>>> On 29.10.18 at 18:06, wrote:
> On 29/10/18 16:58, Jan Beulich wrote:
> On 29.10.18 at 17:44, wrote:
>>> On 29/10/18 16:33, Jan Beulich wrote:
>>> On 15.10.18 at 12:30, wrote:
> (XEN) [22641] PUSH {sp 0, irq 30, vec 0x21}
This is the last push or pop.
>
There is no user of _paravirt_ident_32 left in the tree. Remove it
together with the related paravirt_patch_ident_32().
paravirt_patch_ident_64() can be moved inside CONFIG_PARAVIRT_XXL.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/paravirt_types.h | 2 --
arch/x86/kernel/paravirt.c
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, October 25, 2018 9:58 PM
>
> >>> On 25.10.18 at 15:02, wrote:
> > On 25/10/18 13:51, Jan Beulich wrote:
> > On 15.10.18 at 14:06, wrote:
> >>> From the debugging, we see that PPR/IRR/ISR appear to retain their
> state
> >>>
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, October 25, 2018 11:39 PM
>
> Now that nvmx_handle_vmx_insn() performs all VT-x instruction checks,
> there is
> no need for redundant checking in vmx_inst_check_privilege(). Remove it,
> and
> take out the vmxon_check
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, October 25, 2018 11:37 PM
>
> This is a stopgap solution until the toolstack side of initialisation can be
> sorted out, but it does result in the nvmx_vcpu_in_vmx() predicate working
> correctly even when nested virt
On Tue, 30 Oct 2018 10:03:22 +0530
Vikram K wrote:
> Hello,
> We are using Hikey960 with Debian as Dom0 and DomU. This board has only
> WiFi interface. We want to create bridge between Dom0 and DomU so that DomU
> has internet access. We tried to create bridge using brtcl command, but it
> is
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, October 25, 2018 11:39 PM
>
> Signed-off-by: Andrew Cooper
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.20a-rc1-tag
xen: fixes for 4.20-rc1
It contains only several small fixes and cleanups this time.
Thanks.
Juergen
MAINTAINERS| 1 +
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Friday, October 12, 2018 11:28 PM
>
> Calling vmfail_valid() is correct only if vvmcx is valid. Modify
> functions to use vmfail() instead which performs the necessary check.
>
> Signed-off-by: Sergey Dyasli
Acked-by: Kevin Tian .
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Friday, October 12, 2018 11:28 PM
>
> And make nvmx_handle_vmptrld() return the new errno in case the
> provided
> address is the same as vmxon region address.
>
> While at it, correct the return value for not-4KB-aligned case.
>
>
> From: Alexandru Stefan ISAILA [mailto:aisa...@bitdefender.com]
> Sent: Wednesday, October 24, 2018 5:19 PM
>
> The may_defer var was left with the older bool_t type. This patch
> changes the type to bool.
>
> Signed-off-by: Alexandru Isaila
Reviewed-by: Kevin Tian
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, October 25, 2018 5:46 PM
>
> >>> On 19.10.18 at 16:30, wrote:
> > On Fri, Oct 12, 2018 at 03:32:59AM -0600, Jan Beulich wrote:
> >>In commit 303066fdb1e ("VMX: fix interaction of APIC-V and Viridian
> >>emulation") I screwed up
On 29/10/2018 19:31, Manjunath Patil wrote:
> info->nr_rings isn't adjusted in case of ENOMEM error from
> negotiate_mq(). This leads to kernel panic in error path.
>
> Typical call stack involving panic -
> #8 page_fault at 8175936f
> [exception RIP: blkif_free_ring+33]
> RIP:
flight 129127 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/129127/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-debianhvm-amd64 7 xen-boot fail like 129105
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, October 25, 2018 11:39 PM
>
> This is very dangerous from a security point of view, because a missing
> entry
> will cause L2's action to be interpreted as L1's action.
