flight 131070 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131070/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-raw 13 saverestore-support-checkfail like 130894
test-armhf-armhf-libvirt 14 saveresto
[ the math added to xen-tscmode.7 suggests that a domU should see a time
drift, which ntpd corrects. But the actual correction reported in
ntp.drift is entirely different than the one calculated in the
example. To me it is unclear why the example is wrong, more research
must be done. I'm se
flight 131065 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131065/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-5 69 xtf/test-hvm64-xsa-278 fail REGR. vs. 130985
test-xtf-amd64-amd
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Dongli Zhang
> Sent: 07 December 2018 04:18
> To: linux-ker...@vger.kernel.org; xen-devel@lists.xenproject.org; linux-
> bl...@vger.kernel.org
> Cc: ax...@kernel.dk; Roger Pau Monne ;
> kon
From: Oleksandr Tyshchenko
This is a follow-up patch to
commit 01a7e8ccef6e7d5718a251ad587567afbe723330
xen/arm: Remove __initdata and __init to enable CPU hotplug
Signed-off-by: Oleksandr Tyshchenko
Acked-by: Julien Grall
---
xen/arch/arm/arm32/smpboot.c | 2 +-
xen/arch/arm/platform.c
From: Oleksandr Tyshchenko
To be able to use it for the hot-plugged CPUs as well.
Signed-off-by: Oleksandr Tyshchenko
---
Changes in v2:
- Fix typoes
- Rename ".init.proc.info" to ".data.proc.info"
---
xen/arch/arm/arm32/proc-v7.S | 6 +++---
xen/arch/arm/xen.lds.S
From: Oleksandr Tyshchenko
Hi, all.
This is small patch series for ARM32 which needed to be able to bring
secondary CPUs up not only during the initial boot, but at runtime also.
For example, during CPU hotplug.
Actually these are follow-up patches to the following series [1], which covers
gen
On 07/12/2018 09:21, osstest service owner wrote:
> flight 131065 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/131065/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-xtf-amd64-amd64-5 69 xt
On 07/12/2018 09:45, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Hi, all.
This is small patch series for ARM32 which needed to be able to bring
secondary CPUs up not only during the initial boot, but at runtime also.
For example, during CPU hotplug.
OOI, we don't have CPU hotplu
Hi Oleksandr,
On 07/12/2018 09:45, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
To be able to use it for the hot-plugged CPUs as well.
You need to explain in the commit message why you rename .init.proc.info.
Signed-off-by: Oleksandr Tyshchenko
---
Changes in v2:
Hi Stefano
On 06/12/2018 22:02, Stefano Stabellini wrote:
On Wed, 5 Dec 2018, Julien Grall wrote:
On 04/12/2018 23:50, Stefano Stabellini wrote:
On Tue, 4 Dec 2018, Julien Grall wrote:
The LPAE format allows to store information in an entry even with the
valid bit unset. In a follow-up patch,
On Thu, Dec 06, 2018 at 06:03:54PM +, Andrew Cooper wrote:
> The struct suffix is redundant in the name, and a future change will want to
> turn it into a union, rather than a structure. As this represents a segment
> descriptor, give it an appropriate typedef.
>
> No functional change.
>
>
Hi Stefano,
On 06/12/2018 22:04, Stefano Stabellini wrote:
On Wed, 5 Dec 2018, Julien Grall wrote:
On 04/12/2018 23:59, Stefano Stabellini wrote:
On Tue, 4 Dec 2018, Julien Grall wrote:
A follow-up patch will re-purpose the valid bit of LPAE entries to
generate fault even on entry containing
Hi Ravzan,
On 04/12/2018 20:35, Razvan Cojocaru wrote:
On 12/4/18 10:26 PM, Julien Grall wrote:
With the recent changes, a P2M entry may be populated but may as not
valid. In some situation, it would be useful to know whether the entry
I think you mean to say "may not be valid"?
Correct. I
>>> On 06.12.18 at 19:46, wrote:
> On 06/12/2018 08:54, Jan Beulich wrote:
> On 05.12.18 at 18:05, wrote:
>>> On 05/12/2018 16:57, Jan Beulich wrote:
>>> On 03.12.18 at 17:18, wrote:
> --- a/xen/arch/x86/cpu/amd.c
> +++ b/xen/arch/x86/cpu/amd.c
> @@ -419,6 +419,97 @@ static v
Hi Stefano,
On 06/12/2018 23:53, Stefano Stabellini wrote:
On Tue, 4 Dec 2018, Julien Grall wrote:
A follow-up patch will add support for preemption in p2m_cache_flush_range.
