be or'ed together.
---
Cc: Stefano
To select the iommu configuration used by Dom0. This option supersedes
iommu=dom0-strict|dom0-passthrough.
Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
---
Changes since v5:
- Fix typo in docs.
- Force iommu_hwdom_passthrough to false for PVH Dom0. Note this in
the documentation.
在 2018/8/22 15:36, Roger Pau Monné 写道:
On Tue, Aug 21, 2018 at 09:53:08PM -0700, Zhenzhong Duan wrote:
pci_conf_read8() needs pci mmcfg mapping to work on multiple pci
segments system such as HPE Superdome-Flex.
Move acpi_mmcfg_init() call in acpi_boot_init() before calling
acpi_parse_dmar() so
On Wed, Aug 22, 2018 at 04:39:05PM +0800, Zhenzhong Duan wrote:
> 在 2018/8/22 15:36, Roger Pau Monné 写道:
> > On Tue, Aug 21, 2018 at 09:53:08PM -0700, Zhenzhong Duan wrote:
> > > pci_conf_read8() needs pci mmcfg mapping to work on multiple pci
> > > segments system such as HPE Superdome-Flex.
> > >
在 2018/8/22 16:42, Roger Pau Monné 写道:
On Wed, Aug 22, 2018 at 04:39:05PM +0800, Zhenzhong Duan wrote:
在 2018/8/22 15:36, Roger Pau Monné 写道:
On Tue, Aug 21, 2018 at 09:53:08PM -0700, Zhenzhong Duan wrote:
pci_conf_read8() needs pci mmcfg mapping to work on multiple pci
segments system such as
pci_conf_read8() needs pci mmcfg mapping to work on multiple pci
segments system such as HPE Superdome-Flex.
Move acpi_mmcfg_init() call in acpi_boot_init() before calling
acpi_parse_dmar() so that when pci_conf_read8() is called in
acpi_parse_dev_scope(), we already have the mapping set up.
mmio
Given what pt_pci_init() actually does, rename it properly and move its
declaration to pci.h, move the only call in acpi_mmcfg_init().
No functional change.
Signed-off-by: Zhenzhong Duan
Tested-by: Gopalasetty, Manoj
Acked-by: Jan Beulich
---
xen/arch/x86/setup.c |2 --
x
On Wed, Aug 22, 2018 at 09:51:55AM +0200, Roger Pau Monne wrote:
> To iommu_hwdom_strict and iommu_hwdom_passthrough which is more
> descriptive of their usage. Also change their type from bool_t to
> bool.
>
> No functional change.
>
> Signed-off-by: Roger Pau Monné
> Reviewed-by: Jan Beulich
On Wed, Aug 22, 2018 at 09:51:56AM +0200, Roger Pau Monne wrote:
> To select the iommu configuration used by Dom0. This option supersedes
> iommu=dom0-strict|dom0-passthrough.
>
> Signed-off-by: Roger Pau Monné
> Reviewed-by: Jan Beulich
Reviewed-by: Wei Liu
__
On Wed, Aug 22, 2018 at 09:52:00AM +0200, Roger Pau Monne wrote:
> Several people have reported hardware issues (malfunctioning USB
> controllers) due to iommu page faults on Intel hardware. Those faults
> are caused by missing RMRR (VTd) entries in the ACPI tables. Those can
> be worked around on
On Wed, Aug 22, 2018 at 09:51:58AM +0200, Roger Pau Monne wrote:
> Returns all the memory types applicable to a page.
>
> This function is unimplemented for ARM.
>
> Signed-off-by: Roger Pau Monné
> Reviewed-by: Jan Beulich
> ---
> Changes since v5:
> - Return all types that apply to a page, s
On Wed, Aug 22, 2018 at 09:51:59AM +0200, Roger Pau Monne wrote:
> This avoids repeated calls to page_is_ram_type which improves
> performance and makes the code easier to read.
