On 01.12.2022 14:20, Andrew Cooper wrote:
> On 28/11/2022 10:50, Jan Beulich wrote:
>> All,
>>
>> the release is due in a couple of weeks time; ideally we'd get it out
>> before the year end break.
>>
>> Please point out backports you find missing from the respective staging
>> branch, but which yo
On 01.12.2022 19:11, Ayan Kumar Halder wrote:
> Machine frame number (mfn) is used to represent the hardware page address.
> This is an unsigned long variable. We need to check if it can hold the
> complete
> range of hardware page addresses. To ensure this we check that the count of
> bits
> rep
On 01.12.2022 17:02, Rahul Singh wrote:
> --- a/xen/drivers/passthrough/Kconfig
> +++ b/xen/drivers/passthrough/Kconfig
> @@ -35,6 +35,12 @@ config IPMMU_VMSA
> (H3 ES3.0, M3-W+, etc) or Gen4 SoCs which IPMMU hardware supports
> stage 2
> translation table format and is able to use
On 01.12.2022 17:02, Rahul Singh wrote:
> Add new viommu_type field and field values XEN_DOMCTL_CONFIG_VIOMMU_NONE
> XEN_DOMCTL_CONFIG_VIOMMU_SMMUV3 in xen_arch_domainconfig to
> enable/disable vIOMMU support for domains.
>
> Also add viommu="N" parameter to xl domain configuration to enable the
>
On 01.12.2022 17:02, Rahul Singh wrote:
> --- a/docs/misc/xen-command-line.pandoc
> +++ b/docs/misc/xen-command-line.pandoc
> @@ -1896,6 +1896,13 @@ This option can be specified more than once (up to 8
> times at present).
>
> Flag to enable or disable support for PCI passthrough
>
> +### vio
On 01.12.2022 17:02, Rahul Singh wrote:
> --- a/xen/include/xen/iommu.h
> +++ b/xen/include/xen/iommu.h
> @@ -230,6 +230,15 @@ int iommu_do_dt_domctl(struct xen_domctl *, struct
> domain *,
>
> #endif /* HAS_DEVICE_TREE */
>
> +#ifdef CONFIG_ARM
> +struct iommu_guest_config {
> +paddr_t
A NAPI is setup for each network sring to poll data to kernel
The sring with source host is destroyed before live migration and
new sring with target host is setup after live migration.
The NAPI for the old sring is not deleted until setup new sring
with target host after migration. With busy_poll/
Philippe Mathieu-Daudé writes:
> On 2/12/22 03:59, Vikram Garhwal wrote:
>> Replace g_malloc with g_new and perror with error_setg_errno.
>>
>> Signed-off-by: Vikram Garhwal
>> ---
>> hw/xen/xen-hvm-common.c | 15 ---
>> 1 file changed, 8 insertions(+), 7 deletions(-)
>
>
>> @@ -
On 26.11.22 06:07, Harshit Mogalapalli wrote:
As 'kdata.num' is user-controlled data, if user tries to allocate
memory larger than(>=) MAX_ORDER, then kcalloc() will fail, it
creates a stack trace and messes up dmesg with a warning.
Call trace:
-> privcmd_ioctl
--> privcmd_ioctl_mmap_resource
A
flight 175019 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175019/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
> On 1 Dec 2022, at 12:10, Andrew Cooper wrote:
>
> On 01/12/2022 11:20, Christian Lindig wrote:
>>
>>> On 30 Nov 2022, at 16:54, Andrew Cooper wrote:
>>>
>>> Generally speaking, the event channel local/remote port is fixed for the
>>> lifetime of the associated domain object. The exceptio
On 02/12/2022 08:26, Jan Beulich wrote:
> On 01.12.2022 14:20, Andrew Cooper wrote:
>> On 28/11/2022 10:50, Jan Beulich wrote:
>>> All,
>>>
>>> the release is due in a couple of weeks time; ideally we'd get it out
>>> before the year end break.
>>>
>>> Please point out backports you find missing fr
> On 1 Dec 2022, at 21:19, Andrew Cooper wrote:
>
> fallback_exception_handler feeds a string with embedded newlines directly into
> syslog(). While this is an improvement on getting nothing, syslogd escapes
> all control characters it gets, and emits one (long) line into the log.
