This Patch provides the glue for the TPM_TIS(Qemu frontend) to Xen
stubdom vTPM domain that provides the actual TPM functionality. It
sends data and TPM commends with xen_vtpm_frontend. It is similar as
another two vTPM backens:
*vTPM passthrough backen Since QEMU 1.5.
*vTPM libtpms-based
Signed-off-by: Quan Xu quan...@intel.com
---
extras/mini-os/tpmback.c | 25 ++---
1 file changed, 14 insertions(+), 11 deletions(-)
diff --git a/extras/mini-os/tpmback.c b/extras/mini-os/tpmback.c
index 00b66e8..8a0a983 100644
--- a/extras/mini-os/tpmback.c
+++
On Mon, 2015-02-09 at 11:09 +, Wei Liu wrote:
+sub saverestore_check ($) {
+my ($self) = @_;
+my $ho = $self-{Host};
+my $help = target_cmd_output_root($ho, $self-{_Command}. help);
+my $rc = ($help =~ m/^\s*save/m) ? 0 : 1;
+logm(rc=$rc);
+return $rc;
You could
On Thu, 2015-03-05 at 09:44 +, Ian Campbell wrote:
The next Xen technical call will be at:
Wed 11 Mar 17:00:00 GMT 2015
`date -d @1426093200`
No agenda = no call tomorrow.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
Hi Jan,
On 11/03/2015 14:03, Jan Beulich wrote:
On 11.03.15 at 14:55, ian.campb...@citrix.com wrote:
On Wed, 2015-03-11 at 13:50 +, Julien Grall wrote:
Hmmm I think I got you point now. Do you mean have something like:
That's one option I'd be happy with, yes. Jan might disagree.
Also add a bunch of missing entries to the doc
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
docs/misc/arm/early-printk.txt | 16 ++
xen/arch/arm/Rules.mk | 68 +++-
2 files changed, 43 insertions(+), 41 deletions(-)
diff --git
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote:
Instead of copying data for each field in xen_sysctl_topologyinfo separately
put cpu/socket/node into a single structure and do a single copy for each
processor.
Do not use max_cpu_index, which is almost always used for calculating
On some systems, the ResetSystem EFI runtime service is broken. Follow the
Linux (and Windows) way by preferring ACPI reboot over EFI reboot. This is
done by making BOOT_EFI a reboot mode similar to BOOT_ACPI and BOOT_KBD.
This was seen on an Intel S1200RP_SE with firmware
On 11.03.15 at 12:44, ross.lagerw...@citrix.com wrote:
--- a/xen/arch/x86/shutdown.c
+++ b/xen/arch/x86/shutdown.c
@@ -35,6 +35,7 @@ enum reboot_type {
};
static int reboot_mode;
+static bool_t reboot_default = 1;
__initdata
@@ -51,6 +52,8 @@ static void __init set_reboot_type(char
flight 36071 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36071/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 10 migrate-support-checkfail never pass
test-amd64-amd64-libvirt 10
flight 36011 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36011/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 3 host-install(3) broken REGR. vs. 35883
Hi Ian/Team
It finally looks like xen and dom0 are stable, but the cli seems tricky.
I can switch between xen/dom0 but cannot execute xm cmds...
Any idea where I went wrong? Please find the log below - thanks
Regards
Naveen
U-Boot SPL 2015.04-rc1 (Mar 10 2015 - 13:35:08)
DRA752 ES1.1
On Fri, Feb 27, 2015 at 4:20 PM, Dario Faggioli
dario.faggi...@citrix.com wrote:
as 0bba5747f4bee4ddd (xen: sched_credit: define and use
curr_on_cpu(cpu)) did for Credit1, hence making the code more
consistent and easier to read.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Hi Ian,
Thanks for your reply.