>
> Signed-off-by: Roger Pau Monné
> Reviewed-by: Jan Beulich
Reviewed-by: Wei Liu
> ---
> Changes since v4:
> - N
On Wed, Aug 22, 2018 at 09:51:57AM +0200, Roger Pau Monne wrote:
> Introduce a new dom0-iommu=map-inclusive generic option that
> supersedes iommu_inclusive_mapping. The previous behavior is preserved
> and the option should only be enabled by default on Intel hardware.
>
> Signed-off-by: Roger Pa
On 20/08/18 10:16, Amit Tomer wrote:
Hello,
Hi Amit,
I would prefer if no new alias are added. The same could be achieved with
CONFIG_EARLY_PRINTK=meson,0xc81004c0.
This could be documented on the wiki.
Ok.
I would prefer if we stick with the spec name. So UART_TX_REG should be
renamed
flight 126378 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/126378/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 1385a14bfc09672513cb5bf9baafa881c8d93542
baseline version:
xen b8f3
On 20/08/18 09:12, Amit Tomer wrote:
Hello,
Hi,
Thanks for having a look at it.
The spec does not seems to provide the offset register. Where did you find
them?
Actually, looked at couple of references from u-boot and Linux. These
headers are picked from there.
Please mention it in th
On 16/08/18 20:21, Stefano Stabellini wrote:
On Mon, 13 Aug 2018, Julien Grall wrote:
Hi Stefano,
On 01/08/18 00:28, Stefano Stabellini wrote:
Make vpl011 being able to be used without a userspace component in Dom0.
In that case, output is printed to the Xen serial and input is received
from
Coverity-ID: 1438472
Signed-off-by: Wei Liu
---
Cc: Ian Jackson
---
tools/libxl/libxl_utils.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_utils.c b/tools/libxl/libxl_utils.c
index 5854717b11..e06f765699 100644
--- a/tools/libxl/libxl_utils.c
+++ b/to
Hi,
On 16/08/18 20:41, Stefano Stabellini wrote:
On Mon, 13 Aug 2018, Julien Grall wrote:
Hi,
On 01/08/18 00:28, Stefano Stabellini wrote:
To avoid mixing the output of different domains on the console, buffer
the output chars and print line by line. Unless the domain has input
from the seria
In order to build a tailored pvshim-only binary from Xen. Switch the
PV shim build from the tools firmware into using the new defconfig.
A diff of the .config generated for the pvshim firmware build before
and after this change shows no differences.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jac
This reverts commit 2d3fd8087e746bc5f64d3cf01014aac388a1bb7e.
Signed-off-by: Ian Jackson
CC: Julien Grall
---
production-config | 3 ---
1 file changed, 3 deletions(-)
diff --git a/production-config b/production-config
index fae31ea..df02cd3 100644
--- a/production-config
+++ b/production-conf
flight 126296 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/126296/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stopfail REGR. vs. 124248
test-amd64-amd6
This run is configured for baseline tests only.
flight 75101 xen-unstable real [real]
http://osstest.xensource.com/osstest/logs/75101/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 10 d
Wei Liu writes ("[PATCH] libxl: make sure string is null-terminated in
libxl__prepare_sockaddr_un"):
> Coverity-ID: 1438472
> Signed-off-by: Wei Liu
But...
> diff --git a/tools/libxl/libxl_utils.c b/tools/libxl/libxl_utils.c
> index 5854717b11..e06f765699 100644
> --- a/tools/libxl/libxl_utils.
Roger Pau Monne writes ("[PATCH] pvshim: introduce a PV shim defconfig"):
> In order to build a tailored pvshim-only binary from Xen. Switch the
> PV shim build from the tools firmware into using the new defconfig.
>
> A diff of the .config generated for the pvshim firmware build before
> and afte
This run is configured for baseline tests only.
flight 75102 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75102/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 75098
test
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-qemut-rhel6hvm-intel
testid redhat-install
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xe
flight 126307 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/126307/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-pair 22 guest-migrate/src_host/dst_host fail REGR. vs.
