Re: [Xen-devel] [PATCH 04/25 v6] xen/arm: vpl011: Add support for vuart in libxl

2017-07-18 Thread Julien Grall
Hi Bhupinder, Sorry I am jumping a bit late in the discussion here. On 17/07/17 14:06, Bhupinder Thakur wrote: An option is provided in libxl to enable/disable sbsa vuart while s/sbsa/SBSA/ creating a guest domain. Libxl now suppots a generic vuart console and sbsa uart is a specific

[Xen-devel] Pass through in Xen

2017-07-18 Thread ajmalmalib4u
Hi,   I am trying to learn how Passthrough works in xen. As an initial step I have tried to do PCI passthrough in my PC with Ubuntu 16.04 LTS (Xenial Xerus) as Dom0 and DomU. For that I had to rebuild the kernel to add xen support and with the procedure explained in,  

Re: [Xen-devel] [PATCH 25/25 v6] xen/arm: vpl011: Update documentation for vuart console support

2017-07-18 Thread Julien Grall
Hi Bhupinder, Sorry I am jumping a bit late in the discussion here. On 17/07/17 14:06, Bhupinder Thakur wrote: 1. Update documentation for a new vuart option added. 2. Update documentation about SPI irq reserved for vuart. Signed-off-by: Bhupinder Thakur

[Xen-devel] [ovmf test] 111973: all pass - PUSHED

2017-07-18 Thread osstest service owner
flight 111973 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/111973/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 5fc3889bb3c64f8cd81d7d387f829f146a1998fd baseline version: ovmf

[Xen-devel] [tip:x86/mm] xen/x86: Remove SME feature in PV guests

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f2f931c6819467af5260a21c59fb787ce2863f92 Gitweb: http://git.kernel.org/tip/f2f931c6819467af5260a21c59fb787ce2863f92 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:29 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017

Re: [Xen-devel] [PATCH 24/25 v6] xen/arm: vpl011: Add a pl011 uart DT node in the guest device tree

2017-07-18 Thread Julien Grall
Hi Bhupinder, On 17/07/17 14:06, Bhupinder Thakur wrote: The SBSA UART node format is as specified in Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below: ARM SBSA defined generic UART -- This UART uses a subset of the PL011 registers and

Re: [Xen-devel] Notes for Design Session: Loose ends for becoming a CNA (CVE Numbering Authorities) and other Security Team Operational Questions

2017-07-18 Thread Lars Kurth
A small correction > On 18 Jul 2017, at 11:37, Lars Kurth wrote: > > ... > b) The alternative would be for the security team to fix issues in private > and bundle as we already do and pre-disclose 2 weeks before a fixed monthly > embargo date. The effect would be

[Xen-devel] [ovmf baseline-only test] 71700: regressions - FAIL

2017-07-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71700 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71700/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 15

[Xen-devel] [linux-linus bisection] complete test-amd64-amd64-xl

2017-07-18 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-xl testid guest-localmigrate Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu

[Xen-devel] [PATCH RFC 12/12] x86/vvmx: remove EPTP write from ept_handle_violation()

2017-07-18 Thread Sergey Dyasli
Now there is no need to update shadow EPTP after handling L2 EPT violation since all EPTP updates are handled by nvmx_eptp_update(). Signed-off-by: Sergey Dyasli --- xen/arch/x86/hvm/vmx/vmx.c | 6 -- 1 file changed, 6 deletions(-) diff --git

[Xen-devel] [PATCH RFC 11/12] x86/np2m: add break to np2m_flush_eptp()

2017-07-18 Thread Sergey Dyasli
Now that np2m sharing is implemented, there can be only one np2m object with the same np2m_base. Break from loop if the required np2m was found during np2m_flush_eptp(). Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/p2m.c | 3 +++ xen/include/asm-x86/p2m.h | 2

