Hi all,
We are pleased to announce an update of Intel GVT-g for Xen.
Intel GVT-g is a full GPU virtualization solution with mediated pass-through,
starting from 4th generation Intel Core(TM) processors with Intel processor
graphics. A virtual GPU instance is maintained for each VM, with par
This run is configured for baseline tests only.
flight 75451 qemu-mainline real [real]
http://osstest.xensource.com/osstest/logs/75451/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
On Thu 18-10-18 19:18:25, Andrew Morton wrote:
[...]
> So this patch needs more work, yes?
Yes, I've talked to Arun (he is offline until next week) offlist and he
will play with this some more.
--
Michal Hocko
SUSE Labs
___
Xen-devel mailing list
Xen-
On Thu, 2018-10-18 at 18:46 +0100, Andrew Cooper wrote:
> Hello,
>
Hey,
This is very accurate and useful... thanks for it. :-)
> 1) A secrets-free hypervisor.
>
> Basically every hypercall can be (ab)used by a guest, and used as an
> arbitrary cache-load gadget. Logically, this is the first ha
On 10/18/18 1:57 PM, Andrew Cooper wrote:
> On 18/10/18 11:07, Razvan Cojocaru wrote:
>> When an new altp2m view is created very early on guest boot, the
>> display will freeze (although the guest will run normally). This
>> may also happen on resizing the display. The reason is the way
>> Xen curr
flight 128874 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128874/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a2e61f341d26a78751b2f19b5004c6bbfc8b4fa9
baseline version:
ovmf 7b500c606ad101fad5232
On Tue, Oct 16, 2018 at 06:16:41PM +0100, Ian Jackson wrote:
> Marek Marczykowski-Górecki writes ("[RFC PATCH v2 03/17] libxl: Handle Linux
> stubdomain specific QEMU options."):
> > From: Eric Shelton
> >
> > This patch creates an appropriate command line for the QEMU instance
> > running in a
commit d7880812b359 ("idle: Add the stack canary init to
cpu_startup_entry()") added the call to boot_init_stack_canary()
in cpu_startup_entry() in an #ifdef CONFIG_X86 statement, with
the intention to remove that #ifdef later.
While implementing stack protector for powerpc, it has been
observed t
On 19/10/2018 11:29, Christophe Leroy wrote:
> commit d7880812b359 ("idle: Add the stack canary init to
> cpu_startup_entry()") added the call to boot_init_stack_canary()
> in cpu_startup_entry() in an #ifdef CONFIG_X86 statement, with
> the intention to remove that #ifdef later.
>
> While impleme
flight 128877 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128877/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-freebsd broken
build-amd64-freebsd 6 host-bu
commit d7880812b359 ("idle: Add the stack canary init to
cpu_startup_entry()") added the call to boot_init_stack_canary()
in cpu_startup_entry() in an #ifdef CONFIG_X86 statement, with
the intention to remove that #ifdef later.
While implementing stack protector for powerpc, it has been
observed t
Le 19/10/2018 à 12:01, Juergen Gross a écrit :
On 19/10/2018 11:29, Christophe Leroy wrote:
commit d7880812b359 ("idle: Add the stack canary init to
cpu_startup_entry()") added the call to boot_init_stack_canary()
in cpu_startup_entry() in an #ifdef CONFIG_X86 statement, with
the intention to
flight 128855 xen-4.10-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128855/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 10 debian-hvm-install
fail never pass
test-amd64-i386-xl
On Tue, Oct 09, 2018 at 01:03:06PM +0200, Juergen Gross wrote:
> include/grub/offsets.h needs some defines for Xen PVH mode.
>
> Add them. While at it line up the values in the surrounding lines to
> start at the same column.
>
> Signed-off-by: Juergen Gross
> ---
> include/grub/offsets.h | 21 ++
This run is configured for baseline tests only.
flight 75452 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75452/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote:
> Add the hooks to current code needed for Xen PVH.
I am not against the code itself but it would be nice to know why you
add, AIUI, just stubs here which will be filled with proper code later.
Daniel
On 19/10/18 09:09, Dario Faggioli wrote:
> On Thu, 2018-10-18 at 18:46 +0100, Andrew Cooper wrote:
>> Hello,
>>
> Hey,
>
> This is very accurate and useful... thanks for it. :-)
>
>> 1) A secrets-free hypervisor.
