Hi,
Thanks for the report. The maintainers list changed recently, so I'm
CC'ing the current set for VMX and x86/mm.
Since this is an L1 xen crash, the bug is probably in the code that
tried to inject the trap (vmi_write_8_pa() and callers). It's
interesting that both the L1 crashes were in
On Fri, 2015-12-11 at 11:48 +0800, Robert Hu wrote:
> On Fri, 2015-12-11 at 01:16 +, osstest service owner wrote:
> > flight 65633 linux-3.14 real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/65633/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
Wei did some manual investigation and found he could not reproduce this
issue on merlot1, later realising that he had XSM disabled in his build.
On that hunch I ran an adhoc flight with XSM both on and off, results
below. Public copy of the logs is at
El 11/12/15 a les 8.51, Tian, Kevin ha escrit:
>> From: Roger Pau Monne
>> Sent: Tuesday, December 08, 2015 12:48 AM
>>
>> Instead of choosing the interface to expose to guests based on the guest
>> type, do it based on whether the guest has an emulated local apic or not.
>>
>> Signed-off-by:
On Thu, 2015-12-10 at 18:19 +, George Dunlap wrote:
> On 07/12/15 09:16, Huaitong Han wrote:
> > +{
> > +void *xsave_addr;
> > +unsigned int pkru = 0;
> > +bool_t pkru_ad, pkru_wd;
> > +
> > +bool_t uf = !!(pfec & PFEC_user_mode);
> > +bool_t wf = !!(pfec &
>>> On 10.12.15 at 19:19, wrote:
> On 07/12/15 09:16, Huaitong Han wrote:
>> +if ( likely(!pte_pkeys) )
>> +return 0;
>> +
>> +/* Update vcpu xsave area */
>> +fpu_xsave(vcpu);
>
> Is there a reason you're calling fpu_xsave() directly here, rather
On 11/12/15 07:53, Jan Beulich wrote:
On 10.12.15 at 21:07, wrote:
>> On 01/12/15 13:35, Jan Beulich wrote:
>> On 01.12.15 at 12:37, wrote:
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -89,7
On Fri, 2015-12-11 at 12:04 +0800, Robert Hu wrote:
> On Tue, 2015-12-08 at 10:29 +, Ian Campbell wrote:
> > On Tue, 2015-12-08 at 08:06 +, Hu, Robert wrote:
> > > >
> > > [...]
> >
> > Please trim your quotes.
> >
> > > For your failure, as Kevin mentioned in other mail, we will find
>
>>> On 07.12.15 at 10:16, wrote:
> --- a/xen/arch/x86/xstate.c
> +++ b/xen/arch/x86/xstate.c
> @@ -146,12 +146,15 @@ static void __init setup_xstate_comp(void)
> }
> }
>
> -static void *get_xsave_addr(void *xsave, unsigned int xfeature_idx)
> +void
>>> On 11.12.15 at 10:23, wrote:
> On Thu, 2015-12-10 at 18:19 +, George Dunlap wrote:
>> On 07/12/15 09:16, Huaitong Han wrote:
>> > +if ( likely(!pte_pkeys) )
>> > +return 0;
>> > +
>> > +/* Update vcpu xsave area */
>> > +fpu_xsave(vcpu);
>>
>>
>>> On 10.12.15 at 10:33, wrote:
> @@ -167,10 +172,12 @@ static int queue_invalidate_wait(struct iommu *iommu,
> start_time = NOW();
> while ( poll_slot != QINVAL_STAT_DONE )
> {
> -if ( NOW() > (start_time + DMAR_OPERATION_TIMEOUT) )
> +
In order to be able to migrate pv-domains with more than 512 GB of RAM
the p2m information can be specified by the guest kernel via a virtual
mapped linear p2m list instead of a 3 level tree.
Add support for this new p2m format in libxc.
Signed-off-by: Juergen Gross
---
Where in the code base is the initialization of a new domain (to run
unmodified guests) done? Where is it given the details about the memory it
has access to?
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
With support of the virtual mapped linear p2m list for migration it is
now possible to detect structural changes of the p2m list which before
would either lead to a crashing or otherwise wrong behaving domU.
