Hi Julien,
diff --git a/tools/libxl/libxl_arch.h b/tools/libxl/libxl_arch.h
index 5e1fc60..d1ca9c6 100644
--- a/tools/libxl/libxl_arch.h
+++ b/tools/libxl/libxl_arch.h
@@ -32,6 +32,13 @@ _hidden
int libxl__arch_domain_create(libxl__gc *gc, libxl_domain_config
On 14/06/17 21:27, Stefano Stabellini wrote:
> On Wed, 14 Jun 2017, Juergen Gross wrote:
>> On 14/06/17 02:47, Stefano Stabellini wrote:
>>> On Tue, 13 Jun 2017, Juergen Gross wrote:
On 02/06/17 21:31, Stefano Stabellini wrote:
> Implement the accept command by calling inet_accept. To
Hi Vijay,
On 15/06/17 08:52, Vijay Kilari wrote:
On Wed, May 31, 2017 at 4:07 PM, Jan Beulich wrote:
On 31.05.17 at 12:18, wrote:
On 31/05/17 11:04, Jan Beulich wrote:
On 28.03.17 at 17:53, wrote:
--- a/xen/common/Kconfig
>>> Stefano Stabellini 06/15/17 2:27 AM >>>
>On Wed, 14 Jun 2017, Jan Beulich wrote:
>> >>> Stefano Stabellini 06/14/17 8:45 PM >>>
>> >On Wed, 14 Jun 2017, Jan Beulich wrote:
>> >> > +What ACCESS_ONCE does *not* guarantee though is this access is
Signed-off-by: Ian Jackson
---
production-config | 2 ++
1 file changed, 2 insertions(+)
diff --git a/production-config b/production-config
index 96831c7..63d6641 100644
--- a/production-config
+++ b/production-config
@@ -94,6 +94,8 @@ TftpNetbootGroup osstest
In 497b2c6c933d "Rework runvar-build-set new value handling" we fixed
bugs in cs-adjust-flight which would make mg-repro-setup's attempt to
adjust build jobs sometimes not match at all, but we also changed the
syntax for specifying just a new flight. I forgot to update the
one in-tree user of
From: osstest service user
We are going to want a daemon that bins to * rather than to a known
address.
We achieve this by simply tolerating the lack of the FooHost config
setting; and, in that case, not passing -myaddr to Tcl's socket
command (and adjusting
From: osstest service user
osstest needs to know (from the DHCP server) what addresses its guests
have. Until now, the only way to do this has been to read the DHCP
server's leases file - if necessary, fetching the leases file from the
server.
Of course the size
On 15/06/17 12:05, Sergej Proskurin wrote:
> The current implementation does not provide appropriate types for
> short-descriptor translation table entries. As such, this commit adds new
> types, which simplify managing the respective translation table entries.
>
> Signed-off-by: Sergej Proskurin
flight 110434 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110434/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-pair 20 guest-start/debian fail REGR. vs. 110427
flight 110439 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110439/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c314970984065c98a56097443ae38d57a27bc73b
baseline version:
ovmf
Hi all,
I would suggest to organize the next Xen ARM community on Wednesday 21st
June at 5PM BST. Any opinions?
Also do you have any specific topic you would like to talk during this call?
For joining the call, please use either:
Call+44 1223 406065 (Local dial in)
and enter the
Instead of relying on cpuid instruction behaviour to tell which domain
type we are just try asking the kernel via the appropriate sysfs node
(added in Linux kernel 4.13).
Keep the old detection logic as a fallback for older kernels.
Signed-off-by: Juergen Gross
---
Hi Volodymyr,
On 14/06/17 15:10, Volodymyr Babchuk wrote:
SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs.
SMCCC states that both HVC and SMC are valid conduits to call to a different
firmware functions. Thus, for example PSCI calls can be made both by
SMC or HVC. Also
Wei Liu writes ("[RFC PATCH 0/4] Per-domain locking in xl"):
> It has always been the case that different xl processes can
> manipulate the same domain at the same time. This could be
> problematic.
