From: Julien Grall julien.gr...@linaro.org
Currently, when the device is deassigned from a domain, we directly reassign
to DOM0.
As the device may not have been correctly reset, this may lead to corruption or
expose some part of DOM0 memory. Also, we may have no way to reset some
platform
On Tue, Apr 28, 2015 at 4:05 PM, Julien Grall julien.gr...@citrix.com wrote:
Hi,
On 28/04/15 10:56, Stefano Stabellini wrote:
On Tue, 28 Apr 2015, Vijay Kilari wrote:
Approach 1: (Using completion interrupt)
1) Create dummy device for each virtual ITS when virtual its is
Wang, Wei W wei.w.w...@intel.com 04/28/15 3:24 PM
On 28/04/2015 21:14, Jan Beulich wrote
On 25/04/2015 00:15, Konrad Rzeszutek Wilk wrote
How will this affect AMD processors which can use the cpufreq? Would
the ondemand feature go away?
No, this won't affect them. When the
From: Julien Grall julien.gr...@linaro.org
Introduce spi_to_pending in order retrieve the irq_pending structure for
a specific SPI.
It's not possible to re-use irq_to_pending because it's required a VCPU
and some call of the new function may during domain destruction after
the VCPUs are freed.
On 28/04/2015 21:29, Jan Beulich wrote
Wang, Wei W wei.w.w...@intel.com 04/28/15 3:24 PM
On 28/04/2015 21:14, Jan Beulich wrote
On 25/04/2015 00:15, Konrad Rzeszutek Wilk wrote
How will this affect AMD processors which can use the cpufreq?
Would the ondemand feature go away?
No,
From: Julien Grall julien.gr...@linaro.org
This new function will correctly initialize the IOMMU page table for the
current domain.
Also use it in iommu_assign_dt_device even though the current IOMMU
implementation on ARM shares P2M with the processor.
Signed-off-by: Julien Grall
From: Julien Grall julien.gr...@linaro.org
On x86, an IRQ is assigned in 2 steps to an HVM guest:
- The toolstack is calling PHYSDEVOP_map_pirq in order to create a
guest PIRQ (IRQ bound to an event channel)
- The emulator (QEMU) is calling DOMCTL_bind_pt_irq in order to
bind the
From: Julien Grall julien.gr...@linaro.org
Flask code already provides a helper to copy a string from guest. In a later
patch, the new DT hypercalls will need a similar function.
To avoid code duplication, copy the flask helper (flask_copying_string) to
common code:
- Rename into
From: Julien Grall julien.gr...@linaro.org
Xen has to release IRQ routed to a domain in order to reuse later.
Currently only SPIs can be routed to the guest so we only need to
browse SPIs for a specific domain.
Furthermore, a guest can crash and leave the IRQ in an incorrect state
(i.e has not
Hello all,
This is the sixth version of this patch series to add support for platform
device passthrough on ARM.
In order to passthrough a non-PCI device, the user will have to:
- Map manually MMIO/IRQ
- Describe the device in the newly partial device tree support
- Specify the list
From: Julien Grall julien.gr...@linaro.org
The maximum size of the copied string has been chosen based on the value
use by XSM in similar case.
Furthermore, Linux seems to allow path up to 4096 characters. Though
this could vary from one OS to another.
Signed-off-by: Julien Grall
flight 52627 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/52627/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 13 guest-localmigrate fail REGR. vs. 36764
build-amd64-pvops
From: Julien Grall julien.gr...@linaro.org
Note that the example is done on Midway whose SMMU driver is not
supported on Xen upstream.
Currently, I don't have other platform where I can test Device Tree
passthrough.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Acked-by: Ian Campbell
From: Julien Grall julien.gr...@linaro.org
The option dtdev will be used to passthrough a device described
in the device tree to a guest.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Acked-by: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Wei Liu
From: Julien Grall julien.gr...@linaro.org
The functions fdt_{fisrt,next}_subnode may not be available because:
* It has been introduced in 2013 = Doesn't work on Wheezy
* The prototype exists but the functions are not exposed. Don't ask
why...
The later has been fixed recently in
From: Julien Grall julien.gr...@linaro.org
The partial device tree may contains phandle. The Device Tree Compiler
tends to allocate the phandle from 1.
Reserve the ID 65000 for the GIC phandle. I think we can safely assume
that the partial device tree will never contain a such ID.
From: Julien Grall julien.gr...@linaro.org
This is a follow-up of commit 525ee49 xsm: add device tree labeling
support which add support for device tree labelling in flask.