Because of the complexity for the 2 loops, it would be necessary to add
preemption in both of them.
This can be avoided
>>> On 06.12.18 at 19:55, wrote:
> On 06/12/2018 10:51, Jan Beulich wrote:
>>
>>> + unsigned int socket = c->phys_proc_id, core = c->cpu_core_id;
>>> + struct ssbd_ls_cfg *cfg;
>>> + uint64_t val;
>>> +
>>> + ASSERT(cpu_has_legacy_ssbd);
>>> +
>>> + /*
>>> +* Update hardware lazily,
On Thu, Dec 06, 2018 at 11:14:34PM +0100, Paolo Bonzini wrote:
> > There are some minor changes in non-xen x86 code so it would be good to
> > get x86 maintainers' ack.
>
> It's not really code, only Kconfig (and I remarked on it just now), but
> it doesn't hurt of course.
Yeah, I don't see anyth
On Fri, Dec 7, 2018 at 12:05 PM Julien Grall wrote:
> Hi Oleksandr,
>
Hi Julien
>
> On 07/12/2018 09:45, Oleksandr Tyshchenko wrote:
> > From: Oleksandr Tyshchenko
> >
> > To be able to use it for the hot-plugged CPUs as well.
>
> You need to explain in the commit message why you rename .init.
Hi Oleksandr,
Please configure your client to quote with > rather than indentation. Below is
an example how it can get messy in just 3 answers, I let you imagine with longer
thread :).
This is a general issue with gmail web-interface that quote using tabulation. It
would be best if you use a
I admit I should probably have got around to run afl on the whole lot
earlier. It has spotted the issue addressed in patch 1 as well as a
few more in the pending v6 series. Most (including the one here)
would have been caught by the exception recovery logic on the
stubs, but one (in the gather patc
Hi Stefano,
On 06/12/2018 23:32, Stefano Stabellini wrote:
On Tue, 4 Dec 2018, Julien Grall wrote:
p2m_cache_flush_range does not yet support preemption, this may be an
issue as cleaning the cache can take a long time. While the current
caller (XEN_DOMCTL_cacheflush) does not stricly require pr
The check needs to happen whenever EVEX.b is clear, not just in the
memory operand case.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -8526,11 +8526,9 @@ x86_emulate(
case X86EMUL_OPC_EVEX_66(0x0f38, 0xbd): /* vfnmad
While actually benign (operands are either register or memory ones
anyway), I think it is better to use != instead of == for such checks.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -5918,11 +5918,11 @@ x86_emulate(
flight 75639 distros-debian-jessie real [real]
http://osstest.xensource.com/osstest/logs/75639/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-i386-jessie-netboot-pvgrub 19 guest-start/debian.repeat fail
blocked in 75627
test-armhf-armhf-arm
On Thu, Dec 06, 2018 at 06:03:55PM +, Andrew Cooper wrote:
> * Add "uint64_t raw" to seg_desc_t to remove the opencoded uint64_t casting
>in this function.
> * Rename the 'pa' parameter to 'gaddr', because it lives in GFN space rather
>than physical address space.
> * Use gfn_t and m
On Fri, Dec 07, 2018 at 09:50:30AM +, Andrew Cooper wrote:
> On 07/12/2018 09:21, osstest service owner wrote:
> > flight 131065 xen-unstable real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/131065/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
>
On Fri, Dec 07, 2018 at 08:35:26AM +0100, Juergen Gross wrote:
> Add the hooks to current code needed for Xen PVH. They will be filled
> with code later when the related functionality is being added.
>
> loader/i386/linux.c needs to include machine/kernel.h now as it needs
> to get GRUB_KERNEL_USE_
>>> On 06.12.18 at 16:34, wrote:
> This patch removes any implicit flushing that occurs in the implementation
> of map and unmap operations and adds new iommu_map/unmap() wrapper
> functions. To maintain sematics of the iommu_legacy_map/unmap() wrapper
> functions, these are modified to call the n
>>> On 06.12.18 at 19:03, wrote:
> The struct suffix is redundant in the name, and a future change will want to
> turn it into a union, rather than a structure. As this represents a segment
> descriptor, give it an appropriate typedef.
