> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 03:56
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Julien Grall
> ; Andrew Cooper ;
> Ian Jackson ; Jan Beulich ;
> Konrad Rzeszutek Wilk ; Tim (Xen.org)
> ;
>>> On 07.08.18 at 10:21, wrote:
>> From: Tian, Kevin [mailto:kevin.t...@intel.com]
>> Sent: 07 August 2018 04:25
>>
>> > From: Paul Durrant [mailto:paul.durr...@citrix.com]
>> > Sent: Saturday, August 4, 2018 1:22 AM
>> >
>> > --- a/xen/drivers/passthrough/vtd/iommu.c
>> > +++
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:56 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 09:48
> > To: Paul Durrant ; Jan Beulich
> >
> > Cc: George Dunlap ; xen-devel >
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 10:03
> To: Paul Durrant ; Jan Beulich
>
> Cc: George Dunlap ; xen-devel de...@lists.xenproject.org>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Paul
On 8/7/18 12:15 PM, Greg KH wrote:
> On Tue, Aug 07, 2018 at 12:08:07PM -0700, Srivatsa S. Bhat wrote:
>> Also, upstream commit e01e80634ecdde1 (fork: unconditionally clear
>> stack on fork) applies cleanly on 4.14 stable, so it would be great to
>> cherry-pick it to 4.14 stable as well.
>
> It
On 06/08/18 17:58, Roger Pau Monné wrote:
> On Mon, Aug 06, 2018 at 01:33:59PM +0200, Juergen Gross wrote:
>> Persistent grants are allocated until a threshold per ring is being
>> reached. Those grants won't be freed until the ring is being destroyed
>> meaning there will be resources kept busy
>>> George Dunlap schrieb am 06.08.2018 um 18:16 in
>>> Nachricht
:
> On Thu, Aug 2, 2018 at 1:13 PM, Ulrich Windl
> wrote:
>> Hi!
>>
>> WHen using "xm list test12 -l" that seems to be in pvgrub state, I get this
> error:
>
> Unfortunately Xen 4.4 is long out of security support, and xm/xend
>>> On 06.08.18 at 21:07, wrote:
> On Thu, Aug 02, 2018 at 01:09:06AM -0600, Jan Beulich wrote:
>> >>> On 02.08.18 at 00:20, wrote:
>> > On Tue, Jul 31, 2018 at 05:25:27AM -0600, Jan Beulich wrote:
>> >> Code structure wise this looks to undo a fair part of what patch
>> >> 1 has done. It would
On 06/08/18 18:16, Roger Pau Monné wrote:
> On Mon, Aug 06, 2018 at 01:34:01PM +0200, Juergen Gross wrote:
>> Add a periodic cleanup function to remove old persistent grants which
>> are no longer in use on the backend side. This avoids starvation in
>> case there are lots of persistent grants for
flight 125773 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125773/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64
flight 125781 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125781/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64
flight 125794 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125794/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
Regressions
> On Aug 7, 2018, at 11:49 AM, Boris Ostrovsky
> wrote:
>
>> On 08/07/2018 01:20 PM, George Dunlap wrote:
>>> On Mon, Aug 6, 2018 at 8:10 PM, Chris Brannon wrote:
>>> I just got the following patch from a colleague. It's a backport of
>>> the XSA 274 kernel patch to 4.9.x kernels. The
On Tue, Aug 7, 2018 at 2:26 AM, Lars Kurth wrote:
> Dear community members,
>
> please send me agenda items for next week’s community call by this Friday.
>
>
If there is time available on the call, I'd like to ask about Xen's memory
scrubbing, to better understand the changes made to it in
flight 125793 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125793/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
Regressions
On 08/07/2018 01:20 PM, George Dunlap wrote:
> On Mon, Aug 6, 2018 at 8:10 PM, Chris Brannon wrote:
>> I just got the following patch from a colleague. It's a backport of
>> the XSA 274 kernel patch to 4.9.x kernels. The kernel patch given in
>> the XSA would not apply cleanly. Would someone
On 8/7/18 6:49 AM, Greg KH wrote:
> On Fri, Aug 03, 2018 at 04:20:31PM -0700, Srivatsa S. Bhat wrote:
>> On 8/2/18 3:22 PM, Kees Cook wrote:
>>> On Thu, Aug 2, 2018 at 12:22 PM, Srivatsa S. Bhat
>>> wrote:
On 7/26/18 4:09 PM, Kees Cook wrote:
> On Tue, Jul 24, 2018 at 3:02 PM, Jiri
On Tue, Aug 07, 2018 at 12:08:07PM -0700, Srivatsa S. Bhat wrote:
> Also, upstream commit e01e80634ecdde1 (fork: unconditionally clear
> stack on fork) applies cleanly on 4.14 stable, so it would be great to
> cherry-pick it to 4.14 stable as well.