A guest supporting the linear p2m list will increment the
p2m_generation counter located
Add support for the virtual mapped linear p2m list of pv-domains in the
v2 migrate stream. This will allow to migrate domains larger than 512
GB.
Tested with 32- and 64-bit pv-domains both with and without linear p2m
list and with a hvm domain.
Juergen Gross (4):
libxc: split mapping p2m
In order to prepare using the virtual mapped linear p2m list for
migration split mapping of the p2m leaf pages into a separate function.
Signed-off-by: Juergen Gross
---
tools/libxc/xc_sr_save_x86_pv.c | 77 -
1 file changed, 45
Set the SIF_VIRT_P2M_4TOOLS flag for pv-domUs in the domain builder
to indicate the Xen tools have full support for the virtual mapped
linear p2m list.
This will enable pv-domUs to drop support of the 3 level p2m tree
and use the linear list only. Without setting this flag some kernels
might
>>> On 07.12.15 at 10:16, wrote:
> @@ -4605,6 +4605,18 @@ void hvm_cpuid(unsigned int input, unsigned int *eax,
> unsigned int *ebx,
> /* Don't expose INVPCID to non-hap hvm. */
> if ( (count == 0) && !hap_enabled(d) )
> *ebx &=
>>> On 10.12.15 at 21:03, wrote:
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -570,8 +570,10 @@ do{ asm volatile (
>\
> /* Fetch next part of the instruction
On 11/12/15 10:47, Jan Beulich wrote:
On 10.12.15 at 21:03, wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -570,8 +570,10 @@ do{ asm volatile (
>>
>>
>>> On 11.12.15 at 09:01, wrote:
> On 11.12.2015 at 3:28pm, wrote:
>> > From: Xu, Quan
>> > Sent: Thursday, December 10, 2015 5:33 PM
>> >
>> > If IOTLB/Context/IETC flush is timeout, we should think all devices
>> > under this IOMMU cannot function correctly.
>>
Instead of choosing the interface to expose to guests based on the guest
type, do it based on whether the guest has an emulated local apic or not.
Signed-off-by: Roger Pau Monné
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
>>> On 11.12.15 at 11:20, wrote:
> On 11/12/15 07:53, Jan Beulich wrote:
> On 10.12.15 at 21:07, wrote:
>>> On 01/12/15 13:35, Jan Beulich wrote:
>>> On 01.12.15 at 12:37, wrote:
> ---
>>> On 10.12.15 at 17:48, wrote:
> --- a/config/x86_32.mk
> +++ b/config/x86_32.mk
> @@ -6,7 +6,6 @@ CONFIG_MIGRATE := y
> CONFIG_XCUTILS := y
>
> HAS_MEM_ACCESS := y
> -HAS_MEM_PAGING := y
> HAS_MEM_SHARING := y
>
> CFLAGS += -m32 -march=i686
> --- a/config/x86_64.mk
>
On 11/12/15 01:42, quizy_jo...@outlook.com wrote:
> I'd like to inject int3 traps to hypercall handlers to be able to
> capture hypercalls. However, the dom0/xen would reboot whenever I
> create a new VM. Followup is the console output when this happens.
>
> *(XEN) Xen call trace:*
> (XEN)[]
On 11/12/15 07:35, Tian, Kevin wrote:
>> From: Zhang, Haozhong
>> Sent: Thursday, December 10, 2015 7:13 PM
>>
>> On 12/10/15 10:43, Tian, Kevin wrote:
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Tuesday, December 08, 2015 1:04 AM
On 07/12/15 10:16, Haozhong
This is useful for standalone or adhoc use as well as (presumably)
bisection.
There is no ap-* or cr-daily-* integration here because I didn't need
it (i.e. I'm not intending to create a new mini-os branch here).
Signed-off-by: Ian Campbell
---
mfi-common | 4 +++-
On Fri, 2015-12-11 at 12:12 +, Ian Campbell wrote:
> I think 10 repetitions indicates it probably wasn't a fluke, however I've
> kicked off a repeat (flight 65738) of the test to increase confidence.
