On 07/08/17 22:56, Boris Ostrovsky wrote:
>
>> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
>> index 811e4ddb3f37..a3dcd83187ce 100644
>> --- a/arch/x86/xen/enlighten_pv.c
>> +++ b/arch/x86/xen/enlighten_pv.c
>> @@ -579,6 +579,71 @@ static void xen_write_ldt_entry(struct
flight 112508 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112508/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
build-armhf
flight 112512 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112512/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 6e414300b5f19d3045a0d21ad90ac2fe965478a5
baseline version:
ovmf 8853c2afc51c2cab862ac
In some introspection usecases, an in-guest agent needs to communicate
with the external introspection agent. An existing mechanism is
HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
like all other hypercalls.
Introduce a mechanism whereby the introspection agent can white
>>> Andrew Cooper 08/07/17 6:21 PM >>>
>On 07/08/17 17:06, Jan Beulich wrote:
> Andrew Cooper 08/07/17 5:40 PM >>>
>>> On 07/08/17 16:38, Jan Beulich wrote:
So a single NIC drove the system out of vectors? That's insane, I would
say, i.e. I'd call this a misconfigured system. But ye
>>> Andrew Cooper 08/07/17 7:19 PM >>>
>More than once, we've discussed freeing up the legacy PIC range of
>vectors, and freeing up the unallocated vectors in 0xfx.
And that's something I would prefer over the change proposed here,
albeit I realize that the amount of vectors to recover isn't that
On 08/08/17 08:02, Juergen Gross wrote:
> On 07/08/17 22:56, Boris Ostrovsky wrote:
>>> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
>>> index 811e4ddb3f37..a3dcd83187ce 100644
>>> --- a/arch/x86/xen/enlighten_pv.c
>>> +++ b/arch/x86/xen/enlighten_pv.c
>>> @@ -579,6 +579,7
On 28/07/17 11:23, Juergen Gross wrote:
> A Xen HVM guest running with KASLR enabled will die rather soon today
> due to the shared info page mapping is using va() too early. This was
As a minor grammar issue, either s/due to/because/ or s/mapping is
using/mapping using/
~Andrew
> introduced by
flight 112511 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112511/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 13 guest-saverestore fail REGR. vs. 112496
build-armhf-xsm
This run is configured for baseline tests only.
flight 71950 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71950/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 6e414300b5f19d3045a0d21ad90ac2fe965478a5
baseline v
On Sat, Aug 05, 2017 at 01:26:37AM +0800, Zhongze Liu wrote:
> Hi Wei,
>
> Thank you for reviewing my patch.
>
> 2017-08-04 23:20 GMT+08:00 Wei Liu :
> > I skim through this patch and have some questions.
> >
> > On Fri, Aug 04, 2017 at 10:20:25AM +0800, Zhongze Liu wrote:
> >> +
> >> +static int
On Tue, Aug 08, 2017 at 11:49:35AM +0100, Wei Liu wrote:
> On Sat, Aug 05, 2017 at 01:26:37AM +0800, Zhongze Liu wrote:
> > Hi Wei,
> >
> > Thank you for reviewing my patch.
> >
> > 2017-08-04 23:20 GMT+08:00 Wei Liu :
> > > I skim through this patch and have some questions.
> > >
> > > On Fri, A
flight 71949 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71949/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-daily-netboot-pygrub 1 build-check(1) blocked n/a
build-arm64-pvops
Hi Wei,
On 31/07/17 12:22, Wei Liu wrote:
A document for the release manager.
Signed-off-by: Wei Liu
Reviewed-by: Julien Grall
Cheers,
---
docs/process/xen-release-management.pandoc | 594 +
1 file changed, 594 insertions(+)
create mode 100644 docs/process/x
On 08/07/2017 04:59 PM, Jan Beulich wrote:
George Dunlap 08/07/17 12:27 PM >>>
>> So it seems that people are still not quite clear about what I'm proposing.
>
> And indeed your examples helped me understand better what you mean
> (or at least I hope they did).
