On 2023-11-10 02:04, Stefano Stabellini wrote:
On Wed, 8 Nov 2023, Nicola Vetrini wrote:
On 2023-11-08 09:17, Nicola Vetrini wrote:
> Hi Stefano,
>
> sorry for the late reply; see my response below.
>
> On 2023-10-31 22:47, Stefano Stabellini wrote:
> > Hi Simone,
> >
> > As you might have notic
Hi Stefano,
On 10/11/2023 02:44, Stefano Stabellini wrote:
>
>
> Reported-by: Brian Woods
> Signed-off-by: Stefano Stabellini
Reviewed-by: Michal Orzel
~Michal
Modify resource_query_layout to handle the use case that need to query
correct stride for guest linear resource before it is created.
Signed-off-by: Julia Zhang
---
hw/display/virtio-gpu-virgl.c | 20 +++-
include/standard-headers/linux/virtio_gpu.h | 8
2
This add implementation of resource_query_layout to get the information of
how the host has actually allocated the buffer. This function is now used
to query the stride for guest linear resource for dGPU prime on guest VMs.
Related mesa mr: https:
//gitlab.freedesktop.org/mesa/mesa/-/merge_request
From: Daniel Stone
A new ioctl to shuttle information between host and guest about the
actual buffer allocation, which can be used for interop between GL and
Vulkan when supporting standard window systems.
---
hw/display/virtio-gpu-base.c| 4 ++
hw/display/virtio-gpu-virgl.c
Hi David,
+Markus/Bernhard
On 6/11/23 20:49, David Woodhouse wrote:
From: David Woodhouse
Eliminate direct access to nd_table[] and nb_nics by processing the the
Xen and ISA NICs first and then calling pci_init_nic_devices() for the
rest.
Signed-off-by: David Woodhouse
Reviewed-by: Paul Dur
Hi David,
On 6/11/23 20:49, David Woodhouse wrote:
From: David Woodhouse
The loop over nd_table[] to add PCI NICs is repeated in quite a few
places. Add a helper function to do it.
Some platforms also try to instantiate a specific model in a specific
slot, to match the real hardware. Add pci_
flight 183723 linux-linus real [real]
flight 183727 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/183723/
http://logs.test-lab.xenproject.org/osstest/logs/183727/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-
flight 183725 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183725/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 589f2e49e5f9ff998bd4f08cbf28a1572ab7b544
baseline version:
ovmf 35c0c63edbab6a37d6c01
On Tue, Nov 07, 2023 at 08:15:32PM +, Andrew Cooper wrote:
> On 07/11/2023 7:53 pm, Elliott Mitchell wrote:
> > I ran into the nestedhvm via the following path. I was considering the
> > feasibility of shedding tasks from a desktop onto a server running Xen.
> > I was looking at `man xl.cfg` a
Reported-by: Brian Woods
Signed-off-by: Stefano Stabellini
diff --git a/scripts/uboot-script-gen b/scripts/uboot-script-gen
index b284887..6e52da5 100755
--- a/scripts/uboot-script-gen
+++ b/scripts/uboot-script-gen
@@ -790,7 +790,7 @@ bitstream_load_and_config()
check_file_type "$BITST
On Wed, 8 Nov 2023, Nicola Vetrini wrote:
> On 2023-11-08 09:17, Nicola Vetrini wrote:
> > Hi Stefano,
> >
> > sorry for the late reply; see my response below.