>
> In the test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm case I've set
>
On Wed, 9 Dec 2015, Ian Campbell wrote:
> On Thu, 2015-12-03 at 11:23 +, Ian Campbell wrote:
> > diff --git a/hw/display/xenfb.c b/hw/display/xenfb.c
> > index 5e324ef..c96d974 100644
> > --- a/hw/display/xenfb.c
> > +++ b/hw/display/xenfb.c
> > @@ -104,9 +104,8 @@ static int
Adding the rtc platform device in non-privileged Xen PV guests causes
an IRQ conflict because these guests do not have legacy PIC and may
allocate irqs in the legacy range.
In a single VCPU Xen PV guest we should have:
/proc/interrupts:
CPU0
0: 4934 xen-percpu-virq
This is to limit symbol table growth, which would be quite a bit worse
if we went with the "label every unlikely sub-section contribution"
approach proposed previously.
Older gas doesn't support quoted symbols, yet the result looks quite
bit better that way. Hence two variants get introduced, one
> On 11.12.2015 at 6:01pm, wrote:
> >>> On 10.12.15 at 10:33, wrote:
> > @@ -167,10 +172,12 @@ static int queue_invalidate_wait(struct iommu
> *iommu,
> > start_time = NOW();
> > while ( poll_slot != QINVAL_STAT_DONE )
> > {
> > -
flight 38494 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38494/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-amd64-jessie-netboot-pygrub 9 debian-di-install fail like 38428
On 11/12/15 15:18, Andrew Cooper wrote:
> On 11/12/15 11:31, Juergen Gross wrote:
>> Add support for the virtual mapped linear p2m list of pv-domains in the
>> v2 migrate stream. This will allow to migrate domains larger than 512
>> GB.
>>
>> Tested with 32- and 64-bit pv-domains both with and
On 11/12/15 11:31, Juergen Gross wrote:
> In order to prepare using the virtual mapped linear p2m list for
> migration split mapping of the p2m leaf pages into a separate function.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Andrew Cooper
On 12/11/15 4:52 AM, Jan Beulich wrote:
On 10.12.15 at 17:48, wrote:
>> --- a/config/x86_32.mk
>> +++ b/config/x86_32.mk
>> @@ -6,7 +6,6 @@ CONFIG_MIGRATE := y
>> CONFIG_XCUTILS := y
>>
>> HAS_MEM_ACCESS := y
>> -HAS_MEM_PAGING := y
>> HAS_MEM_SHARING := y
>>
>>
> -Original Message-
> From: xen-devel-boun...@lists.xen.org
> [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Xu, Quan
> Sent: Friday, December 11, 2015 10:00 PM
> To: Jan Beulich
> Cc: Tian, Kevin; Wu, Feng; george.dun...@eu.citrix.com;
> andrew.coop...@citrix.com; t...@xen.org;
>>> On 11.12.15 at 12:12, wrote:
> On 11/12/15 10:47, Jan Beulich wrote:
>> Furthermore, doesn't this make the wrapping-inside-an-insn
>> situation worse (i.e. what looks broken for 32- and 64-bit modes
>> now gets broken also for 16-bit mode)?
>
> I don't understand
On Mon, 7 Dec 2015, Jan Beulich wrote:
> >>> On 07.12.15 at 15:56, wrote:
> > On Mon, 7 Dec 2015, Jan Beulich wrote:
> >> >>> On 07.12.15 at 13:45, wrote:
> >> > On Tue, 24 Nov 2015, Jan Beulich wrote:
> >> >> Now that the
On Fri, 4 Dec 2015, Julien Grall wrote:
> Hi Stefano:
>
> Can you please add xen/arm in the commit title?
>
> On 04/12/2015 12:36, Stefano Stabellini wrote:
> > Injecting a fault to the guest just because it is writing to one of the
> > GICD_ICACTIVER registers, which are part of the GICv2 and
flight 65643 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65643/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-rumpuserxen-i386 15
rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 64997
Hi Stefano,
On 11/12/15 14:36, Stefano Stabellini wrote:
> On Fri, 4 Dec 2015, Julien Grall wrote:
>> On 04/12/2015 12:36, Stefano Stabellini wrote:
>>> Injecting a fault to the guest just because it is writing to one of the
>>> GICD_ICACTIVER registers, which are part of the GICv2 and GICv3
On 11/12/15 11:31, Juergen Gross wrote:
> In order to be able to migrate pv-domains with more than 512 GB of RAM
> the p2m information can be specified by the guest kernel via a virtual
> mapped linear p2m list instead of a 3 level tree.
