I'd appreciate if you'd Cc: the maintainers of the touched files...
Reviewed-by: Juergen Gross <jgr...@suse.com>
Juergen
umentation/devicetree/bindings/jailhouse.txt | 8
> arch/x86/include/asm/jailhouse_para.h | 2 +-
> include/linux/hypervisor.h | 17 +++--
I'd appreciate if you'd Cc: the maintainers of the touched files...
Reviewed-by: Juergen Gross
Juergen
On 28/02/18 22:35, Paolo Bonzini wrote:
> On 28/02/2018 22:08, Konrad Rzeszutek Wilk wrote:
>> +obj-$(CONFIG_XEN_PVH) += pvh.o
>> +obj-$(CONFIG_XEN_PVH) += pvh-head.o
>> +
>
> Probably a better place for these would be
> arch/x86/platform/pvh/{enlighten.c,head.S}. (Just because there are no
> .c
On 28/02/18 22:35, Paolo Bonzini wrote:
> On 28/02/2018 22:08, Konrad Rzeszutek Wilk wrote:
>> +obj-$(CONFIG_XEN_PVH) += pvh.o
>> +obj-$(CONFIG_XEN_PVH) += pvh-head.o
>> +
>
> Probably a better place for these would be
> arch/x86/platform/pvh/{enlighten.c,head.S}. (Just because there are no
> .c
On 28/02/18 22:07, Konrad Rzeszutek Wilk wrote:
> On Wed, Feb 28, 2018 at 10:27:57AM -0800, Maran Wilson wrote:
>> In order to pave the way for hypervisors other then Xen to use the PVH
>> entry point for VMs, we need to factor the PVH entry code into Xen specific
>> and hypervisor agnostic
On 28/02/18 22:07, Konrad Rzeszutek Wilk wrote:
> On Wed, Feb 28, 2018 at 10:27:57AM -0800, Maran Wilson wrote:
>> In order to pave the way for hypervisors other then Xen to use the PVH
>> entry point for VMs, we need to factor the PVH entry code into Xen specific
>> and hypervisor agnostic
On 28/02/18 10:19, Roger Pau Monne wrote:
> Current cleanup in the error path of xen_bind_pirq_msi_to_irq is
> wrong. First of all there's an off-by-one in the cleanup loop, which
> can lead to unbinding wrong IRQs.
>
> Secondly IRQs not bound won't be freed, thus leaking IRQ numbers.
>
> Note
On 28/02/18 10:19, Roger Pau Monne wrote:
> Current cleanup in the error path of xen_bind_pirq_msi_to_irq is
> wrong. First of all there's an off-by-one in the cleanup loop, which
> can lead to unbinding wrong IRQs.
>
> Secondly IRQs not bound won't be freed, thus leaking IRQ numbers.
>
> Note
On 28/02/18 13:23, Jason Andryuk wrote:
> A toolstack may delete the vif frontend and backend xenstore entries
> while xen-netfront is in the removal code path. In that case, the
> checks for xenbus_read_driver_state would return XenbusStateUnknown, and
> xennet_remove would hang indefinitely.
On 28/02/18 13:23, Jason Andryuk wrote:
> A toolstack may delete the vif frontend and backend xenstore entries
> while xen-netfront is in the removal code path. In that case, the
> checks for xenbus_read_driver_state would return XenbusStateUnknown, and
> xennet_remove would hang indefinitely.