It is already in the 4.14.60 release, did I
flight 125779 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125779/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64-xsm
On Tue, Aug 7, 2018 at 8:21 PM, Julien Grall wrote:
> On 07/08/18 18:12, Oleksandr Tyshchenko wrote:
>>
>> Hi, Julien
>
>
> Hi Oleksandr,
Hi Julien
>
>
>>
>> On Tue, Aug 7, 2018 at 6:18 PM, Julien Grall wrote:
>>>
>>> Hi,
>>>
>>> On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
flight 125792 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125792/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
Regressions
flight 75051 distros-debian-snapshot real [real]
http://osstest.xensource.com/osstest/logs/75051/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 6 xen-build fail REGR. vs. 75030
>>> On 03.08.18 at 15:53, wrote:
> @@ -226,15 +225,14 @@ int hvm_save(struct domain *d, hvm_domain_context_t *h)
> /* Save all available kinds of state */
> for ( i = 0; i <= HVM_SAVE_CODE_MAX; i++ )
> {
> -handler = hvm_sr_handlers[i].save;
> -save_one_handler =
flight 125771 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125771/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/arch/x86/time.c
> +++ b/xen/arch/x86/time.c
> @@ -1144,6 +1144,7 @@ void force_update_vcpu_system_time(struct vcpu *v)
>
> static void update_domain_rtc(void)
> {
> +#if CONFIG_HVM
> struct domain *d;
>
> rcu_read_lock(_read_lock);
> @@
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/include/asm-x86/hvm/domain.h
> +++ b/xen/include/asm-x86/hvm/domain.h
> @@ -34,6 +34,7 @@
> #include
> #include
> #include
> +#include
Why? struct vcpu_hvm_context only needs a forward declaration, just
like was the case originally. Full
>>> On 03.08.18 at 15:53, wrote:
> +for ( i = 0; i < MASK_EXTR(hw_mtrr.msr_mtrr_cap, MTRRcap_VCNT); i++ )
> +{
> +/* save physbase */
> +hw_mtrr.msr_mtrr_var[i * 2] = mtrr_state->var_ranges->base;
> +/* save physmask */
> +hw_mtrr.msr_mtrr_var[i * 2 + 1] =
flight 125782 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125782/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
Regressions
>>> On 03.08.18 at 15:53, wrote:
> This is used to save data from a single instance.
>
> Signed-off-by: Alexandru Isaila
> ---
> xen/arch/x86/hvm/vlapic.c | 27 +++
> 1 file changed, 19 insertions(+), 8 deletions(-)
>
> diff --git a/xen/arch/x86/hvm/vlapic.c
>>> On 03.08.18 at 15:53, wrote:
> --- a/xen/arch/x86/domctl.c
> +++ b/xen/arch/x86/domctl.c
> @@ -591,12 +591,12 @@ long arch_do_domctl(
> !is_hvm_domain(d) )
> break;
>
> -domain_pause(d);
> +
On 13/06/18 11:58, Juergen Gross wrote:
> Using privcmd_call() for a singleton multicall seems to be wrong, as
> privcmd_call() is using stac()/clac() to enable hypervisor access to
> Linux user space.
>
> Add a new xen_single_call() function to be use for that purpose.
>
> Reported-by: Jan
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/arch/x86/irq.c
> +++ b/xen/arch/x86/irq.c
> @@ -2732,3 +2732,11 @@ int allocate_and_map_msi_pirq(struct domain *d, int
> index, int *pirq_p,
>
> return ret;
> }
> +
> +void arch_evtchn_inject(struct vcpu *v)
> +{
> +#if CONFIG_HVM
> +if (
>>> On 03.08.18 at 15:53, wrote:
> This patch drops the use of save functions in hvm_save.
But quite a few types still have this set to NULL? How do things work
at this point of the series? Am I overlooking anything? I think this
needs to be swapped with patch 13.
Jan
On Ma, 2018-08-07 at 06:09 -0600, Jan Beulich wrote:
> >
> > >
> > > >
> > > > On 03.08.18 at 15:53, wrote:
> > This is used to save data from a single instance.
