On 21/06/17 15:41, Wei Liu wrote:
> Otherwise gcc with -Wunused will complain the return value is not
> used.
>
> Reported-by: Olaf Hering
> Signed-off-by: Wei Liu
Acked-by: Andrew Cooper
>>> On 23.06.17 at 16:26, wrote:
> This will make future cleanup more obviously correct. No functional change.
>
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Roger Pau Monne writes ("[PATCH v3 7/8] osstest: introduce a script to create a
FreeBSD flight"):
> +FreeBSDDist
> + Path to the folder that contains the FreeBSD install image and
> + the FreeBSD compressed install sets, together with the MANIFEST
> + file that holds the checksums. This is
Anthony PERARD writes ("Re: [OSSTEST PATCH v11 18/20] ts-logs-capture: Capture
OpenStack logs"):
> On Fri, Jun 23, 2017 at 02:49:11PM +0100, Ian Jackson wrote:
> > This is not fine. If a build host is shared, it will collect all the
> > logs from all of the builds.
>
> This file should not
On Fri, Jun 23, 2017 at 02:45:22PM +0100, Andrew Cooper wrote:
> On 23/06/17 14:43, Julien Grall wrote:
> > Hi,
> >
> > On 23/06/17 14:33, Andrew Cooper wrote:
> >> On 23/06/17 14:32, Julien Grall wrote:
> >>> Hi Andrew,
> >>>
> >>> I am a bit confused, the title says "PATCH for-4.9 v3 3/3". I
On 23/06/17 15:23, Sergej Proskurin wrote:
Hi Julien,
[...]
+static bool get_ttbr_and_gran_64bit(uint64_t *ttbr, unsigned int *gran,
+register_t tcr, enum active_ttbr
ttbrx)
+{
+bool disabled;
+
+if ( ttbrx == TTBR0_ACTIVE )
+{
+/*
On Fri, Jun 23, 2017 at 02:41:59PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[OSSTEST PATCH v11 11/20] ts-openstack-deploy:
> Increase fd and memory limits for rabbitmq"):
> > Signed-off-by: Anthony PERARD
>
> Does this not mean that the upstream defaults
So far callers of the libxc interface passed in a domain ID which was
then ignored in the hypervisor. Instead, make the hypervisor honor it
(accepting DOMID_INVALID to obtain original behavior), allowing to
query whether a device can be assigned to a particular domain.
Signed-off-by: Jan Beulich
On Fri, Jun 23, 2017 at 02:42:53PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[OSSTEST PATCH v11 12/20] make-flight: Increase
> dom0_mem for openstack flight"):
> > With 4G for dom0_mem, a host running devstack is using about 1.5G of
> > swap.
>
> Is this going to work properly on 8G
On 23/06/17 15:38, Jan Beulich wrote:
> CF reflects the last bit shifted out, i.e. can't possibly be derived
> from the result value.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Roger Pau Monne writes ("[PATCH v3.1 8/8] osstest: hook FreeBSD flight into
cr-daily-branch"):
> +++ b/daily-cron-email-real--freebsd
> @@ -0,0 +1,4 @@
> +To: xen-de...@lists.xenproject.org,
> +osstest-ad...@xenproject.org,
> +roy...@freebsd.org
> +Bcc: osstest-out...@lists.xenproject.org
flight 111006 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111006/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12
On Thu, 2017-06-22 at 17:55 +0100, George Dunlap wrote:
> On 08/06/17 13:08, Dario Faggioli wrote:
> > This commit implements the Xen part of the cap mechanism for
> > Credit2.
> >
> > A cap is how much, in terms of % of physical CPU time, a domain
> > can execute at most.
> >
> > For instance,
On Fri, Jun 23, 2017 at 02:58:25PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[OSSTEST PATCH v11 20/20] Introduce flight for stable
> branches of OpenStack"):
> > OpenStack have many different repo which should be in sync, so this
> > patch should grab the revisions of the stable branch
Anthony PERARD writes ("Re: [OSSTEST PATCH v11 20/20] Introduce flight for
stable branches of OpenStack"):
> We decided to track only nova.git, and let osstest clone other trees and
> checkout the HEAD (by having REVISION_* empty). That is fine if we track
> "master" of nova.git.
Right.