>
> Fix th
On 02.12.2022 10:11, Andrew Cooper wrote:
> On 02/12/2022 08:26, Jan Beulich wrote:
>> On 01.12.2022 14:20, Andrew Cooper wrote:
>>> On 28/11/2022 10:50, Jan Beulich wrote:
All,
the release is due in a couple of weeks time; ideally we'd get it out
before the year end break.
Hi Jan,
On 02/12/2022 08:31, Jan Beulich wrote:
On 01.12.2022 19:11, Ayan Kumar Halder wrote:
Machine frame number (mfn) is used to represent the hardware page address.
This is an unsigned long variable. We need to check if it can hold the complete
range of hardware page addresses. To ensure th
Hi all,
Xen 4.17 rc4 is tagged. You can check that out from xen.git:
git://xenbits.xen.org/xen.git 4.17.0-rc4
For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.17.0-rc4/xen-4.17.0-rc4.tar.gz
And the signature is at:
https://downloads.xenproject.org/
Returning back truncated frame numbers is unhelpful: Quite likely
they're not owned by the domain (if it's PV), or we may misguide the
guest into writing grant entries into a page that it actually uses for
other purposes.
Signed-off-by: Jan Beulich
---
v2: Drop use of VALID_M2P(). Use "break". Mo
On 02/12/2022 09:14, Christian Lindig wrote:
>> On 1 Dec 2022, at 21:19, Andrew Cooper wrote:
>>
>> fallback_exception_handler feeds a string with embedded newlines directly
>> into
>> syslog(). While this is an improvement on getting nothing, syslogd escapes
>> all control characters it gets, a
On 02.12.2022 10:30, Ayan Kumar Halder wrote:
> Hi Jan,
>
> On 02/12/2022 08:31, Jan Beulich wrote:
>> On 01.12.2022 19:11, Ayan Kumar Halder wrote:
>>> Machine frame number (mfn) is used to represent the hardware page address.
>>> This is an unsigned long variable. We need to check if it can hold
On 02/12/2022 03:24, Garhwal, Vikram wrote:
Hi Julien,
Hi Vikram,
I am having trouble to differentiate your answers from my remark. For
instance...
From: Julien Grall
Date: Sunday, October 16, 2022 at 10:48 AM
To: Garhwal, Vikram , qemu-de...@nongnu.org
Cc: Stabellini, Stefano , Pet
On 02/12/2022 09:46, Jan Beulich wrote:
> Returning back truncated frame numbers is unhelpful: Quite likely
> they're not owned by the domain (if it's PV), or we may misguide the
> guest into writing grant entries into a page that it actually uses for
> other purposes.
>
> Signed-off-by: Jan Beulic
On 2/12/22 08:19, Philippe Mathieu-Daudé wrote:
Hi Stefano and Vikram,
On 2/12/22 03:59, Vikram Garhwal wrote:
From: Stefano Stabellini
This is done to prepare for enabling xenpv support for ARM architecture.
On ARM it is possible to have a functioning xenpv machine with only the
PV backends
Changes since v1:
* dropped stdint.h patch, still being discussed on where to best fix it
* addressed review comments (see individual patches' changes section)
Edwin Török (4):
CODING-STYLE: add .editorconfig to clarify indentation uses spaces
tools/ocaml/libs/xc: add binding to xc_evtchn_stat
Not to be confused which hvm_get_param, which also exists and has a
different, more error-prone interface.
This one always returns a 64-bit value, and that is retained in the
OCaml binding as well, returning 'int64' (and not int, or nativeint
which might have a different size).
The integer here i
Add an .editorconfig to make it easier to keep patches compatible with
Xen's coding style, and to reemphasize what Xen's coding style is.
I thought that Xen demands tabs rather than spaces (which is more
difficult with OCaml because indentation tools use spaces,
and the use of tabs requires changi
There is no API or ioctl to query event channel status, it is only
present in xenctrl.h
The C union is mapped to an OCaml variant exposing just the value from the
correct union tag.
The information provided here is similar to 'lsevtchn', but rather than
parsing its output it queries the underlyin
Hi Rahul,
On 01/12/2022 17:02, Rahul Singh wrote:
>
>
> The SMMUv3 supports two stages of translation. Each stage of translation can
> be
> independently enabled. An incoming address is logically translated from VA to
> IPA in stage 1, then the IPA is input to stage 2 which translates the IPA t
Hi Bertrand,
On 01/12/2022 15:25, Bertrand Marquis wrote:
>
>
> Add make clean support to remove the containers from the local docker
> registry.