>
> Add support for this new p2m format in libxc.
>
>
flight 65635 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65635/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate
fail blocked in 65114
On Thu, 2015-12-10 at 18:27 +, Ian Jackson wrote:
> Ian Jackson writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database
> schema updates"):
> > It does say that updates are applied in order. I will add `and
> > monotonically increasing' after `unique'. [etc etc]
>
> Here is v3 of this
On 11.12.2015 at 6:05pm, wrote:
> >>> On 11.12.15 at 09:01, wrote:
> > On 11.12.2015 at 3:28pm, wrote:
> >> > From: Xu, Quan
> >> > Sent: Thursday, December 10, 2015 5:33 PM
> >> >
> >> > If IOTLB/Context/IETC flush is timeout, we should think
On 11/12/15 11:31, Juergen Gross wrote:
> Add support for the virtual mapped linear p2m list of pv-domains in the
> v2 migrate stream. This will allow to migrate domains larger than 512
> GB.
>
> Tested with 32- and 64-bit pv-domains both with and without linear p2m
> list and with a hvm domain.
>
On Fri, 2015-12-11 at 16:23 +, Ian Jackson wrote:
> The purpose of these locks is partly to prevent transactions being
> aborted (which I'm not sure the existing code would in practice cope
> with, although this is a bug) and also to avoid bugs due to the fact
> that
> SET TRANSACTION
On 11/12/15 13:42, Jan Beulich wrote:
> This is to limit symbol table growth, which would be quite a bit worse
> if we went with the "label every unlikely sub-section contribution"
> approach proposed previously.
>
> Older gas doesn't support quoted symbols, yet the result looks quite
> bit better
On 11 December 2015 at 17:01, Stefano Stabellini
wrote:
> On Fri, 11 Dec 2015, Peter Maydell wrote:
>> On 11 December 2015 at 16:52, Stefano Stabellini
>> wrote:
>> If this was intended for 2.5 you have missed the boat.
>
> I
On Fri, 2015-12-11 at 15:18 +, osstest service owner wrote:
> flight 65654 libvirt real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/65654/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>
flight 65650 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65650/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-localmigrate fail REGR. vs. 64765
After starting the xenstore domain write the basic data (domid and
name) to the xenstore.
Add a new option to init-xenstore-domain to be able to specify the
domain's name.
Signed-off-by: Juergen Gross
---
tools/xenstore/init-xenstore-domain.c | 13 -
1 file
Don't start a new xenstore domain in case one is already detected to
be running.
Signed-off-by: Juergen Gross
---
tools/xenstore/init-xenstore-domain.c | 25 +++--
1 file changed, 23 insertions(+), 2 deletions(-)
diff --git
Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database schema
updates"):
> On Fri, 2015-12-11 at 15:15 +, Ian Jackson wrote:
> > I can put this in a comment if you like.
>
> I suppose a comment next to any such override is a pretty good policy to
> have.
OK. See below; I
On Thu, 2015-12-10 at 15:21 +, George Dunlap wrote:
> On 03/12/15 11:22, Ian Campbell wrote:
> > It can trivially be replaced by xc_map_foreign_pages which is the
> > interface I want to move to going forward (by standardising on _bulk
> > but handling err=NULL as _pages does).
> >
> > The
Xen supports to run xenstore in a dedicated domain. It is, however, a
setup which isn't easy to configure. Today flask is required for full
functionality and the resulting xenstore domain is not configurable in
the same way as the xenstore daemon.
This patch series enables running a xenstore
Support the xenstore domain flag for obtaining domain info.
Signed-off-by: Juergen Gross
---
tools/libxc/include/xenctrl.h | 2 +-
tools/libxc/xc_domain.c | 17 +
2 files changed, 10 insertions(+), 9 deletions(-)
diff --git
On Fri, 2015-12-11 at 14:05 +, Ian Campbell wrote:
So returning to the logs for 65682 (the first repro, which exhibited the
fail with the usual timeout).
http://osstest.test-lab.xenproject.org/~osstest/pub/logs/65682/test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm/info.html
First
On 11/12/15 16:20, Andrew Cooper wrote:
> On 11/12/15 11:31, Juergen Gross wrote:
>> With support of the virtual mapped linear p2m list for migration it is
>> now possible to detect structural changes of the p2m list which before
>> would either lead to a crashing or otherwise wrong behaving domU.