>>
>> Basically every hypercall can be (ab)used by a guest, and used as an
>> arbitrar
flight 128858 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128858/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-arndale 7 xen-boot fail in 128841 pass in 128858
test-amd64-amd64-libvirt-pair 24 g
On Tue, Oct 09, 2018 at 01:03:08PM +0200, Juergen Gross wrote:
> Add the code for the Xen PVH mode boot entry.
>
> Signed-off-by: Juergen Gross
> ---
> grub-core/kern/i386/xen/startup_pvh.S | 50
> +++
> 1 file changed, 50 insertions(+)
>
> diff --git a/grub-core/
On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote:
> Add the needed code to setup the hypercall page for calling into the
> Xen hypervisor.
>
> Signed-off-by: Juergen Gross
> ---
> grub-core/kern/i386/xen/pvh.c | 70
> +++
> 1 file changed, 70
On Tue, Oct 09, 2018 at 01:03:10PM +0200, Juergen Gross wrote:
> Retrieve the memory map from the hypervisor and normalize it to contain
> no overlapping entries and to be sorted by address.
>
> Signed-off-by: Juergen Gross
> ---
> grub-core/kern/i386/xen/pvh.c | 98
> +++
On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote:
> Initialize the needed Xen specific data. This is:
>
> - the Xen start of day page containing the console and Xenstore ring
> page PFN and event channel
> - the grant table
> - the shared info page
>
> Set the RSDP address for the gu
On 19/10/18 13:30, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote:
>> +
>> + __arg0 = a0;
>> + __arg1 = a1;
>> + __arg2 = a2;
>> + __arg3 = a3;
>> + __arg4 = a4;
>> + asm volatile ("call *%[callno]"
>> +: "=r" (__res), "+r" (__arg0), "+r" (__ar
On Thu, Sep 13, 2018 at 5:39 PM George Dunlap wrote:
>
> Credit2 was declared "supported" in 4.8, and as of 4.10 had two other
> critical features implemented (soft affinity / NUMA and caps).
>
> Why change the default?
>
> The code is better: more predictable, less jitter, easier to determine
> h
On Thu, Oct 18, 2018 at 07:16:04PM -0700, Joe Jin wrote:
> On 10/18/18 4:52 PM, Konrad Rzeszutek Wilk wrote:
> > On Tue, Oct 16, 2018 at 03:21:16PM -0700, Joe Jin wrote:
> >> xen_swiotlb_{alloc,free}_coherent() allocate/free memory by order,
> >> but passed required size to range_straddles_page_bou
Commit 54ec59f6b0 "xen/arm: vgic-v3: Don't create empty re-distributor
regions" breaks compilation when using the new vGIC.
This is because the field nr_regions is not existing in the vgic
structure. For simplicity, as vGICv3 is not yet imported, disable GICv3.
Reported-by: Andrew Cooper
Signed-
On Fri, Oct 12, 2018 at 03:32:59AM -0600, Jan Beulich wrote:
>In commit 303066fdb1e ("VMX: fix interaction of APIC-V and Viridian
>emulation") I screwed up quite heavily: Instead of clearing SVI, RVI was
>cleared. Furthermore, unconditional clearing of SVI is wrong too - other
>ISR bits should be t
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/pv/emul-priv-op.c | 8
xen/include/asm-x86/traps.h| 5 -
2 files changed, 4 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/pv/emul-priv-op.c b/xen/arch/x86/pv/emul-priv-op.c
index 6422f91..b85c65f 100644
--- a/xen/arch
This function is called by both PV and HVM. Unfortunately the code is
very convoluted. We can reason that code between the call to
hvm_set_info_guest and out label is PV only. Put that portion under
CONFIG_PV.
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/domain.c | 12 +---
1 file
Provide a stub for pv_inject_event, put code that accesses PV fields
and GDT / LDT fault handling code under CONFIG_PV.
Signed-off-by: Wei Liu
---
v2: reduce the amount of ifdefs
---
xen/arch/x86/traps.c | 23 +++
xen/include/asm-x86/domain.h | 7 +++
2 files cha
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/x86_64/traps.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/arch/x86/x86_64/traps.c b/xen/arch/x86/x86_64/traps.c
index 27154f2..2b7ec7d 100644
--- a/xen/arch/x86/x86_64/traps.c
+++ b/xen/arch/x86/x86_64/traps.c
@@ -267,6 +267,7
This is a bit more complicated than the HVM case because system
domains have PV guest type. Leave them like that.