On Tue, Mar 10, 2015 at 16:22:40, Ian Campbell wrote:
What is the recommended way for the donor to transmit a batch of
grant references? I assume that this requires the donor to pack
references into an index page, grant foreign access to the index and
On 11.03.15 at 12:44, ross.lagerw...@citrix.com wrote:
On some systems, the ResetSystem EFI runtime service is broken. Follow the
Linux (and Windows) way by preferring ACPI reboot over EFI reboot. This is
done by making BOOT_EFI a reboot mode similar to BOOT_ACPI and BOOT_KBD.
No. Just
On Wed, Mar 11, 2015 at 02:08:37PM +, Jan Beulich wrote:
On 11.03.15 at 12:44, ross.lagerw...@citrix.com wrote:
On some systems, the ResetSystem EFI runtime service is broken. Follow the
Linux (and Windows) way by preferring ACPI reboot over EFI reboot. This is
done by making
On Wed, Mar 11, 2015 at 11:44:51AM +, Ross Lagerwall wrote:
If reboot= is specified on the command-line, don't apply reboot quirks
to allow the command-line option to take precedence.
This is a port of Linux commit 5955633e91bf (x86/reboot: Skip DMI
checks if reboot set by user).
flight 36098 linux-3.16 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36098/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 15 guest-localmigrate/x10fail REGR. vs. 34167
test-amd64-i386-pair
On Fri, 2015-03-06 at 14:31 +, Wei Liu wrote:
+void libxl_device_vscsi_append_dev(libxl_ctx *ctx, libxl_device_vscsi *hst,
+ libxl_vscsi_dev *dev)
+{
Can this only be an internal function? I.e. use libxl__ namespace.
And take a libxl__gc *gc not a
On Mon, 2015-02-09 at 11:10 +, Wei Liu wrote:
Libvirt's configuration converter doesn't know how to deal with BIOS
selection. The end result is it always use the default one (seabios).
Even with qemu-trad? Does it not use rombios in that case?
Stub out ovmf and rombios to avoid false
Hi Ian,
On 11/03/2015 14:11, Ian Campbell wrote:
This allows for early-printk to be specified (for existing UARTS at
least) without the need to edit Rules.mk.
The existing shortcuts are retained, but in a much more compact
fashion.
An unused EARLY_PRINTK_BAUD was removed from the zynqmq
On Thu, 2015-03-12 at 01:46 +, Xu, Quan wrote:
I am still testing and fixing it. Sorry for that, I am not a full time
open source developer.
Regardless, you are expect to fix things which you broke in a timely
manner, otherwise in the future I will just have to be more proactive
about
On Wed, Mar 11, Ian Campbell wrote:
On Fri, 2015-03-06 at 10:45 +0100, Olaf Hering wrote:
+void libxl_device_vscsi_append_dev(libxl_ctx *ctx, libxl_device_vscsi *hst,
+ libxl_vscsi_dev *dev);
+int libxl_device_vscsi_get_host(libxl_ctx *ctx,
+
On Wed, 2015-03-11 at 15:16 +, Wei Liu wrote:
On Wed, Mar 11, 2015 at 03:12:49PM +, Ian Campbell wrote:
On Mon, 2015-03-09 at 12:51 +, Wei Liu wrote:
Originally only setting has line number recorded. Since we're moving to
more sophisticated API, record the location for
On Wed, 2015-03-11 at 19:38 +, Korupol, Naveen (EXT) wrote:
As Michael says, xm doesn't exist any more (and never existed on ARM),
use xl. But, are you even getting a dom0 cli prompt? It doesn't look
like it.