>
> Signed-off-by: Andrew Cooper
Acked-by: Kevin
flight 129171 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/129171/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4222e8e7e421e9c8d2c2f319a3860dd3332d6255
baseline version:
ovmf
On 30/10/2018 00:28, Stefano Stabellini wrote:
> On Fri, 26 Oct 2018, Julien Grall wrote:
>> Hi Stefano,
>>
>> On 10/26/18 7:04 PM, Stefano Stabellini wrote:
>>> From: Stefano Stabellini
>>>
>>> xen_create_contiguous_region has now only an implementation if
>>> CONFIG_XEN_PV is defined. However,
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Monday, October 15, 2018 6:36 PM
>
> Reusing debugreg[5] for the PV emulated IO breakpoint information is
> confusing
> to read. Instead, introduce a dr7_emul field in pv_vcpu for the pupose.
>
> With the PV emulation out of the
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
> Sent: Friday, October 12, 2018 11:28 PM
>
> And make nvmx_handle_vmclear() return the new errno in case the
> provided
> address is the same as vmxon region address.
>
> While at it, correct the return value for not-4KB-aligned case and
The type of Xsraw.sync is made more precise:
from val sync : (Xenbus.Xb.t -> 'a) -> con -> string
to val sync : (Xenbus.Xb.t -> unit) -> con -> string
The first argument is enforced to return unit rather than a value that
is not used anyway.
Signed-off-by: Christian Lindig
---
> On Tue, Oct 30, 2018 at 12:39 PM Vladimir Botka wrote:
> > On Tue, 30 Oct 2018 10:03:22 +0530
> > Vikram K wrote:
> > > Hello,
> > > We are using Hikey960 with Debian as Dom0 and DomU. This board has only
> > > WiFi interface. We want to create bridge between Dom0 and DomU so that
> > > DomU
On Mon, Oct 29, 2018 at 10:03 PM Stefano Stabellini
wrote:
>
> On Wed, 24 Oct 2018, Oleksandr Tyshchenko wrote:
> > Hi, Stefano
> >
> > On Tue, Oct 23, 2018 at 5:04 AM Stefano Stabellini
> > wrote:
> > >
> > > Make vpl011 being able to be used without a userspace component in Dom0.
> > > In that
This patch adds a couple of regs to the vm_event that are used by
the introspection. The base, limit and ar
bits are compressed into a uint64_t union so as not to enlarge the
vm_event.
Signed-off-by: Alexandru Isaila
---
Changes since V4:
- Change the comment into one line
-
On Mon, Oct 29, 2018 at 11:31:56AM -0700, Manjunath Patil wrote:
> info->nr_rings isn't adjusted in case of ENOMEM error from
> negotiate_mq(). This leads to kernel panic in error path.
>
> Typical call stack involving panic -
> #8 page_fault at 8175936f
> [exception RIP:
debian.uk.xensource.com is no more (and the service name seems to have
been discarded). There is repo.citrite.net instead but it is a
proprietary appliance which - although it claims to be able to handle
apt repositories - is not compatible with debian-installer; at least,
jessie's d-i.
Swap to
On Mon, Oct 29, 2018 at 08:19:20AM -0600, Jan Beulich wrote:
> >>> On 19.10.18 at 17:20, wrote:
> > --- a/xen/arch/x86/hvm/svm/svm.c
> > +++ b/xen/arch/x86/hvm/svm/svm.c
> > @@ -1272,6 +1272,24 @@ void svm_host_osvw_init()
> > spin_unlock(_lock);
> > }
> >
> > +static int
Hi,
On 30/10/2018 00:21, Stefano Stabellini wrote:
On Mon, 8 Oct 2018, Julien Grall wrote:
The LPAE format allows to store information in an entry even with the
valid bit unset. In a follow-up patch, we will take advantage of this
feature to re-purpose the valid bit for generating a
On Mon, Oct 29, 2018 at 10:51:07AM -0600, Jan Beulich wrote:
> >>> On 19.10.18 at 17:20, wrote:
> > No functional change intended.
