On Wed, Aug 02, Olaf Hering wrote:
> +++ b/tools/libxc/xc_sr_restore_x86_hvm.c
> +#define SUPERPAGE_2MB_SHIFT 9
> +#define SUPERPAGE_2MB_NR_PFNS (1UL << SUPERPAGE_2MB_SHIFT)
> +#define SUPERPAGE_1GB_SHIFT 18
> +#define SUPERPAGE_1GB_NR_PFNS (1UL << SUPERPAGE_1GB_SHIFT)
I think these can be
>>> Yi Sun 08/04/17 5:23 AM >>>
>On 17-08-03 03:37:06, Jan Beulich wrote:
>> >>> On 03.08.17 at 04:10, wrote:
>> > @@ -1283,10 +1344,20 @@ static void psr_cpu_init(void)
>> > feat = feat_l3;
>> > feat_l3 = NULL;
>> >
>> > -
This run is configured for baseline tests only.
flight 71933 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71933/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1)
flight 112427 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112427/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 15 guest-stop fail in
112419 pass in 112427
flight 112435 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112435/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
flight 112423 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112423/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 112286
On 17-08-03 13:26:37, Wei Liu wrote:
> On Tue, Aug 01, 2017 at 04:48:32PM +0800, Yi Sun wrote:
> > This patch creates CAT and CDP feature document in doc/features/. It
> > describes
> > key points to implement L3 CAT/CDP and L2 CAT which is described in details
> > in
> > Intel SDM "INTEL?
On 17-08-04 10:21:51, Yi Sun wrote:
> On 17-08-03 18:50:02, Boris Ostrovsky wrote:
> >
> >
> > On 08/03/2017 11:37 AM, Andrew Cooper wrote:
> > >(XEN) [ 1071.542500] Xen call trace:
> > >(XEN) [ 1071.542505][] psr_domain_free+0x23/0xcc
> > >(XEN) [ 1071.542514][]
As set value flow is the most complicated one in psr, it will be
divided to some patches to make things clearer. This patch
implements the set value framework to show a whole picture firstly.
It also changes domctl interface to make it more general.
To make the set value flow be general and can
On 17-08-03 03:37:06, Jan Beulich wrote:
> >>> On 03.08.17 at 04:10, wrote:
> > @@ -1283,10 +1344,20 @@ static void psr_cpu_init(void)
> > feat = feat_l3;
> > feat_l3 = NULL;
> >
> > -if ( !cat_init_feature(, feat, info, FEAT_TYPE_L3_CAT) )
>
This patch implements the CPU init flow for CDP. The flow is almost
same as L3 CAT.
Signed-off-by: Yi Sun
---
v15:
- refine process in 'psr_cpu_init' to remove the 'goto' and merge two
if()s.
(suggested by Jan Beulich)
v14:
- remove the 'Notes' in
flight 112434 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112434/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
Hi,
I should have mentioned that this RFC only adds support to the x86 side.
Sorry for that.
Cheers,
Zhongze Liu
2017-08-04 10:20 GMT+08:00 Zhongze Liu :
> This series implements the new xl config entry proposed in [1]. Users can use
> the new config entry to statically
On 17-08-03 18:50:02, Boris Ostrovsky wrote:
>
>
> On 08/03/2017 11:37 AM, Andrew Cooper wrote:
> >On 01/08/17 09:48, Yi Sun wrote:
> >>Hi all,
> >>
> >>We plan to bring a new PSR (Platform Shared Resource) feature called
> >>Intel L2 Cache Allocation Technology (L2 CAT) to Xen. It has been
Add the parsing utils for the newly introduced libxl_static_sshm struct
to the libxl/libxlu_* family. And add realated parsing code in xl to
parse the struct from xl config files. This is for the proposal "Allow
setting up shared memory areas between VMs from xl config file" (see [1]).
[1]
creation:
* Check for further errors in the static_shm configs: overlapping
areas, invalid ranges, duplicated master domain, no master domain etc.
* Add code for writing infomations of static shared memory areas
into the appropriate xenstore paths.
* use xc_domain_add_to_physmap_batch to do
Add a new structure to the IDL famliy to represent static shared memory regions,
as proposed in the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu
Two checks in the p2m code forbids sharing physical pages among DomU's by using
xc_add_to_physmap_batch with XENMAPSPACE_gmfn_foreign. Just simply remove them
in this RFC patch to ask for suggestions on how to properly handle this.
