On Tue, Nov 21, 2017 at 12:13 PM, Juergen Gross wrote:
> On 21/11/17 11:42, Andrew Cooper wrote:
>> On 21/11/17 07:44, Jan Beulich wrote:
>> On 20.11.17 at 17:59, wrote:
On 11/20/2017 11:43 AM, Jan Beulich wrote:
On 20.11.17 at 17:28, wrote:
>> On 11/20/2017 11:26 AM, Jan B
Adding xen-devel, dropped it on my reply.
Replying from my phone, sorry for the formatting.
El 20 nov. 2017 9:35, "Juergen Gross" escribió:
For PVH domains loading of the ACPI RSDP table is done via allocating
a domain loader segment after having loaded the kernel. This leads to
the RSDP table
On Sat, Nov 04, 2017 at 11:14:35PM +, osstest service owner wrote:
> flight 11 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/11/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-
On Thu, Nov 09, 2017 at 08:15:52AM -0700, Mike Reardon wrote:
> On Thu, Nov 9, 2017 at 2:30 AM, Roger Pau Monné
> wrote:
>
> > Please try to avoid top-posting.
> >
> > On Wed, Nov 08, 2017 at 08:27:17PM -0700, Mike Reardon wrote:
> > > So am I correct i
On Thu, Nov 09, 2017 at 10:37:53AM -0500, Boris Ostrovsky wrote:
> These tables are pointed to from FADT. Adding them will
> result in duplicate entries in the guest's tables.
>
> Signed-off-by: Boris Ostrovsky
Reviewed-by: Roger Pau Monn
On Thu, Nov 09, 2017 at 06:18:21AM -0700, Jan Beulich wrote:
> >>> On 09.11.17 at 12:31, wrote:
> > On Thu, Nov 09, 2017 at 03:49:23PM +0530, Bhupinder Thakur wrote:
> >> +static int ns16550_init_dt(struct ns16550 *uart,
> >> + const struct dt_device_node *dev)
> >> +{
>
On Thu, Nov 09, 2017 at 03:49:23PM +0530, Bhupinder Thakur wrote:
> Currently, Xen supports only DT based initialization of 16550 UART.
> This patch adds support for initializing 16550 UART using ACPI SPCR table.
>
> This patch also makes the uart initialization code common between DT and
> ACPI b
On Wed, Nov 08, 2017 at 03:19:27PM -0500, Boris Ostrovsky wrote:
> These tables are pointed to from FADT. Adding them will
> result in duplicate entries in the guest's tables.
>
> Signed-off-by: Boris Ostrovsky
> ---
> xen/arch/x86/hvm/dom0_build.c | 17 +++--
> 1 file changed, 15 in
Please try to avoid top-posting.
On Wed, Nov 08, 2017 at 08:27:17PM -0700, Mike Reardon wrote:
> So am I correct in reading this that for at least the foreseeable future
> storage using 4k sector sizes is not gonna happen? I'm just trying to
> figure out if I need to get some different hardware.
On Thu, Nov 09, 2017 at 12:22:49AM +, Hao, Xudong wrote:
> > Qemu-xen didn't have commit a80363, so I report this issue to ask for sync
> > up
> > with qemu upstream. Last mail I mean I usually used Qemu Xen tree to do
> > test,
> > and found out this issue.