> >
> > Signed-off-by: Roger Pau Monné
>
> Reviewed-by: Jan Beulich
> with one remark:
>
> > --- a/xen/include/public/arch-x86/xen.h
> > +++
>>> On 30.10.18 at 13:26, wrote:
> On 10/30/18 1:33 PM, Jan Beulich wrote:
> On 30.10.18 at 11:07, wrote:
>>> --- a/xen/include/public/vm_event.h
>>> +++ b/xen/include/public/vm_event.h
>>> @@ -29,7 +29,7 @@
>>>
>>> #include "xen.h"
>>>
>>> -#define VM_EVENT_INTERFACE_VERSION 0x0003
On 30/10/2018 07:41, Tian, Kevin wrote:
>> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
>> Sent: Friday, October 12, 2018 11:28 PM
>>
>> As a convenient helper function and refactor the code to use it.
>>
>> No functional change.
>>
>> Signed-off-by: Sergey Dyasli
>
> since vmcx is hvm
On 10/30/18 7:21 AM, Paul Durrant wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
>> Of Joe Jin
>> Sent: 30 October 2018 14:13
>> To: Paul Durrant ; Boris Ostrovsky
>> ; Konrad Rzeszutek Wilk
>>
>> Cc: John Sobecki ; DONGLI.ZHANG
> > > > > Hello,
> > > > > We are using Hikey960 with Debian as Dom0 and DomU. This board has
> > > > > only WiFi interface. We want to create bridge between Dom0 and DomU
> > > > > so that DomU has internet access. We tried to create bridge using
> > > > > brtcl
> > > > > command, but it is not
On 10/30/18 1:33 PM, Jan Beulich wrote:
On 30.10.18 at 11:07, wrote:
>> --- a/xen/include/public/vm_event.h
>> +++ b/xen/include/public/vm_event.h
>> @@ -29,7 +29,7 @@
>>
>> #include "xen.h"
>>
>> -#define VM_EVENT_INTERFACE_VERSION 0x0003
>> +#define VM_EVENT_INTERFACE_VERSION
On Tue, Oct 30, 2018 at 01:32:38PM +0200, Alexandru Vasile wrote:
> Hello,
>
>
> > There is some low-hanging fruit, both in Xen and the Linux kernel,
> > which can really be worked in parallel by different parties, so let me
> > know if you have some capacity and we can speak about sharing the
>
On 10/30/18 1:59 AM, Paul Durrant wrote:
>> On 10/25/18 11:56 AM, Joe Jin wrote:
>>> I just discussed this patch with Boris in private, his opinions(Boris,
>>> please correct me if any misunderstood) are:
>>>
>>> 1. With/without the check, both are incorrect, he thought we need to
>>>prevented
Thanks Vladimir.
Can some one provide pointer/reference on how to use NAT to share WiFi
between Dom0 and DomU.
Followed the instruction provided in the below link, but no success.
https://wiki.debian.org/BridgeNetworkConnections#Bridging_with_a_wireless_NIC
On Tue, Oct 30, 2018 at 4:04 PM
This run is configured for baseline tests only.
flight 75546 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75546/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail
There's no guarantee that e.g. a switch() control expression's memory
operand(s) get(s) read just once. Guard against the compiler producing
"unexpected" code by sprinkling around some ACCESS_ONCE().
I'm leaving alone opt_conswitch[]: It gets accessed in quite a few
places anyway, and an
On Mon, Oct 29, 2018 at 01:29:28PM +, Paul Durrant wrote:
> The P2M code currently contains many loops to deal with the fact that,
> while it may be require to handle page orders greater than 4k, the
> IOMMU map and unmap functions do not.
