Hi Julien,
On 11 August 2017 at 23:32, Julien Grall wrote:
> Currently, cpregs.h is included in pretty much every files even for
> arm64. However, the only use for arm64 is when emulating co-processors.
>
> For arm32, cpregs.h rely on the presence of processor.h (define
>
>>> On 16.08.17 at 23:41, wrote:
> Hello Jan,
>
> On Wed, Aug 09, 2017 at 05:58:19AM -0600, Jan Beulich wrote:
>
>>
>> > On 08/08/17 21:08, Volodymyr Babchuk wrote:
>> >> +#ifndef __XEN_PUBLIC_ARCH_ARM_SMC_H__
>> >> +#define __XEN_PUBLIC_ARCH_ARM_SMC_H__
>> >> +
>>
+Hongbo Wang from Intel GPU virtualization team
On 08/17/17 06:36 +, Asharaf Perinchikkal wrote:
> Hi All,
>
> We are trying to do graphical virtualization in intel® Atom™
> E3845(MinnowBoard Turbot Quad-Core board) using xen.
>
> Is it possible to do graphical virtualization in intel®
>>> On 16.08.17 at 19:03, wrote:
> On 16/08/17 17:47, Andrew Cooper wrote:
>> On 16/08/17 16:23, Jan Beulich wrote:
>> On 16.08.17 at 13:22, wrote:
--- a/xen/drivers/passthrough/amd/iommu_init.c
+++
Hi All,
We are trying to do graphical virtualization in intel® Atom™ E3845(MinnowBoard
Turbot Quad-Core board) using xen.
Is it possible to do graphical virtualization in intel® Atom?
If yes,Could you please suggest what are versions of xen and linux recommended
to use and steps i need to
This run is configured for baseline tests only.
flight 71983 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71983/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 16
On 17/08/17 09:12, Sander Eikelenboom wrote:
> Hi Juergen,
>
> Today i pulled
> git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.gitfor-linus-4.14
> on top of current 4.13-rc5 linux tree.
>
> Unfortunately the kernel build fails with:
> GEN .version
> CHK
Hi All,
We are trying to do graphical virtualization in intel® Atom™ E3845(MinnowBoard
Turbot Quad-Core board) using xen.
Is it possible to do graphical virtualization in intel® Atom?
If yes,Could you please suggest what are versions of xen and linux recommended
to use and steps i need to
>>> On 16.08.17 at 18:17, wrote:
> On 16/08/17 16:07, Jan Beulich wrote:
> On 16.08.17 at 16:22, wrote:
>>> On 16/08/17 15:14, Andrew Cooper wrote:
On 16/08/17 15:11, Jan Beulich wrote:
On 16.08.17 at 15:58,
+Hongbo Wang from Intel GPU virtualization team
On 08/10/17 22:47 +, Monisha Barooah wrote:
> Hi Everyone,
> I am currently exploring on bringing up XenGT for an Intel embedded board.
>
> I came across this document relating to bringing up XenGT for the Sandy
> Bridge/Ivy Bridge/Haswell
> From: Gao, Chao
> Sent: Wednesday, August 16, 2017 1:12 PM
>
> The problem is for a VF of RC integrated PF (e.g. PF's BDF is
> 00:02.0), we would wrongly use 00:00.0 to search VT-d unit.
>
> If a PF is an extended function, the BDF of a traditional function
> within the same device should be
>>> On 16.08.17 at 18:47, wrote:
> On 16/08/17 16:23, Jan Beulich wrote:
> On 16.08.17 at 13:22, wrote:
>>> --- a/xen/arch/x86/mm/shadow/multi.c
>>> +++ b/xen/arch/x86/mm/shadow/multi.c
>>> @@ -3112,7 +3112,6 @@ static int
On Wed, 2017-08-16 at 14:43 +0800, Yi Sun wrote:
> On 17-08-16 14:38:28, Chao Peng wrote:
> >
> > On Wed, 2017-08-09 at 15:41 +0800, Yi Sun wrote:
> > >
> > > This patch implements get value domctl interface for MBA.
