On 19/02/15 23:09, Linus Torvalds wrote:
On Thu, Feb 19, 2015 at 5:06 AM, David Vrabel david.vra...@citrix.com wrote:
The NUMA_BALANCING series beginning with 5d833062139d (mm: numa: do not
dereference pmd outside of the lock during NUMA hinting fault) and
specifically 8a0516ed8b90 (mm:
On Wed, 2015-02-18 at 16:34 +, Andrew Cooper wrote:
From: Wen Congyang we...@cn.fujitsu.com
datacopier is to read some data and write it out. If we
have some data to send it over network, we cannot use
datacopier. Update it to support this case.
Please can you clarify this commit
On Fri, 2015-02-20 at 15:56 +0530, Vijay Kilari wrote:
On Fri, Feb 20, 2015 at 3:44 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Thu, 2015-02-19 at 18:01 +, Julien Grall wrote:
Based on the discussion, what about waiting until someone complain about
GICv3 support on Xen 4.5?
On 20/02/15 01:49, Linus Torvalds wrote:
On Thu, Feb 19, 2015 at 5:05 PM, Kirill A. Shutemov
kir...@shutemov.name wrote:
I'm feeling I miss very basic background on how Xen works, but why does it
set _PAGE_GLOBAL on userspace entries? It sounds strange to me.
It is definitely strange. I'm
On 20/02/15 10:27, Ian Campbell wrote:
On Wed, 2015-02-18 at 16:34 +, Andrew Cooper wrote:
From: Wen Congyang we...@cn.fujitsu.com
datacopier is to read some data and write it out. If we
have some data to send it over network, we cannot use
datacopier. Update it to support this case.
The platform APIs are enhanced to provide support for parsing pci device
tree nodes and storing the config-space address which is later used for
pci_read/pci_write config calls.
---
xen/arch/arm/platform.c| 27 +++
xen/include/asm-arm/platform.h | 18
This patch adds support for pci in xen arm. Following features are
added
a) pci device tree node is parsed and platform callback is invoked
For thunderX the callback stores the reg property, which is later
used in generating address based on the s:b:d.f
b) ABI followed is segment no is mapped to
Provide mini-os url and revision in Config.mk
Introduce Makefile.mini-os which contains mini-os specific targets.
Target mini-os-dir clones mini-os tree from upstream.
Make stubdom targets depend on mini-os-dir target. Make
subtree-force-update{,-all} depend on mini-os-dir-force-update.
Also
Otherwise mkdir extras/mini-os fails because extras doesn't exist.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
scripts/git-checkout.sh | 2 +-
1 file changed, 1
This is v2 of my mini-os splitting off patch series.
I use following runes to split off mini-os:
git filter-branch --tag-name-filter cat \
--subdirectory-filter extras/mini-os/ -- --all
# There is already a tag name 4.3.0-rc2 which points to the same commit.
git tag -d xen-4.3.0-rc2
Factor out per-subsystem build/clean/distclean-% targets, so that we can
build subsystems independently in top level directory.
The motive behind this is after splitting out mini-os from Xen tree,
stubdom is in effect a downstream of mini-os. I would like to have the
ability to build it
Cross compiling libxc requires some symlinks to exist.
Note that make -C tools/include requires running tools/configure. But at
least now the error message is much better than just a file not found
error.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian
Hi Ian,
On 20/02/15 10:14, Ian Campbell wrote:
On Thu, 2015-02-19 at 18:01 +, Julien Grall wrote:
Based on the discussion, what about waiting until someone complain about
GICv3 support on Xen 4.5?
That sounds like a reasonable compromise.