> This patch adds a page_order parameter to those
flight 75544 distros-debian-snapshot real [real]
http://osstest.xensource.com/osstest/logs/75544/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-i386-current-netinst-pygrubbroken
Tests
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Joe Jin
> Sent: 30 October 2018 14:48
> To: Paul Durrant ; Boris Ostrovsky
> ; Konrad Rzeszutek Wilk
>
> Cc: John Sobecki ; DONGLI.ZHANG
> ; linux-ker...@vger.kernel.org"
On 30/10/18 14:44, Jan Beulich wrote:
> There's no guarantee that e.g. a switch() control expression's memory
> operand(s) get(s) read just once. Guard against the compiler producing
> "unexpected" code by sprinkling around some ACCESS_ONCE().
>
> I'm leaving alone opt_conswitch[]: It gets
On Tue, Oct 30, 2018 at 7:19 AM Jan Beulich wrote:
>
> >>> On 30.10.18 at 13:26, wrote:
> > On 10/30/18 1:33 PM, Jan Beulich wrote:
> > On 30.10.18 at 11:07, wrote:
> >>> --- a/xen/include/public/vm_event.h
> >>> +++ b/xen/include/public/vm_event.h
> >>> @@ -29,7 +29,7 @@
> >>>
> >>>
Stefano Stabellini writes ("[PATCH v8 6/8] docs: documentation about static
shared memory regions"):
> Author: Zhongze Liu
>
> Add docs to document the motivation, usage, use cases and other
> relevant information about the static shared memory feature.
>
> This is for the proposal "Allow
Hi Stefano,
On 23/10/2018 03:02, Stefano Stabellini wrote:
Find addresses, sizes on device tree from kernel_probe.
Find the cmdline from the bootcmdlines array.
Introduce a new boot_module_find_by_addr_and_kind function to match not
just on boot module kind, but also by address so that we can
On 30/10/2018 12:23, Roger Pau Monné wrote:
> On Mon, Oct 29, 2018 at 03:19:34PM +0100, Juergen Gross wrote:
>> On 29/10/2018 13:57, Roger Pau Monné wrote:
>>> On Fri, Oct 19, 2018 at 06:39:50PM +0200, Juergen Gross wrote:
On 19/10/2018 18:10, Roger Pau Monné wrote:
> On Tue, Oct 09, 2018
Hi,
On 23/10/2018 03:02, Stefano Stabellini wrote:
Introduce an allocate_memory function able to allocate memory for DomUs
and map it at the right guest addresses, according to the guest memory
map: GUEST_RAM0_BASE and GUEST_RAM1_BASE.
This is under #if 0 as not used for now.
Signed-off-by:
On 30/10/2018 08:06, Tian, Kevin wrote:
>> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com]
>> Sent: Friday, October 12, 2018 11:28 PM
>>
>> The size of Xen's virtual vmcs region is 4096 bytes. Correctly report
>> it to the guest in case when VMCS shadowing is not available instead of
>>
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Joe Jin
> Sent: 30 October 2018 14:13
> To: Paul Durrant ; Boris Ostrovsky
> ; Konrad Rzeszutek Wilk
>
> Cc: John Sobecki ; DONGLI.ZHANG
> ; linux-ker...@vger.kernel.org"
>>> On 30.10.18 at 16:46, wrote:
> On Tue, Oct 30, 2018 at 09:40:17AM -0600, Jan Beulich wrote:
>> >>> On 30.10.18 at 16:32, wrote:
>> > On Fri, Oct 26, 2018 at 09:21:03AM -0600, Jan Beulich wrote:
>> >> >>> On 22.10.18 at 14:58, wrote:
>> >> > --- a/xen/common/efi/boot.c
>> >> > +++
On 10/30/18 6:14 PM, Jan Beulich wrote:
On 29.10.18 at 13:40, wrote:
>> This patch is a pre-requisite for fixing the logdirty VGA issue
>> (display freezes when switching to a new altp2m view early in a
>> domain's lifetime), but sent separately for easier review.