>
> This series attempts to provide facility for xl to have a per-domain
> lock. This lock should
We extend the current implementation by an additional permission,
GV2M_EXEC, which will be used to describe execute permissions of PTE's
as part of our guest translation table walk implementation.
Signed-off-by: Sergej Proskurin
---
Cc:
---
xen/include/asm-arm/page.h |
This commit adds (TCR_|TTBCR_)* defines to simplify access to the
respective register contents. At the same time, we adjust the macro
TCR_T0SZ by using the newly introduced TCR_T0SZ_SHIFT instead of the
hardcoded value.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective translation table entries.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
In this commit we make the p2m_* helpers, which access PTE properties in
a simplified way, publicly available. This is due to the fact that the
helpers will be used in guest_walk.c in one of the following commits.
Signed-off-by: Sergej Proskurin
---
Cc:
---
The ARMv8 architecture supports pages with different (4K, 16K, and 64K) sizes.
To enable guest page table walks for various configurations, this commit
extends the defines and helpers of the current implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano
Hi all,
The function p2m_mem_access_check_and_get_page is called from the function
get_page_from_gva if mem_access is active and the hardware-aided translation of
the given guest virtual address (gva) into machine address fails. That is, if
the stage-2 translation tables constrain access to the
This commit adds functionality to walk the guest's page tables using the
long-descriptor translation table format for both ARMv7 and ARMv8.
Similar to the hardware architecture, the implementation supports
different page granularities (4K, 16K, and 64K). The implementation is
based on ARM DDI
This commit adds functionality to walk the guest's page tables using the
short-descriptor translation table format for both ARMv7 and ARMv8. The
implementation is based on ARM DDI 0487B-a J1-6002 and ARM DDI 0406C-b
B3-1506.
Signed-off-by: Sergej Proskurin
---
Cc:
In this commit, we make use of the gpt walk functionality introduced in
the previous commits. If mem_access is active, hardware-based gva to ipa
translation might fail, as gva_to_ipa uses the guest's translation
tables, access to which might be restricted by the active VTTBR. To
side-step
This commit adds two defines holding the register width of 32 bit and 64 bit
registers. These defines simplify using the associated constants in the
following commits.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
The function p2m_mem_access_check_and_get_page in mem_access.c
translates a gva to an ipa by means of the hardware functionality of the
ARM architecture. This is implemented in the function gva_to_ipa. If
mem_access is active, hardware-based gva to ipa translation might fail,
as gva_to_ipa uses
On 13/06/2017 22:13, Dario Faggioli wrote:
On Tue, 2017-06-13 at 17:07 +0100, Anshul Makkar wrote:
On 12/06/2017 14:19, Dario Faggioli wrote:
@@ -92,6 +92,82 @@
*/
what I want to ask is that if the budget of the domain is
replenished,
but credit for the vcpus of that domain is not
flight 110437 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110437/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 16 guest-start.2fail in 110387 pass in 110437
On 06/14/2017 05:03 PM, Stefano Stabellini wrote:
> On Mon, 12 Jun 2017, Boris Ostrovsky wrote:
>>> +
>>> static void pvcalls_back_work(struct work_struct *work)
>>> {
>>> + struct pvcalls_fedata *priv = container_of(work,
>>> + struct pvcalls_fedata, register_work);
>>> + int
>>> Wei Liu 06/14/17 7:19 PM >>>
>It has always been the case that different xl processes can manipulate the same
>domain at the same time. This could be problematic.
>
>This series attempts to provide facility for xl to have a per-domain lock. This
>lock should be used
On Wed, May 31, 2017 at 4:07 PM, Jan Beulich wrote:
On 31.05.17 at 12:18, wrote:
>> On 31/05/17 11:04, Jan Beulich wrote:
>> On 28.03.17 at 17:53, wrote:
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@
On Wed, Jun 14, 2017 at 10:40:59AM +0200, Juergen Gross wrote:
> When running under Xen as dom0 /dev/mcelog is being registered by Xen
> instead of the normal mcelog driver. Avoid an error message being
> issued by the mcelog driver in this case. Instead issue an informative
> message that Xen has
flight 110435 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110435/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 6 xen-boot fail REGR. vs. 110362
flight 110441 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110441/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1
On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote:
> From: Vlad Ioan Topan
>
> The default value for the "suppress #VE" bit set by set_mem_access()
> currently depends on whether the call is made from the same domain (the
> bit is set when called
Allocate a socket. Keep track of socket <-> ring mappings with a new data
structure, called sock_mapping. Implement the connect command by calling
inet_stream_connect, and mapping the new indexes page and data ring.
