On 07/07/17 20:23, Wengang Wang wrote:
> log a message when we enter this situation:
> 1) we already allocated the max number of available grants from hypervisor
> and
> 2) we still need more (but the request fails because of 1)).
>
> Sometimes the lack of grants causes IO hangs in xen_blkfront
On 11/07/17 21:41, Colin King wrote:
> From: Colin Ian King
>
> Currently a sock_release on map->sock will result in a null pointer
> deference on map when map is null. Instead, the sock_relase sould
> be on sock and not map->sock.
>
> Detected by CoverityScan,
Hi Wei,
Thank you very much for comments. Please see my reply below.
On 7/17/2017 9:16 PM, Wei Liu wrote:
Hi Kai
Thanks for this nice write-up.
Some comments and questions below.
On Sun, Jul 09, 2017 at 08:03:10PM +1200, Kai Huang wrote:
Hi all,
[...]
2. SGX Virtualization Design
2.1
On 7/17/2017 10:54 PM, Roger Pau Monné wrote:
On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote:
On physical machine EPC is exposed in ACPI table via "INT0E0C". Although EPC
can be discovered by CPUID but Windows driver requires EPC to be exposed in
ACPI table as well. This patch
On Tue, Jul 18, 2017 at 08:40:18AM +0100, Roger Pau Monné wrote:
> On Tue, Jul 18, 2017 at 08:53:28AM +0800, Ming Lei wrote:
> > On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote:
> > > On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote:
> > > > On Mon, Jul 17, 2017 at
> -Original Message-
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: 30 June 2017 16:01
> To: xen-de...@lists.xenproject.org
> Cc: boris.ostrov...@oracle.com; julien.gr...@arm.com;
> konrad.w...@oracle.com; Roger Pau Monne ; Jan
> Beulich
Hi
I want test and understand xen hypervisor implementation with dom0 and domU
on omap5 board.
I followed
https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
with latest kernel(4.11.7) and xen(4.9.0) and device tree and but unable to
boot dom0.
xen stop on
On 17/07/17 19:18, Julien Grall wrote:
> "THE REST" maintainers should always be CCed for any modification that
> don't fall under the responsability of a specific component maintainer.
>
> However, the script get_maintainers.pl will remove "THE REST"
> maintainers as soon as one maintainer of a
Dear George John,
On 17.07.17 09:59, George John wrote:
I have a r-car H3 board with Dom0 and two DomU's.
Are you speaking about Salvator-X or H3ULCB?
Do we have to passthrough one of the hdmi ports to the one guest if we
could implement GPU sharing between Dom0 and one DomU in r-car h3
Hi Julien,
On 07/17/2017 05:43 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 06/07/17 12:50, Sergej Proskurin wrote:
>> This commit renames the function vgic_access_guest_memory to
>> access_guest_memory_by_ipa. As the function name suggests, the functions
>> expects an ipa as argument. Thus, to
> -Original Message-
> From: Petre Pircalabu [mailto:ppircal...@bitdefender.com]
> Sent: 17 July 2017 17:47
> To: xen-devel@lists.xen.org
> Cc: rcojoc...@bitdefender.com; ta...@tklengyel.com; Ian Jackson
> ; Wei Liu ; Paul Durrant
>
On Mon, 17 Jul 2017, Juergen Gross wrote:
> Instead of fiddling with masking the event channels during suspend
> and resume handling let do the irq subsystem do its job. It will do
> the mask and unmask operations as needed.
>
> Signed-off-by: Juergen Gross
Acked-by: Thomas
On 07/07/17 20:23, Wengang Wang wrote:
> log a message when we enter this situation:
> 1) we already allocated the max number of available grants from hypervisor
> and
> 2) we still need more (but the request fails because of 1)).
>
> Sometimes the lack of grants causes IO hangs in xen_blkfront
On Tue, Jul 18, 2017 at 08:53:28AM +0800, Ming Lei wrote:
> On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote:
> > On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote:
> > > On Mon, Jul 17, 2017 at 12:20:56PM +0100, Roger Pau Monné wrote:
> > > > seems fairly easy to mess up and
On 26/06/17 18:39, Vitaly Kuznetsov wrote:
> CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests
> BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a
> leftover from ancient times when CPU0 hotplug was impossible, it works
> just fine for HVM.