>
>> Suppose someone builds a
On 01/08/17 18:13, Oleksandr Tyshchenko wrote:
Hi, Julien
On Tue, Aug 1, 2017 at 3:27 PM, Julien Grall wrote:
On 26/07/17 16:09, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Hi, all.
Hi,
Please CC maintainers and any relevant person on the cover letter. This is
quite useful
On Tue, Aug 08, 2017 at 11:27:35AM +0300, Alexandru Isaila wrote:
> In some introspection usecases, an in-guest agent needs to communicate
> with the external introspection agent. An existing mechanism is
> HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
> like all other hy
Hi,
On 26/07/17 16:09, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Modify the Linux IPMMU driver to be functional inside Xen.
All devices within a single Xen domain must use the same
IOMMU context no matter what IOMMU domains they are attached to.
This is the main difference between
On Ma, 2017-08-08 at 12:27 +0100, Wei Liu wrote:
> On Tue, Aug 08, 2017 at 11:27:35AM +0300, Alexandru Isaila wrote:
> >
> > In some introspection usecases, an in-guest agent needs to
> > communicate
> > with the external introspection agent. An existing mechanism is
> > HVMOP_guest_request_vm_ev
On 26/07/17 16:10, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
This is the PoC how to optimize page table deallocation sequence
by splitting it into separate chunks.
Use iommu_pt_cleanup_list to queue pages that need to be handled and
freed next time. Use free_page_table platform c
Hi Julien,
On 08/04/2017 11:15 AM, Sergej Proskurin wrote:
> Hi Julien,
>
> Sorry for the late reply.
>
> On 07/31/2017 04:38 PM, Julien Grall wrote:
>>
>> On 18/07/17 13:24, Sergej Proskurin wrote:
>>> Hi all,
>> Hi,
>>
>>> The function p2m_mem_access_check_and_get_page is called from the functi
flight 112513 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112513/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1 build-check(
On 08/08/17 13:17, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index c07999b518..904abafcae 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -2688,6 +2688,8 @@ static bool try_map_mmio(gfn_t gfn)
return !map_regions_p2mt(d, gfn, 1, mfn, p
On Sat, Jul 29, 2017 at 10:44:02AM -0600, Jan Beulich wrote:
> >>> Roger Pau Monne 07/24/17 4:58 PM >>>
> >On Fri, Jul 14, 2017 at 09:11:29AM -0600, Jan Beulich wrote:
> >> >>> On 30.06.17 at 17:01, wrote:
> >> > +static void vpci_bar_write(struct pci_dev *pdev, unsigned int reg,
> >> > +
On Fri, Aug 4, 2017 at 2:53 PM, Wei Liu wrote:
> On Wed, Aug 02, 2017 at 02:37:10PM +0300, Oleksandr Grytsov wrote:
> [...]
>> >> >> From other side this rename touches only internals changes: no changes
>> >> >> in config file
>> >> >> or CLI interface.
>> >> >>
>> >> >
>> >> > As said, the frame
On Mon, Aug 07, 2017 at 02:23:03PM +0530, Bhupinder Thakur wrote:
[...]
> +static void console_free(struct console *con)
> +{
> + if (con->xspath)
Pointless check here.
With this fixed:
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists
On Mon, Aug 07, 2017 at 02:22:58PM +0530, Bhupinder Thakur wrote:
> Add a new domctl API to initialize vpl011. It takes the GFN and console
> backend domid as input and returns an event channel to be used for
> sending and receiving events from Xen.
>
> Xen will communicate with xenconsole using G
On Mon, Aug 07, 2017 at 02:23:05PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new maybe_add_console_evtchn_fd function. This
> function adds the console event channel FD to list of polled FDs.
>
> Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
_
On Mon, Aug 07, 2017 at 02:23:06PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new maybe_add_console_tty_fd function. This function
> adds the tty fd to the list of polled fds.
>
> Signed-off-by: Bhupinder Thakur
> Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
___
On Mon, Aug 07, 2017 at 02:23:07PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_evtchn_unmask function. This function
> unmasks the console event channel if it is masked for some timeout
> period.
>
> One optimization that has been done is to merge the two 'for' loops.