125057
test-am
flight 126360 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/126360/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf e0c93c9b76153bc5a95bf174dab9805ec2f2942c
baseline version:
ovmf cc6939067008c4dcab990
Hello Stefano,
I will look through the rest of changes. But my justifications could be
wrong due to the fact that the rest of the SoC families are unfamiliar
to me.
On 21.08.18 20:24, Stefano Stabellini wrote:
On Tue, 21 Aug 2018, Andrii Anisov wrote:
Hello Stefano,
On 21.08.18 02:59, St
On Wed, Aug 22, 2018 at 12:39:33PM +0100, Ian Jackson wrote:
> Wei Liu writes ("[PATCH] libxl: make sure string is null-terminated in
> libxl__prepare_sockaddr_un"):
> > Coverity-ID: 1438472
> > Signed-off-by: Wei Liu
>
> But...
>
> > diff --git a/tools/libxl/libxl_utils.c b/tools/libxl/libxl_u
On Wed, Aug 22, 2018 at 12:36:55PM +0200, Roger Pau Monne wrote:
> In order to build a tailored pvshim-only binary from Xen. Switch the
> PV shim build from the tools firmware into using the new defconfig.
>
> A diff of the .config generated for the pvshim firmware build before
> and after this ch
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since v15:
- Drop struct vlapic *s.
---
xen/arch/x86/hvm/vlapic.c | 20
1 file changed, 12 insertions(+), 8 deletions(-)
diff --git a/xen/arch/x8
Hi all,
This patch series addresses the ideea of saving data from a single vcpu
instance.
First it starts by adding *save_one functions, then it introduces a handler for
the
new save_one* funcs and makes use of it in the hvm_save and hvm_save_one funcs.
The final patches are used for clean up an
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Change handler name from hvm_save_one_handler to
hvm_save_vcpu_handler.
---
xen/arch/x86/cpu/mcheck/vmce.c | 1 +
xen/arch/x86/hvm/hpet.c| 2 +-
xen/arch/x86/hvm/hvm.c | 6 +-
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Paul Durrant
---
Changes since V14:
- Moved all the operations in the initializer.
---
xen/arch/x86/hvm/viridian.c | 30 +++---
1 file changed, 19 insertions(+), 11 de
This patch removes the redundant save functions and renames the
save_one* to save. It then changes the domain param to vcpu in the
save funcs.
Signed-off-by: Alexandru Isaila
---
Changes since V16:
- Drop the "instance = 0" from hvm_save_one
- Changed if ( handler ) to if ( !hand
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since v15:
- Drop struct vlapic *s.
---
xen/arch/x86/hvm/vlapic.c | 26 +++---
1 file changed, 15 insertions(+), 11 deletions(-)
diff --git a/xen/
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Move all free fields to the initializer
- Add blank line to before the return
- Move v->pause_flags check to the save_one function.
---
xe
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Paul Durrant
Reviewed-by: Jan Beulich
---
Changes since V14:
- Remove err init
- Add blank line ahead of return.
---
xen/arch/x86/hvm/hvm.c | 106 +++-
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V11:
- Removed the memset and added init with {}.
---
xen/arch/x86/cpu/mcheck/vmce.c | 21 +
1 file changed, 13 insertions(+), 8 deletions(-)
This patch is focused on moving changing hvm_save_one() to save one
typecode from one vcpu and now that the save functions get data from a
single vcpu we can pause the specific vcpu instead of the domain.
Signed-off-by: Alexandru Isaila
---
Changes since V15:
- Moved pause/unpause calls
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila i
Reviewed-by: Jan Beulich
---
Changes since v16:
- Address style comments.
Note: This patch is based on Roger Pau Monne's series[1]
---
xen/arch/x86/hvm/mtrr.c | 80 ++
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V13:
- Moved tsc_adjust to the initializer.