> >
> > Signed-off-by: Alexandru Isaila
> > ---
> > xen/arch/x86/hvm/vlapic.c | 27 +++
> > 1 file
On 17/07/18 14:01, Juergen Gross wrote:
> Some Xen related cleanups:
> - move some pv-only code from CONFIG_XEN to CONFIG_XEN_PV
> - use CONFIG_XEN_PVHVM in Makefile instead of #ifdef around a complete source
> - add SPDX identifier where missing
>
> Juergen Gross (4):
> xen: move pv irq
>>> On 07.08.18 at 12:48, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 07 August 2018 11:37
>>
>> >>> On 07.08.18 at 12:03, wrote:
>> > @@ -4373,13 +4372,6 @@ static int hvm_allow_get_param(struct domain
>> *d,
>> > case HVM_PARAM_ALTP2M:
>> > case
>>> On 07.08.18 at 12:00, wrote:
> This function is common to both PV and HVM. Move it to x86 common
> code.
I'm afraid that's the wrong way round: p2m_memory_type_changed()
is HVM (in fact EPT) specific. The only uses of the function that aren't
already HVM-specific are from domctl.c and from
>>> On 03.08.18 at 15:53, wrote:
> --- a/xen/arch/x86/hvm/save.c
> +++ b/xen/arch/x86/hvm/save.c
> @@ -196,7 +196,10 @@ int hvm_save(struct domain *d, hvm_domain_context_t *h)
> struct hvm_save_header hdr;
> struct hvm_save_end end;
> hvm_save_handler handler;
> +
>>> On 03.08.18 at 15:53, wrote:
> @@ -155,7 +152,7 @@ int hvm_save_one(struct domain *d, unsigned int typecode,
> unsigned int instance,
> if ( !ctxt.data )
> return -ENOMEM;
>
> -if ( (rv = hvm_sr_handlers[typecode].save(d, )) != 0 )
> +if ( (rv =
>>> On 03.08.18 at 15:53, wrote:
> Alexandru Isaila (14):
>
> x86/cpu: Introduce vmce_save_vcpu_ctxt_one() func
> x86/hvm: Introduce hvm_save_tsc_adjust_one() func
> x86/hvm: Introduce hvm_save_cpu_ctxt_one func
> x86/hvm: Introduce hvm_save_cpu_xsave_states_one
> x86/hvm: Introduce
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 04:41
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Julien Grall
> ; Andrew Cooper ;
> George Dunlap ; Ian Jackson
> ; Jan Beulich ; Konrad
> Rzeszutek Wilk ; Tim
>>> On 07.08.18 at 10:10, wrote:
>> From: Tian, Kevin [mailto:kevin.t...@intel.com]
>> Sent: 07 August 2018 04:00
>>
>> > From: Paul Durrant
>> > Sent: Saturday, August 4, 2018 1:22 AM
>> >
>> > diff --git a/xen/arch/x86/iommu_op.c b/xen/arch/x86/iommu_op.c
>> > new file mode 100644
>> > index
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 09:33
> To: Jan Beulich ; Paul Durrant
>
> Cc: George Dunlap ; xen-devel de...@lists.xenproject.org>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Jan
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:37 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 09:33
> > To: Jan Beulich ; Paul Durrant
> >
> > Cc: George Dunlap ; xen-devel >
flight 125764 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125764/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:36 PM
>
> > > > > +static int intel_iommu_lookup_page(struct domain *d, bfn_t bfn,
> > > mfn_t
> > > > > *mfn,
> > > > > + unsigned int *flags)
> > > >
> > > > Not looking at
Dear community members,
please send me agenda items for next week’s community call by this Friday.
Note that this a week later than normal, because I had community calls in
my diary as the week before Advisory Board meetings (not the 2nd Wed
of each month) and I forgot to send out the agenda.
* Boris Ostrovsky wrote:
> x86 maintainers, this needs your ack please.
LGTM:
Acked-by: Ingo Molnar
Thanks,
Ingo
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
Signed-off-by: Wei Liu
---
xen/include/asm-x86/hvm/guest_access.h | 24
1 file changed, 24 insertions(+)
diff --git a/xen/include/asm-x86/hvm/guest_access.h
b/xen/include/asm-x86/hvm/guest_access.h
index b92dbe9..c7e83dc 100644
---
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/traps.c | 15 +++
1 file changed, 11 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/x86_64/traps.c b/xen/arch/x86/x86_64/traps.c
index ed02b78..87d5816 100644
--- a/xen/arch/x86/x86_64/traps.c
+++ b/xen/arch/x86/x86_64/traps.c
This function is common to both PV and HVM. Move it to x86 common
code.