>
>
On Mon, Aug 07, 2017 at 02:23:08PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new handle_console_ring function. This function
> reads the data from the ring buffer on receiving an event.
>
> The initialization of event channel poll fd to -1 is moved inside the
> handle_console_ring f
On 08/08/17 13:33, Julien Grall wrote:
>
>
> On 08/08/17 13:17, Sergej Proskurin wrote:
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index c07999b518..904abafcae 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -2688,6 +2688,8 @@ static bool t
On 08/08/2017 05:48 AM, Jan Beulich wrote:
Andrew Cooper 08/07/17 7:19 PM >>>
>> More than once, we've discussed freeing up the legacy PIC range of
>> vectors, and freeing up the unallocated vectors in 0xfx.
> And that's something I would prefer over the change proposed here,
> albeit I reali
On 08/08/17 14:25, Boris Ostrovsky wrote:
> On 08/08/2017 05:48 AM, Jan Beulich wrote:
> Andrew Cooper 08/07/17 7:19 PM >>>
>>> More than once, we've discussed freeing up the legacy PIC range of
>>> vectors, and freeing up the unallocated vectors in 0xfx.
>> And that's something I would prefer
On Mon, Aug 07, 2017 at 02:23:10PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_cleanup function. This function
> frees up the console resources.
>
> Signed-off-by: Bhupinder Thakur
> Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
___
On Tue, Aug 08, 2017 at 02:11:08PM +0100, Wei Liu wrote:
> > +else
> > +rc = -EINVAL;
>
> Indentation.
Ignore this please.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Mon, Aug 07, 2017 at 02:23:11PM +0530, Bhupinder Thakur wrote:
> This patch introduces a console_open_log console_cleanup function. This
> function
> opens the console log file.
>
> Signed-off-by: Bhupinder Thakur
> Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
___
The description in the Intel SDM of how the divide configuration
register is used: "The APIC timer frequency will be the processor's bus
clock or core crystal clock frequency divided by the value specified in
the divide configuration register."
Observation of baremetal shown that when the TDCR is
There should not be any functionality change with this patch.
This function is used when the APIC_TMICT register is updated.
vlapic_update_timer is introduce as it will be use also when the
registers APIC_LVTT and APIC_TDCR are updated.
Signed-off-by: Anthony PERARD
---
Changes in V3:
- removed
Hi,
When developing PVH for OVMF, I've used the lapic timer. It turns out that the
way it is used by OVMF did not work with Xen [1]. I tried to find out how
real-hw behave, and write a XTF tests [2]. And this patch series tries to fix
the behavior of the vlapic timer.
The OVMF driver for the APIC
If we take TSC-deadline mode timer out of the picture, the Intel SDM
does not say that the timer is disable when the timer mode is change,
either from one-shot to periodic or vice versa.
After this patch, the timer is no longer disarmed on change of mode, so
the counter (TMCCT) keeps counting down
Hi Bhupinder,
On 07/08/17 09:52, Bhupinder Thakur wrote:
diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
index 229e289..90eaa20 100644
--- a/tools/libxl/libxl.h
+++ b/tools/libxl/libxl.h
@@ -306,6 +306,11 @@
#define LIBXL_HAVE_BUILDINFO_HVM_ACPI_LAPTOP_SLATE 1
/*
+ * LIBXL_HAVE_VUART i
On 08/08/17 14:38, Julien Grall wrote:
Hi Bhupinder,
On 07/08/17 09:52, Bhupinder Thakur wrote:
diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
index 229e289..90eaa20 100644
--- a/tools/libxl/libxl.h
+++ b/tools/libxl/libxl.h
@@ -306,6 +306,11 @@
#define LIBXL_HAVE_BUILDINFO_HVM_ACPI_
Hi,
On 08/08/17 14:30, Wei Liu wrote:
On Tue, Aug 08, 2017 at 02:11:08PM +0100, Wei Liu wrote:
+else
+rc = -EINVAL;
Indentation.
Ignore this please.
You were right, the indentation is wrong :). It is 8 spaces rather than 4.
