Hi Jan,
On 06/03/2024 09:59, Jan Beulich wrote:
On 06.03.2024 10:44, Julien Grall wrote:
On 06/03/2024 07:22, Jan Beulich wrote:
On 05.03.2024 20:24, Julien Grall wrote:
The title is quite confusing. I would have expected the macro...
On 05/03/2024 08:33, Jan Beulich wrote:
There's no use
On 06.03.2024 15:57, Anthony PERARD wrote:
> On Thu, Dec 07, 2023 at 11:48:12AM +0100, Jan Beulich wrote:
>> Passing in $(CFLAGS) means also requesting inclusion of certain headers
>> (via -include command line options). That's particularly xen/config.h,
>> which in turn requires
On Thu, Dec 07, 2023 at 11:49:04AM +0100, Jan Beulich wrote:
> As of 732571959f17 ("xen/build: use new $(c_flags) and $(a_flags)
> instead of $(CFLAGS)") -M options aren't part of CFLAGS anymore, and
> c_flags isn't supposed to be passed to this macro. Drop the now dead
> part of filtering.
>
>
On 06/03/2024 10:49 am, Jan Beulich wrote:
> On 06.03.2024 11:33, Andrew Cooper wrote:
>> On 05/03/2024 2:04 pm, Jan Beulich wrote:
>>> --- a/xen/arch/x86/x86_64/entry.S
>>> +++ b/xen/arch/x86/x86_64/entry.S
>>> @@ -52,7 +52,7 @@ UNLIKELY_END(syscall_no_callback)
>>> movq
In light of recent observations with how macros are handled by gas,
let's play by what we informally set for ourselves as a guideline: Use
commas to separate parameters/arguments.
Requested-by: Andrew Cooper
Signed-off-by: Jan Beulich
---
In INDIRECT_{CALL,JMP} adding commas to the arguments
I'd still prefer to hide the vm_area, but for now:
Reviewed-by: Christoph Hellwig
On 06.03.2024 12:16, Juergen Gross wrote:
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -206,6 +206,12 @@ Maintainers List (try to look for most precise areas
> first)
>
> ---
>
> +9PFSD
> +M: Juergen Gross
> +M: Anthony PERARD
> +S:
flight 184918 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184918/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
Hi Michal,
On 2/15/24 14:53, John Ernberg wrote:
> Hi Michal,
>
> On 2/15/24 10:02, Michal Orzel wrote:
>> Hi,
>>
>> On 14/02/2024 17:06, John Ernberg wrote:
>>>
>>>
>>> When using Linux for dom0 there are a bunch of drivers that need to
>>> do SMC
>>> SIP calls into the firmware to enable
Add an entry to CHANGELOG.md regarding the new xen-9pfsd daemon.
Signed-off-by: Juergen Gross
---
CHANGELOG.md | 2 ++
1 file changed, 2 insertions(+)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index f9874f9bb0..93fda73c00 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -18,6 +18,8 @@ The format
Add me as the maintainer for the tools/9pfsd directory.
Signed-off-by: Juergen Gross
---
MAINTAINERS | 6 ++
1 file changed, 6 insertions(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index 076cf1e141..28fb35582b 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -206,6 +206,12 @@ Maintainers List
On 06.03.24 12:23, Jan Beulich wrote:
On 06.03.2024 12:16, Juergen Gross wrote:
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -206,6 +206,12 @@ Maintainers List (try to look for most precise areas first)
---
+9PFSD
+M: Juergen Gross
+M: Anthony
Hi Julien,
On 2/9/24 14:14, John Ernberg wrote:
> Hi Julien,
>
> Apologies for the delay, I was pulled away for a bit.
>
> On 2/5/24 11:13, Julien Grall wrote:
>> Hi,
>>
>> On 04/02/2024 09:40, Peng Fan wrote:
>>>
>>>
-Original Message-
From: Julien Grall
Sent: 2024年2月2日
On 26.02.2024 18:38, Oleksii Kurochko wrote:
> The header was taken from Linux kernl 6.4.0-rc1.
>
> Addionally, were updated:
> * add emulation of {cmp}xchg for 1/2 byte types using 32-bit atomic
> access.
