On Mon, Jun 22, 2015 at 2:56 PM, Ed White edmund.h.wh...@intel.com wrote:
Add the remaining routines required to support enabling the alternate
p2m functionality.
Signed-off-by: Ed White edmund.h.wh...@intel.com
---
xen/arch/x86/hvm/hvm.c | 60 +-
On Wed, 2015-06-24 at 15:29 -0700, Luis R. Rodriguez wrote:
Nope but at least what made me squint at this being a possible
feature was that in practice when reviewing all of the kernels
pending device drivers using MTRR (potential write-combine candidates)
I encountered a slew of them which
On 24/06/2015 22:35, Boris Ostrovsky wrote:
On 06/23/2015 11:18 AM, Jan Beulich wrote:
... as being identical to is_pv_32bit_vcpu() after the x86-32 removal.
In a few cases this includes an additional is_pv_32bit_vcpu() -
is_pv_32bit_domain() conversion.
Signed-off-by: Jan Beulich
On 06/24/2015 07:49 PM, Andrew Cooper wrote:
On 24/06/2015 22:35, Boris Ostrovsky wrote:
On 06/23/2015 11:18 AM, Jan Beulich wrote:
... as being identical to is_pv_32bit_vcpu() after the x86-32 removal.
In a few cases this includes an additional is_pv_32bit_vcpu() -
is_pv_32bit_domain()
From: Luis R. Rodriguez mcg...@suse.com
Convert the driver from using the x86 specific MTRR code to
the architecture agnostic arch_phys_wc_add(). arch_phys_wc_add()
will avoid MTRR if write-combining is available, in order to
take advantage of that also ensure the ioremap'd area is requested
as
flight 58856 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58856/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 58834
test-amd64-i386-xl-qemuu-win7-amd64
On Wed, Jun 24, 2015 at 5:52 PM, Benjamin Herrenschmidt
b...@kernel.crashing.org wrote:
On Thu, 2015-06-25 at 02:08 +0200, Luis R. Rodriguez wrote:
OK thanks I'll proceed with these patches then.
As for user mappings,
Which APIs were you considering in this regard BTW?
mmap of the
From: Luis R. Rodriguez mcg...@suse.com
Boris,
This patchset is part of the long haul of series that addresses removal of
direct use of MTRR and transforms drivers over to use PAT interfaces when
available [0]. Other than this series there is only one more pending series for
that effort, the
From: Luis R. Rodriguez mcg...@suse.com
PCI BARs tell us whether prefetching is safe, but they don't say anything
about write combining (WC). WC changes ordering rules and allows writes to
be collapsed, so it's not safe in general to use it on a prefetchable
region.
Add pci_iomap_wc() and
On Thu, 2015-06-25 at 02:08 +0200, Luis R. Rodriguez wrote:
OK thanks I'll proceed with these patches then.
As for user mappings,
Which APIs were you considering in this regard BTW?
mmap of the generic /sys/bus/pci/.../resource*
maybe the right thing to do is to let us do what we do
From: Luis R. Rodriguez mcg...@suse.com
This lets drivers take advantage of PAT when available. This
should help with the transition of converting video drivers over
to ioremap_wc() to help with the goal of eventually using
_PAGE_CACHE_UC over _PAGE_CACHE_UC_MINUS on x86 on
ioremap_nocache()
From: Luis R. Rodriguez mcg...@suse.com
Convert the driver from using the x86 specific MTRR code to
the architecture agnostic arch_phys_wc_add(). arch_phys_wc_add()
will avoid MTRR if write-combining is available, in order to
take advantage of that also ensure the ioremap'd area is requested
as
From: Luis R. Rodriguez mcg...@suse.com
Now that we have pci_iomap_wc() add the respective
devres helpers. These go unexported for now but
note that should they later be exported this
must go with EXPORT_SYMBOL_GPL().