> The
Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [PATCH RFC] Live migration for
VMs with QEMU backed local storage"):
> On Fri, Jun 23, 2017 at 03:31:16AM -0400, Bruno Alvisio wrote:
> > disks). This are the ones I can think of:
> > - Fully Virtualized HVM: QEMU emulation
> > - blkback
> > - blktap
Roger Pau Monne writes ("[PATCH v3 3/8] osstest: introduce helper to get
per-host tftp prefix"):
> This is used in order to get the per-host tftp prefix, used to store
> the host initrd file.
Acked-by: Ian Jackson
___
On Fri, Jun 23, 2017 at 02:47:37PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[OSSTEST PATCH v11 16/20] ts-openstack-tempest:
> Update list of skipped tests"):
> > Signed-off-by: Anthony PERARD
>
> Again, does this not mean we're going to suffer a maintenance
Anthony PERARD writes ("Re: [OSSTEST PATCH v11 11/20] ts-openstack-deploy:
Increase fd and memory limits for rabbitmq"):
> On Fri, Jun 23, 2017 at 02:41:59PM +0100, Ian Jackson wrote:
> > Anthony PERARD writes ("[OSSTEST PATCH v11 11/20] ts-openstack-deploy:
> > Increase fd and memory limits for
Anthony PERARD writes ("Re: [OSSTEST PATCH v11 16/20] ts-openstack-tempest:
Update list of skipped tests"):
> On Fri, Jun 23, 2017 at 02:47:37PM +0100, Ian Jackson wrote:
> > Again, does this not mean we're going to suffer a maintenance burden
> > as tempest grows new inapplicable tests ?
>
>
On 06/23/2017 12:54 PM, Olaf Hering wrote:
On Thu, Jun 22, Boris Ostrovsky wrote:
They are queued for 4.13.
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.13
This works for me. Thanks.
I assume there is no ready-to-pull variant for linux-4.4.x?
nm.
Not that I am
On 23/06/17 15:35, Konrad Rzeszutek Wilk wrote:
On Fri, Jun 23, 2017 at 02:45:22PM +0100, Andrew Cooper wrote:
On 23/06/17 14:43, Julien Grall wrote:
Hi,
On 23/06/17 14:33, Andrew Cooper wrote:
On 23/06/17 14:32, Julien Grall wrote:
Hi Andrew,
I am a bit confused, the title says "PATCH
On Fri, Jun 23, 2017 at 03:36:51PM +0100, Julien Grall wrote:
>
>
> On 23/06/17 15:35, Konrad Rzeszutek Wilk wrote:
> > On Fri, Jun 23, 2017 at 02:45:22PM +0100, Andrew Cooper wrote:
> > > On 23/06/17 14:43, Julien Grall wrote:
> > > > Hi,
> > > >
> > > > On 23/06/17 14:33, Andrew Cooper wrote:
Roger Pau Monne writes ("[PATCH v3 4/8] osstest: add a FreeBSD host install
recipe"):
> The installation is performed using the bsdinstall tool, which is part
> of the FreeBSD base system. The installer image is setup with the
> osstest ssh keys and sshd enabled by default, which allows the test
Roger Pau Monne writes ("[PATCH v3 5/8] osstest: introduce a FreeBSD build
script"):
> The following new helpers are also introduced, that are only used by
> the FreeBSD build script: buildcmd_stamped_logged_root and
> target_cmd_build_root, they behave exactly the same as the non-root
>
Roger Pau Monne writes ("[PATCH v3 6/8] osstest: introduce a script to set the
hostflags for FreeBSD jobs"):
> Due to the nature of the FreeBSD install media, which is
> self-generated from the ts-freebsd-build script, the hostflags set to
> FreeBSD jobs are related to the current version under
Roger Pau Monne writes ("[PATCH v3 8/8] osstest: hook FreeBSD flight into
cr-daily-branch"):
> +++ b/daily-cron-email-freebsd
> @@ -0,0 +1 @@
> +To: roy...@freebsd.org
Please at least Bcc osstest-output. See daily-cron-email-osstest for
an example.
Please also provide information about the
On Thu, Jun 22, Boris Ostrovsky wrote:
> They are queued for 4.13.
> git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.13
This works for me. Thanks.
I assume there is no ready-to-pull variant for linux-4.4.x?
nm.