> >
> > On 2023-10-31 22:47, Stefano Stabellini wrote:
> > > Hi Simone,
> > >
> > > As you might have noticed, all the eclair-ARM64 jobs
On Thu, 9 Nov 2023, Andrew Cooper wrote:
> On 09/11/2023 3:49 pm, Anthony PERARD wrote:
> > Currently, the test rely on QEMU and Xen finishing the boot in under
> > two seconds. That's both very long and very short. Xen usually managed
> > to print "All set up" under a second. Unless for some reaso
On Thu, 9 Nov 2023, Jan Beulich wrote:
> On 31.10.2023 08:43, Jan Beulich wrote:
> > What I would consider scope creep I
> > specifically didn't even ask for: I'd like this macro to be overridable
> > by an arch. Specifically (see my earlier naming hint) I'd like to use
> > x86's BMI insn BLSI in t
On Thu, 9 Nov 2023, Julien Grall wrote:
> On 09/11/2023 07:42, Jan Beulich wrote:
> > On 08.11.2023 14:33, Julien Grall wrote:
> > > Hi Jan,
> > >
> > > On 08/11/2023 11:19, Jan Beulich wrote:
> > > > On 08.11.2023 12:03, Nicola Vetrini wrote:
> > > > > On 2023-11-08 09:24, Jan Beulich wrote:
> >
On Wed, 8 Nov 2023, Andrew Cooper wrote:
> sphinx-build reports:
>
> docs/designs/launch/hyperlaunch.rst: WARNING: document isn't included in
> any toctree
> docs/designs/launch/hyperlaunch-devicetree.rst: WARNING: document isn't
> included in any toctree
> docs/misc/xen-makefiles/makefile
On Wed, 8 Nov 2023, Luca Fancellu wrote:
> > On 8 Nov 2023, at 15:27, Andrew Cooper wrote:
> >
> > sphinx-build reports:
> >
> > docs/misra/exclude-list.rst:47: WARNING: Unexpected indentation.
> > docs/misra/exclude-list.rst:50: WARNING: Inline emphasis start-string
> > without end-string.
>
On Wed, 8 Nov 2023, Andrew Cooper wrote:
> sphinx-build reports:
>
> docs/designs/launch/hyperlaunch.rst:111: WARNING: Title underline too short.
> docs/designs/launch/hyperlaunch.rst:203: WARNING: Unexpected indentation.
> docs/designs/launch/hyperlaunch.rst:216: WARNING: Unexpected indenta
On Thu, 9 Nov 2023, Jan Beulich wrote:
> On 08.11.2023 15:37, Andrew Cooper wrote:
> > These 3 Kconfig docs were imported from Linux erroneously. They are
> > GPL-2.0-only in Linux, but have no SPDX tag and were placed in such a way to
> > be included by the blanket statement saying that all RST f
On Wed, 8 Nov 2023, Andrew Cooper wrote:
> Two files are missing SDPX tags, but are covered by the blanketing license
> statement in docs/README.sources saying that RST files are CC-BY-4.0
>
> Fixes: 3c911be55f1c ("docs/misra: document the C dialect and translation
> toolchain assumptions.")
> Fi
flight 183724 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183724/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 35c0c63edbab6a37d6c019d613a4b06529941a80
baseline version:
ovmf e077ccff6d0f2e8c3fc44
On 09/11/2023 5:40 pm, Thomas Huth wrote:
> Let's improve the wording here.
>
> Signed-off-by: Thomas Huth
Thankyou for the patch, but this is a verbatim copy of a set of Xen headers.
Would you mind submitting a correction to
xen.git:xen/include/public/hvm/params.h first, and then syncing the
re
flight 183722 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183722/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf e077ccff6d0f2e8c3fc44b3e2ab71aff66927c3b
baseline version:
ovmf 8a41004643412b59f6698
flight 183721 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183721/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8a41004643412b59f669876658bd02b8025bec71
baseline version:
ovmf 616f0d503707c2e3fbdbc
On 9/11/23 18:40, Thomas Huth wrote:
Let's improve the wording here.
Signed-off-by: Thomas Huth
---
include/hw/xen/interface/hvm/params.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Reviewed-by: Philippe Mathieu-Daudé
Enable the use of IOMMU + PCI in dom0 without having to specify
"pci-passthrough=yes". We rely on dom0 to initialize the PCI controller
and perform a PHYSDEVOP_pci_device_add call to add each device to SMMU.
Enable pci_init() for initializing Xen's internal PCI subsystem, and
allow PHYSDEVOP_pci_d
From: Rahul Singh
When ITS is enabled and PCI devices that are behind an SMMU generate an
MSI interrupt, SMMU fault will be observed as there is currently no
mapping in p2m table for the ITS translation register (GITS_TRANSLATER).
A mapping is required in the p2m page tables so that the device c
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Tyshchenko
Signed-off-by: Oleksandr Andrushchenko
Signed-off-by: Stewart Hildebrand
---
v5->v6:
* check for hardware_domain == NULL (dom0less test case)
* locking: assign pdev->domain before list_add()
v4->v5:
* assign device to pdev->dom
From: Rahul Singh
Current code skip the mapping for PCI bridge MMIO region to dom0 when
pci_passthrough_enabled flag is set. Mapping should be skip when
has_vpci(d) is enabled for the domain, as we need to skip the mapping
only when VPCI handler are registered for ECAM.
