On 08/08/17 13:33, Julien Grall wrote:
>
>
> On 08/08/17 13:17, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index c07999b518..904abafcae 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -2688,6 +2688,8 @@ static bool t
On Mon, Aug 07, 2017 at 02:23:08PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new handle_console_ring function. This function
> reads the data from the ring buffer on receiving an event.
>
> The initialization of event channel poll fd to -1 is moved inside the
> handle_console_ring f
On Mon, Aug 07, 2017 at 02:23:07PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_evtchn_unmask function. This function
> unmasks the console event channel if it is masked for some timeout
> period.
>
> One optimization that has been done is to merge the two 'for' loops.
>
>
On Mon, Aug 07, 2017 at 02:23:05PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new maybe_add_console_evtchn_fd function. This
> function adds the console event channel FD to list of polled FDs.
>
> Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
_
On Mon, Aug 07, 2017 at 02:23:06PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new maybe_add_console_tty_fd function. This function
> adds the tty fd to the list of polled fds.
>
> Signed-off-by: Bhupinder Thakur
> Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
___
On Mon, Aug 07, 2017 at 02:22:58PM +0530, Bhupinder Thakur wrote:
> Add a new domctl API to initialize vpl011. It takes the GFN and console
> backend domid as input and returns an event channel to be used for
> sending and receiving events from Xen.
>
> Xen will communicate with xenconsole using G
On Mon, Aug 07, 2017 at 02:23:03PM +0530, Bhupinder Thakur wrote:
[...]
> +static void console_free(struct console *con)
> +{
> + if (con->xspath)
Pointless check here.
With this fixed:
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists
On Fri, Aug 4, 2017 at 2:53 PM, Wei Liu wrote:
> On Wed, Aug 02, 2017 at 02:37:10PM +0300, Oleksandr Grytsov wrote:
> [...]
>> >> >> From other side this rename touches only internals changes: no changes
>> >> >> in config file
>> >> >> or CLI interface.
>> >> >>
>> >> >
>> >> > As said, the frame
On Sat, Jul 29, 2017 at 10:44:02AM -0600, Jan Beulich wrote:
> >>> Roger Pau Monne 07/24/17 4:58 PM >>>
> >On Fri, Jul 14, 2017 at 09:11:29AM -0600, Jan Beulich wrote:
> >> >>> On 30.06.17 at 17:01, wrote:
> >> > +static void vpci_bar_write(struct pci_dev *pdev, unsigned int reg,
> >> > +
On 08/08/17 13:17, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index c07999b518..904abafcae 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -2688,6 +2688,8 @@ static bool try_map_mmio(gfn_t gfn)
return !map_regions_p2mt(d, gfn, 1, mfn, p
flight 112513 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112513/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1 build-check(
Hi Julien,
On 08/04/2017 11:15 AM, Sergej Proskurin wrote:
> Hi Julien,
>
> Sorry for the late reply.
>
> On 07/31/2017 04:38 PM, Julien Grall wrote:
>>
>> On 18/07/17 13:24, Sergej Proskurin wrote:
>>> Hi all,
>> Hi,
>>
>>> The function p2m_mem_access_check_and_get_page is called from the functi
On 26/07/17 16:10, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
This is the PoC how to optimize page table deallocation sequence
by splitting it into separate chunks.
Use iommu_pt_cleanup_list to queue pages that need to be handled and
freed next time. Use free_page_table platform c
On Ma, 2017-08-08 at 12:27 +0100, Wei Liu wrote:
> On Tue, Aug 08, 2017 at 11:27:35AM +0300, Alexandru Isaila wrote:
> >
> > In some introspection usecases, an in-guest agent needs to
> > communicate
> > with the external introspection agent. An existing mechanism is
> > HVMOP_guest_request_vm_ev
Hi,
On 26/07/17 16:09, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Modify the Linux IPMMU driver to be functional inside Xen.
All devices within a single Xen domain must use the same
IOMMU context no matter what IOMMU domains they are attached to.
This is the main difference between
On Tue, Aug 08, 2017 at 11:27:35AM +0300, Alexandru Isaila wrote:
> In some introspection usecases, an in-guest agent needs to communicate
> with the external introspection agent. An existing mechanism is
> HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
> like all other hy
On 01/08/17 18:13, Oleksandr Tyshchenko wrote:
Hi, Julien
On Tue, Aug 1, 2017 at 3:27 PM, Julien Grall wrote:
On 26/07/17 16:09, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Hi, all.