Olaf
signature.asc
Description: PGP signature
Anthony PERARD writes ("[OSSTEST PATCH v11 20/20] Introduce flight for stable
branches of OpenStack"):
> OpenStack have many different repo which should be in sync, so this
> patch should grab the revisions of the stable branch of every OpenStack
> tree. Tempest does not have stable branch and
This will make future cleanup more obviously correct. No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/mm.c | 56 ---
1 file changed, 29 insertions(+), 27
CF reflects the last bit shifted out, i.e. can't possibly be derived
from the result value.
Signed-off-by: Jan Beulich
---
v2: Fix 64-bit testcase build.
--- a/tools/tests/x86_emulator/test_x86_emulator.c
+++ b/tools/tests/x86_emulator/test_x86_emulator.c
@@ -783,6 +783,31 @@
On Fri, Jun 23, 2017 at 02:45:12PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[OSSTEST PATCH v11 15/20] ts-openstack-tempest: Fix
> tempest invocation"):
> > ./run_tempest.sh is deprecated.
> ...
> > target_cmd($ho, < > set -e
> > -$builddir/tempest/run_tempest.sh
On Fri, Jun 23, 2017 at 01:41:29PM +0100, Andrew Cooper wrote:
> On 08/06/17 18:11, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > xen/arch/x86/pv/hypercall.c | 36
> > xen/arch/x86/x86_64/traps.c | 36
On Fri, Jun 23, 2017 at 04:34:41PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("Re: [OSSTEST PATCH v11 11/20] ts-openstack-deploy:
> Increase fd and memory limits for rabbitmq"):
> > On Fri, Jun 23, 2017 at 02:41:59PM +0100, Ian Jackson wrote:
> > > Anthony PERARD writes ("[OSSTEST PATCH
On 06/23/2017 11:00 AM, Jan Beulich wrote:
So far callers of the libxc interface passed in a domain ID which was
then ignored in the hypervisor. Instead, make the hypervisor honor it
(accepting DOMID_INVALID to obtain original behavior), allowing to
query whether a device can be assigned to a
Anthony PERARD writes ("Re: [OSSTEST PATCH v11 12/20] make-flight: Increase
dom0_mem for openstack flight"):
> On Fri, Jun 23, 2017 at 02:42:53PM +0100, Ian Jackson wrote:
> > Anthony PERARD writes ("[OSSTEST PATCH v11 12/20] make-flight: Increase
> > dom0_mem for openstack flight"):
> > > With
flight 110975 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110975/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail REGR. vs. 106833
Tests
From: Oleksandr Andrushchenko
Extend xen_kbdfront to provide multi-touch support
to unprivileged domains.
Signed-off-by: Oleksandr Andrushchenko
---
Changes since initial:
- use input_set_capability instead of setting flags
On 23/06/17 15:49, Wei Liu wrote:
> On Fri, Jun 23, 2017 at 01:41:29PM +0100, Andrew Cooper wrote:
>> On 08/06/17 18:11, Wei Liu wrote:
>>> Signed-off-by: Wei Liu
>>> ---
>>> xen/arch/x86/pv/hypercall.c | 36
>>>
On Fri, Jun 23, 2017 at 02:49:11PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[OSSTEST PATCH v11 18/20] ts-logs-capture: Capture
> OpenStack logs"):
> > + /var/log/openstack/*.log
> > + /etc/nova/*
> > + /etc/neutron/*
> > +
On 06/23/2017 08:09 PM, Sergej Proskurin wrote:
Hi Julien,
Hi Sergej,
[...]
Looking at the code, I see very limited point of having the offsets
array as you don't use a loop and also use each offset in a single place.
+((paddr_t)(gva >> 20) & ((1ULL << (12 - n)) - 1)),
On 2017-06-23 10:03 AM, Boris Ostrovsky wrote:
On 06/23/2017 12:54 PM, Olaf Hering wrote:
On Thu, Jun 22, Boris Ostrovsky wrote:
They are queued for 4.13.
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.13
This works for me. Thanks.