On 11/12/15 16:00, Juergen Gross wrote:
> On 11/12/15 16:24, Andrew Cooper wrote:
> + */
> +static int map_p2m_list(struct xc_sr_context *ctx, uint64_t p2m_cr3)
> +{
> +xc_interface *xch = ctx->xch;
> +xen_vaddr_t p2m_vaddr, p2m_end, mask, off;
> +xen_pfn_t
The purpose of these locks is partly to prevent transactions being
aborted (which I'm not sure the existing code would in practice cope
with, although this is a bug) and also to avoid bugs due to the fact
that
SET TRANSACTION ISOLATION LEVEL SERIALIZABLE;
not mean that the transactions are
Our transactions generally run with
SET TRANSACTION ISOLATION LEVEL SERIALIZABLE;
(which, incidentally, does not mean that the transactions are
necessarily serialisable!)
In SQL in general it is possible for a read-only transaction to fail
and need to be retried because some writer has updated
On Wed, 2015-12-09 at 17:08 +, Ian Campbell wrote:
> On Wed, 2015-12-09 at 16:28 +, Ian Jackson wrote:
> > Ian Campbell writes ("Re: [PATCH XEN v6 25/32] tools/libs/gnttab:
> > Extensive updates to API documentation."):
> > > On Wed, 2015-12-09 at 16:09 +, Ian Jackson wrote:
> > > > Is
On Fri, 2015-12-11 at 16:23 +, Ian Jackson wrote:
> Our transactions generally run with
> SET TRANSACTION ISOLATION LEVEL SERIALIZABLE;
> (which, incidentally, does not mean that the transactions are
> necessarily serialisable!)
>
> In SQL in general it is possible for a read-only
On Fri, 11 Dec 2015, Ian Campbell wrote:
> On Fri, 2015-12-11 at 14:26 +, Stefano Stabellini wrote:
> > On Wed, 9 Dec 2015, Ian Campbell wrote:
> > > On Thu, 2015-12-03 at 11:23 +, Ian Campbell wrote:
> > > > diff --git a/hw/display/xenfb.c b/hw/display/xenfb.c
> > > > index
On 12/10/2015 11:53 AM, Boris Ostrovsky wrote:
Especially given that PVH dom0 is not booting for me, as I just found
out:
...
(XEN) d0v0 EPT violation 0x1aa (-w-/r-x) gpa 0x00c0008116 mfn
0xc0008 type 5
(XEN) d0v0 Walking EPT tables for GFN c0008:
(XEN) d0v0 epte 80082bf50007
Ian Campbell writes ("Re: [OSSTEST PATCH 2/2] Executive DB: Reduce strength of
DB locks"):
> On Fri, 2015-12-11 at 16:23 +, Ian Jackson wrote:
> > SET TRANSACTION ISOLATION LEVEL SERIALIZABLE;
> > not mean that the transactions are necessarily serialisable!
>
> ^does not?
Yes, thanks.
>
The following changes since commit 6e0abc251dd4f8eba1f53656dfede12e5840e83b:
blockdev: Mark {insert, remove}-medium experimental (2015-12-11 15:39:29
+)
are available in the git repository at:
git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-2015-12-11
for you to fetch
On Fri, 2015-12-11 at 16:44 +, Stefano Stabellini wrote:
>
> It is not possible to do this at runtime. I think we should do this at
> compile time because in any case it is not supported to run a QEMU built
> for a given Xen version on a different Xen version.
I am currently working pretty
On Fri, 11 Dec 2015, Peter Maydell wrote:
> On 11 December 2015 at 16:52, Stefano Stabellini
> wrote:
> > The following changes since commit 6e0abc251dd4f8eba1f53656dfede12e5840e83b:
> >
> > blockdev: Mark {insert, remove}-medium experimental (2015-12-11
On Fri, 11 Dec 2015, Jan Beulich wrote:
> >>> On 11.12.15 at 15:33, wrote:
> > On Mon, 7 Dec 2015, Jan Beulich wrote:
> >> >>> On 07.12.15 at 15:56, wrote:
> >> > On Mon, 7 Dec 2015, Jan Beulich wrote:
> >> >> >>> On 07.12.15 at
The Xen toolstack uses "vhd" to specify a disk in VHD format, however
the name of the driver in QEMU is "vpc". Replace "vhd" with "vpc", so
that QEMU can find the right driver to use for it.