Cheers,
--
Julien Grall
flight 112515 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112515/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1 build-check(1)
On Mon, Aug 07, 2017 at 02:23:13PM +0530, Bhupinder Thakur wrote:
> This patch adds the support for multiple consoles and introduces the
> iterator functions to operate on multiple consoles.
>
Please check all the functions called by the iterator functions to make
sure they have properly guarded
On Mon, Aug 07, 2017 at 02:23:14PM +0530, Bhupinder Thakur wrote:
> This patch finally adds the support for vuart console. It adds
> two new fields in the console initialization:
>
> - optional
> - use_gnttab
>
> optional flag tells whether the console is optional.
>
> use_gnttab tells whether t
Hi Bhupinder,
On 07/08/17 09:52, Bhupinder Thakur wrote:
diff --git a/tools/libxl/libxl_arch.h b/tools/libxl/libxl_arch.h
index 5e1fc60..784ec7f 100644
--- a/tools/libxl/libxl_arch.h
+++ b/tools/libxl/libxl_arch.h
@@ -44,6 +44,13 @@ int libxl__arch_domain_finalise_hw_description(libxl__gc *gc,
On 08/08/2017 02:46 AM, Juergen Gross wrote:
> On 28/07/17 12:23, Juergen Gross wrote:
>> This patch series fixes a regression introduced in 4.13-rc1: A Xen
>> HVM guest with KASLR enabled wouldn't boot any longer due to the usage
>> of __va() before kernel_randomize_memory() was called.
>>
>> Chan
On 08/08/2017 09:28 AM, Andrew Cooper wrote:
> On 08/08/17 14:25, Boris Ostrovsky wrote:
>> On 08/08/2017 05:48 AM, Jan Beulich wrote:
>> Andrew Cooper 08/07/17 7:19 PM >>>
More than once, we've discussed freeing up the legacy PIC range of
vectors, and freeing up the unallocated vect
On 07/08/17 09:53, Bhupinder Thakur wrote:
The SBSA UART node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and consequently lives
Hi,
On 07/08/17 09:53, Bhupinder Thakur wrote:
1. Update documentation for a new vuart option added.
2. Update documentation about SPI irq reserved for vuart.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Coope
Hi All,
I am attaching xen boot log when xen fail to boot with updated kernel from UEFI
shell.
It show an error when kernel start booting..
N) ***
(XEN) WARNING: CONSOLE OUTPUT IS SYNCHRONOUS
(XEN) This option is intended to aid debugging of Xen by
On Mon, Aug 07, 2017 at 06:54:56PM -0500, Venu Busireddy wrote:
> Implement the callback function to handle unrecoverable AER errors, and
> also the public APIs that can be used to register/unregister the handler.
> When an AER error occurs, the handler will forcibly remove the erring
> PCIe device
On 08/08/17 16:26, Asharaf Perinchikkal wrote:
> Hi All,
>
> I am attaching xen boot log when xen fail to boot with updated kernel
> from UEFI shell.
> It show an error when kernel start booting..
>
> N) ***
> (XEN) WARNING: CONSOLE OUTPUT IS SYNCHR
On Tue, Aug 08, 2017 at 03:33:01PM +0100, Wei Liu wrote:
> > +
> > +int libxl_reg_aer_events_handler(libxl_ctx *ctx,
> > + uint32_t domid,
> > + libxl_aer_watch **aer_ws_out)
>
> Afaict libxl_aer_watch is an opaque type to external ca
Hi Julien,
> The patch belows solve my problem:
>
> diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c
> index b258248322..6ca994e438 100644
> --- a/xen/arch/arm/guest_walk.c
> +++ b/xen/arch/arm/guest_walk.c
> @@ -112,7 +112,7 @@ static int guest_walk_sd(const struct vcpu *v,
>
On 2017-08-08 15:33:01 +0100, Wei Liu wrote:
> On Mon, Aug 07, 2017 at 06:54:56PM -0500, Venu Busireddy wrote:
> > Implement the callback function to handle unrecoverable AER errors, and
> > also the public APIs that can be used to register/unregister the handler.
