>>> On 02.07.18 at 22:28, wrote:
> On Mon, Jul 02, 2018 at 02:47:42PM +0100, Julien Grall wrote:
>> On 06/26/2018 10:03 AM, Jan Beulich wrote:
>> > > > > On 26.06.18 at 10:43, wrote:
>> > > On 26/06/18 08:24, Jan Beulich wrote:
>> > > > @@ -698,26 +701,30 @@ static void printk_start_of_line(const
On 02/07/18 20:03, Lars Kurth wrote:
> Non-html version: apologies
> Lars
>
> From: Lars Kurth
> Date: Monday, 2 July 2018 at 19:00
> To: xen-devel
> Cc: "committ...@xenproject.org" , Rich Persaud
> , Doug Goldstein ,
> "advisory-bo...@lists.xenproject.org"
> Subject: [Notes for xen summit 20
>>> On 02.07.18 at 18:22, wrote:
> On Mon, Jul 02, 2018 at 09:09:31AM -0600, Jan Beulich wrote:
>> >>> On 02.07.18 at 16:54, wrote:
>> > Ping?
>>
>> I don't understand: There's no open question in the quoted mail.
>
> It's more of a refute of your argument about assert of level triggered
> inte
> -Original Message-
> From: Xin Li [mailto:talons@gmail.com]
> Sent: Tuesday, July 3, 2018 9:26 AM
> To: xen-de...@lists.xen.org
> Cc: Xin Li (Talons) ; Daniel De Graaf
> ; George Dunlap ; Jan
> Beulich ; Konrad Rzeszutek Wilk
> ; Stefano Stabellini ; Tim
> (Xen.org) ; Wei Liu ; Sergey
flight 124881 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124881/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-xtf-amd64-amd64-1 50 xtf/test-hvm64-lbr-tsx-vmentry fail like 124292
test-xtf-amd64-amd64-5 50 xt
Introduce new boot parameter xsm to choose which xsm module is enabled,
and set default to dummy.
Signed-off-by: Xin Li
---
CC: Daniel De Graaf
CC: George Dunlap
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei Liu
CC: Sergey Dyasli
CC: Andrew Coope
When SILO is enabled, there would be no page-sharing or event notifications
between unprivileged VMs (no grant tables or event channels).
Signed-off-by: Xin Li
---
CC: Daniel De Graaf
CC: George Dunlap
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei
flight 124880 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124880/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-5 50 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 124203
Tests which did
On Mon, 2 Jul 2018, Julien Grall wrote:
> Hi,
>
> On 02/07/2018 19:24, Stefano Stabellini wrote:
> > On Mon, 2 Jul 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 06/29/2018 07:38 PM, Stefano Stabellini wrote:
> > > > On Thu, 28 Jun 2018, Roger Pau Monné wrote:
> > > > > On Thu, Jun 28
On Mon, 2 Jul 2018, Julien Grall wrote:
> Hi,
>
> On 02/07/2018 21:37, Stefano Stabellini wrote:
> > On Fri, 15 Jun 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 06/14/2018 10:15 PM, Stefano Stabellini wrote:
> > > > On Thu, 14 Jun 2018, Julien Grall wrote:
> > > > > On 13/06/18 23:1
On Thu, 14 Jun 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 13/06/18 23:15, Stefano Stabellini wrote:
> > Extend the existing device tree based multiboot protocol to include
> > information regarding other domUs to boot.