This is for the proposal "Allow setting up shared memory areas
This series implements the new xl config entry proposed in [1]. Users can use
the new config entry to statically setup shared memory areas among VMs so that
they could communicate with each other through the static shared memory areas.
[1] Proposla to allow setting up shared memory areas between
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, August 3, 2017 5:44 PM
>
> >>> On 13.06.17 at 10:29, wrote:
> On 13.06.17 at 10:20, wrote:
> >> From the context calling pi_desc_init(), we can conclude the current
> >> implementation
flight 112432 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112432/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
flight 112424 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112424/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf bb4831c03dd15ff8528dcdbc7d2ad1835f55563e
baseline version:
ovmf
flight 112422 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112422/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-arm64-pvops 2 hosts-allocate broken REGR. vs. 111765
build-arm64-xsm
flight 112429 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112429/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
On 08/03/2017 11:37 AM, Andrew Cooper wrote:
On 01/08/17 09:48, Yi Sun wrote:
Hi all,
We plan to bring a new PSR (Platform Shared Resource) feature called
Intel L2 Cache Allocation Technology (L2 CAT) to Xen. It has been enabled
in Linux Kernel.
Unfortunately, the result is problematic.
flight 112421 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112421/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
On Thu, Aug 3, 2017 at 12:03 PM, Dario Faggioli
wrote:
> On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
>> --- a/tools/xl/xl_cmdtable.c
>> +++ b/tools/xl/xl_cmdtable.c
>> @@ -272,12 +272,13 @@ struct cmd_spec cmd_table[] = {
>> { "sched-rtds",
>>
flight 112420 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112420/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
On Thu, Aug 3, 2017 at 11:53 AM, Dario Faggioli
wrote:
> On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
>> diff --git a/tools/libxl/libxl_types.idl
>> b/tools/libxl/libxl_types.idl
>> index 8a9849c..f6c3ead 100644
>> --- a/tools/libxl/libxl_types.idl
>> +++
flight 112428 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112428/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
flight 112426 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112426/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 15 guest-saverestorefail REGR. vs. 112402
On 08/03/2017 06:20 PM, George Dunlap wrote:
> On 07/03/2017 03:53 PM, Ross Lagerwall wrote:
>> On 06/30/2017 02:42 PM, George Dunlap wrote:
>>> On 06/28/2017 05:18 PM, Ross Lagerwall wrote:
On 06/27/2017 10:17 AM, George Dunlap wrote:
> On 26/06/17 18:30, Andrew Cooper wrote:
>> On
On 07/03/2017 03:53 PM, Ross Lagerwall wrote:
> On 06/30/2017 02:42 PM, George Dunlap wrote:
>> On 06/28/2017 05:18 PM, Ross Lagerwall wrote:
>>> On 06/27/2017 10:17 AM, George Dunlap wrote:
On 26/06/17 18:30, Andrew Cooper wrote:
> On 26/06/17 18:00, George Dunlap wrote:
>> On
flight 112419 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112419/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 15 guest-stop fail REGR.
vs. 111017
>>> Andrew Cooper 08/03/17 6:01 PM >>>
>On 03/08/17 16:51, Jan Beulich wrote:
> Andrew Cooper 07/27/17 7:48 PM >>>
>>> +#define COPY_LEAF(l, s, data) \
>>> +({ int ret; /* Elide leaves which are fully
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
> --- a/tools/xl/xl_cmdtable.c
> +++ b/tools/xl/xl_cmdtable.c
> @@ -272,12 +272,13 @@ struct cmd_spec cmd_table[] = {
> { "sched-rtds",
> _sched_rtds, 0, 1,
> "Get/set rtds scheduler parameters",
> - "[-d [-v[=VCPUID/all]]
On 03/08/17 16:51, Jan Beulich wrote:
Andrew Cooper 07/27/17 7:48 PM >>>
>> @@ -599,6 +600,93 @@ int init_domain_cpuid_policy(struct domain *d)
>> return 0;
>> }
> >
>> +/*
>> + * Copy a single cpuid_leaf into a guest-provided xen_cpuid_leaf_t buffer,
>> + *
Hello James, Julien,
regarding your previous mails. I was able to single step every instruction