---
xen/arch/x86/hvm/hvm.c | 13 ++---
1 file changed, 10 insertions(+), 3 deletions(-)
diff --git a/xen/arc
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V14:
- Remove err init
- Add blank line ahead of return
- Move xsave_enabled() check to the save_one func.
---
xen/arch/x86/hvm/hvm.c | 47 ++
This patch is aimed on using the new save_one fuctions in the hvm_save
Signed-off-by: Alexandru Isaila
---
Changes since V15:
- Moved declarations into their scopes
- Remove redundant NULL check
- Remove rc variable
- Change fault return to -ENODATA.
---
xen/arch
Hello all,
This is follow for patch series [1]. There was lots of discussions
for that series and I tried to address all of them in this new patchset.
Currently, I had a working solution for OP-TEE virtualization and it is being
upstreamed right now ([2]). So, I think it is a good time to introdu
This patch adds basic framework for TEE mediators. Guests can't talk
to TEE directly, we need some entity that will intercept request
and decide what to do with them. "TEE mediator" is a such entity.
This is how it works: user can build XEN with multiple TEE mediators
(see the next patches, where
Signed-off-by: Volodymyr Babchuk
---
tools/libxl/libxl_arm.c | 29 +
tools/libxl/libxl_create.c | 1 +
tools/libxl/libxl_types.idl | 1 +
tools/xl/xl_parse.c | 1 +
4 files changed, 32 insertions(+)
diff --git a/tools/libxl/libxl_arm.c b/tools/libxl/li
Add OP-TEE mediator, so guests can access OP-TEE services.
OP-TEE mediator support address translation for DomUs.
It tracks execution of STD calls, correctly handles memory-related RPC
requests, tracks buffer allocated for RPCs.
With this patch OP-TEE sucessfully passes own tests, while client is
Existing SMC wrapper call_smc() allows only 4 parameters and
returns only one value. This is enough for existing
use in PSCI code, but TEE mediator will need a call that is
fully compatible with ARM SMCCC.
This patch adds this call for both arm32 and arm64.
There was similar patch by Edgar E. Igle
This header files describe protocol between OP-TEE and OP-TEE client
driver in Linux. They are needed for upcomient OP-TEE mediator, which
is added in the next patch.
Reason to add those headers in separate patch is to ease up review.
Those files were taken from linux tree (drivers/tee/optee/) and
As we don't want any guest to access limited resources of TEE,
we need a way to control who can work with it.
Thus, new access vector class "tee" is added with only ony operation
"call" so far. tee framework uses this to check if guest has a right
to work with TEE.
Also, example security context
On Tue, Aug 21, 2018 at 02:01:12AM -0600, Jan Beulich wrote:
> >>> On 17.08.18 at 17:12, wrote:
> > p2m_flush is only called by HAP code, nvcpu_flush is only useful for
> > nestedhvm, both of which depend on HVM support.
> >
> > Enclose their code in CONFIG_HVM. Add assertions.
>
> But why do yo
On Tue, Aug 21, 2018 at 02:07:22AM -0600, Jan Beulich wrote:
> >>> On 17.08.18 at 17:12, wrote:
> > --- a/xen/arch/x86/mm/Makefile
> > +++ b/xen/arch/x86/mm/Makefile
> > @@ -2,8 +2,9 @@ subdir-y += shadow
> > subdir-y += hap
> >
> > obj-y += paging.o
> > -obj-y += p2m.o p2m-pt.o p2m-ept.o p2m-
On Wed, Aug 22, 2018 at 05:02:41PM +0300, Alexandru Isaila wrote:
> This patch is aimed on using the new save_one fuctions in the hvm_save
>
> Signed-off-by: Alexandru Isaila
>
> ---
> Changes since V15:
> - Moved declarations into their scopes
> - Remove redundant NULL check
>
Wei Liu writes ("Re: [PATCH] libxl: make sure string is null-terminated in
libxl__prepare_sockaddr_un"):
> On Wed, Aug 22, 2018 at 12:39:33PM +0100, Ian Jackson wrote:
> > If this new code has any effect at all, it will corrupt the string by
> > truncating it.