> >
> > Signed-off-by: Stefano Stabellini
> > ---
> > docs/misc/arm/dev
Hi,
On 02/07/2018 21:37, Stefano Stabellini wrote:
On Fri, 15 Jun 2018, Julien Grall wrote:
Hi Stefano,
On 06/14/2018 10:15 PM, Stefano Stabellini wrote:
On Thu, 14 Jun 2018, Julien Grall wrote:
On 13/06/18 23:15, Stefano Stabellini wrote:
Move a few constants defined by libxl_arm.c to
xen/
Hi,
On 02/07/2018 19:24, Stefano Stabellini wrote:
On Mon, 2 Jul 2018, Julien Grall wrote:
Hi Stefano,
On 06/29/2018 07:38 PM, Stefano Stabellini wrote:
On Thu, 28 Jun 2018, Roger Pau Monné wrote:
On Thu, Jun 28, 2018 at 09:27:08AM +0200, Dario Faggioli wrote:
On Thu, 2018-06-14 at 13:20 -0
flight 124927 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124927/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Fri, 15 Jun 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 06/14/2018 10:15 PM, Stefano Stabellini wrote:
> > On Thu, 14 Jun 2018, Julien Grall wrote:
> > > On 13/06/18 23:15, Stefano Stabellini wrote:
> > > > Move a few constants defined by libxl_arm.c to
> > > > xen/include/public/arch-arm.h,
On Mon, Jul 02, 2018 at 02:47:42PM +0100, Julien Grall wrote:
> On 06/26/2018 10:03 AM, Jan Beulich wrote:
> > > > > On 26.06.18 at 10:43, wrote:
> > > On 26/06/18 08:24, Jan Beulich wrote:
> > > > @@ -698,26 +701,30 @@ static void printk_start_of_line(const c
> > > >case TSM_DATE_MS:
> >
[adhoc adhoc] <2testing.git master /dev/pts/2>
harness c14980b: Debian preseed: Disable security archive for jessie a...
124915: tolerable all pass
flight 124915 xen-unstable adhoc [adhoc]
http://logs.test-lab.xenproject.org/osstest/logs/124915/
Failures :-/ but no regressions.
Tests which did n
On Mon, 2 Jul 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 06/29/2018 07:38 PM, Stefano Stabellini wrote:
> > On Thu, 28 Jun 2018, Roger Pau Monné wrote:
> > > On Thu, Jun 28, 2018 at 09:27:08AM +0200, Dario Faggioli wrote:
> > > > On Thu, 2018-06-14 at 13:20 -0700, Stefano Stabellini wrote:
> >
> On 28 Jun 2018, at 02:57, Lars Kurth wrote:
>
>
> On 27/06/2018, 22:47, "Steven Haigh" wrote:
>
>On Wednesday, 27 June 2018 7:19:58 PM AEST Jan Beulich wrote:
> On 27.06.18 at 06:05, wrote:
>>> Right now, we're at a stage where we could probably justify a new release
>>> of 4.6,
Non-html version: apologies
Lars
From: Lars Kurth
Date: Monday, 2 July 2018 at 19:00
To: xen-devel
Cc: "committ...@xenproject.org" , Rich Persaud
, Doug Goldstein ,
"advisory-bo...@lists.xenproject.org"
Subject: [Notes for xen summit 2018 design session] Process changes: is the 6
monthly rel
# Topics to discuss
### Release Cadence
2 years ago, we moved to a 6 monthly release cadence. The idea was to help
companies getting
features into Xen in a more predictable way. This appears not to have worked.
At the same time,
the number of releases is creating problems for the security tea
On Fri, Jun 29, 2018 at 09:30:10AM +0200, Thomas Gleixner wrote:
> On Thu, 28 Jun 2018, Pavel Tatashin wrote:
> > On Thu, Jun 28, 2018 at 11:23 AM Thomas Gleixner wrote:
> > Hi Thomas,
> >
> > In addition to above, we have xen hvm:
> >
> > setup_arch()
> > ...
> > init_hypervisor_platfor
On Mon, 2 Jul 2018, Julien Grall wrote:
> On 06/26/2018 07:49 AM, Roger Pau Monné wrote:
> > On Mon, Jun 25, 2018 at 05:39:12PM +0100, Ian Jackson wrote:
> > > Roger Pau Monné writes ("Re: [PATCH RFC] tools/libxl: Switch Arm guest
> > > type to PVH"):
> > > > IMO I would remove the 'type' option fr
flight 124877 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124877/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl broken
test-arm64-arm64-xl 4 host-install
For power on, this is just like ipmi.
For power off, it doesn't mind errors (although it has three
attempts). This is useful when combined with pdu power: if the
chassis power is already off, ipmi will fail.
If the ipmi operation does fail, then the chassing pdu power operation
will do the job.