My potential backports list now contains:
flight 34707 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34707/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 5 xen-boot fail REGR. vs. 34622
Support added for the thunderX platfrom for reading writing config space
---
xen/arch/arm/platforms/thunderx.c | 124 ++
1 file changed, 124 insertions(+)
diff --git a/xen/arch/arm/platforms/thunderx.c
b/xen/arch/arm/platforms/thunderx.c
index
On Fri, Feb 20, 2015 at 4:19 PM, Jan Beulich jbeul...@suse.com wrote:
On 20.02.15 at 05:47, bsinghar...@gmail.com wrote:
I'm trying to use the memevent channel to extract the permission for a
particular text section. I expect to see rx as the permission, instead
I am seeing rwx. I have not
On 20.02.15 at 12:44, bsinghar...@gmail.com wrote:
On Fri, Feb 20, 2015 at 4:19 PM, Jan Beulich jbeul...@suse.com wrote:
On 20.02.15 at 05:47, bsinghar...@gmail.com wrote:
I'm trying to use the memevent channel to extract the permission for a
particular text section. I expect to see rx as the
On 20/02/15 11:29, Kirill A. Shutemov wrote:
On Fri, Feb 20, 2015 at 10:47:52AM +, Andrew Cooper wrote:
On 20/02/15 01:49, Linus Torvalds wrote:
On Thu, Feb 19, 2015 at 5:05 PM, Kirill A. Shutemov
kir...@shutemov.name wrote:
I'm feeling I miss very basic background on how Xen works, but
Hello manish,
On 20/02/15 11:30, Manish Jaggi wrote:
This patch series adds PCI support for XEN ARM.
- pci config read writes maps to xen-arm pci.c
- platform support includes parsing pci device tree node and callbacks
for reading writing from configuration space
- placeholder code is added
On 20.02.15 at 12:47, mja...@caviumnetworks.com wrote:
@@ -287,6 +289,7 @@ static struct pci_dev *alloc_pdev(struct pci_seg *pseg,
u8 bus, u8 devfn)
if ( pci_find_cap_offset(pseg-nr, bus, PCI_SLOT(devfn),
PCI_FUNC(devfn),
PCI_CAP_ID_MSIX) )
{
On Wed, 2015-02-18 at 16:34 +, Andrew Cooper wrote:
This is the same set used by libxc.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Wei Liu wei.l...@citrix.com
---
On Fri, Feb 20, 2015 at 3:44 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Thu, 2015-02-19 at 18:01 +, Julien Grall wrote:
Based on the discussion, what about waiting until someone complain about
GICv3 support on Xen 4.5?
That sounds like a reasonable compromise.
If Xen 4.5 claims
On Wed, 2015-02-18 at 16:34 +, Andrew Cooper wrote:
From: Ross Lagerwall ross.lagerw...@citrix.com
Implement a read-only mode for libxl__datacopier. The mode is invoked
when readbuf is set and writefd is 0. On success, the callback passes
the number of bytes read.
On Wed, 2015-02-18 at 16:34 +, Andrew Cooper wrote:
From: Ross Lagerwall ross.lagerw...@citrix.com
Previously, adding more than 1000 bytes of data would cause a segfault.
Now, the maximum amount of data that can be added is limited by maxsz.
On Wed, 2015-02-18 at 16:34 +, Andrew Cooper wrote:
From: Ross Lagerwall ross.lagerw...@citrix.com
Add a parameter, maxread, to limit the amount of data read from the
source fd of a datacopier.
http://lists.xen.org/archives/html/xen-devel/2014-09/msg01802.html and
followups.
On 19.02.15 at 18:11, dario.faggi...@citrix.com wrote:
--- a/xen/include/xen/perfc_defn.h
+++ b/xen/include/xen/perfc_defn.h
@@ -53,4 +53,8 @@ PERFCOUNTER(vcpu_hot, csched: vcpu_hot)
PERFCOUNTER(need_flush_tlb_flush, PG_need_flush tlb flushes)
+/* Viridian counters */
2015-02-18 16:34 GMT+00:00 Andrew Cooper andrew.coop...@citrix.com:
This is the same set used by libxc.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Wei Liu wei.l...@citrix.com
---
On 20.02.15 at 05:47, bsinghar...@gmail.com wrote:
I'm trying to use the memevent channel to extract the permission for a
particular text section. I expect to see rx as the permission, instead
I am seeing rwx. I have not spent a whole lot of time looking at
memaccess[] and p2m-ept.c, but I am
On 20/02/15 10:42, Frediano Ziglio wrote:
2015-02-18 16:34 GMT+00:00 Andrew Cooper andrew.coop...@citrix.com:
diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
index 934465a..a2b6fb7 100644
--- a/tools/libxl/libxl_internal.h
+++ b/tools/libxl/libxl_internal.h
@@ -108,6
On Fri, 2015-02-20 at 11:10 +, Andrew Cooper wrote:
On 20/02/15 10:27, Ian Campbell wrote:
On Wed, 2015-02-18 at 16:34 +, Andrew Cooper wrote:
From: Wen Congyang we...@cn.fujitsu.com
datacopier is to read some data and write it out. If we
have some data to send it over network,
In order to keep the tree bisectable all the changes are done in one
single commit.