Signed-off-by: Stefano Stabellini
---
hw/block/xen_disk.c |3 +++
Ian Campbell writes ("Re: [OSSTEST PATCH 1/2] Executive DB: Eliminate SQL
locking for read-only transactions"):
> On Fri, 2015-12-11 at 16:23 +, Ian Jackson wrote:
> > We retain the db_retry framing because (a) although the retry loop is
> > not necessary in these cases, the transaction
On 11 December 2015 at 16:52, Stefano Stabellini
wrote:
> The following changes since commit 6e0abc251dd4f8eba1f53656dfede12e5840e83b:
>
> blockdev: Mark {insert, remove}-medium experimental (2015-12-11 15:39:29
> +)
>
> are available in the git repository
Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database schema
updates"):
> On Thu, 2015-12-10 at 18:00 +, Ian Jackson wrote:
> > It does say that updates are applied in order.
>
> Right I was considering an osstest repo with 01 and 03 in it, which is
> applied and all up to
On 11/12/15 15:51, Andrew Cooper wrote:
> On 11/12/15 11:31, Juergen Gross wrote:
>> In order to be able to migrate pv-domains with more than 512 GB of RAM
>> the p2m information can be specified by the guest kernel via a virtual
>> mapped linear p2m list instead of a 3 level tree.
>>
>> Add
On 11/12/15 11:31, Juergen Gross wrote:
> With support of the virtual mapped linear p2m list for migration it is
> now possible to detect structural changes of the p2m list which before
> would either lead to a crashing or otherwise wrong behaving domU.
>
> A guest supporting the linear p2m list
On AArch64, the encoding 31 could be used to represent {x,w}sp or
{x,w}zr (See C1.2.4 in ARM DDI 0486A.d). The choice will depend how the
register field is interpreted by the instruction.
All the instructions trapped by Xen (either via a sysreg access or data
abort) interprets the encoding 31 as
The mapping between aarch64 and aarch32 has not been chosen in random.
It's based on D1.20.1 in ARM DDI 0487A.d.
The section is not obvious to find in the spec, so make it clear for the
anyone else.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/arm64/processor.h
Hi all,
This patch series aims to fix the emulation of register {w,x}zr for ARM64.
A branch is available with all the patches applied:
git://xenbits.xen.org/people/julieng/xen-unstable.git branch handle-xzr-v1
Regards,
Julien Grall (4):
xen/arm: io: handle_read: Use a local variable to
Factorize the code to emulate a a 32-bit/64-bit sysreg in specific
helpers.
While this is currently not necessary, it will be helpful in a following
patch to handle properly some registers.
Signed-off-by: Julien Grall
---
xen/arch/arm/vtimer.c | 47
Rather than getting dabt every time through info->dabt, introduce a
local variable and use it.
Also fix a coding style error in the if condition.
Signed-off-by: Julien Grall
---
xen/arch/arm/io.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git
Xenstore messages for diagnostic purposes are lost today in case
xenstore is running under mini-os instead in a dom0 daemon.
Use printk of mini-os in this situation.
Signed-off-by: Juergen Gross
---
tools/xenstore/utils.c | 6 ++
1 file changed, 6 insertions(+)
diff --git
init-xenstore-domain takes only positional parameters today. Change
this to a more flexible parameter syntax allowing to specify additional
options or to omit some.
Today the supported usage is:
init-xenstore-domain
[]
Modify this to:
init-xenstore-domain --kernel
On Wed, 2015-12-09 at 15:42 +, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH XEN v6 22/32] tools/libs/foreignmemory:
> optimise map(num==1, err==NULL) case"):
> > This looks to be a reasonably common case (many of the previous
> > callers to xc_map_foreign_pages use it) and it is easy
On 11/12/15 16:24, Andrew Cooper wrote:
>
+ */
+static int map_p2m_list(struct xc_sr_context *ctx, uint64_t p2m_cr3)
+{
+xc_interface *xch = ctx->xch;
+xen_vaddr_t p2m_vaddr, p2m_end, mask, off;
+xen_pfn_t p2m_mfn, mfn, saved_mfn, max_pfn;
+
For all supported targets HAS_MEM_ACCESS is enabled so this drops the
conditional and always makes it enabled. The goal here is to remove the
setting in the top level config directory when kconfig changes land.