Signed-off-by: Ian Jackson
---
Osstest/PDU/ipmi.pm | 26 ++
1 file changed, 18 insertions(+), 8 deletions(-)
diff --git a/Osstest/PDU/ipmi.pm b/Osstest/PDU/ipmi.pm
index bff1143..0cbc5b9 100644
--- a/Osstest/PDU/ipmi.pm
+++ b/Osstest/PDU/ipmi.pm
@@ -49,19 +49,29 @@ sub pd
And, an abbreviation for invoking it: just writing numbers (or
/ pair of numbers).
Signed-off-by: Ian Jackson
---
Osstest/PDU/pause.pm | 49 +
Osstest/TestSupport.pm | 3 +++
2 files changed, 52 insertions(+)
create mode 100644 Osstest/PDU/paus
If specified as the first method, it means to reverse the order when
powering off.
There don't seem to be any docs for PowerMethod, so I have not
documented this right now.
Signed-off-by: Ian Jackson
---
Osstest/TestSupport.pm | 13 +++--
1 file changed, 11 insertions(+), 2 deletions(-)
If no time is specified, use 120 (or the PowerOnTime host property
value) when powering on, or 10 when powering off.
This is all intended to be used like this:
HostProp_rimava0_PowerMethod nest; msw --apc6 pdu2 19; pause; ipmi rimava0m
This means:
* For power on, first turn on the APC PDU pdu
This can now come from host properties, or failing that we use
ADMIN/ADMIN which seems common.
No functional change with working existing configs.
Signed-off-by: Ian Jackson
---
Osstest/PDU/ipmi.pm | 2 ++
1 file changed, 2 insertions(+)
diff --git a/Osstest/PDU/ipmi.pm b/Osstest/PDU/ipmi.pm
i
From: Ian Jackson
We have been having trouble with our PDU ports: relays are getting
stuck. This is affecting a distressing variety of machines and both
our PDUs.
We have a theory the relays will work a lot better if we do not open
and close them under the load of the main system.
Deployment o
flight 124889 qemu-upstream-4.10-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124889/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-
On Mon, Jul 02, 2018 at 09:09:31AM -0600, Jan Beulich wrote:
> >>> On 02.07.18 at 16:54, wrote:
> > Ping?
>
> I don't understand: There's no open question in the quoted mail.
It's more of a refute of your argument about assert of level triggered
interrupts not being meaningful if the interrupt i
Libfdt is used for:
- Unflatten the Flatten Device-Tree (FDT) blob
- Create Device-Tree for the Hardware-Domain
Both use are done during the initialization of Xen. So move all the
libfdt to init.
Note that the runes was borrowed from libelf Makefile.
Signed-off-by: Julien Grall
Reviewed
Some of the functions implemented in setup.c are only used at boot but
not yet marked as such.
Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's reviewed-by
---
xen/arch/arm/setup.c | 10 +-
1 file changed, 5 insertions(+), 5 del
Now that ELF support has been dropped to boot Dom0, no-one is using
libelf within the hypervisor.
Introduce a config option to select libelf on x86 and keep unselected
for Arm.
Signed-off-by: Julien Grall
---
Changes in v2:
- Rename HAS_ELF to NEEDS_LIBELF
---
xen/arch/x86/Kconfig
The file domain_build.c only contains code/data used during the
initialization. So move everything to init and mark the file as such.
Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's reviewed-by
---
xen/arch/arm/Makefile | 2 +-
Dom0 (aka hardware domain on Arm) is always direct mapped. Rather than
using a global variable to store a const, directly open-code it or
replace the use with is_domain_direct_mapped(...) macros.
This will also help a follow-up patch to move all domain_build.c in
init.
Signed-off-by: Julien Grall
The code has been around since the beginning of Xen Arm. However, I am
not aware of any user and the code is pretty bogus:
1) It is assuming virtual address == physical address.
2) The cache is not cleaned after the Image is loaded but the Image
is started with Cache disabled.
3) Th
The file kernel.c only contains code/data used during the
initialization. So move everything to init and mark the file as such.
Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
---
Changes in v2:
- Add Stefano's reviewed-by
---
xen/arch/arm/Makefile | 2 +-
xen/arch/arm
Hi all,
This series removes unused code from Xen and also move some part under __init
if only used during boot.
