flight 128902 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128902/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 16 guest-localmigrate/x10 fail
REGR. vs. 128847
Regre
flight 128924 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128924/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d28daaddb3e732468e930a809d3d3943a5de9558
baseline version:
ovmf 95aea2fac9117e95ead90
On Mon, Oct 15, 2018 at 01:06:12PM +0100, Andrew Cooper wrote:
>On 15/10/18 11:30, Roger Pau Monné wrote:
>> Hello,
>>
>> Wei recently discovered an issue when running a Linux PVH Dom0 on a
>> box with a Intel Family 6 (0x6), Model 158 (0x9e), Stepping 9 (raw
>> 000906e9) CPU, we are not sure wheth
On 22/10/2018 08:33, Chao Gao wrote:
> On Mon, Oct 15, 2018 at 01:06:12PM +0100, Andrew Cooper wrote:
>> On 15/10/18 11:30, Roger Pau Monné wrote:
>>> Hello,
>>>
>>> Wei recently discovered an issue when running a Linux PVH Dom0 on a
>>> box with a Intel Family 6 (0x6), Model 158 (0x9e), Stepping 9
This run is configured for baseline tests only.
flight 75474 xen-4.9-testing real [real]
http://osstest.xensource.com/osstest/logs/75474/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
On Fri, 2018-10-19 at 13:17 +0100, Andrew Cooper wrote:
> [...]
>
> > Therefore, although I certainly think we _must_ have the proper
> > scheduler enhancements in place (and in fact I'm working on that :-D)
> > it should IMO still be possible for the user to decide whether or not
> > to use them
Hi,
On 09/10/2018 00:37, Stefano Stabellini wrote:
reserved-memory regions should be mapped as normal memory.
This is already the case with p2m_mmio_direct_c. The hardware domain
should have full control on the resulting attributes via its stage-1
mappings. So what's wrong with that p2m type
flight 128930 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128930/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-freebsd broken
build-amd64-freebsd 6 host-bu
Hi Stefano,
On 18/10/2018 23:10, Stefano Stabellini wrote:
From: Stefano Stabellini
Introduce a device tree binding for Xen reserved-memory regions. They
are used to share memory across VMs from the VM config files. (See
static_shm config option.)
Signed-off-by: Stefano Stabellini
---
Change
On 2018-10-19 13:37, Michal Hocko wrote:
On Thu 18-10-18 19:18:25, Andrew Morton wrote:
[...]
So this patch needs more work, yes?
Yes, I've talked to Arun (he is offline until next week) offlist and he
will play with this some more.
Converted totalhigh_pages, totalram_pages and zone->managed
On Fri, Oct 19, 2018 at 06:52:02PM -0400, Boris Ostrovsky wrote:
> On 10/19/18 11:14 AM, Andrew Cooper wrote:
> > diff --git a/xen/include/asm-x86/msr.h b/xen/include/asm-x86/msr.h
> > index 7a061b2..c1cb38f 100644
> > --- a/xen/include/asm-x86/msr.h
> > +++ b/xen/include/asm-x86/msr.h
> > @@ -287,
On 22/10/18 11:53, Wei Liu wrote:
> On Fri, Oct 19, 2018 at 06:52:02PM -0400, Boris Ostrovsky wrote:
>> On 10/19/18 11:14 AM, Andrew Cooper wrote:
>>> diff --git a/xen/include/asm-x86/msr.h b/xen/include/asm-x86/msr.h
>>> index 7a061b2..c1cb38f 100644
>>> --- a/xen/include/asm-x86/msr.h
>>> +++ b/x
On Mon, Oct 22, 2018 at 11:57:17AM +0100, Andrew Cooper wrote:
> On 22/10/18 11:53, Wei Liu wrote:
> > On Fri, Oct 19, 2018 at 06:52:02PM -0400, Boris Ostrovsky wrote:
> >> On 10/19/18 11:14 AM, Andrew Cooper wrote:
> >>> diff --git a/xen/include/asm-x86/msr.h b/xen/include/asm-x86/msr.h
> >>> inde
On Fri, Oct 19, 2018 at 05:09:43PM +0100, Andrew Cooper wrote:
> On 19/10/18 15:28, Wei Liu wrote:
> > Put the code in smpboot.c under CONFIG_PV. Not that we don't need to
> > set up a stub here because entry.S already does that.