Those helpers will be use latter when non-pci passthrough (i.e device
tree) will be added.
Signed-off-by: Julien Grall
From: Julien Grall julien.gr...@linaro.org
On ARM, every non-PCI device are described in the device tree. Each of
them can be found via a path.
This patch introduces a very basic support, only the IOMMU will be set
up correctly. The user will have to:
- Describe the device in the partial
From: Julien Grall julien.gr...@linaro.org
Allow the user to pass additional nodes to the guest device tree. For
this purpose, everything in the node /passthrough from the partial
device tree will be copied into the guest device tree.
The node /aliases will be also copied to allow the user to
From: Julien Grall julien.gr...@linaro.org
ARM and x86 use a different hypercall to map an IRQ to a domain.
The hypercall to give IRQ permission to the domain has also been moved
to be an x86 specific function as ARM guest won't be able to manage the IRQ.
We may want to support it later.
From: Julien Grall julien.gr...@linaro.org
A device node is described by a path. It will be used to retrieve the
node in the device tree and assign the related device to the domain.
Only non-PCI devices protected by an IOMMU can be assigned to a guest.
Also document the behavior of
On Tue, Apr 28, Dario Faggioli wrote:
On Tue, 2015-04-28 at 11:26 +0800, 蒋雄伟(蒋冲) wrote:
The xen we used is 4.0.1, but xenalyze –version tells me “xenalyze -
Open-source xen-unstable (3.4)” . can I use it?
This version string is just cosmetic.
Olaf
On 28/04/2015 20:14, Robert VanVossen wrote:
Hello,
Hi Robert,
I was wondering, what is the current state of running a 32-bit ARM guest running
on a 64-bit Xen for ARM. I was working on getting the minios from
https://github.com/talex5/xen/commits/next built and running as a guest on an
Commit 77e32c89a711 (clockevents: Manage device's state separately for
the core) decouples clockevent device's modes from states. With this
change when a Xen guest tries to resume, it won't be calling its
set_mode op which needs to be done on each VCPU in order to make the
hypervisor aware that we
On Wed, 2015-04-15 at 11:35 +0100, Ian Campbell wrote:
diff --git a/ts-debian-hvm-install b/ts-debian-hvm-install
index cfd5144..95fce9a 100755
--- a/ts-debian-hvm-install
+++ b/ts-debian-hvm-install
@@ -77,6 +77,9 @@ d-i preseed/late_command string \\
in-target mkdir -p
Wang, Wei W wei.w.w...@intel.com 04/28/15 4:38 PM
On 28/04/2015 21:29, Jan Beulich wrote
Wang, Wei W wei.w.w...@intel.com 04/28/15 3:24 PM
On 28/04/2015 21:14, Jan Beulich wrote
On 25/04/2015 00:15, Konrad Rzeszutek Wilk wrote
How will this affect AMD processors which can use the
On Tue, Apr 28, 2015 at 05:50:43PM +0100, Julien Grall wrote:
On 27/04/15 10:24, Edgar E. Iglesias wrote:
From: Edgar E. Iglesias edgar.igles...@xilinx.com
Hi,
Hi Edgar,
This is a first try at fixing the issue I'm seeing on ZynqMP with
missmatched setup of the SMMU and the shared
On Tue, Apr 28, 2015 at 03:14:51PM -0400, Robert VanVossen wrote:
Hello,
I was wondering, what is the current state of running a 32-bit ARM guest
running
on a 64-bit Xen for ARM. I was working on getting the minios from
https://github.com/talex5/xen/commits/next built and running as a
On Tue, Apr 28, 2015 at 9:45 PM, Julien Grall julien.gr...@citrix.com wrote:
Hi Vijay,
On 28/04/15 12:36, Vijay Kilari wrote:
On Tue, Apr 28, 2015 at 4:05 PM, Julien Grall julien.gr...@citrix.com
wrote:
If you properly manage the device with struct pci_dev or struct device
(which is, as
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: 25 April 2015 01:19
To: Paul Durrant; xen-de...@lists.xenproject.org
Cc: Keir (Xen.org); Jan Beulich
Subject: Re: [PATCH 2/3] x86/hvm: introduce functions for
HVMOP_get/set_param allowance checks
On
flight 52628 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/52628/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 30511
Wang, Wei W wei.w.w...@intel.com 04/28/15 3:41 PM
Please have a check my conclusion of the changes.
These look all correct, with ...