Commit-ID: 71c208dd54ab971036d83ff6d9837bae4976e623
Gitweb: https://git.kernel.org/tip/71c208dd54ab971036d83ff6d9837bae4976e623
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Mon, 26 Feb 2018 15:08:18 +0100
Committer: Thomas Gleixner <t...@linutronix.de>
CommitDate: Wed,
Commit-ID: 71c208dd54ab971036d83ff6d9837bae4976e623
Gitweb: https://git.kernel.org/tip/71c208dd54ab971036d83ff6d9837bae4976e623
Author: Juergen Gross
AuthorDate: Mon, 26 Feb 2018 15:08:18 +0100
Committer: Thomas Gleixner
CommitDate: Wed, 28 Feb 2018 16:03:19 +0100
x86/xen: Zero
dd support for MSI message
>>>>> groups")
>>>>> Reported-by: Hooman Mirhadi <mirha...@amazon.com>
>>>>> CC: <sta...@vger.kernel.org>
>>>>> CC: Roger Pau Monné <roger@citrix.com>
>>>>> CC: Boris Ostrovsky
d support for MSI message
>>>>> groups")
>>>>> Reported-by: Hooman Mirhadi
>>>>> CC:
>>>>> CC: Roger Pau Monné
>>>>> CC: Boris Ostrovsky
>>>>> CC: Eduardo Valentin
>>>>> CC: Juergen Gross
Today the tty0 and hvc0 consoles are added as a preferred consoles for
pv domUs only. As this requires a boot parameter for getting dom0
messages per default, add them for dom0, too.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/xen/enlighten_pv.c | 6 --
1 file chan
Today the tty0 and hvc0 consoles are added as a preferred consoles for
pv domUs only. As this requires a boot parameter for getting dom0
messages per default, add them for dom0, too.
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten_pv.c | 6 --
1 file changed, 4 insertions(+), 2
On 26/02/18 20:02, Boris Ostrovsky wrote:
> On 02/26/2018 06:08 AM, Juergen Gross wrote:
>> Today the hvc console is added as a preferred console for pv domUs
>> only. As this requires a boot parameter for getting dom0 messages per
>> default add it for dom0, too.
>>
On 26/02/18 20:02, Boris Ostrovsky wrote:
> On 02/26/2018 06:08 AM, Juergen Gross wrote:
>> Today the hvc console is added as a preferred console for pv domUs
>> only. As this requires a boot parameter for getting dom0 messages per
>> default add it for dom0, too.
>>
On 26/02/18 17:01, Pavel Tatashin wrote:
> Juergen Gross noticed that commit
> f7f99100d8d ("mm: stop zeroing memory during allocation in vmemmap")
> broke XEN PV domains when deferred struct page initialization is enabled.
>
> This is because the xen's PagePinned() fl
On 26/02/18 17:01, Pavel Tatashin wrote:
> Juergen Gross noticed that commit
> f7f99100d8d ("mm: stop zeroing memory during allocation in vmemmap")
> broke XEN PV domains when deferred struct page initialization is enabled.
>
> This is because the xen's PagePinned() fl
Older Xen versions (4.5 and before) might have problems migrating pv
guests with MSR_IA32_SPEC_CTRL having a non-zero value. So before
suspending zero that MSR and restore it after being resumed.
Cc: sta...@vger.kernel.org
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/xen/sus
Older Xen versions (4.5 and before) might have problems migrating pv
guests with MSR_IA32_SPEC_CTRL having a non-zero value. So before
suspending zero that MSR and restore it after being resumed.
Cc: sta...@vger.kernel.org
Signed-off-by: Juergen Gross
---
arch/x86/xen/suspend.c | 16
On 26/02/18 13:06, Andrii Anisov wrote:
> Hello Juergen,
>
>
> On 26.02.18 13:08, Juergen Gross wrote:
>> Today the hvc console is added as a preferred console for pv domUs
>> only. As this requires a boot parameter for getting dom0 messages per
>> default add it f
On 26/02/18 13:06, Andrii Anisov wrote:
> Hello Juergen,
>
>
> On 26.02.18 13:08, Juergen Gross wrote:
>> Today the hvc console is added as a preferred console for pv domUs
>> only. As this requires a boot parameter for getting dom0 messages per
>> default add it f
Today the hvc console is added as a preferred console for pv domUs
only. As this requires a boot parameter for getting dom0 messages per
default add it for dom0, too.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/xen/enlighten_pv.c | 4 +++-
1 file changed, 3 insertions
Today the hvc console is added as a preferred console for pv domUs
only. As this requires a boot parameter for getting dom0 messages per
default add it for dom0, too.