Signed-off-by: Rahul Sing
From: Rahul Singh
Signed-off-by: Rahul Singh
Signed-off-by: Stewart Hildebrand
---
v5->v6:
* check for hardware_domain == NULL (dom0less test case)
* locking: assign pdev->domain before list_add()
v4->v5:
* deassign from hwdom
* add TODO regarding locking
* fixup after dropping ("xen/arm: Move
Handle phantom functions in iommu_add_dt_pci_sideband_ids(). Each phantom
function will have a unique requestor ID (RID)/BDF. On ARM, we need to
map/translate the RID/BDF to an AXI stream ID for each phantom function
according to the pci-iommu device tree mapping [1]. The RID/BDF -> AXI stream ID
m
From: Oleksandr Tyshchenko
The main purpose of this patch is to add a way to register PCI device
(which is behind the IOMMU) using the generic PCI-IOMMU DT bindings [1]
before assigning that device to a domain.
This behaves similarly to the existing iommu_add_dt_device API, except it
handles PCI
From: Oleksandr Tyshchenko
Move code for processing DT IOMMU specifier to a separate helper.
This helper will be re-used for adding PCI devices by the subsequent
patches as we will need exact the same actions for processing
DT PCI-IOMMU specifier.
While at it introduce NO_IOMMU to avoid magic "1
This series introduces SMMU handling for PCIe passthrough on ARM. These patches
should be able to be upstreamed independently from the vPCI series [1]. See [2]
for notes about test cases.
[1] https://lists.xenproject.org/archives/html/xen-devel/2023-10/msg00660.html
[2] https://lists.xenproject.or
A device tree node for a PCIe root controller may have an iommu-map property [1]
with a phandle reference to the SMMU node, but not necessarily an iommus
property. In this case, we want to treat it the same as we currently handle
devices with an iommus property: don't pass the iommu related propert
On Mon, Nov 06, 2023 at 01:25:29PM +, Alejandro Vallejo wrote:
> These macros were hiding that the ops are not zero-initialized by the
> toolstack. This is needlessly opaque for something so simple, so this patch
> removes them and replaces them with explicit zero-initialising versions.
>
> Th
On Thu, Nov 09, 2023 at 06:40:34PM +0100, Thomas Huth wrote:
> Let's improve the wording here.
>
> Signed-off-by: Thomas Huth
> ---
> include/hw/xen/interface/hvm/params.h | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
Reviewed-by: Daniel P. Berrangé
With regards,
Daniel
--
|: http
Let's improve the wording here.
Signed-off-by: Thomas Huth
---
include/hw/xen/interface/hvm/params.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/hw/xen/interface/hvm/params.h
b/include/hw/xen/interface/hvm/params.h
index a22b4ed45d..9bcb40284c 100644
--- a/includ
On 09/11/2023 3:49 pm, Anthony PERARD wrote:
> Currently, the test rely on QEMU and Xen finishing the boot in under
> two seconds. That's both very long and very short. Xen usually managed
> to print "All set up" under a second. Unless for some reason we try to
> run the test on a machine that's bu
Hello Anthony,
On Thu, 2023-11-09 at 15:49 +, Anthony PERARD wrote:
> Currently, the test rely on QEMU and Xen finishing the boot in under
> two seconds. That's both very long and very short. Xen usually
> managed
> to print "All set up" under a second. Unless for some reason we try
> to
> run
On Thu, 9 Nov 2023 at 15:30, David Woodhouse wrote:
>
> From: David Woodhouse
>
> Coverity couldn't see that nr_existing was always going to be zero when
> qemu_xen_xs_directory() returned NULL in the ENOENT case (CID 1523906).
>
> Perhaps more to the point, neither could Peter at first glance. I
Currently, the test rely on QEMU and Xen finishing the boot in under
two seconds. That's both very long and very short. Xen usually managed
to print "All set up" under a second. Unless for some reason we try to
run the test on a machine that's busy doing something else.
Rework the test to exit as
On 09/11/2023 15:30, David Woodhouse wrote:
From: David Woodhouse
Coverity couldn't see that nr_existing was always going to be zero when
qemu_xen_xs_directory() returned NULL in the ENOENT case (CID 1523906).