> make clean- must be called to remove an image:
> make clean-yocto/kirkstone-qemuarm: remove yocto kirkstone for qemuarm
> image
>
> Signed-off-by:
Hi Bertrand,
On 01/12/2022 15:25, Bertrand Marquis wrote:
>
>
> Add containers suitable to run yocto kirkstone build based on ubuntu
> 22.04. It contains all packages required by Yocto and a checkout of the
> layers required to build Xen with Yocto.
>
> Add a generic docker image template to be
Add a .clang-format configuration that tries to match CODING_STYLE where
possible.
I was not able to express the special casing of braces after 'do'
though, this can only be controlled generally for all control
statements.
It is imperfect, but should be better than the existing bindings, which
do
flight 175011 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175011/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-coresched-amd64-xl broken in 175004
test-arm64-arm64-examine 8
> On 1 Dec 2022, at 21:56, Elliott Mitchell wrote:
>
> On Thu, Nov 24, 2022 at 05:11:36PM +, George Dunlap wrote:
>>
>> == Dial-in Information ==
>> ## Meeting time
>> 16:00 - 17:00 UTC
>> Further International meeting times:
>> https://www.timeanddate.com/worldclock/meetingdetails.html?ye
On 02/12/2022 10:55, Edwin Török wrote:
> Not to be confused which hvm_get_param, which also exists and has a
> different, more error-prone interface.
>
> This one always returns a 64-bit value, and that is retained in the
> OCaml binding as well, returning 'int64' (and not int, or nativeint
> whic
On Wed, Nov 30, 2022 at 05:08:06PM -0800, Stefano Stabellini wrote:
> On Wed, 30 Nov 2022, Roger Pau Monne wrote:
> > The hvc machinery registers both a console and a tty device based on
> > the hv ops provided by the specific implementation. Those two
> > interfaces however have different locks,
On 02/12/2022 10:55, Edwin Török wrote:
> diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c
> b/tools/ocaml/libs/xc/xenctrl_stubs.c
> index d30585f21c..a492ea17fd 100644
> --- a/tools/ocaml/libs/xc/xenctrl_stubs.c
> +++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
> @@ -641,6 +645,69 @@ CAMLprim value stu
> On 2 Dec 2022, at 10:55, Edwin Török wrote:
>
> Not to be confused which hvm_get_param, which also exists and has a
> different, more error-prone interface.
>
> This one always returns a 64-bit value, and that is retained in the
> OCaml binding as well, returning 'int64' (and not int, or nat
On Wed, Nov 30, 2022 at 08:48:14AM -0800, Dave Hansen wrote:
> On 11/30/22 07:53, Roger Pau Monné wrote:
> > On Tue, Nov 29, 2022 at 09:43:53AM -0800, Dave Hansen wrote:
> >> On 11/21/22 02:21, Roger Pau Monne wrote:
> >>> When running as a Xen dom0 the number of CPUs available to Linux can
> >>> b
We want to ensure that "xenheap_bits - PAGE_SHIFT" is strictly less than
the number of bits to represent unsigned long as it is used a rhs operand
to shift mfn.
It is also important to note that the "xenheap_bits - PAGE_SHIFT" is never
used to shift an address (rather than a frame number), and goin
flight 175022 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175022/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 02/12/2022 12:35, Ayan Kumar Halder wrote:
> Currently this change will not have any impact on the existing architectures.
> The following table illustrates PADDR_BITS vs BITS_PER_LONG of different archs
>
>
> | Arch | PADDR_BITS| BIT
> On 2 Dec 2022, at 10:55, Edwin Török wrote:
>
> There is no API or ioctl to query event channel status, it is only
> present in xenctrl.h
>
> The C union is mapped to an OCaml variant exposing just the value from the
> correct union tag.
>
> The information provided here is similar to 'lsev
> On 1 Dec 2022, at 20:23, Stefano Stabellini wrote:
>
> On Thu, 1 Dec 2022, Luca Fancellu wrote:
>> Hi Stefano,
>>
>
>
>> +sm_tool_args="n"
>> +;;
>> +--cppcheck-cmd=*)
>> +CPPCHECK_TOOL="$(eval echo "${OPTION#*=}")"
>>
On 02.12.2022 13:35, Ayan Kumar Halder wrote:
> We want to ensure that "xenheap_bits - PAGE_SHIFT" is strictly less than
> the number of bits to represent unsigned long as it is used a rhs operand
> to shift mfn.