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten_pv.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff
Commit-ID: b17d9d1df3c33a4f1d2bf397e2257aecf9dc56d4
Gitweb: https://git.kernel.org/tip/b17d9d1df3c33a4f1d2bf397e2257aecf9dc56d4
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Mon, 19 Feb 2018 11:09:06 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Mon, 26 Fe
Commit-ID: b17d9d1df3c33a4f1d2bf397e2257aecf9dc56d4
Gitweb: https://git.kernel.org/tip/b17d9d1df3c33a4f1d2bf397e2257aecf9dc56d4
Author: Juergen Gross
AuthorDate: Mon, 19 Feb 2018 11:09:06 +0100
Committer: Ingo Molnar
CommitDate: Mon, 26 Feb 2018 08:43:20 +0100
x86/xen: Add pvh
Commit-ID: c46dacb75cd59a50a2380dcba5e7edf4fde86845
Gitweb: https://git.kernel.org/tip/c46dacb75cd59a50a2380dcba5e7edf4fde86845
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Wed, 21 Feb 2018 10:42:32 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Mon, 26 Fe
Commit-ID: c46dacb75cd59a50a2380dcba5e7edf4fde86845
Gitweb: https://git.kernel.org/tip/c46dacb75cd59a50a2380dcba5e7edf4fde86845
Author: Juergen Gross
AuthorDate: Wed, 21 Feb 2018 10:42:32 +0100
Committer: Ingo Molnar
CommitDate: Mon, 26 Feb 2018 08:43:21 +0100
x86/boot: Make
Commit-ID: 038bac2b02989acf1fc938cedcb7944c02672b9f
Gitweb: https://git.kernel.org/tip/038bac2b02989acf1fc938cedcb7944c02672b9f
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Mon, 19 Feb 2018 11:09:05 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Mon, 26 Fe
Commit-ID: 038bac2b02989acf1fc938cedcb7944c02672b9f
Gitweb: https://git.kernel.org/tip/038bac2b02989acf1fc938cedcb7944c02672b9f
Author: Juergen Gross
AuthorDate: Mon, 19 Feb 2018 11:09:05 +0100
Committer: Ingo Molnar
CommitDate: Mon, 26 Feb 2018 08:43:20 +0100
x86/acpi: Add a new
Commit-ID: dfc9327ab7c99bc13e12106448615efba833886b
Gitweb: https://git.kernel.org/tip/dfc9327ab7c99bc13e12106448615efba833886b
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Mon, 19 Feb 2018 11:09:04 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Mon, 26 Fe
Commit-ID: dfc9327ab7c99bc13e12106448615efba833886b
Gitweb: https://git.kernel.org/tip/dfc9327ab7c99bc13e12106448615efba833886b
Author: Juergen Gross
AuthorDate: Mon, 19 Feb 2018 11:09:04 +0100
Committer: Ingo Molnar
CommitDate: Mon, 26 Feb 2018 08:43:20 +0100
acpi: Introduce
On 24/02/18 00:25, Pavel Tatashin wrote:
> Juergen Gross noticed that commit
> f7f99100d8d ("mm: stop zeroing memory during allocation in vmemmap")
> broke XEN PV domains when deferred struct page initialization is enabled.
>
> This is because the xen's PagePinned() fl
On 24/02/18 00:25, Pavel Tatashin wrote:
> Juergen Gross noticed that commit
> f7f99100d8d ("mm: stop zeroing memory during allocation in vmemmap")
> broke XEN PV domains when deferred struct page initialization is enabled.
>
> This is because the xen's PagePinned() fl
ase on sock instead. Fix
> this.