[Xen-devel] [PATCH RFC 10/12] x86/np2m: implement sharing of np2m between vCPUs

2017-07-18 Thread Sergey Dyasli
Modify p2m_get_nestedp2m() to allow sharing a np2m between multiple vcpus with the same np2m_base (L1 EPTP value in VMCS12). np2m_schedule_in/out() callbacks are added to context_switch() as well as pseudo schedule-out is performed during virtual_vmexit(). Signed-off-by: Sergey Dyasli

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Julien Grall
On 18/07/17 10:49, Sergej Proskurin wrote: Hi Julien, Hello Sergej, On 07/17/2017 05:38 PM, Julien Grall wrote: Hi Sergej, On 06/07/17 12:50, Sergej Proskurin wrote: This commit moves the function vgic_access_guest_memory to guestcopy.c and the header asm/guest_access.h. No functional

[Xen-devel] Notes for Design Session: Loose ends for becoming a CNA (CVE Numbering Authorities) and other Security Team Operational Questions

2017-07-18 Thread Lars Kurth
Hi all, on the following topic in session http://sched.co/AjHl we discussed the following issues Here are my notes ACTIONS for * Julien Grall/Stefano Stabellini * Andrew Cooper * Ian Jackson * Lars Kurth * Security team members Regards Lars = Consolidate Security Coverage Documents for CNA =

Re: [Xen-devel] [PATCH v9 7/7] tools/xen-mceinj: add support of injecting LMCE

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 11:33:04AM +0100, Wei Liu wrote: > On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote: > > > > +static int inject_lmce(xc_interface *xc_handle, unsigned int cpu) > > +{ > > +uint8_t *cpumap = NULL; > > +size_t cpumap_size, line, shift; > > +

[Xen-devel] [PATCH RFC 02/12] x86/np2m: add np2m_flush_eptp()

2017-07-18 Thread Sergey Dyasli
The new function finds all np2m objects with the specified eptp and flushes them. p2m_flush_table_locked() is added in order not to release the p2m lock after np2m_base check. Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/p2m.c | 34

[Xen-devel] [PATCH RFC 08/12] x86/np2m: add p2m_get_nestedp2m_locked()

2017-07-18 Thread Sergey Dyasli
The new function returns still write-locked np2m. Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/p2m.c | 12 +--- xen/include/asm-x86/p2m.h | 2 ++ 2 files changed, 11 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/mm/p2m.c

[Xen-devel] [PATCH RFC 05/12] x86/np2m: add np2m_generation

2017-07-18 Thread Sergey Dyasli
Add np2m_generation variable to both p2m_domain and nestedvcpu. np2m's generation will be incremented each time the np2m is flushed. This will allow to detect if a nested vcpu has the stale np2m. Signed-off-by: Sergey Dyasli --- xen/arch/x86/hvm/nestedhvm.c | 1 +

[Xen-devel] [PATCH RFC 01/12] x86/np2m: refactor p2m_get_nestedp2m()

2017-07-18 Thread Sergey Dyasli
1. Add a helper function assign_np2m() 2. Remove useless volatile 3. Update function's comment in the header 4. Minor style fixes ('\n' and d) Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/p2m.c | 31 ++- xen/include/asm-x86/p2m.h |

[Xen-devel] [PATCH RFC 07/12] x86/np2m: add np2m_schedule_in/out()

2017-07-18 Thread Sergey Dyasli
np2m maintenance is required for a nested vcpu during scheduling: 1. On schedule-out: clear pCPU's bit in p2m->dirty_cpumask to prevent useless IPIs. 2. On schedule-in: check if np2m is up to date and wasn't flushed. Signed-off-by: Sergey Dyasli

[Xen-devel] [PATCH RFC 03/12] x86/vvmx: use np2m_flush_eptp() for INVEPT_SINGLE_CONTEXT