>
> Corrupt? Per your analysis above
On Wed, Aug 22, 2018 at 05:02:43PM +0300, Alexandru Isaila wrote:
> This patch is focused on moving changing hvm_save_one() to save one
> typecode from one vcpu and now that the save functions get data from a
> single vcpu we can pause the specific vcpu instead of the domain.
With this infrastruct
libxl__arch_domain_build_info_setdefault
A follow-up will require to modify default of multiple fields of
build_info. So rename the function accordingly.
Signed-off-by: Julien Grall
---
tools/libxl/libxl_arch.h | 3 +--
tools/libxl/libxl_arm.c| 4 ++--
tools/libxl/libxl_create.c | 2 +-
t
Hi all,
This small patch series adds switch Arm guest type to PVH in libxl. See
patch #2 for the rationale.
Cheers,
Julien Grall (2):
tools/libxl: Rename libxl__arch_domain_build_info_acpi_setdefault
to...
tools/libxl: Switch Arm guest type to PVH
docs/man/xl.cfg.pod.5.in | 3 ++-
t
Currently, the toolstack is considering Arm guest always PV. However,
they are very similar to PVH because HW virtualization extension are used
and QEMU is not started. So switch Arm guest type to PVH.
To keep compatibility with toolstack creating Arm guest with PV type
(e.g libvirt), libxl will n
On Wed, Aug 22, 2018 at 05:02:42PM +0300, Alexandru Isaila wrote:
> diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
> index 4a70251..831f86b 100644
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -740,7 +740,7 @@ void hvm_domain_destroy(struct domain *d)
> destr
Hi Roger,
On 22/08/18 08:51, Roger Pau Monne wrote:
Introduce a new dom0-iommu=map-inclusive generic option that
supersedes iommu_inclusive_mapping. The previous behavior is preserved
and the option should only be enabled by default on Intel hardware.
Signed-off-by: Roger Pau Monné
Reviewed-by
Hi Roger,
On 22/08/18 08:52, Roger Pau Monne wrote:
Several people have reported hardware issues (malfunctioning USB
controllers) due to iommu page faults on Intel hardware. Those faults
are caused by missing RMRR (VTd) entries in the ACPI tables. Those can
be worked around on VTd hardware by ma
On Wed, Aug 22, 2018 at 04:00:44PM +0100, Julien Grall wrote:
> libxl__arch_domain_build_info_setdefault
>
> A follow-up will require to modify default of multiple fields of
> build_info. So rename the function accordingly.
No functional change.
>
> Signed-off-by: Julien Grall
Reviewed-by: Ro
Hi Wei,
On 21/08/18 21:08, Wei Liu wrote:
On Tue, Aug 21, 2018 at 11:59:26AM -0700, Stefano Stabellini wrote:
On Tue, 21 Aug 2018, Julien Grall wrote:
On 08/21/2018 07:49 PM, Wei Liu wrote:
On Tue, Aug 21, 2018 at 07:33:56PM +0100, Julien Grall wrote:
Hi Wei,
On 08/21/2018 05:31 PM, Wei Liu
On Mi, 2018-08-22 at 16:41 +0200, Roger Pau Monné wrote:
> On Wed, Aug 22, 2018 at 05:02:43PM +0300, Alexandru Isaila wrote:
> >
> > This patch is focused on moving changing hvm_save_one() to save one
> > typecode from one vcpu and now that the save functions get data
> > from a
> > single vcpu we
On Wed, Aug 22, 2018 at 04:00:45PM +0100, Julien Grall wrote:
> Currently, the toolstack is considering Arm guest always PV. However,
> they are very similar to PVH because HW virtualization extension are used
> and QEMU is not started. So switch Arm guest type to PVH.