> >
> > Before requesting the bac
On Wed, Nov 08, 2017 at 01:38:59AM -0700, Jan Beulich wrote:
> >>> On 26.10.17 at 11:19, wrote:
> > --- /dev/null
> > +++ b/xen/common/coverage/llvm.c
> > +#define LLVM_PROFILE_MAGIC_64 (uint64_t)255 << 56 | (uint64_t)'l' << 48 | \
> > + (uint64_t)'p' << 40 | (uint64_t)'r' << 32 | (uint64_t)
On Wed, Nov 08, 2017 at 01:13:29AM -0700, Jan Beulich wrote:
> >>> On 26.10.17 at 12:10, wrote:
> > On Thu, Oct 26, 2017 at 11:08:21AM +0100, Roger Pau Monné wrote:
> >> On Thu, Oct 26, 2017 at 11:03:13AM +0100, Wei Liu wrote:
> >> > On Thu, Oct 26, 2017 at
On Tue, Nov 07, 2017 at 12:42:59PM +, osstest service owner wrote:
> flight 115636 libvirt real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/115636/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-
On Tue, Nov 07, 2017 at 04:31:06AM -0700, Jan Beulich wrote:
> >>> On 07.11.17 at 11:30, wrote:
> > On Mon, Nov 06, 2017 at 05:33:37AM -0700, Jan Beulich wrote:
> >> >>> On 04.11.17 at 05:48, wrote:
> >> > I added some additional storage to my server with some native 4k sector
> >> > size disks.
On Fri, Nov 03, 2017 at 08:21:31PM +, osstest service owner wrote:
> flight 115504 linux-4.9 real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/115504/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-amd
On Mon, Nov 06, 2017 at 12:48:42PM -0500, Govinda Tatti wrote:
> The life-cycle of a PCI device in Xen pciback is complex and is constrained
> by the generic PCI locking mechanism.
>
> - It starts with the device being bound to us, for which we do a function
> reset (done via SysFS so the PCI lo
On Mon, Nov 06, 2017 at 05:33:37AM -0700, Jan Beulich wrote:
> >>> On 04.11.17 at 05:48, wrote:
> > I added some additional storage to my server with some native 4k sector
> > size disks. The LVM volumes on that array seem to work fine when mounted
> > by the host, and when passed through to any
On Mon, Nov 06, 2017 at 05:06:18AM -0700, Jan Beulich wrote:
> >>> On 06.11.17 at 12:16, wrote:
> > Jan Beulich writes ("Re: [PATCH for-next 1/9] gcov: return ENOSYS for
> > unimplemented gcov domctl"):
> >> On 26.10.17 at 11:19, wrote:
> >> > --- a/xen/common/gcov/gcov.c
> >> > +++ b/xen/common
On Mon, Nov 06, 2017 at 01:04:56AM +, Hao, Xudong wrote:
> > -Original Message-
> > From: Roger Pau Monné [mailto:roger@citrix.com]
> > Sent: Friday, November 3, 2017 7:23 PM
> > To: Hao, Xudong
> > Cc: Julien Grall ; Stefano Stabellini
> > ; La
On Fri, Nov 03, 2017 at 07:23:50PM +0100, Juergen Gross wrote:
> On 03/11/17 19:19, Boris Ostrovsky wrote:
> > On 11/03/2017 02:05 PM, Juergen Gross wrote:
> >>
> >> So again the question: how to tell whether we are PVH or HVM in
> >> init_hypervisor_platform()? ACPi tables are scanned way later...
On Fri, Nov 03, 2017 at 05:57:52PM +, George Dunlap wrote:
> On 11/03/2017 02:52 PM, George Dunlap wrote:
> > On 11/03/2017 02:14 PM, Roger Pau Monné wrote:
> >> On Thu, Nov 02, 2017 at 09:55:11AM +, Paul Durrant wrote:
> >>> Hmm. I wonder whether the guest
> > > > Sent: 02 November 2017 09:15
> > > > To: Roger Pau Monne
> > > > Cc: Ian Jackson ; Lars Kurth
> > > > ; Wei Liu ; Julien Grall
> > > > ; Paul Durrant ;
> > > > committ...@xenproject.org; xen-devel > de...@lists.xenpro
On Fri, Nov 03, 2017 at 01:50:11PM +0100, Juergen Gross wrote:
> On 03/11/17 13:17, Roger Pau Monné wrote:
> > On Fri, Nov 03, 2017 at 01:00:46PM +0100, Juergen Gross wrote:
> >> On 29/09/17 17:51, Roger Pau Monné wrote:
> >>> On Fri, Sep 29, 2017 at 03:33:5
re, so so things may need
^ extra so
> force pushing.
