flight 35986 linux-3.14 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35986/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt4 host-build-prep fail REGR. vs. 35580
On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
Sent: Monday, March 09, 2015 10:43 PM
From: Elena Ufimtseva elena.ufimts...@oracle.com
On some platforms RMRR regions may be not specified
in ACPI and
Hello Edgar,
On 10/03/15 02:49, Edgar E. Iglesias wrote:
Signed-off-by: Edgar E. Iglesias edgar.igles...@xilinx.com
Reviewed-by: Julien Grall julien.gr...@linaro.org
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 09/03/15 16:08, Vijay Kilari wrote:
On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall julien.gr...@linaro.org wrote:
Hi Vijay,
Given the introduction of the new helper, the title looks wrong to me.
On 09/03/2015 08:59, vijay.kil...@gmail.com wrote:
diff --git a/xen/arch/arm/mm.c
On Tue, 2015-03-10 at 11:45 +, Julien Grall wrote:
On 09/03/15 16:08, Vijay Kilari wrote:
On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall julien.gr...@linaro.org
wrote:
Hi Vijay,
Given the introduction of the new helper, the title looks wrong to me.
On 09/03/2015 08:59,
While working with qemu, IGD is a specific device in the case of pass through
so we need to identify that to handle more later. Here we define a table to
record all IGD types currently we can support. Also we need to introduce two
helper functions to get vendor and device ids to lookup that table.
Hello Edgar,
Thank you for adding support of the ZynqMP.
On 10/03/15 02:49, Edgar E. Iglesias wrote:
From: Edgar E. Iglesias edgar.igles...@xilinx.com
Adds support for the Cadence UART in Xilinx ZynqMP. The
rest of the ZynqMP platform is discovered via device-tree.
Did you make sure that
On Tue, 2015-03-10 at 09:01 +, Ian Campbell wrote:
Forgot to say -- this needs some u-boot patches to enable booting in
hypmode. Jan Kiska has picked up the dev work of those, I tested using
v4 from http://lists.denx.de/pipermail/u-boot/2015-February/206557.html
applied on top of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-2150 / XSA-120
version 4
Non-maskable interrupts triggerable by guests
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-2151 / XSA-123
version 4
Hypervisor memory corruption due to x86 emulator flaw
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-124
version 2
Non-standard PCI device functionality may render pass-through insecure
UPDATES IN VERSION 2
Clarify scope. PCI config space backdoors
flight 35991 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/35991/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 35919
On Mon, 2015-03-09 at 17:54 -0400, Don Slutz wrote:
On 03/09/15 11:40, Ian Campbell wrote:
Refactor the $kvp_replace helper in ts-xen-install into a generic
helper (which requires using ::EO and ::EI for namespacing) for use
with target_editfile and use it to edit /etc/sysctl.conf to set
Hi Ian,
On 09/03/15 16:06, Ian Campbell wrote:
On Mon, 2015-03-09 at 14:00 +0200, Julien Grall wrote:
Hi Ian,
On 05/03/2015 19:00, Ian Campbell wrote:
On Tue, 2015-03-03 at 16:35 +, Julien Grall wrote:
+gicv3_info.nr_lines = min((unsigned)1020, nr_lines);
1020U is the correct way
Copy the entire output buffer to the guest because some firmwares update
size on successful calls (contrary to the spec) and the buffer may
contain data beyond the output size that the firmware requires on a
subsequent GetNextVariableName() call (e.g. a NULL character).
Note that this shouldn't
On Tue, 10 Mar 2015, Bunny Mintoo wrote:
Thanks for your mail.
My architecture is x86 compatible. I have just added new instructions over
existing x86 ISA.These new instructions are now to be
taught to the CPU. In QEMU, I was able to mimic the new CPU working with
software changes (changes
On 10/03/15 07:30, Jan Beulich wrote:
On 09.03.15 at 19:49, andrew.coop...@citrix.com wrote:
On 09/03/15 16:08, Jan Beulich wrote:
Both PV and HVM logic have similar but not similar enough code here.