I assume there is no
flight 111020 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111020/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12
Hi Stefano,
On 06/23/2017 07:21 PM, Stefano Stabellini wrote:
On Fri, 23 Jun 2017, Julien Grall wrote:
Hi,
On 22/06/17 22:05, Stefano Stabellini wrote:
When we encounter an id IDx during "xl create":
+ If it’s not under /local/shared_mem:
+ If the corresponding entry has a "master"
flight 110978 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110978/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail in 110942 REGR. vs. 110550
Tests which
Remove unnecessary variable mfn in function xen_foreach_remap_area() and,
refactor the code.
Variable mfn at line 518:mfn = xen_remap_buf.mfns[i];
is only being used to store a value to be passed as
an argument to the xen_update_mem_tables() function.
This value can be passed directly, which
> -Original Message-
> From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> Sent: Friday, June 23, 2017 4:09 PM
> To: Jarvis Roach
> Cc: Stefano Stabellini ; Julien Grall
> ; Zhongze Liu
On Fri, 23 Jun 2017, Jarvis Roach wrote:
> > -Original Message-
> > From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> > Sent: Friday, June 23, 2017 2:21 PM
> > To: Julien Grall
> > Cc: Stefano Stabellini ; Zhongze Liu
> >
On Fri, Jun 23, 2017 at 07:40:36PM +0200, Olaf Hering wrote:
> On Fri, Jun 23, Wei Liu wrote:
>
> > Do you need to check if the compiler supports -fno-pic?
>
> In my testing gcc-4.3 and 4.5 know about this option.
>
We support >=4.1. Please check those as well.
flight 111009 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111009/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12
On Fri, 23 Jun 2017, Jan Beulich wrote:
> >>> On 22.06.17 at 20:52, wrote:
> > On Thu, 22 Jun 2017, Jan Beulich wrote:
> >> >>> On 21.06.17 at 20:46, wrote:
> >> > On Wed, 21 Jun 2017, Jan Beulich wrote:
> >> >> >>> On 20.06.17 at 23:48,
flight 110988 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110988/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c01f13d52a85f097e1cc6b194df1316a3ed24710
baseline version:
ovmf
On 6/23/2017 5:00 AM, Borislav Petkov wrote:
On Fri, Jun 16, 2017 at 01:56:19PM -0500, Tom Lendacky wrote:
Add the support to encrypt the kernel in-place. This is done by creating
new page mappings for the kernel - a decrypted write-protected mapping
and an encrypted mapping. The kernel is
On 2017-06-23 10:03 AM, Boris Ostrovsky wrote:
On 06/23/2017 12:54 PM, Olaf Hering wrote:
On Thu, Jun 22, Boris Ostrovsky wrote:
They are queued for 4.13.
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.13
This works for me. Thanks.
I assume there is no
gcc7 is more strict with functions marked as inline. They are not
automatically inlined. Instead a function call is generated, but the
actual code is not visible by the linker.
Do a mechanical change and mark every 'inline' as 'static inline'. For
simpler review the static goes into an extra
On Fri, Jun 23, Wei Liu wrote:
> We support >=4.1. Please check those as well.
Yes, 4.1.2 works as well.
Olaf
signature.asc
Description: PGP signature
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi Julien,
[...]
>
> Looking at the code, I see very limited point of having the offsets
> array as you don't use a loop and also use each offset in a single place.
>
>> +((paddr_t)(gva >> 20) & ((1ULL << (12 - n)) - 1)),
>
Don't you think it is more readable to have the GVA offsets
On Fri, Jun 23, 2017 at 07:26:01PM +0200, Olaf Hering wrote:
> If the default compiler silently defaults to to -fPIC/-fPIE building
> rombios fails:
>
> ld -melf_i386 -s -r 32bitbios.o tcgbios/tcgbiosext.o util.o pmm.o -o
> 32bitbios_all.o
> There are undefined symbols in the BIOS:
>
On Fri, Jun 23, Wei Liu wrote:
> Do you need to check if the compiler supports -fno-pic?
In my testing gcc-4.3 and 4.5 know about this option.
Olaf
signature.asc
Description: PGP signature
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On Fri, 23 Jun 2017, Julien Grall wrote:
> Hi,
>
> On 22/06/17 22:05, Stefano Stabellini wrote:
> > > When we encounter an id IDx during "xl create":
> > >
> > > + If it’s not under /local/shared_mem:
> > > + If the corresponding entry has a "master" tag, create the
> > >
Anthony PERARD writes ("Re: [OSSTEST PATCH v11 11/20] ts-openstack-deploy:
Increase fd and memory limits for rabbitmq"):
> On Fri, Jun 23, 2017 at 04:34:41PM +0100, Ian Jackson wrote:
> > And if one isn't using systemd ?