Cc: Toshi Kani toshi.k...@hp.com
Cc: Andy Lutomirski l...@amacapital.net
Cc:
Rob Hoes writes ([PATCH RFC 3/9] libxl: introduce specific xenstore error
codes):
Signed-off-by: Rob Hoes rob.h...@citrix.com
I don't understand the distinctions you are trying to make here. Is
it really useful for an application or a sysadmin to distinguish what
operation was being attempted
Ian Campbell writes ([PATCH OSSTEST v3 01/22] mg-*: Add mgi-common with fetch
and fail helpers):
Taken from both mg-cpu-microcode-update and mg-debian-installer-update
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
___
Xen-devel mailing list
On Wed, Jun 24, 2015 at 02:06:02PM +0200, Juergen Gross wrote:
Hi,
my qemu integrated pvUSB backend is now running stable enough to do
some basic performance measurements. I've passed a memory-stick with
about 90MB of data on it to a pv-domU. Then I read all the data on
it with tar and
On 24.06.15 at 16:56, rcojoc...@bitdefender.com wrote:
On 06/15/2015 12:03 PM, Razvan Cojocaru wrote:
Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST,
sent via HVMOP_request_vm_event. The guest can request that a
generic vm_event (containing only the vm_event-filled guest
Rob Hoes writes ([PATCH RFC 1/9] libxl idl: add comments to error enum):
...
libxl_error = Enumeration(error, [
Thanks for this. It think at this stage it is probably most helpful
to concentrate on the specification, that is the list of error codes
and corresponding docs.
So:
I think it
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 24 June 2015 16:21
To: Paul Durrant
Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: Re: [PATCH v4 10/17] x86/hvm: revert 82ed8716b fix direct PCI port
I/O emulation retry...
On
Rob Hoes writes ([PATCH RFC 7/9] libxl: introduce specific error codes in
libxl_device_disk_add):
Signed-off-by: Rob Hoes rob.h...@citrix.com
...
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index f622981..2f56c6e 100644
--- a/tools/libxl/libxl.c
+++ b/tools/libxl/libxl.c
@@
Which makes efibootmgr work when running our kernel.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: New patch
---
ts-kernel-build | 3 +++
1 file changed, 3 insertions(+)
diff --git a/ts-kernel-build b/ts-kernel-build
index 8a254e4..8d19482 100755
--- a/ts-kernel-build
+++
This overrides GRUB_CMDLINE_LINUX(_DEFAULT) which we were previously
editing but only for the Xen entries, meaning that we don't switch to
console=hvc0 for the native cases (i.e. don't break them).
We do however want to edit GRUB_CMDLINE_LINUX(_DEFAULT) to remove
quiet if present, since it is
The following adds support for testing on arm64 systems.
Since arm64 was only added in Debian Jessie this requires Wei's Debian
Jessie patches as a base line, which are currently in osstest. This is
therefore based on those, specifically 6e37f849f4b0.
The main development here is support for
On 24.06.15 at 13:24, paul.durr...@citrix.com wrote:
By removing the calls in hvmemul_do_io() (which is replaced by a single
assignment) and hvm_complete_assist_request() (which is replaced by a
call to process_portio_intercept() with a suitable set of ops) then
With this saying
Ian Campbell writes ([PATCH OSSTEST v3 02/22] mg-*: Make package fetching
common in new mgi-debian):
This pattern appears several times in mg-debian-installer-update and
I'm about to add another script which uses it.