Things done in this commit:
1. Import necessary .mk files from Xen.
2. Move all XEN_ related variables to MINIOS_ namespace.
3. Import Xen public header files.
4. Import BSD's list.h and helper script.
Mini-OS's
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
[ output trimmed ]
___
Xen-devel mailing list
Xen-devel@lists.xen.org
Don't look for mini-os source file during configure. Mini-os source code
will be fetched during build.
Instead look for xenstore-minios.cfg.
Please rerun autogen.sh after applying this patch.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson
At 15:12 + on 19 Feb (1424355171), Jan Beulich wrote:
On 19.02.15 at 15:47, malcolm.cross...@citrix.com wrote:
Tim suggested posting this patch to see what general opinion was to this
style of backport fix. I attempted to backport the EPT misconfig to Xen
4.4 but I ended up with quite
This patch series adds PCI support for XEN ARM.
- pci config read writes maps to xen-arm pci.c
- platform support includes parsing pci device tree node and callbacks
for reading writing from configuration space
- placeholder code is added which is necessary for compilation
Next RFC Patch set
The GIC in this platform is mainly compatible with the standard
GICv2 beside:
- ITARGET is extended to 16 bit to support 16 CPUs;
- SGI mask is extended to support 16 CPUs;
- maximum supported interrupt is 510.
Use nr_lines to check for maximum irq supported. hip04-d01 support less
interrupts due
flight 34731 xen-4.5-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34731/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pvh-intel 9 guest-start fail never pass
test-armhf-armhf-xl-sedf 10
Translated address could have an offset applied to them.
Replicate same value for device node to avoid improper address
computation in the OS.
Signed-off-by: Frediano Ziglio frediano.zig...@huawei.com
---
xen/arch/arm/gic-v2.c | 20 ++--
1 file changed, 10 insertions(+), 10
The GICH in this platform is mainly compatible with the standard
GICv2 beside APR and LR register offsets.
Signed-off-by: Frediano Ziglio frediano.zig...@huawei.com
---
xen/arch/arm/gic-v2.c | 27 +--
1 file changed, 17 insertions(+), 10 deletions(-)
diff --git
Until vGIC support is not implemented and tested, this will prevent
guest kernels to use their Hip04 driver, or crash when they don't
have any.
Signed-off-by: Frediano Ziglio frediano.zig...@huawei.com
---
xen/arch/arm/gic-v2.c | 6 ++
1 file changed, 6 insertions(+)
diff --git
This name can appear in some Linux kernel repos. Not very fortunate,
but to avoid others spending an hour to spot that few characters
difference it worth to work around it.
Signed-off-by: Zoltan Kiss zoltan.k...@huawei.com
---
xen/arch/arm/gic-v2.c | 1 +
xen/include/asm-arm/gic.h | 4 +++-
This set of patches add Xen support for hip04-d01 platform (see
https://wiki.linaro.org/Boards/D01 for details).
Changes from v4:
- rebased to new version;
- removed patch for computing GIC addresses as it apply to all platforms;
- removed patches to platform (cpu and system operations) as now
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
I'm not sure why a ':' has been added in the name... But none of the
other usages doesn't have it.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Acked-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
Acked-by: Ian Campbell
On Fri, 2015-02-06 at 12:38 +, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Julien Grall wrote:
This enum was used for matching a specific class of device and not to get
the
type of device.
Hence the name device_type will be used for another purpose later.