>
> I guess it would have to fix devstack. Also, the default is 1k,
On Fri, Jun 16, 2017 at 01:56:39PM -0500, Tom Lendacky wrote:
> Add support to check if SME has been enabled and if memory encryption
> should be activated (checking of command line option based on the
> configuration of the default state). If memory encryption is to be
> activated, then the
On Fri, Jun 23, Wei Liu wrote:
> We support >=4.1. Please check those as well.
According to the PDF manuals at https://gcc.gnu.org/onlinedocs/ a
"-fno-foo" is mentioned, so I think -fno-pic is recognized. I will see
if I find a copy of SLE10 to verify with 4.1.2.
Olaf
signature.asc
On Fri, 23 Jun 2017, Julien Grall wrote:
> Hi Bhupinder,
>
> On 22/06/17 08:38, Bhupinder Thakur wrote:
> > There are some TBD items which need to be looked at in the future:
> >
> > 1. Currently UEFI firmware logs the output to hvc console only. How can
> >UEFI firmware be made aware of
On Fri, 23 Jun 2017, Julien Grall wrote:
> On 23/06/17 14:17, Julien Grall wrote:
> >
> >
> > On 23/06/17 00:04, Stefano Stabellini wrote:
> > > > diff --git a/tools/libxc/include/xenctrl.h
> > > > b/tools/libxc/include/xenctrl.h
> > > > index 1629f41..26f3d1e 100644
> > > > ---
Hi,
On 06/23/2017 07:28 PM, Stefano Stabellini wrote:
On Fri, 23 Jun 2017, Julien Grall wrote:
Hi Stefano,
On 22/06/17 23:53, Stefano Stabellini wrote:
On Thu, 22 Jun 2017, Bhupinder Thakur wrote:
+static void vpl011_write_data(struct domain *d, uint8_t data)
+{
+unsigned long flags;
+
If the default compiler silently defaults to to -fPIC/-fPIE building
rombios fails:
ld -melf_i386 -s -r 32bitbios.o tcgbios/tcgbiosext.o util.o pmm.o -o
32bitbios_all.o
There are undefined symbols in the BIOS:
U _GLOBAL_OFFSET_TABLE_
make[10]: *** [Makefile:26: 32bitbios_all.o]
On Fri, 23 Jun 2017, Julien Grall wrote:
> Hi,
>
> On 21/06/17 14:10, Julien Grall wrote:
> > Hi Stefano.
> >
> > On 21/06/17 00:04, Stefano Stabellini wrote:
> > > Add a warning: use passthrough with care.
> > >
> > > Add a pointer to the gic device tree bindings. Add an explanation on how
> >
On Fri, 23 Jun 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 22/06/17 23:53, Stefano Stabellini wrote:
> > On Thu, 22 Jun 2017, Bhupinder Thakur wrote:
> > > +static void vpl011_write_data(struct domain *d, uint8_t data)
> > > +{
> > > +unsigned long flags;
> > > +struct vpl011 *vpl011 =
> -Original Message-
> From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> Sent: Friday, June 23, 2017 2:21 PM
> To: Julien Grall
> Cc: Stefano Stabellini ; Zhongze Liu
> ; xen-de...@lists.xenproject.org; Wei Liu
flight 110984 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110984/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 14 guest-saverestore.2 fail REGR. vs.
110515
>>> On 23.06.17 at 10:55, wrote:
>
> On 23/06/17 09:30, Jan Beulich wrote:
> On 22.06.17 at 20:31, wrote:
>>> Hi,
>>>
>>> On 20/06/17 11:32, Jan Beulich wrote:
>>> On 20.06.17 at 12:06, wrote:
> At 03:36 -0600 on 20 Jun
>>> On 23.06.17 at 11:31, wrote:
> @@ -1843,16 +1852,19 @@ void page_unlock(struct page_info *page)
> } while ( (y = cmpxchg(>u.inuse.type_info, x, nx)) != x );
> }
>
> -/* How to write an entry to the guest pagetables.