(XEN) Std. Loglevel: All
(XEN) Guest Loglevel: All
(XEN) *** Serial input - DOM0
On Wed, Mar 11, Ian Campbell wrote:
On Fri, 2015-03-06 at 10:45 +0100, Olaf Hering wrote:
+void libxl_device_vscsi_append_dev(libxl_ctx *ctx, libxl_device_vscsi *hst,
+ libxl_vscsi_dev *dev);
+int libxl_device_vscsi_get_host(libxl_ctx *ctx,
+
On 11.03.15 at 19:26, stefano.stabell...@eu.citrix.com wrote:
On Mon, 23 Feb 2015, Jan Beulich wrote:
On 20.02.15 at 18:33, ian.campb...@citrix.com wrote:
On Fri, 2015-02-20 at 15:15 +, Jan Beulich wrote:
That's the issue we are trying to resolve, with device tree there is no
On Wed, 2015-03-11 at 18:26 +, Stefano Stabellini wrote:
In other words I think that we still need PHYSDEVOP_pci_host_bridge_add
(http://marc.info/?l=xen-develm=142470392016381) or equivalent, but
we can drop the bus field from the struct.
I think it makes sense for the struct to contain a
On Mon, 2015-03-09 at 12:51 +, Wei Liu wrote:
Signed-off-by: Wei Liu wei.l...@citrix.com
Reviewed-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
(IMHO it is
On Wed, Mar 11, 2015 at 02:52:31PM +, Ian Campbell wrote:
On Mon, 2015-03-09 at 11:01 +, Wei Liu wrote:
On Fri, Mar 06, 2015 at 06:21:59PM +0100, Dario Faggioli wrote:
with the rest of the file, where we return 1 on 0, rather
than using libxl error codes.
While being
flight 36106 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36106/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 3 host-install(3) broken REGR. vs. 26303
At 13:16 +0100 on 05 Mar (142555), Tim Deegan wrote:
At 11:55 + on 05 Mar (1425552955), Ian Campbell wrote:
On Thu, 2015-03-05 at 11:41 +, Jan Beulich wrote:
On 05.03.15 at 12:35, ian.campb...@citrix.com wrote:
On Thu, 2015-03-05 at 12:25 +0100, Tim Deegan wrote:
So I've
On 12.03.15 at 11:03, t...@xen.org wrote:
At 13:16 +0100 on 05 Mar (142555), Tim Deegan wrote:
At 11:55 + on 05 Mar (1425552955), Ian Campbell wrote:
On Thu, 2015-03-05 at 11:41 +, Jan Beulich wrote:
On 05.03.15 at 12:35, ian.campb...@citrix.com wrote:
On Thu, 2015-03-05
This is the same set used by libxc.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Wei Liu wei.l...@citrix.com
---
v2: Don't use reserved identifiers in min_t/max_t
---
On 03/12/2015 10:21 AM, wei.l...@citrix.com wrote:
* Credit2: introduce per-vcpu hard and soft affinity (fair)
- Justin T. Weaver
The most recent patches looked pretty good -- I'd be very surprised if
these didn't make it in by July. I'd change this to good.
* Default to credit2 (none)
On 12.03.15 at 11:42, t...@xen.org wrote:
At 16:36 + on 10 Mar (1426001780), Jan Beulich wrote:
@@ -806,9 +802,9 @@ static int read_ulong(
static bool_t mul_dbl(unsigned long m[2])
{
bool_t rc;
-asm ( mul %4; seto %b2
- : =a (m[0]), =d (m[1]), =q (rc)
- :
On Wed, 2015-03-11 at 20:14 +, Wei Liu wrote:
On Wed, Mar 11, 2015 at 03:12:06PM +, Ian Campbell wrote:
On Mon, 2015-03-09 at 12:51 +, Wei Liu wrote:
+Each BVNODE_CONFIG_OPTION is a quoted key=value pair. Supported
+BVNODE_CONFIG_OPTIONs are:
Which of these are
Hi all
We are now two months into 4.6 development window. This is an email to keep
track of all the patch series I gathered. It is by no means complete and / or
acurate. Feel free to reply this email with new projects or correct my
misunderstanding.