> > >
> > > Signed-off-by: Yi Sun
> > > ---
> >
>
Changes based on version 2.43b of AFL
---
Makefile | 2 +-
afl-fuzz.c | 233 ++---
hash_map.h | 82 ++
3 files changed, 306 insertions(+), 11 deletions(-)
create mode 100644 hash_map.h
diff --git a/Makefile
Hi Boris,
On 16/08/17 19:33, Boris Ostrovsky wrote:
.. so that it's easy to find pages that need to be scrubbed (those pages are
now marked with _PGC_need_scrub bit).
We keep track of the first unscrubbed page in a page buddy using first_dirty
field. For now it can have two values, 0 (whole
Hi Volodymyr,
On 16/08/17 19:44, Volodymyr Babchuk wrote:
On ARMv8 architecture we need to ensure that conditional check was passed
for a trapped SMC instruction that originates from AArch32 state
(ARM DDI 0487B.a page D7-2271).
Thus, we should not skip it while checking HSR.EC value.
For this
On Wed, Aug 16, 2017 at 06:47:23PM +, Andri Möll wrote:
> Hey,
>
> As per Andrew [Cooper]'s suggestion, writing here instead of #xen on
> Freenode.
>
> I'm trying out Xen (4.9.0) with OVMF (r21243.3858b4a1ff-1) and having it
> crash right on boot both with the 32b and 64b OVMF binaries. This
>>> On 17.08.17 at 11:35, wrote:
> On 17/08/17 09:37, Jan Beulich wrote:
> On 16.08.17 at 13:22, wrote:
>>> --- a/xen/arch/x86/time.c
>>> +++ b/xen/arch/x86/time.c
>>> @@ -976,10 +976,10 @@ static void __update_vcpu_system_time(struct
On Thu, Aug 10, 2017 at 11:10 AM, Oleksandr Andrushchenko
wrote:
> Hi,
>
> thank you very much for valuable comments and your time!
>
>
> On 08/10/2017 06:14 AM, Takashi Sakamoto wrote:
>>
>> Hi,
>>
>> On Aug 7 2017 21:22, Oleksandr Andrushchenko wrote:
>>>
>>> From: Oleksandr
On Fri, Jul 28, 2017 at 5:13 PM, Wei Liu wrote:
> On Tue, Jul 18, 2017 at 05:25:17PM +0300, Oleksandr Grytsov wrote:
>> From: Oleksandr Grytsov
>>
>> Changes since V3:
>> * libxl__device_add renamed to libxl__device_add_async and reworked
>>
On 17/08/17 08:30, Bhupinder Thakur wrote:
Hi Julien,
Hi Bhupinder,
On 11 August 2017 at 23:32, Julien Grall wrote:
Currently, cpregs.h is included in pretty much every files even for
arm64. However, the only use for arm64 is when emulating co-processors.
For
Changes based on commit 8956f82ce1321b89deda6895d58e5788d2198477
---
include/xen/xen.h | 1 +
include/xtf/hypercall.h| 8 +-
tests/mk_hcall/.main.c.swo | Bin 0 -> 12288 bytes
tests/mk_hcall/Makefile| 9 +++
tests/mk_hcall/main.c | 51 +
Based on commit 6c9abf0e8022807bb7d677570d0775659950ff1a
---
xen/Kconfig.debug | 7 +++-
xen/Rules.mk | 4 ++
xen/arch/arm/traps.c | 1 +
xen/arch/x86/Makefile | 2 +
xen/arch/x86/hvm/hypercall.c | 1 +
xen/arch/x86/hypercall.c | 1 +
Hi Boris,
On 16/08/17 19:33, Boris Ostrovsky wrote:
+static void check_one_page(struct page_info *pg)
+{
+#ifdef CONFIG_SCRUB_DEBUG
+mfn_t mfn = _mfn(page_to_mfn(pg));
+const uint64_t *ptr;
+unsigned int i;
+
+if ( !boot_scrub_done )
+return;
+
+ptr =
>>> On 16.08.17 at 13:22, wrote:
> Barriers are a complicated topic, a source of confusion, and their incorrect
> use is a common cause of bugs. It *really* doesn't help when Xen's API is the
> same as Linux, but its ABI different.