>
> To keep compatibility wi
On Wed, Aug 22, 2018 at 04:11:45PM +0100, Julien Grall wrote:
> Hi Wei,
>
> On 21/08/18 21:08, Wei Liu wrote:
> > On Tue, Aug 21, 2018 at 11:59:26AM -0700, Stefano Stabellini wrote:
> > > On Tue, 21 Aug 2018, Julien Grall wrote:
> > > > On 08/21/2018 07:49 PM, Wei Liu wrote:
> > > > > On Tue, Aug
> >
> > -if ( handler(d, h) != 0 )
> > +if ( handler(d->vcpu[0], h) != 0 )
> > {
> > printk(XENLOG_G_ERR
> > - "HVM%d save: failed to save type
> > %"PRIu16"\n",
> > + "HVM d%d save: failed to save t
On Wed, Aug 22, 2018 at 04:07:26PM +0100, Julien Grall wrote:
> Hi Roger,
>
> On 22/08/18 08:51, Roger Pau Monne wrote:
> > Introduce a new dom0-iommu=map-inclusive generic option that
> > supersedes iommu_inclusive_mapping. The previous behavior is preserved
> > and the option should only be enab
Hi,
On 22/08/18 16:22, Roger Pau Monné wrote:
On Wed, Aug 22, 2018 at 04:07:26PM +0100, Julien Grall wrote:
Hi Roger,
On 22/08/18 08:51, Roger Pau Monne wrote:
Introduce a new dom0-iommu=map-inclusive generic option that
supersedes iommu_inclusive_mapping. The previous behavior is preserved
a
On Wed, Aug 01, 2018 at 10:31:50AM +0100, Julien Grall wrote:
>
>
> On 01/08/18 00:27, Stefano Stabellini wrote:
> > Move a few constants defined by libxl_arm.c to
> > xen/include/public/device_tree_defs.h, so that they can be used from Xen
> > and libxl. Prepend GUEST_ to avoid conflicts.
> >
>
On Wed, Aug 22, 2018 at 06:22:15PM +0300, Isaila Alexandru wrote:
> > >
> > > -if ( handler(d, h) != 0 )
> > > +if ( handler(d->vcpu[0], h) != 0 )
> > > {
> > > printk(XENLOG_G_ERR
> > > - "HVM%d save: failed to save type
On Wed, Aug 22, 2018 at 05:08:18PM +0200, Roger Pau Monné wrote:
> On Wed, Aug 22, 2018 at 04:00:44PM +0100, Julien Grall wrote:
> > libxl__arch_domain_build_info_setdefault
> >
> > A follow-up will require to modify default of multiple fields of
> > build_info. So rename the function accordingly.
On Wed, Aug 22, 2018 at 03:55:46PM +0200, Valentin Vidic wrote:
> DRBD end for this seems rather simple, it only checks if the
> device->open_cnt is zero. So it would seem like drbd_release
> was not called yet when the block-drbd script is run?
>
>
> static enum drbd_state_rv
> is_valid_state(st
Hi Stefano,
On 01/08/18 00:27, Stefano Stabellini wrote:
xen/arm: move a few DT related defines to public/device_tree_defs.h
xen/arm: do not pass dt_host to make_memory_node and make_hypervisor_node
xen/arm: move evtchn_allocate call out of make_hypervisor_node
xen/ar
Hi,
On 16/07/18 18:26, Julien Grall wrote:
Julien Grall (15):
xen/arm: cpregs: Allow HSR_CPREG* to receive more than 1 parameter
xen/arm: cpregs: Fix typo in the documentation of TTBCR
xen/arm: p2m: Reduce the locking section in get_page_from_gva
xen/arm: p2m: Limit call to mem acces
On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
Hi, all.
Hi,
Can you CC relevant people on the cover letter? It would save me time to
dig into my e-mail :).