The centralised version always does sort -n -r | head -n to pick out
only
On Tue, Jun 16, 2015 at 08:33:32AM +0100, Jan Beulich wrote:
On 15.06.15 at 18:19, stefano.stabell...@eu.citrix.com wrote:
On Thu, 11 Jun 2015, Jan Beulich wrote:
On 10.06.15 at 22:53, kon...@kernel.org wrote:
--- a/hw/xen/xen_pt.c
+++ b/hw/xen/xen_pt.c
@@ -785,7 +785,9 @@ out:
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 24 June 2015 16:53
To: Paul Durrant
Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: Re: [PATCH v4 13/17] x86/hvm: remove HVMIO_dispatched I/O
state
On 24.06.15 at 13:24,
-Original Message-
From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
boun...@lists.xen.org] On Behalf Of Jan Beulich
Sent: 24 June 2015 14:08
To: Paul Durrant
Cc: Andrew Cooper; Keir (Xen.org); xen-de...@lists.xenproject.org
Subject: Re: [Xen-devel] [PATCH v4 07/17] x86/hvm:
On Wed, Jun 24, 2015 at 02:04:45PM +0200, Roger Pau Monné wrote:
El 24/06/15 a les 13.52, Boris Ostrovsky ha escrit:
On 06/24/2015 06:14 AM, Roger Pau Monné wrote:
El 24/06/15 a les 12.05, Jan Beulich ha escrit:
On 24.06.15 at 11:47, roger@citrix.com wrote:
What needs to be done
On 06/24/2015 04:32 PM, Lengyel, Tamas wrote:
On Wed, Jun 24, 2015 at 1:39 AM, Razvan Cojocaru
rcojoc...@bitdefender.com mailto:rcojoc...@bitdefender.com wrote:
On 06/24/2015 12:27 AM, Lengyel, Tamas wrote:
I've extended xen-access to exercise this new feature taking into
Signed-off-by: Rob Hoes rob.h...@citrix.com
---
tools/libxl/libxl_dom.c | 6 +++---
tools/libxl/libxl_internal.c | 4 +---
tools/libxl/libxl_json.c | 4 ++--
tools/libxl/libxl_types.idl | 5 +
4 files changed, 11 insertions(+), 8 deletions(-)
diff --git a/tools/libxl/libxl_dom.c
Signed-off-by: Rob Hoes rob.h...@citrix.com
---
tools/libxl/libxl.c | 8
tools/libxl/libxl_internal.c | 2 +-
tools/libxl/libxl_types.idl | 4
3 files changed, 9 insertions(+), 5 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index f41f291..c0c0f12
Signed-off-by: Rob Hoes rob.h...@citrix.com
---
tools/libxl/libxl.c | 6 +++---
tools/libxl/libxl_event.c | 2 +-
tools/libxl/libxl_types.idl | 3 +++
3 files changed, 7 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index a6eb2df..f622981 100644
Introducing two special enum values:
* ENUM_NEXT: equal to the previous value in the enum plus 1
* ENUM_PREV: equal to the previous value in the enum minus 1
This makes it a little easier to maintain enums for which we do not care too
much about the exact enum values.
Signed-off-by: Rob Hoes
On Wed, 2015-06-24 at 14:28 +0100, Jan Beulich wrote:
On 24.06.15 at 15:15, dario.faggi...@citrix.com wrote:
ISTR some allocation not being 'converted'. Perhaps I'm misremembering.
Quite possible that I overlooked some.
I meant something that we (you!) were aware of, that came up during
On 24.06.15 at 16:12, paul.durr...@citrix.com wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 24 June 2015 14:59
On 24.06.15 at 13:24, paul.durr...@citrix.com wrote:
-if ( s-stdvga s-cache )
-{
-switch ( p-type )
-{
-case IOREQ_TYPE_COPY:
Ian Campbell writes ([PATCH OSSTEST v3 03/22] Introduce mg-pxe-loader-update):
The story for PXE booting via UEFI (at least on arm64) is not so
straightforward as with pxelinux on x86. There seems to no good
bootloader to launch via UEFI+pxe, in fact all I could find was grub
(syslinux, and by
On 22.06.15 at 20:56, edmund.h.wh...@intel.com wrote:
+case HVM_PARAM_ALTP2MHVM:
+if ( a.value 1 )
+rc = -EINVAL;
+if ( a.value
+ d-arch.hvm_domain.params[HVM_PARAM_NESTEDHVM] )
+rc = -EINVAL;
+break;
As you added the new
Rob Hoes writes ([PATCH RFC 2/9] libxl idl: allow implicit enum values):
Introducing two special enum values:
* ENUM_NEXT: equal to the previous value in the enum plus 1
* ENUM_PREV: equal to the previous value in the enum minus 1
This makes it a little easier to maintain enums for which we
Rob Hoes writes ([PATCH RFC 9/9] libxl: introduce specific error codes in
libxl_device_nic_add):
Signed-off-by: Rob Hoes rob.h...@citrix.com
...
