flight 109337 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109337/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8bb61740d47b0788bc313f113cbad4a78b55101e
baseline version:
ovmf
Thanks for pointing out, Yi. Our names may be confusing. :-)
And yes, I will have a discussion session on 5 level paging enabling with
Juergen.
B.R.
Yu
> -Original Message-
> From: Yi Sun [mailto:yi.y@linux.intel.com]
> Sent: Friday, May 12, 2017 10:25 AM
> To: Lars Kurth
> Cc:
flight 109317 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109317/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358
Tests which are
Hi, Lars,
Thank you very much! One correction below.
On 17-05-11 18:17:41, Lars Kurth wrote:
> Hi everyone,
>
> I added the following sessions to the Design Part of the Summit: you can see
> them via
>
flight 109315 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109315/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 6 xen-boot fail REGR. vs. 59254
From: Vitaly Kuznetsov
Date: Thu, 11 May 2017 13:58:06 +0200
> Unavoidable crashes in netfront_resume() and netback_changed() after a
> previous fail in talk_to_netback() (e.g. when we fail to read MAC from
> xenstore) were discovered. The failure path in talk_to_netback()
flight 109327 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109327/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf 88454e5ece8fc9caa23a2fd377e7dd0fb1043499
baseline version:
xtf
flight 109322 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109322/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 5 xen-buildfail REGR. vs. 107636
build-arm64
Hi
I gather that with 4.9, UEFI secure boot of Xen should be possible.
Is this true?
If so, what are the options for utilizing UEFI secure boot? Do I need a
MSFT-signed shim or grub? Any special changes required for Xen kernel
(signing?) or has that been done?
Thanks
-Bill
flight 109320 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109320/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf 4e9d243198312a5052725b5380e456a171391de9
baseline version:
xtf
flight 109309 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109309/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 17 guest-start/win.repeat fail REGR.
vs. 109136
On 04/05/17 22:33, Mohit Gambhir wrote:
> This patch tests VPMU functionality in the hypervisor on Intel machines.
> The tests write to all valid bits in the MSRs that get exposed to the guests
> when VPMU is enabled. The tests also write invalid values to the bits
> that should be masked and
On Thu, May 11, 2017 at 9:06 PM, Julien Grall wrote:
> Hi Oleksandr,
Hi Julien
>
>
> On 11/05/17 15:00, Oleksandr Tyshchenko wrote:
>>
>> On Thu, May 11, 2017 at 2:38 PM, Julien Grall
>> wrote:
>>>
>>> Hi Oleksandr,
>>
>> Hi, Julien
>>
>>>
>>> On
Stefano,
>> We, here at EPAM, viewed EL0 apps primarily as a way to extend
>> hypervisor. Because when it comes to embedded and automotive, there
>> arise some ugly things, that are needed at hypervisor level:
>> TEE mediators (OP-TEE is a good TEE, but for example there is TI's
>> MSHIELD with
Hi Andre,
On 11/05/17 18:53, Andre Przywara wrote:
diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
index bd974fb..033dcee 100644
--- a/xen/include/public/arch-arm.h
+++ b/xen/include/public/arch-arm.h
@@ -400,6 +400,10 @@ typedef uint64_t xen_callback_t;
#define
Hi,
On 11/05/17 18:53, Andre Przywara wrote:
The code can also be found on the its/v9 branch here:
git://linux-arm.org/xen-ap.git
http://www.linux-arm.org/git?p=xen-ap.git;a=shortlog;h=refs/heads/its/v9
This branch does not exist :/
Cheers,
--
Julien Grall
Ian:
Just a quick question regarding the table below in xen/arch/arm/p2m.c
@@ -1479,7 +1487,7 @@ void __init setup_virt_paging(void)
[0] = { 32, 32/*32*/, 0, 1 },
[1] = { 36, 28/*28*/, 0, 1 },
[2] = { 40, 24/*24*/, 1, 1 },
-
Hi All,
I am working with latest xen code base ( Unstable branch ). Tried with
no changes / commit from my end, and was facing the hang issue while
running xl list command. I tried doing make world and installing the
packages, but still the problem persists. There we not any specific
logs in xl
On Thu, May 11, 2017 at 8:58 PM, Julien Grall wrote:
>
>
> On 11/05/17 15:38, Oleksandr Tyshchenko wrote:
>>
>> On Thu, May 11, 2017 at 2:28 PM, Julien Grall
>> wrote:
>>>
>>> Hi Oleksandr,
>>
>> Hi Julien
>
>
> Hi Oleksandr,
>
>
>>>
>>> On 10/05/17
On 11/05/17 19:19, Oleksandr Tyshchenko wrote:
On Thu, May 11, 2017 at 9:07 PM, Julien Grall wrote:
This property is used to translate an RID into a Master ID (see the
documentation in bindings/pci/pci-iommu.txt).