Signed-off-by: Wei Liu
---
xen/arch/x86/hvm/mtrr.c | 9 -
xen/arch/x86/mm.c | 9 +
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/hvm/mtrr.c b/xen/arch/x86/hvm/mtrr.c
It is not specific to HVM. It just so happens that PV doesn't need
special handling. Also enclose the code in CONFIG_HVM.
Signed-off-by: Wei Liu
---
xen/arch/x86/hvm/irq.c | 6 --
xen/arch/x86/irq.c | 8
2 files changed, 8 insertions(+), 6 deletions(-)
diff --git
PV doesn't have RTC. Enclose relevant code in CONFIG_HVM.
Signed-off-by: Wei Liu
---
xen/arch/x86/time.c | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/x86/time.c b/xen/arch/x86/time.c
index 536449b..8d74210 100644
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -1144,6
flight 125765 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125765/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64-xsm
flight 125780 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125780/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
Regressions
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:00 PM
>
> > > *
> > > * gfn: Guest Frame Number
> > > * The values a guest puts in its own pagetables. For an auto-
> translated
> > > @@ -26,6 +27,11 @@
> > > * A linear idea of a guest physical
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 09:31
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; George Dunlap
>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Paul Durrant
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 10:01
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; Andrew Cooper ; Tim
> (Xen.org) ; George Dunlap ;
> Julien Grall ; Jan Beulich ; Ian
> Jackson
>
flight 125766 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125766/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
On 07/08/18 11:03, Paul Durrant wrote:
> My recent patch [1] to qemu-xen-traditional removes the last use of the
> 'default' ioreq server in Xen. (This is a catch-all ioreq server that is
> used if no explicitly registered I/O range is targetted).
>
> This patch can be applied once that patch is
flight 125767 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125767/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64-xsm
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:22 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 04:25
> > To: Paul Durrant ; xen-
> de...@lists.xenproject.org
> > Cc: Jan Beulich ; George
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, August 7, 2018 4:30 PM
>
> >>> On 07.08.18 at 10:21, wrote:
> >> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> >> Sent: 07 August 2018 04:25
> >>
> >> > From: Paul Durrant [mailto:paul.durr...@citrix.com]
> >> > Sent: Saturday,
> From: Paul Durrant
> Sent: Tuesday, August 7, 2018 4:44 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 09:38
> > To: Paul Durrant ; xen-
> de...@lists.xenproject.org
> > Cc: Stefano Stabellini ; Wei Liu
> > ; George Dunlap ;
> >
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 5:12 PM
>
>
> > So here current version pvIOMMU only provides global address space,
> > though unlike any existing IOMMU. maybe we should explicitly call out
> > this fact in some capability field for future
While at it, remove declaration of vcpu_hvm_context and use the proper
header.
Signed-off-by: Wei Liu
---
xen/include/asm-x86/domain.h | 3 ---
xen/include/asm-x86/hvm/domain.h | 17 +
2 files changed, 17 insertions(+), 3 deletions(-)
diff --git
They contain code for compat hypercall for PV guests.
Signed-off-by: Wei Liu
---
xen/arch/x86/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
index 17e7d3f..9b9b63a 100644
--- a/xen/arch/x86/Makefile
+++
This allows us to provide a stub for it in that header file.
Signed-off-by: Wei Liu
---
xen/include/asm-x86/event.h | 3 ++-
xen/include/asm-x86/hvm/event.h | 14 ++
2 files changed, 16 insertions(+), 1 deletion(-)
create mode 100644 xen/include/asm-x86/hvm/event.h
diff --git
Wei Liu (9):
x86: put compat.o and x86_64/compat.o under CONFIG_PV
x86: add missing "inline" keyword
x86: enclose hypercall page initialisation code in CONFIG_{HVM,PV}
x86/hvm: provide stubs for HVM guest accessors
x86/hvm: put hvm_local_events_need_delivery into a header file
x86:
Signed-off-by: Wei Liu
---
xen/include/asm-x86/pv/traps.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/include/asm-x86/pv/traps.h b/xen/include/asm-x86/pv/traps.h
index 7279d16..89985d1 100644
--- a/xen/include/asm-x86/pv/traps.h
+++ b/xen/include/asm-x86/pv/traps.h
@@
On 08/07/2018 10:26 AM, Lars Kurth wrote:
> Dear community members,
>
> please send me agenda items for next week’s community call by this Friday.