>
> Bring the two back in line, so
>>> On 16.08.17 at 20:47, wrote:
> Hey,
>
> As per Andrew [Cooper]'s suggestion, writing here instead of #xen on
> Freenode.
>
> I'm trying out Xen (4.9.0) with OVMF (r21243.3858b4a1ff-1) and having it
> crash right on boot both with the 32b and 64b OVMF binaries. This is on
>
A kernel configured with XEN_PV but without KVM_GUEST will fail to
build since the patch removing the adjust_exception_frame paravirt
op.
Fix this failure.
Reported-by: Sander Eikelenboom
Signed-off-by: Juergen Gross
---
arch/x86/xen/xen-asm_64.S | 1 -
flight 112664 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112664/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-rtds 6 xen-install fail in 112649 pass in 112664
test-armhf-armhf-xl-vhd 15
>>> On 16.08.17 at 19:18, wrote:
> In this case, rmb() is being used for its compiler barrier property. Replace
> it with an explicit barrer() and comment, to avoid it becoming an
> unnecessary
> lfence instruction (when rmb() gets fixed) or looking like an SMP issue.
>>> On 16.08.17 at 13:22, wrote:
> There is no functional change. Xen currently assignes smp_* meaning to
> the non-smp_* barriers.
>
> All of these uses are just to deal with shared memory between multiple
> processors, so use the smp_*() which are the correct
On Thu, Aug 17, 2017 at 03:10:44AM +, Tian, Kevin wrote:
> > From: Roger Pau Monne
> > Sent: Saturday, August 12, 2017 12:43 AM
> >
> > Hello,
> >
> > Currently iommu_inclusive_mapping is not working for PVH Dom0, this
>
> not working for all platforms or only older boxes? The subject
On Thu, Aug 17, 2017 at 03:28:29AM +, Tian, Kevin wrote:
> > From: Roger Pau Monne [mailto:roger@citrix.com]
> > Sent: Saturday, August 12, 2017 12:43 AM
> >
> > On certain Intel systems, as far as I can tell almost all pre-Haswell ones,
> > trying to boot a PVH Dom0 will freeze the box
This email will be a technical description of what I, Felix Schmoll, as a
Google Summer of Code student, did over summer.
=== Introduction / What is the project? ===
Fuzzing is a recent trend for systematic testing of interfaces by trying
more or less random inputs and iterating over them. A
* Thomas Garnier wrote:
> > > -model=small/medium assume you are on the low 32-bit. It generates
> > > instructions where the virtual addresses have the high 32-bit to be zero.
> >
> > How are these assumptions hardcoded by GCC? Most of the instructions should
> > be
> >
On x86 software page-table walkers depend on the fact that remote TLB flush
does an IPI: walk is performed lockless but with interrupts disabled and in
case the pagetable is freed the freeing CPU will get blocked as remote TLB
flush is required. On other architecture which don't require an IPI to
On Thu, Aug 17, 2017 at 03:12:02AM +, Tian, Kevin wrote:
> > From: Roger Pau Monne
> > Sent: Saturday, August 12, 2017 12:43 AM
> >
> > They are emulated by Xen, so they must not be mapped into Dom0 p2m.
> > Introduce a helper function to add the MMCFG areas to the list of
> > denied iomem
On 17/08/17 09:37, Jan Beulich wrote:
On 16.08.17 at 13:22, wrote:
>> There is no functional change. Xen currently assignes smp_* meaning to
>> the non-smp_* barriers.
>>
>> All of these uses are just to deal with shared memory between multiple
>> processors, so
On Thu, Aug 17, 2017 at 03:12:45AM +, Tian, Kevin wrote:
> > From: Roger Pau Monne
> > Sent: Saturday, August 12, 2017 12:43 AM
> >
> > This is emulated by Xen and must not be mapped into PVH Dom0 p2m.
>
> same comment as previous one. please send it separately.