>
> No functional change.
>
> Signed-off-by: Andrew Cooper
On 07/12/2018 11:34, Wei Liu wrote:
> On Fri, Dec 07, 2018 at 09:50:30AM +, Andrew Cooper wrote:
>> On 07/12/2018 09:21, osstest service owner wrote:
>>> flight 131065 xen-unstable real [real]
>>> http://logs.test-lab.xenproject.org/osstest/logs/131065/
>>>
>>> Regressions :-(
>>>
>>> Tests whi
On 07/12/2018 12:50, Daniel Kiper wrote:
> On Fri, Dec 07, 2018 at 08:35:26AM +0100, Juergen Gross wrote:
>> Add the hooks to current code needed for Xen PVH. They will be filled
>> with code later when the related functionality is being added.
>>
>> loader/i386/linux.c needs to include machine/ker
Add the needed code to setup the hypercall page for calling into the
Xen hypervisor.
Import the XEN_HVM_DEBUGCONS_IOPORT define from Xen unstable into
include/xen/arch-x86/xen.h
Signed-off-by: Juergen Gross
Reviewed-by: Roger Pau Monné
---
V3: grub_xen_early_halt->grub_xen_panic (Roger Pau Monn
This patch series adds support for booting Linux as PVH guest.
Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh
platform grub is booted as a standalone image directly by Xen.
For booting Linux kernel it is using the standard linux kernel
loader. The only modification of the linux
Add xen_pvh support to grub-install.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
include/grub/util/install.h | 1 +
util/grub-install-common.c | 1 +
util/grub-install.c | 7 +++
3 files changed, 9 insertions(+)
diff --git a/include/grub/util/install.h b/include/gru
Rearrange grub-core/kern/xen/init.c to prepare adding PVH mode support
to it. This includes putting some code under #ifdef GRUB_MACHINE_XEN
as it will not be used when running as PVH.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
grub-core/kern/xen/init.c | 60 +
Initialize the needed Xen specific data. This is:
- the Xen start of day page containing the console and Xenstore ring
page PFN and event channel
- the grant table
- the shared info page
Write back the possibly modified memory map to the hypervisor in case
the guest is reading it from there aga
Retrieve the memory map from the hypervisor and normalize it to contain
no overlapping entries and to be sorted by address.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: use grub_e820_mmap_entry instead of own struct (Daniel Kiper)
---
grub-core/kern/i386/xen/pvh.c | 94 +++
Initialize the grant tab in a dedicated function. This will enable
using it for PVH guests, too.
Call the new function from grub_machine_init() as this will later
be common between Xen PV and Xen PVH mode.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: update commit message (Dan
Some common code needs to be special cased for Xen PVH mode. This hits
mostly Xen PV mode specific areas.
Split include/grub/i386/pc/int_types.h off from
include/grub/i386/pc/int.h to support including this file later from
xen_pvh code without the grub_bios_interrupt definition.
Move definition o
Xen PVH guests will have the RSDP at an arbitrary address. Support that
by passing the RSDP address via the boot parameters to Linux.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: add oring 0x8000 to version field
V3: move including machine/kernel.h to patch 8 (Daniel Kiper)
V5:
In order to support grub2 in Xen PVH environment some additional Xen
headers are needed as grub2 will be started in PVH mode requiring to
use several HVM hypercalls and structures.
Add the needed headers from Xen 4.10 being the first Xen version with
full (not only experimental) PVH guest support.
With Xen PVH mode adding a new machine type the machine related headers
need to be present for the build to succeed. Most of the headers just
need to include the related common i386 headers. Add those to the tree.