> >
> > Signed-off-by: Wei Liu
>
> The stub isn't the purpose of th
On Fri, Oct 19, 2018 at 05:52:44PM +0200, Juergen Gross wrote:
> On 19/10/2018 17:33, Roger Pau Monné wrote:
> > On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote:
> >> Add the hooks to current code needed for Xen PVH.
> >>
> >> Signed-off-by: Juergen Gross
> >> ---
> >> grub-core/ker
On 22/10/2018 13:16, Daniel Kiper wrote:
> On Fri, Oct 19, 2018 at 05:52:44PM +0200, Juergen Gross wrote:
>> On 19/10/2018 17:33, Roger Pau Monné wrote:
>>> On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote:
Add the hooks to current code needed for Xen PVH.
Signed-off-by:
On Fri, Oct 19, 2018 at 04:50:25PM +0200, Juergen Gross wrote:
> On 19/10/2018 14:17, Daniel Kiper wrote:
> > On Tue, Oct 09, 2018 at 01:03:08PM +0200, Juergen Gross wrote:
> >> Add the code for the Xen PVH mode boot entry.
> >>
> >> Signed-off-by: Juergen Gross
> >> ---
> >> grub-core/kern/i386/
On 22/10/18 12:12, Wei Liu wrote:
> On Fri, Oct 19, 2018 at 05:09:43PM +0100, Andrew Cooper wrote:
>> On 19/10/18 15:28, Wei Liu wrote:
>>> Put the code in smpboot.c under CONFIG_PV. Not that we don't need to
>>> set up a stub here because entry.S already does that.
>>>
>>> Signed-off-by: Wei Liu
On Tue, Oct 09, 2018 at 01:03:12PM +0200, Juergen Gross wrote:
> Add all usable memory regions to grub memory management and add the
> needed mmap iterate code.
I am missing a few words why this patch is needed. Especially why
grub_machine_mmap_iterate() has to belong to this patch. However,
I thi
On Tue, Oct 09, 2018 at 01:03:13PM +0200, Juergen Gross wrote:
> Add the modifications to the build system needed to build a xenpvh
> grub.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Daniel Kiper
> ---
> gentpl.py | 4 ++--
> grub-core/Makefile.am | 12
On 22/10/2018 13:31, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:12PM +0200, Juergen Gross wrote:
>> Add all usable memory regions to grub memory management and add the
>> needed mmap iterate code.
>
> I am missing a few words why this patch is needed. Especially why
> grub_machine_mmap_it
On Tue, Oct 09, 2018 at 01:03:14PM +0200, Juergen Gross wrote:
> From: Hans van Kranenburg
>
> This solves the build failing with "Error: no symbol table and no
> .moddeps section"
>
> Also see:
> - 6371e9c10433578bb236a8284ddb9ce9e201eb59
> - https://savannah.gnu.org/bugs/?49012
>
> Signed-off-by
On 22/10/2018 13:41, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:13PM +0200, Juergen Gross wrote:
>> Add the modifications to the build system needed to build a xenpvh
>> grub.
>>
>> Signed-off-by: Juergen Gross
>> Reviewed-by: Daniel Kiper
>> ---
>> gentpl.py | 4 ++--
On Tue, Oct 09, 2018 at 01:03:15PM +0200, Juergen Gross wrote:
> Support mkimage for xenpvh.
>
> In order to avoid using plain integers for the ELF notes use the
> available Xen include instead. While at it replace the plain numbers
> for Xen PV mode, too.
>
> Signed-off-by: Juergen Gross
+/- XEN
On Tue, Oct 09, 2018 at 01:03:16PM +0200, Juergen Gross wrote:
> Add xenpvh support to grub-install.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Daniel Kiper
+/- XENPVH play still Reviewed-by: Daniel Kiper
Daniel
___
Xen-devel mailing list
Xen-d
On Tue, Oct 09, 2018 at 01:03:17PM +0200, Juergen Gross wrote:
> Support platform i386/xenpvh in configure.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Daniel Kiper
+/- XENPVH/xenpvh play still Reviewed-by: Daniel Kiper
Daniel
___
Xen-devel mail
On Mon, Oct 22, 2018 at 01:43:53PM +0200, Juergen Gross wrote:
> On 22/10/2018 13:31, Daniel Kiper wrote:
> > On Tue, Oct 09, 2018 at 01:03:12PM +0200, Juergen Gross wrote:
> >> Add all usable memory regions to grub memory management and add the
> >> needed mmap iterate code.