>
>
This run is configured for baseline tests only.
flight 71698 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71698/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d4f6c35c84b8503bc2acde89a7adb7ee05c56516
baseline
flight 111939 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111939/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR.
vs. 110515
Dear Christopher,
On 14.07.17 00:39, Christopher Lambert wrote:
I would like to test xen on an ARM target with one linux (as dom0) and
one android (as domU).
As I know there were built such setups on Renesas R-Car H2 and H3, and
TI DRA7xx based boards (Lager, Salvator-X and Jacinto6 EVM board
Let there be two domU's - domU (1) and domU (2)
Is there a way domU (1) can find the UUID of domU (2) ?
Please tell.
Thanks.
--
View this message in context:
http://xen.1045712.n5.nabble.com/Is-there-a-way-domU-1-can-find-the-UUID-of-domU-2-tp5737307.html
Sent from the Xen - Dev mailing list
flight 111959 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111959/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 357c48258e0b452d31f487a47dca486ba666a954
baseline version:
ovmf
On 12/07/17 09:25, Dan Carpenter wrote:
> We accidentally dereference "map" when it's NULL.
>
> Fixes: b535e2b9b78a ("xen/pvcalls: implement connect command")
> Signed-off-by: Dan Carpenter
The patch is okay, but the very same one has already been sent before.
I'll
From: Vijaya Kumar K
memnode_shift variable is changed from int to unsigned int.
With this change, compute_memnode_shift() returns error value
instead of returning shift value. The memnode_shift is updated inside
compute_memnode_shift().
Also, following changes are made
From: Vijaya Kumar K
Add accessors for nodes[] and other static variables and
use those accessors. These variables are later accessed
outside the file when the code made generic in later
patches. However the coding style is not changed.
Signed-off-by: Vijaya Kumar K
From: Vijaya Kumar K
Move code from xen/arch/x86/numa.c to xen/common/numa.c
so that it can be used by other archs.
The following changes are done:
- Few generic static functions in x86/numa.c is made
non-static common/numa.c
- The generic contents of header file
flight 71699 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71699/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-amd64-daily-netboot-pygrub 11 guest-start fail REGR. vs. 71679
On Mon, Jul 17, 2017 at 06:19:09PM +0200, Sergej Proskurin wrote:
> Hi Julien,
>
>
> On 07/17/2017 03:53 PM, Julien Grall wrote:
> > (+Wei and Ian)
> >
> > Hi Sergej
> >
> > On 17/07/17 13:04, Sergej Proskurin wrote:
> >> Hi all,
> >>
> >> My setup comprises an ARMv7 (Arndale, Linux kernel
Hi Wei,
Thank you for writing down the document :).
On 17/07/17 16:09, Wei Liu wrote:
It is agreed during the summit we should write down such document. Here
is my attempt of doing so.
We should probably commit something like this into xen.git so that it
gets updated regularly.
Comments are
On Fri, Jul 07, 2017 at 10:00:01AM -0400, Konrad Rzeszutek Wilk wrote:
> >
> > 1. PV PCI passthrough is done via pciback, which means the physical
> >device is assigned to the driver domain. All events to / from the
> >guest / device are handled by the driver domain -- which includes
> >
On Tue, Jul 18, 2017 at 12:21:42PM +0100, Lars Kurth wrote:
> Wei,
> I attached the list output from xsa-list-send starting from 206
> If you look at
> https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-481
> .html, you may want to start using from 213+
[$]> ./match-xsa
Hi,
I am using R-Car H3 hardware. ie. R-Car H3 Salvator-X. I am running Xen with Poky linux as Dom0 and DomU. Would i be able to run Xen with the same setup on R-Car H3 Starter Kit?
What all should i look in a Hardware to run XEN in it?
regards,
Ajeesh
Hi Julien,
After our discussion during the summit, I have revised my plan, but
I'm still working on it and haven't sent it to the ML yet.
I'm planning to send a new version of my proposal together with the
parsing code later so that I could reference the
proposal in the commit message.
But here
From: Oleksandr Grytsov
Add libxl__device_list and libxl__device_list_free
functions to handle device list using the device
framework.