Note that xen_pvh/int.h needs to include pc/int_types.h instead of
pc/int.h in order
Add the hooks to current code needed for Xen PVH. They will be filled
with code later when the related functionality is being added.
loader/i386/linux.c needs to include machine/kernel.h now as it needs
to get GRUB_KERNEL_USE_RSDP_ADDR from there. This in turn requires to
add an empty kernel.h hea
grub_xen_ptr2mfn() returns the machine frame number for a given pointer
value. For Xen-PVH guests this is just the PFN. Add the PVH specific
variant.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V5: new patch (Daniel Kiper)
---
grub-core/kern/xen/init.c | 2 ++
1 file changed, 2 i
Add the code for the Xen PVH mode boot entry.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: clear %fs and %gs, too (Daniel Kiper)
use GRUB_MEMORY_MACHINE_PROT_STACK_SIZE for stack size (Daniel Kiper)
V5: reorder clearing segment regs (Daniel Kiper)
---
grub-core/kern/i386/x
Support platform i386/xen_pvh in configure.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
configure.ac | 3 +++
1 file changed, 3 insertions(+)
diff --git a/configure.ac b/configure.ac
index 5e63c4af3..81a19afd5 100644
--- a/configure.ac
+++ b/configure.ac
@@ -151,6 +151,7 @@ case
Add all usable memory regions to grub memory management and add the
needed mmap iterate code, which will be used by grub core (e.g.
grub-core/lib/relocator.c or grub-core/mmap/mmap.c).
As we are running in 32-bit mode don't add memory above 4GB.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel K
Add the modifications to the build system needed to build a xen_pvh
grub.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: sorted some filenames (Daniel Kiper)
V4: add bus/pci.c to xen_pvh
---
gentpl.py | 4 ++--
grub-core/Makefile.am | 12
gr
include/grub/offsets.h needs some defines for Xen PVH mode.
Add them. While at it line up the values in the surrounding lines to
start at the same column.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: XENPVH->XEN_PVH (Daniel Kiper)
---
include/grub/offsets.h | 21 -
>>> On 06.12.18 at 19:03, wrote:
> --- a/xen/arch/x86/pv/descriptor-tables.c
> +++ b/xen/arch/x86/pv/descriptor-tables.c
> @@ -206,30 +206,26 @@ int compat_set_gdt(XEN_GUEST_HANDLE_PARAM(uint)
> frame_list,
> return ret;
> }
>
> -long do_update_descriptor(uint64_t pa, uint64_t desc)
> +l
In order to avoid using plain integers for the ELF notes use the
available Xen include instead.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V5: new patch (Daniel Kiper)
---
util/grub-mkimagexx.c | 14 --
1 file changed, 8 insertions(+), 6 deletions(-)
diff --git a/ut
Support mkimage for xen_pvh.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: some style adjustments (Daniel Kiper)
use defines for elf-notes (Daniel Kiper)
V5: move elf-note define usage into new patch (Daniel Kiper)
I didn't replace the 4096 by a PAGE_SIZE macro as requested
On Thu, 2018-12-06 at 20:27 +, David Woodhouse wrote:
> On Thu, 2018-12-06 at 10:49 -0800, Andy Lutomirski wrote:
> > > On Dec 6, 2018, at 9:36 AM, Andrew Cooper <
> > > andrew.coop...@citrix.com> wrote:
> > > Basically - what is happening is that xen_load_tls() is
> > > invalidating the
> > >
On 07.12.18 12:02, Julien Grall wrote:
Hi, Julien.
On 07/12/2018 09:45, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Hi, all.
This is small patch series for ARM32 which needed to be able to bring
secondary CPUs up not only during the initial boot, but at runtime also.
For exampl
From: Hans van Kranenburg
This solves the build failing with "Error: no symbol table and no
.moddeps section"
Also see:
- 6371e9c10433578bb236a8284ddb9ce9e201eb59
- https://savannah.gnu.org/bugs/?49012
Signed-off-by: Hans van Kranenburg
Reviewed-by: Daniel Kiper
---
V2: new patch
Signed-off-b
On Thu, Dec 06, 2018 at 03:08:28PM +, Paul Durrant wrote:
> This patch adds the basic boilerplate for a 'XenBus' object that will act
> as a parent to 'XenDevice' PV backends.
> A new 'XenBridge' object is also added to connect XenBus to the system bus.
>
> The XenBus object is instantiated by
On Fri, Dec 07, 2018 at 01:11:28PM +0100, Juergen Gross wrote:
> This patch series adds support for booting Linux as PVH guest.
>
> Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh
> platform grub is booted as a standalone image directly by Xen.