>
> Fixes: 5db4d286a8ef ("xen/pvcalls: implement connect command")
> Signed-off-by: Colin Ian King <colin.k...@canonical.com>
Hmm, yes, kind of obvious. :-)
Reviewed-by: Juergen Gross <jgr...@suse.com>
Juergen
; Fixes: 5db4d286a8ef ("xen/pvcalls: implement connect command")
> Signed-off-by: Colin Ian King
Hmm, yes, kind of obvious. :-)
Reviewed-by: Juergen Gross
Juergen
Commit-ID: a504ab7384eea0361e9292681f4a7b9d5010ccf2
Gitweb: https://git.kernel.org/tip/a504ab7384eea0361e9292681f4a7b9d5010ccf2
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Wed, 21 Feb 2018 10:42:32 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Wed, 21 Fe
Commit-ID: a504ab7384eea0361e9292681f4a7b9d5010ccf2
Gitweb: https://git.kernel.org/tip/a504ab7384eea0361e9292681f4a7b9d5010ccf2
Author: Juergen Gross
AuthorDate: Wed, 21 Feb 2018 10:42:32 +0100
Committer: Ingo Molnar
CommitDate: Wed, 21 Feb 2018 11:22:37 +0100
x86/boot: Make
Make the noop functions in x86_init.c static in case they are used
locally only.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/kernel/x86_init.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kernel/x86_init.c b/arch/x86/kernel/x86_
Make the noop functions in x86_init.c static in case they are used
locally only.
Signed-off-by: Juergen Gross
---
arch/x86/kernel/x86_init.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kernel/x86_init.c b/arch/x86/kernel/x86_init.c
index 9e4e994a4836
On 21/02/18 09:51, Ingo Molnar wrote:
>
> * kbuild test robot wrote:
>
>>
>> Fixes: 62d8b7fba8d3 ("x86/acpi: Add a new x86_init_acpi structure to
>> x86_init_ops")
>> Signed-off-by: Fengguang Wu
>> ---
>> 0 files changed
>
> -ENOPATCH?
I'll
On 21/02/18 09:51, Ingo Molnar wrote:
>
> * kbuild test robot wrote:
>
>>
>> Fixes: 62d8b7fba8d3 ("x86/acpi: Add a new x86_init_acpi structure to
>> x86_init_ops")
>> Signed-off-by: Fengguang Wu
>> ---
>> 0 files changed
>
> -ENOPATCH?
I'll send a patch to add "static" to the noop
On 21/02/18 09:47, Oleksandr Andrushchenko wrote:
> On 02/21/2018 10:19 AM, Juergen Gross wrote:
>> On 21/02/18 09:03, Oleksandr Andrushchenko wrote:
>>> From: Oleksandr Andrushchenko <oleksandr_andrushche...@epam.com>
>>>
>>> Introduce skeleton of the
On 21/02/18 09:47, Oleksandr Andrushchenko wrote:
> On 02/21/2018 10:19 AM, Juergen Gross wrote:
>> On 21/02/18 09:03, Oleksandr Andrushchenko wrote:
>>> From: Oleksandr Andrushchenko
>>>
>>> Introduce skeleton of the para-virtualized Xen display
>>> f
On 21/02/18 09:03, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Initial handling for Xen bus states: implement
> Xen bus state machine for the frontend driver according to
> the state diagram and recovery flow from display para-virtualized
On 21/02/18 09:03, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Initial handling for Xen bus states: implement
> Xen bus state machine for the frontend driver according to
> the state diagram and recovery flow from display para-virtualized
> protocol:
On 21/02/18 09:03, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Introduce skeleton of the para-virtualized Xen display
> frontend driver. This patch only adds required
> essential stubs.
>
> Signed-off-by: Oleksandr Andrushchenko
On 21/02/18 09:03, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> Introduce skeleton of the para-virtualized Xen display
> frontend driver. This patch only adds required
> essential stubs.