> > When an AER error occurs, the
Hi Julien,
>>
>> diff --git a/tools/libxl/libxl_arm.c b/tools/libxl/libxl_arm.c
>> index a33d3c9..6629852 100644
>> --- a/tools/libxl/libxl_arm.c
>> +++ b/tools/libxl/libxl_arm.c
>> @@ -43,11 +43,29 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
>> {
>> uint32_t nr_spis = 0;
>>
On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
> Make RTDS scheduler work conserving without breaking the real-time
> guarantees.
>
> VCPU model:
> Each real-time VCPU is extended to have an extratime flag
> and a priority_level field.
> When a VCPU's budget is depleted in the current period,
>
On 08/08/17 15:47, Sergej Proskurin wrote:
> Hi Julien,
>
>> The patch belows solve my problem:
>>
>> diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c
>> index b258248322..6ca994e438 100644
>> --- a/xen/arch/arm/guest_walk.c
>> +++ b/xen/arch/arm/guest_walk.c
>> @@ -112,7 +112,7 @
On 08/08/2017 04:58 PM, Andrew Cooper wrote:
> On 08/08/17 15:47, Sergej Proskurin wrote:
>> Hi Julien,
>>
>>> The patch belows solve my problem:
>>>
>>> diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c
>>> index b258248322..6ca994e438 100644
>>> --- a/xen/arch/arm/guest_walk.c
>
On Tue, Aug 08, 2017 at 03:39:23PM +0300, Oleksandr Grytsov wrote:
> On Fri, Aug 4, 2017 at 2:53 PM, Wei Liu wrote:
> > On Wed, Aug 02, 2017 at 02:37:10PM +0300, Oleksandr Grytsov wrote:
> > [...]
> >> >> >> From other side this rename touches only internals changes: no
> >> >> >> changes
> >> >>
Ian and Stefano
Oleksandr discovered that the p9fs array in libxl_domain_config is name
p9 instead of p9s. This causes problem for his work to rework device
framework.
Given that p9fs was added only during last release and the only known
external toolstack libvirt can't possibility use that, mayb
On Tue, Aug 08, 2017 at 09:51:36AM -0500, Venu Busireddy wrote:
> I will implement all your above suggestions in v4.
>
> > I think a bigger question is whether you agree with Ian's comments
> > regarding API design and whether you have more questions?
>
> Ian suggested that I document the use of
Hi Julien,
On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
> This commit adds functionality to walk the guest's page tables using the
> short-descriptor translation table format for both ARMv7 and ARMv8. The
> implementation is based on ARM DDI 0487B-a J1-6002 and ARM DDI 0406C-b
> B3-1506.
>
> S
On 08/08/17 16:17, Sergej Proskurin wrote:
Hi Julien,
On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
This commit adds functionality to walk the guest's page tables using the
short-descriptor translation table format for both ARMv7 and ARMv8. The
implementation is based on ARM DDI 0487B-a J1
On 08/08/2017 05:18 PM, Julien Grall wrote:
>
>
> On 08/08/17 16:17, Sergej Proskurin wrote:
>> Hi Julien,
>>
>>
>> On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
>>> This commit adds functionality to walk the guest's page tables using
>>> the
>>> short-descriptor translation table format for bo
On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
> Modify libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
> functions to support per-VCPU extratime flag
>
> Signed-off-by: Meng Xu
>
Reviewed-by: Dario Faggioli
Of course, if the flag name in domctl.h change, this will have to
chang
On Wed, Aug 02, 2017 at 07:34:28AM -0600, Jan Beulich wrote:
> >>> Roger Pau Monne 06/30/17 5:01 PM >>>
> >+int vpci_msi_arch_enable(struct vpci_arch_msi *arch, struct pci_dev *pdev,
> >+ uint64_t address, uint32_t data, unsigned int
> >vectors)
> >+{
> >+struct msi_in
We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ
vectors that are available to each processor. Currently, when x2apic
cluster mode is used (which is default), each vector is shared among
all processors in the cluster. With many IRQs (as is the case on systems
with multiple SR-I
Hi Bhupinder,
I gave another and I have a couple of comments.