>
> For booting Linux kernel it is us
> -Original Message-
> From: Anthony PERARD [mailto:anthony.per...@citrix.com]
> Sent: 07 December 2018 12:15
> To: Paul Durrant
> Cc: qemu-de...@nongnu.org; qemu-bl...@nongnu.org; xen-
> de...@lists.xenproject.org; Stefano Stabellini ;
> Michael S. Tsirkin ; Marcel Apfelbaum
> ; Paolo Bon
On 07/12/2018 12:12, Jan Beulich wrote:
>> @@ -244,19 +240,20 @@ long do_update_descriptor(uint64_t pa, uint64_t desc)
>> break;
>> }
>>
>> -paging_mark_dirty(currd, _mfn(mfn));
>> +paging_mark_dirty(currd, mfn);
>>
>> /* All is good so make the update. */
>> -gdt
When viridian APIC assist is active, the code in vlapic_has_pending_irq()
may end up re-calling vlapic_find_highest_isr() after emulating an EOI
whereas simply moving the call after the EOI emulation removes the need
for this duplication.
Signed-off-by: Paul Durrant
---
Cc: Jan Beulich
Cc: Andre
Hi Stefano,
On 06/12/2018 23:32, Stefano Stabellini wrote:
On Tue, 4 Dec 2018, Julien Grall wrote:
Set/Way operations are used to perform maintenance on a given cache.
At the moment, Set/Way operations are not trapped and therefore a guest
OS will directly act on the local cache. However, a vCP
Hi Jan,
On 05/12/2018 08:37, Jan Beulich wrote:
On 04.12.18 at 21:26, wrote:
At the moment, the implementation of Set/Way operations will go through
all the entries of the guest P2M and flush them. However, this is very
expensive and may render unusable a guest OS using them.
For instance, Li
On 07/12/18 07:02, Juergen Gross wrote:
> On 06/12/2018 23:11, Paolo Bonzini wrote:
>> On 06/12/18 07:04, Maran Wilson wrote:
>>> +config PVH
>>> + bool "Support for running PVH guests"
>>> + ---help---
>>> + This option enables the PVH entry point for guest virtual machines
>>> + as sp
From: Oleksandr Tyshchenko
To be able to use it for the hot-plugged CPUs as well.
The reason why we link proc_info_list in ".rodata" section is that
it context should never be modified.
This patch also renames ".init.proc.info" section to ".proc.info"
as "init" prefix is not actual anymore.
Si
A large amount of the information here is obsolete since Xen 4.7
To being with, however, this patch marks a change in style for section
headings, due to how HTML anchors are generated. Having more than one
parameter per heading makes an awkward anchor, especially when brace globbing
is used. Fur
Andrew Cooper (3):
docs/cmdline: Fix markdown syntax
docs/cmdline: Move XSM to be in alphabetical order
docs/cmdline: Rewrite the cpuid_mask_* section
docs/misc/xen-command-line.markdown | 100 ++--
1 file changed, 51 insertions(+), 49 deletions(-)
--
2.1.4
* vwfi needs a closing `. rmrr needs one as well, and the opening ' switched
to `
* The com1/com2 example lines are already verbatim blocks and shouldn't
escape their underscores. This ends up in the rendered output.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Ian Jackson
C
Adjust the default line to note that the default is now selectable in Kconfig.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Ian Jackson
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei Liu
CC: Julien Grall
---
docs/misc/xen-command-line.ma
On 07/12/2018 14:41, Paolo Bonzini wrote:
> On 07/12/18 07:02, Juergen Gross wrote:
>> On 06/12/2018 23:11, Paolo Bonzini wrote:
>>> On 06/12/18 07:04, Maran Wilson wrote:
+config PVH
+ bool "Support for running PVH guests"
+ ---help---
+This option enables the PVH entry p
On 07.12.18 12:34, Julien Grall wrote:
Hi Oleksandr,
Hi Julien
Please configure your client to quote with > rather than indentation.
Below is an example how it can get messy in just 3 answers, I let you
imagine with longer thread :).
This is a general issue with gmail web-interface tha
On 07/12/18 14:50, Juergen Gross wrote:
> The PVH boot entry is in the same bzImage binary as the normal one.
> Its just another entry, similar to the Xen PV boot entry. So the binary
> arch/x86/boot/bzimage can be booted either on bare metal via grub2 or
> other boot-loaders, as Xen PV-guest, as X
On 07/12/2018 14:52, Paolo Bonzini wrote:
> On 07/12/18 14:50, Juergen Gross wrote:
>> The PVH boot entry is in the same bzImage binary as the normal one.