So, these two should be skipped too:
- iommu-map
-
On Thu, May 11, 2017 at 9:07 PM, Julien Grall wrote:
>
>
> On 11/05/17 15:15, Oleksandr Tyshchenko wrote:
>>
>> On Thu, May 11, 2017 at 2:58 PM, Julien Grall
>> wrote:
>>>
>>> Hi Oleksandr,
>>
>> Hi Julien
>
>
> Hi,
>
>
>>>
>>> On 10/05/17 15:03,
This run is configured for baseline tests only.
flight 71291 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71291/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17
George,
On 11 May 2017 at 20:14, George Dunlap wrote:
>>> We, here at EPAM, viewed EL0 apps primarily as a way to extend
>>> hypervisor. Because when it comes to embedded and automotive, there
>>> arise some ugly things, that are needed at hypervisor level:
>>> TEE
On 11/05/17 15:15, Oleksandr Tyshchenko wrote:
On Thu, May 11, 2017 at 2:58 PM, Julien Grall wrote:
Hi Oleksandr,
Hi Julien
Hi,
On 10/05/17 15:03, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
We don't passthrough IOMMU
Hi Oleksandr,
On 11/05/17 15:00, Oleksandr Tyshchenko wrote:
On Thu, May 11, 2017 at 2:38 PM, Julien Grall wrote:
Hi Oleksandr,
Hi, Julien
On 10/05/17 15:03, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
The
On 11/05/17 16:19, Volodymyr Babchuk wrote:
> Hi Stefano,
>
> On 10 May 2017 at 21:24, Stefano Stabellini wrote:
> > I just want to point out that the comparision with tasklets is not
> > helpful. Tasklets involve the idle vcpu, which we are trying to step away
> > from
On 11/05/17 15:38, Oleksandr Tyshchenko wrote:
On Thu, May 11, 2017 at 2:28 PM, Julien Grall wrote:
Hi Oleksandr,
Hi Julien
Hi Oleksandr,
On 10/05/17 15:03, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Not every
> On 11 May 2017, at 18:20, George Dunlap wrote:
>
> On Thu, May 11, 2017 at 6:14 PM, Volodymyr Babchuk
> wrote:
>> Hi George,
>>
>> On 11 May 2017 at 19:35, George Dunlap wrote:
>>> Even better would be to skip the
Hi Julien,
On 10/05/17 18:17, Julien Grall wrote:
>
>
> On 05/10/2017 06:14 PM, Andre Przywara wrote:
>> Hi,
>>
>> On 10/05/17 12:07, Julien Grall wrote:
>>>
>>>
>>> On 05/10/2017 11:47 AM, Andre Przywara wrote:
Hi,
>>>
>>> Hi Andre,
>>>
On 12/04/17 11:44, Julien Grall wrote:
> On
For LPIs we later want to dynamically allocate struct pending_irqs.
So beside needing to initialize the struct from there we also need
to clean it up and re-initialize it later on.
Export vgic_init_pending_irq() and extend it to be reusable.
Signed-off-by: Andre Przywara
The MAPC command associates a given collection ID with a given
redistributor, thus mapping collections to VCPUs.
We just store the vcpu_id in the collection table for that.
Signed-off-by: Andre Przywara
---
xen/arch/arm/vgic-v3-its.c | 47
The DISCARD command drops the connection between a DeviceID/EventID
and an LPI/collection pair.
We mark the respective structure entries as not allocated and make
sure that any queued IRQs are removed.
Signed-off-by: Andre Przywara
---
xen/arch/arm/vgic-v3-its.c | 24
Allow a guest to provide the address and size for the memory regions
it has reserved for the GICv3 pending and property tables.
We sanitise the various fields of the respective redistributor
registers.