>
> Signed-off-by: Oleksandr Andrushchenko
> ---
> drivers/gpu/drm/Kconfig
Commit-ID: 795e2963a1afef44ed9ec7e6d16c8052fcd8d886
Gitweb: https://git.kernel.org/tip/795e2963a1afef44ed9ec7e6d16c8052fcd8d886
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Mon, 19 Feb 2018 11:09:04 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Tue, 20 Fe
Commit-ID: 795e2963a1afef44ed9ec7e6d16c8052fcd8d886
Gitweb: https://git.kernel.org/tip/795e2963a1afef44ed9ec7e6d16c8052fcd8d886
Author: Juergen Gross
AuthorDate: Mon, 19 Feb 2018 11:09:04 +0100
Committer: Ingo Molnar
CommitDate: Tue, 20 Feb 2018 09:00:55 +0100
acpi: Introduce
Commit-ID: 62d8b7fba8d3ba9c046b7a1a95946c6aaf7c5da9
Gitweb: https://git.kernel.org/tip/62d8b7fba8d3ba9c046b7a1a95946c6aaf7c5da9
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Mon, 19 Feb 2018 11:09:05 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Tue, 20 Fe
Commit-ID: 62d8b7fba8d3ba9c046b7a1a95946c6aaf7c5da9
Gitweb: https://git.kernel.org/tip/62d8b7fba8d3ba9c046b7a1a95946c6aaf7c5da9
Author: Juergen Gross
AuthorDate: Mon, 19 Feb 2018 11:09:05 +0100
Committer: Ingo Molnar
CommitDate: Tue, 20 Feb 2018 09:00:56 +0100
x86/acpi: Add a new
Commit-ID: e9cb8fc2e5ca5996417f900ed5149bd9150f6abd
Gitweb: https://git.kernel.org/tip/e9cb8fc2e5ca5996417f900ed5149bd9150f6abd
Author: Juergen Gross <jgr...@suse.com>
AuthorDate: Mon, 19 Feb 2018 11:09:06 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Tue, 20 Fe
Commit-ID: e9cb8fc2e5ca5996417f900ed5149bd9150f6abd
Gitweb: https://git.kernel.org/tip/e9cb8fc2e5ca5996417f900ed5149bd9150f6abd
Author: Juergen Gross
AuthorDate: Mon, 19 Feb 2018 11:09:06 +0100
Committer: Ingo Molnar
CommitDate: Tue, 20 Feb 2018 09:00:56 +0100
x86/xen: Add pvh
e of pmd_set_flags() in 2cc42bac1c ("x86-64/Xen:
> eliminate W+X mappings"), and due to the (very odd afaic) identity
> map handling the issue is invisible on most systems/setups.
Aah, okay. This helps.
Reviewed-by: Juergen Gross <jgr...@suse.com>
Juergen
/Xen:
> eliminate W+X mappings"), and due to the (very odd afaic) identity
> map handling the issue is invisible on most systems/setups.
Aah, okay. This helps.
Reviewed-by: Juergen Gross
Juergen
On 19/02/18 15:48, Jan Beulich wrote:
> Just like pte_{set,clear}_flags() their PMD and PUD counterparts should
> not do any address translation. This was outright wrong under Xen
> (causing a dead boot with no useful output on "suitable" systems), and
> produced needlessly more complicated code
On 19/02/18 15:48, Jan Beulich wrote:
> Just like pte_{set,clear}_flags() their PMD and PUD counterparts should
> not do any address translation. This was outright wrong under Xen
> (causing a dead boot with no useful output on "suitable" systems), and
> produced needlessly more complicated code
Add an architecture specific function to get the address of the RSDP
table. Per default it will just return 0 indicating falling back to
the current mechanism.
Cc: <sta...@vger.kernel.org> # 4.11
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
drivers/acpi/osl.c | 5 -
i
Add an architecture specific function to get the address of the RSDP
table. Per default it will just return 0 indicating falling back to
the current mechanism.