>
> CC: Roger Pau Monné
> Signed-off-by: Ian Jackson
Reviewed-by: Roger Pau Monné
Roger.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Fri, Nov 03, 2017 at 01:00:46PM +0100, Juergen Gross wrote:
> On 29/09/17 17:51, Roger Pau Monné wrote:
> > On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
> >> On 29/09/17 17:24, Roger Pau Monné wrote:
> >>> On Fri, Sep 29, 2017 at 02:46:5
On Fri, Nov 03, 2017 at 01:10:26AM +, Hao, Xudong wrote:
>
> > -Original Message-
> > From: Julien Grall [mailto:julien.gr...@linaro.org]
> > Sent: Thursday, November 2, 2017 9:50 PM
> > To: Stefano Stabellini
> > Cc: Hao, Xudong ; Jan Beulich ;
> > Quan Xu ; Lars Kurth ; Wei Liu
> >
On Thu, Nov 02, 2017 at 07:02:49PM +0200, Pasi Kärkkäinen wrote:
> On Thu, Aug 24, 2017 at 09:23:16AM +0100, Roger Pau Monné wrote:
> > On Wed, Aug 23, 2017 at 07:13:00PM +0200, Andreas Kinzler wrote:
> > > > > > From a brief look it looks like this would be doable,
rrant ;
> > committ...@xenproject.org; xen-devel
> > Subject: Re: [Xen-devel] Commit moratorium to staging
> >
> > On Wed, Nov 01, 2017 at 04:17:10PM +, Roger Pau Monné wrote:
> > > On Wed, Nov 01, 2017 at 02:07:48PM +, Ian Jackson wrote:
> > > >
On Wed, Nov 01, 2017 at 04:17:10PM +, Roger Pau Monné wrote:
> On Wed, Nov 01, 2017 at 02:07:48PM +, Ian Jackson wrote:
> > * Affected hosts differ from unaffected hosts according to cpuid.
> > Roger has repro'd the bug on an unaffected host by masking out
>
On Wed, Nov 01, 2017 at 02:07:48PM +, Ian Jackson wrote:
> So, investigations (mostly by Roger, and also a bit of archaeology in
> the osstest db by me) have determined:
>
> * This bug is 100% reproducible on affected hosts. The repro is
> to boot the Windows guest, save/restore it, then mi
On Tue, Oct 31, 2017 at 10:49:35AM +, Julien Grall wrote:
> Hi all,
>
> Master lags 15 days behind staging due to tests failing reliably on some of
> the hardware in osstest (see [1]).
>
> At the moment a force push is not feasible because the same tests passes on
> different hardware (see [2
On Mon, Oct 30, 2017 at 06:48:46PM +, osstest service owner wrote:
> flight 115400 examine real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/115400/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> examine-elbling0
On Mon, Oct 30, 2017 at 04:48:09PM +, Wei Liu wrote:
> On Thu, Oct 26, 2017 at 10:19:38AM +0100, Roger Pau Monne wrote:
> > Signed-off-by: Roger Pau Monné
> > ---
> > Cc: Andrew Cooper
> > Cc: George Dunlap
> > Cc: Ian Jackson
> > Cc: Jan Beulich
On Mon, Oct 30, 2017 at 04:48:21PM +, Wei Liu wrote:
> On Thu, Oct 26, 2017 at 10:19:34AM +0100, Roger Pau Monne wrote:
> >
> > diff --git a/xen/common/coverage/Makefile b/xen/common/coverage/Makefile
> > index f68d050eca..0e0510679e 100644
> > --- a/xen/common/coverage/Makefile
> > +++ b/xen/
On Mon, Oct 30, 2017 at 09:41:23AM +0800, Lan Tianyu wrote:
> On 2017年10月25日 09:43, Lan Tianyu wrote:
> >> For all platforms supporting HVM, for PV I don't think it makes sense.
> >> > Since AFAIK ARM guest type is also HVM I would rather introduce this
> >> > field in the hvm_domain structure rath
On Fri, Oct 27, 2017 at 01:46:24AM +, osstest service owner wrote:
> flight 115244 linux-linus real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/115244/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-a
On Tue, Oct 24, 2017 at 10:10:14AM +0800, Yi Sun wrote:
> Hi, all,
>
> As you may know, MBA patch set has got enough Reviewed-by/Acked-by in last
> week.