The MMIO read and write accesses are protected by locks, to avoid any
changing of the property
Hi,
On 12/04/17 14:13, Julien Grall wrote:
>
>
> On 12/04/17 14:12, Andre Przywara wrote:
>> Hi,
>
> Hi,
>
>>
>> On 12/04/17 11:55, Julien Grall wrote:
>>> Hi Andre,
>>>
>>> On 12/04/17 01:44, Andre Przywara wrote:
Allow a guest to provide the address and size for the memory regions
Hi,
this is a reworked version, addressing comments on v8.
After some discussions we came to the conclusion that for properly addressing
all the issues we found we need some more serious rework of the VGIC:
* Protecting a struct pending_irq with the VGIC VCPU lock will not be
sufficient, instead
The MAPD command maps a device by associating a memory region for
storing ITEs with a certain device ID. Since it features a valid bit,
MAPD also covers the "unmap" functionality, which we also cover here.
We store the given guest physical address in the device table, and, if
this command comes
For LPIs the struct pending_irq's are dynamically allocated and the
pointers will be stored in a radix tree. Since an LPI can be "unmapped"
at any time, teach the VGIC how to deal with irq_to_pending() returning
a NULL pointer.
We just do nothing in this case or clean up the LR if the virtual LPI
So far irq_to_pending() is just a convenience function to lookup
statically allocated arrays. This will change with LPIs, which are
more dynamic.
The proper answer to the issue of preventing stale pointers is
ref-counting, which requires more rework and will be introduced with
a later rework.
For
The target CPU for an LPI is encoded in the interrupt translation table
entry, so can't be easily derived from just an LPI number (short of
walking *all* tables and find the matching LPI).
To avoid this in case we need to know the VCPU (for the INVALL command,
for instance), put the VCPU ID in the
For each hardware ITS create and initialize a virtual ITS for Dom0.
We use the same memory mapped address to keep the doorbell working.
This introduces a function to initialize a virtual ITS.
We maintain a list of virtual ITSes, at the moment for the only
purpose of later being able to free them
The INT command sets a given LPI identified by a DeviceID/EventID pair
as pending and thus triggers it to be injected.
Signed-off-by: Andre Przywara
---
xen/arch/arm/vgic-v3-its.c | 21 +
1 file changed, 21 insertions(+)
diff --git
The INV command instructs the ITS to update the configuration data for
a given LPI by re-reading its entry from the property table.
We don't need to care so much about the priority value, but enabling
or disabling an LPI has some effect: We remove or push virtual LPIs
to their VCPUs, also check
The MAPTI commands associates a DeviceID/EventID pair with a LPI/CPU
pair and actually instantiates LPI interrupts.
We connect the already allocated host LPI to this virtual LPI, so that
any triggering LPI on the host can be quickly forwarded to a guest.
Beside entering the VCPU and the virtual
Now that the host part of the ITS code is in place, we can enable the
ITS and also LPIs on each redistributor to get the show rolling.
At this point there would be no LPIs mapped, as guests don't know about
the ITS yet.
Signed-off-by: Andre Przywara
Acked-by: Stefano
Increase the count of MMIO regions needed by one for each ITS Dom0 has
to emulate. We emulate the ITSes 1:1 from the hardware, so the number
is the number of host ITSes.
Signed-off-by: Andre Przywara
---
xen/arch/arm/vgic-v3-its.c | 15 +++
When LPIs get unmapped by a guest, they might still be in some LR of
some VCPU. Nevertheless we remove the corresponding pending_irq
(possibly freeing it), and detect this case (irq_to_pending() returns
NULL) when the LR gets cleaned up later.
However a *new* LPI may get mapped with the same
For the same reason that allocating a struct irq_desc for each
possible LPI is not an option, having a struct pending_irq for each LPI
is also not feasible. We only care about mapped LPIs, so we can get away
with having struct pending_irq's only for them.
Maintain a radix tree per domain where we
For each device we allocate one struct pending_irq for each virtual
event (MSI).
Provide a helper function which returns the pointer to the appropriate
struct, to be able to find the right struct when given a virtual
deviceID/eventID pair.
Signed-off-by: Andre Przywara
The ITS stores the target (v)CPU and the (virtual) LPI number in tables.
Introduce functions to walk those tables and translate an device ID -
event ID pair into a pair of virtual LPI and vCPU.
We map those tables on demand - which is cheap on arm64 - and copy the
respective entries before using
The INVALL command instructs an ITS to invalidate the configuration
data for all LPIs associated with a given redistributor (read: VCPU).