Perhaps more to the point, neither could Peter at first glance. Improve
the code to
On Thu, Nov 09, 2023 at 10:36:21AM +, Andrew Cooper wrote:
> On 09/11/2023 9:50 am, Alejandro Vallejo wrote:
> > Hi,
> >
> > On Tue, Nov 07, 2023 at 08:15:32PM +, Andrew Cooper wrote:
> >> On 07/11/2023 7:53 pm, Elliott Mitchell wrote:
> >>> I ran into the nestedhvm via the following path.
> On 9 Nov 2023, at 11:14, Michal Orzel wrote:
>
> Hi Luca,
>
> On 09/11/2023 10:06, Luca Fancellu wrote:
>>
>>
>> Move static memory and static shared memory code in separate modules
>> so that they are included only when the corresponding feature is
>> enabled, doing that we modularise th
From: David Woodhouse
Coverity couldn't see that nr_existing was always going to be zero when
qemu_xen_xs_directory() returned NULL in the ENOENT case (CID 1523906).
Perhaps more to the point, neither could Peter at first glance. Improve
the code to hopefully make it clearer to Coverity and huma
Hi Michal,
> On 9 Nov 2023, at 11:11, Michal Orzel wrote:
>
> Hi Luca,
>
> On 09/11/2023 10:06, Luca Fancellu wrote:
>>
>>
>> Currently the dom0less feature code is mostly inside domain_build.c
>> and setup.c, it is a feature that may not be useful to everyone so
>> put the code in a differen
On Thu, 2023-11-09 at 14:33 +, Peter Maydell wrote:
> On Tue, 7 Nov 2023 at 09:24, David Woodhouse wrote:
> >
> > From: David Woodhouse
> >
> > There's no need to force the user to assign a vdev. We can automatically
> > assign one, starting at xvda and searching until we find the first dis
Hi all,
We start in 10 minutes!
Please see updated Zoom link:
https://cl-cam-ac-uk.zoom.us/j/97216272378?pwd=M2diTFhMTnppckJtNWhFVTBKK0REZz09
The session will also be recorded by the University of Cambridge.
Many thanks,
Kelly Choi
Open Source Community Manager
XenServer, Cloud Software Group
flight 183720 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183720/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 616f0d503707c2e3fbdbc397ccb16a822f584b03
baseline version:
ovmf bb18fb80abb9d35d01be5
On Tue, 7 Nov 2023 at 09:24, David Woodhouse wrote:
>
> From: David Woodhouse
>
> There's no need to force the user to assign a vdev. We can automatically
> assign one, starting at xvda and searching until we find the first disk
> name that's unused.
>
> This means we can now allow '-drive if=xen
flight 183718 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183718/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit1 18 guest-start/debian.repeat fail in 183712 pass
in 183718
test-amd64-amd64-xl-qem
Hi,
On 07/11/2023 20:10, Stewart Hildebrand wrote:
+ ret = map_mmio_regions(its->d, gaddr_to_gfn(its->doorbell_address),
+ PFN_UP(ITS_DOORBELL_OFFSET),
+ maddr_to_mfn(its->doorbell_address));
A couple of remarks. Firstly, we know
Hi,
On 08/11/2023 17:12, Nicola Vetrini wrote:
On 2023-11-08 17:25, Julien Grall wrote:
Hi Stefano,
On 07/11/2023 20:41, Stefano Stabellini wrote:
+Julien, Andrew
Julien and Andrew raised concerns on this patch on the Xen Matrix
channel. Please provide further details.
Thanks! It looks lik
On 08.11.2023 15:37, Andrew Cooper wrote:
> These 3 Kconfig docs were imported from Linux erroneously. They are
> GPL-2.0-only in Linux, but have no SPDX tag and were placed in such a way to
> be included by the blanket statement saying that all RST files are CC-BY-4.0.
>
> We should not be carry
On 08.11.2023 15:18, Andrew Cooper wrote:
> Two files are missing SDPX tags, but are covered by the blanketing license
> statement in docs/README.sources saying that RST files are CC-BY-4.0
>
> Fixes: 3c911be55f1c ("docs/misra: document the C dialect and translation
> toolchain assumptions.")