> * replace tabs with spaces
> * replace __* variale with *__
> * introduce generic
flight 184917 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184917/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 6 xen-buildfail REGR. vs. 184912
Tests which did
On 26.02.2024 18:38, Oleksii Kurochko wrote:
> --- /dev/null
> +++ b/xen/arch/riscv/include/asm/atomic.h
> @@ -0,0 +1,296 @@
> +/* SPDX-License-Identifier: GPL-2.0-only */
> +/*
> + * Taken and modified from Linux.
> + *
> + * The following changes were done:
> + * - *
On 05/03/2024 2:04 pm, Jan Beulich wrote:
> --- a/xen/arch/x86/x86_64/entry.S
> +++ b/xen/arch/x86/x86_64/entry.S
> @@ -52,7 +52,7 @@ UNLIKELY_END(syscall_no_callback)
> movq %rax,TRAPBOUNCE_eip(%rdx)
> movb %cl,TRAPBOUNCE_flags(%rdx)
> call create_bounce_frame
> -
Add a support statement for the new xen-9pfsd backend. Set it to
"Experimental", as some functionality for Linux guests is missing
(only tested to work with Xenstore-stubdom).
Signed-off-by: Juergen Gross
---
SUPPORT.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/SUPPORT.md b/SUPPORT.md
On 06.03.2024 12:14, Andrew Cooper wrote:
> On 06/03/2024 10:49 am, Jan Beulich wrote:
>> On 06.03.2024 11:33, Andrew Cooper wrote:
>>> On 05/03/2024 2:04 pm, Jan Beulich wrote:
--- a/xen/arch/x86/x86_64/entry.S
+++ b/xen/arch/x86/x86_64/entry.S
@@ -52,7 +52,7 @@
On Thu, Dec 07, 2023 at 11:48:12AM +0100, Jan Beulich wrote:
> Passing in $(CFLAGS) means also requesting inclusion of certain headers
> (via -include command line options). That's particularly xen/config.h,
> which in turn requires generated/autoconf.h. This has not caused any
> problems so far
On 06.03.2024 11:24, Julien Grall wrote:
> On 06/03/2024 09:59, Jan Beulich wrote:
>> On 06.03.2024 10:44, Julien Grall wrote:
>>> On 06/03/2024 07:22, Jan Beulich wrote:
On 05.03.2024 20:24, Julien Grall wrote:
> The title is quite confusing. I would have expected the macro...
>
On 06/03/2024 11:25 am, Jan Beulich wrote:
> In light of recent observations with how macros are handled by gas,
> let's play by what we informally set for ourselves as a guideline: Use
> commas to separate parameters/arguments.
>
> Requested-by: Andrew Cooper
> Signed-off-by: Jan Beulich
> ---
On Tue, Mar 05, 2024 at 04:23:23PM +0100, Jürgen Groß wrote:
> On 05.03.24 15:33, Jan Beulich wrote:
> > Neither pread() / pwrite() nor O_DIRECTORY are available from glibc
> > 2.11.3 headers without defining (e.g.) _GNU_SOURCE. Supplying the
> > definition unconditionally shouldn't be a problem,
flight 184914 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184914/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 12 windows-install fail in 184907 pass in
184914
Arrange for Disp8 JMPs to be usable. On top of the MOVL->MOVB conversion
this further reduces entry point size, such that in particular INT3 (for
guarding against straight line speculation) would then also still fit
within the same 16-byte block, irrespective of CET-IBT being enabled. Of
course
On 06.03.2024 11:33, Andrew Cooper wrote:
> On 05/03/2024 2:04 pm, Jan Beulich wrote:
>> --- a/xen/arch/x86/x86_64/entry.S
>> +++ b/xen/arch/x86/x86_64/entry.S
>> @@ -52,7 +52,7 @@ UNLIKELY_END(syscall_no_callback)
>> movq %rax,TRAPBOUNCE_eip(%rdx)
>> movb
On 06.03.2024 12:27, Juergen Gross wrote:
> Add a support statement for the new xen-9pfsd backend. Set it to
> "Experimental", as some functionality for Linux guests is missing
> (only tested to work with Xenstore-stubdom).
>
> Signed-off-by: Juergen Gross
Acked-by: Jan Beulich
On 06/03/2024 7:34 am, Jan Beulich wrote:
> In light of recent observations with how macros are handled by gas,
> let's play by what we informally set for ourselves as a guideline: Use
> commas to separate parameters/arguments.
>
> Signed-off-by: Jan Beulich
Acked-by: Andrew Cooper
However,
On Wed, Feb 28, 2024 at 11:39:47AM +, Fouad Hilly wrote:
> From: Pritha Srivastava
>
> xl now knows how to drive tapdisk, so modify libxenstat to
> understand vbd3 statistics.