Synchronize the two so that
- in the HVM case we don't unconditionally try to access extended
v2:
* Refine patch #2's head description
* Improve codes quality inside patch #1 based on Wei's comments
* Refill the summary inside patch #0 based on Konrad and Wei's suggestion
When we're working to support IGD GFX passthrough with qemu
upstream, instead of -gfx_passthru we'd like to make
On 10/03/15 02:27, Boris Ostrovsky wrote:
SLIT values are byte-sized and some of them (0-9 and 255) have
special meaning. Adjust __node_distance() to reflect this and
modify scrub_heap_pages() to deal with __node_distance() returning
an invalid SLIT entry.
Signed-off-by: Boris Ostrovsky
For the last few weeks Anthony and I have been working on creating a CI
environment to run against all OpenStack jobs. We're now in a position where
we can share the current status, overview of how it works and next steps. We
actively want to support involvement in this effort from others
On 09/03/15 14:10, David Vrabel wrote:
Memory hotplug doesn't work with PV guests because:
a) The p2m cannot be expanded to cover the new sections.
Broken by 054954eb051f35e74b75a566a96fe756015352c8 (xen: switch to
linear virtual mapped sparse p2m list).
This one would be non-trivial to
On Tue, Mar 10, 2015 at 06:42:30AM +, Liu, SongtaoX wrote:
-Original Message-
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Ian Campbell
Sent: Tuesday, March 03, 2015 1:00 AM
To: Wei Liu
Cc: Samuel Thibault; Stefano Stabellini;
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
xc_numainfo() is not expected to be used on a hot path and therefore
hypercall buffer management can be pushed into libxc. This will simplify
life for callers.
Also update error logging macros.
Signed-off-by: Boris Ostrovsky
Wei Liu, le Tue 10 Mar 2015 13:14:39 +, a écrit :
... because XEN_ROOT is used in mini-os's Config.mk.
Signed-off-by: Wei Liu wei.l...@citrix.com
Acked-by: Samuel Thibault samuel.thiba...@ens-lyon.org
---
stubdom/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git
On Sun, 2015-03-08 at 21:11 -1000, Justin Weaver wrote:
Thanks to all for the comments! I've implemented most of the changes
recommended here in the v2 review. I should have a new patch set ready
this week (with an updated soft affinity patch as well).
Great! :-)
Oh, and this is what was
On 03/10/2015 07:53 AM, Andrew Cooper wrote:
On 10/03/15 02:27, Boris Ostrovsky wrote:
SLIT values are byte-sized and some of them (0-9 and 255) have
special meaning. Adjust __node_distance() to reflect this and
modify scrub_heap_pages() to deal with __node_distance() returning
an invalid SLIT
On 03/10/2015 03:35 AM, Jan Beulich wrote:
On 09.03.15 at 20:02, suravee.suthikulpa...@amd.com wrote:
I agree that having the IO page tables on the NUMA node that is closest
to the IOMMU would be beneficial.
And I already withdrew this patch and the corresponding VT-d one.
However, I am not
Add the {xen-pvscsi: } prefix in pr_fmt and remove DPRINTK, then
replace all DPRINTK with pr_debug.
Also fixed up some comments just as eliminate redundant whitespace
and format the code.
These will make the code easier to read.
Signed-off-by: Tao Chen boby.c...@huawei.com
---
On 10.03.15 at 14:18, julien.gr...@linaro.org wrote:
On 10/03/15 13:06, Jan Beulich wrote:
On 10.03.15 at 13:51, julien.gr...@linaro.org wrote:
Hi,
On 27/02/15 11:33, Roger Pau Monne wrote:
diff --git a/xen/drivers/passthrough/iommu.c
b/xen/drivers/passthrough/iommu.c
index
On 03/10/2015 07:40 AM, David Vrabel wrote:
On 09/03/15 14:10, David Vrabel wrote:
Memory hotplug doesn't work with PV guests because:
a) The p2m cannot be expanded to cover the new sections.