Allocate a workqueue and a work_struct, called ioworker, to perform
reads and
Implement backend_disconnect. Call pvcalls_back_release_active on active
sockets and pvcalls_back_release_passive on passive sockets.
Implement module_exit by calling backend_disconnect on frontend
connections.
Signed-off-by: Stefano Stabellini
CC:
Hi all,
this series introduces the backend for the newly introduced PV Calls
procotol.
PV Calls is a paravirtualized protocol that allows the implementation of
a set of POSIX functions in a different domain. The PV Calls frontend
sends POSIX function calls to the backend, which implements them
Implement poll on passive sockets by requesting a delayed response with
mappass->reqcopy, and reply back when there is data on the passive
socket.
Poll on active socket is unimplemented as by the spec, as the frontend
should just wait for events and check the indexes on the indexes page.
Only
On Thu, 15 Jun 2017, Juergen Gross wrote:
> On 14/06/17 21:27, Stefano Stabellini wrote:
> > On Wed, 14 Jun 2017, Juergen Gross wrote:
> >> On 14/06/17 02:47, Stefano Stabellini wrote:
> >>> On Tue, 13 Jun 2017, Juergen Gross wrote:
> On 02/06/17 21:31, Stefano Stabellini wrote:
> >
On Thu, 15 Jun 2017, Boris Ostrovsky wrote:
> On 06/14/2017 05:03 PM, Stefano Stabellini wrote:
> > On Mon, 12 Jun 2017, Boris Ostrovsky wrote:
> >>> +
> >>> static void pvcalls_back_work(struct work_struct *work)
> >>> {
> >>> + struct pvcalls_fedata *priv = container_of(work,
> >>> +
Hi Sergej,
On 06/15/2017 12:05 PM, Sergej Proskurin wrote:
The ARMv8 architecture supports pages with different (4K, 16K, and 64K) sizes.
To enable guest page table walks for various configurations, this commit
extends the defines and helpers of the current implementation.
Signed-off-by:
Hi Andrew,
On 06/15/2017 01:03 PM, Andrew Cooper wrote:
On 15/06/17 12:05, Sergej Proskurin wrote:
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective
Hi Sergej,
On 06/15/2017 12:05 PM, Sergej Proskurin wrote:
In this commit we make the p2m_* helpers, which access PTE properties in
a simplified way, publicly available. This is due to the fact that the
helpers will be used in guest_walk.c in one of the following commits.
Signed-off-by: Sergej
Your commit:
scsi: xen-scsifront: Remove code that zeroes driver-private command data
Since the SCSI core zeroes driver-private command data, remove
that code from the xen-scsifront driver.
Signed-off-by: Bart Van Assche
Reviewed-by:
Hi all,
Would you be up for joining a conf call to discuss EL0 apps and stubdoms
on ARM in preparation for Xen Developer Summit?
If so, would Wednesday the 28th of June at 9AM PST work for you?
I realize we also have the ARM community call next well, but this is a
large topic which deserves an
On Thu, 15 Jun 2017, Julien Grall wrote:
> Hi all,
>
> I would suggest to organize the next Xen ARM community on Wednesday 21st June
> at 5PM BST. Any opinions?
It works for me. FYI I sent a separate invite to discuss EL0 apps and
stubdoms on ARM
On Thu, Jun 15, 2017 at 5:05 AM, Sergej Proskurin
wrote:
> In this commit, we make use of the gpt walk functionality introduced in
> the previous commits. If mem_access is active, hardware-based gva to ipa
> translation might fail, as gva_to_ipa uses the guest's
On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote:
> Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a
> privileged domain to change the value of the #VE suppress bit for a
> page.