>> Its just another entry, similar to the Xen PV boot entry. So the binary
>> arch/x86/boot/bzimage can be booted either on bare metal via grub2
On Thu, Dec 06, 2018 at 03:08:29PM +, Paul Durrant wrote:
> +static char *disk_to_vbd_name(unsigned int disk)
> +{
> +char *name, *prefix = (disk >= 26) ?
> +disk_to_vbd_name((disk / 26) - 1) : g_strdup("");
> +
> +name = g_strdup_printf("%s%c", prefix, 'a' + disk);
I don't thi
> -Original Message-
> From: Anthony PERARD [mailto:anthony.per...@citrix.com]
> Sent: 07 December 2018 14:35
> To: Paul Durrant
> Cc: qemu-de...@nongnu.org; qemu-bl...@nongnu.org; xen-
> de...@lists.xenproject.org; Kevin Wolf ; Max Reitz
> ; Stefano Stabellini
> Subject: Re: [PATCH v2 03
Em Fri, 7 Dec 2018 00:09:45 +0530
Souptick Joarder escreveu:
> Previouly drivers have their own way of mapping range of
> kernel pages/memory into user vma and this was done by
> invoking vm_insert_page() within a loop.
>
> As this pattern is common across different drivers, it can
> be generali
On 07/12/2018 13:41, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
To be able to use it for the hot-plugged CPUs as well.
The reason why we link proc_info_list in ".rodata" section is that
it context should never be modified.
This patch also renames ".init.proc.info" section to ".p
On Thu, Dec 06, 2018 at 03:08:30PM +, Paul Durrant wrote:
> This patch adds a new source module, xen-bus-helper.c, which builds on
> basic libxenstore primitives to provide functions to create (setting
> permissions appropriately) and destroy xenstore areas, and functions to
> 'printf' and 'sca
Hi Andrew,
On 07/12/2018 13:45, Andrew Cooper wrote:
A large amount of the information here is obsolete since Xen 4.7
To being with, however, this patch marks a change in style for section
headings, due to how HTML anchors are generated. Having more than one
parameter per heading makes an awkw
Hi Paul,
On 12/07/2018 05:39 PM, Paul Durrant wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
>> Of Dongli Zhang
>> Sent: 07 December 2018 04:18
>> To: linux-ker...@vger.kernel.org; xen-devel@lists.xenproject.org; linux-
>> bl...@vg
On 07/12/18 14:58, Juergen Gross wrote:
> On 07/12/2018 14:52, Paolo Bonzini wrote:
>> On 07/12/18 14:50, Juergen Gross wrote:
>>> The PVH boot entry is in the same bzImage binary as the normal one.
>>> Its just another entry, similar to the Xen PV boot entry. So the binary
>>> arch/x86/boot/bzimag
> -Original Message-
> From: Dongli Zhang [mailto:dongli.zh...@oracle.com]
> Sent: 07 December 2018 15:10
> To: Paul Durrant ; linux-ker...@vger.kernel.org;
> xen-devel@lists.xenproject.org; linux-bl...@vger.kernel.org
> Cc: ax...@kernel.dk; Roger Pau Monne ;
> konrad.w...@oracle.com
> Subj
flight 131124 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131124/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 07/12/2018 15:09, Julien Grall wrote:
> Hi Andrew,
>
> On 07/12/2018 13:45, Andrew Cooper wrote:
>> A large amount of the information here is obsolete since Xen 4.7
>>
>> To being with, however, this patch marks a change in style for section
>> headings, due to how HTML anchors are generated. H
On Fri, Dec 07, 2018 at 02:39:40PM +, Paul Durrant wrote:
> > -Original Message-
> > From: Anthony PERARD [mailto:anthony.per...@citrix.com]
> > Sent: 07 December 2018 14:35
> > To: Paul Durrant
> > Cc: qemu-de...@nongnu.org; qemu-bl...@nongnu.org; xen-
> > de...@lists.xenproject.org;
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict
testid debian-hvm-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditiona
On Fri, Dec 07, 2018 at 03:26:01PM +, Anthony PERARD wrote:
> On Fri, Dec 07, 2018 at 02:39:40PM +, Paul Durrant wrote:
> > > -Original Message-
> > > From: Anthony PERARD [mailto:anthony.per...@citrix.com]
> > > Sent: 07 December 2018 14:35
> > > To: Paul Durrant
> > > Cc: qemu-de
On 06/12/2018 18:39, Souptick Joarder wrote:
Previouly drivers have their own way of mapping range of
kernel pages/memory into user vma and this was done by
invoking vm_insert_page() within a loop.