> >
> > I am missing a
flight 128927 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128927/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 073891a3e74059e996258e32b56b3f0770c6fe55
baseline version:
ovmf d28daaddb3e732468e930
flight 128931 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128931/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-xsm 7 xen-boot fail REGR. vs. 128884
test-armhf-a
With almost all users of keyhandler_scratch gone, clean up the 3 remaining
users and drop the buffer.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Roger Pau Monné
v2:
* Use a static __initdata buffer for EFI, rather than a stack variable.
* Drop (int) casts for periodic
This removes all use of keyhandler_scratch as a bounce-buffer for the rendered
string. In some cases, collapse combine adjacent printk()'s which are writing
parts of the same line.
No functional change.
Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
Acked-by: Jan Beulich
Acked-by: Juergen
This removes all use of keyhandler_scratch as a bounce-buffer for the rendered
string.
No functional change.
Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
Reviewed-by: Jan Beulich
---
v2:
* Fix %pd typo
* Use ->bits for cpumasks
---
xen/arch/x86/cpu/mcheck/mce.c | 9 ++---
xen/arch/
I was trying to debug a cpumask problem, and got irritated with how awkard it
was to render and print the masks. Luckily, the fix is quite simple and far
nicer to use.
The overall diffstat is to patch 4 is:
add/remove: 0/4 grow/shrink: 2/11 up/down: 603/-1191 (-588)
Function
This removes all use of keyhandler_scratch as a bounce-buffer for the rendered
string. In some cases, collapse combine adjacent printk()'s which are writing
parts of the same line.
No functional change.
Signed-off-by: Andrew Cooper
Acked-by: George Dunlap
Acked-by: Dario Faggioli
---
CC: Josh
All callers have been convered to using %*pb[l]. In the unlikely case that
future code wants to retain this functionaly, it can be replicated in a more
convenient fashon with snprintf().
Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
Reviewed-by: Dario Faggioli
---
CC: Jan Beulich
CC: Roger P
flight 128910 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128910/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 128873
test-armhf-armhf-libvirt 14 sav
On 19/10/18 19:22, Juergen Gross wrote:
> On 19/10/2018 18:57, Andrew Cooper wrote:
>> In practice, having fine grain control of all the features like would be
>> excellent for testing purposes, because it allows you to boot two
>> otherwise-identical VMs with one configuration difference between t
ARM Dom0 creation was broken by the said commit because ARM neither
provided XEN_DOMCTL_CDF_hvm_guest nor had CONFIG_PV set.
Set XEN_DOMCTL_CDF_hvm_guest flag for ARM Dom0 to fix the issue. Also
set XEN_DOMCTL_CDF_hap while at it.
Signed-off-by: Wei Liu
---
xen/arch/arm/setup.c | 1 +
1 file ch
On 22/10/18 14:40, Wei Liu wrote:
> ARM Dom0 creation was broken by the said commit because ARM neither
> provided XEN_DOMCTL_CDF_hvm_guest nor had CONFIG_PV set.
>
> Set XEN_DOMCTL_CDF_hvm_guest flag for ARM Dom0 to fix the issue. Also
> set XEN_DOMCTL_CDF_hap while at it.
>
> Signed-off-by: Wei L
Hi Wei,
On 10/22/18 2:40 PM, Wei Liu wrote:
ARM Dom0 creation was broken by the said commit because ARM neither
provided XEN_DOMCTL_CDF_hvm_guest nor had CONFIG_PV set.
Set XEN_DOMCTL_CDF_hvm_guest flag for ARM Dom0 to fix the issue. Also
set XEN_DOMCTL_CDF_hap while at it.
Signed-off-by: Wei
This run is configured for baseline tests only.
flight 75476 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75476/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
On Wed, 12 Sep 2018 16:55:24 +0400
Marc-André Lureau wrote:
> global_props is only used for Xen xen_compat_props. It's a static
minor nit:
should be AccelClass::global_props
> array of GlobalProperty, like machine globals in SET_MACHINE_COMPAT().
