>>> On 14.08.17 at 09:08, wrote:
> With _cmdline_parse() now issuing error messages in case of illegal
> parameters signalled by parsing functions specified in custom_param()
> the message issued by apic_set_verbosity() can be removed.
>
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Signed-off-by: Ju
Hi,
At 15:24 +0200 on 14 Aug (1502724279), Dario Faggioli wrote:
> On Mon, 2017-08-14 at 11:39 +0100, Tim Deegan wrote:
> > At 11:19 +0200 on 14 Aug (1502709563), Dario Faggioli wrote:
> > > 3) CPU2 is not in idle_cpumask, and so it will not be in the
> > > sampled
> > > mask, but the first check
>>> On 14.08.17 at 15:31, wrote:
> On 14/08/17 14:46, Jan Beulich wrote:
> On 14.08.17 at 09:08, wrote:
>>> @@ -97,8 +102,9 @@ static void __init _cmdline_parse(const char *cmdline)
>>> !strncmp(param->name, opt, q + 1 - opt) )
>>> {
>>>
On 14/08/17 08:52, Bhupinder Thakur wrote:
Hi Julien,
Hi Bhupinder,
After that I tried to stress the emulation a bit with "find ." to get a lot
of output. And I noticed a lot of message similar to the one below on xen
console:
d6v0 vpl011: Unexpected OUT ring buffer full
Associated to
flight 112625 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112625/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 3 capture-logs broken REGR. vs. 112102
>>> On 14.08.17 at 09:07, wrote:
> Currently parameters of the hypervisor (e.g. console log level) can be
> set via boot command line. Instead of having to reboot the system in
> case another setting is desired, being able to modify many of those
> parameters at runtime would be the better option.
>>> On 14.08.17 at 09:08, wrote:
> @@ -37,13 +37,24 @@ static void __init parse_mmcfg(char *s)
> if ( ss )
> *ss = '\0';
>
> -if ( !parse_bool(s) )
> +switch ( parse_bool(s) ) {
> +case 0:
> pci_probe &= ~PCI_PROBE_MMCONF;
> -els
>>> On 14.08.17 at 09:08, wrote:
> --- a/xen/arch/x86/shutdown.c
> +++ b/xen/arch/x86/shutdown.c
> @@ -51,7 +51,7 @@ static int reboot_mode;
> * efiUse the EFI reboot (if running under EFI)
> */
> static enum reboot_type reboot_type = BOOT_INVALID;
> -static void __init set_reboot_type(ch
>>> On 14.08.17 at 09:08, wrote:
> bool __read_mostly acpi_disabled;
> bool __initdata acpi_force;
> static char __initdata acpi_param[10] = "";
> -static void __init parse_acpi_param(char *s)
> +static int __init parse_acpi_param(char *s)
Again please take the opportunity and add the missing
>>> On 14.08.17 at 09:08, wrote:
> --- a/xen/arch/x86/psr.c
> +++ b/xen/arch/x86/psr.c
> @@ -420,7 +420,7 @@ static const struct feat_props l2_cat_props = {
> };
>
> static void __init parse_psr_bool(char *s, char *value, char *feature,
> - unsigned int mask)
>
On 14/08/17 15:31, Jan Beulich wrote:
On 14.08.17 at 09:08, wrote:
>> /* opt_watchdog_timeout: Number of seconds to wait before panic. */
>> static unsigned int opt_watchdog_timeout = 5;
>> -static void parse_watchdog_timeout(char * s)
>> +static int parse_watchdog_timeout(char * s)
>
> Pl
On 14/08/17 15:24, Jan Beulich wrote:
On 14.08.17 at 09:08, wrote:
>> --- a/xen/arch/x86/dom0_build.c
>> +++ b/xen/arch/x86/dom0_build.c
>> @@ -47,7 +47,7 @@ static long __init parse_amt(const char *s, const char
>> **ps)
>> long pages = parse_size_and_unit((*s == '-') ? s+1 : s, ps) >>
On 14/08/17 14:46, Jan Beulich wrote:
On 14.08.17 at 09:08, wrote:
>> --- a/xen/common/kernel.c
>> +++ b/xen/common/kernel.c
>> @@ -23,9 +23,11 @@ enum system_state system_state = SYS_STATE_early_boot;
>> xen_commandline_t saved_cmdline;
>> static const char __initconst opt_builtin_cmdline[
>>> On 14.08.17 at 09:08, wrote:
> /* opt_watchdog_timeout: Number of seconds to wait before panic. */
> static unsigned int opt_watchdog_timeout = 5;
> -static void parse_watchdog_timeout(char * s)
> +static int parse_watchdog_timeout(char * s)
Please also remove the stray blank.
Jan
__
On Mon, 2017-08-14 at 11:39 +0100, Tim Deegan wrote:
> Hi,
>
Hey,
> At 11:19 +0200 on 14 Aug (1502709563), Dario Faggioli wrote:
> > Therefore, it looks to me that the race can be avoided by making
> > sure
> > that there is at least one check of rcu_pending(), after a CPU has
> > called rcu_ente
>>> On 14.08.17 at 09:08, wrote:
> --- a/xen/arch/x86/dom0_build.c
> +++ b/xen/arch/x86/dom0_build.c
> @@ -47,7 +47,7 @@ static long __init parse_amt(const char *s, const char **ps)
> long pages = parse_size_and_unit((*s == '-') ? s+1 : s, ps) >>
> PAGE_SHIFT;
> return (*s == '-') ? -pa
>>> On 14.08.17 at 14:21, wrote:
> On 14/08/17 13:40, Jan Beulich wrote:
> On 14.08.17 at 13:05, wrote:
>>> On 14/08/17 12:48, Jan Beulich wrote:
>>> On 14.08.17 at 12:35, wrote:
> On 14/08/17 12:29, Jan Beulich wrote:
> On 14.08.17 at 12:21, wrote:
>>> Current pv guests
On 14/08/17 13:56, Juergen Gross wrote:
> On 14/08/17 14:36, Andrew Cooper wrote:
>> On 14/08/17 11:21, Juergen Gross wrote:
>>> Current pv guests will only see physical addresses up to 46 bits wide.