>
> Signed-off-by: Pritha Srivastava
> Signed-off-by: Jorge Martin
> Signed-off-by: Fouad Hilly
Reviewed-by:
Much like was recently done for setting entry vector, and along the
lines of what we already had in handle_exception_saved, avoid 32-bit
immediates where 8-bit ones do. Reduces .text.entry size by 16 bytes in
my non-CET reference build, while in my CET reference build section size
doesn't change
On 26.02.2024 18:38, Oleksii Kurochko wrote:
> --- /dev/null
> +++ b/xen/arch/riscv/include/asm/io.h
> @@ -0,0 +1,157 @@
> +/* SPDX-License-Identifier: GPL-2.0-only */
> +/*
> + * The header taken form Linux 6.4.0-rc1 and is based on
> + * arch/riscv/include/asm/mmio.h with the following
linux-4.19 branch in xenbits is outdated, it haven't been updated and
tested since 2020 as it has been disabled in osstest. Also, this 4.19
branch doesn't build on Bookworm.
So we will start to use a newer version of Linux. We switch to 6.1 for
the Arm* tests recently, so will use that same
While doing so is intentional when invoking the actual callback, to
mimic a hard-coded SYCALL_MASK / FMASK MSR, the same should not be done
when no handler is available and hence #UD is raised.
Fixes: ca6fcf4321b3 ("x86/pv: Inject #UD for missing SYSCALL callbacks")
Reported-by: Andrew Cooper
On Tue, Mar 05, 2024 at 11:45:13PM +0100, zithro / Cyril Rébert wrote:
> Add the shutdown reasons to the paragraph of "xl list" concerning the
> shutdown status.
> I have copy/pasted the explanations from the source code :
>
> - tools/xl/xl_info.c (L379)
Instead of a line number, how about the
On 3/6/2024 12:05, Sébastien Chaumat wrote:
Le mer. 6 mars 2024 à 18:33, Mario Limonciello
mailto:mario.limoncie...@amd.com>> a écrit :
On 3/6/2024 11:28, Sébastien Chaumat wrote:
>
>
>
>
> Reasoning backward (using a kernel without the pinctrl_amd
On Tue, Mar 05, 2024 at 11:45:13PM +0100, zithro / Cyril Rébert wrote:
> Add the shutdown reasons to the paragraph of "xl list" concerning the
> shutdown status.
> I have copy/pasted the explanations from the source code :
>
> - tools/xl/xl_info.c (L379)
> - xen/include/public/sched.h (starting
Le mer. 6 mars 2024 à 19:08, Mario Limonciello
a écrit :
> On 3/6/2024 12:05, Sébastien Chaumat wrote:
> >
> >
> > Le mer. 6 mars 2024 à 18:33, Mario Limonciello
> > mailto:mario.limoncie...@amd.com>> a écrit :
> >
> > On 3/6/2024 11:28, Sébastien Chaumat wrote:
> > >
> > >
> >
On 3/6/2024 12:49, Sébastien Chaumat wrote:
Le mer. 6 mars 2024 à 19:08, Mario Limonciello
mailto:mario.limoncie...@amd.com>> a écrit :
On 3/6/2024 12:05, Sébastien Chaumat wrote:
>
>
> Le mer. 6 mars 2024 à 18:33, Mario Limonciello
>
Hi all,
Please add your proposed agenda items below.
https://cryptpad.fr/pad/#/2/pad/edit/VlIkjPmILf0abDG3j1Wn0091/
If any action items are missing or have been resolved, please add/remove
them from the sheet.
*CALL LINK: https://meet.jit.si/XenProjectCommunityCall
Hi Juergen,
Looks good to me:
Acked-by: Oleksii Kurochko
~ Oleksii
On Wed, 2024-03-06 at 12:17 +0100, Juergen Gross wrote:
> Add an entry to CHANGELOG.md regarding the new xen-9pfsd daemon.