>
> Add a libxc wrapper for invoking this hvmop.
>
> Signed-off-by: Adrian
Hi Sergej,
On 06/15/2017 12:05 PM, Sergej Proskurin wrote:
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective translation table entries.
Signed-off-by: Sergej
Hi Jan,
thanks for spending your time on this mind boggling exercise!
On 14/06/17 10:12, Jan Beulich wrote:
On 13.06.17 at 17:25, wrote:
>> as mentioned in my previous mail, I consider this more of a discussion
>> base that an actual patch. I am by no means an
On Thu, 15 Jun 2017, Jan Beulich wrote:
> >>> Stefano Stabellini 06/15/17 2:27 AM >>>
> >On Wed, 14 Jun 2017, Jan Beulich wrote:
> >> >>> Stefano Stabellini 06/14/17 8:45 PM >>>
> >> >On Wed, 14 Jun 2017, Jan Beulich wrote:
> >> >> > +What
Hello Stefano,
On 15 June 2017 at 21:21, Stefano Stabellini wrote:
> Would you be up for joining a conf call to discuss EL0 apps and stubdoms
> on ARM in preparation for Xen Developer Summit?
>
> If so, would Wednesday the 28th of June at 9AM PST work for you?
I would
flight 71558 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71558/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-amd64-current-netinst-pygrub 9 debian-di-install fail blocked
in 71515
Hi Sergej,
On 06/15/2017 12:05 PM, Sergej Proskurin wrote:
We extend the current implementation by an additional permission,
GV2M_EXEC, which will be used to describe execute permissions of PTE's
as part of our guest translation table walk implementation.
Signed-off-by: Sergej Proskurin
On Thu, 15 Jun 2017, Volodymyr Babchuk wrote:
> Hello Stefano,
>
> On 15 June 2017 at 21:21, Stefano Stabellini wrote:
> > Would you be up for joining a conf call to discuss EL0 apps and stubdoms
> > on ARM in preparation for Xen Developer Summit?
> >
> > If so, would
On Tue, Jun 13, 2017 at 10:13 AM, Julien Grall wrote:
> Replace the following constructions:
> - _gfn(paddr_to_pfn(...)) => gaddr_to_gfn(...)
> - _mfn(paddr_to_pfn(...)) => maddr_to_mfn(...)
> - pfn_to_paddr(mfn_x(...)) => mfn_to_maddr(...)
> -
Implement the accept command by calling inet_accept. To avoid blocking
in the kernel, call inet_accept(O_NONBLOCK) from a workqueue, which get
scheduled on sk_data_ready (for a passive socket, it means that there
are connections to accept).
Use the reqcopy field to store the request. Accept the
Introduce a per-frontend data structure named pvcalls_fedata. It
contains pointers to the command ring, its event channel, a list of
active sockets and a tree of passive sockets (passing sockets need to be
looked up from the id on listen, accept and poll commands, while active
sockets only on
When an active socket has data available, increment the io and read
counters, and schedule the ioworker.
Implement the read function by reading from the socket, writing the data
to the data ring.
Set in_error on error.
Signed-off-by: Stefano Stabellini
CC:
When the other end notifies us that there is data to be written
(pvcalls_back_conn_event), increment the io and write counters, and
schedule the ioworker.
Implement the write function called by ioworker by reading the data from
the data ring, writing it to the socket by calling inet_sendmsg.
Set
Allocate a socket. Track the allocated passive sockets with a new data
structure named sockpass_mapping. It contains an unbound workqueue to
schedule delayed work for the accept and poll commands. It also has a
reqcopy field to be used to store a copy of a request for delayed work.
Reads/writes to
Introduce the code to handle xenbus state changes.
Implement the probe function for the pvcalls backend. Write the
supported versions, max-page-order and function-calls nodes to xenstore,
as required by the protocol.
Introduce stub functions for disconnecting/connecting to a frontend.