2017-07-18 Thread Sergey Dyasli
nvmx_handle_invept() updates current's np2m just to flush it. Instead, use the new np2m_flush_eptp() directly for this purpose. Signed-off-by: Sergey Dyasli --- xen/arch/x86/hvm/vmx/vvmx.c | 7 +-- 1 file changed, 1 insertion(+), 6 deletions(-) diff --git

[Xen-devel] [PATCH RFC 04/12] x86/np2m: remove np2m_base from p2m_get_nestedp2m()

2017-07-18 Thread Sergey Dyasli
Remove np2m_base parameter as it should always match the value of EPTP in VMCS12. Signed-off-by: Sergey Dyasli --- xen/arch/x86/hvm/svm/nestedsvm.c | 2 +- xen/arch/x86/hvm/vmx/vvmx.c | 3 +-- xen/arch/x86/mm/hap/nested_hap.c | 2 +- xen/arch/x86/mm/p2m.c

[Xen-devel] [PATCH RFC 00/12] Nested p2m: allow sharing between vCPUs

2017-07-18 Thread Sergey Dyasli
Nested p2m (shadow EPT) is an object that stores memory address translations from L2 GPA directly to L0 HPA. This is achieved by combining together L1 EPT tables with L0 EPT during L2 EPT violations. In the usual case, L1 uses the same EPTP value in VMCS12 for all vCPUs of a L2 guest. But

[Xen-devel] [PATCH v2] arm/p2m: Cleanup access to the host's p2m

2017-07-18 Thread Sergej Proskurin
This commit substitutes the direct access of the host's p2m (>arch.p2m) for the macro "p2m_get_hostp2m". This macro simplifies readability and also the differentiation between the host's p2m and alternative p2m's, i.e., as part of the altp2m subsystem that will be submitted in the future.

[Xen-devel] [PATCH RFC 09/12] x86/np2m: improve nestedhvm_hap_nested_page_fault()

2017-07-18 Thread Sergey Dyasli
There is a possibility for nested_p2m to became stale between nestedhvm_hap_nested_page_fault() and nestedhap_fix_p2m(). Simply use p2m_get_nestedp2m_lock() to guarantee that correct np2m is used. Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/hap/nested_hap.c | 29

[Xen-devel] [PATCH RFC 06/12] x86/vvmx: add stale_eptp flag

2017-07-18 Thread Sergey Dyasli
The new variable will indicate if update of a shadow EPTP is needed prior to vmentry. Update is required if a nested vcpu gets a new np2m or if its np2m was flushed by an IPI. Helper function nvcpu_flush() is added. Signed-off-by: Sergey Dyasli ---

Re: [Xen-devel] [PATCH v9 7/7] tools/xen-mceinj: add support of injecting LMCE

2017-07-18 Thread Wei Liu
On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote: > > +static int inject_lmce(xc_interface *xc_handle, unsigned int cpu) > +{ > +uint8_t *cpumap = NULL; > +size_t cpumap_size, line, shift; > +unsigned int nr_cpus; > +int ret; > + > +nr_cpus =

Re: [Xen-devel] [PATCH v6 10/14] arm/guest_access: Rename vgic_access_guest_memory

2017-07-18 Thread Julien Grall
On 18/07/17 09:42, Sergej Proskurin wrote: Hi Julien, On 07/17/2017 05:43 PM, Julien Grall wrote: Hi Sergej, On 06/07/17 12:50, Sergej Proskurin wrote: This commit renames the function vgic_access_guest_memory to access_guest_memory_by_ipa. As the function name suggests, the functions

Re: [Xen-devel] [PATCH 15/15] xen: tools: expose EPC in ACPI table

2017-07-18 Thread Roger Pau Monné
On Tue, Jul 18, 2017 at 08:36:15PM +1200, Huang, Kai wrote: > > > On 7/17/2017 10:54 PM, Roger Pau Monné wrote: > > On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote: > > > On physical machine EPC is exposed in ACPI table via "INT0E0C". Although > > > EPC > > > can be discovered by