> - * Returns 0 for failure (pointer not
>>> On 23.06.17 at 11:31, wrote:
> No functional change.
>
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
>>> On 23.06.17 at 10:38, wrote:
> On Fri, Jun 23, 2017 at 09:26:10AM +0100, Roger Pau Monne wrote:
>> On Thu, Jun 22, 2017 at 03:40:52AM -0600, Jan Beulich wrote:
>> > >>> On 20.06.17 at 11:15, wrote:
>> > > @@ -472,7 +514,29 @@ int
On Fri, Jun 16, 2017 at 01:55:54PM -0500, Tom Lendacky wrote:
> Xen does not currently support SME for PV guests. Clear the SME cpu
nitpick: s/cpu/CPU/
> capability in order to avoid any ambiguity.
>
> Signed-off-by: Tom Lendacky
> ---
> arch/x86/xen/enlighten_pv.c |
Hi,
On 22/06/17 22:05, Stefano Stabellini wrote:
When we encounter an id IDx during "xl create":
+ If it’s not under /local/shared_mem:
+ If the corresponding entry has a "master" tag, create the
corresponding entries for IDx in xenstore
+ If there isn't a "master" tag, say
At 03:18 -0600 on 23 Jun (1498187924), Jan Beulich wrote:
> >>> On 23.06.17 at 10:55, wrote:
>
> >
> > On 23/06/17 09:30, Jan Beulich wrote:
> > On 22.06.17 at 20:31, wrote:
> >>> Hi,
> >>>
> >>> On 20/06/17 11:32, Jan Beulich wrote:
> >>> On
>>> On 23.06.17 at 11:24, wrote:
> At 03:18 -0600 on 23 Jun (1498187924), Jan Beulich wrote:
>> >>> On 23.06.17 at 10:55, wrote:
>>
>> >
>> > On 23/06/17 09:30, Jan Beulich wrote:
>> > On 22.06.17 at 20:31, wrote:
>> >>> Hi,
>> >>>
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/mm.c | 29 +
xen/include/asm-x86/x86_64/page.h | 1 -
2 files changed, 13 insertions(+), 17 deletions(-)
diff
* Drop trailing whitespace
* Apply Xen comment and space style
* Switch bool_t to bool
* Drop TOGGLE_MODE() macro
* Replace erroneous mandatory barriers with smp barriers
* Switch boolean ints for real bools
No (intended) functional change.
Signed-off-by: Andrew Cooper
On Fri, Jun 16, 2017 at 01:56:07PM -0500, Tom Lendacky wrote:
> When accessing memory using /dev/mem (or /dev/kmem) use the proper
> encryption attributes when mapping the memory.
>
> To insure the proper attributes are applied when reading or writing
> /dev/mem, update the xlate_dev_mem_ptr()
>>> On 22.06.17 at 19:05, wrote:
> Do you recall perchance this thread:
> http://www.mail-archive.com/xen-devel@lists.xen.org/msg80633.html
Vaguely.
> I am thinking to ressurect it but to follow the same spirit as here,
> that is return -ENOTSUPPO if the sh_addralign
Hi Bhupinder,
NIT: You could drop vpl011 in the commit message as this is not related
to vpl011.
On 22/06/17 08:38, Bhupinder Thakur wrote:
This patch renames the vgic_reg* access functions defined in vreg.h to vreg_reg*
and replaces all calls to vgic_reg* functions in vgic/its emulation
>>> On 22.06.17 at 20:15, wrote:
> A symndx of STN_UNDEF is special, and means a symbol value of 0. While
> legitimate in the ELF standard, its existance in a livepatch is questionable
> at best. Until a plausible usecase presents itself, reject such a relocation
>
Achieve this by expanding pt_irq_create_bind in order to support
mapping interrupts of type PT_IRQ_TYPE_PCI to a PVH Dom0. GSIs bound
to Dom0 are always identity bound, which means the all the fields
inside of the u.pci sub-struct are ignored, and only the machine_irq
is actually used in order to
And introduce vioapic_get_{mask/vector} in order to replace it's
usage.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v5:
- New in this version.
---
xen/arch/x86/hvm/vioapic.c
Hello,
The following patches allow binding bare-metal GSIs into a PVHv2 Dom0,
by snooping on the vIO APICs writes made by Dom0.