NO.2
The xenpm get-cpufreq-para will display the following things:
cpu id: 0
affected_cpus : 0
cpuinfo frequency : max
On 29/04/2015 07:10, Jan Beulich wrote
Wang, Wei W wei.w.w...@intel.com 04/28/15 4:38 PM
On 28/04/2015 21:29, Jan Beulich wrote
Wang, Wei W wei.w.w...@intel.com 04/28/15 3:24 PM
On 28/04/2015 21:14, Jan Beulich wrote
On 25/04/2015 00:15, Konrad Rzeszutek Wilk wrote
How will this
On 28/04/15 8:02 pm, Julien Grall wrote:
From: Julien Grall julien.gr...@linaro.org
This new function will correctly initialize the IOMMU page table for the
current domain.
Also use it in iommu_assign_dt_device even though the current IOMMU
implementation on ARM shares P2M with the
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: 25 April 2015 01:12
To: Paul Durrant; xen-de...@lists.xenproject.org
Cc: Keir (Xen.org); Jan Beulich
Subject: Re: [PATCH 1/3] x86/hvm: give HVMOP_set_param and
HVMOP_get_param their own functions
On
On 28/04/2015 21:14, Jan Beulich wrote
On 25/04/2015 00:15, Konrad Rzeszutek Wilk wrote
How will this affect AMD processors which can use the cpufreq? Would
the ondemand feature go away?
No, this won't affect them. When the intel_pstate=disable is added to
the booting parameter list,
Hi Ian,
On 09/04/15 17:13, Ian Jackson wrote:
Julien Grall writes ([PATCH v5 p2 15/19] tools/(lib)xl: Add partial device
tree support for ARM):
Let the user to pass additional nodes to the guest device tree. For
this purpose, everything in the node /passthrough from the partial
device tree
Wang, Wei W wei.w.w...@intel.com 04/24/15 6:32 PM
On 25/04/2015 00:15, Konrad Rzeszutek Wilk wrote
How will this affect AMD processors which can use the cpufreq? Would the
ondemand feature go away?
No, this won't affect them. When the intel_pstate=disable is added to the
booting parameter
Julien Grall julien.gr...@citrix.com 04/26/15 7:33 PM
On 26/04/2015 05:32, Wang, Wei W wrote:
Thanks for your comments. But I saw int powernow_cpufreq_init(void); is
put there.
FWIW, this prototype doesn't have any implementation even on x86.
While currently some drivers (such as the x86
David Vrabel david.vra...@citrix.com 04/28/15 6:16 PM
On 23/04/15 12:58, Jan Beulich wrote:
+typedef union {
+u32 head_tail;
+struct {
+u16 head;
+u16 tail;
+};
+} spinlock_tickets_t;
+
typedef struct spinlock {
-raw_spinlock_t raw;
+
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports rangeset.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Jan Beulich jbeul...@suse.com
Cc:
.. because bind_evtchn_to_cpu(evtchn, cpu) will map evtchn to
'info' and pass 'info' down to xen_evtchn_port_bind_to_cpu().
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Tested-by: Annie Li annie...@oracle.com
---
drivers/xen/events/events_base.c |2 +-
1 files changed, 1
After a resume the hypervisor/tools may change xenbus event
channel number. We should re-query it.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
drivers/xen/xenbus/xenbus_probe.c | 28
1 files changed, 28 insertions(+), 0 deletions(-)
diff --git
Fixes for issues that we discovered during live migration when source and
target systems have different event channel assignments for guests.
Boris Ostrovsky (4):
xen/events: Clear cpu_evtchn_mask before resuming
xen/xenbus: Update xenbus event channel on resume
xen/console: Update console
On 28/04/15 16:52, Boris Ostrovsky wrote:
After a resume the hypervisor/tools may change xenbus event
channel number. We should re-query it.
[...]
@@ -793,6 +818,9 @@ static int __init xenbus_init(void)
goto out_error;
}
+ if (!xen_initial_domain())
+
Hi Vijay,
On 28/04/15 12:36, Vijay Kilari wrote:
On Tue, Apr 28, 2015 at 4:05 PM, Julien Grall julien.gr...@citrix.com wrote:
If you properly manage the device with struct pci_dev or struct device
(which is, as talked earlier, obviously required for security) you
should avoid your so-called
On 23/04/15 12:58, Jan Beulich wrote:
+typedef union {
+u32 head_tail;
+struct {
+u16 head;
+u16 tail;
+};
+} spinlock_tickets_t;
+
typedef struct spinlock {
-raw_spinlock_t raw;
+spinlock_tickets_t tickets;
At least for x86 this means a growth
On 28/04/15 16:52, Boris Ostrovsky wrote:
After a resume the hypervisor/tools may change console event
channel number. We should re-query it.