Signed-off-by: Wei Liu
---
v2:
1. Remove useless ASSERTs.
2. Rewrite comment.
---
xen/common/domain.c | 23 +--
1 file changed, 21 insertions(+), 2 deletions(-)
Signed-off-by: Wei Liu
---
v2: panic instead.
---
xen/arch/x86/dom0_build.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c
index dcd7afb..0f0977d 100644
--- a/xen/arch/x86/dom0_build.c
+++ b/xen/arch/x86/dom0_bui
Start by putting hypercall handlers which are supposed to be PV only
under CONFIG_PV. Shuffle some code around to avoid introducing
excessive numbers of CONFIG_PV.
Signed-off-by: Wei Liu
---
v2: rebase
---
xen/arch/x86/hvm/hypercall.c| 2 +-
xen/arch/x86/mm.c | 168 ++
Hi all
This series makes CONFIG_PV work.
Booting a hypervisor with PVH Dom0 works.
Due to an issue in Xen implementation, XTF tests cause hypervisor to crash (seen
on staging as well). But with a local patch to work around the issue,
all XTF HVM tests passed.
See v1 cover letter for more inform
The issue described in 10d03342912 is applicable to both PV and HVM
domains that have access to that SMI CMD port.
Move the hook to AMD code, remove its pv_ prefix and call it in both
PV and HVM code.
Signed-off-by: Wei Liu
---
v2: rewritten
---
xen/arch/x86/cpu/amd.c | 4 +++-
xen/arc
They are useful to PV only.
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/domctl.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
index 115ddf6..8ec0b9b 100644
--- a/xen/arch/x86/domctl.c
+++ b/xen/arch/x86/domctl.c
@@ -608,6 +608,7 @@ l
On 19/10/2018 13:54, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:06PM +0200, Juergen Gross wrote:
>> include/grub/offsets.h needs some defines for Xen PVH mode.
>>
>> Add them. While at it line up the values in the surrounding lines to
>> start at the same column.
>>
>> Signed-off-by: Juerg
On 19/10/2018 14:05, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote:
>> Add the hooks to current code needed for Xen PVH.
>
> I am not against the code itself but it would be nice to know why you
> add, AIUI, just stubs here which will be filled with proper cod
On 19/10/2018 14:17, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:08PM +0200, Juergen Gross wrote:
>> Add the code for the Xen PVH mode boot entry.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> grub-core/kern/i386/xen/startup_pvh.S | 50
>> +++
>> 1 file cha
Put the code in smpboot.c under CONFIG_PV. Not that we don't need to
set up a stub here because entry.S already does that.
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/smpboot.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index 35a
The symbol will not be available when PV is disabled.
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/hvm/vmx/vmcs.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index d9747b4..282677a 100644
--- a/xen/arch/x86/hvm/vmx/v
When PV is disabled those symbols won't be available. It is impossible
for Xen to hit #DB there.
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/traps.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index 002e98f..7cca072 100644
--- a/xen/a
Skip building x86_64/compat/entry.S and put CONFIG_PV in
x86_64/entry.S.
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/x86_64/Makefile | 2 +-
xen/arch/x86/x86_64/entry.S | 30 --
2 files changed, 29 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/x86
Change "guest" to "domain" where appropriate because "guest" doesn't
include Domain 0.
Signed-off-by: Wei Liu
---
v2: new
---
xen/arch/x86/Kconfig | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig
index c7e97e2..b4bd83e 100644
Split the file into two halves. The first half pertains to PV guest
code while the second half is mostly used by the hypervisor itself to
handle interrupts and exceptions.
No functional change intended.
Signed-off-by: Wei Liu
---
v2: new, requested by Andrew
---
xen/arch/x86/x86_64/entry.S | 94
Signed-off-by: Wei Liu
---
v2: guest -> domain
---
xen/arch/x86/Kconfig | 8
1 file changed, 8 insertions(+)
diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig
index 548cbf9..c7e97e2 100644
--- a/xen/arch/x86/Kconfig
+++ b/xen/arch/x86/Kconfig
@@ -37,6 +37,14 @@ source "arch/Kconf
On 19/10/2018 14:30, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote:
>> Add the needed code to setup the hypercall page for calling into the
>> Xen hypervisor.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> grub-core/kern/i386/xen/pvh.c | 70
>>
On 19/10/18 15:28, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> v2: panic instead.
