On 13.05.20 15:32, Marek Szyprowski wrote:
The Documentation/DMA-API-HOWTO.txt states that the dma_map_sg() function
returns the number of the created entries in the DMA address space.
However the subsequent calls to the dma_sync_sg_for_{device,cpu}() and
dma_unmap_sg must be called with the
Hi Julien,
On Mon, 2020-05-11 at 10:34 +0100, Julien Grall wrote:
> Hi Volodymyr,
>
> On 06/05/2020 02:44, Volodymyr Babchuk wrote:
> > Normal World can share buffer with OP-TEE for two reasons:
> > 1. Some client application wants to exchange data with TA
> > 2. OP-TEE asks for shared buffer
Trusted Applications use popular approach to determine required size
of buffer: client provides a memory reference with the NULL pointer to
a buffer. This is so called "Null memory reference". TA updates the
reference with the required size and returns it back to client. Then
client allocates
From: Marek Marczykowski-Górecki
Qemu supports only 4 emulated IDE disks, when given more (or with higher
indexes), it will fail to start. Since the disks can still be accessible
using PV interface, just ignore emulated path and log a warning, instead
of rejecting the configuration altogether.
From: Marek Marczykowski-Górecki
Since qemu-xen can now run in stubdomain too, handle this case when
checking it's state too.
Signed-off-by: Marek Marczykowski-Górecki
Reviewed-by: Jason Andryuk
Signed-off-by: Jason Andryuk
Acked-by: Ian Jackson
---
Changes in v6:
- Add Acked-by: Ian
Document device-model-domid for when using a device model stubdomain.
Signed-off-by: Jason Andryuk
Acked-by: Ian Jackson
---
Changes in v6:
- Add Acked-by: Ian Jackson
---
docs/misc/xenstore-paths.pandoc | 5 +
1 file changed, 5 insertions(+)
diff --git a/docs/misc/xenstore-paths.pandoc
Just out of context is the following comment for libxl__domain_make:
/* fixme: this function can leak the stubdom if it fails */
When the stubdomain kernel or ramdisk is not present, the domid and
stubdomain name will indeed be leaked. Avoid the leak by checking the
file presence and erroring
From: Marek Marczykowski-Górecki
When qemu is running in stubdomain, any attempt to initialize vnc/sdl
there will crash it (on failed attempt to load a keymap from a file). If
vfb is present, all those cases are skipped. But since
b053f0c4c9e533f3d97837cf897eb920b8355ed3 "libxl: do not start
From: Marek Marczykowski-Górecki
Do not prohibit anymore using stubdomain with qemu-xen.
To help distingushing MiniOS and Linux stubdomain, add helper inline
functions libxl__stubdomain_is_linux() and
libxl__stubdomain_is_linux_running(). Those should be used where really
the difference is about
From: Marek Marczykowski-Górecki
Access to QMP of QEMU in Linux stubdomain is possible over vchan
connection. Handle the actual vchan connection in a separate process
(vchan-socket-proxy). This simplified integration with QMP (already
quite complex), but also allows preliminary filtering of
From: Marek Marczykowski-Górecki
Device model stubdomains (both Mini-OS + qemu-trad and linux + qemu-xen)
are always started with at least 3 consoles: log, save, and restore.
Until xenconsoled learns how to handle multiple consoles, this is needed
for save/restore support.
For Mini-OS stubdoms,
From: Marek Marczykowski-Górecki
libxenvchan.h include xenevtchn.h and xengnttab.h, so applications built
with it needs applicable -I in CFLAGS too.
Signed-off-by: Marek Marczykowski-Górecki
Reviewed-by: Jason Andryuk
Signed-off-by: Jason Andryuk
Acked-by: Ian Jackson
---
Changes in v6
-
From: Marek Marczykowski-Górecki
This allows using arguments with spaces, like -append, without
nominating any special "separator" character.
Signed-off-by: Marek Marczykowski-Górecki
Reviewed-by: Jason Andryuk
Re-work to use libxl_xs_* functions in a loop. Also write arguments in
dm-argv
Hi,
In coordination with Marek, I'm making a submission of his patches for Linux
stubdomain device-model support. I made a few of my own additions, but Marek
did the heavy lifting. Thank you, Marek.
Below is mostly the v5 cover leter with a few additions.
General idea is to allow freely set
From: Eric Shelton
This patch creates an appropriate command line for the QEMU instance
running in a Linux-based stubdomain.
NOTE: a number of items are not currently implemented for Linux-based
stubdomains, such as:
- save/restore
- QMP socket
- graphics output (e.g., VNC)
Signed-off-by: Eric
From: Marek Marczykowski-Górecki
Add documentation based on reverse-engineered toolstack-ioemu stubdomain
protocol.
Signed-off-by: Marek Marczykowski-Górecki
Signed-off-by: Jason Andryuk
Acked-by: Ian Jackson
---
Changes in v6:
- Add Acked-by: Ian Jackson
---
docs/misc/stubdom.txt | 53
From: Marek Marczykowski-Górecki
Let the server know when the client is connected. Otherwise server will
notice only when client send some data.