Cc: # 4.11
Signed-off-by: Juergen Gross
---
drivers/acpi/osl.c | 5 -
include/linux/acpi.h | 7 +++
2 files changed, 11
to x86_init
for obtaining the RSDP address
Juergen Gross (3):
acpi: introduce acpi_arch_get_root_pointer() for getting rsdp address
x86/acpi: add a new x86_init_acpi structure to x86_init_ops
x86/xen: add pvh specific rsdp address retrieval function
arch/x86/include/asm/acpi.h | 7
to x86_init
for obtaining the RSDP address
Juergen Gross (3):
acpi: introduce acpi_arch_get_root_pointer() for getting rsdp address
x86/acpi: add a new x86_init_acpi structure to x86_init_ops
x86/xen: add pvh specific rsdp address retrieval function
arch/x86/include/asm/acpi.h | 7
to locate the RSDP was working when
running as PVH mode.
Cc: <sta...@vger.kernel.org> # 4.11
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/xen/enlighten_pvh.c | 14 +++---
1 file changed, 11 insertions(+), 3 deletions(-)
diff --git a/arch/x86/xen/enlighten_pvh.
to locate the RSDP was working when
running as PVH mode.
Cc: # 4.11
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten_pvh.c | 14 +++---
1 file changed, 11 insertions(+), 3 deletions(-)
diff --git a/arch/x86/xen/enlighten_pvh.c b/arch/x86/xen/enlighten_pvh.c
index 436c4f003e17
Add a new struct x86_init_acpi to x86_init_ops. For now it contains
only one init function to get the RSDP table address.
Cc: <sta...@vger.kernel.org> # 4.11
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/include/asm/acpi.h | 7 +++
arch/x86/include/asm/x8
Add a new struct x86_init_acpi to x86_init_ops. For now it contains
only one init function to get the RSDP table address.
Cc: # 4.11
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/acpi.h | 7 +++
arch/x86/include/asm/x86_init.h | 9 +
arch/x86/kernel/x86_init.c | 5
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.16a-rc2-tag
xen: fixes for 4.16-rc2
It contains fixes for the Xen pvcalls frontend driver, a fix for
booting Xen pv domains and a fix for the xenbus driver user interface.
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.16a-rc2-tag
xen: fixes for 4.16-rc2
It contains fixes for the Xen pvcalls frontend driver, a fix for
booting Xen pv domains and a fix for the xenbus driver user interface.
1c03cd8
[0.004000] CR2: 8801ead19008
[0.004000] ---[ end trace 38eca2e56f1b642e ]---
Avoid this problem by not deferring struct page initialization when
running as Xen pv guest.
Cc: <sta...@vger.kernel.org> #4.15
Fixes: f7f99100d8d95d ("mm: stop zeroing memory during allocation in vmemma
1c03cd8
[0.004000] CR2: 8801ead19008
[0.004000] ---[ end trace 38eca2e56f1b642e ]---
Avoid this problem by not deferring struct page initialization when
running as Xen pv guest.
Cc: #4.15
Fixes: f7f99100d8d95d ("mm: stop zeroing memory during allocation in vmemmap")
Signed-off-by: Juergen Gr
1c03cd8
[0.004000] CR2: 8801ead19008
[0.004000] ---[ end trace 38eca2e56f1b642e ]---
Avoid this problem by not deferring struct page initialization when
running as Xen pv guest.
Cc: <sta...@vger.kernel.org> #4.15
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
mm/page_alloc.c | 3 +++
1c03cd8
[0.004000] CR2: 8801ead19008
[0.004000] ---[ end trace 38eca2e56f1b642e ]---
Avoid this problem by not deferring struct page initialization when
running as Xen pv guest.