Also rename
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
The header asm/device.h has been included in the vgic code during
splitting to support multiple version. But no code within those files
requires it.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Acked-by: Stefano Stabellini
On 20/02/15 12:10, Manish Jaggi wrote:
On 20/02/15 5:33 pm, Julien Grall wrote:
Hello Manish,
On 20/02/15 11:34, Manish Jaggi wrote:
The platform APIs are enhanced to provide support for parsing pci device
tree nodes and storing the config-space address which is later used for
On Tue, Feb 17, 2015 at 03:29:35PM +, Jan Beulich wrote:
Signed-off-by: Jan Beulich jbeul...@suse.com
Acked-by: Wei Liu wei.l...@citrix.com
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -347,6 +347,7 @@
F: xen/arch/x86/
F: xen/include/asm-x86/
F: tools/firmware/hvmloader/
+F:
On 20/02/15 11:56, Manish Jaggi wrote:
On 20/02/15 5:23 pm, Julien Grall wrote:
Hello manish,
On 20/02/15 11:30, Manish Jaggi wrote:
This patch series adds PCI support for XEN ARM.
- pci config read writes maps to xen-arm pci.c
- platform support includes parsing pci device tree node and
On 20/02/15 5:23 pm, Julien Grall wrote:
Hello manish,
On 20/02/15 11:30, Manish Jaggi wrote:
This patch series adds PCI support for XEN ARM.
- pci config read writes maps to xen-arm pci.c
- platform support includes parsing pci device tree node and callbacks
for reading writing from
On 20/02/15 5:28 pm, Julien Grall wrote:
On 20/02/15 11:56, Manish Jaggi wrote:
On 20/02/15 5:23 pm, Julien Grall wrote:
Hello manish,
On 20/02/15 11:30, Manish Jaggi wrote:
This patch series adds PCI support for XEN ARM.
- pci config read writes maps to xen-arm pci.c
- platform support
On 20/02/15 5:33 pm, Julien Grall wrote:
Hello Manish,
On 20/02/15 11:34, Manish Jaggi wrote:
The platform APIs are enhanced to provide support for parsing pci device
tree nodes and storing the config-space address which is later used for
pci_read/pci_write config calls.
Can you explain why
On 20/02/15 12:05, Manish Jaggi wrote:
On 20/02/15 5:23 pm, Jan Beulich wrote:
All of these #ifdef-s call for better abstraction. And in no case is it
acceptable to replace blank lines with #ifdef-s like you do.
Good observation. I will take care for the blank lines.
A lot of code existed in
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
The current SMMU driver has completly diverged. That makes me hard to
maintain.
Will this temporarily regress anything in a noticeable way? I think
it'll just potentially make some hypothetical platform switch back to
1:1 dom0 mode, which
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
@@ -2,8 +2,34 @@
#define __ASM_ARM_DEVICE_H
#include xen/init.h
+
+enum device_type
+{
+DEV_DT,
I suppose no #ifdef here because an empty enum is a bit silly?
+/* TODO: Correctly implement dev_is_pci when PCI will be
On 20/02/15 5:23 pm, Jan Beulich wrote:
On 20.02.15 at 12:47, mja...@caviumnetworks.com wrote:
@@ -287,6 +289,7 @@ static struct pci_dev *alloc_pdev(struct pci_seg *pseg,
u8 bus, u8 devfn)
if ( pci_find_cap_offset(pseg-nr, bus, PCI_SLOT(devfn),
PCI_FUNC(devfn),
On Fri, 2015-02-06 at 12:37 +, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Julien Grall wrote:
Some drivers may want to configure differently the device depending on
the compatible string. For this purpose, add a new field in the
dt_device_match to store the data.
Also modify
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
On ARM, the way to assign device tree node is exactly the same as PCI.
Futhermore, all devices can be represented by a 'device_t'.
Therefore there is no need to add separate ops.
The x86 iommu drivers has not been modified to replace
On 20/02/15 12:35, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
From: Andreas Herrmann andreas.herrm...@calxeda.com
If DT information lists one stream ID twice for the master devices of
an SMMU this can cause a multi match when stream ID matching is used.