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Razvan Cojocaru
On 07/18/2017 01:09 PM, Andrew Cooper wrote: > On 18/07/17 10:37, Petre Pircalabu wrote: >> If case of a vm_event with the emulate_flags set, if the instruction >> cannot be emulated, the monitor should be notified instead of directly >> injecting a hw exception. >> This behavior can be used to

Re: [Xen-devel] [PATCH 01/15] xen: x86: expose SGX to HVM domain in CPU featureset

2017-07-18 Thread Andrew Cooper
On 09/07/17 09:04, Kai Huang wrote: > Expose SGX in CPU featureset for HVM domain. SGX will not be supported for > PV domain, as ENCLS (which SGX driver in guest essentially runs) must run > in ring 0, while PV kernel runs in ring 3. Theoretically we can support SGX > in PV domain via either

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Andrew Cooper
On 18/07/17 10:37, Petre Pircalabu wrote: > If case of a vm_event with the emulate_flags set, if the instruction > cannot be emulated, the monitor should be notified instead of directly > injecting a hw exception. > This behavior can be used to re-execute an instruction not supported by > the

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 12:37:32PM +0300, Petre Pircalabu wrote: > If case of a vm_event with the emulate_flags set, if the instruction > cannot be emulated, the monitor should be notified instead of directly > injecting a hw exception. > This behavior can be used to re-execute an instruction not

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Paul Durrant
> -Original Message- > From: Petre Pircalabu [mailto:ppircal...@bitdefender.com] > Sent: 18 July 2017 10:38 > To: xen-devel@lists.xen.org > Cc: rcojoc...@bitdefender.com; ta...@tklengyel.com; Ian Jackson > ; Wei Liu ; Paul Durrant >

Re: [Xen-devel] [xen-devel][xen/Arm]xen fail to boot on omap5 board

2017-07-18 Thread Andrii Anisov
Dear Shishir, On 18.07.17 12:05, shishir tiwari wrote: Hi I want test and understand xen hypervisor implementation with dom0 and domU on omap5 board. I followed https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM with latest kernel(4.11.7) and xen(4.9.0)

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Sergej Proskurin
Hi Julien, On 07/17/2017 05:38 PM, Julien Grall wrote: > Hi Sergej, > > On 06/07/17 12:50, Sergej Proskurin wrote: >> This commit moves the function vgic_access_guest_memory to guestcopy.c >> and the header asm/guest_access.h. No functional changes are made. >> Please note that the function will

Re: [Xen-devel] Question about Xen on ARM

2017-07-18 Thread Andrii Anisov
Dear Christopher, On 18.07.17 12:08, Andrii Anisov wrote: In order to build the required system, a board candidate should: - have a CPU able to switch to EL2/Virtualization mode - have a public bootloader sources able to switch CPU to EL2/Virtualizaiotn mode - have a Linux system

[Xen-devel] [xen-unstable baseline-only test] 71697: regressions - trouble: blocked/broken/fail/pass

2017-07-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71697 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71697/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 20

[Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Petre Pircalabu
If case of a vm_event with the emulate_flags set, if the instruction cannot be emulated, the monitor should be notified instead of directly injecting a hw exception. This behavior can be used to re-execute an instruction not supported by the emulator using the real processor (e.g. altp2m) instead

Re: [Xen-devel] Regarding hdmi sharing in xen

2017-07-18 Thread Andrii Anisov
Dear George John, On 17.07.17 09:59, George John wrote: I have a r-car H3 board with Dom0 and two DomU's. Are you speaking about Salvator-X or H3ULCB? Do we have to passthrough one of the hdmi ports to the one guest if we could implement GPU sharing between Dom0 and one DomU in r-car h3

Re: [Xen-devel] [PATCH] scripts/get_maintainers.pl: Don't blindly drop "THE REST" maintainers

