Hi,
On 3/25/21 8:19 AM, Wan Jiabing wrote:
> struct xen_drm_front_drm_info has been declared.
> Remove the duplicate.
>
> Signed-off-by: Wan Jiabing
Thank you for the patch,
Reviewed-by: Oleksandr Andrushchenko
Will apply to drm-misc-next-fixes
Thank you,
Oleksandr
> ---
> drivers/gpu/dr
On 24.03.2021 18:26, George Dunlap wrote:
> Signed-off-by: George Dunlap
> ---
> Missed one from my list when creating the other series
>
> CC: Ian Jackson
> CC: Jan Beulich
> CC: Roger Pau Monne
> ---
> CHANGELOG.md | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/CHANGELOG.md b/CHA
On 24.03.2021 22:05, Boris Ostrovsky wrote:
>
> (Re-sending with Stephen added)
>
>
> While running performance tests with recent XSAs backports to our product
> we've
> discovered significant regression in TPCC performance. With a particular guest
> kernel the numbers dropped by as much as 40%
On 24.03.2021 17:44, George Dunlap wrote:
> --- a/SUPPORT.md
> +++ b/SUPPORT.md
> @@ -247,6 +247,13 @@ Export hypervisor coverage data suitable for analysis by
> gcov or lcov.
>
> Status: Supported, Not security supported
>
> +### Processor trace support
> +
> +Support for using Intel Pro
On 24.03.2021 17:44, George Dunlap wrote:
> --- a/CHANGELOG.md
> +++ b/CHANGELOG.md
> @@ -14,6 +14,8 @@ The format is based on [Keep a
> Changelog](https://keepachangelog.com/en/1.0.0/)
> - Named PCI devices for xl/libxl
> - Support for zstd-compressed dom0 kernels
> - Library improvements f
On 24.03.2021 20:10, Stefano Stabellini wrote:
> On Wed, 24 Mar 2021, Christopher Clark wrote:
> I'm also not sure how you are going to handle things like SR-IOV
> devices. Right now SR-IOV capability is setup and initialized by the
> hardware domain, and the new virtual devices are not
flight 160381 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/160381/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332
test-amd64-i386-xl-
On Wed, Mar 24, 2021 at 05:53:26AM -0700, Christopher Clark wrote:
> On Wed, Mar 24, 2021 at 1:01 AM Roger Pau Monné wrote:
> >
> > On Tue, Mar 23, 2021 at 10:39:53AM -0700, Christopher Clark wrote:
> > > On Thu, Mar 18, 2021 at 9:43 AM Roger Pau Monné
> > > wrote:
> > If you offload domain crea
On Wed, Mar 24, 2021 at 07:01:18PM +0200, Andy Shevchenko wrote:
> On Wed, Mar 24, 2021 at 04:43:11PM +0100, Roger Pau Monne wrote:
>
> Thanks for a fix! My comments below.
>
> > Use the value read from the REVID register in order to check for the
> > presence of the device. A read of all ones is
Hi Julien,
> On 24 Mar 2021, at 8:48 pm, Julien Grall wrote:
>
> Hi Rahul,
>
> On 22/03/2021 16:11, Rahul Singh wrote:
>> This patch is the work to fix the stream match conflict issue when two
>> devices
>> have the same stream-id.
>> Approach taken is to merge the below commit from Linux driv
On Wed, Mar 24, 2021 at 06:57:12PM +0200, Andy Shevchenko wrote:
> On Wed, Mar 24, 2021 at 04:13:59PM +0100, Roger Pau Monné wrote:
> > On Wed, Mar 24, 2021 at 04:22:44PM +0200, Andy Shevchenko wrote:
> > > On Wed, Mar 24, 2021 at 02:55:15PM +0100, Roger Pau Monné wrote:
> > > > On Wed, Mar 24, 202
> On Mar 25, 2021, at 7:57 AM, Jan Beulich wrote:
>
> On 24.03.2021 17:44, George Dunlap wrote:
>> --- a/CHANGELOG.md
>> +++ b/CHANGELOG.md
>> @@ -14,6 +14,8 @@ The format is based on [Keep a
>> Changelog](https://keepachangelog.com/en/1.0.0/)
>> - Named PCI devices for xl/libxl
>> - Support
> On Mar 25, 2021, at 7:53 AM, Jan Beulich wrote:
>
> On 24.03.2021 17:44, George Dunlap wrote:
>> --- a/SUPPORT.md
>> +++ b/SUPPORT.md
>> @@ -247,6 +247,13 @@ Export hypervisor coverage data suitable for analysis
>> by gcov or lcov.