As this pattern is common across different drivers, it can
be generalized by creating a new functi
On 12/07/2018 11:15 PM, Paul Durrant wrote:
>> -Original Message-
>> From: Dongli Zhang [mailto:dongli.zh...@oracle.com]
>> Sent: 07 December 2018 15:10
>> To: Paul Durrant ; linux-ker...@vger.kernel.org;
>> xen-devel@lists.xenproject.org; linux-bl...@vger.kernel.org
>> Cc: ax...@kernel.d
On Thu, Dec 06, 2018 at 03:08:31PM +, Paul Durrant wrote:
> @@ -36,6 +54,12 @@ static void xen_block_unrealize(XenDevice *xendev, Error
> **errp)
>
> trace_xen_block_unrealize(type, vdev->disk, vdev->partition);
>
> +/* Disconnect from the frontend in case this has not already hap
On Thu, Dec 06, 2018 at 03:08:33PM +, Paul Durrant wrote:
> The legacy PV backend infrastructure provides functions to bind, unbind
> and send notifications to event channnels. Similar functionality will be
> required by XenDevice implementations so this patch adds the necessary
> support.
>
>
On 12/7/18 5:25 AM, Borislav Petkov wrote:
> On Thu, Dec 06, 2018 at 11:14:34PM +0100, Paolo Bonzini wrote:
>>> There are some minor changes in non-xen x86 code so it would be good to
>>> get x86 maintainers' ack.
>> It's not really code, only Kconfig (and I remarked on it just now), but
>> it does
On Thu, Dec 06, 2018 at 03:08:35PM +, Paul Durrant wrote:
> v2:
> - Leave existing boilerplate alone, other than removing the now-incorrect
>description
> ---
> hw/block/dataplane/xen-block.c | 409
> ++---
> 1 file changed, 16 insertions(+), 393 delet
On Thu, Dec 06, 2018 at 03:08:36PM +, Paul Durrant wrote:
> This patch adds the transformations necessary to get dataplane/xen-block.c
> to build against the new XenBus/XenDevice framework. MAINTAINERS is also
> updated due to the introduction of dataplane/xen-block.h.
>
> NOTE: Existing data
On Thu, Dec 06, 2018 at 03:08:39PM +, Paul Durrant wrote:
> This is a purely cosmetic patch that purges remaining use of 'blk' and
> 'ioreq' in local function names, and then makes sure all functions are
> prefixed with 'xen_block_'.
>
> No functional change.
>
> Signed-off-by: Paul Durrant
On Fri, 7 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 06/12/2018 22:04, Stefano Stabellini wrote:
> > On Wed, 5 Dec 2018, Julien Grall wrote:
> > > On 04/12/2018 23:59, Stefano Stabellini wrote:
> > > > On Tue, 4 Dec 2018, Julien Grall wrote:
> > > > > A follow-up patch will re-purpose the
On Fri, Dec 07, 2018 at 03:34:56PM +, Robin Murphy wrote:
> > +int vm_insert_range(struct vm_area_struct *vma, unsigned long addr,
> > + struct page **pages, unsigned long page_count)
> > +{
> > + unsigned long uaddr = addr;
> > + int ret = 0, i;
>
> Some of the sites bei
On Mon, Dec 03, 2018 at 02:26:09PM -0800, Stefano Stabellini wrote:
> From: Stefano Stabellini
>
> Introduce a device tree binding for Xen reserved-memory regions. They
> are used to share memory across VMs from the VM config files. (See
> static_shm config option.)
>
> Signed-off-by: Stefano St
flight 131075 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131075/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pygrub 7 xen-boot fail REGR. vs. 130155
build-armhf
The code in viridian_synic_wrmsr() duplicates logic in vlapic_reg_write()
to update the ICR, ICR2 and TASKPRI registers. Instead of doing this,
make vlapic_reg_write() non-static and call it.
Signed-off-by: Paul Durrant
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Wei Liu
Cc: "Roger Pau Monné"
-
1 - 100 of 132 matches
Mail list logo