This will only be mapped
On Wed, Aug 16, 2017 at 03:18:13PM +0800, Yi Sun wrote:
> On 17-08-15 11:50:15, Wei Liu wrote:
> > > struct feat_node {
> > > -/* cos_max and cbm_len are common values for all features so far. */
> > > +/* cos_max is common values for all features so far. */
> > > unsigned int
This run is configured for baseline tests only.
flight 71984 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71984/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-421
flight 71985 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71985/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
build-arm64 2 hosts-allocate broken like 71959
build-arm64-pvops
On Thu, Aug 17, 2017 at 12:32:17PM +0100, Wei Liu wrote:
> On Wed, Aug 09, 2017 at 04:34:10PM -0400, Lan Tianyu wrote:
> > diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
> > index f54fd49..94c9196 100644
> > --- a/tools/libxl/libxl_dom.c
> > +++ b/tools/libxl/libxl_dom.c
> > @@
On 17/08/17 09:49, Jan Beulich wrote:
On 16.08.17 at 20:47, wrote:
>> Hey,
>>
>> As per Andrew [Cooper]'s suggestion, writing here instead of #xen on
>> Freenode.
>>
>> I'm trying out Xen (4.9.0) with OVMF (r21243.3858b4a1ff-1) and having it
>> crash right on boot both with
On Thu, Aug 17, 2017 at 01:13:39PM +0300, Oleksandr Grytsov wrote:
> On Fri, Jul 28, 2017 at 5:13 PM, Wei Liu wrote:
> > On Tue, Jul 18, 2017 at 05:25:17PM +0300, Oleksandr Grytsov wrote:
> >> From: Oleksandr Grytsov
> >>
> >> Changes since V3:
>
On Wed, Aug 09, 2017 at 04:34:03PM -0400, Lan Tianyu wrote:
> This patch is to add irq request callback for platform implementation
> to deal with irq remapping request.
>
> Signed-off-by: Lan Tianyu
> ---
> xen/common/viommu.c | 15 +
>
On Wed, Aug 09, 2017 at 04:34:04PM -0400, Lan Tianyu wrote:
> This patch is to add get_irq_info callback for platform implementation
> to convert irq remapping request to irq info (E,G vector, dest, dest_mode
> and so on).
>
> Signed-off-by: Lan Tianyu
> ---
>
On Wed, Aug 09, 2017 at 04:34:02PM -0400, Lan Tianyu wrote:
[...]
>
> +int viommu_domctl(struct domain *d, struct xen_domctl_viommu_op *op,
> + bool *need_copy)
> +{
> +int rc = -EINVAL, ret;
> +
> +if ( !viommu_enabled() )
> +return rc;
> +
> +switch (
On Wed, Aug 09, 2017 at 04:34:05PM -0400, Lan Tianyu wrote:
> +Now just suppport single vIOMMU for one VM and introduced domtcls are
> compatible
> +with multi-vIOMMU support.
Is this still true? There is an ID field in the struct which can
distinguish multiple viommus, right?
> +
> +xl vIOMMU
On Wed, Aug 09, 2017 at 04:34:10PM -0400, Lan Tianyu wrote:
> diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
> index f54fd49..94c9196 100644
> --- a/tools/libxl/libxl_dom.c
> +++ b/tools/libxl/libxl_dom.c
> @@ -1060,6 +1060,42 @@ static int libxl__domain_firmware(libxl__gc *gc,
>
In some introspection usecases, an in-guest agent needs to communicate
with the external introspection agent. An existing mechanism is
HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
like all other hypercalls.
Introduce a mechanism whereby the introspection agent can
Hi Jan,
On Thu, Aug 17, 2017 at 01:45:54AM -0600, Jan Beulich wrote:
> >>> On 16.08.17 at 23:41, wrote:
> > Hello Jan,
> >
> > On Wed, Aug 09, 2017 at 05:58:19AM -0600, Jan Beulich wrote:
> >
> >>
> >> > On 08/08/17 21:08, Volodymyr Babchuk wrote:
> >> >> +#ifndef
On Thu, Aug 17, 2017 at 12:21:49PM +0200, Felix Schmoll wrote:
> Changes based on commit 8956f82ce1321b89deda6895d58e5788d2198477
> ---
> include/xen/xen.h | 1 +
> include/xtf/hypercall.h| 8 +-
> tests/mk_hcall/.main.c.swo | Bin 0 -> 12288 bytes
This should not be included.