The major change of this series is removing support for libelf in Xen (see
patch #4 and #5).
Cheers,
Julien Grall (7):
xen/arm: Remove the variable dom0_11_mapping and open-code the
Hi Lars,
It looks like this series has never been merged. Do you know that state
of it?
The first patch is going to avoid contributors to CC both xen.org and
xenproject.org if they follow the script add_maintainers.pl. This was
pointed out by Jan on one of the series I sent.
Cheers,
On 05
On Mon, Jul 02, 2018 at 03:13:38PM +0100, Julien Grall wrote:
>
>
> On 06/26/2018 07:49 AM, Roger Pau Monné wrote:
> > On Mon, Jun 25, 2018 at 05:39:12PM +0100, Ian Jackson wrote:
> > > Roger Pau Monné writes ("Re: [PATCH RFC] tools/libxl: Switch Arm guest
> > > type to PVH"):
> > > > IMO I woul
flight 124891 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124891/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt6 libvirt-buildfail REGR. vs. 124618
version targeted for testi
>>> On 02.07.18 at 16:54, wrote:
> Ping?
I don't understand: There's no open question in the quoted mail.
Jan
> On Mon, Jun 25, 2018 at 01:19:19PM +0200, Roger Pau Monné wrote:
>> On Fri, Jun 22, 2018 at 08:23:02AM -0600, Jan Beulich wrote:
>> > >>> On 08.06.18 at 17:07, wrote:
>> > > @@ -316,
Hi Jan,
On 06/06/2018 10:06 AM, Jan Beulich wrote:
On 05.06.18 at 19:12, wrote:
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -17,6 +17,9 @@ config HAS_ALTERNATIVE
config HAS_DEVICE_TREE
bool
+config HAS_ELF
+bool
+
HAS_LIBELF (or NEEDS_LIBELF) would seem better to m
On Mon, Jul 02, 2018 at 02:04:45PM +, Lars Kurth wrote:
> This is a session hosted by Xin Li from Citrix on PCI-passthrough in a
> deprivleged QEMU.
Including Elena as she did a patch for this (so that any PCI operation does not
require root access).
>
> (Went over key points of QEMU de-priv
Ping?
On Mon, Jun 25, 2018 at 01:19:19PM +0200, Roger Pau Monné wrote:
> On Fri, Jun 22, 2018 at 08:23:02AM -0600, Jan Beulich wrote:
> > >>> On 08.06.18 at 17:07, wrote:
> > > @@ -316,7 +317,9 @@ int pt_update_irq(struct vcpu *v)
> > > if ( pt->pending_intr_nr )
> > > {
> > >
flight 124916 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124916/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Mon, Jul 02, 2018 at 03:30:19PM +0100, Wei Liu wrote:
> On Mon, Jul 02, 2018 at 10:04:30AM +0200, Roger Pau Monné wrote:
> > On Fri, Jun 29, 2018 at 12:15:34PM +0100, Wei Liu wrote:
> > > On Wed, Jun 20, 2018 at 04:42:30PM +0200, Roger Pau Monne wrote:
> > > > In order to unmap the BARs
> > > >
On 25/06/18 12:45, Jan Beulich wrote:
> As the sequence of invocations matters, add "tty" only after "hvc" when
> a VGA console is available (which is often the case for Dom0, but hardly
> ever for DomU).
>
> Signed-off-by: Jan Beulich
Reviewed-by: Juergen Gross
Juergen
_
On Mon, Jul 02, 2018 at 10:04:30AM +0200, Roger Pau Monné wrote:
> On Fri, Jun 29, 2018 at 12:15:34PM +0100, Wei Liu wrote:
> > On Wed, Jun 20, 2018 at 04:42:30PM +0200, Roger Pau Monne wrote:
> > > In order to unmap the BARs
> > >
> > > Signed-off-by: Roger Pau Monné
> > > ---
> > > Cc: Andrew C
On Mon, Jul 02, 2018 at 04:16:05PM +0530, Manish Jaggi wrote:
> Hi All,
>
> PCI-PT and PCI config space emulation have been in discussion for quite a
> long time.
> We had started some work on this in past and in LEG-XEN but that didnt go
> far and the group is closed.