Booting Linux with earlycon enabled take quite a while. I can see the
characters coming slower than on the minitel. It seems to be a bit
better after switching off the bootconsole. Overall Linux is taking ~20
times to boot with pl0
On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote:
> On Sun, Aug 6, 2017 at 12:22 PM, Meng Xu
> wrote:
> >
> > diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c
> > index 2c71a9f..88933a4 100644
> > --- a/tools/xl/xl_cmdtable.c
> > +++ b/tools/xl/xl_cmdtable.c
> > @@ -272,12 +272,13 @@
On Tue, 8 Aug 2017, Wei Liu wrote:
> Ian and Stefano
>
> Oleksandr discovered that the p9fs array in libxl_domain_config is name
> p9 instead of p9s. This causes problem for his work to rework device
> framework.
>
> Given that p9fs was added only during last release and the only known
> external
On 08/08/17 16:28, Sergej Proskurin wrote:
>
> On 08/08/2017 05:18 PM, Julien Grall wrote:
>>
>> On 08/08/17 16:17, Sergej Proskurin wrote:
>>> Hi Julien,
>>>
>>>
>>> On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
This commit adds functionality to walk the guest's page tables using
the
>
On Tue, Aug 08, 2017 at 09:19:21AM -0700, Stefano Stabellini wrote:
> On Tue, 8 Aug 2017, Wei Liu wrote:
> > Ian and Stefano
> >
> > Oleksandr discovered that the p9fs array in libxl_domain_config is name
> > p9 instead of p9s. This causes problem for his work to rework device
> > framework.
> >
On Tue, 8 Aug 2017, Wei Liu wrote:
> On Tue, Aug 08, 2017 at 09:19:21AM -0700, Stefano Stabellini wrote:
> > On Tue, 8 Aug 2017, Wei Liu wrote:
> > > Ian and Stefano
> > >
> > > Oleksandr discovered that the p9fs array in libxl_domain_config is name
> > > p9 instead of p9s. This causes problem for
On 08/08/2017 06:20 PM, Andrew Cooper wrote:
> On 08/08/17 16:28, Sergej Proskurin wrote:
>> On 08/08/2017 05:18 PM, Julien Grall wrote:
>>> On 08/08/17 16:17, Sergej Proskurin wrote:
Hi Julien,
On 07/18/2017 02:25 PM, Sergej Proskurin wrote:
> This commit adds functionali
Wei
On 31/07/17 12:22, Wei Liu wrote:
> A document for the release manager.
>
> Signed-off-by: Wei Liu
Reviewed-by: Lars Kurth
Regards
Lars
On 08/08/2017, 12:03, "Julien Grall" wrote:
Hi Wei,
On 31/07/17 12:22, Wei Liu wrote:
> A document for th
On Tue, 8 Aug 2017, Julien Grall wrote:
> On 01/08/17 18:13, Oleksandr Tyshchenko wrote:
> > Hi, Julien
> >
> > On Tue, Aug 1, 2017 at 3:27 PM, Julien Grall wrote:
> > > On 26/07/17 16:09, Oleksandr Tyshchenko wrote:
> > > >
> > > > From: Oleksandr Tyshchenko
> > > >
> > > > Hi, all.
> > >
>
Hi Stefano,
On Wed, Aug 2, 2017 at 12:15 AM, Stefano Stabellini
wrote:
[...]
> The main thing that will be different is the list of dependencies you
> need to install to build Xen. On Fedora it should be (I am using
> Raisin[1] as a reference):
Thank you for the pointer to Raisin.
I have mana
flight 112516 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112516/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
112456
test-armhf
Xen allows shared mapping to be Normal inner-cacheable with any inner cache
allocation strategy and no restriction of the outer-cacheability.
However, Xen is always mapping those region Normal Inner Write-Back
Outer Write-Back Inner-shareable. Per B2.8 "Mismatched memory
attributes" in ARM DDI 048
Regular BUG_ON()'s work fine by this point on all architectures, so drop the
custom infrastructure. Substitute BUG_ON(1) for BUG().
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Stefano Stabellini
CC: Julien Grall
---
xen/common/page_alloc.c | 16
1 file changed, 4 in
flight 112518 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112518/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4cf3f37c87ba1f9d58072444bd735e40e4779e70
baseline version:
ovmf 6e414300b5f19d3045a0d
Enforce the distinction between an instruction not implemented by the
emulator and the failure to emulate that instruction by defining a new
return code, X86EMUL_UNIMPLEMENTED.