>> The new
>>> On 30.10.18 at 17:32, wrote:
> On 10/30/18 6:22 PM, Jan Beulich wrote:
> On 29.10.18 at 13:40, wrote:
>>> This patch is a pre-requisite for the one fixing VGA logdirty
>>> freezes when using altp2m. It only concerns itself with the
>>> ranges allocation / deallocation / initialization
On Tue, 30 Oct 2018, Jan Beulich wrote:
> >>> On 29.10.18 at 22:14, wrote:
> > From: Stefano Stabellini
> >
> > Backport commit 3714ce1d6655098ee69ede632883e5874d67e4ab
> > "iommu/arm-smmu: Disable stalling faults for all endpoints" from the
> > Linux kernel. This works-around Erratum #842869.
Stefano Stabellini writes ("[PATCH v8 2/8] libxl: introduce a new structure to
represent static shared memory regions"):
> From: Zhongze Liu
>
> Author: Zhongze Liu
>
> Add a new structure to the IDL family to represent static shared memory
> regions
> as proposed in the proposal "Allow
On Mon, Oct 22, 2018 at 01:58:02PM +0100, Andrew Cooper wrote:
> With almost all users of keyhandler_scratch gone, clean up the 3 remaining
> users and drop the buffer.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
___
Xen-devel mailing list
>>> On 30.10.18 at 16:32, wrote:
> On Fri, Oct 26, 2018 at 09:21:03AM -0600, Jan Beulich wrote:
>> >>> On 22.10.18 at 14:58, wrote:
>> > --- a/xen/common/efi/boot.c
>> > +++ b/xen/common/efi/boot.c
>> > @@ -487,6 +487,7 @@ static EFI_FILE_HANDLE __init
>> > get_parent_handle(EFI_LOADED_IMAGE
Stefano Stabellini writes ("[PATCH v8 4/8] libxl: support unmapping static
shared memory areas during domain destruction"):
> Add libxl__sshm_del to unmap static shared memory areas mapped by
> libxl__sshm_add during domain creation. The unmapping process is:
This whole part should be in a
>>> On 29.10.18 at 13:40, wrote:
> @@ -316,6 +339,22 @@ void p2m_memory_type_changed(struct domain *d)
> }
> }
>
> +void p2m_memory_type_changed(struct domain *d)
> +{
> +_memory_type_changed(p2m_get_hostp2m(d));
> +
> +#ifdef CONFIG_HVM
> +if ( unlikely(altp2m_active(d)) )
> +
On Mon, Oct 29, 2018 at 06:02:05PM +, Paul Durrant wrote:
> They're not really useful so maintaining them is pointless.
>
> Signed-off-by: Paul Durrant
If you think they are not helpful:
Reviewed-by: Roger Pau Monné
Thanks, Roger.
___
On Tue, Oct 30, 2018 at 10:28:21AM -0600, Jan Beulich wrote:
> >>> On 30.10.18 at 17:23, wrote:
> > On Tue, Oct 30, 2018 at 08:44:20AM -0600, Jan Beulich wrote:
> >> There's no guarantee that e.g. a switch() control expression's memory
> >> operand(s) get(s) read just once. Guard against the
On Mon, Oct 29, 2018 at 06:02:06PM +, Paul Durrant wrote:
> Microsoft has a habit of re-numbering sections in the spec. so avoid
> referring to section numbers in comments. Also remove the URL for the
> spec. from the boilerplate... Again, Microsoft has a habit of changing
> these too.
>
>
> On 30 Oct 2018, at 16:50, Ian Jackson wrote:
>
> I'm not much of an ocaml programmer but this seems like it has no
> overall functional change ?
>
> I take it that ignore is the trivial function with type ('a -> unit).
That is correct. Except that types now reflect more accurately what is
On Mon, Oct 29, 2018 at 06:02:08PM +, Paul Durrant wrote:
> ...into new 'synic' module.