>>
>> Status: Supported, Not security supported
>>
>>
Use the value read from the REVID register in order to check for the
presence of the device. A read of all ones is treated as if the device
is not present, and hence probing is ended.
This fixes an issue when running as a Xen PVH dom0, where the ACPI
DSDT table is provided unmodified to dom0 and h
On Wed, Mar 24, 2021 at 04:44:05PM +, George Dunlap wrote:
> Signed-off-by: George Dunlap
LGTM, maybe Manuel has something else to add.
Reviewed-by: Roger Pau Monné
Thanks.
> On Mar 25, 2021, at 8:32 AM, Roger Pau Monne wrote:
>
> On Wed, Mar 24, 2021 at 05:53:26AM -0700, Christopher Clark wrote:
>> On Wed, Mar 24, 2021 at 1:01 AM Roger Pau Monné wrote:
>>>
>>> On Tue, Mar 23, 2021 at 10:39:53AM -0700, Christopher Clark wrote:
On Thu, Mar 18, 2021 at 9:43 A
On Thu, Mar 25, 2021 at 7:53 AM Oleksandr Andrushchenko
wrote:
>
> Hi,
>
> On 3/25/21 8:19 AM, Wan Jiabing wrote:
> > struct xen_drm_front_drm_info has been declared.
> > Remove the duplicate.
> >
> > Signed-off-by: Wan Jiabing
>
> Thank you for the patch,
>
> Reviewed-by: Oleksandr Andrushchenko
On Thu, Mar 25, 2021 at 10:16 AM Daniel Vetter wrote:
>
> On Thu, Mar 25, 2021 at 7:53 AM Oleksandr Andrushchenko
> wrote:
> >
> > Hi,
> >
> > On 3/25/21 8:19 AM, Wan Jiabing wrote:
> > > struct xen_drm_front_drm_info has been declared.
> > > Remove the duplicate.
> > >
> > > Signed-off-by: Wan J
Hi, Daniel!
On 3/25/21 11:16 AM, Daniel Vetter wrote:
> On Thu, Mar 25, 2021 at 7:53 AM Oleksandr Andrushchenko
> wrote:
>> Hi,
>>
>> On 3/25/21 8:19 AM, Wan Jiabing wrote:
>>> struct xen_drm_front_drm_info has been declared.
>>> Remove the duplicate.
>>>
>>> Signed-off-by: Wan Jiabing
>> Thank
On Thu, Mar 25, 2021 at 10:13:11AM +0100, Roger Pau Monné wrote:
> On Wed, Mar 24, 2021 at 04:44:05PM +, George Dunlap wrote:
> > Signed-off-by: George Dunlap
>
> LGTM, maybe Manuel has something else to add.