For
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
@@ -2896,6 +2911,16 @@ static __init int arm_smmu_dt_init(struct
dt_device_node *dev,
if ( !rc )
iommu_set_ops(arm_smmu_iommu_ops);
+ /*
+ * The last added SMMU is the first element of arm_smmu_devices.
On 20/02/15 12:31, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
Based on commit e6b5be2be4e30037eb551e0ed09dd97bd00d85d3.
It's a verbatim of the Linux SMMU drivers code. No Xen code has yet been
added
and the file is not built.
Compare to the previous drivers
On 20/02/15 13:15, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
From: Andreas Herrmann andreas.herrm...@calxeda.com
Try to determine mask/id values that match several stream IDs of a
master device when doing Stream ID matching. Thus the number of used
SMR groups
On Fri, 2015-02-20 at 13:33 +, Julien Grall wrote:
On 20/02/15 12:31, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
Based on commit e6b5be2be4e30037eb551e0ed09dd97bd00d85d3.
It's a verbatim of the Linux SMMU drivers code. No Xen code has yet been
added
On 19/02/15 16:50, Boris Ostrovsky wrote:
On 02/19/2015 10:23 AM, David Vrabel wrote:
Hypercalls submitted by user space tools via the privcmd driver can
take a long time (potentially many 10s of seconds) if the hypercall
has many sub-operations.
A fully preemptible kernel may deschedule
On 20/02/15 13:47, Ian Campbell wrote:
On Fri, 2015-02-20 at 12:53 +, Julien Grall wrote:
The main thing I'm worried about is if the bisector is searching a range
which includes this change looking for some unrelated change and this
commit causes some sort of spurious issue or perturbation
On 20/02/15 10:43, Ian Campbell wrote:
On Wed, 2015-02-18 at 16:34 +, Andrew Cooper wrote:
POLLIN|POLLHUP is a valid revent to recieve from poll() when the far end has
hung up, but data is still available to be read.
Currently all POLLHUPs are fatal. This is a problem when using the
On Fri, 2015-02-20 at 13:55 +, Andrew Cooper wrote:
It's a bit of a shame that callers which don't care about specific
pollhup handling have to provide two practically identical handlers.
Up until this patch, all users either provided no POLLHUP handler, or
provided the same handler
On 20.02.15 at 14:45, ian.campb...@citrix.com wrote:
(Jan, curious if you have any thoughts on this, hopefully I've left
sufficient context for you to get what we are on about, the gist is we
need some way for dom0 and Xen to agree on how a PCI segment ID maps to
an actual PCI root
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
I've applied the first four here:
fda2934 xen/arm: device: Rename device_type into device_class
100f2a6 xen/dt: Extend dt_device_match to possibly store data
62d4269 xen/arm: vgic: Drop unecessary include asm/device.h
256bdee xen/arm: gic-v2:
On 20/02/15 14:13, Ian Campbell wrote:
On Fri, 2015-02-20 at 14:07 +, Julien Grall wrote:
On 20/02/15 13:34, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
@@ -2896,6 +2911,16 @@ static __init int arm_smmu_dt_init(struct
dt_device_node *dev,
if ( !rc )
Hi Ian,
On 20/02/15 14:15, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
I've applied the first four here:
fda2934 xen/arm: device: Rename device_type into device_class
100f2a6 xen/dt: Extend dt_device_match to possibly store data
62d4269 xen/arm: vgic: Drop
On Fri, 2015-02-20 at 12:20 +, Julien Grall wrote:
Overall, I would prefer to have a separate file and structure for
handling PCI host. Also, I think we could re-use the Linux code for this
purpose.
(caveat; I've not looked at the code yet)
I had expected that PCI host controllers would
(Jan, curious if you have any thoughts on this, hopefully I've left
sufficient context for you to get what we are on about, the gist is we
need some way for dom0 and Xen to agree on how a PCI segment ID maps to
an actual PCI root controller, I think on x86 you either Just Know from
PC legacy or
On Fri, 2015-02-20 at 13:34 +, Julien Grall wrote:
On 20/02/15 12:35, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
From: Andreas Herrmann andreas.herrm...@calxeda.com
If DT information lists one stream ID twice for the master devices of
an SMMU this can
On Fri, 2015-02-20 at 12:53 +, Julien Grall wrote:
Hi Ian,
On 20/02/15 12:18, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
The current SMMU driver has completly diverged. That makes me hard to
maintain.