Broken by 054954eb051f35e74b75a566a96fe756015352c8 (xen: switch to
linear virtual mapped sparse
On 10.03.15 at 14:39, boris.ostrov...@oracle.com wrote:
On 03/10/2015 04:20 AM, Jan Beulich wrote:
On 10.03.15 at 03:27, boris.ostrov...@oracle.com wrote:
Changes in v4:
* Split cputopology and NUMA info changes into separate patches
* Added patch#1 (partly because patch#4 needs to know when
On 10/03/15 02:27, Boris Ostrovsky wrote:
Make sysctl NUMA topology query use fewer copies by combining some
fields into a single structure and copying distances for each node
in a single copy.
Instead of using max_node_index for passing number of nodes keep this
value in num_nodes: almost
Hi,
On 27/02/15 11:33, Roger Pau Monne wrote:
diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
index cc12735..7fcbbb1 100644
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct domain*
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
xc_cputopoinfo() is not expected to be used on a hot path and therefore
hypercall buffer management can be pushed into libxc. This will simplify
life for callers.
Also update error reporting macros.
Signed-off-by: Boris Ostrovsky
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
.. and use this new interface to display it along with CPU topology
and NUMA information when 'xl info -n' command is issued
The output will look like
...
cpu_topology :
cpu:coresocket node
0: 0
On 10.03.15 at 13:51, julien.gr...@linaro.org wrote:
Hi,
On 27/02/15 11:33, Roger Pau Monne wrote:
diff --git a/xen/drivers/passthrough/iommu.c
b/xen/drivers/passthrough/iommu.c
index cc12735..7fcbbb1 100644
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@
Hi all
Songtao Liu reported some issues with stubdom.
This patch series tights up those loose ends that caused the problem he
saw [0].
I've tested this series myself, but it would be good if Songtao can also
give it a try and confirm it fixes those issues.
Note that the patch marked with
On 10/03/15 13:06, Jan Beulich wrote:
On 10.03.15 at 13:51, julien.gr...@linaro.org wrote:
Hi,
On 27/02/15 11:33, Roger Pau Monne wrote:
diff --git a/xen/drivers/passthrough/iommu.c
b/xen/drivers/passthrough/iommu.c
index cc12735..7fcbbb1 100644
--- a/xen/drivers/passthrough/iommu.c
+++
Wei Liu, le Tue 10 Mar 2015 13:14:38 +, a écrit :
One place was missed when I did the replacement in 55f7cd7427 (Mini-OS:
standalone build).
Signed-off-by: Wei Liu wei.l...@citrix.com
Acked-by: Samuel Thibault samuel.thiba...@ens-lyon.org
---
Makefile | 2 +-
1 file changed, 1
One place was missed when I did the replacement in 55f7cd7427 (Mini-OS:
standalone build).
Signed-off-by: Wei Liu wei.l...@citrix.com
---
Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Makefile b/Makefile
index f16520e..862f766 100644
--- a/Makefile
+++ b/Makefile
... because XEN_ROOT is used in mini-os's Config.mk.
Signed-off-by: Wei Liu wei.l...@citrix.com
---
stubdom/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/stubdom/Makefile b/stubdom/Makefile
index f339b20..d9e7e40 100644
--- a/stubdom/Makefile
+++ b/stubdom/Makefile
@@ -1,6 +1,7 @@
I think it is fair to read the PCRs before performing Deep Quote and after
and
to retry if something changed.
It is an interesting suggestion to extend the tpm character device driver
in order
to obtain atomicity. I will think about it.
Thanks for clarifying.