>
> The SynIC (synthetic interrupt controller) is specified [1] to be a super-
> set of a virtualized LAPIC, and its definition encompasses all
> enlightenments related to virtual interrupt control.
>
>
On 30/10/2018 17:49, Manjunath Patil wrote:
> info->nr_rings isn't adjusted in case of ENOMEM error from
> negotiate_mq(). This leads to kernel panic in error path.
>
> Typical call stack involving panic -
> #8 page_fault at 8175936f
> [exception RIP: blkif_free_ring+33]
> RIP:
Stefano Stabellini writes ("[PATCH v8 3/8] libxl: support mapping static shared
memory areas during domain creation"):
> +_hidden
> +bool libxl__arch_domain_support_sshm(const libxl_domain_build_info *b_info);
> +
> +_hidden
> +int libxl__arch_domain_sshm_cachepolicy_setdefault(libxl_static_shm
On Mon, Oct 29, 2018 at 06:02:07PM +, Paul Durrant wrote:
> The 'viridian_vp_assist', 'viridian_hypercall_gpa' and
> 'viridian_reference_tsc' union types are identical in layout. The layout
> is also common throughout the specification [1].
>
> This patch declares a common 'viridian_page_msr'
On Mon, Oct 15, 2018 at 03:32:05PM +0100, Ian Jackson wrote:
> Make the bufdev and non-bufdev messages distinct, and always print the
> non-constant argument (ie, the size).
>
> This assists diagnosis.
>
> CC: Andrew Cooper
> CC: Hans van Kranenburg
Acked-by: Wei Liu
On Mon, Oct 15, 2018 at 03:01:07PM +0100, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
> CC: Anthony PERARD
I think you understand the event machinery more than I do, so feel free
to apply this patch.
Wei.
___
Xen-devel mailing list
Christian Lindig writes ("Re: [Xen-devel] [PATCH 1/1] tools/ocaml: Re-introduce
Xenctrl.with_intf wrapper"):
> You are right - close_handle should set the handle to None in addition.
>
> > For that matter, why is close_handle needed at all ?
>
> I mostly added it for symmetry and it is needed
On Mon, Oct 15, 2018 at 03:24:11PM +0100, Ian Jackson wrote:
> This assists diagnosis.
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
> -Original Message-
> From: Roger Pau Monne
> Sent: 30 October 2018 16:34
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Andrew Cooper
> ; Wei Liu ; Jan Beulich
>
> Subject: Re: [Xen-devel] [PATCH 3/8] viridian: remove comments referencing
> section number in the spec.
>
> On
> -Original Message-
> From: Roger Pau Monne
> Sent: 30 October 2018 16:52
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Andrew Cooper
> ; Wei Liu ; Jan Beulich
>
> Subject: Re: [Xen-devel] [PATCH 5/8] viridian: separate interrupt related
> enlightenment implementations...
>
On Fri, Oct 26, 2018 at 03:13:44PM +0200, Juergen Gross wrote:
> In order to have a link to the release notes in the feature list
> generated from SUPPORT.md add that link in the "Release Support"
> section of that file.
>
> The real link needs to be adapted when the version is being released.
>
On Tue, Oct 30, 2018 at 09:40:17AM -0600, Jan Beulich wrote:
> >>> On 30.10.18 at 16:32, wrote:
> > On Fri, Oct 26, 2018 at 09:21:03AM -0600, Jan Beulich wrote:
> >> >>> On 22.10.18 at 14:58, wrote:
> >> > --- a/xen/common/efi/boot.c
> >> > +++ b/xen/common/efi/boot.c
> >> > @@ -487,6 +487,7 @@
>>> On 30.10.18 at 17:13, wrote:
> New document-cum-checklist, for helping with hardware procurement.
>
> Signed-off-by: Ian Jackson
I don't think any acks should be needed here, but if so:
Acked-by: Jan Beulich
Jan
___
Xen-devel mailing list
info->nr_rings isn't adjusted in case of ENOMEM error from
negotiate_mq(). This leads to kernel panic in error path.