Hi,
Please CC maintainers and any relevant person on the cover letter. This is
quite useful
On 08/07/2017 04:59 PM, Jan Beulich wrote:
George Dunlap 08/07/17 12:27 PM >>>
>> So it seems that people are still not quite clear about what I'm proposing.
>
> And indeed your examples helped me understand better what you mean
> (or at least I hope they did).
>
>> Suppose someone builds a
Hi Wei,
On 31/07/17 12:22, Wei Liu wrote:
A document for the release manager.
Signed-off-by: Wei Liu
Reviewed-by: Julien Grall
Cheers,
---
docs/process/xen-release-management.pandoc | 594 +
1 file changed, 594 insertions(+)
create mode 100644 docs/process/x
flight 71949 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71949/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-daily-netboot-pygrub 1 build-check(1) blocked n/a
build-arm64-pvops
On Tue, Aug 08, 2017 at 11:49:35AM +0100, Wei Liu wrote:
> On Sat, Aug 05, 2017 at 01:26:37AM +0800, Zhongze Liu wrote:
> > Hi Wei,
> >
> > Thank you for reviewing my patch.
> >
> > 2017-08-04 23:20 GMT+08:00 Wei Liu :
> > > I skim through this patch and have some questions.
> > >
> > > On Fri, A
On Sat, Aug 05, 2017 at 01:26:37AM +0800, Zhongze Liu wrote:
> Hi Wei,
>
> Thank you for reviewing my patch.
>
> 2017-08-04 23:20 GMT+08:00 Wei Liu :
> > I skim through this patch and have some questions.
> >
> > On Fri, Aug 04, 2017 at 10:20:25AM +0800, Zhongze Liu wrote:
> >> +
> >> +static int
This run is configured for baseline tests only.
flight 71950 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71950/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 6e414300b5f19d3045a0d21ad90ac2fe965478a5
baseline v
flight 112511 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112511/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 13 guest-saverestore fail REGR. vs. 112496
build-armhf-xsm
On 28/07/17 11:23, Juergen Gross wrote:
> A Xen HVM guest running with KASLR enabled will die rather soon today
> due to the shared info page mapping is using va() too early. This was
As a minor grammar issue, either s/due to/because/ or s/mapping is
using/mapping using/
~Andrew
> introduced by
On 08/08/17 08:02, Juergen Gross wrote:
> On 07/08/17 22:56, Boris Ostrovsky wrote:
>>> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
>>> index 811e4ddb3f37..a3dcd83187ce 100644
>>> --- a/arch/x86/xen/enlighten_pv.c
>>> +++ b/arch/x86/xen/enlighten_pv.c
>>> @@ -579,6 +579,7
>>> Andrew Cooper 08/07/17 7:19 PM >>>
>More than once, we've discussed freeing up the legacy PIC range of
>vectors, and freeing up the unallocated vectors in 0xfx.
And that's something I would prefer over the change proposed here,
albeit I realize that the amount of vectors to recover isn't that
>>> Andrew Cooper 08/07/17 6:21 PM >>>
>On 07/08/17 17:06, Jan Beulich wrote:
> Andrew Cooper 08/07/17 5:40 PM >>>
>>> On 07/08/17 16:38, Jan Beulich wrote:
So a single NIC drove the system out of vectors? That's insane, I would
say, i.e. I'd call this a misconfigured system. But ye
In some introspection usecases, an in-guest agent needs to communicate
with the external introspection agent. An existing mechanism is
HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
like all other hypercalls.
Introduce a mechanism whereby the introspection agent can white
flight 112512 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112512/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 6e414300b5f19d3045a0d21ad90ac2fe965478a5
baseline version:
ovmf 8853c2afc51c2cab862ac
flight 112508 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112508/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
build-armhf
On 07/08/17 22:56, Boris Ostrovsky wrote:
>
>> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
>> index 811e4ddb3f37..a3dcd83187ce 100644
>> --- a/arch/x86/xen/enlighten_pv.c
>> +++ b/arch/x86/xen/enlighten_pv.c
>> @@ -579,6 +579,71 @@ static void xen_write_ldt_entry(struct
101 - 132 of 132 matches
Mail list logo