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_device.c | 66
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 12 ++-
tools/libxl/libxl_vtpm.c | 231 +--
tools/xl/xl_vtpm.c | 3 +-
3 files changed, 73
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_device.c | 6 ++---
tools/libxl/libxl_disk.c | 5 +++--
tools/libxl/libxl_internal.h | 52 +++-
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_9pfs.c | 67 +++-
tools/libxl/libxl_create.c | 2 +-
tools/libxl/libxl_internal.h | 7 +
From: Oleksandr Grytsov
Add commands: vdispl-attach, vdispl-list, vdispl-detach
and domain config vdispl parser
Signed-off-by: Oleksandr Grytsov
---
tools/xl/Makefile | 1 +
tools/xl/xl.h | 3 +
tools/xl/xl_cmdtable.c |
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
docs/man/xl.cfg.pod.5.in | 49
docs/man/xl.pod.1.in | 42 +
2 files changed, 91
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_console.c | 74
tools/libxl/libxl_create.c | 3 +-
tools/libxl/libxl_dm.c | 3 +-
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/Makefile | 2 +-
tools/libxl/libxl.h | 24 +++
tools/libxl/libxl_create.c | 1 +
tools/libxl/libxl_internal.h
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_console.c | 79
tools/libxl/libxl_create.c | 5 +--
tools/libxl/libxl_dm.c | 3 +-
On Tue, Jul 18, 2017 at 01:45:45PM +0100, Julien Grall wrote:
> Hi Wei,
>
> Thank you for writing down the document :).
>
> On 17/07/17 16:09, Wei Liu wrote:
> > It is agreed during the summit we should write down such document. Here
> > is my attempt of doing so.
> >
> > We should probably
On 18/07/2017, 14:53, "Wei Liu" wrote:
>On Tue, Jul 18, 2017 at 12:21:42PM +0100, Lars Kurth wrote:
>> Wei,
>> I attached the list output from xsa-list-send starting from 206
>> If you look at
>>
>>https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-4
On 7/18/2017 7:03 AM, Thomas Gleixner wrote:
On Mon, 17 Jul 2017, Tom Lendacky wrote:
This patch series provides support for AMD's new Secure Memory Encryption (SME)
feature.
SME can be used to mark individual pages of memory as encrypted through the
page tables. A page of memory that is
This hypercall is unused by guests these days, but there was no prevention of
usable subops. The following ops have been restricted, as there is no
suitable structure in the evntchn_op union.
EVTCHNOP_reset
EVTCHNOP_init_control
EVTCHNOP_expand_array
EVTCHNOP_set_priority
Signed-off-by:
From: Oleksandr Grytsov
Changes since V3:
* libxl__device_add renamed to libxl__device_add_async and reworked
to match the former design;
* libxl__device_add used for devices which don't require updating domain
config but simple write to Xen Store (9pfs,
From: Oleksandr Grytsov
Add libxl__device_add to simple write XenStore device conifg
and libxl__device_add_async to update domain configuration
and write XenStore device config asynchroniously.
Almost all devices have similar libxl__device__add function.
This
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 9 +-
tools/libxl/libxl_checkpoint_device.c | 9 +-
tools/libxl/libxl_colo_save.c | 4 +-
tools/libxl/libxl_dm.c
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 9 +++-
tools/libxl/libxl_checkpoint_device.c | 7 ++-
tools/libxl/libxl_create.c| 3 +-
tools/libxl/libxl_disk.c
From: Oleksandr Grytsov
Due to changes in device framework setdefault function
should have same format. Otherwise calling devicetype
set_default causes segfault.
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_internal.h | 1 -
If case of a vm_event with the emulate_flags set, if the instruction
cannot be emulated, the monitor should be notified instead of directly
injecting a hw exception.
This behavior can be used to re-execute an instruction not supported by
the emulator using the real processor (e.g. altp2m) instead
Hi Bhupinder,
Sorry I am jumping a bit late in the discussion here.
On 17/07/17 14:06, Bhupinder Thakur wrote:
An option is provided in libxl to enable/disable sbsa vuart while
s/sbsa/SBSA/
creating a guest domain.
Libxl now suppots a generic vuart console and sbsa uart is a specific
On 18/07/17 10:37, Petre Pircalabu wrote:
> If case of a vm_event with the emulate_flags set, if the instruction
> cannot be emulated, the monitor should be notified instead of directly
> injecting a hw exception.