> It is also important to note that the "xenheap_bits - PAGE_SHIFT" is never
> used to
Hi,
On 02/12/2022 13:43, Jan Beulich wrote:
On 02.12.2022 13:35, Ayan Kumar Halder wrote:
We want to ensure that "xenheap_bits - PAGE_SHIFT" is strictly less than
the number of bits to represent unsigned long as it is used a rhs operand
to shift mfn.
It is also important to note that the "xenhe
flight 175015 xen-4.17-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175015/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop fail like 175007
test-amd64-i386-xl-qemut-win7-am
(Adding xen-devel to the CC list.)
Hi, Henry. Pleaed to "meet" you. To answer your questions:
> > > (1) Why do the instructions say to branch that repo?
> > > (2) Where can we find this repo?
> > > (3) Is this repo used anywhere since the 4.16 release?
> > > (4) Is this repo used elsewhere in t
Hi Rahul,
On 01/12/2022 17:02, Rahul Singh wrote:
>
>
> XEN will create an Emulated SMMUv3 device tree node in the device tree
> to enable the dom0less domains to discover the virtual SMMUv3 during
> boot. Emulated SMMUv3 device tree node will only be created when cmdline
> option vsmmuv3 is ena
Hi Ian,
> -Original Message-
> From: Ian Jackson
> Subject: Release checklist and qemu-xen-traditional
>
> (Adding xen-devel to the CC list.)
Thank you for doing this, it would be great to have the answer below
logged in the mailing list.
>
> Hi, Henry. Pleased to "meet" you. To ans
Hi Rahul,
On 01/12/2022 17:02, Rahul Singh wrote:
>
>
> To configure IOMMU in guest for passthrough devices, user will need to
> copy the unmodified "iommus" property from host device tree to partial
> device tree. To enable the dom0 linux kernel to confiure the IOMMU
> correctly replace the pha
Vikram Garhwal writes:
> Add a new machine xenpv which creates a IOREQ server to register/connect with
> Xen Hypervisor.
>
> Optional: When CONFIG_TPM is enabled, it also creates a tpm-tis-device, adds a
> TPM emulator and connects to swtpm running on host machine via chardev socket
> and suppo
On 08.11.22 13:23, Viresh Kumar wrote:
Hello Viresh
[sorry for the possible format issues if any]
This patch adds basic support for configuring and assisting generic
Virtio backend which could run in any domain.
An example of domain configuration for mmio based Virtio I2C device is:
virt
Vikram Garhwal writes:
> Add a new machine xenpv which creates a IOREQ server to register/connect with
> Xen Hypervisor.
>
> Optional: When CONFIG_TPM is enabled, it also creates a tpm-tis-device, adds a
> TPM emulator and connects to swtpm running on host machine via chardev socket
> and suppo
Vikram Garhwal writes:
> Hi,
> This series add xenpv machine for aarch64. Motivation behind creating xenpv
> machine with IOREQ and TPM was to enable each guest on Xen aarch64 to have
> it's
> own unique and emulated TPM.
>
> This series does following:
> 1. Moved common xen functionalitie
flight 175018 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175018/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 175002
test-armhf-armhf-libvirt-raw 15 saveresto
On 12/2/22 04:24, Roger Pau Monné wrote:
> On the implementation side, is the proposed approach acceptable?
> Mostly asking because it adds Xen conditionals to otherwise generic
> ACPI code.
That's a good Rafael question.
But, how do other places in the ACPI code handle things like this?
Henry Wang writes ("RE: Release checklist and qemu-xen-traditional"):
> Although I am wondering if the instruction about qemu-iwj.git here:
> ```
> * make branch in qemu-iwj.git
> git-branch $v-testing master
> ```
>
> would be duplicated with instructions here:
> ```
> # make branches in
On Fri, Dec 02, 2022 at 08:17:56AM -0800, Dave Hansen wrote:
> On 12/2/22 04:24, Roger Pau Monné wrote:
> > On the implementation side, is the proposed approach acceptable?
> > Mostly asking because it adds Xen conditionals to otherwise generic
> > ACPI code.
>
> That's a good Rafael question.
>
flight 175024 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175024/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Fri, Dec 2, 2022 at 5:37 PM Roger Pau Monné wrote:
>
> On Fri, Dec 02, 2022 at 08:17:56AM -0800, Dave Hansen wrote:
> > On 12/2/22 04:24, Roger Pau Monné wrote:
> > > On the implementation side, is the proposed approach acceptable?