Just reply with success to the other end for now. Delay the allocation
of the actual socket to bind and/or connect.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/pvcalls-back.c | 27 +++
1 file
Introduce the C header file which defines the PV Calls interface. It is
imported from xen/include/public/io/pvcalls.h.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
CC: konrad.w...@oracle.com
CC: boris.ostrov...@oracle.com
CC:
We have one ioworker per socket. Each ioworker goes through the list of
outstanding read/write requests. Once all requests have been dealt with,
it returns.
We use one atomic counter per socket for "read" operations and one
for "write" operations to keep track of the reads/writes to do.
We also
When the other end notifies us that there are commands to be read
(pvcalls_back_event), wake up the backend thread to parse the command.
The command ring works like most other Xen rings, so use the usual
ring macros to read and write to it. The functions implementing the
commands are empty stubs
Release both active and passive sockets. For active sockets, make sure
to avoid possible conflicts with the ioworker reading/writing to those
sockets concurrently. Set map->release to let the ioworker know
atomically that the socket will be released soon, then wait until the
ioworker finishes
Introduce a xenbus backend for the pvcalls protocol, as defined by
https://xenbits.xen.org/docs/unstable/misc/pvcalls.html.
This patch only adds the stubs, the code will be added by the following
patches.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
Call inet_listen to implement the listen command.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/pvcalls-back.c | 19 +++
1 file changed, 19 insertions(+)
diff --git a/drivers/xen/pvcalls-back.c
Also add pvcalls-back to the Makefile.
Signed-off-by: Stefano Stabellini
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/Kconfig | 12
drivers/xen/Makefile | 1 +
2 files changed, 13 insertions(+)
diff --git a/drivers/xen/Kconfig
Keep a list of connected frontends. Use a semaphore to protect list
accesses.
Signed-off-by: Stefano Stabellini
Reviewed-by: Boris Ostrovsky
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
---
drivers/xen/pvcalls-back.c | 22
On 15/06/17 20:44, Julien Grall wrote:
> Hi Andrew,
>
> On 06/15/2017 01:03 PM, Andrew Cooper wrote:
>> On 15/06/17 12:05, Sergej Proskurin wrote:
>>> The current implementation does not provide appropriate types for
>>> short-descriptor translation table entries. As such, this commit
>>> adds new
On Tue, 13 Jun 2017, Julien Grall wrote:
> Fix the comment coding style and add a newline before the return.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 18 --
> 1 file changed, 12
On Tue, 13 Jun 2017, Julien Grall wrote:
> Replace the following constructions:
> - _gfn(paddr_to_pfn(...)) => gaddr_to_gfn(...)
> - _mfn(paddr_to_pfn(...)) => maddr_to_mfn(...)
> - pfn_to_paddr(mfn_x(...)) => mfn_to_maddr(...)
> - pfn_to_paddr(gfn_x(...)) =>
On Tue, 13 Jun 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/acpi/lib.c | 4 ++--
> xen/arch/arm/kernel.c | 4 +---
> xen/arch/arm/mm.c | 4 ++--
>
flight 110456 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110456/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-rumprun-amd64 16 rumprun-demo-xenstorels/xenstorels.repeat
fail REGR. vs. 107358
On Tue, 30 May 2017, Julien Grall wrote:
> > > In this design document, we are considering that the host bridge driver
> > > can
> > > be ported in Xen. In the case it is not possible, a interface to forward
> > > configuration space access would need to be defined. The interface details
> > > is
page.h is getting bigger. Move out every LPAE definitions in a separate
header. There is no functional changes.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/lpae.h | 169 +
xen/include/asm-arm/page.h | 152
flight 71561 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71561/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-i386-squeeze-netboot-pygrub 9 debian-di-install fail like
71523
On Tue, 13 Jun 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 33 +
> 1 file changed, 17 insertions(+), 16 deletions(-)
>
> diff --git
On Tue, 13 Jun 2017, Julien Grall wrote:
> Add a new helper clear_table to clear a page table entry and invalidate
> the cache.
>
> Signed-off-by: Julien Grall
> ---
> xen/arch/arm/mm.c | 22 --
> 1 file changed, 12 insertions(+), 10 deletions(-)
>
>
On Tue, 13 Jun 2017, Julien Grall wrote:
> This is matching the x86 side where the __* version is used if you need
> to override the helpers in source files.