> This behavior can be used to re-execute an instruction not supported by
> the
On 07/18/2017 01:09 PM, Andrew Cooper wrote:
> On 18/07/17 10:37, Petre Pircalabu wrote:
>> If case of a vm_event with the emulate_flags set, if the instruction
>> cannot be emulated, the monitor should be notified instead of directly
>> injecting a hw exception.
>> This behavior can be used to
On 18/07/17 09:42, Sergej Proskurin wrote:
Hi Julien,
On 07/17/2017 05:43 PM, Julien Grall wrote:
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit renames the function vgic_access_guest_memory to
access_guest_memory_by_ipa. As the function name suggests, the functions
On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote:
>
> +static int inject_lmce(xc_interface *xc_handle, unsigned int cpu)
> +{
> +uint8_t *cpumap = NULL;
> +size_t cpumap_size, line, shift;
> +unsigned int nr_cpus;
> +int ret;
> +
> +nr_cpus =
The new function finds all np2m objects with the specified eptp and
flushes them. p2m_flush_table_locked() is added in order not to release
the p2m lock after np2m_base check.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/p2m.c | 34
The new function returns still write-locked np2m.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/p2m.c | 12 +---
xen/include/asm-x86/p2m.h | 2 ++
2 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/mm/p2m.c
Add np2m_generation variable to both p2m_domain and nestedvcpu.
np2m's generation will be incremented each time the np2m is flushed.
This will allow to detect if a nested vcpu has the stale np2m.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/hvm/nestedhvm.c | 1 +
1. Add a helper function assign_np2m()
2. Remove useless volatile
3. Update function's comment in the header
4. Minor style fixes ('\n' and d)
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/p2m.c | 31 ++-
xen/include/asm-x86/p2m.h |
This commit substitutes the direct access of the host's p2m
(>arch.p2m) for the macro "p2m_get_hostp2m". This macro simplifies
readability and also the differentiation between the host's p2m and
alternative p2m's, i.e., as part of the altp2m subsystem that will be
submitted in the future.
There is a possibility for nested_p2m to became stale between
nestedhvm_hap_nested_page_fault() and nestedhap_fix_p2m(). Simply
use p2m_get_nestedp2m_lock() to guarantee that correct np2m is used.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/hap/nested_hap.c | 29
nvmx_handle_invept() updates current's np2m just to flush it. Instead,
use the new np2m_flush_eptp() directly for this purpose.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/hvm/vmx/vvmx.c | 7 +--
1 file changed, 1 insertion(+), 6 deletions(-)
diff --git
Remove np2m_base parameter as it should always match the value of
EPTP in VMCS12.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/hvm/svm/nestedsvm.c | 2 +-
xen/arch/x86/hvm/vmx/vvmx.c | 3 +--
xen/arch/x86/mm/hap/nested_hap.c | 2 +-
xen/arch/x86/mm/p2m.c
Nested p2m (shadow EPT) is an object that stores memory address
translations from L2 GPA directly to L0 HPA. This is achieved by
combining together L1 EPT tables with L0 EPT during L2 EPT violations.
In the usual case, L1 uses the same EPTP value in VMCS12 for all vCPUs
of a L2 guest. But
np2m maintenance is required for a nested vcpu during scheduling:
1. On schedule-out: clear pCPU's bit in p2m->dirty_cpumask
to prevent useless IPIs.
2. On schedule-in: check if np2m is up to date and wasn't flushed.
Signed-off-by: Sergey Dyasli
The new variable will indicate if update of a shadow EPTP is needed
prior to vmentry. Update is required if a nested vcpu gets a new np2m
or if its np2m was flushed by an IPI.
Helper function nvcpu_flush() is added.
Signed-off-by: Sergey Dyasli
---
On 18/07/17 10:49, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 07/17/2017 05:38 PM, Julien Grall wrote:
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit moves the function vgic_access_guest_memory to guestcopy.c
and the header asm/guest_access.h. No functional
Now that np2m sharing is implemented, there can be only one np2m object
with the same np2m_base. Break from loop if the required np2m was found
during np2m_flush_eptp().