= Timeline =
We are planning on a 9-month
On Thu, 12 Mar 2015, Jan Beulich wrote:
On 11.03.15 at 19:26, stefano.stabell...@eu.citrix.com wrote:
On Mon, 23 Feb 2015, Jan Beulich wrote:
On 20.02.15 at 18:33, ian.campb...@citrix.com wrote:
On Fri, 2015-02-20 at 15:15 +, Jan Beulich wrote:
That's the issue we are trying to
At 10:14 + on 12 Mar (1426151689), Ian Campbell wrote:
On Thu, 2015-03-12 at 11:03 +0100, Tim Deegan wrote:
At 13:16 +0100 on 05 Mar (142555), Tim Deegan wrote:
At 11:55 + on 05 Mar (1425552955), Ian Campbell wrote:
On Thu, 2015-03-05 at 11:41 +, Jan Beulich wrote:
On 12/03/15 07:36, Kai Huang wrote:
It might also be nice to be able to enable or disable this feature
with a sysctl call; but that's just a nice-to-have.
This feature should either be used or not. It is impractical to
enable/disable at runtime.
However, it absolutely wants a knob for
Hello
I am trying to adjust the of Stephen Hemminger patch (
http://marc.info/?l=linux-netdevm=111773621018096w=2 ), suporting
napi weight changes for virtual paravirtualized network interfaces
like xen vif (since they use napi now) on kernel 3.4.1.
The changes are listed below.
EACCES cannot be distinguished against an incorrect DOMCTL_INTERFACE_VERSION,
and will cause an incorrect need to rebuild the user-space tool set? message
from libxc.
On the libxc side, put the useful piece of information in the error message,
rathe than the -1 from do_domctl().
Signed-off-by:
On 12.03.15 at 11:33, stefano.stabell...@eu.citrix.com wrote:
On Thu, 12 Mar 2015, Jan Beulich wrote:
On 11.03.15 at 19:26, stefano.stabell...@eu.citrix.com wrote:
On Mon, 23 Feb 2015, Jan Beulich wrote:
No - there can be multiple roots (i.e. host bridges) on a single
segment. Segments
On Fri, 2015-03-06 at 22:24 +0100, Tamas K Lengyel wrote:
The ARM virtualization extension provides 2-stage paging, a similar mechanisms
to Intel's EPT, which can be used to trace the memory accesses performed by
the guest systems. This series sets up the necessary infrastructure in the
ARM
Il 12/03/2015 11:54, George Dunlap ha scritto:
On 03/12/2015 10:21 AM, wei.l...@citrix.com wrote:
* Credit2: introduce per-vcpu hard and soft affinity (fair)
- Justin T. Weaver
The most recent patches looked pretty good -- I'd be very surprised if
these didn't make it in by July. I'd
On 03/12/2015 11:34 AM, Fabio Fantoni wrote:
Il 12/03/2015 11:54, George Dunlap ha scritto:
On 03/12/2015 10:21 AM, wei.l...@citrix.com wrote:
* Credit2: introduce per-vcpu hard and soft affinity (fair)
- Justin T. Weaver
The most recent patches looked pretty good -- I'd be very
On Thu, Mar 12, 2015 at 1:08 PM, Ian Campbell ian.campb...@citrix.com
wrote:
On Fri, 2015-03-06 at 22:24 +0100, Tamas K Lengyel wrote:
The guestcopy helpers use the MMU to verify that the given guest has
read/write
access to a given page during hypercalls. As we may have custom
mem_access
On Thu, Mar 12, 2015 at 1:13 PM, Tim Deegan t...@xen.org wrote:
At 01:11 +0100 on 18 Feb (1424218291), Tamas K Lengyel wrote:
+struct mem_event_mem_access {
uint64_t gfn;
uint64_t offset;
-uint64_t gla; /* if gla_valid */
+uint64_t gla; /* if flags has
At 01:11 +0100 on 18 Feb (1424218298), Tamas K Lengyel wrote:
In preparation for allowing for introspecting ARM and PV domains the old
control interface via the hvm_op hypercall is retired. A new control mechanism
is introduced via the domctl hypercall: monitor_op.