On Mon, Mar 9, 2015 at 7:26 PM,
On 03/10/2015 04:20 AM, Jan Beulich wrote:
On 10.03.15 at 03:27, boris.ostrov...@oracle.com wrote:
Changes in v4:
* Split cputopology and NUMA info changes into separate patches
* Added patch#1 (partly because patch#4 needs to know when when distance is
invalid,
i.e. NUMA_NO_DISTANCE)
*
On Tue, Mar 10, 2015 at 5:22 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2015-03-10 at 11:45 +, Julien Grall wrote:
On 09/03/15 16:08, Vijay Kilari wrote:
On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall julien.gr...@linaro.org
wrote:
Hi Vijay,
Given the introduction of
From: Edgar E. Iglesias edgar.igles...@xilinx.com
Changelog:
v3 - v4:
* Move the grant table range to a reserved area. (Julien review)
v2 - v3:
* Fix coding style issues. (Julien review)
v1 - v2:
* Rebase with upstream/staging to fix the device-tree device matching. (Ian
review)
Edgar E.
Signed-off-by: Quan Xu quan...@intel.com
Signed-off-by: Stefan Berger stef...@linux.vnet.ibm.com
---
Makefile | 2 +-
src/post.c | 3 +
src/tpm.c | 309 +
src/tpm.h | 141
4 files changed, 454
This patch series are only the SeaBios part to enable stubdom vTPM for HVM
virtual machine. It will work with Qemu patch series and Xen patch series.
*INTRODUCTION*
The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM
--Changes in v4:
-qapi schema enhancement.
-remove no need code.
Signed-off-by: Quan Xu quan...@intel.com
---
configure| 14 ++
hmp.c| 2 ++
qapi-schema.json | 18 --
qemu-options.hx | 13 +++--
tpm.c| 7 ++-
5 files
Signed-off-by: Quan Xu quan...@intel.com
---
tools/libxl/libxl_create.c | 11 +--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c
index b1ff5ae..66877b3 100644
--- a/tools/libxl/libxl_create.c
+++
Signed-off-by: Quan Xu quan...@intel.com
---
tools/firmware/hvmloader/acpi/build.c | 7 ---
tools/libxl/libxl_create.c| 5 -
2 files changed, 8 insertions(+), 4 deletions(-)
diff --git a/tools/firmware/hvmloader/acpi/build.c
b/tools/firmware/hvmloader/acpi/build.c
index
make sure QEMU machine class is initialized and QEMU has registered
Xen stubdom vTPM driver when call tpm_init()
Signed-off-by: Quan Xu quan...@intel.com
---
vl.c | 17 +++--
1 file changed, 11 insertions(+), 6 deletions(-)
diff --git a/vl.c b/vl.c
index f6b3546..0bbdaa1 100644
---
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -313,17 +313,11 @@ struct operand {
enum { OP_REG, OP_MEM, OP_IMM, OP_NONE } type;
unsigned int bytes;
-/* Up to 128-byte operand value,
Hi Daniel,
On 23/02/15 16:25, Daniel De Graaf wrote:
On 02/20/2015 12:17 PM, Ian Campbell wrote:
On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
TODO: Update the commit message
A device node is described by a path. It will be used to retrieved the
node in the device tree and assign
*INTRODUCTION*
The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM
functionality to virtual machines (Fedora, Ubuntu, Redhat, Windows .etc). This
allows programs to interact with a TPM in a virtual machine the same way they
interact with a TPM on the physical system. Each
This drvier transfers any request/repond between TPM xenstubdoms
driver and Xen vTPM stubdom, and facilitates communications between
Xen vTPM stubdom domain and vTPM xenstubdoms driver. It is a glue for
the TPM xenstubdoms driver and Xen stubdom vTPM domain that provides
the actual TPM
This patch series are only the Xen part to enable stubdom vTPM for HVM virtual
machine.
it will work w/ Qemu patch series and seaBios patch series. Change
QEMU_STUBDOM_VTPM compile
option from 'n' to 'y', when the Qemu/SeaBios patch series are merged.