+# NIC parameters could not be determined
+(ENUM_PREV, NIC_SCRIPT_UNDETERMINED),
+(ENUM_PREV, NIC_DEVID_UNDETERMINED),
Perhaps we
Rob Hoes writes ([PATCH RFC 4/9] libxl: use explicit error codes in
libxl_ctx_alloc):
Signed-off-by: Rob Hoes rob.h...@citrix.com
---
tools/libxl/libxl.c | 6 +++---
tools/libxl/libxl_event.c | 2 +-
tools/libxl/libxl_types.idl | 3 +++
3 files changed, 7 insertions(+), 4
Rob Hoes writes ([PATCH RFC 6/9] libxl: introduce specific error code for
libxl__wait_device_connection):
...
diff --git a/tools/libxl/libxl_device.c b/tools/libxl/libxl_device.c
index 93bb41e..56c6e2e 100644
--- a/tools/libxl/libxl_device.c
+++ b/tools/libxl/libxl_device.c
@@ -768,6 +768,7
First arrange for bootloader to be installed to removable media path,
by using a new in Jessie preseed option. Then use that to chainload a
bootloader from the disk.
The removable media path is well known (part of the UEFI spec) which
saves us having to worry about which OS is on the host (so
(i.e. the bit before/after the -- marker). When abstracting over
different bootloaders in a future patch this will be convenient since
it allows the code to add to either.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
ts-host-install | 21
These can't (in general?) actually be booted.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
Osstest/Debian.pm | 3 +++
1 file changed, 3 insertions(+)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 3415a4d..62551ac 100644
---
Other bootloaders handle this with an explicit separate option rather
than parsing it out of the command line as pxelinux does. Prepare for
supporting these.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
ts-host-install | 6 ++
1 file
When DTB support was added for armhf it required a backports kernel
for use with Wheezy and therefore DTBs were only collected for that
special case. However as we move forward to newer kernels it should
be possible to run using the proper kernel (e.g. Jessie should work
for armhf). Therefore we
(Wrap DiBase entry in README too for consistency)
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: Reindent README (fix DiBase too for consistency)
Adjust for reordering of setup_{firmware}_pxeboot to put
{firmware} at end
Rewrap setup_grub_efi_bootcfg
Adjust for
Euan Harris writes (Re: Cancelling asynchronous operations in libxl):
We've discussed the semantics of cancellation a bit more off-list and
have come to two conclusions:
1. [...]
We should rename the proposed libxl_ao_cancel() to libxl_ao_abort().
Unless someone objects to this,
Rob Hoes writes ([PATCH RFC 8/9] libxl: introduce specific error codes in
libxl_device_cdrom_insert):
Signed-off-by: Rob Hoes rob.h...@citrix.com
if (libxl_get_stubdom_id(ctx, domid) != 0) {
LOG(ERROR, cdrom-insert doesn't work for stub domains);
-rc = ERROR_INVAL;
+
Ian Campbell writes ([PATCH OSSTEST v3 07/22] Refactor pxelinux
configuration):
The mechanism used to PXE boot can differ depending on the firmware
type. Therefore refactor into Osstest::TestSupport and key off a new
host property firmware.
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
flight 58855 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58855/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-i386-i386-xl-credit222 leak-check/check fail REGR. vs. 58411
Regressions
On 06/16/2015 07:26 PM, Ian Campbell wrote:
On Tue, 2015-06-16 at 12:24 +0100, Ian Campbell wrote:
On Mon, 2015-06-08 at 11:45 +0800, Yang Hongyang wrote:
setup/teardown of COLO proxy module.
we use netlink to communicate with proxy module.
What is a COLO proxy module and where would one
On 06/24/2015 03:57 PM, Konrad Rzeszutek Wilk wrote:
On Wed, Jun 24, 2015 at 02:06:02PM +0200, Juergen Gross wrote:
Hi,
my qemu integrated pvUSB backend is now running stable enough to do
some basic performance measurements. I've passed a memory-stick with
about 90MB of data on it to a
On 06/16/2015 07:19 PM, Ian Campbell wrote:
On Mon, 2015-06-08 at 11:45 +0800, Yang Hongyang wrote:
From: Wen Congyang we...@cn.fujitsu.com
Add a new option -c to the command 'xl remus'. If you want
to use COLO HA instead of Remus HA, please use -c option.