Hi,
On 17/08/17 13:35, Volodymyr Babchuk wrote:
I wrote this small test program:
#include
struct test
{
int a[2];
};
int main (int argc, char* argv[])
{
printf("%d\n", ((struct test){{1,2}}).a[0]);
return 0;
}
It is compiles with gcc --std=c89 without warnings.
>>> On 17.08.17 at 14:35, wrote:
> On Thu, Aug 17, 2017 at 01:45:54AM -0600, Jan Beulich wrote:
>> >>> On 16.08.17 at 23:41, wrote:
>> > On Wed, Aug 09, 2017 at 05:58:19AM -0600, Jan Beulich wrote:
>> >> > On 08/08/17 21:08, Volodymyr
flight 112662 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112662/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 7 xen-boot fail REGR. vs. 112653
Hi,
This looks good to me. I have one question:
At 18:45 +0200 on 16 Aug (1502909149), Dario Faggioli wrote:
> @@ -474,7 +484,41 @@ static struct notifier_block cpu_nfb = {
> void __init rcu_init(void)
> {
> void *cpu = (void *)(long)smp_processor_id();
> +
> +
If there is inflight I/O in any non-last queue, blkback returns -EBUSY
directly, and never stops thread of remaining queue and processs them. When
removing vbd device with lots of disk I/O load, some queues with inflight
I/O still have blkback thread running even though the corresponding vbd
Signed-off-by: Bart Van Assche
Cc: Konrad Rzeszutek Wilk
Cc: Roger Pau Monn303251
Cc: xen-de...@lists.xenproject.org
---
drivers/block/xen-blkfront.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git
Signed-off-by: Bart Van Assche
Cc: Konrad Rzeszutek Wilk
Cc: Roger Pau Monn303251
Cc: xen-de...@lists.xenproject.org
---
drivers/block/xen-blkback/blkback.c | 1 +
drivers/block/xen-blkback/xenbus.c | 3 ++-
2 files
Avoid that smatch reports the following warning when building with
C=2 CHECK="smatch -p=kernel":
drivers/block/xen-blkback/blkback.c:710 xen_blkbk_unmap_prepare() warn:
inconsistent indenting
Signed-off-by: Bart Van Assche
Cc: Konrad Rzeszutek Wilk
This run is configured for baseline tests only.
flight 71988 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71988/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d75b8ac278bc9f0159aa7eb9a92fd2cc87a18d8c
baseline
On Thu, Aug 17, 2017 at 01:28:21PM +0100, Wei Liu wrote:
>On Thu, Aug 17, 2017 at 12:32:17PM +0100, Wei Liu wrote:
>> On Wed, Aug 09, 2017 at 04:34:10PM -0400, Lan Tianyu wrote:
>> > diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
>> > index f54fd49..94c9196 100644
>> > ---
> +if ( feat->mba_info.linear )
> +{
> +unsigned int mod;
> +
> +if ( feat->mba_info.thrtl_max >= 100 )
> +return false;
Can we do this check earlier, e.g. when it gets enumerated from CPUID?
> +
> +mod = *thrtl % (100 - feat->mba_info.thrtl_max);
> +
flight 112675 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112675/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
Hello,
On 08/18/2017 08:43 AM, Takashi Sakamoto wrote:
On Aug 17 2017 19:05, Oleksandr Grytsov wrote:
So, from the above we think that period elapsed event derived in the
described
ways may not improve latency and will complicate the system. So, for
that
reason we are thinking of the option
Hi Wei:
Thanks for your review.
On 2017年08月17日 19:18, Wei Liu wrote:
> On Wed, Aug 09, 2017 at 04:34:02PM -0400, Lan Tianyu wrote:
>> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
>> index ff39762..4b10f26 100644
>> --- a/xen/include/public/domctl.h
>> +++
flight 112677 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112677/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1
On Thu, Aug 17, 2017 at 05:23:46PM +0100, Anthony PERARD wrote:
> This means that the function will be call and the property
> acpi-pcihp-bsel will be set even if ACPI build is disable.