> It is ready to be merged.
>
> This is a feature for Skylake, Intel has launched Skylake and KVM already
> supported MBA, so including it in
On Thu, Oct 26, 2017 at 11:03:13AM +0100, Wei Liu wrote:
> On Thu, Oct 26, 2017 at 10:19:35AM +0100, Roger Pau Monne wrote:
> > config GCOV
> > bool "Gcov Support"
> > depends on !LIVEPATCH
>
> && !LLVM_COVERAGE
That was my idea, but sadly that's not possible because you generate a
circu
On Thu, Oct 26, 2017 at 02:44:22AM -0600, Jan Beulich wrote:
> >>> On 26.10.17 at 10:34, wrote:
> > --- a/docs/misc/coverage.markdown
> > +++ b/docs/misc/coverage.markdown
> > @@ -1,6 +1,6 @@
> > # Coverage support for Xen
> >
> > -Coverare support allow you to get coverage information from Xen
On Wed, Oct 25, 2017 at 03:30:39PM +0800, Lan Tianyu wrote:
> On 2017年10月19日 23:42, Roger Pau Monné wrote:
> > On Thu, Sep 21, 2017 at 11:02:01PM -0400, Lan Tianyu wrote:
> >
> >>
> >> struct viommu_ops {
> >> @@ -28,6 +29,9 @@ struct viommu_ops {
>
On Fri, Oct 20, 2017 at 04:32:44PM +0100, Ian Jackson wrote:
> We have decided:
>
> We will push the anoint and examine parts of this series to osstest
> pretest. (You're going to give me a suitable branch on Monday.)
> This should work because we have anointed FreeBSD builds already.
Sorry f
On Mon, Oct 23, 2017 at 03:50:24PM +0800, Chao Gao wrote:
> On Fri, Oct 20, 2017 at 12:20:06PM +0100, Roger Pau Monné wrote:
> >On Thu, Sep 21, 2017 at 11:02:09PM -0400, Lan Tianyu wrote:
> >> From: Chao Gao
> >> +}
> >> +
> >> +unmap_guest_p
On Fri, Oct 20, 2017 at 05:30:41PM +0100, Wei Liu wrote:
> The coverage support in hypervisor is redone. Update the document.
>
> Signed-off-by: Wei Liu
Adding Julien, although I'm not sure if doc changes also need a
release-ack.
Reviewed-by: Roger Pau
On Thu, Sep 21, 2017 at 11:01:41PM -0400, Lan Tianyu wrote:
> Change since v2:
>1) Remove vIOMMU hypercall of query capabilities and introduce when
> necessary.
>2) Remove length field of vIOMMU create parameter of vIOMMU hypercall
>3) Introduce irq remapping mode callback
On Thu, Sep 21, 2017 at 11:02:10PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Provide a save-restore pair to save/restore registers and non-register
> status.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
> ---
> v3:
> - use one entry to save both vvtd registers and other interme
On Thu, Sep 21, 2017 at 11:02:09PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Queued Invalidation Interface is an expanded invalidation interface with
> extended capabilities. Hardware implementations report support for queued
> invalidation interface through the Extended Capability Register.