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/p2m.c | 3 +++
xen/include/asm-x86/p2m.h | 2
Now there is no need to update shadow EPTP after handling L2 EPT
violation since all EPTP updates are handled by nvmx_eptp_update().
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/hvm/vmx/vmx.c | 6 --
1 file changed, 6 deletions(-)
diff --git
A small correction
> On 18 Jul 2017, at 11:37, Lars Kurth wrote:
>
> ...
> b) The alternative would be for the security team to fix issues in private
> and bundle as we already do and pre-disclose 2 weeks before a fixed monthly
> embargo date. The effect would be
Hi,
I am trying to learn how Passthrough works in xen. As an initial step I have tried to do PCI passthrough in my PC with Ubuntu 16.04 LTS (Xenial Xerus) as Dom0 and DomU. For that I had to rebuild the kernel to add xen support and with the procedure explained in,
On Tue, Jul 18, 2017 at 04:43:53PM +0530, ajmalmalib4u wrote:
>Hi,
>
>I am trying to learn how Passthrough works in xen. As an initial step I
>have tried to do PCI passthrough in my PC with Ubuntu 16.04 LTS (Xenial
>Xerus) as Dom0 and DomU. For that I had to rebuild the kernel
On Mon, Jul 17, 2017 at 06:36:41PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_init function. This function
> initializes the console structure.
>
> Signed-off-by: Bhupinder Thakur
I don't think this patch compiles, because ...
> ---
> CC:
This run is configured for baseline tests only.
flight 71697 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71697/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 20
> -Original Message-
> From: Petre Pircalabu [mailto:ppircal...@bitdefender.com]
> Sent: 18 July 2017 10:38
> To: xen-devel@lists.xen.org
> Cc: rcojoc...@bitdefender.com; ta...@tklengyel.com; Ian Jackson
> ; Wei Liu ; Paul Durrant
>
On 09/07/17 09:04, Kai Huang wrote:
> Expose SGX in CPU featureset for HVM domain. SGX will not be supported for
> PV domain, as ENCLS (which SGX driver in guest essentially runs) must run
> in ring 0, while PV kernel runs in ring 3. Theoretically we can support SGX
> in PV domain via either
On Tue, Jul 18, 2017 at 08:36:15PM +1200, Huang, Kai wrote:
>
>
> On 7/17/2017 10:54 PM, Roger Pau Monné wrote:
> > On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote:
> > > On physical machine EPC is exposed in ACPI table via "INT0E0C". Although
> > > EPC
> > > can be discovered by
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl
testid guest-localmigrate
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu
This run is configured for baseline tests only.
flight 71700 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71700/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 15
Dear Christopher,
On 18.07.17 12:08, Andrii Anisov wrote:
In order to build the required system, a board candidate should:
- have a CPU able to switch to EL2/Virtualization mode
- have a public bootloader sources able to switch CPU to
EL2/Virtualizaiotn mode
- have a Linux system
Dear Shishir,
On 18.07.17 12:05, shishir tiwari wrote:
Hi
I want test and understand xen hypervisor implementation with dom0 and
domU on omap5 board.
I followed
https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
with latest kernel(4.11.7) and xen(4.9.0)
Hi all,
on the following topic in session http://sched.co/AjHl we discussed the
following issues
Here are my notes
ACTIONS for
* Julien Grall/Stefano Stabellini
* Andrew Cooper
* Ian Jackson
* Lars Kurth
* Security team members
Regards
Lars
= Consolidate Security Coverage Documents for CNA =
flight 111973 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111973/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5fc3889bb3c64f8cd81d7d387f829f146a1998fd
baseline version:
ovmf
Hi Bhupinder,
Sorry I am jumping a bit late in the discussion here.
On 17/07/17 14:06, Bhupinder Thakur wrote:
1. Update documentation for a new vuart option added.
2. Update documentation about SPI irq reserved for vuart.
Signed-off-by: Bhupinder Thakur
I added Jan because I think we should probably add a section for point
releases, which I assume would be a subset of the steps in this document
Lars
I will post the notes of the design session also. I am doing the ones
first that I moderated and where I took notes in handwriting and/or photos
of
Hi Julien,
On 07/17/2017 05:38 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 06/07/17 12:50, Sergej Proskurin wrote:
>> This commit moves the function vgic_access_guest_memory to guestcopy.c
>> and the header asm/guest_access.h. No functional changes are made.