of my module. The problem (or rather the solution) was to _disable_ the IRQ
interrupts from within my guest module. This solves the problem of
singlestepping a module which previously ended in a
>>> Alexandru Isaila 08/03/17 5:29 PM >>>
>--- a/xen/arch/x86/hvm/hypercall.c
>+++ b/xen/arch/x86/hvm/hypercall.c
>@@ -152,9 +152,17 @@ int hvm_hypercall(struct cpu_user_regs *regs)
>{
>case 8:
>eax = regs->rax;
>+if ( currd->monitor.guest_request_userspace_vmcall
On Thu, Aug 3, 2017 at 11:47 AM, Dario Faggioli
wrote:
> On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
>> --- a/xen/include/public/domctl.h
>> +++ b/xen/include/public/domctl.h
>> @@ -360,6 +360,7 @@ typedef struct xen_domctl_sched_credit2 {
>> typedef struct
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
> diff --git a/tools/libxl/libxl_types.idl
> b/tools/libxl/libxl_types.idl
> index 8a9849c..f6c3ead 100644
> --- a/tools/libxl/libxl_types.idl
> +++ b/tools/libxl/libxl_types.idl
> @@ -401,6 +401,7 @@ libxl_sched_params = Struct("sched_params",[
>
>>> Andrew Cooper 07/27/17 7:48 PM >>>
>@@ -599,6 +600,93 @@ int init_domain_cpuid_policy(struct domain *d)
>return 0;
>}
>
>+/*
>+ * Copy a single cpuid_leaf into a guest-provided xen_cpuid_leaf_t buffer,
>+ * performing boundary checking against the guests array
On 03/08/17 16:29, Alexandru Isaila wrote:
> Allow guest userspace code to request that a vm_event be sent out
> via VMCALL. This functionality seems to be handy for a number of
> Xen developers, as stated on the mailing list (thread "[Xen-devel]
> HVMOP_guest_request_vm_event only works from
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -360,6 +360,7 @@ typedef struct xen_domctl_sched_credit2 {
> typedef struct xen_domctl_sched_rtds {
> uint32_t period;
> uint32_t budget;
> +bool
When running as Xen pv-guest the exception frame on the stack contains
%r11 and %rcx additional to the other data pushed by the processor.
Instead of having a paravirt op being called for each exception type
prepend the Xen specific code to each exception entry. When running as
Xen pv-guest just
On 01/08/17 09:48, Yi Sun wrote:
> Hi all,
>
> We plan to bring a new PSR (Platform Shared Resource) feature called
> Intel L2 Cache Allocation Technology (L2 CAT) to Xen. It has been enabled
> in Linux Kernel.
Unfortunately, the result is problematic. This is from XenServers basic
sanity
>>> Anthony PERARD 07/18/17 7:10 PM >>>
>--- a/xen/arch/x86/hvm/vlapic.c
>+++ b/xen/arch/x86/hvm/vlapic.c
>@@ -671,12 +671,13 @@ static void vlapic_tdt_pt_cb(struct vcpu *v, void *data)
>
>/*
>* This function is used when a register related to the APIC timer is
Allow guest userspace code to request that a vm_event be sent out
via VMCALL. This functionality seems to be handy for a number of
Xen developers, as stated on the mailing list (thread "[Xen-devel]
HVMOP_guest_request_vm_event only works from guest in ring0").
This is a use case in communication
>>> Anthony PERARD 07/18/17 7:12 PM >>>
>@@ -678,18 +679,29 @@ static void vlapic_tdt_pt_cb(struct vcpu *v, void *data)
>static void vlapic_update_timer(struct vlapic *vlapic, uint32_t lvtt);
>{
>uint64_t period;
>-uint64_t delta;
>-bool is_periodic;
>+
flight 112425 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112425/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 15 guest-saverestorefail REGR. vs. 112402
>>> Anthony PERARD 07/18/17 7:10 PM >>>
>There should not be any functionality change with this patch.
>
>This function is used when the APIC_TMICT register is updated.
>
>vlapic_update_timer is introduce as it will be use also when the
>registers APIC_LVTT and
>>> Sergey Dyasli 08/03/17 4:20 PM >>>
>On Tue, 2017-08-01 at 09:55 +0200, Egger, Christoph wrote:
>> On 18.07.17 12:34, Sergey Dyasli wrote:
>> > @@ -1773,6 +1780,27 @@ p2m_flush_nestedp2m(struct domain *d)
>> > p2m_flush_table(d->arch.nested_p2m[i]);
>> > }
On Tue, 2017-08-01 at 09:55 +0200, Egger, Christoph wrote:
> On 18.07.17 12:34, Sergey Dyasli wrote:
> > The new function finds all np2m objects with the specified eptp and
> > flushes them. p2m_flush_table_locked() is added in order not to release
> > the p2m lock after np2m_base check.