On Thu, Sep 21, 2017 at 11:02:08PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Software writes to QIE field of GCMD to enable or disable queued
> invalidations. This patch emulates QIE field of GCMD.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
> ---
> xen/drivers/passthrough/vtd
On Fri, Oct 20, 2017 at 01:17:40AM -0600, Jan Beulich wrote:
> >>> On 17.10.17 at 14:03, wrote:
> > --- a/xen/arch/x86/string.c
> > +++ b/xen/arch/x86/string.c
> > @@ -39,6 +39,9 @@ void *(memmove)(void *dest, const void *src, size_t n)
> > {
> > long d0, d1, d2;
> >
> > +if ( !n )
> >
On Fri, Oct 20, 2017 at 01:54:15PM +0800, Chao Gao wrote:
> On Thu, Oct 19, 2017 at 05:31:37PM +0100, Roger Pau Monné wrote:
> >On Thu, Sep 21, 2017 at 11:02:07PM -0400, Lan Tianyu wrote:
> >> +static int vvtd_alloc_frcd(struct vvtd *vvtd)
> >> +{
> >> +
On Fri, Oct 20, 2017 at 01:16:37PM +0800, Chao Gao wrote:
> On Thu, Oct 19, 2017 at 03:26:30PM +0100, Roger Pau Monné wrote:
> >On Thu, Sep 21, 2017 at 11:01:56PM -0400, Lan Tianyu wrote:
> >> +static void unmap_guest_page(void *virt)
> >> +{
>
On Fri, Oct 20, 2017 at 10:58:32AM +0800, Chao Gao wrote:
> On Thu, Oct 19, 2017 at 12:34:54PM +0100, Roger Pau Monné wrote:
> >On Thu, Sep 21, 2017 at 11:01:53PM -0400, Lan Tianyu wrote:
> >> +return 0;
> >> +}
> >> +
> >> +static int
On Thu, Sep 21, 2017 at 11:02:07PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Interrupt translation faults are non-recoverable fault. When faults
> are triggered, it needs to populate fault info to Fault Recording
> Registers and inject vIOMMU msi interrupt to notify guest IOMMU driver
> to de
On Thu, Sep 21, 2017 at 11:02:06PM -0400, Lan Tianyu wrote:
> diff --git a/xen/drivers/passthrough/io.c b/xen/drivers/passthrough/io.c
> index 6196334..349a8cf 100644
> --- a/xen/drivers/passthrough/io.c
> +++ b/xen/drivers/passthrough/io.c
> @@ -942,21 +942,20 @@ static void __msi_pirq_eoi(struct
On Thu, Sep 21, 2017 at 11:02:05PM -0400, Lan Tianyu wrote:
> From: Chao Gao
The title for this patch it's wrong, it modifies both the hypervisor
and libxc. Please fix it.
> When exposing vIOMMU (vvtd) to guest, guest can configure the msi to
> remapping format. For pass-through device, the phys
On Thu, Sep 21, 2017 at 11:02:03PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> When IOAPIC RTE is in remapping format, it doesn't contain the vector of
> interrupt. For this case, the RTE contains an index of interrupt remapping
> table where the vector of interrupt is stored. This patchs gets
On Thu, Sep 21, 2017 at 11:02:02PM -0400, Lan Tianyu wrote:
> This patch is to add callback for vIOAPIC and vMSI to check whether interrupt
> remapping is enabled.
>
> Signed-off-by: Lan Tianyu
> ---
> xen/common/viommu.c | 15 +++
> xen/include/xen/viommu.h | 10 ++
> 2
On Thu, Sep 21, 2017 at 11:02:01PM -0400, Lan Tianyu wrote:
> This patch is to add get_irq_info callback for platform implementation
> to convert irq remapping request to irq info (E,G vector, dest, dest_mode
> and so on).
>
> Signed-off-by: Lan Tianyu
> ---
> xen/common/viommu.c | 16 +
On Thu, Sep 21, 2017 at 11:02:00PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> When irq remapping is enabled, IOAPIC Redirection Entry may be in remapping
> format. If that, generate an irq_remapping_request and call the common
> VIOMMU abstraction's callback to handle this interrupt request. D
On Thu, Sep 21, 2017 at 11:01:59PM -0400, Lan Tianyu wrote:
> This patch is to add irq request callback for platform implementation
> to deal with irq remapping request.
>
> Signed-off-by: Lan Tianyu
> ---
> xen/common/viommu.c | 15 +
> xen/include/asm-x86/viommu.h | 72
>
On Thu, Sep 21, 2017 at 11:01:58PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Different platform may use different method to distinguish
> remapping format interrupt and normal format interrupt.