>
> I believe that PCI-PT i
Thank you to Florian from NEC for writing these up. They are incomplete,
because we only realized after some time that we didn't have anybody
taking notes. If anyone remembers the earlier parts, please augment
## PV shim
got accelerated because of meltdown. was considered for short time to be
On 06/26/2018 07:49 AM, Roger Pau Monné wrote:
On Mon, Jun 25, 2018 at 05:39:12PM +0100, Ian Jackson wrote:
Roger Pau Monné writes ("Re: [PATCH RFC] tools/libxl: Switch Arm guest type to
PVH"):
IMO I would remove the 'type' option from xl.cfg (so that it's
basically ignored) in the ARM case
On Mon, Jul 02, 2018 at 03:07:56PM +0100, Wei Liu wrote:
> On Mon, Jul 02, 2018 at 04:02:44PM +0200, Roger Pau Monné wrote:
> > I'm not sure I understand the question. You cannot free specific
> > entries, they are part of the msix struct (you have to free the whole
> > struct, not specific entries
On Mon, Jul 02, 2018 at 04:02:44PM +0200, Roger Pau Monné wrote:
> On Mon, Jul 02, 2018 at 02:55:37PM +0100, Wei Liu wrote:
> > On Mon, Jul 02, 2018 at 09:54:20AM +0200, Roger Pau Monné wrote:
> > > On Fri, Jun 29, 2018 at 11:52:07AM +0100, Wei Liu wrote:
> > > > On Wed, Jun 20, 2018 at 04:42:28PM
This is a session hosted by Xin Li from Citrix on PCI-passthrough in a
deprivleged QEMU.
(Went over key points of QEMU de-priv talk - see
https://www.slideshare.net/xen_com_mgr/xpdds18-qemu-and-xen-reducing-the-attack-surface-paul-durrant-citrix)
Problem is syses nodes need to be opened.
Doug:
On Mon, Jul 02, 2018 at 02:55:37PM +0100, Wei Liu wrote:
> On Mon, Jul 02, 2018 at 09:54:20AM +0200, Roger Pau Monné wrote:
> > On Fri, Jun 29, 2018 at 11:52:07AM +0100, Wei Liu wrote:
> > > On Wed, Jun 20, 2018 at 04:42:28PM +0200, Roger Pau Monne wrote:
> > > > So that interrupts are properly fre
On 25/06/18 12:41, Jan Beulich wrote:
> While this is only a start (IOCTL_PRIVCMD_MMAP* and IOCTL_PRIVCMD_DM_OP
> require more work), it at least allows some simple operations (like
> "xl dmesg") which have always been available on XenoLinux to work again
> with a 64-bit kernel underneath a 32-bit
Hi,
On 07/02/2018 02:47 PM, Julien Grall wrote:
On 06/26/2018 10:03 AM, Jan Beulich wrote:
On 26.06.18 at 10:43, wrote:
On 26/06/18 08:24, Jan Beulich wrote:
During early boot timestamps aren't very useful, as they're all zero
(in "boot" mode) or absent altogether (in "date" and "datems" mod
The notes were taken by Florian Schmidt of NEC. Thank you
This has some actions on: Lars K, Xudong H, Doug G, Andrew C and Andrii A (who
was not present)
We should certainly try and make progress on this as it has the potential to
make life for code reviewers easier: it may be worth to organize a
On Mon, Jul 02, 2018 at 09:54:20AM +0200, Roger Pau Monné wrote:
> On Fri, Jun 29, 2018 at 11:52:07AM +0100, Wei Liu wrote:
> > On Wed, Jun 20, 2018 at 04:42:28PM +0200, Roger Pau Monne wrote:
> > > So that interrupts are properly freed.
> > >
> > > Signed-off-by: Roger Pau Monné
> > > ---
> > >
On 25/06/18 12:34, Jan Beulich wrote:
> Its only caller is __init, so to avoid section mismatch warnings when a
> compiler decides to not inline the function marke this function so as
> well. Take the opportunity and also make the function actually use its
> argument: The sole caller passes in zero
On 25/06/18 12:19, Jan Beulich wrote:
> This already gets done in HYPERVISOR_mca().