Reviewed-by: David Vrabel david.vra...@citrix.com
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 28/04/15 16:52, Boris Ostrovsky wrote:
.. because bind_evtchn_to_cpu(evtchn, cpu) will map evtchn to
'info' and pass 'info' down to xen_evtchn_port_bind_to_cpu().
Reviewed-by: David Vrabel david.vra...@citrix.com
David
___
Xen-devel mailing list
On 28/04/15 16:52, Boris Ostrovsky wrote:
When a guest is resumed, the hypervisor may change event channel
assignments. If this happens and the guest uses 2-level events it
is possible for the interrupt to be claimed by wrong VCPU since
cpu_evtchn_mask bits may be stale. This can happen even
On 27/04/15 10:24, Edgar E. Iglesias wrote:
From: Edgar E. Iglesias edgar.igles...@xilinx.com
Hi,
Hi Edgar,
This is a first try at fixing the issue I'm seeing on ZynqMP with
missmatched setup of the SMMU and the shared page-tables with p2m.
I've only handled the case of having an SMMU
Jim Fehlig wrote:
wei.l...@citrix.com wrote:
Hi all
We are now three months into 4.6 development window. This is an email to keep
track of all the patch series I gathered. It is by no means complete and / or
acurate. Feel free to reply this email with new projects or correct my
Commit 77e32c89a711 (clockevents: Manage device's state separately for
the core) decouples clockevent device's modes from states. With this
change when a Xen guest tries to resume, it won't be calling its
set_mode op which needs to be done on each VCPU in order to make the
hypervisor aware that we
CMPXCHG sets CF, PF, AF, SF, and OF flags according to the results of the
comparison the rAX with the operand of the instruction.
rAX must be the first argument of the comparison (a minuend), the operand
must be the second one (a subtrahend).
Due to improper order of comparison arguments, CF, PF,
CMPXCHG: in the case of inequality of the rAX and the operand,
need to check CF, PF, AF, SF and OF flags as well.
This adjustment covers the fix of incorrect comparison during
CMPXCHG emulation.
Signed-off-by: Eugene Korenevsky ekorenev...@gmail.com
---
On Fri, 2015-04-24 at 08:45 +, Pang, LongtaoX wrote:
-Original Message-
From: Ian Campbell [mailto:ian.campb...@citrix.com]
Sent: Thursday, April 23, 2015 7:30 PM
To: Hu, Robert
Cc: Pang, LongtaoX; xen-devel@lists.xen.org; ian.jack...@eu.citrix.com;
wei.l...@citrix.com
wei.l...@citrix.com wrote:
Hi all
We are now three months into 4.6 development window. This is an email to keep
track of all the patch series I gathered. It is by no means complete and / or
acurate. Feel free to reply this email with new projects or correct my
misunderstanding.
[...]
*
On 04/28/2015 12:28 PM, David Vrabel wrote:
On 28/04/15 16:52, Boris Ostrovsky wrote:
When a guest is resumed, the hypervisor may change event channel
assignments. If this happens and the guest uses 2-level events it
is possible for the interrupt to be claimed by wrong VCPU since
On Mon, 2015-04-27 at 09:43 -0700, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
We are burrying direct access to MTRR code support on
x86 in order to take advantage of PAT. In the future we
also want to make the default behaviour of ioremap_nocache()
to use strong UC,
Hi, everyone
The xen we used is 4.0.1, but xenalyze �Cversion tells me “xenalyze -
Open-source xen-unstable (3.4)” . can I use it? Is the latest version of
xenalyze available?
Thanks a lot
.
___
Xen-devel mailing list
Upcoming changes for vscsi will use libxlutil.so to prepare the
configuration for libxl. The helpers needs a xlu struct for logging.
Provide one and reuse the existing output as log target.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Jim Fehlig jfeh...@suse.com
---
src/libxl/libxl_conf.c | 6
This uses the API version of the proposed vscsi support in libxl (v4):
http://lists.xenproject.org/archives/html/xen-devel/2015-04/msg01949.html
Is there anything else that needs to be done in libvirt? Right now libvirt scsi
support is very simple minded, no support at all to describe host
On Tue, 2015-04-28 at 11:26 +0800, 蒋雄伟(蒋冲) wrote:
Hi, everyone
Hi,
The xen we used is 4.0.1, but xenalyze –version tells me “xenalyze -
Open-source xen-unstable (3.4)” . can I use it?