This patch aims to
Use + on outputs instead of = and a matching input. Allow not just
memory for the _eflags operand (it turns out that recent gcc produces
worse code when also doing this for _dst.val, so the latter is being
avoided).
Signed-off-by: Jan Beulich jbeul...@suse.com
---
v2: Extend simplification in
On Wed, 2015-03-11 at 20:14 +, Wei Liu wrote:
On Wed, Mar 11, 2015 at 03:12:06PM +, Ian Campbell wrote:
On Mon, 2015-03-09 at 12:51 +, Wei Liu wrote:
+Each BVNODE_CONFIG_OPTION is a quoted key=value pair. Supported
+BVNODE_CONFIG_OPTIONs are:
Which of these are
At 13:13 + on 12 Mar (1426162439), Jan Beulich wrote:
Use + on outputs instead of = and a matching input. Allow not just
memory for the _eflags operand (it turns out that recent gcc produces
worse code when also doing this for _dst.val, so the latter is being
avoided).
Signed-off-by:
On Thu, 2015-03-12 at 13:24 +0100, Tamas K Lengyel wrote:
On Thu, Mar 12, 2015 at 12:30 PM, Ian Campbell
More for curiosities sake than anything else: Do you have any figures
for the overhead of enabling memaccess?
I can gather some figures if needed but it is very
On Thu, Mar 12, 2015 at 2:50 PM, Julien Grall julien.gr...@linaro.org
wrote:
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
+/*
+ * If mem_access is in use it might have been the reason why
get_page_from_gva
+ * failed to fetch the page, as it uses the MMU for the permission
At 14:29 + on 12 Mar (1426166977), Andrew Cooper wrote:
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
CC: Ian Campbell ian.campb...@citrix.com
CC: Stefano Stabellini stefano.stabell...@citrix.com
CC: Tim Deegan
This patch do the following things:
-Insertion of runqueue_per_core code
-Boot paarmeter creation to select runqueue
Signed-off-by : Uma Sharma uma.sharma...@gmail.com
---
xen/common/sched_credit2.c | 39 ---
1 file changed, 32 insertions(+), 7 deletions(-)
This patch inserts boot paramter documentation in xen-command-line.markdown.
Signed-off-by: Uma Sharma uma.sharma...@gmail.com
---
docs/misc/xen-command-line.markdown | 7 +++
1 file changed, 7 insertions(+)
diff --git a/docs/misc/xen-command-line.markdown
On Fri, 2015-03-06 at 22:24 +0100, Tamas K Lengyel wrote:
This patch enables to store, set, check and deliver LPAE R/W mem_events.
As the LPAE PTE's lack enough available software programmable bits,
we store the permissions in a Radix tree. The tree is only looked at if
mem_access_enabled is
On Thu, Mar 12, 2015 at 02:22:10PM +0100, Dario Faggioli wrote:
On Wed, 2015-03-11 at 20:14 +, Wei Liu wrote:
On Wed, Mar 11, 2015 at 03:12:06PM +, Ian Campbell wrote:
On Mon, 2015-03-09 at 12:51 +, Wei Liu wrote:
+Each BVNODE_CONFIG_OPTION is a quoted key=value pair.
On 12/03/15 13:13, Jan Beulich wrote:
Use + on outputs instead of = and a matching input. Allow not just
memory for the _eflags operand (it turns out that recent gcc produces
worse code when also doing this for _dst.val, so the latter is being
avoided).