*INTRODUCTION*
Signed-off-by: Quan Xu quan...@intel.com
---
Config.mk | 4
tools/Makefile | 7 +++
2 files changed, 11 insertions(+)
diff --git a/Config.mk b/Config.mk
index a5b6c41..5a5f413 100644
--- a/Config.mk
+++ b/Config.mk
@@ -254,6 +254,10 @@ endif
OVMF_UPSTREAM_REVISION ?=
refactor libxl__device_vtpm_add to call the right helpers
libxl__device_vtpm_add_{pv,hvm}. For HVM virtual machine,
it does not support hot-plug and hot-unplug, as it requires
SeaBios to initalize ACPI and virtual MMIO space for TPM
TIS when virtual machine starts.
Signed-off-by: Quan Xu
when virtual machine is destroyed.
Signed-off-by: Quan Xu quan...@intel.com
---
tools/libxl/libxl_device.c | 61 +++---
1 file changed, 57 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/libxl_device.c b/tools/libxl/libxl_device.c
index
This patch adds infrastructure for xen front drivers living in qemu,
so drivers don't need to implement common stuff on their own. It's
mostly xenbus management stuff: some functions to access XenStore,
setting up XenStore watches, callbacks on device discovery and state
changes, and handle event
Signed-off-by: Quan Xu quan...@intel.com
---
extras/mini-os/tpmback.c | 21 -
1 file changed, 16 insertions(+), 5 deletions(-)
diff --git a/extras/mini-os/tpmback.c b/extras/mini-os/tpmback.c
index 8a0a983..b8f4c8f 100644
--- a/extras/mini-os/tpmback.c
+++
=
CALL FOR PAPERS
10th Workshop on Virtualization in High-Performance Cloud Computing (VHPC
'15)
held in conjunction with Euro-Par 2015, August 24-28, Vienna, Austria
(Springer LNCS)
From: Edgar E. Iglesias edgar.igles...@xilinx.com
Signed-off-by: Edgar E. Iglesias edgar.igles...@xilinx.com
---
xen/arch/arm/platforms/Makefile| 1 +
xen/arch/arm/platforms/xilinx-zynqmp.c | 41 ++
2 files changed, 42 insertions(+)
create mode 100644
Hi Andrew,
From Ian Stefano, I came to know that you have introduced
Migration framework v2
under below patch series
http://marc.info/?l=xen-develm=141036915311145
I have few queries:
1) Is there any plans/timeline to support for ARM32/ARM64?.
2) Also does the Domain Image format
Reviewed-by: Julien Grall julien.gr...@linaro.org
Signed-off-by: Edgar E. Iglesias edgar.igles...@xilinx.com
---
config/arm64.mk| 1 +
xen/drivers/char/Makefile | 1 +
xen/drivers/char/cadence-uart.c| 224 +
From: Edgar E. Iglesias edgar.igles...@xilinx.com
Reviewed-by: Julien Grall julien.gr...@linaro.org
Signed-off-by: Edgar E. Iglesias edgar.igles...@xilinx.com
---
docs/misc/arm/early-printk.txt | 1 +
xen/arch/arm/Rules.mk| 6 +
xen/arch/arm/arm64/debug-cadence.inc |
On 10.03.15 at 17:16, elena.ufimts...@oracle.com wrote:
On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -1232,6
Hi,
On 23/02/15 15:34, Ian Campbell wrote:
On Mon, 2015-02-23 at 10:10 +, Julien Grall wrote:
On 20/02/2015 17:04, Ian Campbell wrote:
On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
Currently, when the device is deassigned from a domain, we directly
reassign
to DOM0.
As the
On 10.03.15 at 12:24, andrew.coop...@citrix.com wrote:
On 10/03/15 07:30, Jan Beulich wrote:
On 09.03.15 at 19:49, andrew.coop...@citrix.com wrote:
On 09/03/15 16:08, Jan Beulich wrote:
Both PV and HVM logic have similar but not similar enough code here.