There are only tree remaining patches, the first one is an
improvements/cleanup to the vioapic code, the second adds support for
identity mapping GSIs for the hardware
Add the glue in order to bind the PVH Dom0 GSI from bare metal. This
is done when Dom0 unmasks the vIO APIC pins, by fetching the current
pin settings and setting up the PIRQ, which will then be bound to
Dom0.
Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
On 16/06/2017 15:13, Dario Faggioli wrote:
In fact, we want to be able to use them from any scheduler.
While there, make the moved code use 'v' for struct_vcpu*
variable, like it should be done everywhere.
No functional change intended.
Signed-off-by: Dario Faggioli
>>> On 23.06.17 at 10:33, wrote:
> On Fri, Jun 23, 2017 at 01:58:52AM -0600, Jan Beulich wrote:
> On 23.06.17 at 06:22, wrote:
>>> On Fri, Jun 16, 2017 at 09:09:13AM -0600, Jan Beulich wrote:
>>> On 24.05.17 at 08:56, wrote:
>>> On 23.06.17 at 10:41, wrote:
> On 23/06/17 09:30, Jan Beulich wrote:
> On 22.06.17 at 20:31, wrote:
>>> On 20/06/17 11:32, Jan Beulich wrote:
>>> On 20.06.17 at 12:06, wrote:
> At 03:36 -0600 on 20 Jun (1497929778), Jan
Hi,
On 21/06/17 14:10, Julien Grall wrote:
Hi Stefano.
On 21/06/17 00:04, Stefano Stabellini wrote:
Add a warning: use passthrough with care.
Add a pointer to the gic device tree bindings. Add an explanation on how
to calculate irq numbers from device tree.
Add a brief explanation of the
On Fri, Jun 23, 2017 at 11:09:21AM +0200, Bernhard M. Wiedemann wrote:
> On Thu, Jun 22, 2017 at 03:55:21PM +0100, Andrew Cooper wrote:
> > On 22/06/17 15:09, Wei Liu wrote:
> > > On Thu, Jun 22, 2017 at 03:40:26PM +0200, Bernhard M. Wiedemann wrote:
> > >> to not add current timestamp to
> > >>
>>> On 22.06.17 at 20:57, wrote:
> Deferred:
> * Per-node heap locks. In addition to (presumably) improving performance in
> general, once they are available we can parallelize scrubbing further by
> allowing more than one core per node to do idle loop scrubbing.
On Thu, Jun 22, 2017 at 11:29:44AM -0700, Stefano Stabellini wrote:
> On Thu, 22 Jun 2017, Roger Pau Monné wrote:
> > On Wed, Jun 21, 2017 at 01:16:56PM -0700, Stefano Stabellini wrote:
> > > On Tue, 20 Jun 2017, Roger Pau Monné wrote:
> > > > On Thu, Jun 15, 2017 at 12:09:36PM -0700, Stefano
On Fri, Jun 16, 2017 at 01:56:19PM -0500, Tom Lendacky wrote:
> Add the support to encrypt the kernel in-place. This is done by creating
> new page mappings for the kernel - a decrypted write-protected mapping
> and an encrypted mapping. The kernel is encrypted by copying it through
> a temporary
On 23/06/17 10:50, Jan Beulich wrote:
On 22.06.17 at 20:15, wrote:
>> A symndx of STN_UNDEF is special, and means a symbol value of 0. While
>> legitimate in the ELF standard, its existance in a livepatch is questionable
>> at best. Until a plausible usecase
>>> On 23.06.17 at 06:22, wrote:
> On Fri, Jun 16, 2017 at 09:09:13AM -0600, Jan Beulich wrote:
> On 24.05.17 at 08:56, wrote:
>>> +{
>>> +pi_cpu = cpumask_cycle(pi_cpu, _online_map);
>>
>>With this, how could the CPU be offline by the time
>>> On 22.06.17 at 20:31, wrote:
> Hi,
>
> On 20/06/17 11:32, Jan Beulich wrote:
> On 20.06.17 at 12:06, wrote:
>>> At 03:36 -0600 on 20 Jun (1497929778), Jan Beulich wrote:
>>> On 20.06.17 at 11:14, wrote:
> At 01:32 -0600 on 20
1 - 100 of 208 matches
Mail list logo