This is nasty to emulate exactly with our architecture, so we just
iterate over all mapped LPIs and filter for those from that particular
VCPU.
Signed-off-by:
Dom0 expects all ITSes in the system to be propagated to be able to
use MSIs.
Create Dom0 DT nodes for each hardware ITS, keeping the register frame
address the same, as the doorbell address that the Dom0 drivers program
into the BARs has to match the hardware.
Signed-off-by: Andre Przywara
The MOVI command moves the interrupt affinity from one redistributor
(read: VCPU) to another.
For now migration of "live" LPIs is not yet implemented, but we store
the changed affinity in the host LPI structure and in our virtual ITTE.
Signed-off-by: Andre Przywara
---
This introduces the ITS command handler for the CLEAR command, which
clears the pending state of an LPI.
This removes a not-yet injected, but already queued IRQ from a VCPU.
As read_itte() is now eventually used, we add the static keyword.
Signed-off-by: Andre Przywara
Emulate the memory mapped ITS registers and provide a stub to introduce
the ITS command handling framework (but without actually emulating any
commands at this time).
This fixes a misnomer in our virtual ITS structure, where the spec is
confusingly using ID_bits in GITS_TYPER to denote the number
From: Vijaya Kumar K
This function allows to copy a chunk of data from and to guest physical
memory. It looks up the associated page from the guest's p2m tree
and maps this page temporarily for the time of the access.
This function was originally written by
To let a guest know about the availability of virtual LPIs, set the
respective bits in the virtual GIC registers and let a guest control
the LPI enable bit.
Only report the LPI capability if the host has initialized at least
one ITS.
This removes a "TBD" comment, as we now populate the processor
Hi Wei,
On 11/05/17 13:57, Wei Liu wrote:
That function can return a whole slew of error codes. Translate them
to EXIT_FAILURE.
Signed-off-by: Wei Liu
Release-acked-by: Julien Grall
Cheers,
---
Cc: Ian Jackson
Cc:
Upon receiving an LPI on the host, we need to find the right VCPU and
virtual IRQ number to get this IRQ injected.
Iterate our two-level LPI table to find this information quickly when
the host takes an LPI. Call the existing injection function to let the
GIC emulation deal with this interrupt.
The host supports a certain number of LPI identifiers, as stored in
the GICD_TYPER register.
Store this number from the hardware register in vgic_v3_hw to allow
injecting the very same number into a guest (Dom0).
DomUs get a fixed limited number for now. We may want to revisit this
when we get
vgic_reg64_check_access() checks for a valid access width of a 64-bit
MMIO register, which is useful beyond the current GICv3 emulation only.
Move this function to the vgic-emul.h to be easily reusable.
Signed-off-by: Andre Przywara
Acked-by: Julien Grall
Hi Wei,
On 11/05/17 17:30, Wei Liu wrote:
On Thu, May 11, 2017 at 10:29:42AM -0600, Charles Arnold wrote:
The Requires line in this config file uses the wrong names for two dependencies.
The package config file for xenctrl is called 'xencontrol' and for blktapctl is
called 'xenblktapctl'.
Hi,
On 11/05/17 12:12, Jan Beulich wrote:
On 12.05.17 at 04:42, wrote:
Commit 6d774a951696 ("x86/ioreq server: synchronously reset outstanding
p2m_ioreq_server entries when an ioreq server unmaps") introduced
p2m_finish_type_change(), which was meant to synchronously
On 11/05/17 15:22, Rapidash wrote:
> Greetings,
> My co-worker and I are looking into Xen Hypervisor. By any chance, do
> you or any of your colleagues have technical material/ papers/
> presentations detailing how the hypercall interacts with the hypervisor?
The patch contains the updated version of rbtree implementation from linux
kernel tree containing the fixes so far handled.