>
> Signed-off-by: Juergen Gross
> ---
> CHANGELOG.md | 2 ++
> 1 file changed, 2 insertions(+)
>
>
On 06/03/2024 5:09 pm, Ross Lagerwall wrote:
> On Tue, Mar 5, 2024 at 2:17 PM Jan Beulich wrote:
>> On 05.03.2024 13:11, Andrew Cooper wrote:
>>> --- a/xen/include/xen/virtual_region.h
>>> +++ b/xen/include/xen/virtual_region.h
>>> @@ -16,6 +16,9 @@ struct virtual_region
>>> const void
Reasoning backward (using a kernel without the pinctrl_amd driver to
> ensure xen only is at stake) :
> checking the diff in IOAPIC between bare metal and xen (IRQ7 is on
> pin07 on APIC )
>
> using kernel argument : apic=debug
>
> bare metal :
> [0.715330] fedora kernel: ... APIC
On Wed, Mar 6, 2024 at 6:19 AM Christoph Hellwig wrote:
>
> I'd still prefer to hide the vm_area, but for now:
>
> Reviewed-by: Christoph Hellwig
Thank you.
I will think of a way to move get_vm_area() to mm/internal.h and
propose a plan by lsf/mm/bpf in May.
ping ^ 2
On 13/12/23 18:00, Philippe Mathieu-Daudé wrote:
ping?
On 14/11/23 17:31, Philippe Mathieu-Daudé wrote:
Hi,
While looking at Xen target-specific code, I noticed some
generic code used by x86 which is not implemented for ARM.
Maybe ARM machines don't need it, I don't know. But I
On 14/11/23 16:49, David Woodhouse wrote:
On 14 November 2023 09:38:06 GMT-05:00, "Philippe Mathieu-Daudé"
wrote:
To avoid a potential global variable shadow in
hw/i386/pc_piix.c::pc_init1(), rename Xen's
"ram_memory" as "xen_memory".
Signed-off-by: Philippe Mathieu-Daudé
Well OK, but
Le mer. 6 mars 2024 à 18:33, Mario Limonciello
a écrit :
> On 3/6/2024 11:28, Sébastien Chaumat wrote:
> >
> >
> >
> >
> > Reasoning backward (using a kernel without the pinctrl_amd driver
> > to ensure xen only is at stake) :
> > checking the diff in IOAPIC between bare metal
Hello:
This series was applied to bpf/bpf-next.git (master)
by Andrii Nakryiko :
On Mon, 4 Mar 2024 19:05:14 -0800 you wrote:
> From: Alexei Starovoitov
>
> v3 -> v4
> - dropped VM_XEN patch for now. It will be in the follow up.
> - fixed constant as pointed out by Mike
>
> v2 -> v3
> -
The Xen PVH entrypoint is 32bit non-PIC code running at a default load
address of 0x100 (16MB) (CONFIG_PHYSICAL_START). Xen loads the
kernel at that physical address inside the PVH container.
When running a PVH Dom0, the system reserved addresses are mapped 1-1
into the PVH container. There
On Tue, Mar 5, 2024 at 2:17 PM Jan Beulich wrote:
>
> On 05.03.2024 13:11, Andrew Cooper wrote:
> > --- a/xen/include/xen/virtual_region.h
> > +++ b/xen/include/xen/virtual_region.h
> > @@ -16,6 +16,9 @@ struct virtual_region
> > const void *text_start;/* .text virtual
flight 184920 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184920/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
Expand bzimage_parse() to return kernel_alignment from the setup_header.
This will be needed if loading a PVH kernel at a physical offset to
compensate for a reserved E820 region.
Signed-off-by: Jason Andryuk
---
xen/arch/x86/bzimage.c | 4 +++-
xen/arch/x86/hvm/dom0_build.c |
Xen tries to load a PVH dom0 kernel at the fixed guest physical address
from the elf headers. For Linux, this defaults to 0x100 (16MB), but
it can be configured.
Unfortunately there exist firmwares that have reserved regions at this
address, so Xen fails to load the dom0 kernel since it's
Xen tries to load a PVH dom0 kernel at the fixed guest physical address
from the elf headers. For Linux, this defaults to 0x100 (16MB), but
it can be configured.
Unfortunately there exist firmwares that have reserved regions at this
address, so Xen fails to load the dom0 kernel since it's
Replace hard tabs to match the rest of the file.
Fixes: 48a3fd1432 ("domain: expose newly introduced hypercalls as XENFEAT")
Signed-off-by: Jason Andryuk
---
xen/include/public/features.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/include/public/features.h
When device_model_args is set we almost certainly want to spawn the
device model. This is most useful when debugging with QEMU and you
want to specify a new device type for testing without teaching libxl
about the device itself.