Cc: #4.15
Signed-off-by: Juergen Gross
---
mm/page_alloc.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/mm/page
On 16/02/18 14:59, Michal Hocko wrote:
> [CC Pavel]
>
> On Fri 16-02-18 14:37:26, Juergen Gross wrote:
>> Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing
>> memory during allocation in vmemmap") broke Xen pv domains in some
>> config
On 16/02/18 14:59, Michal Hocko wrote:
> [CC Pavel]
>
> On Fri 16-02-18 14:37:26, Juergen Gross wrote:
>> Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing
>> memory during allocation in vmemmap") broke Xen pv domains in some
>> config
initialization when
running as Xen pv guest.
Cc: <sta...@vger.kernel.org> #4.15
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
mm/page_alloc.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/mm/page_alloc.c b/mm/page_alloc.c
index 81e18ceef579..681d504b9a40 10064
initialization when
running as Xen pv guest.
Cc: #4.15
Signed-off-by: Juergen Gross
---
mm/page_alloc.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/mm/page_alloc.c b/mm/page_alloc.c
index 81e18ceef579..681d504b9a40 100644
--- a/mm/page_alloc.c
+++ b/mm/page_alloc.c
@@ -347,6 +347,9 @
On 14/02/18 19:26, Stefano Stabellini wrote:
> Hi all,
>
> this small series introduces a per socket refcount to increase the
> efficiency on socket release operations, and makes releasing passive
> sockets safe.
>
> Cheers,
>
> Stefano
>
>
> Changes in v3:
> - remove pointless initializers
>
On 14/02/18 19:26, Stefano Stabellini wrote:
> Hi all,
>
> this small series introduces a per socket refcount to increase the
> efficiency on socket release operations, and makes releasing passive
> sockets safe.
>
> Cheers,
>
> Stefano
>
>
> Changes in v3:
> - remove pointless initializers
>
d of waiting for the global refcount to be 1.
>
> Signed-off-by: Stefano Stabellini <stef...@aporeto.com>
Acked-by: Juergen Gross <jgr...@suse.com>
Juergen
d of waiting for the global refcount to be 1.
>
> Signed-off-by: Stefano Stabellini
Acked-by: Juergen Gross
Juergen
On 14/02/18 17:40, Josh Poimboeuf wrote:
> The jump_label code doesn't patch init code, so this tracepoint can
> never be enabled. Remove it.
>
> Cc: Juergen Gross <jgr...@suse.com>
> Signed-off-by: Josh Poimboeuf <jpoim...@redhat.com>
Reviewed-by: Juergen Gross <jgr...@suse.com>
Juergen
On 14/02/18 17:40, Josh Poimboeuf wrote:
> The jump_label code doesn't patch init code, so this tracepoint can
> never be enabled. Remove it.
>
> Cc: Juergen Gross
> Signed-off-by: Josh Poimboeuf
Reviewed-by: Juergen Gross
Juergen
On 13/02/18 03:13, Stefano Stabellini wrote:
> Introduce a per sock_mapping refcount, in addition to the existing
> global refcount. Thanks to the sock_mapping refcount, we can safely wait
> for it to be 1 in pvcalls_front_release before freeing an active socket,
> instead of waiting for the
On 13/02/18 03:13, Stefano Stabellini wrote:
> Introduce a per sock_mapping refcount, in addition to the existing
> global refcount. Thanks to the sock_mapping refcount, we can safely wait
> for it to be 1 in pvcalls_front_release before freeing an active socket,
> instead of waiting for the
On 09/02/18 10:25, Joerg Roedel wrote:
> From: Joerg Roedel
>
> Generic page-table code populates all non-leaf entries with
> _KERNPG_TABLE bits set. This is fine for all paging modes
> except PAE.
>
> In PAE mode only a subset of the bits is allowed to be set.
> Make sure we
On 09/02/18 10:25, Joerg Roedel wrote:
> From: Joerg Roedel
>
> Generic page-table code populates all non-leaf entries with
> _KERNPG_TABLE bits set. This is fine for all paging modes
> except PAE.