Signed-off-by: Praveen Kumar
---
xen/common/rbtree.c| 748 +
xen/include/xen/compiler.h
On Thu, May 11, 2017 at 6:14 PM, Volodymyr Babchuk
wrote:
> Hi George,
>
> On 11 May 2017 at 19:35, George Dunlap wrote:
>> Even better would be to skip the module-loading step entirely, and just
>> compile proprietary code directly into your Xen
Hi everyone,
I added the following sessions to the Design Part of the Summit: you can see
them via
https://xendeveloperanddesignsummit2017.sched.com/overview/type/Interactive+Design+%26+Problem+Solving+Session
(just showing Design sessions)
Please also make use of the "Add to my Sched(ule)"
On Thu, May 11, 2017 at 6:14 PM, George Dunlap wrote:
> yourself at a risk of meeting a guy like Patrick McHardy[1], a private
> individual with copyright on the Linux kernel
This should be "copyright on *code in the* Linux Kernel". Obviously
he doesn't own a copyright
Hi George,
On 11 May 2017 at 19:35, George Dunlap wrote:
> Even better would be to skip the module-loading step entirely, and just
> compile proprietary code directly into your Xen binary.
>
> Both solutions, unfortunately, are illegal.*
Look, I don't saying we want to
On 11/05/17 16:35, Julien Grall wrote:
> Renaming the subject + adding more people in the conversation as this is
> not related to only ARM anymore.
>
> On 11/05/17 16:19, Volodymyr Babchuk wrote:
>> Hi Stefano,
>>
>> On 10 May 2017 at 21:24, Stefano Stabellini
>> wrote:
Otherwise a logdirty client can race with observing the page becoming dirty,
and copy the frame before the write is complete and end up with a stale
version.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Julien Grall
On 05/11/2017 11:48 AM, Dario Faggioli wrote:
> On Thu, 2017-05-11 at 10:19 -0400, Boris Ostrovsky wrote:
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index 90e2b1f..a5f62b5 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -118,7 +118,8 @@
flight 109316 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109316/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f4ac4354652b2bcf4f138b5ebd79b2f07710d4ef
baseline version:
ovmf
On 11/05/17 16:35, Julien Grall wrote:
> On 11/05/17 16:19, Volodymyr Babchuk wrote:
>> Hi Stefano,
>>
>> On 10 May 2017 at 21:24, Stefano Stabellini
>> wrote:
>>> I just want to point out that the comparision with tasklets is not
>>> helpful. Tasklets involve the idle
On Thu, May 11, 2017 at 10:29:42AM -0600, Charles Arnold wrote:
> The Requires line in this config file uses the wrong names for two
> dependencies.
>
> The package config file for xenctrl is called 'xencontrol' and for blktapctl
> is
> called 'xenblktapctl'. Running a command like 'pkg-config
The Requires line in this config file uses the wrong names for two dependencies.
The package config file for xenctrl is called 'xencontrol' and for blktapctl is
called 'xenblktapctl'. Running a command like 'pkg-config --exists xenlight'
will
fail without this fix.
Signed-off-by: Charles Arnold
Wei Liu writes ("[PATCH for-4.9] xl: don't ignore return value from
libxl_device_events_handler"):
> That function can return a whole slew of error codes. Translate them
> to EXIT_FAILURE.
Acked-by: Ian Jackson
___
flight 109310 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109310/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 5 xen-buildfail REGR. vs. 107636
build-arm64
On Thu, 2017-05-11 at 10:19 -0400, Boris Ostrovsky wrote:
> > > diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
> > > index 90e2b1f..a5f62b5 100644
> > > --- a/xen/arch/x86/domain.c
> > > +++ b/xen/arch/x86/domain.c
> > > @@ -118,7 +118,8 @@ static void idle_loop(void)
> > > {
> >
This run is configured for baseline tests only.
flight 71289 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71289/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-libvirt 5 libvirt-build
Renaming the subject + adding more people in the conversation as this is
not related to only ARM anymore.
On 11/05/17 16:19, Volodymyr Babchuk wrote:
Hi Stefano,
On 10 May 2017 at 21:24, Stefano Stabellini wrote:
I just want to point out that the comparision with
Add null check before calling xen_blkif_put() to avoid potential
null pointer dereference.
Addresses-Coverity-ID: 1350942
Cc: Juergen Gross
Signed-off-by: Gustavo A. R. Silva
---
drivers/block/xen-blkback/xenbus.c | 8 +---
1 file changed, 5
Hi Stefano,
On 10 May 2017 at 21:24, Stefano Stabellini wrote:
> I just want to point out that the comparision with tasklets is not
> helpful. Tasklets involve the idle vcpu, which we are trying to step away
> from because it increases irq latency. Tasklets don't provide
Hi Juergen,
Quoting Juergen Gross :
On 10/05/17 18:49, Gustavo A. R. Silva wrote:
Hello everybody,
While looking into Coverity ID 1350942 I ran into the following piece of
code at drivers/block/xen-blkback/xenbus.c:490:
490static int xen_blkbk_remove(struct xenbus_device
flight 109301 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109301/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 109246
test-armhf-armhf-libvirt 13
Ian Jackson writes ("Proposal to drop Windows XP tests from Xen Project CI"):
> Recently, the tests of Windows XP SP3 that are run by osstest, as part
> of the Xen Project's test suite, have started failing a lot more.