Signed-off-by: Alex Bennée
---
This is very much an RFC, it's
While debugging VirtIO on Arm we ran into a warning due to memory
being memcpy'd across MMIO space. While the bug was in the mappings
the warning was a little confusing:
(XEN) d47v2 Rn should not be equal to Rt except for r31
(XEN) d47v2 unhandled Arm instruction 0x3d80
(XEN) d47v2
Cc'ing Anton.
On 14/11/23 15:38, Philippe Mathieu-Daudé wrote:
Per commit f17068c1c7 ("xen-hvm: reorganize xen-hvm and move common
function to xen-hvm-common"), handle_ioreq() is expected to be
target-agnostic. However it uses 'target_ulong', which is a target
specific definition.
Per
On 3/6/2024 11:28, Sébastien Chaumat wrote:
Reasoning backward (using a kernel without the pinctrl_amd driver
to ensure xen only is at stake) :
checking the diff in IOAPIC between bare metal and xen (IRQ7 is
on pin07 on APIC )
using kernel argument : apic=debug
On 3/4/2024 12:33 AM, Xin Li (Intel) wrote:
As TOP_OF_KERNEL_STACK_PADDING is defined as 0 on x86_64, no one noticed
it's missing in the calculation of the .sp field in INIT_THREAD until it
is defined to 16 with CONFIG_X86_FRED=y.
Subtract TOP_OF_KERNEL_STACK_PADDING from the .sp field of
On Wed, Mar 6, 2024 at 1:04 PM Pasha Tatashin wrote:
>
> On Mon, Mar 4, 2024 at 10:05 PM Alexei Starovoitov
> wrote:
> >
> > From: Alexei Starovoitov
> >
> > vmap/vmalloc APIs are used to map a set of pages into contiguous kernel
> > virtual space.
> >
> > get_vm_area() with appropriate flag is
On Mon, Mar 4, 2024 at 10:05 PM Alexei Starovoitov
wrote:
>
> From: Alexei Starovoitov
>
> vmap/vmalloc APIs are used to map a set of pages into contiguous kernel
> virtual space.
>
> get_vm_area() with appropriate flag is used to request an area of kernel
> address range. It's used for vmalloc,
On Wed, Mar 6, 2024 at 2:57 PM Pasha Tatashin wrote:
>
> On Wed, Mar 6, 2024 at 5:13 PM Alexei Starovoitov
> wrote:
> >
> > On Wed, Mar 6, 2024 at 1:46 PM Pasha Tatashin
> > wrote:
> > >
> > > > > This interface and in general VM_SPARSE would be useful for
> > > > > dynamically grown kernel
Le mer. 6 mars 2024 à 19:51, Mario Limonciello
a écrit :
> On 3/6/2024 12:49, Sébastien Chaumat wrote:
> >
> >
> > Le mer. 6 mars 2024 à 19:08, Mario Limonciello
> > mailto:mario.limoncie...@amd.com>> a écrit :
> >
> > On 3/6/2024 12:05, Sébastien Chaumat wrote:
> > >
> > >
> >
flight 184919 xen-unstable real [real]
flight 184926 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/184919/
http://logs.test-lab.xenproject.org/osstest/logs/184926/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
On Wed, 6 Mar 2024, Jason Andryuk wrote:
> Replace hard tabs to match the rest of the file.
>
> Fixes: 48a3fd1432 ("domain: expose newly introduced hypercalls as XENFEAT")
> Signed-off-by: Jason Andryuk
Reviewed-by: Stefano Stabellini
> > This interface and in general VM_SPARSE would be useful for
> > dynamically grown kernel stacks [1]. However, the might_sleep() here
> > would be a problem. We would need to be able to handle
> > vm_area_map_pages() from interrupt disabled context therefore no
> > sleeping. The caller would
On Wed, Mar 6, 2024 at 5:13 PM Alexei Starovoitov
wrote:
>
> On Wed, Mar 6, 2024 at 1:46 PM Pasha Tatashin
> wrote:
> >
> > > > This interface and in general VM_SPARSE would be useful for
> > > > dynamically grown kernel stacks [1]. However, the might_sleep() here
> > > > would be a problem. We
On 3/6/2024 14:34, Sébastien Chaumat wrote:
Le mer. 6 mars 2024 à 19:51, Mario Limonciello
mailto:mario.limoncie...@amd.com>> a écrit :
On 3/6/2024 12:49, Sébastien Chaumat wrote:
>
>
> Le mer. 6 mars 2024 à 19:08, Mario Limonciello
>
On March 6, 2024 10:28:25 AM PST, Xin Li wrote:
>On 3/4/2024 12:33 AM, Xin Li (Intel) wrote:
>> As TOP_OF_KERNEL_STACK_PADDING is defined as 0 on x86_64, no one noticed
>> it's missing in the calculation of the .sp field in INIT_THREAD until it
>> is defined to 16 with CONFIG_X86_FRED=y.