> Let's register the globals the same way, withou
On Thu, Oct 18, 2018 at 06:46:22PM +0100, Andrew Cooper wrote:
> Hello,
>
> This is an accumulation and summary of various tasks which have been
> discussed since the revelation of the speculative security issues in
> January, and also an invitation to discuss alternative ideas. They are
> x86 sp
Hi,
> I think we want to fully understand how many other interrupts the
> baremetal guest is receiving. To do that, we can modify my previous
> patch to suppress any debug messages for virq=68. That way, we should
> only see the other interrupts. Ideally there would be none.
> diff --git a/xen/arc
Adding Stefan to Cc.
Should we take this to the spexen or another mailing list?
On Mon, 2018-10-22 at 15:55 +0100, Wei Liu wrote:
> On Thu, Oct 18, 2018 at 06:46:22PM +0100, Andrew Cooper wrote:
> > Hello,
> >
> > This is an accumulation and summary of various tasks which have been
> > discusse
On 22/10/18 16:09, Woodhouse, David wrote:
> Adding Stefan to Cc.
>
> Should we take this to the spexen or another mailing list?
Now that L1TF is public, so is all of this. I see no reason to continue
it in private.
~Andrew
___
Xen-devel mailing list
Signed-off-by: Wei Liu
---
.gitlab-ci.yml | 32
1 file changed, 32 insertions(+)
diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index bf6bf7d895..96d7e7f759 100644
--- a/.gitlab-ci.yml
+++ b/.gitlab-ci.yml
@@ -269,3 +269,35 @@ ubuntu-xenial-gcc-debug:
CONTAINE
Signed-off-by: Wei Liu
---
.gitlab-ci.yml | 32
1 file changed, 32 insertions(+)
diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index bf6bf7d895..96d7e7f759 100644
--- a/.gitlab-ci.yml
+++ b/.gitlab-ci.yml
@@ -269,3 +269,35 @@ ubuntu-xenial-gcc-debug:
CONTAINE
Signed-off-by: Wei Liu
---
automation/build/ubuntu/bionic.dockerfile | 48 +++
1 file changed, 48 insertions(+)
create mode 100644 automation/build/ubuntu/bionic.dockerfile
diff --git a/automation/build/ubuntu/bionic.dockerfile
b/automation/build/ubuntu/bionic.docke
Wei Liu (2):
automation: add dockerfile for Ubuntu 18.04
automation: build with Ubuntu 18.04
.gitlab-ci.yml| 32 +
automation/build/ubuntu/bionic.dockerfile | 48 +++
2 files changed, 80 insertions(+)
create mode 100
Wei Liu (2):
automation: add dockerfile for Ubuntu 18.04
automation: build with Ubuntu 18.04
.gitlab-ci.yml| 32 +
automation/build/ubuntu/bionic.dockerfile | 48 +++
2 files changed, 80 insertions(+)
create mode 100
Signed-off-by: Wei Liu
---
automation/build/ubuntu/bionic.dockerfile | 48 +++
1 file changed, 48 insertions(+)
create mode 100644 automation/build/ubuntu/bionic.dockerfile
diff --git a/automation/build/ubuntu/bionic.dockerfile
b/automation/build/ubuntu/bionic.docke
On Mon, Oct 22, 2018 at 04:18:49PM +0100, Wei Liu wrote:
> Wei Liu (2):
> automation: add dockerfile for Ubuntu 18.04
> automation: build with Ubuntu 18.04
This is duplicate. Please ignore.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xenproject
flight 128934 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128934/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-xsm 7 xen-boot fail REGR. vs. 128884
test-armhf-a
On Sun, 21 Oct 2018 at 21:36, Aaron Gray wrote:
> On Fri, 19 Oct 2018 at 19:58, Aaron Gray
> wrote:
>
>> On Thu, 18 Oct 2018 at 23:42, Andrew Cooper
>> wrote:
>>
>>> On 18/10/2018 19:45, Aaron Gray wrote:
>>>
>>> On Thu, 18 Oct 2018 at 19:11, Andrew Cooper
>>> wrote:
>>>
On 18/10/2018 18:
flight 75477 distros-debian-sid real [real]
http://osstest.xensource.com/osstest/logs/75477/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-i386
On Mon, 22 Oct 2018, Milan Boberic wrote:
> Hi,
>
> > I think we want to fully understand how many other interrupts the
> > baremetal guest is receiving. To do that, we can modify my previous
> > patch to suppress any debug messages for virq=68. That way, we should
> > only see the other interrupt
flight 128937 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128937/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
Hi Jens,
Please git pull the following branch:
git pull git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.20
which has exactly one tiny patch fixing an NULL pointer issue (also has stable
tree CCed).