> >
> >
On 03.08.17 16:58, Andrii Anisov wrote:
Let me check with a block device root.
It does work with root on mmcblk1p1.
So I suggest to George to update his XEN by moving to 4.9 or by
backporting mentioned patch.
Not sure what is broken for nfs-root. Would not deal with it now, maybe
later.
On 02/08/17 01:52, Andy Lutomirski wrote:
> On Tue, Aug 1, 2017 at 4:38 PM, Andrew Cooper
> wrote:
>> On 01/08/2017 20:45, Andy Lutomirski wrote:
>>> Also, IMO it would be nice to fully finish the job. Remaining steps are:
>>>
>>> 1. Unsuck the SYSCALL entries on Xen
Hi,
Intel GVT-g supports Intel Core platform, E3 server platform but we haven't
tried your Atom Minnowboard.
The GPU generation delta needs additional GPU device model development work.
If you're using Skylake architecture based Atom (Apollo lake) platform, GVT-g
can work with additional SoC
>>> Asharaf Perinchikkal 08/03/17 3:30
>>> PM >>>
>We have lunched a guest with AGL(Automotive Grade Linux).But its performance
>very low. To overcome this limitation we have updated our host (Dom0) kernel to
>4.13 rc3. Now the xen is not booting with
On 03.08.17 16:49, Julien Grall wrote:
Looking at the log, there is 640MB of RAM allocated below 4GB. So is
it the same issue?
I do not know what the issue George exactly has. I do not see his log.
Let me check with a block device root.
Also, which version of Xen are you comparing with?
I'm
On 03/08/17 00:43, Boris Ostrovsky wrote:
> On 08/02/2017 08:01 AM, Juergen Gross wrote:
>> On 01/08/17 16:28, PGNet Dev wrote:
>>> On 7/28/17 9:02 AM, PGNet Dev wrote:
On 7/27/17 11:23 PM, Juergen Gross wrote:
> Can you please post the domain's config file used to create the domain
>
On 03/08/17 14:46, Andrii Anisov wrote:
On 03.08.17 16:38, Andrii Anisov wrote:
If I recall correctly related issue was fixed in 4.9.
It's ugly.
I've reproduced the setup on my table, with the current master. It does
not work.
XEN allocated Dom0 memory properly:
(XEN) *** LOADING
On 03.08.17 16:38, Andrii Anisov wrote:
If I recall correctly related issue was fixed in 4.9.
It's ugly.
I've reproduced the setup on my table, with the current master. It does
not work.
XEN allocated Dom0 memory properly:
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Loading kernel from
On 03/08/17 14:38, Andrii Anisov wrote:
Hello Julien, George
On 03.08.17 16:11, Julien Grall wrote:
... I am not sure to understand the relation between the file system
crashing and the amount of RAM. Having the full log here would be
helpful. Is it because all the memory allocated is above
Hello Julien, George
On 03.08.17 16:11, Julien Grall wrote:
... I am not sure to understand the relation between the file system
crashing and the amount of RAM. Having the full log here would be
helpful. Is it because all the memory allocated is above 4GB?
Yep, the salvator-x board has 1GB
Hi All,
We are trying to do para virtualization in intel(r) Atom(tm) E3845(MinnowBoard
Turbot Quad-Core board). We are using xen 4.9.0 and linux 4.10.
We have lunched a guest with AGL(Automotive Grade Linux).But its performance
very low. To overcome this limitation we have updated our host
Hi All,
We are trying to do para virtualization in intel(r) Atom(tm) E3845(MinnowBoard
Turbot Quad-Core board). We are using xen 4.9.0 and linux 4.10.
We have lunched a guest with AGL(Automotive Grade Linux).But its performance
very low. To overcome this limitation we have updated our host
Hi, Julien
On Thu, Aug 3, 2017 at 3:36 PM, Julien Grall wrote:
> Hi,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Eliminate TODO by squashing single-page stuff with multi-page one.