You can. Or, at least, I've always been able to, although it may depend
on what you're tracing. Have you
Hi Stefano,
On 28/04/15 11:00, Stefano Stabellini wrote:
On Mon, 27 Apr 2015, Julien Grall wrote:
diff --git a/xen/include/asm-arm/gic_v3_defs.h
b/xen/include/asm-arm/gic_v3_defs.h
index b8a1c2e..556f114 100644
--- a/xen/include/asm-arm/gic_v3_defs.h
+++ b/xen/include/asm-arm/gic_v3_defs.h
Hi,
On 28/04/15 10:56, Stefano Stabellini wrote:
On Tue, 28 Apr 2015, Vijay Kilari wrote:
Approach 1: (Using completion interrupt)
1) Create dummy device for each virtual ITS when virtual its is
created for a domain
OR Allocate one interrupt number for each virtual ITS
On Thu, Apr 2, 2015 at 7:17 PM, Julien Grall julien.grall@gmail.com wrote:
Hi Ian,
On 02/04/2015 12:18, Ian Campbell wrote:
On Thu, 2015-04-02 at 12:06 +0100, Julien Grall wrote:
Can we just enqueue with the hardware and use the guest vcpu polling
loop to trigger us to check for
From: Gerd Hoffmann kra...@redhat.com
Avoid using deprecated gnutls functions with recent gnutls versions.
Fixes build failure on Fedora 16. Keep the old way for compatibility
with old installations such as RHEL-5 (gnutls 1.4.x).
Based on a patch from Raghavendra D Prabhu
On Tue, 28 Apr 2015, Vijay Kilari wrote:
On Thu, Apr 2, 2015 at 7:17 PM, Julien Grall julien.grall@gmail.com
wrote:
Hi Ian,
On 02/04/2015 12:18, Ian Campbell wrote:
On Thu, 2015-04-02 at 12:06 +0100, Julien Grall wrote:
Can we just enqueue with the hardware and use the guest
On Mon, 27 Apr 2015, Julien Grall wrote:
Currently, the GICv3 drivers is only able to send an SGI when the cpumask
is provided. Although with the modes SGI_TARGET_OTHERS and SGI_TARGET_SELF,
no cpumask is provided. Any usage of those modes will crash the hypersivor.
Move the rename
No one uses pci_scan_bus_parented() any more,
remove it.
Signed-off-by: Yijing Wang wangyij...@huawei.com
---
drivers/pci/probe.c | 19 ---
include/linux/pci.h |2 --
2 files changed, 0 insertions(+), 21 deletions(-)
diff --git a/drivers/pci/probe.c b/drivers/pci/probe.c
From: Arnd Bergmann a...@arndb.de
Use pci_scan_root_bus() instead of deprecated function
pci_scan_bus_parented().
Signed-off-by: Arnd Bergmann a...@arndb.de
Signed-off-by: Yijing Wang wangyij...@huawei.com
CC: Konrad Rzeszutek Wilk konrad.w...@oracle.com
CC: xen-de...@lists.xenproject.org
---
Building qemu-traditional fails with current gnutls:
../libqemu_common.a(vnc.o): In function `vnc_start_tls':
/home/abuild/rpmbuild/BUILD/xen-4.6.30745/non-dbg/tools/qemu-xen-traditional-dir/vnc.c:2164:
undefined reference to `gnutls_kx_set_priority'
From: Andre Przywara andre.przyw...@amd.com
In my installation of GNU-TLS (v3.0.23) the type
gnutls_anon_server_credentials is marked deprecated, so -Werror
breaks compilation.
Simply replacing it with the newer ..._t version fixed the compilation
on my machine (Slackware 14.0). I cannot tell how
What happened to this patchset?
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Mon, 2015-04-27 at 17:36 +0800, Robert Hu wrote:
On Thu, 2015-04-23 at 00:34 +, Hu, Robert wrote:
-Original Message-
From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
Sent: Wednesday, April 22, 2015 8:50 PM
To: Ian Campbell
Cc: Pang, LongtaoX;
Hello Christoph,
Il 28/04/2015 09:36, Christoph Hellwig ha scritto:
What happened to this patchset?
It was passed on to Bob Liu, who published a follow-up patchset here:
https://lkml.org/lkml/2015/2/15/46
Thanks,
Arianna
___
Xen-devel mailing
After a resume the hypervisor/tools may change console event
channel number. We should re-query it.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
drivers/tty/hvc/hvc_xen.c | 18 +-
1 files changed, 17 insertions(+), 1 deletions(-)
diff --git
77 matches
Mail list logo