Will this temporarily regress anything in a
Hi Ian,
On 20/02/15 13:23, Ian Campbell wrote:
On Fri, 2015-02-06 at 13:20 +, Stefano Stabellini wrote:
+#define iommu_group_get_iommudata(group) (group)-cfg
I would move all the Xen stuff at the beginning of the file or maybe to
a separate file. You could #include the linux smmu driver
On 17/02/15 07:02, Juergen Gross wrote:
A request in the ring buffer mustn't be read after it has been marked
as consumed. Otherwise it might already have been reused by the
frontend without violating the ring protocol.
To avoid inconsistencies in the backend only work on a private copy
of
On Fri, 2015-02-20 at 13:42 +, Julien Grall wrote:
- Use num_s2crs rather than num_streamids in the arm_smmu_free_smrs.
This former is the field used to configure SRMS
Cc: Andreas Herrmann herrmann.der.u...@googlemail.com
Signed-off-by: Andreas Herrmann
On 16.02.15 at 23:26, boris.ostrov...@oracle.com wrote:
--- a/xen/arch/x86/hvm/svm/vpmu.c
+++ b/xen/arch/x86/hvm/svm/vpmu.c
@@ -253,6 +253,26 @@ static int amd_vpmu_save(struct vpmu_struct *vpmu)
return 1;
}
+static void amd_vpmu_unload(struct vpmu_struct *vpmu)
+{
+struct
On 20/02/15 13:29, Ian Campbell wrote:
On Mon, 2015-02-09 at 23:40 +0800, Julien Grall wrote:
Hi Stefano,
On 06/02/2015 21:20, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Julien Grall wrote:
-static int force_stage;
-module_param_named(force_stage, force_stage, int, S_IRUGO | S_IWUSR);
On 20/02/15 14:06, Ian Campbell wrote:
On Fri, 2015-02-20 at 13:53 +, Julien Grall wrote:
On 20/02/15 13:47, Ian Campbell wrote:
On Fri, 2015-02-20 at 12:53 +, Julien Grall wrote:
The main thing I'm worried about is if the bisector is searching a range
which includes this change
On Thu, Feb 12, 2015 at 07:19:13PM +0800, Ard Biesheuvel wrote:
While Xen on Intel uses a virtual PCI device to communicate the
base address of the grant table, the ARM implementation uses a DT
node, which is fundamentally incompatible with the way XenBusDxe is
implemented, i.e., as a UEFI
[snip]
On Fri, Feb 20, 2015 at 5:21 PM, Jan Beulich jbeul...@suse.com wrote:
Thanks Jan! Is there a way for a memevents channel consumer to get
access to the L1 (OS Page tables).
Hardly.
I presume we'll need to walk the
page tables, I suspect the current access_op is broken without it and
On Fri, 2015-02-20 at 14:11 +, Jan Beulich wrote:
On 20.02.15 at 14:45, ian.campb...@citrix.com wrote:
(Jan, curious if you have any thoughts on this, hopefully I've left
sufficient context for you to get what we are on about, the gist is we
need some way for dom0 and Xen to agree on
flight 34715 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34715/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 8 xen-boot/dst_host fail REGR. vs. 34629
Regressions which
On Fri, 2015-02-20 at 14:19 +, Julien Grall wrote:
For v4 if you are able to shuffle some of the (almost-)acked helper
stuff (e.g. #6, #7, #8 here) to the front then those can likely be
applied straight away too.