Update man pages to reflect the
flight 58861 linux-3.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58861/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-pair 20 guest-start/debian fail in 58838 pass in 58861
On 24.06.15 at 18:00, paul.durr...@citrix.com wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 24 June 2015 16:53
On 24.06.15 at 13:24, paul.durr...@citrix.com wrote:
--- a/xen/arch/x86/hvm/emulate.c
+++ b/xen/arch/x86/hvm/emulate.c
@@ -138,20 +138,14 @@ static int
Ian Campbell writes ([PATCH OSSTEST v3 15/22] standalone: Prefer
./local-config to $HOME/.xen-osstest/config):
OSSTEST_CONFIG still trumps both.
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On Mon, Jun 22, 2015 at 2:56 PM, Ed White edmund.h.wh...@intel.com wrote:
Add the remaining routines required to support enabling the alternate
p2m functionality.
Signed-off-by: Ed White edmund.h.wh...@intel.com
---
xen/arch/x86/hvm/hvm.c | 60 +-
more specifically:
* '-n' switch to xl info, to show the topology
of the host,
* 'xl vcpu-list', to show what the various vcpus
are up to.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
---
ts-logs-capture |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git
Ian Campbell writes ([PATCH OSSTEST v3 12/22] ts-kernel-build: Enable
CONFIG_EFI_VARS):
Which makes efibootmgr work when running our kernel.
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 06/24/2015 06:37 AM, Razvan Cojocaru wrote:
On 06/24/2015 04:32 PM, Lengyel, Tamas wrote:
On Wed, Jun 24, 2015 at 1:39 AM, Razvan Cojocaru
rcojoc...@bitdefender.com mailto:rcojoc...@bitdefender.com wrote:
On 06/24/2015 12:27 AM, Lengyel, Tamas wrote:
I've extended xen-access to
Ian Campbell writes ([PATCH OSSTEST v3 11/22] ts-kernel-build: Additional
kernel options for Mustang):
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
___
Xen-devel mailing list
Ian Campbell writes ([PATCH OSSTEST v3 08/22] ts-host-install: Support UEFI
PXE boot using grub.efi):
(Wrap DiBase entry in README too for consistency)
...
+sub setup_pxeboot_local_uefi ($) {
+my ($ho) = @_;
+setup_grub_efi_bootcfg($ho, END);
+echo Should do a local boot here,
Ian Campbell writes ([PATCH OSSTEST v3 09/22] Enable chain loading to local
disk for UEFI PXE systems.):
First arrange for bootloader to be installed to removable media path,
by using a new in Jessie preseed option. Then use that to chainload a
bootloader from the disk.
The removable media
Prints dIDLEv0 as opposed to d32767v0
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
CC: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
---
xen/common/vsprintf.c |
Experimentally, older Linux guests perform construction of `init` with user
pagetable mappings. This is fine for native systems as such a guest would not
set CR4.SMAP itself.
However if Xen uses SMAP itself, 32bit PV guests (whose kernels run in ring1)
are also affected. Older Linux guests end
PV vcpu initialise has CR4 seeded from mmu_cr4_features. Adjust the order of
basic CR4 setup and creation of the idle domain, such that idle_vcpu[0] is not
wildly different from the other idle vcpus.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
---
PV CR4 settings are now based on mmu_cr4_features, rather than the current
contents of CR4. This causes dom0 to be consistent with domUs, despite being
constructed in a region with CR4.SMAP purposefully disabled.
The major change here is that v-arch.pv_vcpu.ctrlreg[4] now contains only CR4
bits
And add PKE as it is architecturally defined now.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
---
xen/include/asm-x86/processor.h | 37 +++--
1 file changed, 19 insertions(+), 18 deletions(-)
diff --git
The purpose of this series is to fix the fact that you cannot boot 32bit PV
guests older than Linux 3.8ish on Broadwell processors when Xen is using
SMAP.