>>
>>
On Wed, Mar 6, 2024 at 1:46 PM Pasha Tatashin wrote:
>
> > > This interface and in general VM_SPARSE would be useful for
> > > dynamically grown kernel stacks [1]. However, the might_sleep() here
> > > would be a problem. We would need to be able to handle
> > > vm_area_map_pages() from interrupt
Hi John,
> Ping on the watchdog discussion bits.
Sorry for the late reply.
On 06/03/2024 13:13, John Ernberg wrote:
On 2/9/24 14:14, John Ernberg wrote:
* IMX_SIP_TIMER_*: This seems to be related to the watchdog.
Shouldn't dom0 rely on the watchdog provided by Xen instead? So those
On Sun, Feb 18, 2024 at 10:01 AM Julien Grall wrote:
>
> Hi Jan,
>
> On 14/02/2024 10:12, Jan Beulich wrote:
> > find_ring_mfn() already holds a page reference when trying to obtain a
> > writable type reference. We shouldn't make assumptions on the general
> > reference count limit being
On Wed, Mar 06, 2024 at 02:37:20PM -0600, Mario Limonciello wrote:
> On 3/6/2024 14:34, Sébastien Chaumat wrote:
> >
> >
> > Le mer. 6 mars 2024 à 19:51, Mario Limonciello
> > mailto:mario.limoncie...@amd.com>> a écrit :
> >
> > On 3/6/2024 12:49, Sébastien Chaumat wrote:
> > >
> >
Hi Julien
Am 04.03.2024 um 23:15 schrieb Julien Grall:
Hi Paul,
On 01/03/2024 19:37, Paul Leiber wrote:
Stopping xen-watchdog prevents the reboot. However, when triggering
traffic on the VLAN, Dom0 and DomU become completely unresponsive. No
error or kernel message is printed in the serial
On 3/6/2024 15:31, Marek Marczykowski-Górecki wrote:
On Wed, Mar 06, 2024 at 02:37:20PM -0600, Mario Limonciello wrote:
On 3/6/2024 14:34, Sébastien Chaumat wrote:
Le mer. 6 mars 2024 à 19:51, Mario Limonciello
mailto:mario.limoncie...@amd.com>> a écrit :
On 3/6/2024 12:49, Sébastien
On Wed, Feb 28, 2024 at 6:52 AM Jan Beulich wrote:
>
> On 18.02.2024 19:01, Julien Grall wrote:
> > On 14/02/2024 10:12, Jan Beulich wrote:
> >> find_ring_mfn() already holds a page reference when trying to obtain a
> >> writable type reference. We shouldn't make assumptions on the general
> >>
On Mon, Mar 4, 2024 at 10:05 PM Alexei Starovoitov
wrote:
>
> From: Alexei Starovoitov
>
> vmap/vmalloc APIs are used to map a set of pages into contiguous kernel
> virtual space.
>
> get_vm_area() with appropriate flag is used to request an area of kernel
> address range. It's used for vmalloc,
On Tue, 5 Mar 2024, Jan Beulich wrote:
> On 05.03.2024 03:03, Stefano Stabellini wrote:
> > On Mon, 4 Mar 2024, Jan Beulich wrote:
> >> On 02.03.2024 02:37, Stefano Stabellini wrote:
> >>> On Fri, 1 Mar 2024, Jan Beulich wrote:
> On 29.02.2024 23:57, Stefano Stabellini wrote:
> > On Thu,
On Wed, 6 Mar 2024, Jason Andryuk wrote:
> Xen tries to load a PVH dom0 kernel at the fixed guest physical address
> from the elf headers. For Linux, this defaults to 0x100 (16MB), but
> it can be configured.
>
> Unfortunately there exist firmwares that have reserved regions at this
>
On Wed, 6 Mar 2024, Jason Andryuk wrote:
> Expand bzimage_parse() to return kernel_alignment from the setup_header.