>
> Intel uses one bit in IOAPIC RTE or MSI address register to
> indicate the interrupt is remapp
On Thu, Sep 21, 2017 at 11:01:57PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Without interrupt remapping, interrupt attributes can be extracted from
> msi message or IOAPIC RTE. However, with interrupt remapping enabled,
> the attributes are enclosed in the associated IRTE. This callback is
>
On Thu, Oct 19, 2017 at 11:53:11AM +0100, Wei Liu wrote:
> Hi
>
> In the process of upgrading osstest to Stretch, I discovered an issue
> with the block device. This happens after a local migration.
>
> [ 127.216232] Freezing user space processes ... (elapsed 0.005 seconds) done.
> [ 127.222143
On Thu, Sep 21, 2017 at 11:01:56PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> When a remapping interrupt request arrives, remapping hardware computes the
> interrupt_index per the algorithm described in VTD spec
> "Interrupt Remapping Table", interprets the IRTE and generates a remapped
> inte
On Thu, Sep 21, 2017 at 11:01:55PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Software writes this field to enable/disable interrupt reampping. This patch
> emulate IRES field of GCMD.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
> ---
> xen/drivers/passthrough/vtd/iommu.h | 3
On Thu, Sep 21, 2017 at 11:01:54PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Software sets this field to set/update the interrupt remapping table pointer
> used by hardware. The interrupt remapping table pointer is specified through
> the Interrupt Remapping Table Address (IRTA_REG) register.
On Thu, Sep 21, 2017 at 11:01:53PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> This patch adds VVTD MMIO handler to deal with MMIO access.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
> ---
> xen/drivers/passthrough/vtd/vvtd.c | 91
> ++
> 1 f
On Thu, Sep 21, 2017 at 11:01:52PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> This patch adds create/destroy function for the emulated VTD
> and adapts it to the common VIOMMU abstraction.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
> ---
> xen/drivers/passthrough/vtd/Makefile
On Thu, Sep 21, 2017 at 11:01:51PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> No functional changes.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
Reviewed-by: Roger Pau Monné
Would have been nice to maybe split this into two, one patch that
simply fixes
On Thu, Sep 21, 2017 at 11:01:50PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> This patch adds XEN_DOMCTL_viommu_op hypercall. This hypercall
> comprises two sub-commands:
Patch description doesn't match actual code. This patch doesn't add
any new hypercalls, it just adds libxc helpers for
XEN
On Thu, Sep 21, 2017 at 11:01:49PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> If guest is configured to have a vIOMMU, create it during domain construction.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
>
> ---
> v3:
> - Remove the process of querying capabilities.
> ---
> tool
On Thu, Sep 21, 2017 at 11:01:48PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> A new logic is added to build ACPI DMAR table in tool stack for a guest
> with one virtual VTD and pass through it to guest via existing mechanism. If
> there already are ACPI tables needed to pass through, we joint
On Thu, Sep 21, 2017 at 11:01:47PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> A field, viommu_info, is added to struct libxl_domain_build_info. Several
> attributes can be specified by guest config file for virtual IOMMU. These
> attributes are used for DMAR construction and vIOMMU creation.
On Thu, Oct 19, 2017 at 10:26:36AM +0800, Lan Tianyu wrote:
> Hi Roger:
> Thanks for review.
>
> On 2017年10月18日 21:26, Roger Pau Monné wrote:
> > On Thu, Sep 21, 2017 at 11:01:42PM -0400, Lan Tianyu wrote:
> >> +Xe
On Thu, Oct 19, 2017 at 02:31:22PM +0800, Lan Tianyu wrote:
> On 2017年10月18日 22:05, Roger Pau Monné wrote:
> > On Thu, Sep 21, 2017 at 11:01:43PM -0400, Lan Tianyu wrote:
> >> +static int viommu_create(struct domain *d, uint64_t type,
> >> + uint
On Thu, Oct 19, 2017 at 04:09:02PM +0800, Lan Tianyu wrote:
> On 2017年10月18日 23:12, Roger Pau Monné wrote:
> >> diff --git a/tools/libacpi/libacpi.h b/tools/libacpi/libacpi.h
> >> index a2efd23..fdd6a78 100644
> >> --- a/tools/libacpi/libacpi.h
> >> +++
On Thu, Sep 21, 2017 at 11:01:46PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> The BIOS reports the remapping hardware units in a platform to system software
> through the DMA Remapping Reporting (DMAR) ACPI table.