> ---
> xen/arch/x86/dom0_build.c | 9 +++--
> 1 file changed, 7 insertions(+), 2 deletions(-)
>
> diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c
> index dcd7afb..0f0977d 100644
> --- a/
On 19/10/2018 14:40, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:10PM +0200, Juergen Gross wrote:
>> Retrieve the memory map from the hypervisor and normalize it to contain
>> no overlapping entries and to be sorted by address.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> grub-core/kern/i
On 19/10/18 15:28, Wei Liu wrote:
> Signed-off-by: Wei Liu
Nice. Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On 19/10/2018 14:48, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote:
>> Initialize the needed Xen specific data. This is:
>>
>> - the Xen start of day page containing the console and Xenstore ring
>> page PFN and event channel
>> - the grant table
>> - the sha
The PV and HVM code both have a copy of these, which gives the false
impression in the context switch code that they are PV/HVM specific.
Move the storage into struct vcpu_msrs, and update all users to match.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Roger Pau Monné
CC:
On 19/10/18 15:28, Wei Liu wrote:
> They are useful to PV only.
>
> Signed-off-by: Wei Liu
How easy is this to turn into a domaincreate flag? It is yet another
singleton operation which complicated Xen's init/cleanup path having to
cope with it being enabled after the fact.
(This is a slightly
A PVH Dom0 might use TSC scaling or other HVM specific TSC
adjustments, so only short-circuit the TSC setup for a classic PV
Dom0.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Wei Liu
---
xen/arch/x86/time.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
di
When switching the memory decoding bit in the command register the
rest of the changes where dropped, leading to only the memory decoding
bit being updated.
Fix this by unconditionally writing the guest-requested command except
for the memory decoding bit, which will be updated once the p2m
change
PV Dom0 has a quirk for some AMD processors, where enabling ACPI can
also enable C1E mode. Apply the same workaround as done on PV for a
PVH Dom0, which consist on trapping accesses to the SMI command IO
port and disabling C1E if ACPI is enabled.
Reported-by: Jan Beulich
Signed-off-by: Roger Pau
Make sure the MSIX MMIO regions don't have p2m entries setup, so that
accesses to them trap into the hypervisor and can be handled by vpci.
This is a side-effect of commit 042678762 for PVH Dom0, which added
mappings for all the reserved regions into the Dom0 p2m.
Signed-off-by: Roger Pau Monné
BAR map/unmap is a long running operation that needs to be preempted
in order to avoid overrunning the assigned vCPU time (or even
triggering the watchdog).
Current logic for this preemption is wrong, and won't work at all for
AMD since only Intel makes use of hvm_io_pending (and even in that
case
Add an option to allow trapping accesses to IO port 0xe9 for a PVH
Dom0, so it can print to the HVM debug console. Note this is not
enabled by default in order to prevent clashes with hardware on the
system using 0xe9.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Wei
Hello,
The following series contain miscellaneous fixes for a PVH Dom0. I've
found out this issues while trying to boot on an AMD EPYC box.
The series can be found on my git repo:
git://xenbits.xen.org/people/royger/xen.git fixes-pvh-v2
Thanks, Roger.
Roger Pau Monne (7):
x86/pvh: fix TSC mo
No functional change intended.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Wei Liu
Cc: George Dunlap
Cc: Ian Jackson
Cc: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
---
xen/arch/x86/hvm/hvm.c| 4 ++--
xen/drivers/
On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote:
> Add the hooks to current code needed for Xen PVH.
>
> Signed-off-by: Juergen Gross
> ---
> grub-core/kern/i386/xen/pvh.c | 36
> +++
> grub-core/kern/i386/xen/startup_pvh.S | 29
On 19/10/18 15:28, Wei Liu wrote:
> This is a bit more complicated than the HVM case because system
> domains have PV guest type. Leave them like that.
>
> Signed-off-by: Wei Liu
> ---
> v2:
> 1. Remove useless ASSERTs.
> 2. Rewrite comment.
> ---
> xen/common/domain.c | 23 +-
On Fri, Oct 19, 2018 at 04:20:21PM +0100, Roger Pau Monne wrote:
> PV Dom0 has a quirk for some AMD processors, where enabling ACPI can
> also enable C1E mode. Apply the same workaround as done on PV for a
> PVH Dom0, which consist on trapping accesses to the SMI command IO
> port and disabling C1E
On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote:
> Add the needed code to setup the hypercall page for calling into the
> Xen hypervisor.
>
> Signed-off-by: Juergen Gross
> ---
> grub-core/kern/i386/xen/pvh.c | 70
> +++
> 1 file changed, 70
On 19/10/18 15:28, Wei Liu wrote:
> The symbol will not be available when PV is disabled.