no, it's OK for me too
--
Manuel Bouyer
NetBSD: 26 ans d'experience feront
On 25/03/2021 09:04, George Dunlap wrote:
>
>> On Mar 25, 2021, at 7:57 AM, Jan Beulich wrote:
>>
>> On 24.03.2021 17:44, George Dunlap wrote:
>>> --- a/CHANGELOG.md
>>> +++ b/CHANGELOG.md
>>> @@ -14,6 +14,8 @@ The format is based on [Keep a
>>> Changelog](https://keepachangelog.com/en/1.0.0/)
>>
On Thu, Mar 25, 2021 at 10:14:31AM +0100, George Dunlap wrote:
>
>
> > On Mar 25, 2021, at 8:32 AM, Roger Pau Monne wrote:
> >
> > On Wed, Mar 24, 2021 at 05:53:26AM -0700, Christopher Clark wrote:
> >> On Wed, Mar 24, 2021 at 1:01 AM Roger Pau Monné
> >> wrote:
> >>>
> >>> On Tue, Mar 23, 2
flight 160387 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/160387/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stopfail like 160152
test-amd64-amd64-xl-qemut-win7-amd64 19
Am Mon, 22 Mar 2021 18:09:17 -0400
schrieb John Snow :
> My understanding is that XEN has some extra disks that it unplugs when
> it later figures out it doesn't need them. How exactly this works is
> something I've not looked into too closely.
It has no extra disks, why would it?
I assume eac
From: Julien Grall
It is not very clear the shared page adddress is not contained in the
connection record. Additionally, it is misleading to say the grant
will always point to the share paged as a domain is free to revoke the
permission. The restore code would need to make sure it doesn't
fail/c
From: Julien Grall
The last use of the compat foreign API was dropped in commit
38eeb3864de4 "tools/xenstored: Drop mapping of the ring via foreign
map".
Therefore, we don't need to define XC_WANT_COMPAT_MAP_FOREIGN_API.
Signed-off-by: Julien Grall
---
tools/xenstore/xenstored_core.h | 1 -
1
On Wed, Mar 24, 2021 at 05:05:04PM -0400, Boris Ostrovsky wrote:
>
> (Re-sending with Stephen added)
>
>
> While running performance tests with recent XSAs backports to our product
> we've
> discovered significant regression in TPCC performance. With a particular guest
> kernel the numbers drop
On Thu, Mar 25, 2021 at 09:46:46AM +0100, Roger Pau Monné wrote:
> On Wed, Mar 24, 2021 at 06:57:12PM +0200, Andy Shevchenko wrote:
> > On Wed, Mar 24, 2021 at 04:13:59PM +0100, Roger Pau Monné wrote:
> > > On Wed, Mar 24, 2021 at 04:22:44PM +0200, Andy Shevchenko wrote:
> > > > On Wed, Mar 24, 202
On Thu, Mar 25, 2021 at 10:09:47AM +0100, Roger Pau Monne wrote:
> Use the value read from the REVID register in order to check for the
> presence of the device. A read of all ones is treated as if the device
> is not present, and hence probing is ended.
>
> This fixes an issue when running as a X
On 25.03.2021 10:37, Andrew Cooper wrote:
> On 25/03/2021 09:04, George Dunlap wrote:
>>> On Mar 25, 2021, at 7:57 AM, Jan Beulich wrote:
>>> On 24.03.2021 17:44, George Dunlap wrote:
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -14,6 +14,8 @@ The format is based on [Keep a
Change
On 25/03/2021 11:42, Julien Grall wrote:
> From: Julien Grall
>
> The last use of the compat foreign API was dropped in commit
> 38eeb3864de4 "tools/xenstored: Drop mapping of the ring via foreign
> map".
>
> Therefore, we don't need to define XC_WANT_COMPAT_MAP_FOREIGN_API.
>
> Signed-off-by: Jul
On Wed, Mar 24, 2021 at 05:05:05PM -0400, Boris Ostrovsky wrote:
> Commit 8e76aef72820 ("x86/vpt: fix race when migrating timers between
> vCPUs") addressed XSA-336 by introducing a per-domain rwlock that was
> intended to protect periodic timer during VCPU migration. Since such
> migration is an i
Fixes: a04509d34d ("Branching: Update version files etc. for newly unstable")
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Roger Pau Monné
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
CC: Volodymyr Babchuk
---
xen/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
On Wed, 24 Mar 2021, Randy Dunlap wrote:
> On 3/24/21 9:35 PM, Bhaskar Chowdhury wrote:
> > s/acrros/across/
> >
> > Plus some words need prural version...so did it.(page->pages)
> >
> > Signed-off-by: Bhaskar Chowdhury
>
> Acked-by: Randy Dunlap
Acked-by: Stefano Stabellini
> > ---
> > C
Patch series available in this git branch:
git://xenbits.xen.org/people/aperard/ovmf.git br.apic-timer-freq-v2
Changes in v2:
- main change is to allow mapping of Xen pages outside of the RAM
see patch: "OvmfPkg/XenPlatformPei: Map extra physical address"
- that new function allows to map the Xe
To avoid nasm generating a warning, replace the macro by the value
expected to be stored in eax.