> New fields are introduces for DMAR table. These new fields are set by
On Thu, Sep 21, 2017 at 11:01:45PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Add dmar table structure according Chapter 8 "BIOS Considerations" of
> VTd spec Rev. 2.4.
>
> VTd
> spec:http://www.intel.com/content/dam/www/public/us/en/documents/product-specifications/vt-directed-io-spec.pdf
>
On Thu, Sep 21, 2017 at 11:01:44PM -0400, Lan Tianyu wrote:
> This patch is to introduce create, destroy and query capabilities
> command for vIOMMU. vIOMMU layer will deal with requests and call
> arch vIOMMU ops.
>
> Signed-off-by: Lan Tianyu
> ---
> xen/common/domctl.c | 6 ++
>
On Thu, Sep 21, 2017 at 11:01:43PM -0400, Lan Tianyu wrote:
> This patch is to introduce an abstract layer for arch vIOMMU implementation
> to deal with requests from dom0. Arch vIOMMU code needs to provide callback
> to do create and destroy operation.
>
> Signed-off-by: Lan Tianyu
> ---
> docs
On Thu, Sep 21, 2017 at 11:01:42PM -0400, Lan Tianyu wrote:
> This patch is to add Xen virtual IOMMU doc to introduce motivation,
> framework, vIOMMU hypercall and xl configuration.
>
> Signed-off-by: Lan Tianyu
> ---
> docs/misc/viommu.txt | 136
> ++
directories in $c{Logs} which are writeable only
> by them, and that can stop the whole system because the service user
> cannot expire them.
>
> Prevent this from happening.
>
> Signed-off-by: Ian Jackson
Reviewed-by: Roger Pau Monné
_
On Tue, Oct 17, 2017 at 07:00:25AM -0600, Jan Beulich wrote:
> >>> On 17.10.17 at 14:52, wrote:
> > On Tue, Oct 17, 2017 at 01:41:35PM +0100, Andrew Cooper wrote:
> >> There are many passed values which could trigger this warning. Does
> >>
> >> diff --git a/xen/arch/x86/string.c b/xen/arch/x86/
On Wed, Oct 18, 2017 at 03:53:37AM -0600, Jan Beulich wrote:
> >>> On 18.10.17 at 11:42, wrote:
> > On Wed, Oct 18, 2017 at 03:23:20AM -0600, Jan Beulich wrote:
> >> >>> On 18.10.17 at 09:45, wrote:
> >> > +void __ubsan_handle_pointer_overflow(struct pointer_overflow_data *data,
> >> > +
On Wed, Oct 18, 2017 at 03:23:20AM -0600, Jan Beulich wrote:
> >>> On 18.10.17 at 09:45, wrote:
> > +void __ubsan_handle_pointer_overflow(struct pointer_overflow_data *data,
> > + unsigned long base, unsigned long result)
> > +{
> > + unsigned long flags;
> > +
> > +
On Wed, Oct 18, 2017 at 10:46:57AM +0200, Paolo Bonzini wrote:
> On 18/10/2017 10:32, Roger Pau Monné wrote:
> >> I'll have a try to check how much the differences would affect. If it
> >> would not take too much work, I'd like to adapt Xen NVDIMM enabling
> >
On Tue, Oct 17, 2017 at 08:16:47PM +0800, Haozhong Zhang wrote:
> On 10/17/17 13:45 +0200, Paolo Bonzini wrote:
> > On 14/10/2017 00:46, Stefano Stabellini wrote:
> > > On Fri, 13 Oct 2017, Jan Beulich wrote:
> > > On 13.10.17 at 13:13, wrote:
> > >>> To Jan, Andrew, Stefano and Anthony,
> > >
gt; > The main offenders seem to be the ACPI code, the VMX code and
> > specially the intremap code (set_ire_sid).