2017-07-18 Thread Andrew Cooper
On 17/07/17 19:18, Julien Grall wrote: > "THE REST" maintainers should always be CCed for any modification that > don't fall under the responsability of a specific component maintainer. > > However, the script get_maintainers.pl will remove "THE REST" > maintainers as soon as one maintainer of a

Re: [Xen-devel] Question about Xen on ARM

2017-07-18 Thread Andrii Anisov
Dear Christopher, On 14.07.17 00:39, Christopher Lambert wrote: I would like to test xen on an ARM target with one linux (as dom0) and one android (as domU). As I know there were built such setups on Renesas R-Car H2 and H3, and TI DRA7xx based boards (Lager, Salvator-X and Jacinto6 EVM board

[Xen-devel] [xen-devel][xen/Arm]xen fail to boot on omap5 board

2017-07-18 Thread shishir tiwari
Hi I want test and understand xen hypervisor implementation with dom0 and domU on omap5 board. I followed https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM with latest kernel(4.11.7) and xen(4.9.0) and device tree and but unable to boot dom0. xen stop on

Re: [Xen-devel] [PATCH 1/6] xen-blkfront: quiesce/unquiesce queue instead of start/stop queues

2017-07-18 Thread Ming Lei
On Tue, Jul 18, 2017 at 08:40:18AM +0100, Roger Pau Monné wrote: > On Tue, Jul 18, 2017 at 08:53:28AM +0800, Ming Lei wrote: > > On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote: > > > On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote: > > > > On Mon, Jul 17, 2017 at

Re: [Xen-devel] [PATCH v4 7/9] vpci/msi: add MSI handlers

2017-07-18 Thread Paul Durrant
> -Original Message- > From: Roger Pau Monne [mailto:roger@citrix.com] > Sent: 30 June 2017 16:01 > To: xen-de...@lists.xenproject.org > Cc: boris.ostrov...@oracle.com; julien.gr...@arm.com; > konrad.w...@oracle.com; Roger Pau Monne ; Jan > Beulich

Re: [Xen-devel] [PATCH v6 10/14] arm/guest_access: Rename vgic_access_guest_memory

2017-07-18 Thread Sergej Proskurin
Hi Julien, On 07/17/2017 05:43 PM, Julien Grall wrote: > Hi Sergej, > > On 06/07/17 12:50, Sergej Proskurin wrote: >> This commit renames the function vgic_access_guest_memory to >> access_guest_memory_by_ipa. As the function name suggests, the functions >> expects an ipa as argument. Thus, to

Re: [Xen-devel] [PATCH 15/15] xen: tools: expose EPC in ACPI table

2017-07-18 Thread Huang, Kai
On 7/17/2017 10:54 PM, Roger Pau Monné wrote: On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote: On physical machine EPC is exposed in ACPI table via "INT0E0C". Although EPC can be discovered by CPUID but Windows driver requires EPC to be exposed in ACPI table as well. This patch

[Xen-devel] [linux-linus test] 111939: regressions - trouble: blocked/broken/fail/pass

2017-07-18 Thread osstest service owner
flight 111939 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/111939/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 110515

Re: [Xen-devel] [RFC PATCH 00/15] RFC: SGX virtualization design and draft patches

2017-07-18 Thread Huang, Kai
Hi Wei, Thank you very much for comments. Please see my reply below. On 7/17/2017 9:16 PM, Wei Liu wrote: Hi Kai Thanks for this nice write-up. Some comments and questions below. On Sun, Jul 09, 2017 at 08:03:10PM +1200, Kai Huang wrote: Hi all, [...] 2. SGX Virtualization Design 2.1

[Xen-devel] [ovmf baseline-only test] 71698: all pass

2017-07-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71698 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71698/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf d4f6c35c84b8503bc2acde89a7adb7ee05c56516 baseline

Re: [Xen-devel] [PATCH 2/2] xen: dont fiddle with event channel masking in suspend/resume