Ia32/XenPVHMain.asm:76: warning: dword data exceeds bounds
Reported-by: Laszlo Ersek
Signed-off-by: Anthony PERARD
Reviewed-by: Laszlo Ersek
---
OvmfPkg/XenResetVector/Ia32/XenPVHMain.asm | 2 +-
We are going to use the page table structure in yet another place,
collect the types and macro that can be used from another module
rather that making yet another copy.
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2490
Signed-off-by: Anthony PERARD
---
CC: Tom Lendacky
CC: Brijesh Singh
We are going to want to change the value of PcdFSBClock at run time in
OvmfXen, so move it to the PcdsDynamic section.
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2490
Signed-off-by: Anthony PERARD
Reviewed-by: Laszlo Ersek
Reviewed-by: Liming Gao
---
CC: Bob Feng
CC: Michael D Kinney
Calculate the frequency of the APIC timer that Xen provides.
Even though the frequency is currently hard-coded, it isn't part of
the public ABI that Xen provides and thus may change at any time. OVMF
needs to determine the frequency by an other mean.
Fortunately, Xen provides a way to determines
We are going to use new fields from the Xen headers. Apply the EDK2
coding style so that the code that is going to use it doesn't look out
of place.
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2490
Signed-off-by: Anthony PERARD
Reviewed-by: Laszlo Ersek
---
Notes:
v2:
- fix case
Some information available in a Xen guest can be mapped anywhere in
the physical address space and they don't need to be backed by RAM.
For example, the shared info page.
While it's easier to put those pages anywhere, it is better to avoid
mapping it where the RAM is. It might split a nice 1G gues
Update gEfiMdePkgTokenSpaceGuid.PcdFSBClock so it can have the correct
value when SecPeiDxeTimerLibCpu start to use it for the APIC timer.
Currently, nothing appear to use the value in PcdFSBClock before
XenPlatformPei had a chance to set it even though TimerLib is included
in modules runned befor
On 25.03.2021 16:07, Andrew Cooper wrote:
> Fixes: a04509d34d ("Branching: Update version files etc. for newly unstable")
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
The change to deny all accesses to MSRs indexes not explicitly handled
prevents leaking unwanted data into guests.
Signed-off-by: Roger Pau Monné
---
CHANGELOG.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index f76fadf8c73..d81608af4de 100644
--- a/CHANGELOG
On 25/03/21 12:12, Olaf Hering wrote:
Am Mon, 22 Mar 2021 18:09:17 -0400
schrieb John Snow :
My understanding is that XEN has some extra disks that it unplugs when
it later figures out it doesn't need them. How exactly this works is
something I've not looked into too closely.
It has no extra
This is a refinement of Jan's "[PATCH][4.15] x86/HPET: don't enable legacy
replacement mode unconditionally" to try and make Xen do the helpful thing on
boot, rather than requiring a non-default command line option to boot in the
first place.
Andrew Cooper (1):
x86/hpet: Factor hpet_enable_legac
... in preparation to introduce a second caller.
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Roger Pau Monné
CC: Wei Liu
CC: Ian Jackson
CC: Marek Marczykowski-Górecki
CC: Frédéric Pierret
For 4.15. Pre-req for trying to unbreak AMD Ryzen 1800X systems.