>>
>>
Hi, Julien
On Thu, Aug 3, 2017 at 2:37 PM, Julien Grall wrote:
> Hi Oleksandr,
>
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> We don't passthrough IOMMU device to DOM0 even if it is not used by
>>
On 03/08/17 09:57, George John wrote:
Hi,
Hello,
I am running Xen on Rcar H3 which is now configured Dom0 memory as 752M
and need to change it as 2048M.I attempted to change it by
xl mem-set (xl mem-set 0 2048M) where 0 is Dom0 ID.It result following
error
root@salvator-x-xen-dom0:~#
Hi Florian,
On 03/08/17 13:29, Florian Jakobsmeier wrote:
> So as far as I understood both of you don't see a general problem with
> (timer) interrupts or the scheduler while being single stepped? Because in
> my opinion after enabling singlestep the system will go into a "spinlock"
> routine.
Hi,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Eliminate TODO by squashing single-page stuff with multi-page one.
Signed-off-by: Oleksandr Tyshchenko
CC: Julien Grall
On 03/08/17 13:31, Oleksandr Tyshchenko wrote:
Hi, Julien
On Thu, Aug 3, 2017 at 2:33 PM, Julien Grall wrote:
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index ec19310..3079bbe 100644
---
Hi, Julien
On Thu, Aug 3, 2017 at 2:31 PM, Julien Grall wrote:
> Hi Oleksandr,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> 1. Add missing return in case if IOMMU ops have been already set.
>> 2.
Hi, Julien
On Thu, Aug 3, 2017 at 2:23 PM, Julien Grall wrote:
> Hi Oleksandr,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Not every integrated into ARM SoCs IOMMU can share page tables
>> with
Hi, Julien
On Thu, Aug 3, 2017 at 2:21 PM, Julien Grall wrote:
> Hi Oleksandr,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> diff --git a/xen/drivers/passthrough/arm/smmu.c
>> b/xen/drivers/passthrough/arm/smmu.c
>> index 74c09b0..7c313c0 100644
>> ---
Hi, Julien
On Thu, Aug 3, 2017 at 2:33 PM, Julien Grall wrote:
> Hi Oleksandr,
>
> On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
>>
>> diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
>> index ec19310..3079bbe 100644
>> --- a/xen/arch/arm/domain.c
>> +++
> Sets TDE to trap debug exceptions to EL2 from lower exception levels. I'm
>> surprised this isn't always set for Xen. Do you allow guests to use the
>> debug
>> features for their own purposes?
>>
>
> No. We already trap debug exceptions to EL2 by default and MDCR_EL2 should
> already be
On Tue, Aug 01, 2017 at 04:48:32PM +0800, Yi Sun wrote:
> This patch creates CAT and CDP feature document in doc/features/. It describes
> key points to implement L3 CAT/CDP and L2 CAT which is described in details in
> Intel SDM "INTEL® RESOURCE DIRECTOR TECHNOLOGY (INTEL® RDT) ALLOCATION
>
flight 112418 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112418/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 host-install(4)broken REGR. vs. 112402
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
We don't passthrough IOMMU device to DOM0 even if it is not used by
Xen. Therefore exposing the properties that describe relationship
between master devices and IOMMUs does
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index ec19310..3079bbe 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -569,7 +569,7 @@ int arch_domain_create(struct domain *d, unsigned int
domcr_flags,
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
1. Add missing return in case if IOMMU ops have been already set.
2. Add check for shared IOMMU before returning an error.
Technically 1. is a fix, 2. is a new feature as
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Not every integrated into ARM SoCs IOMMU can share page tables
with the CPU and as the result the iommu_use_hap_pt(d) mustn't
always be true.
Reuse x86's iommu_hap_pt_share
Hi Oleksandr,
On 25/07/17 18:26, Oleksandr Tyshchenko wrote:
diff --git a/xen/drivers/passthrough/arm/smmu.c
b/xen/drivers/passthrough/arm/smmu.c
index 74c09b0..7c313c0 100644
--- a/xen/drivers/passthrough/arm/smmu.c
+++ b/xen/drivers/passthrough/arm/smmu.c
[...]
+static int __must_check
On 03/08/17 11:46, James Morse wrote:
Hi Florian,
On 03/08/17 11:16, Florian Jakobsmeier wrote:
This is the current version:
I'm not familiar with Xen, so forgive my annotations:
asmlinkage void leave_hypervisor_tail(void)
{
+/*This methode will be called after the 'guest_entry'
On Wed, Aug 02, 2017 at 07:46:18AM +0100, Wei Liu wrote:
> Hi all
>
> OSSTest is shut down for maintenance at the moment. It will be brought
> back either later today or tomorrow. I will send out another email when
> the maintenance is done.