>
> At the same time, move the non-underscore version at the end of the
> defintion and add a comment to explain them.
>
> Signed-off-by:
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file xen/arch/arm/p2m.c is using typesafe MFN in most of the place.
> This requires caller to mfn_to_page and page_to_mfn to use _mfn/mfn_x.
>
> To avoid extra _mfn/mfn_x, re-define mfn_to_page and page_to_mfn within
> xen/arch/arm/p2m.c to handle
Hi Julien,
thanks for the series!
I committed patches 2, 4-15, 17,18.
Cheers,
Stefano
On Tue, 13 Jun 2017, Julien Grall wrote:
> Hello all,
>
> This patch series extend the usage of typesafe MFN in the ARM code. _mfn(...)
> and mfn_x(...) are pushed further down in the call stack.
>
>
On Fri, 26 May 2017, Julien Grall wrote:
> Hi all,
>
> The document below is an RFC version of a design proposal for PCI
> Passthrough in Xen on ARM. It aims to describe from an high level perspective
> the interaction with the different subsystems and how guest will be able
> to discover and
flight 110460 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110460/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 110425
test-armhf-armhf-libvirt-raw 12
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file mm.c is the only user of mfn_to_xen_entry. This will also help
> to use the typesafe MFN.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 65
On Tue, 13 Jun 2017, Julien Grall wrote:
> paddr_to_pfn(virt_to_maddr(.)) and virt_to_mfn(.) are equivalent.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/domain_build.c | 2 +-
> 1 file changed, 1
On Tue, 13 Jun 2017, Julien Grall wrote:
> The file xen/arch/arm/mm.c is using the typesafe MFN in most of the
> place. This requires all caller of virt_to_mfn to prefixed by _mfn(...).
>
> To avoid the extra _mfn(...), re-defined virt_to_mfn within arch/arm/mm.c
> to handle typesafe MFN.
>
>
On 15 June 2017 at 23:14, Stefano Stabellini wrote:
>> > If so, would Wednesday the 28th of June at 9AM PST work for you?
>> I would prefer later time (like 5PM), but 9AM also works for me.
>
> Wait, did you get the timezone right?
>
> 1) 9AM PST = 5PM London = 7PM Kyiv
>
flight 110453 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110453/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
110417
On Tue, 13 Jun 2017, Julien Grall wrote:
> DIV_ROUND_UP(..., PAGE_SIZE) and PFN_UP(...) are equivalent.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/domain_build.c | 4 ++--
> xen/arch/arm/gic-v2.c |
On Tue, 13 Jun 2017, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/mm.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
>
This run is configured for baseline tests only.
flight 71559 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71559/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-120
On 15/06/2017 21:30, Julien Grall wrote:
> Also adding one missing full stop.
>
> Signed-off-by: Julien Grall
> ---
> xen/include/asm-arm/lpae.h | 45 ++---
> 1 file changed, 30 insertions(+), 15 deletions(-)
>
> diff --git
On Tue, 13 Jun 2017, Julien Grall wrote:
> xenheap_mfn_end is storing an MFN and not a physical address. Thankfully
> xenheap_mfn_end is not used in the arm64 code. So drop it.
That's fine, but in that case I would prefer to move the definition of
xenheap_mfn_end under #ifdef CONFIG_ARM_32. In
flight 71566 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71566/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
build-arm64 2 hosts-allocate broken never pass
build-arm64-pvops
On Tue, 13 Jun 2017, Julien Grall wrote:
> The physical address is computed from the machine frame number, so
> checking if the physical address is page aligned is pointless.
>
> Furthermore, directly assigned the MFN to the corresponding field in the
> entry rather than converting to a physical
On Tue, 13 Jun 2017, Julien Grall wrote:
> gfn_to_mfn is a wrapper of p2m_lookup which does not return the
> p2m_type.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/traps.c | 8
> 1 file changed, 4
1 - 100 of 120 matches
Mail list logo