>
> Signed-off-by: Jan Beulich
Reviewed-by: Juergen Gross
Juergen
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/lis
On 25/06/18 12:17, Jan Beulich wrote:
> This is unnecessary and triggers a warning in the hypervisor.
>
> Often systems have more processor entries in their ACPI tables than are
> actually installed/active. The ACPI_STA_DEVICE_PRESENT bit cannot be
> reliably used, but the ACPI_MADT_ENABLED bit ca
On 06/26/2018 10:03 AM, Jan Beulich wrote:
On 26.06.18 at 10:43, wrote:
On 26/06/18 08:24, Jan Beulich wrote:
During early boot timestamps aren't very useful, as they're all zero
(in "boot" mode) or absent altogether (in "date" and "datems" modes).
Log "boot" format timestamps when the date fo
On Mon, Jul 02, 2018 at 03:36:42PM +0200, Roger Pau Monné wrote:
> On Mon, Jul 02, 2018 at 01:15:10PM +0100, Andrew Cooper wrote:
> > On 02/07/18 11:41, Roger Pau Monné wrote:
> > > On Mon, Jul 02, 2018 at 10:57:25AM +0100, Andrew Cooper wrote:
> > >> This helper appears to have been introduced 10
On Mon, Jul 02, 2018 at 01:15:10PM +0100, Andrew Cooper wrote:
> On 02/07/18 11:41, Roger Pau Monné wrote:
> > On Mon, Jul 02, 2018 at 10:57:25AM +0100, Andrew Cooper wrote:
> >> This helper appears to have been introduced 10 years ago by c/s 5f14a87ceb
> >> "x86, hvm: Guest CPUID configuration" an
>>> On 02.07.18 at 15:15, wrote:
> On Lu, 2018-07-02 at 09:38 +, Paul Durrant wrote:
>> > From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
>> > Sent: 28 June 2018 10:26
>> > --- a/xen/arch/x86/hvm/viridian.c
>> > +++ b/xen/arch/x86/hvm/viridian.c
>> > @@ -1026,20 +1026,30 @@ static int
On Lu, 2018-07-02 at 09:38 +, Paul Durrant wrote:
> >
> > -Original Message-
> > From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> > Sent: 28 June 2018 10:26
> > To: xen-de...@lists.xen.org
> > Cc: Ian Jackson ; Wei Liu > com>;
> > jbeul...@suse.com; Andrew Cooper ; Paul
> > Du
On 07/02/2018 11:20 AM, Juergen Gross wrote:
On 02/07/18 09:10, Oleksandr Andrushchenko wrote:
Hello, Boris, Juergen!
Do you think I can re-base the series (which already has
all required R-b's from Xen community) onto the latest kernel
with API changes to patches 5 (of_dma_configure) and 8
(dm
On Tue, Jun 12, 2018 at 4:31 PM, Oleksandr Grytsov wrote:
> From: Oleksandr Grytsov
>
> Changes since initial:
> * id field is changed to unique_id in libxl_device_vkb to be comply
>with protocol;
> * use XENKBD_FIELD_... defines from protocol to address xen store entries
>and fields i
On Tue, Jun 12, 2018 at 6:40 PM, Oleksandr Grytsov wrote:
> From: Oleksandr Grytsov
>
> As new version of the display protocol introduces unique-id variable, it
> needs
> to be changed in libxl/xl. This patchset renames it in the xen store and in
> display device structures. Also it uses XENDISP
On Fri, Jun 15, 2018 at 1:15 PM, Oleksandr Grytsov wrote:
> From: Oleksandr Grytsov
>
> This patch set adds PV sound device support to xl.cfg and xl.
> See sndif.h for protocol implementation details.
>
> Changes since v2:
> * address comments
> * rename libxl_vsnd_stream.id -> libxl_vsnd_stre
On Mon 02-07-18 14:39:50, Christian König wrote:
[...]
> Not wanting to block something as important as this, so feel free to add an
> Acked-by: Christian König to the patch.
Thanks a lot!
> Let's rather face the next topic: Any idea how to runtime test this?