Signed-off-by: Jan Beulich
On Wed, 2015-03-11 at 16:04 +, Dario Faggioli wrote:
On Wed, 2015-03-11 at 15:01 +, George Dunlap wrote:
It looks like domain_update_node_affinity() is already called for each
domain in the cpupool in cpu_disable_scheduler(). It doesn't look like
there should be a need to call it
On Thu, Mar 12, 2015 at 1:57 PM, Julien Grall julien.gr...@linaro.org
wrote:
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
@@ -1090,6 +1098,8 @@ void p2m_teardown(struct domain *d)
p2m_free_vmid(d);
+radix_tree_destroy(p2m-mem_access_settings, NULL);
+
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-2152 / XSA-119
version 3
HVM qemu unexpectedly enabling emulated VGA graphics backends
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
On 12.03.15 at 15:07, andrew.coop...@citrix.com wrote:
On 12/03/15 11:44, Jan Beulich wrote:
@@ -452,6 +464,7 @@ static struct dmi_system_id __initdata r
static int __init reboot_init(void)
{
+default_reboot_type();
This still suffers from the bug Ross fixed in patch 1. If the
On 03/12/2015 12:51 PM, Dario Faggioli wrote:
On Fri, 2015-02-27 at 17:50 +0100, Dario Faggioli wrote:
Take 2 of this:
http://lists.xen.org/archives/html/xen-devel/2015-02/msg03249.html
I've made all the changes suggested during v1.
The series has Meng's Reviewed-by for the changes to
Provide helpers to access the socket and core IDs, resulting from
identification phase.
Initialize socket and core ID to -1 i.e invalid instead of 0.
Signed-off-by: Uma Sharma uma.sharma...@gmail.com
---
xen/arch/x86/setup.c| 7 +--
xen/arch/x86/smpboot.c | 3 ++-
On 12/03/15 14:13, Tamas K Lengyel wrote:
On Thu, Mar 12, 2015 at 2:50 PM, Julien Grall julien.gr...@linaro.org
mailto:julien.gr...@linaro.org wrote:
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
+/*
+ * If mem_access is in use it might have been the reason
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
The guestcopy helpers use the MMU to verify that the given guest has
read/write
access to a given page during hypercalls. As we may have custom mem_access
permissions set on these pages, we do a software-based type checking in case
the MMU
On 12/03/15 13:18, Tamas K Lengyel wrote:
+struct radix_tree_root mem_access_settings;
};
/* List of possible type for each page in the p2m entry.
@@ -217,6 +230,26 @@ static inline int get_page_and_type(struct
page_info *page,
/* get host p2m table */
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
+/*
+ * If mem_access is in use it might have been the reason why
get_page_from_gva
+ * failed to fetch the page, as it uses the MMU for the permission checking.
+ * Only in these cases we do a software-based type check and fetch the page
On 12/03/15 11:44, Jan Beulich wrote:
On 11.03.15 at 19:49, konrad.w...@oracle.com wrote:
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Tue, 3 Feb 2015 11:18:04 -0500
Subject: [PATCH] efi: Allow reboot= overrides when running under EFI
By default we will always use EFI reboot
On 03/12/2015 01:45 PM, Dario Faggioli wrote:
On Wed, 2015-03-11 at 16:04 +, Dario Faggioli wrote:
On Wed, 2015-03-11 at 15:01 +, George Dunlap wrote:
It looks like domain_update_node_affinity() is already called for each
domain in the cpupool in cpu_disable_scheduler(). It doesn't
On 12.03.15 at 14:45, dario.faggi...@citrix.com wrote:
Patch below, and attached. However, I think the correct thing to do
would be to just revert 93be8285 update domU's node-affinity on the
cpupool_unassign_cpu() path, wouldn't it?
Indeed - if the presented patch is what we want, it should
On Fri, 2015-03-06 at 22:24 +0100, Tamas K Lengyel wrote:
Signed-off-by: Tamas K Lengyel tkleng...@sec.in.tum.de
Acked-by: Ian Campbell ian.campb...@citrix.com
---
config/arm32.mk | 1 +
config/arm64.mk | 1 +
2 files changed, 2 insertions(+)
diff --git a/config/arm32.mk
On Thu, 2015-03-12 at 13:22 +0100, Tamas K Lengyel wrote:
I guess naming this patch something like groundwork for mem_access
support would be more descriptive. Adding everything when they are
actually getting used would have resulted in a massive patch that I
think would have been harder to
On Thu, 2015-03-12 at 13:25 +, Julien Grall wrote:
On 12/03/15 13:18, Tamas K Lengyel wrote:
+struct radix_tree_root mem_access_settings;
};
/* List of possible type for each page in the p2m entry.