This change does not break existing clients, as libvchan user should
handle spurious notifications anyway (for example acknowledge of remote
side
Move kill_device_model to libxl__kill_xs_path so we have a helper to
kill a process from a pid stored in xenstore. We'll be using it to kill
vchan-qmp-proxy.
libxl__kill_xs_path takes a "what" string for use in printing error
messages. kill_device_model is retained in libxl_dm.c to provide the
From: Marek Marczykowski-Górecki
Add a simple proxy for tunneling socket connection over vchan. This is
based on existing vchan-node* applications, but extended with socket
support. vchan-socket-proxy serves both as a client and as a server,
depending on parameters. It can be used to
From: Marek Marczykowski-Górecki
Add documentation for upcoming Linux stubdomain for qemu-upstream.
Signed-off-by: Marek Marczykowski-Górecki
Signed-off-by: Jason Andryuk
Acked-by: Ian Jackson
---
Changes in v6:
- Add Acked-by: Ian Jackson
- Replace dmargs with dm-argv for xenstore
From: Marek Marczykowski-Górecki
Rely on a wrapper script in stubdomain to attach relevant consoles to
qemu. The save console (1) must be attached to fdset/1. When
performing a restore, $STUBDOM_RESTORE_INCOMING_ARG must be replaced on
the qemu command line by "fd:$FD", where $FD is an open
From: Marek Marczykowski-Górecki
Signed-off-by: Marek Marczykowski-Górecki
Reviewed-by: Jason Andryuk
Signed-off-by: Jason Andryuk
Acked-by: Ian Jackson
---
Changes in v6:
- Add Acked-by: Ian Jackson
---
docs/man/xl.cfg.5.pod.in | 27 +++
tools/xl/xl_parse.c |
flight 150225 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150225/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail blocked in 150221
test-amd64-amd64-xl-qemut-win7-amd64
On Sun, May 17, 2020 at 07:32:59PM +0200, Manuel Bouyer wrote:
> I've been looking a bit deeper in the Xen kernel.
> The mapping is failed in ./arch/x86/mm/p2m.c:p2m_get_page_from_gfn(),
> /* Error path: not a suitable GFN at all */
> if ( !p2m_is_ram(*t) && !p2m_is_paging(*t) &&
flight 150223 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150223/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 150220
Tests which did not
I've been looking a bit deeper in the Xen kernel.
The mapping is failed in ./arch/x86/mm/p2m.c:p2m_get_page_from_gfn(),
/* Error path: not a suitable GFN at all */
if ( !p2m_is_ram(*t) && !p2m_is_paging(*t) && !p2m_is_pod(*t) ) {
gdprintk(XENLOG_ERR,
Please see https://community.oracle.com/thread/4326908 Migration to a new
hypervisor is more easy than adding hardware support !!!
Sent from Yahoo Mail on Android
On Sun, May 17, 2020 at 8:35 PM, Hongyan Xia wrote: On Sun,
2020-05-17 at 13:15 +, Jason Long wrote:
> Hello,
> The
On Sun, 2020-05-17 at 13:15 +, Jason Long wrote:
> Hello,
> The Xen hypervisor doesn't support the RoCE adapters? The Oracle
> migrates to the KVM because of it.
> Why not add this feature?
I am curious. Aren't RoCE adapters just PCIe devices? If things are set
up correctly and drivers are
On Thu, May 14, 2020 at 12:25 PM Ian Jackson wrote:
>
> Jason Andryuk writes ("[PATCH v5 06/21] libxl: write qemu arguments into
> separate xenstore keys"):
> > +xs_set_permissions(ctx->xsh, t, GCSPRINTF("%s/rtc/timeoffset",
> > vm_path), roperm, ARRAY_SIZE(roperm));
>
> This line seems
On Thu, May 14, 2020 at 12:19 PM Ian Jackson wrote:
> Jason Andryuk writes ("[PATCH v5 05/21] libxl: Handle Linux stubdomain
> specific QEMU options."):
> > @@ -1974,8 +2006,10 @@ static int libxl__build_device_model_args(libxl__gc
> > *gc,
> >
On Thu, May 14, 2020 at 12:35 PM Ian Jackson wrote:
>
> Jason Andryuk writes ("[PATCH v5 09/21] libxl: add save/restore support for
> qemu-xen in stubdomain"):
> > From: Marek Marczykowski-Górecki
> >
> > Rely on a wrapper script in stubdomain to attach FD 3/4 of qemu to
> > relevant consoles.
Hello,The Xen hypervisor doesn't support the RoCE adapters? The Oracle migrates
to the KVM because of it.Why not add this feature?
Cheers.
flight 150221 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150221/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 15 guest-saverestorefail REGR. vs. 150213
Tests which did not
flight 150224 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150224/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 664e1bc12f8658da124a4eff7a8f16da073bd47f
baseline version:
xen
On Sat, May 16, 2020 at 05:18:45PM +0100, Andrew Cooper wrote:
> On 15/05/2020 22:53, Manuel Bouyer wrote:
> > On Fri, May 15, 2020 at 10:38:13PM +0100, Andrew Cooper wrote:
> >>> [...]
> >>> Does it help ?
> >> Yes and no. This is collateral damage of earlier bug.
> >>
> >> What failed was
flight 150220 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150220/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail like 150212
flight 150222 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150222/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182
build-i386-libvirt
37 matches
Mail list logo