>
> In PAE mode only a subset of the bits is allowed to be set.
> Make sure we only set allowed
On 13/02/18 17:32, Ingo Molnar wrote:
>
> * Juergen Gross <jgr...@suse.com> wrote:
>
>> So what about the following:
>>
>> From version 0x020e on (current version without my patches is 0x020d)
>> the boot loader will write its supported version or'ed wit
On 13/02/18 17:32, Ingo Molnar wrote:
>
> * Juergen Gross wrote:
>
>> So what about the following:
>>
>> From version 0x020e on (current version without my patches is 0x020d)
>> the boot loader will write its supported version or'ed with 0x8000 into
>> th
On 02/02/18 18:42, Joao Martins wrote:
> Commit fd8aa9095a95 ("xen: optimize xenbus driver for multiple concurrent
> xenstore accesses") optimized xenbus concurrent accesses but in doing so
> broke UABI of /dev/xen/xenbus. Through /dev/xen/xenbus applications are in
> charge of xenbus message
On 02/02/18 18:42, Joao Martins wrote:
> Commit fd8aa9095a95 ("xen: optimize xenbus driver for multiple concurrent
> xenstore accesses") optimized xenbus concurrent accesses but in doing so
> broke UABI of /dev/xen/xenbus. Through /dev/xen/xenbus applications are in
> charge of xenbus message
m>
> Cc: x...@kernel.org
> Cc: Boris Ostrovsky <boris.ostrov...@oracle.com>
> Cc: Juergen Gross <jgr...@suse.com>
> Cc: Dou Liyang <douly.f...@cn.fujitsu.com>
> Cc: Prarit Bhargava <pra...@redhat.com>
> Cc: Kate Stewart <kstew...@linuxfoundation.org>
&
ot;)
> Signed-off-by: Prarit Bhargava
> Tested-and-reported-by: Simon Gaiser
> Cc: Thomas Gleixner
> Cc: Ingo Molnar
> Cc: "H. Peter Anvin"
> Cc: x...@kernel.org
> Cc: Boris Ostrovsky
> Cc: Juergen Gross
> Cc: Dou Liyang
> Cc: Prarit Bhargava
>
urn and release the sock_mapping refcount.
>
> Signed-off-by: Stefano Stabellini <stef...@aporeto.com>
Acked-by: Juergen Gross <jgr...@suse.com>
Juergen
urn and release the sock_mapping refcount.
>
> Signed-off-by: Stefano Stabellini
Acked-by: Juergen Gross
Juergen
On 05/02/18 23:51, Stefano Stabellini wrote:
> Introduce a per sock_mapping refcount, in addition to the existing
> global refcount. Thanks to the sock_mapping refcount, we can safely wait
> for it to be 1 in pvcalls_front_release before freeing an active socket,
> instead of waiting for the
On 05/02/18 23:51, Stefano Stabellini wrote:
> Introduce a per sock_mapping refcount, in addition to the existing
> global refcount. Thanks to the sock_mapping refcount, we can safely wait
> for it to be 1 in pvcalls_front_release before freeing an active socket,
> instead of waiting for the
On 12/02/18 09:49, Juergen Gross wrote:
> On 07/02/18 23:22, Simon Gaiser wrote:
>> Commit fd8aa9095a95 ("xen: optimize xenbus driver for multiple
>> concurrent xenstore accesses") made a subtle change to the semantic of
>> xenbus_dev_request_and_reply() and xenbus_
On 12/02/18 09:49, Juergen Gross wrote:
> On 07/02/18 23:22, Simon Gaiser wrote:
>> Commit fd8aa9095a95 ("xen: optimize xenbus driver for multiple
>> concurrent xenstore accesses") made a subtle change to the semantic of
>> xenbus_dev_request_and_reply() and xenbus_
801 - 900 of 4228 matches
Mail list logo