2017-07-18 Thread Thomas Gleixner
On Mon, 17 Jul 2017, Juergen Gross wrote: > Instead of fiddling with masking the event channels during suspend > and resume handling let do the irq subsystem do its job. It will do > the mask and unmask operations as needed. > > Signed-off-by: Juergen Gross Acked-by: Thomas

Re: [Xen-devel] [PATCH][xen-next] xen/pvcalls: fix null pointer reference on sock_release call

2017-07-18 Thread Juergen Gross
On 11/07/17 21:41, Colin King wrote: > From: Colin Ian King > > Currently a sock_release on map->sock will result in a null pointer > deference on map when map is null. Instead, the sock_relase sould > be on sock and not map->sock. > > Detected by CoverityScan,

Re: [Xen-devel] [PATCH v1] xen/grant-table: log the lack of grants

2017-07-18 Thread Juergen Gross
On 07/07/17 20:23, Wengang Wang wrote: > log a message when we enter this situation: > 1) we already allocated the max number of available grants from hypervisor > and > 2) we still need more (but the request fails because of 1)). > > Sometimes the lack of grants causes IO hangs in xen_blkfront

Re: [Xen-devel] [PATCH] xen/x86: Don't BUG on CPU0 offlining

2017-07-18 Thread Juergen Gross
On 26/06/17 18:39, Vitaly Kuznetsov wrote: > CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests > BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a > leftover from ancient times when CPU0 hotplug was impossible, it works > just fine for HVM. > >

Re: [Xen-devel] [PATCH v5] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Paul Durrant
> -Original Message- > From: Petre Pircalabu [mailto:ppircal...@bitdefender.com] > Sent: 17 July 2017 17:47 > To: xen-devel@lists.xen.org > Cc: rcojoc...@bitdefender.com; ta...@tklengyel.com; Ian Jackson > ; Wei Liu ; Paul Durrant >

Re: [Xen-devel] [PATCH 1/6] xen-blkfront: quiesce/unquiesce queue instead of start/stop queues

2017-07-18 Thread Roger Pau Monné
On Tue, Jul 18, 2017 at 08:53:28AM +0800, Ming Lei wrote: > On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote: > > On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote: > > > On Mon, Jul 17, 2017 at 12:20:56PM +0100, Roger Pau Monné wrote: > > > > seems fairly easy to mess up and

Re: [Xen-devel] [PATCH v1] xen/grant-table: log the lack of grants

2017-07-18 Thread Juergen Gross
On 07/07/17 20:23, Wengang Wang wrote: > log a message when we enter this situation: > 1) we already allocated the max number of available grants from hypervisor > and > 2) we still need more (but the request fails because of 1)). > > Sometimes the lack of grants causes IO hangs in xen_blkfront

Re: [Xen-devel] [PATCH] xen/pvcalls: NULL dereference in error handling

2017-07-18 Thread Juergen Gross
On 12/07/17 09:25, Dan Carpenter wrote: > We accidentally dereference "map" when it's NULL. > > Fixes: b535e2b9b78a ("xen/pvcalls: implement connect command") > Signed-off-by: Dan Carpenter The patch is okay, but the very same one has already been sent before. I'll

[Xen-devel] [ovmf test] 111959: all pass - PUSHED

2017-07-18 Thread osstest service owner
flight 111959 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/111959/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 357c48258e0b452d31f487a47dca486ba666a954 baseline version: ovmf

[Xen-devel] Is there a way domU (1) can find the UUID of domU (2) ?

2017-07-18 Thread deepak
Let there be two domU's - domU (1) and domU (2) Is there a way domU (1) can find the UUID of domU (2) ? Please tell. Thanks. -- View this message in context: http://xen.1045712.n5.nabble.com/Is-there-a-way-domU-1-can-find-the-UUID-of-domU-2-tp5737307.html Sent from the Xen - Dev mailing list

<    1   2   3