>
> It is not clear what has caused this. The failures are causing
>
On Thu, May 11, 2017 at 2:28 PM, Julien Grall wrote:
> Hi Oleksandr,
Hi Julien
>
> On 10/05/17 15:03, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Not every integrated into ARM SoCs IOMMU can share page tables
>> with
Greetings,
My co-worker and I are looking into Xen Hypervisor. By any chance, do you or
any of your colleagues have technical material/ papers/ presentations detailing
how the hypercall interacts with the hypervisor?
Thank you in advance for any assistance,
- Rapidash
Some specific questions:
Hi Vladimir,
On 11 May 2017 at 06:01, Vladimir 'phcoder' Serbinenko
wrote:
>
>
> On Tue, May 9, 2017, 11:02 Fu Wei wrote:
>>
>> Hi Vladimir
>>
>> On 9 May 2017 at 14:59, Vladimir 'phcoder' Serbinenko
>> wrote:
>> >
>> >
>> > Le Tue, May
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Boris Ostrovsky
commit 84d582d236dc1f9085e741affc72e9ba061a67c2 upstream.
Recent discussion (http://marc.info/?l=xen-devel=149192184523741)
established that commit
>> diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
>> index 90e2b1f..a5f62b5 100644
>> --- a/xen/arch/x86/domain.c
>> +++ b/xen/arch/x86/domain.c
>> @@ -118,7 +118,8 @@ static void idle_loop(void)
>> {
>> if ( cpu_is_offline(smp_processor_id()) )
>>
On Thu, May 11, 2017 at 2:24 PM, Julien Grall wrote:
> Hi Oleksandr,
Hi Julien
>
> On 10/05/17 15:03, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Update IOMMU mapping if the IOMMU doesn't share page table with the CPU.
4.10-stable review patch. If anyone has any objections, please let me know.
--
From: Boris Ostrovsky
commit 84d582d236dc1f9085e741affc72e9ba061a67c2 upstream.
Recent discussion (http://marc.info/?l=xen-devel=149192184523741)
established that commit
On Thu, May 11, 2017 at 2:58 PM, Julien Grall wrote:
> Hi Oleksandr,
Hi Julien
>
> On 10/05/17 15:03, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> We don't passthrough IOMMU device to DOM0 even if it is not used by
>>
On Thu, May 11, 2017 at 01:57:19PM +0100, Wei Liu wrote:
> That function can return a whole slew of error codes. Translate them
> to EXIT_FAILURE.
>
> Signed-off-by: Wei Liu
Acked-by: Roger Pau Monné
___
4.11-stable review patch. If anyone has any objections, please let me know.
--
From: Boris Ostrovsky
commit 84d582d236dc1f9085e741affc72e9ba061a67c2 upstream.
Recent discussion (http://marc.info/?l=xen-devel=149192184523741)
established that commit
On Thu, May 11, 2017 at 2:42 PM, Julien Grall wrote:
> Hi Oleksandr,
Hi Julien
>
>
> On 10/05/17 15:03, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> This flag is intended to let Xen know that the guest has devices
>>
flight 109296 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109296/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358
Tests which are
On Thu, May 11, 2017 at 2:38 PM, Julien Grall wrote:
> Hi Oleksandr,
Hi, Julien
>
> On 10/05/17 15:03, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> The alloc_page_table callback is a mandatory thing
>> for the IOMMUs
flight 109312 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109312/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 29dc8aa861fac78c6d62391dff312db934b755e3
baseline version:
ovmf
On 09/05/17 16:23, Jan Beulich wrote:
On 09.05.17 at 17:10, wrote:
>> On 09/05/17 15:23, Jan Beulich wrote:
>>> Since PV kernels can't use large pages anywa, when the init-P2M support
>> anyway
> Already fixed after Alan pointed this out. Do I need to send v2
>
1 - 100 of 173 matches
Mail list logo