Thank you!
drivers/block/xen-blkfront.c | 3 +++
1 file change
Hi Linus,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/swiotlb.git
stable/for-linus-4.20
which has one tiny fix for the Xen SWIOTLB mechanism that occasionally happened
with
devices that didn't allocate size in power of two but rather some odd
siz
On Sat, 20 Oct 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 10/19/18 11:53 PM, Stefano Stabellini wrote:
> > On Mon, 15 Oct 2018, Julien Grall wrote:
> > > Hi,
> > >
> > > On 05/10/2018 19:47, Stefano Stabellini wrote:
> > > > Similar to construct_dom0, construct_domU creates a barebone DomU gu
On Thu, Oct 18, 2018 at 3:12 PM Razvan Cojocaru
wrote:
>
> On 10/18/18 11:08 PM, Tamas K Lengyel wrote:
> > On Thu, Oct 18, 2018 at 4:09 AM Razvan Cojocaru
> > wrote:
> >>
> >> Hello,
> >>
> >> This series aims to prevent the display from freezing when
> >> enabling altp2m and switching to a new
On 10/22/18 11:48 PM, Tamas K Lengyel wrote:
> On Thu, Oct 18, 2018 at 3:12 PM Razvan Cojocaru
> wrote:
>>
>> On 10/18/18 11:08 PM, Tamas K Lengyel wrote:
>>> On Thu, Oct 18, 2018 at 4:09 AM Razvan Cojocaru
>>> wrote:
Hello,
This series aims to prevent the display from freezin
On 22/10/2018 22:17, Razvan Cojocaru wrote:
> On 10/22/18 11:48 PM, Tamas K Lengyel wrote:
>> On Thu, Oct 18, 2018 at 3:12 PM Razvan Cojocaru
>> wrote:
>>> On 10/18/18 11:08 PM, Tamas K Lengyel wrote:
On Thu, Oct 18, 2018 at 4:09 AM Razvan Cojocaru
wrote:
> Hello,
>
> This s
On Mon, Oct 22, 2018 at 3:22 PM Andrew Cooper wrote:
>
> On 22/10/2018 22:17, Razvan Cojocaru wrote:
> > On 10/22/18 11:48 PM, Tamas K Lengyel wrote:
> >> On Thu, Oct 18, 2018 at 3:12 PM Razvan Cojocaru
> >> wrote:
> >>> On 10/18/18 11:08 PM, Tamas K Lengyel wrote:
> On Thu, Oct 18, 2018 at
On 10/22/18 1:31 PM, Konrad Rzeszutek Wilk wrote:
>
> Hi Jens,
>
> Please git pull the following branch:
>
> git pull git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
> stable/for-jens-4.20
>
> which has exactly one tiny patch fixing an NULL pointer issue (also has
> stable tree C
This run is configured for baseline tests only.
flight 75479 qemu-mainline real [real]
http://osstest.xensource.com/osstest/logs/75479/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
With the config fixed it boots but when I run DRAKVUF on the domain I
get the following crash:
(XEN) [ Xen-4.12-unstable x86_64 debug=y Not tainted ]
(XEN) CPU:0
(XEN) RIP:e008:[<7bdb630c>] 7bdb630c
(XEN) RFLAGS: 0001028
On Mon, Oct 22, 2018 at 4:15 PM Razvan Cojocaru
wrote:
>
> With the config fixed it boots but when I run DRAKVUF on the domain I
> get the following crash:
>
> (XEN) [ Xen-4.12-unstable x86_64 debug=y Not tainted ]
> (XEN) CPU:0
> (XEN) RIP:e008:[<
On 8/7/18 6:07 PM, Amit Singh Tomar wrote:
Hi,
> This patch adds driver for UART controller present on Amlogic S905
> SoC.