>
> To do PCI passthrough with Xen, the property acpi-pcihp-bsel needs to be
> set, but this was done only when
On Aug 17 2017 19:05, Oleksandr Grytsov wrote:
So, from the above we think that period elapsed event derived in the described
ways may not improve latency and will complicate the system. So, for that
reason we are thinking of the option 2) (Positions of actual data transmission
in any serial
On 08/17/2017 06:27 AM, Julien Grall wrote:
> Hi Boris,
>
> On 16/08/17 19:33, Boris Ostrovsky wrote:
>> +static void check_one_page(struct page_info *pg)
>> +{
>> +#ifdef CONFIG_SCRUB_DEBUG
>> +mfn_t mfn = _mfn(page_to_mfn(pg));
>> +const uint64_t *ptr;
>> +unsigned int i;
>> +
>> +
On Wed, Aug 16, 2017 at 11:10:46AM +0200, Igor Mammedov wrote:
> On Tue, 15 Aug 2017 22:24:08 +0300
> "Michael S. Tsirkin" wrote:
>
> > On Tue, Aug 15, 2017 at 02:07:51PM +0200, Igor Mammedov wrote:
> > > On Tue, 15 Aug 2017 12:15:48 +0100
> > > Anthony PERARD
Hi,
I wanted to bump this thread. I saw that the page still contain "Note
that we will add complete information related to Xen Project 4.9, in the
week after the 4.9 release.".
It looks like to me we added some features, but I am not sure if we
added all of them.
Cheers,
On 27/06/17
On 17/08/17 15:44, Wei Liu wrote:
> Currently all the users are within x86/mm.c. But that will change once
> we split PV specific mm code to another file. Lift that to page.h
> along side _PAGE_* in preparation for later patches.
>
> No functional change. Add some spaces around "|" while moving.
>
>>> On 17.08.17 at 16:19, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -652,7 +652,7 @@ int vmx_cpu_up(void)
>
> INIT_LIST_HEAD(_cpu(active_vmcs_list));
>
> -if ( (rc = vmx_cpu_up_prepare(cpu)) != 0 )
> +if ( (cpu
On 08/17/2017 10:59 AM, Jan Beulich wrote:
On 17.08.17 at 16:19, wrote:
>> --- a/xen/arch/x86/hvm/vmx/vmcs.c
>> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
>> @@ -652,7 +652,7 @@ int vmx_cpu_up(void)
>>
>> INIT_LIST_HEAD(_cpu(active_vmcs_list));
>>
>> -if ( (rc
On 17/08/17 15:19, Boris Ostrovsky wrote:
> diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
> index 0dc9442..3e7b9fc 100644
> --- a/xen/arch/x86/hvm/svm/svm.c
> +++ b/xen/arch/x86/hvm/svm/svm.c
> @@ -1538,7 +1538,7 @@ static int _svm_cpu_up(bool bsp)
> return -EINVAL;
flight 112680 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112680/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2
On 08/17/2017 05:03 AM, Juergen Gross wrote:
> A kernel configured with XEN_PV but without KVM_GUEST will fail to
> build since the patch removing the adjust_exception_frame paravirt
> op.
>
> Fix this failure.
>
> Reported-by: Sander Eikelenboom
> Signed-off-by: Juergen
On Thu, 17 Aug 2017 11:56:06 +0100
Andrew Cooper wrote:
> On 17/08/17 09:49, Jan Beulich wrote:
> On 16.08.17 at 20:47, wrote:
> >> Hey,
> >>
> >> As per Andrew [Cooper]'s suggestion, writing here instead of #xen on
> >> Freenode.
> >>
> >> I'm
Jan,
it’s been a while. Did you want to pick this up at some point again? I guess
the check we have done so far is by now out-of-date. Not sure whether anyone
tagged anything
It would also be a good opportunity for you guys to test run my script (Wei ran
it and it worked fine, but he didn’t
On Thu, Aug 17, 2017 at 1:09 AM, Ingo Molnar wrote:
>
>
> * Thomas Garnier wrote:
>
> > > > -model=small/medium assume you are on the low 32-bit. It generates
> > > > instructions where the virtual addresses have the high 32-bit to be
> > > > zero.