> Note that this a week later than normal, because I had community calls in
> my diary as the week before Advisory Board meetings (not the 2nd Wed
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/arch/x86/x86_64/traps.c
> +++ b/xen/arch/x86/x86_64/traps.c
> @@ -352,12 +352,19 @@ void subarch_percpu_traps_init(void)
> void hypercall_page_initialise(struct domain *d, void *hypercall_page)
> {
> memset(hypercall_page, 0xCC, PAGE_SIZE);
>
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 03:38
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Suravee Suthikulpanit ; Stefano
> Stabellini ; Julien Grall ; Jan
> Beulich
> Subject: RE: [PATCH v5 02/15] iommu: introduce the
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 04:25
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; George Dunlap
>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Paul Durrant
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 05:08
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; George Dunlap ;
> Andrew Cooper ; Ian Jackson
> ; Tim (Xen.org) ; Julien Grall
> ; Jan Beulich
>
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 10:20
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; Andrew Cooper ; Tim
> (Xen.org) ; George Dunlap ;
> Julien Grall ; Jan Beulich ; Ian
> Jackson
>
My recent patch [1] to qemu-xen-traditional removes the last use of the
'default' ioreq server in Xen. (This is a catch-all ioreq server that is
used if no explicitly registered I/O range is targetted).
This patch can be applied once that patch is committed, to remove the
(>100 lines of)
>>> On 07.08.18 at 12:03, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4098,7 +4098,6 @@ static int hvm_allow_set_param(struct domain *d,
> * since the domain may need to be paused.
> */
> case HVM_PARAM_IDENT_PT:
> -case HVM_PARAM_DM_DOMAIN:
>
>>> On 07.08.18 at 12:00, wrote:
> --- a/xen/include/asm-x86/hvm/guest_access.h
> +++ b/xen/include/asm-x86/hvm/guest_access.h
> @@ -1,8 +1,32 @@
> #ifndef __ASM_X86_HVM_GUEST_ACCESS_H__
> #define __ASM_X86_HVM_GUEST_ACCESS_H__
>
> +#if CONFIG_HVM
> +
> unsigned long copy_to_user_hvm(void
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 04:00
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; George Dunlap ;
> Andrew Cooper ; Ian Jackson
> ; Tim (Xen.org) ; Jan Beulich
> ; Daniel De Graaf
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 04:04
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich
> Subject: RE: [PATCH v5 07/15] iommu: track reserved ranges using a rangeset
>
> > From: Paul Durrant
>>> On 07.08.18 at 10:05, wrote:
>> From: Tian, Kevin [mailto:kevin.t...@intel.com]
>> Sent: 07 August 2018 03:56
>> > From: Paul Durrant [mailto:paul.durr...@citrix.com]
>> > Sent: Saturday, August 4, 2018 1:22 AM
>> > if ( need_iommu(p2m->domain) &&
>> > (lpae_valid(orig_pte) ||
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:16 PM
>
> > -Original Message-
> > From: Tian, Kevin [mailto:kevin.t...@intel.com]
> > Sent: 07 August 2018 04:04
> > To: Paul Durrant ; xen-
> de...@lists.xenproject.org
> > Cc: Jan Beulich
> >
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: Tuesday, August 7, 2018 4:33 PM
>
> >
> > > From: Paul Durrant
> > > Sent: Saturday, August 4, 2018 1:22 AM
> > >
> > > This patch adds an iommu_op which checks whether it is possible or
> > > safe for a domain to modify its own IOMMU
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 09:38
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Stefano Stabellini ; Wei Liu
> ; George Dunlap ;
> Andrew Cooper ; Ian Jackson
> ; Tim (Xen.org) ; Julien Grall
> ; Jan Beulich
>
> -Original Message-
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 07 August 2018 09:48
> To: Paul Durrant ; Jan Beulich