---
From: Jan Beulich
Commit e1de4c196a2e ("x86/timer: Fix boot on Intel systems using ITSSPRC
static PIT clock gating") was reported to cause boot failures on certain
AMD Ryzen systems.
Refine the fix to do nothing in the default case, and only attempt to
configure legacy replacement mode if IRQ0 i
On Thu, 25 Mar 2021, Roger Pau Monné wrote:
> On Thu, Mar 25, 2021 at 10:14:31AM +0100, George Dunlap wrote:
> >
> >
> > > On Mar 25, 2021, at 8:32 AM, Roger Pau Monne wrote:
> > >
> > > On Wed, Mar 24, 2021 at 05:53:26AM -0700, Christopher Clark wrote:
> > >> On Wed, Mar 24, 2021 at 1:01 AM Ro
flight 160392 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/160392/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs.
152631
test-amd64-i3
On 25/03/2021 16:52, Andrew Cooper wrote:
> From: Jan Beulich
>
> Commit e1de4c196a2e ("x86/timer: Fix boot on Intel systems using ITSSPRC
> static PIT clock gating") was reported to cause boot failures on certain
> AMD Ryzen systems.
>
> Refine the fix to do nothing in the default case, and only
From: Jan Beulich
Commit e1de4c196a2e ("x86/timer: Fix boot on Intel systems using ITSSPRC
static PIT clock gating") was reported to cause boot failures on certain
AMD Ryzen systems.
Refine the fix to do nothing in the default case, and only attempt to
configure legacy replacement mode if IRQ0 i
Hey all,
I just wanted to send this out as a new email thread in case
anyone missed the reply on the previous thread.
It looks like the following date works best:
Mon. March 29th, 16:00 UTC
https://meet.vates.fr/xen-lockdown
Feel free to let us know if the time presents a conflict.
--
Bobby E
From: Julien Grall
Commit 13dd372834a4 removed the documentation for XS_RESUME, however
this command is still implemented (at least in C Xenstored) and used by
libxl when resuming a domain.
So re-instate the documentation for the XS_RESUME. Take the opportunity
to update it as there is a user of
On 03/25/21 16:47, Anthony PERARD wrote:
> Patch series available in this git branch:
> git://xenbits.xen.org/people/aperard/ovmf.git br.apic-timer-freq-v2
I'll get to this sometime in April, possibly after the SEV-SNP series.
That shouldn't discourage others from reviewing sooner, of course.
Tha
Fixes: a04509d34d ("Branching: Update version files etc. for newly unstable")
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
---
tools/libfsimage/common/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libfsimage/common/Makefile b/tools/libfsimage
flight 160406 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/160406/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 151777
build-armhf-libvirt
flight 160419 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/160419/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
flight 160399 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/160399/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f037af6ecbc3b55042c998a59ed8df8548e64b99
baseline version:
ovmf 0ecdcb6142037dd1cdd08
On 3/24/21 7:09 PM, Boris Ostrovsky wrote:
> On 3/24/21 8:24 AM, Roger Pau Monne wrote:
>> Hello,
>>
>> This is a proposal for an alternative fix for XSA-369 that instead of
>> special casing XEN_UNPOPULATED_ALLOC to size the p2m relies on making
>> XEN_BALLOON_MEMORY_HOTPLUG_LIMIT depend on the
On 3/25/21 10:48 AM, Roger Pau Monné wrote:
> On Wed, Mar 24, 2021 at 05:05:05PM -0400, Boris Ostrovsky wrote:
>> Commit 8e76aef72820 ("x86/vpt: fix race when migrating timers between
>> vCPUs") addressed XSA-336 by introducing a per-domain rwlock that was
>> intended to protect periodic timer du
flight 160400 xen-4.12-testing real [real]
flight 160430 xen-4.12-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/160400/
http://logs.test-lab.xenproject.org/osstest/logs/160430/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could
flight 160404 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/160404/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 160376
test-armhf-armhf-libvirt 16 save
63 matches
Mail list logo