>> Please note that the function will
On Tue, Jul 18, 2017 at 12:37:32PM +0300, Petre Pircalabu wrote:
> If case of a vm_event with the emulate_flags set, if the instruction
> cannot be emulated, the monitor should be notified instead of directly
> injecting a hw exception.
> This behavior can be used to re-execute an instruction not
On Tue, Jul 18, 2017 at 11:33:04AM +0100, Wei Liu wrote:
> On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote:
> >
> > +static int inject_lmce(xc_interface *xc_handle, unsigned int cpu)
> > +{
> > +uint8_t *cpumap = NULL;
> > +size_t cpumap_size, line, shift;
> > +
Modify p2m_get_nestedp2m() to allow sharing a np2m between multiple
vcpus with the same np2m_base (L1 EPTP value in VMCS12).
np2m_schedule_in/out() callbacks are added to context_switch() as well
as pseudo schedule-out is performed during virtual_vmexit().
Signed-off-by: Sergey Dyasli
Hi Bhupinder,
On 17/07/17 14:06, Bhupinder Thakur wrote:
The SBSA UART node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and
Commit-ID: f2f931c6819467af5260a21c59fb787ce2863f92
Gitweb: http://git.kernel.org/tip/f2f931c6819467af5260a21c59fb787ce2863f92
Author: Tom Lendacky
AuthorDate: Mon, 17 Jul 2017 16:10:29 -0500
Committer: Ingo Molnar
CommitDate: Tue, 18 Jul 2017
Wei,
I attached the list output from xsa-list-send starting from 206
If you look at
https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-481
.html, you may want to start using from 213+
Lars
On 17/07/2017, 12:40, "Wei Liu" wrote:
>On Mon, Jul 17, 2017 at
CC x86 maintainers
On Tue, Jul 18, 2017 at 12:19:19PM +0100, Julien Grall wrote:
> >
> > ("arch_arm", Struct(None, [("gic_version", libxl_gic_version),
> > + ("vuart", libxl_vuart_type),
>
> ... here it is ARM specific. I am not convinced that we should tie
Hi Julien,
On 07/18/2017 12:43 PM, Julien Grall wrote:
>
>
> On 18/07/17 10:49, Sergej Proskurin wrote:
>> Hi Julien,
>
> Hello Sergej,
>
>>
>> On 07/17/2017 05:38 PM, Julien Grall wrote:
>>> Hi Sergej,
>>>
>>> On 06/07/17 12:50, Sergej Proskurin wrote:
This commit moves the function
Wei Liu writes ("A document for Xen release management"):
> When you think all pending issues are fixed and Xen is ready to be released
> from the last RC:
Mostly LGTM. Thanks!
[Items numbered in quoted text so I can refer to them.]
> 1. Send out commit moratorium emails to committers@.
>
>
On 18/07/17 12:59, Sergej Proskurin wrote:
Hi Julien,
On 07/18/2017 12:43 PM, Julien Grall wrote:
On 18/07/17 10:49, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 07/17/2017 05:38 PM, Julien Grall wrote:
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit
Hi all,
these are my notes from http://sched.co/AjES
These are a little crude and I may have missed some things or misrepresented
ACTIONS for
* Wei Liu
* Julien Grall
* Lars Kurth
* Ian Jackson
Feel free to correct
Lars
Releases Lessons learned
Process issues in 4.9.0
On Mon, Jul 17, 2017 at 06:36:50PM +0530, Bhupinder Thakur wrote:
> This patch introduces a console_close_evtchn console_cleanup function. This
> function
> closes the console event channel.
>
> Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
On Mon, Jul 17, 2017 at 06:36:48PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_cleanup function. This function
> frees up the console resources.
>
> Signed-off-by: Bhupinder Thakur
> ---
> CC: Ian Jackson
> CC: Wei
On Mon, Jul 17, 2017 at 06:36:52PM +0530, Bhupinder Thakur wrote:
> This patch finally adds the support for vuart console. It adds
> two new fields in the console initialization:
>
> - optional
> - prefer_gnttab
>
> optional flag tells whether the console is optional.
>
> prefer_gnttab tells
1 - 100 of 260 matches
Mail list logo