>
> Signed-off-by: Wei Liu
> ---
> v2: new
> ---
> xen/arch/x86/hvm/vmx/vmcs.c | 7 +++
> 1 file changed, 7 insertions(+)
>
> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
> inde
On 19/10/18 15:28, Wei Liu wrote:
> When PV is disabled those symbols won't be available. It is impossible
> for Xen to hit #DB there.
>
> Signed-off-by: Wei Liu
Acked-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https:/
On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote:
> Initialize the needed Xen specific data. This is:
>
> - the Xen start of day page containing the console and Xenstore ring
> page PFN and event channel
> - the grant table
> - the shared info page
>
> Set the RSDP address for the
On 19/10/18 15:28, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> v2: guest -> domain
> ---
> xen/arch/x86/Kconfig | 8
> 1 file changed, 8 insertions(+)
>
> diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig
> index 548cbf9..c7e97e2 100644
> --- a/xen/arch/x86/Kconfig
> +++ b/xen
On 19/10/2018 17:33, Roger Pau Monné wrote:
> On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote:
>> Add the hooks to current code needed for Xen PVH.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> grub-core/kern/i386/xen/pvh.c | 36
>> +++
>> gru
On Fri, Oct 19, 2018 at 03:28:32PM +0100, Wei Liu wrote:
> The issue described in 10d03342912 is applicable to both PV and HVM
> domains that have access to that SMI CMD port.
>
> Move the hook to AMD code, remove its pv_ prefix and call it in both
> PV and HVM code.
>
> Signed-off-by: Wei Liu
Right now, if either an hard or soft-affinity are explicitly specified
in a domain's config file, automatic NUMA placement is skipped. However,
automatic NUMA placement affects only the soft-affinity of the domain
which is being created.
Therefore, it is ok to let it run if an hard-affinity is spe
On 19/10/18 15:28, Wei Liu wrote:
> Change "guest" to "domain" where appropriate because "guest" doesn't
> include Domain 0.
>
> Signed-off-by: Wei Liu
> ---
> v2: new
> ---
> xen/arch/x86/Kconfig | 8
> 1 file changed, 4 insertions(+), 4 deletions(-)
>
> diff --git a/xen/arch/x86/Kconfi
On 19/10/18 15:28, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> v2: new
> ---
> xen/arch/x86/x86_64/traps.c | 6 ++
> 1 file changed, 6 insertions(+)
>
> diff --git a/xen/arch/x86/x86_64/traps.c b/xen/arch/x86/x86_64/traps.c
> index 27154f2..2b7ec7d 100644
> --- a/xen/arch/x86/x86_64/traps
On 19/10/2018 17:40, Roger Pau Monné wrote:
> On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote:
>> Add the needed code to setup the hypercall page for calling into the
>> Xen hypervisor.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> grub-core/kern/i386/xen/pvh.c | 70
>> +
On Fri, Oct 19, 2018 at 04:42:24PM +0100, Andrew Cooper wrote:
> On 19/10/18 15:28, Wei Liu wrote:
> > The symbol will not be available when PV is disabled.
> >
> > Signed-off-by: Wei Liu
> > ---
> > v2: new
> > ---
> > xen/arch/x86/hvm/vmx/vmcs.c | 7 +++
> > 1 file changed, 7 insertions(+)
Hello,
I would like to use Dom0 with PVH mode together with PCI passthrough in order
to compare PVH and HVM in a real test scenario for early adoption of PVH. The
minimum setup needed is to have the possibility to assign to a domain a PCI
device that is passthrough.
Are there any patches in re
On 19/10/18 15:28, Wei Liu wrote:
> Put the code in smpboot.c under CONFIG_PV. Not that we don't need to
> set up a stub here because entry.S already does that.
>
> Signed-off-by: Wei Liu
The stub isn't the purpose of the code. This code is to switch between
SYS_DESC_trap_gate and SYS_DESC_irq_g
On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote:
> Initialize the needed Xen specific data. This is:
>
> - the Xen start of day page containing the console and Xenstore ring
> page PFN and event channel
> - the grant table
> - the shared info page
>
> Set the RSDP address for the
On 19/10/18 17:00, Wei Liu wrote:
> On Fri, Oct 19, 2018 at 04:42:24PM +0100, Andrew Cooper wrote:
>> On 19/10/18 15:28, Wei Liu wrote:
>>> The symbol will not be available when PV is disabled.