@@ -217,6 +230,26 @@ static inline int
On Fri, 2015-03-06 at 22:24 +0100, Tamas K Lengyel wrote:
Signed-off-by: Tamas K Lengyel tkleng...@sec.in.tum.de
Reviewed-by: Julien Grall julien.gr...@linaro.org
Acked-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
On March 12, 2015 7:44:58 AM EDT, Jan Beulich jbeul...@suse.com wrote:
On 11.03.15 at 19:49, konrad.w...@oracle.com wrote:
From: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Date: Tue, 3 Feb 2015 11:18:04 -0500
Subject: [PATCH] efi: Allow reboot= overrides when running under EFI
By default
On Thu, 2015-03-12 at 12:57 +, Julien Grall wrote:
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
@@ -1090,6 +1098,8 @@ void p2m_teardown(struct domain *d)
p2m_free_vmid(d);
+radix_tree_destroy(p2m-mem_access_settings, NULL);
+
spin_unlock(p2m-lock);
On 12/03/15 13:56, Ian Campbell wrote:
On Thu, 2015-03-12 at 12:57 +, Julien Grall wrote:
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
@@ -1090,6 +1098,8 @@ void p2m_teardown(struct domain *d)
p2m_free_vmid(d);
+radix_tree_destroy(p2m-mem_access_settings, NULL);
+
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
CC: Ian Campbell ian.campb...@citrix.com
CC: Stefano Stabellini stefano.stabell...@citrix.com
CC: Tim Deegan t...@xen.org
---
Compile tested for x86, arm32 and arm64
---
On Thu, Mar 12, 2015 at 2:43 PM, Julien Grall julien.gr...@linaro.org wrote:
On 12/03/15 13:38, Tamas K Lengyel wrote:
+if ( flag == GV2M_WRITE )
+{
+switch ( t )
+{
+case p2m_ram_rw:
+case p2m_iommu_map_rw:
+
Hi everyone,
This series of patch inserts runqueue_per_core code and creates a boot
parameter to choose which type of runqueue mapping to perform i.e core or
socket.
Core is used by default as runqueue_per_core scheduler performs better than
runqueue_per_socket.
This series mainly performs
On Thu, Mar 12, 2015 at 2:24 PM, Julien Grall julien.gr...@linaro.org
wrote:
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
The guestcopy helpers use the MMU to verify that the given guest has
read/write
access to a given page during hypercalls. As we may have custom
mem_access
On 3/12/2015 6:54 AM, Jan Beulich wrote:
* amd_ucode cleanups, verify patch size(enhancement) (mostly in master
except one patch)
Which one?
This is in reference to the patches to microcode_amd and it's all 'done'
in 4.5 itself.
I think when we were tracking this, commit 8b24b07e was not in
+ pci_add_resource(resources, ioport_resource);
+ pci_add_resource(resources, iomem_resource);
+ pci_add_resource(resources, busn_resource);
Since I don't want to export busn_resource, you might have to allocate your
own struct resource for it here. And, of course, figure out the details
Hi Julien,
On Mon, Mar 9, 2015 at 11:46 PM, Julien Grall julien.gr...@linaro.org wrote:
Hello Vijay,
On 09/03/2015 14:57, Vijay Kilari wrote:
On Tue, Mar 3, 2015 at 5:13 PM, Julien Grall julien.gr...@linaro.org
wrote:
Hello Vijay,
On 03/03/2015 03:55, Vijay Kilari wrote:
On Mon, Mar
On 3/12/2015 at 06:21 PM, in message
e1yw0fy-0002p7...@ukmail1.uk.xensource.com, wei.l...@citrix.com wrote:
Hi all
We are now two months into 4.6 development window. This is an email to keep
track of all the patch series I gathered. It is by no means complete and /
or
acurate.
