On Tue, 2015-06-23 at 10:16 +0100, Ian Campbell wrote:
On Tue, 2015-06-23 at 02:18 +, osstest service user wrote:
flight 58828 osstest real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58828/
Regressions :-(
Tests which did not succeed and are blocking,
including
Hi,
On 23/06/2015 00:02, Chris (Christopher) Brand wrote:
I’ve been trying to figure out why Xen only reports 2GB on my ARM
platform that actually has 3GB, and I think I’ve found a bug, but I’m
not familiar enough with the Xen code to fix it.
/dts-v1/;
/ {
model = Broadcom STB (7445d0);
M A Young writes (Re: [Xen-devel] Xen 4.5.1 released):
On Tue, 23 Jun 2015, Jan Beulich wrote:
I am pleased to announce the release of Xen 4.5.1. This is
available immediately from its git repository
http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.5
(tag
On Tue, 2015-06-23 at 11:08 +0100, Julien Grall wrote:
reg = 0x0 0x0 0x0 0x4000 0x0 0x4000 0x0 0x4000;
Although, what the rest of the node used for? Do we expect to parse it?
I wasn't able to find a suitable bindings in the docs...
A reg can encode multiple
On 23/06/2015 11:27, Ian Campbell wrote:
On Tue, 2015-06-23 at 11:08 +0100, Julien Grall wrote:
reg = 0x0 0x0 0x0 0x4000 0x0 0x4000 0x0 0x4000;
Although, what the rest of the node used for? Do we expect to parse it?
I wasn't able to find a suitable bindings in the
The is_mmio parameter can be inferred from the ioreq type.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/emulate.c |7 ---
1 file changed, 4
This patch series re-works much of the code involved in emulation of port
and memory mapped I/O for HVM guests.
The code has become very convoluted and, at least by inspection, certain
emulations will apparently malfunction.
The series is broken down into 18 patches (which are also available in
The check is done at the wrong point (since it is irrelevant if the
I/O is to be handled by the hypervisor) and its functionality can be
covered by returning X86EMUL_UNHANDLEABLE from hvm_send_assist_req()
instead.
This patch also removes the domain_crash() call from
hvm_send_assist_req().
...in hvmemul_read/write()
Add hvmemul_phys_mmio_access() and hvmemul_linear_mmio_access() functions
to reduce code duplication.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
The struct just contains three methods and no data, so the name
hvm_mmio_ops more accurately reflects its content. A subsequent patch
introduces a new structure which more accurately warrants the name
hvm_mmio_handler so doing the rename in this purely cosmetic patch avoids
conflating functional
When memory mapped I/O is range checked by internal handlers, the length
of the access should be taken into account.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
On Tue, 23 Jun 2015, Peter Maydell wrote:
On 22 June 2015 at 14:08, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
The following changes since commit 00967f4e0bab246679d0ddc32fd31a7179345baf:
Merge remote-tracking branch
'remotes/agraf/tags/signed-s390-for-upstream' into
On Tue, 2015-06-23 at 11:32 +0100, Julien Grall wrote:
On 23/06/2015 11:27, Ian Campbell wrote:
On Tue, 2015-06-23 at 11:08 +0100, Julien Grall wrote:
reg = 0x0 0x0 0x0 0x4000 0x0 0x4000 0x0 0x4000;
Although, what the rest of the node used for? Do we expect to
The code in hvmemul_do_io() that tracks large reads or writes, to avoid
re-issue of component I/O, is defeated by accesses across a page boundary
because it uses physical address. The code is also only relevant to memory
mapped I/O to or from a buffer.
This patch re-factors the code and moves it
By removing the calls in hvmemul_do_io() (which is replaced by a single
assignment) and hvm_complete_assist_request() (which is replaced by a
call to process_portio_intercept() with a suitable set of ops) then
hvm_io_assist() can be moved into hvm.c and made static (and hence be a
candidate for
Hi,
On 23/06/2015 10:44, David Vrabel wrote:
On 23/06/15 00:02, Chris (Christopher) Brand wrote:
I’ve been trying to figure out why Xen only reports 2GB on my ARM
platform that actually has 3GB, and I think I’ve found a bug, but I’m
not familiar enough with the Xen code to fix it.
The
On Tue, 2015-06-23 at 11:08 +0100, Ian Campbell wrote:
On Tue, 2015-06-23 at 10:57 +0100, Ian Campbell wrote:
On Tue, 2015-06-23 at 10:44 +0100, David Vrabel wrote:
On 23/06/15 00:02, Chris (Christopher) Brand wrote:
I’ve been trying to figure out why Xen only reports 2GB on my ARM
On 6/16/2015 at 01:47 AM, in message 557f0fa7.2060...@eu.citrix.com,
George
Dunlap george.dun...@eu.citrix.com wrote:
On 06/10/2015 04:20 AM, Chunyan Liu wrote:
Add pvusb APIs, including:
- attach/detach (create/destroy) virtual usb controller.
- attach/detach usb device
-
...and error handling
NOTE: A straight reversion was not possible because of subsequent changes
in the code so this at least partially a manual reversion.