It should be noted that the same problem exists with SMEP and 32bit PV guests,
but I have no sympathy for PV kernels which start executing
Early on boot, current has the sentinel value 0xf000. Blindly using it in
show_registers() causes a nested failure and no useful information printed
from an early crash.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
---
xen/arch/x86/x86_64/traps.c
On Wed, Jun 24, 2015 at 08:42:23AM +1000, Benjamin Herrenschmidt wrote:
On Fri, 2015-06-19 at 15:08 -0700, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
PCI BARs tell us whether prefetching is safe, but they don't say anything
about write combining (WC). WC changes
On 06/16/2015 06:53 PM, Ian Campbell wrote:
On Mon, 2015-06-15 at 17:24 +0100, Wei Liu wrote:
On Mon, Jun 15, 2015 at 09:45:54AM +0800, Yang Hongyang wrote:
On 06/12/2015 10:57 PM, Ian Jackson wrote:
Wei Liu writes (Re: [Xen-devel] [PATCH v2 COLOPre 11/13] tools/libxl: rename remus
Rob Hoes writes ([PATCH RFC 5/9] libxl: introduce specific JSON error codes):
Signed-off-by: Rob Hoes rob.h...@citrix.com
...
-rc = ERROR_FAIL;
+rc = ERROR_JSON_SET_CONFIG;
I think I'd rather have ERROR_USERDATA_ACCESS (see my previous
comments about LOCK_FAIL) or maybe
On 24.06.15 at 13:24, paul.durr...@citrix.com wrote:
@@ -288,17 +272,66 @@ static int hvmemul_do_io_addr(
bool_t is_mmio, paddr_t addr, unsigned long *reps,
unsigned int size, uint8_t dir, bool_t df, paddr_t ram_gpa)
{
-struct page_info *ram_page;
+struct vcpu *v =
Hi,
On Wed, Jan 28, 2015 at 04:57:19PM +, Ian Jackson wrote:
Euan Harris writes (Re: Cancelling asynchronous operations in libxl):
On Tue, Jan 20, 2015 at 04:38:24PM +, Ian Jackson wrote:
* Is an API along these lines going to meet your needs ?
The API you propose for
Is useful when debugging.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
Osstest/Debian.pm | 9 -
1 file changed, 4 insertions(+), 5 deletions(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 437faab..27179d5 100644
---
Runvars:
build-arm64 arch
arm64
build-arm64 build_lvextend_max
50
build-arm64 enable_ovmf
true
build-arm64
The story for PXE booting via UEFI (at least on arm64) is not so
straightforward as with pxelinux on x86. There seems to no good
bootloader to launch via UEFI+pxe, in fact all I could find was grub
(syslinux, and by extension pxelinux.efi, is x86 only).
Add mg-pxe-loader-update modelled on
AIUI the runes used will only result in an ESP if the system was
booted via UEFI. IOW I don't think there should be any change for
existing systems.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
Osstest.pm| 1 +
Osstest/Debian.pm
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
Note: ARM testing currently uses a 3.16 based linux-arm-xen kernel
(compared to 3.14 currently used as the default). In order to support
Mustang something newer is needed, I've been testing 4.1 (next LTS
kernel), 3.18 (the intervening LTS
Taken from both mg-cpu-microcode-update and mg-debian-installer-update
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
v3: New patch
---
mg-cpu-microcode-update| 3 ++-
mg-debian-installer-update | 8 +---
mgi-common | 26 ++
3 files
TODO: Find out why!
This is just a placeholder/reminder, do not apply.
---
ts-kernel-build | 3 +++
1 file changed, 3 insertions(+)
diff --git a/ts-kernel-build b/ts-kernel-build
index 8d19482..67be9d9 100755
--- a/ts-kernel-build
+++ b/ts-kernel-build
@@ -552,6 +552,9 @@ setopt
By default Debian inserts itself before any existing entries,
including the PXE one, meaning we otherwise cannot remotely regroove
the box.
Add a hook to /usr/lib/base-installer.d/ which installs a diversion of
/usr/sbin/grub-install and installs a wrapper which adds the
--no-nvram argument which
I'm going to want it in a subsequent patch
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
---
Osstest/Debian.pm | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index
This pattern appears several times in mg-debian-installer-update and
I'm about to add another script which uses it.