This value should only be used by the core emulator if it fails to decode
the current instruction, and not by any of the
If case of a vm_event with the emulate_flags set, if the instruction
is not implemented by the emulator, the monitor should be notified instead
of directly injecting a hw exception.
This behavior can be used to re-execute an instruction not supported by
the emulator using the real processor (e.g. a
This patchset implements a new way of handling the instructions unimplemented
in x86emul. Instead of inserting a hardware exception the monitor will
be notified and it will to try to single-step the faulty instruction using the
real processor and then resume execution of the normal instruction flow
On Tue, Aug 8, 2017 at 12:06 PM, Petre Pircalabu wrote:
> If case of a vm_event with the emulate_flags set, if the instruction
> is not implemented by the emulator, the monitor should be notified instead
> of directly injecting a hw exception.
> This behavior can be used to re-execute an instruct
flight 112514 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112514/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
test-amd64-amd64-xl
On Tue, Aug 8, 2017 at 10:57 AM, Dario Faggioli
wrote:
> On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote:
>> Make RTDS scheduler work conserving without breaking the real-time
>> guarantees.
>>
>> VCPU model:
>> Each real-time VCPU is extended to have an extratime flag
>> and a priority_level fie
On Tue, Aug 8, 2017 at 9:09 AM, Dario Faggioli
wrote:
> On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote:
>> On Sun, Aug 6, 2017 at 12:22 PM, Meng Xu
>> wrote:
>> >
>> > diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c
>> > index 2c71a9f..88933a4 100644
>> > --- a/tools/xl/xl_cmdtable
Hello all,
This is third version. Instead of 4 patches, there are 7 now.
As part of the series, I make some functions in traps.c
available globally, moved SMC conditional check into
separate patch, changed how PSCI functiond numbers are defined.
Per-patch changes are described in corresponding pa
SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs.
SMCCC states that both HVC and SMC are valid conduits to call to a different
firmware functions. Thus, for example PSCI calls can be made both by
SMC or HVC. Also SMCCC defines function number coding for such calls.
Besides fun
From: Volodymyr Babchuk
The following list of functions:
- advance_pc()
- check_conditional_instr()
- inject_undef_exception()
- inject_iabt_exception()
- inject_dabt_exception()
- inject_vabt_exception()
are now globaly visible. This change is needed becase we plan to handle SMCs
in diff
vsmc.h provides definitions to construct SMC call function number according
to SMCCC. We don't need multiple definitions for one thing, and definitions
in vsmc.h are more generic than ones used in psci.h.
So psci.h will only provide function codes and whole SMC function number
will be constructed
On certain ARM arhcitectures SMC instruction can be conditional
(ARM DDI 0487A.k page D7-1949) and we need to check if that
conditional was meet.
Signed-off-by: Volodymyr Babchuk
---
This patch was separated from the next one
---
xen/arch/arm/traps.c | 6 ++
1 file changed, 6 insertions(+)
PSCI is part of HVC/SMC interface, so it should be handled in
appropriate place: `vsmc.c`. This patch just moves PSCI
handler calls from `traps.c` to `vsmc.c`.
PSCI is considered as two different "services" in terms of SMCCC.
Older PSCI 1.0 is treated as "architecture service", while never
PSCI 2.
From: Volodymyr Babchuk
There are standard functions set_user_reg() and get_user_reg(). We can
use them in PSCI_SET_RESULT()/PSCI_ARG() macroses instead of relying on
CONFIG_ARM_64 definition.
Signed-off-by: Volodymyr Babchuk
---
xen/arch/arm/traps.c | 38 +-
PSCI handling code had helper routine that checked calling convention.
It does not needed anymore, because:
- Generic handler checks that 64 bit calls can be made only by
64 bit guests.
- SMCCC requires that 64-bit handler should support both 32 and 64 bit
calls even if they originate fro
1 - 100 of 132 matches
Mail list logo