This is a good question indeed. One
From: Isaila Alexandru
This patch adds access rights for the NPT pages. The access rights are
saved in a radix tree with the root saved in p2m_domain. The rights are
manipulated through p2m_set_access()
and p2m_get_access() functions.
The patch follows the ept logic.
Note: It was tested with xe
These MSRs are non-architectural and the available booleans were used in lieu
of an architectural signal of availability.
However, in hindsight, the additional booleans make toolstack MSR interactions
more complicated. The MSRs are unconditionally available to HVM guests, but
currently for PV gue
Am 02.07.2018 um 14:35 schrieb Michal Hocko:
On Mon 02-07-18 14:24:29, Christian König wrote:
Am 02.07.2018 um 14:20 schrieb Michal Hocko:
On Mon 02-07-18 14:13:42, Christian König wrote:
Am 02.07.2018 um 13:54 schrieb Michal Hocko:
On Mon 02-07-18 11:14:58, Christian König wrote:
Am 27.06.2
On Mon 02-07-18 14:24:29, Christian König wrote:
> Am 02.07.2018 um 14:20 schrieb Michal Hocko:
> > On Mon 02-07-18 14:13:42, Christian König wrote:
> > > Am 02.07.2018 um 13:54 schrieb Michal Hocko:
> > > > On Mon 02-07-18 11:14:58, Christian König wrote:
> > > > > Am 27.06.2018 um 09:44 schrieb M
Am 02.07.2018 um 14:20 schrieb Michal Hocko:
On Mon 02-07-18 14:13:42, Christian König wrote:
Am 02.07.2018 um 13:54 schrieb Michal Hocko:
On Mon 02-07-18 11:14:58, Christian König wrote:
Am 27.06.2018 um 09:44 schrieb Michal Hocko:
This is the v2 of RFC based on the feedback I've received so
On Mon 02-07-18 14:13:42, Christian König wrote:
> Am 02.07.2018 um 13:54 schrieb Michal Hocko:
> > On Mon 02-07-18 11:14:58, Christian König wrote:
> > > Am 27.06.2018 um 09:44 schrieb Michal Hocko:
> > > > This is the v2 of RFC based on the feedback I've received so far. The
> > > > code even com
On 02/07/18 11:41, Roger Pau Monné wrote:
> On Mon, Jul 02, 2018 at 10:57:25AM +0100, Andrew Cooper wrote:
>> This helper appears to have been introduced 10 years ago by c/s 5f14a87ceb
>> "x86, hvm: Guest CPUID configuration" and never had any users at all.
>>
>> alloc_str() is actually an opencode
Am 02.07.2018 um 13:54 schrieb Michal Hocko:
On Mon 02-07-18 11:14:58, Christian König wrote:
Am 27.06.2018 um 09:44 schrieb Michal Hocko:
This is the v2 of RFC based on the feedback I've received so far. The
code even compiles as a bonus ;) I haven't runtime tested it yet, mostly
because I hav
On Mon 02-07-18 11:14:58, Christian König wrote:
> Am 27.06.2018 um 09:44 schrieb Michal Hocko:
> > This is the v2 of RFC based on the feedback I've received so far. The
> > code even compiles as a bonus ;) I haven't runtime tested it yet, mostly
> > because I have no idea how.