On Thu, 2015-03-12 at 10:21 +, wei.l...@citrix.com wrote:
* Repurpose SEDF Scheduler for Real-time (fair)
RFC patch posted (v2)
- Joshua Whitehead, Robert VanVossen
This was superceded by the RTDS stuff, wasn't it?
=== Hypervisor ARM ===
* Add support for Xilinx ZynqMP SoC
On Thu, 2015-03-12 at 16:13 +0100, Tamas K Lengyel wrote:
and this function is nearly identical to the x86 one too.
Nearly, but not completely. IMHO consolidation may be possible on some
of these bits, but I'm not sure if it would make it any easier to
follow when the code jumps back
On 12/03/15 15:26, Tamas K Lengyel wrote:
On Thu, Mar 12, 2015 at 4:13 PM, Julien Grall julien.gr...@linaro.org
mailto:julien.gr...@linaro.org wrote:
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
+/*
+ * Preempt setting mem_access permissions
Olaf,
Could you share me this patch description? Then I can sign off:
Signed-off-by: Olaf Hering o...@aepfle.de
Signed-off-by: Quan Xu quan...@intel.com
..
(1)
-- /dev/null
+++ b/stubdom/vtpmmgr/common_types.h
@@ -0,0 +1,11 @@
+#ifndef VTPM_ODD_TYPES
+#define VTPM_ODD_TYPES 1
+typedef
Hi Ian,
On 12/03/15 15:27, Ian Campbell wrote:
Currently, check_type_get_page emulate only the check for 2). So you may
end up to allow Xen writing in read-only mapping (from the Stage 1 POV).
This was XSA-98.
XSA-98 was purely about stage-2 permissions (e.g. read-only grants). The
fact
On Thu, 2015-03-12 at 15:40 +, Julien Grall wrote:
Hi Ian,
On 12/03/15 15:27, Ian Campbell wrote:
Currently, check_type_get_page emulate only the check for 2). So you may
end up to allow Xen writing in read-only mapping (from the Stage 1 POV).
This was XSA-98.
XSA-98 was purely
On 12/03/15 14:59, Uma Sharma wrote:
This patch inserts boot paramter documentation in xen-command-line.markdown.
Signed-off-by: Uma Sharma uma.sharma...@gmail.com
This change should be in the same patch which introduced the option.
~Andrew
---
docs/misc/xen-command-line.markdown | 7
On Wed, Mar 11, Ian Campbell wrote:
On Fri, 2015-03-06 at 10:45 +0100, Olaf Hering wrote:
+int libxl_device_vscsi_parse_pdev(libxl__gc *gc, char *pdev, unsigned int
*hst,
+unsigned int *chn, unsigned int *tgt,
+unsigned int
On 12/03/15 15:19, Tamas K Lengyel wrote:
out:
+if ( flush )
+{
+flush_tlb_domain(d);
+iommu_iotlb_flush(d, sgfn, egfn - sgfn);
+}
Is moving the flush out of the loop an independent bug fix? If
Hi,
At 01:11 +0100 on 18 Feb (1424218290), Tamas K Lengyel wrote:
This patch series aims to clean up the mem_event subsystem within Xen. The
original use-case for this system was to allow external helper applications
running in privileged domains to control various memory operations performed
On Thu, Mar 12, 2015 at 4:19 PM, Julien Grall julien.gr...@linaro.org
wrote:
Hi Tamas,
On 06/03/15 21:24, Tamas K Lengyel wrote:
Signed-off-by: Tamas K Lengyel tkleng...@sec.in.tum.de
It's strange to enable MEM_ACCESS before having the toolstack part
support memaccess (even though it's
1 - 100 of 226 matches
Mail list logo