>
The hardware maintenance is now complete. I have
Hi Florian,
On 03/08/17 11:16, Florian Jakobsmeier wrote:
> This is the current version:
I'm not familiar with Xen, so forgive my annotations:
> asmlinkage void leave_hypervisor_tail(void)
>> {
>> +/*This methode will be called after the 'guest_entry' macro in
>> /arch/arm64/entry.S set
On Fri, 2017-07-14 at 07:05 -0600, Jan Beulich wrote:
> > > > On 14.07.17 at 14:51, wrote:
> >
> > Agreed, I shouldn't have added.
> > rbtree.h file does include incline functions which are actually
> > commented, and in order to have complete similarity I did include
>
Hey Julien,
Would you mind sharing the latest version of your code?
>
>
Of course not. This is the current version:
asmlinkage void leave_hypervisor_tail(void)
> {
> +/*This methode will be called after the 'guest_entry' macro in
> /arch/arm64/entry.S set guest registers
> +Check
>>> On 14.07.17 at 10:26, wrote:
> --- a/xen/common/rbtree.c
> +++ b/xen/common/rbtree.c
> @@ -250,15 +250,16 @@ void rb_erase(struct rb_node *node, struct rb_root
> *root)
> if (child)
> rb_set_parent(child, parent);
>
Yes I am looking myself too.
Thanks
Amna
__
From: Juergen Gross
Sent: Thursday, August 3, 2017 12:07 PM
To: Waseem, Amna; Julien Grall; xen-devel
Subject: Re: [Xen-devel] Xenstore filling information about Dom0
On 03/08/17 11:54, Waseem, Amna
On Thu, Aug 03, Jan Beulich wrote:
> >>> On 01.08.17 at 11:43, wrote:
> > Please backport the following changes for docs/ for the Xen 4.9.1
> > release:
> >
> > aa4eb460bc docs: add pod variant of xl-numa-placement
> > 458df9f374 docs: add pod variant of
On 03/08/17 11:54, Waseem, Amna wrote:
> Thanks a lot for information.
> Is there any other function to add more than one child per node besides
> manual node before starting xendameon ?
Maybe you should look around yourself a little bit?
It is okay to ask for some hints where to look for some
Hi Florian, Julien,
On 02/08/17 14:32, Julien Grall wrote:
> On 26/07/17 14:12, Florian Jakobsmeier wrote:
>> i was just testing the single step implementation and realized that the
>> before mentioned solution is not fully working. I'm still trying to
>> enable SS for a VM on Xen.
>> To test my
>>> On 01.08.17 at 11:43, wrote:
> Please backport the following changes for docs/ for the Xen 4.9.1
> release:
>
> aa4eb460bc docs: add pod variant of xl-numa-placement
> 458df9f374 docs: add pod variant of xl-network-configuration.5
> 4359b86f31 docs: add pod variant of
Thanks a lot for information.
Is there any other function to add more than one child per node besides manual
node before starting xendameon ?
Thanks
Amna
From: Juergen Gross
Sent: Thursday, August 3, 2017 11:23 AM
To: Waseem, Amna;
>>> On 14.07.17 at 16:04, wrote:
> By moving its bridge special casing to amd_iommu_add_device(), we can
> pass the latter to setup_hwdom_pci_devices() and at once consistently
> handle bridges discovered at boot time as well as such reported by Dom0
> later on.
>
>
>>> On 13.06.17 at 10:29, wrote:
On 13.06.17 at 10:20, wrote:
>> From the context calling pi_desc_init(), we can conclude the current
>> implementation of VT-d PI depends on CPU-side PI. If we enable VT-d PI
>> and disable CPU-side PI by disabling
Hi,
Will it work for Arm?
I have seen usb passthrough support in kernel 2.6 but not in 4.12.
Has it been merged with the latest kernel?
Regards,
Ajmal
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 03.08.17 at 04:10, wrote:
> @@ -1283,10 +1344,20 @@ static void psr_cpu_init(void)
> feat = feat_l3;
> feat_l3 = NULL;
>
> -if ( !cat_init_feature(, feat, info, FEAT_TYPE_L3_CAT) )
> -feat_props[FEAT_TYPE_L3_CAT] =
On 03/08/17 11:26, Ajmal M Ali wrote:
> Hi,
>
> I need USB Passthrough for my work(pv). For that I am trying to write
> USB front and back drivers. Besides these what else is needed for the
> Passthrough to work?
> Should I have to also do the part to add device model(xl) or is it
> already done.
1 - 100 of 107 matches
Mail list logo