> >
> > Any further
On Mon, Jul 02, 2018 at 10:57:26AM +0100, Andrew Cooper wrote:
> These MSRs are non-architectural and the available booleans were used in lieu
> of an architectural signal of availability. The MSRs are unconditionally
> available to HVM guests, but currently for PV guests, are hidden when CPUID
>
On 02/07/18 12:27, Jan Beulich wrote:
On 02.07.18 at 11:57, wrote:
>> These MSRs are non-architectural and the available booleans were used in lieu
>> of an architectural signal of availability. The MSRs are unconditionally
>> available to HVM guests, but currently for PV guests, are hidden
On 02/07/18 13:26, osstest service owner wrote:
> flight 124876 xen-4.11-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/124876/
>
> Failures and problems with tests :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-arm
Hi Stefano,
On 06/29/2018 07:38 PM, Stefano Stabellini wrote:
On Thu, 28 Jun 2018, Roger Pau Monné wrote:
On Thu, Jun 28, 2018 at 09:27:08AM +0200, Dario Faggioli wrote:
On Thu, 2018-06-14 at 13:20 -0700, Stefano Stabellini wrote:
On Thu, 14 Jun 2018, Andrew Cooper wrote:
On 14/06/18 14:40,
On Lu, 2018-07-02 at 04:59 -0600, Jan Beulich wrote:
> >
> > >
> > > >
> > > > On 11.05.18 at 13:11, wrote:
> > --- a/xen/include/asm-x86/monitor.h
> > +++ b/xen/include/asm-x86/monitor.h
> > @@ -83,16 +83,13 @@ static inline uint32_t
> > arch_monitor_get_capabilities(struct domain *d)
> >
>>> On 02.07.18 at 12:46, wrote:
> On Mon, 2018-07-02 at 10:57 +0100, Andrew Cooper wrote:
>> This simplifies future interactions with the toolstack, by removing the need
>> for per-MSR custom accessors when shuffling data in/out of a policy.
>>
>> Use a 32bit raw backing integer (for simplicity)
On 02/07/18 13:18, Jan Beulich wrote:
On 02.07.18 at 12:00, wrote:
>> --- a/arch/x86/xen/enlighten_pv.c
>> +++ b/arch/x86/xen/enlighten_pv.c
>> @@ -1213,6 +1213,7 @@ asmlinkage __visible void __init xen_start_kernel(void)
>> pv_info = xen_info;
>> pv_init_ops.patch = paravirt_patch_
>>> On 02.07.18 at 11:57, wrote:
> These MSRs are non-architectural and the available booleans were used in lieu
> of an architectural signal of availability. The MSRs are unconditionally
> available to HVM guests, but currently for PV guests, are hidden when CPUID
> faulting is unavailable.
>
>
flight 124876 xen-4.11-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124876/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
Tests which did
>>> On 02.07.18 at 12:00, wrote:
> --- a/arch/x86/xen/enlighten_pv.c
> +++ b/arch/x86/xen/enlighten_pv.c
> @@ -1213,6 +1213,7 @@ asmlinkage __visible void __init xen_start_kernel(void)
> pv_info = xen_info;
> pv_init_ops.patch = paravirt_patch_default;
> pv_cpu_ops = xen_cpu_ops;
On 07/02/2018 09:34 AM, Jan Beulich wrote:
On 29.06.18 at 18:39, wrote:
>> On 06/29/2018 06:38 PM, Jan Beulich wrote:
>> On 28.06.18 at 15:00, wrote:
@@ -4666,6 +4667,23 @@ static int do_altp2m_op(
}
break;
+case HVMOP_altp2m_get_mem_acces
Hi,
On 06/28/2018 02:00 PM, Adrian Pop wrote:
diff --git a/xen/arch/arm/mem_access.c b/xen/arch/arm/mem_access.c
index ae2686ffa2..ba9e50e7f6 100644
--- a/xen/arch/arm/mem_access.c
+++ b/xen/arch/arm/mem_access.c
@@ -236,7 +236,7 @@ bool p2m_mem_access_check(paddr_t gpa, vaddr_t gla, const
stru
>>> On 11.05.18 at 13:11, wrote:
> --- a/xen/include/asm-x86/monitor.h
> +++ b/xen/include/asm-x86/monitor.h
> @@ -83,16 +83,13 @@ static inline uint32_t
> arch_monitor_get_capabilities(struct domain *d)
> (1U << XEN_DOMCTL_MONITOR_EVENT_INTERRUPT) |
> (1
On Mon, 2018-07-02 at 10:57 +0100, Andrew Cooper wrote:
> This simplifies future interactions with the toolstack, by removing the need
> for per-MSR custom accessors when shuffling data in/out of a policy.
>
> Use a 32bit raw backing integer (for simplicity), and use a bitfield to move
> the cpuid
Hi All,
PCI-PT and PCI config space emulation have been in discussion for quite
a long time.
We had started some work on this in past and in LEG-XEN but that didnt
go far and the group is closed.
I believe that PCI-PT is a feature which would be suitable for not only
for servers but for embe
1 - 100 of 160 matches
Mail list logo