> This will be needed if loading a PVH kernel at a physical offset to
> compensate for a reserved E820 region.
>
> Signed-off-by: Jason Andryuk
Reviewed-by: Stefano Stabellini
On Thu, 29 Feb 2024, Nicola Vetrini wrote:
> MISRA C Rule 20.7 states: "Expressions resulting from the expansion
> of macro parameters shall be enclosed in parentheses". Therefore, some
> macro definitions should gain additional parentheses to ensure that all
> current and future users will be
Below error can be seen when doing Yocto build of the toolstack:
| io.c: In function 'p9_error':
| io.c:684:5: error: ignoring return value of 'strerror_r' declared
with attribute 'warn_unused_result' [-Werror=unused-result]
| 684 | strerror_r(err, ring->buffer, ring->ring_size);
|
On 07.03.2024 06:54, Henry Wang wrote:
> Below error can be seen when doing Yocto build of the toolstack:
>
> | io.c: In function 'p9_error':
> | io.c:684:5: error: ignoring return value of 'strerror_r' declared
> with attribute 'warn_unused_result' [-Werror=unused-result]
> | 684 |
On Tue, 5 Mar 2024, Roger Pau Monné wrote:
> On Thu, Feb 22, 2024 at 05:16:09PM -0800, Stefano Stabellini wrote:
> > On Tue, 20 Feb 2024, Roger Pau Monne wrote:
> > > When running as PVH or HVM Linux will use holes in the memory map as
> > > scratch
> > > space to map grants, foreign domain pages
flight 184921 linux-5.4 real [real]
flight 184928 linux-5.4 real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/184921/
http://logs.test-lab.xenproject.org/osstest/logs/184928/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
On 07.03.2024 02:39, Stefano Stabellini wrote:
> On Tue, 5 Mar 2024, Jan Beulich wrote:
>> On 05.03.2024 03:03, Stefano Stabellini wrote:
>>> On Mon, 4 Mar 2024, Jan Beulich wrote:
On 02.03.2024 02:37, Stefano Stabellini wrote:
> On Fri, 1 Mar 2024, Jan Beulich wrote:
>> On 29.02.2024
On 06.03.2024 18:21, Andrew Cooper wrote:
> On 06/03/2024 5:09 pm, Ross Lagerwall wrote:
>> On Tue, Mar 5, 2024 at 2:17 PM Jan Beulich wrote:
>>> On 05.03.2024 13:11, Andrew Cooper wrote:
--- a/xen/include/xen/virtual_region.h
+++ b/xen/include/xen/virtual_region.h
@@ -16,6 +16,9
flight 184912 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184912/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 184886
test-amd64-amd64-xl-qemuu-win7-amd64
On Wed, Mar 06, 2024 at 01:15:48PM +0800, flyingpeng...@gmail.com wrote:
> From: Peng Hao
>
> From: Peng Hao
>
> Use kmap_local_page() instead of kmap_atomic() which has been
> deprecated.
>
> Signed-off-by: Peng Hao
> ---
> drivers/block/xen-blkback/blkback.c | 4 ++--
> 1 file changed, 2
On 29/02/2024 21:07, Stefano Stabellini wrote:
On Thu, 29 Feb 2024, Michal Orzel wrote:
On 29/02/2024 13:40, Julien Grall wrote:
On 29/02/2024 12:37, Michal Orzel wrote:
Hi Julien,
Hi Michal,
On 29/02/2024 13:35, Julien Grall wrote:
On 29/02/2024 12:13, Michal Orzel wrote:
Since
Hi Jan,
On 06/03/2024 07:22, Jan Beulich wrote:
On 05.03.2024 20:24, Julien Grall wrote:
Hi Jan,
The title is quite confusing. I would have expected the macro...
On 05/03/2024 08:33, Jan Beulich wrote:
There's no use of them anymore except in the definitions of the non-
underscore-prefixed
On 06.03.2024 10:44, Julien Grall wrote:
> On 06/03/2024 07:22, Jan Beulich wrote:
>> On 05.03.2024 20:24, Julien Grall wrote:
>>> The title is quite confusing. I would have expected the macro...
>>>
>>> On 05/03/2024 08:33, Jan Beulich wrote:
There's no use of them anymore except in the
On 01/03/2024 17:21, Oleksii wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
this email.
Hello everyone,
Hi Oleksii,
Greetings
I would like to share with you a list
93 matches
Mail list logo