> https://dn.odroid.com/S905/DataSheet/S905_Public_Datasheet_V1.1.4.pdf
>
> Signed-off-by: Amit Singh Tomar
> ---
> xen/drivers/char/Kconfig | 8 ++
> xen/drivers/c
On 8/7/18 6:07 PM, Amit Singh Tomar wrote:
Hi,
commit message?
> Signed-off-by: Amit Singh Tomar
> ---
> docs/misc/arm/early-printk.txt | 1 +
> xen/arch/arm/Rules.mk | 1 +
> xen/arch/arm/arm64/debug-meson.inc | 50
> ++ 3 files changed, 5
On Sat, 20 Oct 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 10/20/18 12:20 AM, Stefano Stabellini wrote:
> > On Mon, 8 Oct 2018, Jan Beulich wrote:
> > > > > > On 05.10.18 at 20:47, wrote:
> > > > --- a/xen/drivers/char/console.c
> > > > +++ b/xen/drivers/char/console.c
> > > > @@ -406,6 +406,1
On Sat, 20 Oct 2018, Julien Grall wrote:
> > > > +
> > > > +pg = alloc_domheap_pages(d, order, 0);
> > >
> > > So here you impose the memory to be contiguously allocated for a given
> > > bank.
> > > There are quite a few case where you may not have enough memory to
> > > allocate
> > > contig
On Tue, 16 Oct 2018, Lars Kurth wrote:
> Hi Stefano,
>
> > On 9 Oct 2018, at 12:52, Julien Grall wrote:
> >
> > Hi Stefano,
> >
> > On 05/10/2018 19:47, Stefano Stabellini wrote:
> >> Add a new document to provide information on how to use dom0less related
> >> features and their current limita
On Tue, 9 Oct 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 05/10/2018 19:47, Stefano Stabellini wrote:
> > Add a new document to provide information on how to use dom0less related
> > features and their current limitations.
> >
> > Signed-off-by: Stefano Stabellini
> >
> > ---
> > Changes in
On Mon, Oct 22, 2018 at 11:27:23AM +0100, Julien Grall wrote:
> Hi Stefano,
>
> On 18/10/2018 23:10, Stefano Stabellini wrote:
> > From: Stefano Stabellini
> >
> > Introduce a device tree binding for Xen reserved-memory regions. They
> > are used to share memory across VMs from the VM config fil
This run is configured for baseline tests only.
flight 75480 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75480/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
On Tue, 9 Oct 2018, Julien Grall wrote:
> On 05/10/2018 19:47, Stefano Stabellini wrote:
> > Introduce a new array to store the cmdline of each boot module. It is
> > separate from struct bootmodules. Remove the cmdline field from struct
> > boot_module. This way, kernels and initrds with the same
Make sure to only look for multiboot compatible nodes only under
/chosen, not under any other paths (depth <= 3).
Signed-off-by: Stefano Stabellini
---
Changes in v5:
- add patch
- add check on return value of fdt_get_path
---
xen/arch/arm/bootfdt.c | 13 ++---
1 file changed, 10 inser
Extend the existing device tree based multiboot protocol to include
information regarding multiple domains to boot.
Signed-off-by: Stefano Stabellini
---
Changes in v4:
- memory is 64bit
Changes in v3:
- remove "xen,initial-domain" for now
- make vpl011 an empty property
- memory in KBs
Change
Add a new document to provide information on how to use dom0less related
features and their current limitations.
Signed-off-by: Stefano Stabellini
---
Changes in v5:
- convert to markdown
- move to docs/features
- add entry to docs/INDEX
Changes in v4:
- rename to .txt
- improve wording
Change
Find addresses, sizes on device tree from kernel_probe.
Find the cmdline from the bootcmdlines array.
Introduce a new boot_module_find_by_addr_and_kind function to match not
just on boot module kind, but also by address so that we can support
multiple domains.
Introduce a boot_cmdline_find_by_nam
Call a new function, "create_domUs", from setup_xen to start DomU VMs.
Introduce support for the "xen,domain" compatible node on device tree.
Create new DomU VMs based on the information found on device tree under
"xen,domain". Call construct_domU for each domain.
Introduce a simple global variab
Introduce an is_console option to allow certain classes of domUs to use
the Xen console. Specifically, it will be used to give console access to
all domUs started from Xen from information on device tree.