> >
> > Signed-off-by: Roger Pau Monné
> > ---
> > Cc: Andrew Cooper
> > Cc: George Dunlap
> > Cc: Ian Jackson
> > Cc: Jan Beul
t;
> > This commit adds support for the new structure layout, adds the
> > missing handlers and the new types for type_check_kinds.
> >
> > Signed-off-by: Roger Pau Monné
>
> Acked-by: Jan Beulich
> with a remark:
>
>
page_alloc.c#bootmem_region_add+0x157/0x220
> > (XEN)[] init_boot_pages+0x56/0x220
> > (XEN)[] __start_xen+0x2c2d/0x4b50
> > (XEN)[] __high_start+0x53/0x60
> >
> > This is due to memmove doing a n-1+addr when n is 0. This is harmless
> > because
feet of the
>running vcpu. This is latent as PVH dom0 construction don't yet function.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
nstead of DEBUG_TRACE_DUMP.
> >
> > Signed-off-by: Roger Pau Monné
>
> Possibly worth noting that this is exposed by Clang when building with
> UBSAN ?
Yes, I hope this can be done upon commit if there are no further
changes required. I would add:
"Noted while b
> Signed-off-by: Roger Pau Monné
> ---
> Cc: Tim Deegan
> Cc: George Dunlap
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Julien Grall
> ---
> IMHO, this is a simple compile-time fix, so it should be accepted for
> 4.10. Any breaking caused by this commit will be s
On Mon, Oct 16, 2017 at 03:38:03PM +0100, Andrew Cooper wrote:
> * x86 PV and ARM dom0's must not clear _VPF_down from v->pause_flags until
>all state is actually set up. As it currently stands, d0v0 is eligible for
>scheduling before its registers have been set. This is latent as we als
On Tue, Oct 10, 2017 at 11:35:26AM +, Roger Pau Monné wrote:
> On Wed, Oct 04, 2017 at 08:34:13AM +, Jan Beulich wrote:
> > >>> On 19.09.17 at 17:29, wrote:
> > > +static void vpci_msi_enable(const struct pci_dev *pdev,
On Fri, Oct 13, 2017 at 08:59:29AM +, Jan Beulich wrote:
> >>> On 13.10.17 at 10:49, wrote:
> On 29.09.17 at 13:25, wrote:
> >> nr_pages doesn't take into account holes or MMIO regions, and
> >> underestimates the amount of memory needed for paging. Be on the safe
> >> side and use max_p
On Thu, Oct 12, 2017 at 02:24:23PM +, Ian Jackson wrote:
> osstest service owner writes ("[osstest test] 114342: regressions - trouble:
> blocked/broken/fail/pass"):
> > flight 114342 osstest real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/114342/
> >
> > Regressions :-(
> >
On Thu, Oct 12, 2017 at 11:21:07AM +, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
> Reported-by: Roger Pau Monné
Reviewed-by: Roger Pau Monné
Thanks, Roger.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ew
> context, in the next patch.
>
> Signed-off-by: Ian Jackson
> Reported-by: Roger Pau Monné
> ---
> docs/man/xl.cfg.pod.5.in| 198
> ++--
> tools/libxl/libxl_create.c | 2 +-
> tools/libxl/libxl_dm.c | 6 +-
>
On Wed, Oct 11, 2017 at 11:34:23AM +, Anthony PERARD wrote:
> On Wed, Oct 11, 2017 at 04:33:26AM +, osstest service owner wrote:
> > flight 114273 qemu-upstream-unstable real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/114273/
> >
> > Regressions :-(
> >
> > Tests which di
On Wed, Oct 11, 2017 at 04:54:40AM +, osstest service owner wrote:
> branch xen-unstable
> xenbranch xen-unstable
> job test-amd64-amd64-xl-pvh-intel
> testid guest-start
>
> Tree: linux
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
> Tree: linuxfirmware git://xenbit
1 - 100 of 1283 matches
Mail list logo