Typical call stack involving panic -
#8 page_fault at 8175936f
[exception RIP: blkif_free_ring+33]
RIP: a0149491 RSP: 8804f7673c08 RFLAGS: 00010292
Christian Lindig writes ("[Xen-devel] [PATCH 1/1] tools/ocaml: Re-introduce
Xenctrl.with_intf wrapper"):
> Commit 81946a73dc975a7dafe9017a8e61d1e64fdbedbf removed
> Xenctrl.with_intf based on its undesirable behaviour of opening and
> closing a Xenctrl connection with every invocation. This
On Tue, Oct 30, 2018 at 10:25:20AM -0600, Jan Beulich wrote:
> >>> On 29.10.18 at 13:40, wrote:
> > @@ -316,6 +339,22 @@ void p2m_memory_type_changed(struct domain *d)
> > }
> > }
> >
> > +void p2m_memory_type_changed(struct domain *d)
> > +{
> > +
Wei Liu writes ("Re: [PATCH] libxl: libxl__ev_fd_callback: Document
perhaps-no-retry semantics"):
> On Mon, Oct 15, 2018 at 03:01:07PM +0100, Ian Jackson wrote:
> > Signed-off-by: Ian Jackson
> > CC: Anthony PERARD
>
> I think you understand the event machinery more than I do, so feel free
>
On Fri, Oct 26, 2018 at 12:38:06PM +0200, Juergen Gross wrote:
> docs/ChangeLog has been updated for Xen 3.3 last time. It seems to be
> interesting for archaeologists only today.
>
> Remove it.
>
> Signed-off-by: Juergen Gross
I wouldn't mind removing it. Nowadays I mostly use git to do
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 30 October 2018 17:05
> To: Paul Durrant
> Cc: Julien Grall ; Andrew Cooper
> ; George Dunlap ; Ian
> Jackson ; Wei Liu ; Jun
> Nakajima ; Kevin Tian ;
> Stefano Stabellini ; xen-devel
On 30 October 2018 at 11:23, Laurent Vivier wrote:
> The following changes since commit 808ebd66e467f77c0d1f8c6346235f81e9c99cf2:
>
> Merge remote-tracking branch 'remotes/riscv/tags/riscv-for-master-3.1-sf0'
> into staging (2018-10-25 17:41:03 +0100)
>
> are available in the Git repository
BAR map/unmap is a long running operation that needs to be preempted
in order to avoid overrunning the assigned vCPU time (or even
triggering the watchdog).
Current logic for this preemption is wrong, and won't work at all for
AMD since only Intel makes use of hvm_io_pending (and even in that
No functional change intended.
Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Wei Liu
Cc: George Dunlap
Cc: Ian Jackson
Cc: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
---
xen/arch/x86/hvm/hvm.c
Hello,
The following series contain miscellaneous fixes for a PVH Dom0. I've
found out this issues while trying to boot on an AMD EPYC box.
The series can be found on my git repo:
git://xenbits.xen.org/people/royger/xen.git fixes-pvh-v3
Roger Pau Monne (7):
x86/pvh: fix TSC mode setup for
A PVH Dom0 might use TSC scaling or other HVM specific TSC
adjustments, so only short-circuit the TSC setup for a classic PV
Dom0.
Signed-off-by: Roger Pau Monné
Acked-by: Jan Beulich
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Wei Liu
---
xen/arch/x86/time.c | 2 +-
1 file changed, 1
PV Dom0 has a quirk for some AMD processors, where enabling ACPI can
also enable C1E mode. Apply the same workaround as done on PV for a
PVH Dom0, which consist on trapping accesses to the SMI command IO
port and disabling C1E if ACPI is enabled.
Reported-by: Jan Beulich
Signed-off-by: Roger Pau
When switching the memory decoding bit in the command register the
rest of the changes where dropped, leading to only the memory decoding
bit being updated.