I could be able to move #6 before, but the other it would prefer to
On Fri, 2015-02-20 at 14:15 +, Julien Grall wrote:
On 20/02/15 14:13, Ian Campbell wrote:
On Fri, 2015-02-20 at 14:07 +, Julien Grall wrote:
On 20/02/15 13:34, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
@@ -2896,6 +2911,16 @@ static __init int
On 16.02.15 at 23:26, boris.ostrov...@oracle.com wrote:
+long do_xenpmu_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t)
arg)
+{
+int ret;
+struct xen_pmu_params pmu_params;
+
+if ( vpmu_disabled )
+return -EINVAL;
+
+ret = xsm_pmu_op(XSM_OTHER,
On 16.02.15 at 23:26, boris.ostrov...@oracle.com wrote:
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -437,6 +437,8 @@ int vcpu_initialise(struct vcpu *v)
vmce_init_vcpu(v);
}
+spin_lock_init(v-arch.vpmu.vpmu_lock);
This would rather seem to belong into
On 20.02.15 at 15:26, ian.campb...@citrix.com wrote:
On Fri, 2015-02-20 at 14:11 +, Jan Beulich wrote:
Otherwise,
just sequentially assign segment numbers as you discover them or
get them reported by Dom0. You could even have Dom0 tell you
the segment numbers (just like we do on x86),
On Fri, 2015-02-20 at 19:44 +0530, Manish Jaggi wrote:
Another option might be a new hypercall (assuming one doesn't already
exist) to register a PCI bus which would take e.g. the PCI CFG base
address and return a new u16 segment id to be used for all subsequent
PCI related calls. This
On 16.02.15 at 23:26, boris.ostrov...@oracle.com wrote:
--- a/xen/arch/x86/hvm/vpmu.c
+++ b/xen/arch/x86/hvm/vpmu.c
@@ -100,65 +100,48 @@ void vpmu_lvtpc_update(uint32_t val)
apic_write(APIC_LVTPC, vpmu-hw_lapic_lvtpc);
}
-int vpmu_do_wrmsr(unsigned int msr, uint64_t
On Fri, Feb 20, 2015 at 01:34:16PM +, Julien Grall wrote:
On 20/02/15 12:35, Ian Campbell wrote:
On Fri, 2015-01-30 at 18:49 +, Julien Grall wrote:
From: Andreas Herrmann andreas.herrm...@calxeda.com
If DT information lists one stream ID twice for the master devices of
an SMMU
On Fri, 2015-02-20 at 14:39 +, Jan Beulich wrote:
On 20.02.15 at 15:26, ian.campb...@citrix.com wrote:
On Fri, 2015-02-20 at 14:11 +, Jan Beulich wrote:
Otherwise,
just sequentially assign segment numbers as you discover them or
get them reported by Dom0. You could even have Dom0
On 16.02.15 at 23:26, boris.ostrov...@oracle.com wrote:
+int pmu_nmi_interrupt(const struct cpu_user_regs *regs, int cpu)
static
+{
+return vpmu_do_interrupt(regs);
That function returning 1 makes do_nmi() not do _anything_ else, i.e.
ignore eventual SERR or IOCHK events. That's not
On Fri, Feb 20, 2015 at 3:21 PM, Balbir Singh bsinghar...@gmail.com wrote:
[snip]
On Fri, Feb 20, 2015 at 5:21 PM, Jan Beulich jbeul...@suse.com wrote:
Thanks Jan! Is there a way for a memevents channel consumer to get
access to the L1 (OS Page tables).
Hardly.
I presume we'll need to walk
On 16.02.15 at 23:26, boris.ostrov...@oracle.com wrote:
We don't need to try to destroy it since it can't be already allocated at the
time we try to initialize it.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Suggested-by: Andrew Cooper andrew.coop...@citrix.com
---
On 20/02/15 13:55, Ian Campbell wrote:
On Fri, 2015-02-20 at 13:42 +, Julien Grall wrote:
- Use num_s2crs rather than num_streamids in the arm_smmu_free_smrs.
This former is the field used to configure SRMS
Cc: Andreas Herrmann herrmann.der.u...@googlemail.com
Signed-off-by:
On 02/20/2015 10:58 AM, Julien Grall wrote:
Each class can contains 32 permisions which are encoded on a word (one
bit per permission).
Currently the awk script will generate an hexadecimal value for each
permission. This may result to generate an invalid value on some version
of awk.
For
flight 34747 ovmf real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34747/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 7 debian-hvm-install fail REGR. vs. 33686
flight 34807 xen-4.3-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34807/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 3 host-install(3)broken REGR. vs. 34190
build-amd64
1 - 100 of 158 matches
Mail list logo