> > >
>
On Thu, Aug 17, 2017 at 4:09 AM, Ingo Molnar wrote:
>
> * Thomas Garnier wrote:
>
>> > > -model=small/medium assume you are on the low 32-bit. It generates
>> > > instructions where the virtual addresses have the high 32-bit to be zero.
>> >
>> > How are
Move two functions to pv/mm.c. Add prefix to init_guest_l4_table.
Export them via pv/mm.h. Fix up call sites.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 69 +---
xen/arch/x86/pv/dom0_build.c | 3 +-
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 54256b6a11..c2a73f123f 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -127,8 +127,6 @@
#include
#include
-#include
Those macros will soon be used in different files. They are PV
specific so move them to pv/mm.h.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 47 -
xen/include/asm-x86/pv/mm.h | 47
Export some of the get/put functions so that we can move PV mm code
trunk by trunk.
When moving code is done some of the functions might be made static
again.
Also fix coding style issues and use bool when appropriate.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c|
Move them and the helper functions to pv/mm.c. Use bool in the moved
code where appropriate.
Put BUG() in the stub because the callers will call BUG or BUG_ON
anyway.
Signed-off-by: Wei Liu
---
v4: add BUG() in stubs
---
xen/arch/x86/domain.c | 1 +
Also move pv_new_guest_cr3 there so that we don't have to export
mod_l1_entry.
Fix coding style issues. Change v to curr and d to currd where
appropriate.
Signed-off-by: Wei Liu
---
I can't convince git diff to produce sensible diff for donate_page
and steal_page. Those
And export it via a local header because it is going to be used by
several PV specific files.
Take the chance to change its return type to bool.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 46 --
xen/arch/x86/pv/mm.c | 40
Move them along side the non-compat variants.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/descriptor-tables.c | 40
xen/arch/x86/x86_64/compat/mm.c | 41 -
2 files changed, 40 insertions(+), 41
Move the code to pv/grant_table.c. Fix some coding style issues while
moving code.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 363 --
xen/arch/x86/pv/Makefile | 1 +
xen/arch/x86/pv/grant_table.c | 398
They are only used by PV code.
Fix coding style issues while moving. Move declarations to PV specific
header file.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 253
xen/arch/x86/pv/mm.c| 246
Move the split l4 setup code into the new function. The new function
is also going to contain other PV specific setup code in later patch.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 73 ++-
1 file changed, 40
Also take the chance to change d to currd. This function can't be
moved yet. It can only be moved with other functions.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 19 ++-
xen/arch/x86/pv/emul-priv-op.c | 3 ++-
xen/include/asm-x86/mm.h
Move the code to pv/mm.c and export it via pv/mm.h. Use bool for flush.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 44
xen/arch/x86/pv/mm.c| 35 +++
All emulation code is moved by now.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index a42720c8d1..dd8fa43ef3 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -127,8 +127,6
Take the chance to change v to curr and d to currd in code. Also
change the return type to bool. Fix up all the call sites.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 43 -
xen/arch/x86/pv/descriptor-tables.c | 42
Move the code to pv/emul-ptwr-op.c. Fix coding style issues while
moving the code.
Rename ptwr_emulated_read to pv_emul_ptwr_read and export it via
pv/mm.h because it is needed by other emulation code.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 308
They are only useful for PV guests. Also change preemptible to bool.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c| 2 +-
xen/arch/x86/mm.c| 12 ++--
xen/include/asm-x86/mm.h | 4 ++--
3 files changed, 9 insertions(+), 9 deletions(-)
diff --git
Move the code to pv/descriptor-tables.c. Add "pv_" prefix to
{set,destroy}_gdt. Fix up call sites. Move the declarations to new
header file. Fix coding style issues while moving code.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c | 11 ++-
1 - 100 of 146 matches
Mail list logo