The centralised version always does sort -n -r | head -n to pick out
only the newest version, which only some of the open coded sites did.
Likewise the centralised version checks
On 24.06.15 at 13:24, paul.durr...@citrix.com wrote:
--- a/xen/arch/x86/hvm/emulate.c
+++ b/xen/arch/x86/hvm/emulate.c
@@ -138,20 +138,14 @@ static int hvmemul_do_io(
if ( data_is_addr || dir == IOREQ_WRITE )
return X86EMUL_UNHANDLEABLE;
goto finish_access;
-
On Mon, Jun 22, 2015 at 2:56 PM, Ed White edmund.h.wh...@intel.com wrote:
Add a flag to indicate that a memory event occurred in an alternate p2m
and a field containing the p2m index. Allow the response to switch to
a different p2m using the same flag and field.
Modify p2m_access_check() to
On 06/24/2015 09:01 AM, Lengyel, Tamas wrote:
On Mon, Jun 22, 2015 at 2:56 PM, Ed White edmund.h.wh...@intel.com wrote:
Add a flag to indicate that a memory event occurred in an alternate p2m
and a field containing the p2m index. Allow the response to switch to
a different p2m using the same
On 06/24/2015 09:15 AM, Lengyel, Tamas wrote:
+bool_t p2m_set_altp2m_mem_access(struct domain *d, uint16_t idx,
+ unsigned long pfn, xenmem_access_t
access)
+{
This function IMHO should be merged with p2m_set_mem_access and should be
triggerable with the
On 24/06/15 18:57, Ed White wrote:
On 06/24/2015 07:59 AM, Jan Beulich wrote:
On 22.06.15 at 20:56, edmund.h.wh...@intel.com wrote:
+case HVM_PARAM_ALTP2MHVM:
+if ( a.value 1 )
+rc = -EINVAL;
+if ( a.value
+
On 24/06/15 08:49, Jan Beulich wrote:
On 24.06.15 at 04:34, boris.ostrov...@oracle.com wrote:
On 06/23/2015 08:30 AM, Jan Beulich wrote:
On 22.06.15 at 18:37, elena.ufimts...@oracle.com wrote:
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -1444,6 +1444,9 @@ const
Hi Xu,
On 24 Jun 2015, at 14:44, Wang Xu gna...@gmail.com wrote:
Thank you Dave, I think I can also get work around for that.
By the way, the document says the name should be global unique, but I can
start 2 domains have channels with a same name, is there some potential
problems?
The
On 24/06/15 06:18, Feng Wu wrote:
This patch adds cmpxchg16b support for x86-64, so software
can perform 128-bit atomic write/read.
Signed-off-by: Feng Wu feng...@intel.com
---
v3:
Newly added.
xen/include/asm-x86/x86_64/system.h | 28
On 24/06/15 18:47, Ed White wrote:
This looks like some hoop jumping around the assertions in
domain_pause() and vcpu_pause().
We should probably have some new helpers where the domain needs to be
paused, possibly while in context. The current domain/vcpu_pause() are
almost always
flight 58848 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58848/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boot fail REGR. vs. 58440
-Original Message-
From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
boun...@lists.xen.org] On Behalf Of Jan Beulich
Sent: 24 June 2015 17:12
To: Paul Durrant
Cc: Andrew Cooper; Keir (Xen.org); xen-de...@lists.xenproject.org
Subject: Re: [Xen-devel] [PATCH v4 13/17] x86/hvm:
On 22/06/15 15:46, Jan Beulich wrote:
This is to be used by MSI code, and later to also be hooked up to
MMCFG accesses by Dom0.
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
___
Xen-devel mailing
On 22/06/15 15:51, Jan Beulich wrote:
... by monitoring writes to the mask register.
This allows reverting the main effect of the XSA-129 patches in qemu.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/msi.c
+++ b/xen/arch/x86/msi.c
@@ -1308,6 +1308,39 @@
101 - 200 of 216 matches
Mail list logo