> F
On 08.11.2023 16:42, Federico Serafini wrote:
> --- a/xen/arch/arm/traps.c
> +++ b/xen/arch/arm/traps.c
> @@ -1236,7 +1236,8 @@ int do_bug_frame(const struct cpu_user_regs *regs,
> vaddr_t pc)
>
> if ( id == BUGFRAME_run_fn )
> {
> -void (*fn)(const struct cpu_user_regs *) = (v
Hi Luca,
On 09/11/2023 10:06, Luca Fancellu wrote:
>
>
> Move static memory and static shared memory code in separate modules
> so that they are included only when the corresponding feature is
> enabled, doing that we modularise the features and we remove some
> ifdefs from the code to improve r
Hi Luca,
On 09/11/2023 10:06, Luca Fancellu wrote:
>
>
> Currently the dom0less feature code is mostly inside domain_build.c
> and setup.c, it is a feature that may not be useful to everyone so
> put the code in a different compilation module in order to make it
> easier to disable the feature i
On 09/11/2023 9:50 am, Alejandro Vallejo wrote:
> Hi,
>
> On Tue, Nov 07, 2023 at 08:15:32PM +, Andrew Cooper wrote:
>> On 07/11/2023 7:53 pm, Elliott Mitchell wrote:
>>> I ran into the nestedhvm via the following path. I was considering the
>>> feasibility of shedding tasks from a desktop ont
Hey everyone,
Just a reminder that we will be presenting a talk at the University of
Cambridge today, followed by a Q&A!
If you can't make it in person, you can join via Zoom here:
Topic: Xen Project talk - University of Cambridge Time: Nov 9, 2023 03:00
PM Universal Time UTC Join Zoom Meeting h
Hi,
On Tue, Nov 07, 2023 at 08:15:32PM +, Andrew Cooper wrote:
> On 07/11/2023 7:53 pm, Elliott Mitchell wrote:
> > I ran into the nestedhvm via the following path. I was considering the
> > feasibility of shedding tasks from a desktop onto a server running Xen.
> > I was looking at `man xl.c
Hi Jan,
On 09/11/2023 07:42, Jan Beulich wrote:
On 08.11.2023 14:33, Julien Grall wrote:
Hi Jan,
On 08/11/2023 11:19, Jan Beulich wrote:
On 08.11.2023 12:03, Nicola Vetrini wrote:
On 2023-11-08 09:24, Jan Beulich wrote:
On 03.11.2023 18:58, Nicola Vetrini wrote:
Static analysis tools may d
Currently the dom0less feature code is mostly inside domain_build.c
and setup.c, it is a feature that may not be useful to everyone so
put the code in a different compilation module in order to make it
easier to disable the feature in the future.
Move gic_interrupt_t in domain_build.h to use it wi
Move static memory and static shared memory code in separate modules
so that they are included only when the corresponding feature is
enabled, doing that we modularise the features and we remove some
ifdefs from the code to improve readability.
Move process_shm_node function from bootfdt module an
The 'enum domain_type' is defined by 'asm/domain.h' which is not
included (directly or indirectly) by 'asm/kernel.h'.
This currently doesn't break the compilation because asm/domain.h will
included by the user of 'kernel.h'. But it would be better to avoid
relying on it. So add the include in 'asm
Introduce a Kconfig for the dom0less feature, enabled by default,
to be able to choose if the feature should be compiled or not.
Provide static inline stubs when the option is disabled for the
functions externally visible.
Use the new Kconfig to remove dom0less DT binding from the efi-boot.h
code
Introduce Kconfig GICV2 to be able to compile the GICv2 driver only
when needed, the option is active by default.
Introduce Kconfig VGICV2 that compiles the Generic Interrupt
Controller v2 emulation for domains, it is required only when using
GICv2 driver, otherwise using the GICv3 driver it is op
This serie aims to add more modularity to some feature that can be excluded
without issues from the build.
The first patch is already reviewed.
v2 update: So I've tried to see how to put the dom0less code in the common code,
but the amount of modifications are not trivial, even putting only the c
On Mon, 2023-11-06 at 23:36 +, Julien Grall wrote:
> Hi Oleksii,
>
> On 01/11/2023 10:15, Oleksii Kurochko wrote:
> > Platforms which doesn't have HAS_PCI enabled it is needed to
> > have , which contains only an empty definition of
> > struct arch_pci_dev ( except ARM, it introduces several
>
flight 183717 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183717/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 183713
test-amd64-amd64-xl-qemuu-win7-amd64
71 matches
Mail list logo