Synchronize the two so that
- in the
flight 36006 xen-4.5-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36006/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-pvh-intel 3 host-install(3) broken pass in 35937
test-amd64-amd64-xl-multivcpu
On 03/10/2015 10:29 AM, Andrew Cooper wrote:
On 10/03/15 02:27, Boris Ostrovsky wrote:
Instead of copying data for each field in xen_sysctl_topologyinfo separately
put cpu/socket/node into a single structure and do a single copy for each
processor.
Do not use max_cpu_index, which is almost
On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
Sent: Monday, March 09, 2015 10:43 PM
From: Elena Ufimtseva elena.ufimts...@oracle.com
On some platforms RMRR regions may be not specified
in ACPI and
Hi Gareth,
I think this counts as a -devel question, so I've added -devel and moved
-users to bcc (-users is more for end users). I've done less quote
trimming than usual for the other folks on -devel.
On Tue, 2015-03-10 at 14:15 +, Gareth Stockwell wrote:
What is the recommended way to
1: drop unused bigval fields from struct operand
2: simplify asm() constraints
Signed-off-by: Jan Beulich jbeul...@suse.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
When a device gets detached from a guest, pciback will clear its
command register, thus disabling both memory and I/O decoding. The
disabled memory decoding, however, has an effect on the MSI-X table
accesses the hypervisor does: These won't have the intended effect
anymore. Even worse, for PCIe
Rather than disabling and enabling MSI-X once per vector, do it just
once per device.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/msi.c
+++ b/xen/arch/x86/msi.c
@@ -1218,6 +1218,9 @@ int pci_restore_msi_state(struct pci_dev
struct msi_desc *entry, *tmp;
struct
The problem requiring the first patch here is actually what lead to
XSA-120.
1: be more careful during teardown
2: access MSI-X table only after having enabled MSI-X
3: reduce fiddling with control register during restore
4: cleanup
Signed-off-by: Jan Beulich jbeul...@suse.com
On 10/03/15 16:27, Jan Beulich wrote:
When a device gets detached from a guest, pciback will clear its
command register, thus disabling both memory and I/O decoding. The
disabled memory decoding, however, has an effect on the MSI-X table
accesses the hypervisor does: These won't have the
On 10/03/15 16:36, Jan Beulich wrote:
Use + on outputs instead of = and a matching input. Allow not just
memory for the _eflags operand (it turns out that recent gcc produces
worse code when also doing this for _dst.val, so the latter is being
avoided).
Signed-off-by: Jan Beulich
flight 36177 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36177/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
flight 36062 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36062/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 35887
On 10/03/15 16:35, Jan Beulich wrote:
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, Mar 10, 2015 at 04:27:15PM +, Jan Beulich wrote:
On 10.03.15 at 17:16, elena.ufimts...@oracle.com wrote:
On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote:
From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
--- a/xen/drivers/passthrough/vtd/iommu.c
Its pointless because internally, libxl__calloc() would always
terminate program execution if failed,
libxl__calloc()
|
+ void *ptr = calloc(nmemb, size);
+ if (!ptr) libxl__alloc_failed(CTX, __func__, nmemb, size);
|
+ _exit(-1);
-Original Message-
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Ian Campbell
Sent: Tuesday, March 03, 2015 1:00 AM
To: Wei Liu
Cc: Samuel Thibault; Stefano Stabellini; Ian Jackson; xen-devel@lists.xen.org
Subject: Re: [Xen-devel] [PATCH
Thanks for your mail.
My architecture is x86 compatible. I have just added new instructions over
existing x86 ISA.
These new instructions are now to be taught to the CPU. In QEMU, I was able
to mimic the new CPU working with software changes (changes involved in
both kernel and QEMU source tree).
On 09.03.15 at 19:49, andrew.coop...@citrix.com wrote:
On 09/03/15 16:08, Jan Beulich wrote:
Both PV and HVM logic have similar but not similar enough code here.