Fix this by unconditionally writing the guest-requested command except
for the memory decoding bit, which will be updated once the p2m
Make sure the MSIX MMIO regions don't have p2m entries setup, so that
accesses to them trap into the hypervisor and can be handled by vpci.
This is a side-effect of commit 042678762 for PVH Dom0, which added
mappings for all the reserved regions into the Dom0 p2m.
Signed-off-by: Roger Pau Monné
On Tue, Oct 30, 2018 at 08:44:20AM -0600, Jan Beulich wrote:
> There's no guarantee that e.g. a switch() control expression's memory
> operand(s) get(s) read just once. Guard against the compiler producing
> "unexpected" code by sprinkling around some ACCESS_ONCE().
>
> I'm leaving alone
>>> On 29.10.18 at 13:40, wrote:
> This patch is a pre-requisite for the one fixing VGA logdirty
> freezes when using altp2m. It only concerns itself with the
> ranges allocation / deallocation / initialization part.
But while looking (briefly only for now) over patch 3 I couldn't
see any
On 10/30/18 6:22 PM, Jan Beulich wrote:
On 29.10.18 at 13:40, wrote:
>> This patch is a pre-requisite for the one fixing VGA logdirty
>> freezes when using altp2m. It only concerns itself with the
>> ranges allocation / deallocation / initialization part.
>
> But while looking (briefly only
Hi Stefano,
On 23/10/2018 03:02, Stefano Stabellini wrote:
Move unregister_init_virtual_region to init_done. Follow the same path
as x86. It is also useful to move it later so that create_domUs can be
called before that in following patches.
Signed-off-by: Stefano Stabellini
Reviewed-by:
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 30 October 2018 16:08
> To: Paul Durrant
> Cc: Julien Grall ; Andrew Cooper
> ; George Dunlap ; Wei
> Liu ; Ian Jackson ; Jun
> Nakajima ; Kevin Tian ;
> Stefano Stabellini ; xen-devel
> -Original Message-
> From: Roger Pau Monne
> Sent: 30 October 2018 17:18
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Wei Liu ; Ian
> Jackson ; Jan Beulich ; Andrew
> Cooper
> Subject: Re: [Xen-devel] [PATCH 8/8] viridian: introduce struct
> viridian_page
>
> On Mon, Oct
On Mon, Oct 29, 2018 at 08:55:09PM +, Paraschiv, Andra-Irina wrote:
>
>
> On Mon, Oct 29, 2018 at 04:58:22PM +0200, Pasi Kärkkäinen wrote:
> > Hi,
> >
> > On Wed, Oct 24, 2018 at 04:20:35PM +0100, Ian Jackson wrote:
> > > Andra Paraschiv writes ("[PATCH RESEND qemu-xen-traditional] xen/pt:
flight 129191 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/129191/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a0f01e8a22e15000e564f09e82eae13d7127be3c
baseline version:
ovmf
On Fri, Oct 26, 2018 at 10:02:19AM -0600, Jan Beulich wrote:
> >>> On 19.10.18 at 16:28, wrote:
> > @@ -1337,8 +1339,15 @@ static int fixup_page_fault(unsigned long addr,
> > struct cpu_user_regs *regs)
> > {
> > if ( !(regs->error_code & (PFEC_user_mode | PFEC_reserved_bit)) &&
>
This patch adds a couple of regs to the vm_event that are used by
the introspection. The base, limit and ar
bits are compressed into a uint64_t union so as not to enlarge the
vm_event.
Signed-off-by: Alexandru Isaila
Reviewed-by: Jan Beulich
---
Changes since V5:
- Rename
New document-cum-checklist, for helping with hardware procurement.
Signed-off-by: Ian Jackson
CC: in...@xenproject.org
---
README.hardware-acquisition | 310
1 file changed, 310 insertions(+)
create mode 100644 README.hardware-acquisition
diff
1 - 100 of 199 matches
Mail list logo