Re: [Xen-devel] [PATCH v6 2/2] xen/arm: support gzip compressed kernels

2015-09-22 Thread Julien Grall
On 21/09/2015 23:51, Stefano Stabellini wrote: +/* + * Need to free pages after output_size here because they won't be + * freed by discard_initial_modules + */ +i = (output_size + PAGE_SIZE - 1) >> PAGE_SHIFT; +for ( ; i < (1 << kernel_order_out); i++ ) +free_do

Re: [Xen-devel] [xen-unstable test] 62156: regressions - FAIL

2015-09-22 Thread Ian Campbell
On Tue, 2015-09-22 at 00:23 +, osstest service owner wrote: > flight 62156 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/62156/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-amd64-xl-

Re: [Xen-devel] [PATCH v6 2/2] xen/arm: support gzip compressed kernels

2015-09-22 Thread Julien Grall
Hi Stefano, On 22/09/2015 02:35, Stefano Stabellini wrote: You may want to use vmap here which is a wrapper to __vmap and will setup the granularity, align, and flags automatically for you. The arguments are different. Yes, sorry I inverted nr with granularity. I meant to say that it makes

Re: [Xen-devel] [PATCH v7 15/17] vmx: VT-d posted-interrupt core logic handling

2015-09-22 Thread Jan Beulich
>>> On 22.09.15 at 09:19, wrote: > However, I do find some issues with my proposal above, see below: > > 1. Set _VPF_blocked > 2. ret = arch_block() > 3. if ( ret || local_events_need_delivery() ) > clear_bit(_VPF_blocked, &v->pause_flags); > > After step #2, if ret == false, that means, w

Re: [Xen-devel] [BUG] XEN domU crash when PV grub chainloads 32-bit domU grub

2015-09-22 Thread Ian Campbell
Hi Vladimir & grub-devel, Do you have any thoughts on this issue with i386 pv-grub2? Thanks, Ian. On Mon, 2015-09-21 at 22:03 +0200, Andreas Sundstrom wrote: > This is using Debian Jessie and grub 2.02~beta2-22 (with Debian patches > applied) and Xen 4.4.1 > > I originally posted a bug report w

Re: [Xen-devel] [BUG] XEN domU crash when PV grub chainloads 32-bit domU grub

2015-09-22 Thread Ian Campbell
On Tue, 2015-09-22 at 08:22 +0100, Andrew Cooper wrote: > > The segment registers indicate that the domU is executing in ring1 which > makes it a 32bit guest (also why 32bit words are used for the stack > dump), but r10 through r14 have 64bit values in. r10..r14 are not visible to 32-bit guests b

Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor "xentoollog" into its own library

2015-09-22 Thread Ian Campbell
On Mon, 2015-09-21 at 18:30 +0100, Andrew Cooper wrote: > On 21/09/15 18:13, Ian Jackson wrote: > > Andrew Cooper writes ("Re: [Xen-devel] [PATCH RFC tools 1/6] tools: > > Refactor "xentoollog" into its own library"): > > > On 21/09/15 17:17, Ian Jackson wrote: > > > > Do you mean that statement ex

Re: [Xen-devel] [PATCH 3/4 RFC] x86/p2m: use large pages for MMIO mappings

2015-09-22 Thread Jan Beulich
>>> On 17.09.15 at 18:37, wrote: > On 15/09/15 08:34, Jan Beulich wrote: >> @@ -2044,22 +2078,45 @@ int map_mmio_regions(struct domain *d, >> { >> int ret = 0; >> unsigned long i; >> +unsigned int iter, order; >> >> if ( !paging_mode_translate(d) ) >> return 0; >>

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-22 Thread Paolo Bonzini
On 21/09/2015 19:43, Andy Lutomirski wrote: > And maybe the KVM user return notifier. No, not really. If anything, the place in KVM where it makes a difference is vmx_save_host_state, which is also only using always-present MSRs. But don't care about KVM. First clean it up, then we can add ba

Re: [Xen-devel] [PATCH v7 08/28] xen/arm: ITS: Add APIs to add and assign device

2015-09-22 Thread Vijay Kilari
On Mon, Sep 21, 2015 at 7:17 PM, Julien Grall wrote: > Hi Vijay, > > On 18/09/15 14:08, vijay.kil...@gmail.com wrote: >> From: Vijaya Kumar K >> >> Add APIs to add devices to RB-tree, assign and remove >> devices to domain. >> [...] >> + >> +static void its_free_device(struct its_device *dev) >>

Re: [Xen-devel] [BUG] XEN domU crash when PV grub chainloads 32-bit domU grub

2015-09-22 Thread Andrew Cooper
On 21/09/2015 21:03, Andreas Sundstrom wrote: > This is using Debian Jessie and grub 2.02~beta2-22 (with Debian patches > applied) and Xen 4.4.1 > > I originally posted a bug report with Debian but got the suggestion to > file bugs with upstream as well. > Debian bug report: > https://bugs.debian.o

Re: [Xen-devel] [PATCH v7 15/17] vmx: VT-d posted-interrupt core logic handling

2015-09-22 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Monday, September 21, 2015 10:25 PM > To: Wu, Feng; George Dunlap; George Dunlap > Cc: Jan Beulich; Tian, Kevin; Keir Fraser; Andrew Cooper; > xen-devel@lists.xen.org > Subject: Re: [Xen-devel] [PATCH v

Re: [Xen-devel] [PATCH] IOMMU: complete/correct comment explaining "iommu=" sub-options

2015-09-22 Thread Andrew Cooper
On 22/09/2015 08:04, Jan Beulich wrote: > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper Some of these are overly Intel-specific, but while AMD has no implementation, this isn't much of a problem. ___ Xen-devel mailing list Xen-devel@lists.xen

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-22 Thread Ingo Molnar
* Linus Torvalds wrote: > On Mon, Sep 21, 2015 at 1:46 AM, Ingo Molnar wrote: > > > > Linus, what's your preference? > > So quite frankly, is there any reason we don't just implement > native_read_msr() as just > >unsigned long long native_read_msr(unsigned int msr) >{ > int err

[Xen-devel] [PATCH] IOMMU: complete/correct comment explaining "iommu=" sub-options

2015-09-22 Thread Jan Beulich
Signed-off-by: Jan Beulich --- a/xen/drivers/passthrough/iommu.c +++ b/xen/drivers/passthrough/iommu.c @@ -31,13 +31,19 @@ static void iommu_dump_p2m_table(unsigne * * off|no|false|disable Disable IOMMU (default) * force|required Don't boot unless IOMMU is enabled + *

<    1   2   3