>>>
>>> Signed-off-by: Wei Liu
>>> ---
>>> v2: new
>>> ---
>>> xen/arch/x86/hvm/vmx/vmcs.c | 7 +++
On 10/19/18 6:43 AM, Konrad Rzeszutek Wilk wrote:
> I will fold in the stack trace in later tonight. Thanks!
Thank you very much!
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
Hello,
Thanks for your interest and testing of PVH Dom0!
On Fri, Oct 19, 2018 at 04:08:45PM +, Vasile, Alexandru-catalin wrote:
> Hello,
>
> I would like to use Dom0 with PVH mode together with PCI passthrough in order
> to compare PVH and HVM in a real test scenario for early adoption of P
flight 128878 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128878/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 16 guest-localmigrate/x10 fail REGR.
vs. 128857
T
On 19/10/2018 18:10, Roger Pau Monné wrote:
> On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote:
>> Initialize the needed Xen specific data. This is:
>>
>> - the Xen start of day page containing the console and Xenstore ring
>> page PFN and event channel
>> - the grant table
>> - the
flight 128859 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128859/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-libvirt-qcow2 10 debian-di-install fail REGR. vs. 128833
Tests which did not suc
Hello,
I noticed this most recently in the AVIC series from Janakarajan. The
global svm_avic boolean was left off-by-default because it doesn't work
with nested virt yet. The code in question was actually inherited from
the VT-x side, and the general problem is systemic with how Xen has been
dev
On 19/10/2018 18:57, Andrew Cooper wrote:
> In practice, having fine grain control of all the features like would be
> excellent for testing purposes, because it allows you to boot two
> otherwise-identical VMs with one configuration difference between them.
>
> In the spirit of the already in pro
On Thu, 18 Oct 2018 at 23:42, Andrew Cooper
wrote:
> On 18/10/2018 19:45, Aaron Gray wrote:
>
> On Thu, 18 Oct 2018 at 19:11, Andrew Cooper
> wrote:
>
>> On 18/10/2018 18:57, Aaron Gray wrote:
>> > I have two ASUS PRIME Z270-A machines based on Intel Z270 chipset and
>> > am wondering about when
flight 128882 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128882/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
Hi Christophe,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on xen-tip/linux-next]
[also build test ERROR on v4.19-rc8 next-20181019]
[if your patch is applied to the wrong git tree, please drop us a note to help
improve the system]
url:
https://github.com/0day
On Fri, 19 Oct 2018, Julien Grall wrote:
> Commit 54ec59f6b0 "xen/arm: vgic-v3: Don't create empty re-distributor
> regions" breaks compilation when using the new vGIC.
>
> This is because the field nr_regions is not existing in the vgic
> structure. For simplicity, as vGICv3 is not yet imported,
flight 75454 distros-debian-jessie real [real]
http://osstest.xensource.com/osstest/logs/75454/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-i386
Hi Christophe,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on xen-tip/linux-next]
[also build test ERROR on v4.19-rc8 next-20181019]
[if your patch is applied to the wrong git tree, please drop us a note to help
improve the system]
url:
https://github.com/0day
This run is configured for baseline tests only.
flight 75457 linux-3.18 real [real]
http://osstest.xensource.com/osstest/logs/75457/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
On Wed, 17 Oct 2018, Milan Boberic wrote:
> Hi,
> >
> > The device tree with everything seems to be system.dts, that was enough
> > :-) I don't need the dtsi files you used to build the final dts, I only
> > need the one you use in uboot and for your guest.
>
> I wasn't sure so I sent everything
Hi Wei,
Any chances you can review this series soon? I would love for it to be
merged before the 4.12 code freeze.
FYI I am making progress upstreaming the device tree binding, they asked
for a very minor change, which I am happy to include in the next version
of the series:
https://marc.info/?l
On Wed, 17 Oct 2018, Julien Grall wrote:
> On 17/10/2018 15:42, Stefano Stabellini wrote:
> > On Mon, 15 Oct 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 05/10/2018 19:47, Stefano Stabellini wrote:
> > > > It will be #included by a file in a xen/arch/arm subdirectory.
> > > >
> > >
flight 128884 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128884/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Mon, 15 Oct 2018, Julien Grall wrote:
> Hi,
>
> On 05/10/2018 19:47, Stefano Stabellini wrote:
> > Introduce an allocate_memory function able to allocate memory for DomUs
> > and map it at the right guest addresses, according to the guest memory
> > map: GUEST_RAM0_BASE and GUEST_RAM1_BASE.
>
1 - 100 of 113 matches
Mail list logo