Synchronize the two so that
- in the HVM case we don't unconditionally try to access extended
config space
- in the PV case we
On 09.03.15 at 20:02, suravee.suthikulpa...@amd.com wrote:
I agree that having the IO page tables on the NUMA node that is closest
to the IOMMU would be beneficial.
And I already withdrew this patch and the corresponding VT-d one.
However, I am not sure at the moment
that this information
On 03/10/2015 12:52 PM, Julien Grall wrote:
Hi Daniel,
On 23/02/15 16:25, Daniel De Graaf wrote:
On 02/20/2015 12:17 PM, Ian Campbell wrote:
On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote:
TODO: Update the commit message
A device node is described by a path. It will be used to
Hi Daniel,
On 10/03/2015 22:45, Daniel De Graaf wrote:
BTW, do you have any pointer on how to write a policy for device/IRQ
passthrough?
There is a bit of documentation in xsm-flask.txt about device labeling,
which is the hard part of making passthrough work. Labels can be set
either
On 03/10/2015 07:07 PM, Julien Grall wrote:
Hi Daniel,
On 10/03/2015 22:45, Daniel De Graaf wrote:
BTW, do you have any pointer on how to write a policy for device/IRQ
passthrough?
There is a bit of documentation in xsm-flask.txt about device labeling,
which is the hard part of making
On 09.03.15 at 17:47, ross.lagerw...@citrix.com wrote:
Copy the entire output buffer to the guest because it may contain data beyond
the output size that the firmware requires on a subsequent
GetNextVariableName() call (e.g. a NULL character).
The spec requires that on each call, the
On 10.03.15 at 03:27, boris.ostrov...@oracle.com wrote:
Changes in v4:
* Split cputopology and NUMA info changes into separate patches
* Added patch#1 (partly because patch#4 needs to know when when distance is
invalid,
i.e. NUMA_NO_DISTANCE)
* Split sysctl version update into a separate
On Mon, 9 Mar 2015, Korupol, Naveen (EXT) wrote:
Hi Ian
I am (awesome) glad to see your response.
[IC] J6 EVM?
[NK] is a TI ( Spectrum Digital) evaluation board built on OMAP 5
architecture which has 2 ARM Cortex-A15 core(s), 2 Cortex-M4 cores and SGX544
3D graphics core(s).
[IC]
On 10.03.15 at 03:47, kevin.t...@intel.com wrote:
From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
Format for rmrr Xen command line option:
rmrr=[sbdf]start:end,[sbdf]start:end
how about sticking to rmrr structure, i.e.
rmrr=start:end[sbdf1, sbdf2, ...], ...
+1
+
As used on the Jetson board.
This platform has a bunch of specific mappings and, more importantly, an
additional interrupt controller (which is used alongside the main GIC and
covers the same interrupts etc, so it is not a secondary or chained interrupt
controller) which dom0 really wants to poke
DO NOT APPLY. Doesn't work without sync_console *and* the changes from HACK:
xen: arm: trying to figure out ns16550 vs. Tegra issue.
I suspect and IRQ or FIFO depth issue. Linux has a separate serial-tegra driver
so perhaps the device is just not as compatible as I think.
Signed-off-by: Ian
Rename the existing gic_dump_info to gic_dump_info_guest reduce confusion.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v2: s/gic_dump_info/gic_dump_info_guest/
---
xen/arch/arm/domain.c | 2 +-
xen/arch/arm/gic-v2.c | 66 ++-
Works without all this stuff.
---
xen/arch/arm/platforms/tegra.c | 68 +-
1 file changed, 67 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/platforms/tegra.c b/xen/arch/arm/platforms/tegra.c
index 189ef44..5ec9dda 100644
---
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
docs/misc/arm/early-printk.txt | 1 +
xen/arch/arm/Rules.mk | 5 +
2 files changed, 6 insertions(+)
diff --git a/docs/misc/arm/early-printk.txt b/docs/misc/arm/early-printk.txt
index 1ca2a55..4354e2d 100644
---
1 - 100 of 109 matches
Mail list logo