Signed-off-by: Stefano Stabellini
Acked-by: Daniel De Graaf
CC: andrew.coop...@citrix.com
C
Make vpl011 being able to be used without a userspace component in Dom0.
In that case, output is printed to the Xen serial and input is received
from the Xen serial one character at a time.
Call domain_vpl011_init during construct_domU if vpl011 is enabled.
Introduce a new ring struct with only t
Introduce vpl011 support to guests started from Xen: it provides a
simple way to print output from a guest, as most guests come with a
pl011 driver. It is also able to provide a working console with
interrupt support.
The UART exposed to the guest is a SBSA compatible UART and not a PL011.
SBSA UA
Hi all,
This is first step toward "dom0less" as discussed in the various
certifications related threads and discussions.
The goal of this series is to enable Xen to boot multiple domains in
parallel, in addition to dom0, out of information found on device tree.
The device tree based boot protoco
Move generic initializations out of construct_dom0 so that they can be
reused.
Rename prepare_dtb to prepare_dtb_hwdom to avoid confusion.
No functional changes in this patch.
Signed-off-by: Stefano Stabellini
---
Changes in v5:
- rename __construct_domain to construct_domain
Changes in v4:
-
allocate_memory only deals with directly mapped memory. Rename it to
allocate_memory_11.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v3:
- add patch
---
xen/arch/arm/domain_build.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm
also rename it to set_interrupt.
Signed-off-by: Stefano Stabellini
Reviewed-by: Julien Grall
---
xen/arch/arm/domain_build.c | 29 +++--
1 file changed, 15 insertions(+), 14 deletions(-)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 4a6ed2
Introduce an allocate_memory function able to allocate memory for DomUs
and map it at the right guest addresses, according to the guest memory
map: GUEST_RAM0_BASE and GUEST_RAM1_BASE.
This is under #if 0 as not used for now.
Signed-off-by: Stefano Stabellini
---
Changes in v5:
- improve commit
Don't add duplicate boot modules (same kind and same start address),
they are freed later, we don't want to introduce double-free errors.
Introduce a domU flag in struct bootmodule and struct bootcmdline. Set
it for kernels and ramdisks of "xen,domain" nodes to avoid getting
confused in kernel_pro
Similar to construct_dom0, construct_domU creates a barebone DomU guest.
The device tree node passed as argument is compatible "xen,domain", see
docs/misc/arm/device-tree/booting.txt.
Remove #if 0 from allocate_memory as this patch will start using it.
Signed-off-by: Stefano Stabellini
---
Cha
Move unregister_init_virtual_region to init_done. Follow the same path
as x86. It is also useful to move it later so that create_domUs can be
called before that in following patches.
Signed-off-by: Stefano Stabellini
---
xen/arch/arm/setup.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletio
Xen boot modules need to account not just for Dom0 but also for a few
potential DomUs, each of them coming with their own kernel and initrd.
Increase MAX_MODULES to 32 to allow for more DomUs.
Signed-off-by: Stefano Stabellini
Reviewed-by: Doug Goldstein
---
xen/include/asm-arm/setup.h | 2 +-
Introduce functions to generate a basic domU device tree, similar to the
existing functions in tools/libxl/libxl_arm.c.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v5:
- use d->arch.vgic.version
Changes in v4:
- code style
- two separate functions for gicv2 and gicv3
To avoid mixing the output of different domains on the console, buffer
the output chars and print line by line. Unless the domain has input
from the serial, in which case we want to print char by char for a
smooth user experience.
The size of SBSA_UART_OUT_BUF_SIZE is arbitrary, choose the same si
It will be #included by a file in a xen/arch/arm subdirectory.
Signed-off-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 2 +-
xen/arch/arm/kernel.c| 3 +-
xen/arch/arm/kernel.h| 86
xen/include/asm-arm/kernel.h | 86 +
No functional changes.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v3:
- no change in print messages
- do not remove BUG_ON
Changes in v2:
- new patch
---
xen/arch/arm/domain_build.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/
Introduce a union in struct vpl011 to contain the console ring members.
A later patch will add another member of the union for the case where
the backend is in Xen.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v4:
- name union "backend"
Changes in v3:
- rename ring fi
1 - 100 of 112 matches
Mail list logo