Signed-off-by: Doug Goldstein
---
tools/tests/xen-access/Makefile
Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database schema
updates"):
> On Thu, 2015-12-10 at 18:27 +, Ian Jackson wrote:
> > See schema/README.schema, introduced in this patch, for the design.
>
> The README looks good now, thanks.
Thanks.
> Code comments
> > diff
Additional add some diagnostic messages to the program to have an idea
why it failed.
Signed-off-by: Juergen Gross
---
tools/xenstore/init-xenstore-domain.c | 109 +++---
1 file changed, 87 insertions(+), 22 deletions(-)
diff --git
In order to be able to have full support of a xenstore domain in Xen
add a "Xenstore-domain" flag to the hypervisor. This flag must be
specified at domain creation time and is returned by
XEN_DOMCTL_getdomaininfo.
It will allow the domain to retrieve domain information by issuing the
Add a parameter to init-xenstore-domain for support of arbitrary
parameters for the xenstore domain.
Signed-off-by: Juergen Gross
---
tools/xenstore/init-xenstore-domain.c | 21 -
1 file changed, 16 insertions(+), 5 deletions(-)
diff --git
On Fri, 2015-12-11 at 15:34 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database
> schema updates"):
> > On Fri, 2015-12-11 at 15:15 +, Ian Jackson wrote:
> > > I can put this in a comment if you like.
> >
> > I suppose a comment next to any such
On Fri, 2015-12-11 at 15:15 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 5/8] Schema: Support database
> schema updates"):
> > On Thu, 2015-12-10 at 18:27 +, Ian Jackson wrote:
> > > See schema/README.schema, introduced in this patch, for the design.
> >
> > The README
On Fri, 2015-12-11 at 14:26 +, Stefano Stabellini wrote:
> On Wed, 9 Dec 2015, Ian Campbell wrote:
> > On Thu, 2015-12-03 at 11:23 +, Ian Campbell wrote:
> > > diff --git a/hw/display/xenfb.c b/hw/display/xenfb.c
> > > index 5e324ef..c96d974 100644
> > > --- a/hw/display/xenfb.c
> > > +++
flight 65654 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/65654/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-vhd 9 debian-di-install fail REGR. vs. 63340
Tests which did not
>>> On 11.12.15 at 15:33, wrote:
> On Mon, 7 Dec 2015, Jan Beulich wrote:
>> >>> On 07.12.15 at 15:56, wrote:
>> > On Mon, 7 Dec 2015, Jan Beulich wrote:
>> >> >>> On 07.12.15 at 13:45, wrote:
On Fri, 2015-12-11 at 15:12 +, Ian Campbell wrote:
> Dec 10 20:13:39.584976 (XEN) avc: denied { pcilevel } for domid=8
> target=7 scontext=system_u:system_r:dm_dom_t
> tcontext=system_u:system_r:domU_t_target tclass=hvm
I wonder if this is an intx associated with the USB?
In the XSM case
>>> + */
>>> +static int map_p2m_list(struct xc_sr_context *ctx, uint64_t p2m_cr3)
>>> +{
>>> +xc_interface *xch = ctx->xch;
>>> +xen_vaddr_t p2m_vaddr, p2m_end, mask, off;
>>> +xen_pfn_t p2m_mfn, mfn, saved_mfn, max_pfn;
>>> +uint64_t *ptes;
>>> +xen_pfn_t *mfns;
>>> +
On Fri, Dec 11, 2015 at 3:42 PM, Ian Campbell wrote:
> On Thu, 2015-12-10 at 15:21 +, George Dunlap wrote:
>> On 03/12/15 11:22, Ian Campbell wrote:
>> > It can trivially be replaced by xc_map_foreign_pages which is the
>> > interface I want to move to going forward
1 - 100 of 130 matches
Mail list logo