> > > Mostly asking because it adds Xen conditionals to otherwi
On 08.11.22 13:23, Viresh Kumar wrote:
Hello Viresh
[sorry for the possible format issues if any]
This patch adds basic support for parsing generic Virtio backend.
An example of domain configuration for mmio based Virtio I2C device is:
virtio = ["type=virtio,device22,transport=mmio"]
Sig
On Thu, Dec 1, 2022 at 12:08 PM Ricardo Ribalda wrote:
>
> Add a way to let the drivers know if the processes are frozen.
>
> This is needed by drivers that are waiting for processes to end on their
> shutdown path.
>
> Convert pm_freezing into a function and export it, so it can be used by
> driv
Hi Markus & Philippe,
Thanks for reviewing this one. Please see the question below.
On 12/2/22 12:53 AM, Markus Armbruster wrote:
Philippe Mathieu-Daudé writes:
On 2/12/22 03:59, Vikram Garhwal wrote:
Replace g_malloc with g_new and perror with error_setg_errno.
Signed-off-by: Vikram Garhw
/proc/xen is a legacy pseudo filesystem which predates Xen support
getting merged into Linux. It has largely been replaced with more
normal locations for data (/sys/hypervisor/ for info, /dev/xen/ for
user devices). We want to compile xenfs support out of the dom0 kernel.
There is one item which
On Fri, Dec 02, 2022 at 12:56:06PM +, Andrew Cooper wrote:
> On 02/12/2022 12:35, Ayan Kumar Halder wrote:
> > Currently this change will not have any impact on the existing
> > architectures.
> > The following table illustrates PADDR_BITS vs BITS_PER_LONG of different
> > archs
> >
> > -
flight 175026 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175026/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5d5be45bd7c1e479863125e7d772e54772c9
baseline version:
ovmf 47d988387efc8b45561f5
flight 175021 xen-unstable real [real]
flight 175027 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/175021/
http://logs.test-lab.xenproject.org/osstest/logs/175027/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be r
On Fri, Dec 02, 2022 at 11:17:18AM +, George Dunlap wrote:
>
>
> > On 1 Dec 2022, at 21:56, Elliott Mitchell wrote:
> >
> > On Thu, Nov 24, 2022 at 05:11:36PM +, George Dunlap wrote:
> >>
> >> == Dial-in Information ==
> >> ## Meeting time
> >> 16:00 - 17:00 UTC
> >> Further Internatio
On Fri, 1 Dec 2022, Philippe Mathieu-Daudé wrote:
> On 2/12/22 08:19, Philippe Mathieu-Daudé wrote:
> > Hi Stefano and Vikram,
> >
> > On 2/12/22 03:59, Vikram Garhwal wrote:
> > > From: Stefano Stabellini
> > >
> > > This is done to prepare for enabling xenpv support for ARM architecture.
> > >
Hi Alex,
On 12/2/22 6:52 AM, Alex Bennée wrote:
Vikram Garhwal writes:
Add a new machine xenpv which creates a IOREQ server to register/connect with
Xen Hypervisor.
Optional: When CONFIG_TPM is enabled, it also creates a tpm-tis-device, adds a
TPM emulator and connects to swtpm running on ho
On Fri, 2 Dec 2022, Vikram Garhwal wrote:
> On 12/2/22 6:52 AM, Alex Bennée wrote:
> > Vikram Garhwal writes:
> >
> > > Add a new machine xenpv which creates a IOREQ server to register/connect
> > > with
> > > Xen Hypervisor.
> > >
> > > Optional: When CONFIG_TPM is enabled, it also creates a tp
flight 175023 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175023/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462
test-arm64-arm64-xl
On Fri, 2 Dec 2022, Luca Fancellu wrote:
> > On 1 Dec 2022, at 20:23, Stefano Stabellini wrote:
> >
> > On Thu, 1 Dec 2022, Luca Fancellu wrote:
> >> Hi Stefano,
> >>
> >
> >
> >> +sm_tool_args="n"
> >> +;;
> >> +--cppcheck-cmd=*)
> >> +
flight 175025 xen-4.17-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175025/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop fail like 175015
test-amd64-i386-xl-qemut-win7-am
flight 175029 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175029/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf 5 host-buil
74 matches
Mail list logo