By limiting hvmemul_do_io_addr() to reps falling within the pages on which
a reference has already been taken, we can guarantee that
If memory mapped I/O is 'chunked' then the I/O must be re-emulated,
otherwise only the first chunk will be processed. This patch makes
sure all I/O from a buffer is re-emulated regardless of whether it
is a read or a write.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser
By removing the HVMIO_dispatched state and making all pending emulations
(i.e. all those not handled by the hypervisor) use HVMIO_awating_completion,
various code-paths can be simplified.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich
Ian Jackson writes (Re: [Xen-devel] Xen 4.5.1 released):
M A Young writes (Re: [Xen-devel] Xen 4.5.1 released):
I don't believe this release has the qemu-xen-traditional half of XSA-135.
If this wasn't deliberate it might be worth noting it somewhere.
You're right. It appears that the
Use an ioreq_t rather than open coded state, size, dir and data fields
in struct hvm_vcpu_io. This also allows PIO completion to be handled
similarly to MMIO completion by re-issuing the handle_pio() call.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan
It's clear from the following check in hvmemul_rep_movs:
if ( sp2mt == p2m_mmio_direct || dp2mt == p2m_mmio_direct ||
(sp2mt == p2m_mmio_dm dp2mt == p2m_mmio_dm) )
return X86EMUL_UNHANDLEABLE;
that mmio - mmio copy is not handled. This means the code in the
stdvga mmio
On Mon, 22 Jun 2015, Konrad Rzeszutek Wilk wrote:
On Mon, Jun 22, 2015 at 06:55:12PM +0100, Stefano Stabellini wrote:
Hi Roger,
given that this patch series is actually using the Xen hvm builder, I
take that all the PVH code paths in Xen or the guest kernel are not
actually used,
On 23/06/2015 8:45 PM, Ian Jackson wrote:
Ian Jackson writes (Re: [Xen-devel] Xen 4.5.1 released):
M A Young writes (Re: [Xen-devel] Xen 4.5.1 released):
I don't believe this release has the qemu-xen-traditional half of XSA-135.
If this wasn't deliberate it might be worth noting it somewhere.
On Tue, 23 Jun 2015, Xu, Quan wrote:
-Original Message-
From: Stefano Stabellini [mailto:stefano.stabell...@eu.citrix.com]
Sent: Tuesday, June 23, 2015 12:37 AM
To: Xu, Quan
Cc: stefano.stabell...@eu.citrix.com; qemu-de...@nongnu.org;
stef...@linux.vnet.ibm.com;
On June 23, 2015 3:21:17 AM EDT, Jan Beulich jbeul...@suse.com wrote:
On 22.06.15 at 21:31, konrad.w...@oracle.com wrote:
@@ -1804,8 +1804,12 @@ static bool_t pci_cfg_ok(struct domain *
start |= CF8_ADDR_HI(currd-arch.pci_cf8);
}
-return
flight 58839 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58839/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl 13 guest-saverestore fail REGR. vs. 58106
Regressions which are
On 06/23/2015 04:26 AM, Jan Beulich wrote:
On 22.06.15 at 18:10, boris.ostrov...@oracle.com wrote:
On 06/22/2015 11:10 AM, Jan Beulich wrote:
+switch ( op )
+{
+case XENPMU_mode_set:
+{
+if ( (pmu_params.val ~(XENPMU_MODE_SELF | XENPMU_MODE_HV)) ||
+
On 6/23/2015 at 07:29 PM, in message 558942ff.5060...@eu.citrix.com,
George
Dunlap george.dun...@eu.citrix.com wrote:
On 06/23/2015 11:18 AM, Chun Yan Liu wrote:
On 6/16/2015 at 01:47 AM, in message 557f0fa7.2060...@eu.citrix.com,
George
Dunlap george.dun...@eu.citrix.com wrote:
On 06/23/2015 08:30 AM, Jan Beulich wrote:
On 22.06.15 at 18:37, elena.ufimts...@oracle.com wrote:
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -1444,6 +1444,9 @@ const struct hvm_function_table * __init
start_svm(void)
svm_function_table.hap_capabilities =
On 06/23/2015 02:27 PM, Lengyel, Tamas wrote:
Testability is still a potential issue. We have offered to make our
internal
Windows test binaries available for intra-domain testing. Tamas has
been working on toolstack support for cross-domain testing with a slightly
earlier patch series, and
On 06/23/2015 09:12 AM, Stefano Stabellini wrote:
On Tue, 23 Jun 2015, Ian Campbell wrote:
On Tue, 2015-06-23 at 11:55 +0100, Stefano Stabellini wrote:
I don't know if we should introduce a new name for this, but I wanted to
point out that this is different from PVH from Xen point of view. In
flight 58837 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58837/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 11 guest-start fail REGR. vs. 58776
Regressions
On 2015/6/23 18:12, Jan Beulich wrote:
On 23.06.15 at 11:57, tiejun.c...@intel.com wrote:
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -1839,7 +1839,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t
map,
while ( base_pfn
flight 58842 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58842/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-libvirt 11 guest-start fail like 58823
test-amd64-amd64-libvirt 11
flight 58835 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58835/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 14 guest-start.2fail REGR. vs. 58451
On Fri, 2015-06-19 at 15:08 -0700, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
PCI BARs tell us whether prefetching is safe, but they don't say anything
about write combining (WC). WC changes ordering rules and allows writes to
be collapsed, so it's not safe in general
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git stable/for-jens-4.2
in your 'for-4.2/drivers' branch. It is late - for which I am terrible
sorry! The patches have been sitting in my branch for two weeks - except
the last patch which
201 - 240 of 240 matches
Mail list logo