The purpose of this patch series is to add required support to be able to run
Xen on
Renesas Stout board [1] which uses SCIFA compat
On Wed, Aug 22, 2018 at 05:39:28PM +0200, Valentin Vidic wrote:
> On Wed, Aug 22, 2018 at 03:55:46PM +0200, Valentin Vidic wrote:
> > DRBD end for this seems rather simple, it only checks if the
> > device->open_cnt is zero. So it would seem like drbd_release
> > was not called yet when the block-d
On Wed, Aug 22, 2018 at 6:48 PM, Julien Grall wrote:
> On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
>>
>> Hi, all.
>
>
> Hi,
Hi, Julien
>
> Can you CC relevant people on the cover letter? It would save me time to dig
> into my e-mail :).
Sure.
>
>>
>> The purpose of this patch series is to add
Hi,
On 15/08/18 18:57, Stefano Stabellini wrote:
On Wed, 15 Aug 2018, Jan Beulich wrote:
Prevent the "BUG_ON(page_get_owner(pg) != d)" in
gnttab_unpopulate_status_frames() from triggering.
Reported-by: 王磊
Signed-off-by: Jan Beulich
---
It looks to me as if this was the only piece missing to
On Mon, Aug 20, 2018 at 05:57:25AM -0600, Jan Beulich wrote:
> >>> On 17.08.18 at 17:12, wrote:
> > --- a/xen/arch/x86/domctl.c
> > +++ b/xen/arch/x86/domctl.c
> > @@ -416,7 +416,7 @@ long arch_do_domctl(
> > ret = ioports_permit_access(d, fp, fp + np - 1);
> > else
> >
On Wed, Aug 22, 2018 at 05:51:54PM +0200, Roger Pau Monné wrote:
> Can you add some debug prints to check if xen_blkif_disconnect is
> indeed returning EBUSY (or some error) and that's preventing the
> device from closing correctly?
These are production nodes, but I'll try that on some test machin
On Wed, Aug 22, 2018 at 12:36:55PM +0200, Roger Pau Monne wrote:
> In order to build a tailored pvshim-only binary from Xen. Switch the
> PV shim build from the tools firmware into using the new defconfig.
>
> A diff of the .config generated for the pvshim firmware build before
> and after this ch
On Mon, Aug 20, 2018 at 06:37:28AM -0600, Jan Beulich wrote:
> >>> On 17.08.18 at 17:12, wrote:
> > Most are all HVM only. Provide stubs for !CONFIG_HVM.
> >
> > One exception is PIT emulation, which is available to both PV and HVM.
> >
> > Signed-off-by: Wei Liu
> > ---
> > xen/include/asm-x8
Hi Volodymyr,
On 22/08/18 15:11, Volodymyr Babchuk wrote:
Existing SMC wrapper call_smc() allows only 4 parameters and
returns only one value. This is enough for existing
use in PSCI code, but TEE mediator will need a call that is
fully compatible with ARM SMCCC.
This patch adds this call for bo
On Wed, Aug 22, 2018 at 05:11:33PM +0300, Volodymyr Babchuk wrote:
> Signed-off-by: Volodymyr Babchuk
> ---
> tools/libxl/libxl_arm.c | 29 +
> tools/libxl/libxl_create.c | 1 +
> tools/libxl/libxl_types.idl | 1 +
> tools/xl/xl_parse.c | 1 +
Please do
Hi Volodymyr,
On 22/08/18 15:11, Volodymyr Babchuk wrote:
This patch adds basic framework for TEE mediators. Guests can't talk
to TEE directly, we need some entity that will intercept request
and decide what to do with them. "TEE mediator" is a such entity.
This is how it works: user can build
On Mon, Aug 20, 2018 at 06:48:58AM -0600, Jan Beulich wrote:
> >>> On 17.08.18 at 17:12, wrote:
>
> According to your earlier patch, has_vlapic() implies is_hvm_domain(),
> so if anything is to be moved to the caller, then has_vlapic() (and
> is_hvm_domain() would then to be dropped altogether).
1 - 100 of 121 matches
Mail list logo