>
> Cc: George Dunlap ; xen-devel de...@lists.xenproject.org>
> Subject: RE: [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops
>
> > From: Paul
>>> On 07.08.18 at 12:00, wrote:
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
>>> On 07.08.18 at 12:00, wrote:
> They contain code for compat hypercall for PV guests.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 07 August 2018 11:37
> To: Paul Durrant
> Cc: Andrew Cooper ; xen-devel de...@lists.xenproject.org>
> Subject: Re: [PATCH] x86/hvm: remove default ioreq server
>
> >>> On 07.08.18 at 12:03, wrote:
> > ---
On 07/08/18 11:44, Jan Beulich wrote:
On 07.08.18 at 12:00, wrote:
>> --- a/xen/arch/x86/x86_64/traps.c
>> +++ b/xen/arch/x86/x86_64/traps.c
>> @@ -352,12 +352,19 @@ void subarch_percpu_traps_init(void)
>> void hypercall_page_initialise(struct domain *d, void *hypercall_page)
>> {
>>
>>> On 07.08.18 at 12:00, wrote:
> --- /dev/null
> +++ b/xen/include/asm-x86/hvm/event.h
> @@ -0,0 +1,14 @@
> +#ifndef ASM_HVM_EVENT_H
> +#define ASM_HVM_EVENT_H
> +
> +#if CONFIG_HVM
> +
> +int hvm_local_events_need_delivery(struct vcpu *v);
> +
> +#else
> +
> +static inline int
On 07/08/18 16:02, Boris Ostrovsky wrote:
> On 08/07/2018 09:11 AM, Juergen Gross wrote:
>> On 13/06/18 11:58, Juergen Gross wrote:
>>> Using privcmd_call() for a singleton multicall seems to be wrong, as
>>> privcmd_call() is using stac()/clac() to enable hypervisor access to
>>> Linux user
Hi Oleksandr,
On 07/08/18 16:01, Oleksandr Tyshchenko wrote:
On Tue, Aug 7, 2018 at 4:43 PM, Julien Grall wrote:
On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
I would prefer if you introduce a local variable for the params. This would
avoid to write uart->params everywhere.
Agree. Do you
On 07/08/18 15:45, Tamas K Lengyel wrote:
> On Tue, Aug 7, 2018 at 8:37 AM Roger Pau Monné wrote:
>> On Tue, Aug 07, 2018 at 08:29:49AM -0600, Tamas K Lengyel wrote:
>>> On Tue, Aug 7, 2018 at 8:04 AM Roger Pau Monne wrote:
Hello,
The following series implement a workaround for
On 07/08/18 16:00, Boris Ostrovsky wrote:
> On 08/07/2018 09:10 AM, Juergen Gross wrote:
>> On 17/07/18 14:01, Juergen Gross wrote:
>>> Some Xen related cleanups:
>>> - move some pv-only code from CONFIG_XEN to CONFIG_XEN_PV
>>> - use CONFIG_XEN_PVHVM in Makefile instead of #ifdef around a
My recent patch [1] to qemu-xen-traditional removes the last use of the
'default' ioreq server in Xen. (This is a catch-all ioreq server that is
used if no explicitly registered I/O range is targetted).
This patch can be applied once that patch is committed, to remove the
(>100 lines of)
>>> On 07.08.18 at 17:02, wrote:
>>
>> >
>> > -hvm_get_guest_pat(v, _mtrr.msr_pat_cr);
>> > +memcpy(hw_mtrr.msr_mtrr_fixed, mtrr_state->fixed_ranges,
>> > NUM_FIXED_MSR);
>> You want to BUILD_BUG_ON() array sizes differing, and then use
>> sizeof() in the call to memcpy().
>>
> In
Hi,
On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Renesas "Stout" development board (with different expansion boards)
is also based on R-Car Gen2 SoC. So extend compat array with
board's compatible strings.
Signed-off-by: Oleksandr Tyshchenko
CC: Stefano
On 07/08/18 15:28, Oleksandr Tyshchenko wrote:
On Tue, Aug 7, 2018 at 4:48 PM, Julien Grall wrote:
Hi,
Hi, Julien
On 06/08/18 19:35, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Add support for Renesas "Stout" development board based on
R-Car H2 SoC which has SCIFA
On 07/08/18 16:14, Roger Pau Monné wrote:
> On Tue, Aug 07, 2018 at 08:31:31AM +0200, Juergen Gross wrote:
>> On 06/08/18 18:16, Roger Pau Monné wrote:
>>> On Mon, Aug 06, 2018 at 01:34:01PM +0200, Juergen Gross wrote:
Add a periodic cleanup function to remove old persistent grants which
1 - 100 of 157 matches
Mail list logo