>>> In order to be able to run on a host supporting 5 level paging and to
>>> make use of any possi
On 14/08/17 14:36, Andrew Cooper wrote:
> On 14/08/17 11:21, Juergen Gross wrote:
>> Current pv guests will only see physical addresses up to 46 bits wide.
>> In order to be able to run on a host supporting 5 level paging and to
>> make use of any possible memory page there, physical addresses with
On 14/08/17 13:43, Boqun Feng wrote:
> On Mon, Aug 14, 2017 at 11:35:47AM +0100, Andrew Cooper wrote:
>> On 14/08/17 06:08, Boqun Feng (Intel) wrote:
>>> Add a "umip" test for the User-Model Instruction Prevention. The test
>>> simply tries to run sgdt/sidt/sldt/str/smsw in guest user-mode with
>>>
>>> On 14.08.17 at 09:08, wrote:
> --- a/xen/common/kernel.c
> +++ b/xen/common/kernel.c
> @@ -23,9 +23,11 @@ enum system_state system_state = SYS_STATE_early_boot;
> xen_commandline_t saved_cmdline;
> static const char __initconst opt_builtin_cmdline[] = CONFIG_CMDLINE;
>
> -static void __ini
On Mon, Aug 14, 2017 at 1:53 AM, Andy Lutomirski wrote:
> On Sun, Aug 13, 2017 at 7:44 PM, Brian Gerst wrote:
>> On Mon, Aug 7, 2017 at 11:59 PM, Andy Lutomirski wrote:
>>> /* Normal 64-bit system call target */
>>> ENTRY(xen_syscall_target)
>>> - undo_xen_syscall
>>> - jmp entry_S
On Mon, Aug 14, 2017 at 11:35:47AM +0100, Andrew Cooper wrote:
> On 14/08/17 06:08, Boqun Feng (Intel) wrote:
> > Add a "umip" test for the User-Model Instruction Prevention. The test
> > simply tries to run sgdt/sidt/sldt/str/smsw in guest user-mode with
> > CR4_UMIP = 1.
> >
> > Signed-off-by: Bo
On Fri, Aug 11, 2017 at 07:02:47PM +0100, Julien Grall wrote:
> While re-ordering the include alphabetically in arch/arm/domain.c, I got
> a complitation error because grant_table.h is using gfn_t before been
> defined:
>
> In file included from domain.c:14:0:
> xen/xen/include/xen/grant_table.h:1
On 14/08/17 11:21, Juergen Gross wrote:
> Current pv guests will only see physical addresses up to 46 bits wide.
> In order to be able to run on a host supporting 5 level paging and to
> make use of any possible memory page there, physical addresses with up
> to 52 bits have to be supported.
>
> As
On 14/08/17 13:40, Jan Beulich wrote:
On 14.08.17 at 13:05, wrote:
>> On 14/08/17 12:48, Jan Beulich wrote:
>> On 14.08.17 at 12:35, wrote:
On 14/08/17 12:29, Jan Beulich wrote:
On 14.08.17 at 12:21, wrote:
>> Current pv guests will only see physical addresses up to 46
Hello Julien,
On 14.08.17 14:50, Julien Grall wrote:
The kernel should really be able to deal with memory below and above 4GB.
Yes, it should. I suppose a bug somewhere in Renesas eth driver.
Meanwhile George John could make some investigations.
Otherwise the problem would be exactly the same
>>> On 09.08.17 at 12:50, wrote:
> Append the target vCPU in the messages printed by
> arch_set_info_hvm_guest.
While this is a good idea, I'm not convinced of the use of these
messages in non-debug builds. And if they're to stay, I'd really
like to ask to make them as short as possible (without
On Mon, 14 Aug 2017 13:56:58 +0200, Roger Pau Monné
wrote:
> I defined XEN_PT_LOGGING_ENABLED in xen_pt.h as requested without the
> "hack" patch. Log is attached. Does it help?
It tells me that there's nothing unexpected on that side. As I think I
had indicated before, we really need to see bo
>>> On 14.08.17 at 12:57, wrote:
> Always map the PCI MMCFG region as strongly uncacheable. Nothing good will
> happen if stray MTRR settings end up converting UC- to WC.
I was tempted to ask the question on patch 1.
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
>>> On 14.08.17 at 12:57, wrote:
> --- a/xen/arch/x86/boot/x86_64.S
> +++ b/xen/arch/x86/boot/x86_64.S
> @@ -92,7 +92,7 @@ l1_identmap:
> .rept L1_PAGETABLE_ENTRIES
> /* VGA hole (0xa-0xc) should be mapped UC. */
> .if pfn >= 0xa0 && pfn < 0xc0
> -.quad (
On Mon, Aug 14, 2017 at 05:44:00AM -0600, Jan Beulich wrote:
> >>> On 14.08.17 at 13:31, wrote:
> > On Mon, 31 Jul 2017 12:12:45 +0200, Jan Beulich wrote:
> > "Andreas Kinzler" 07/17/17 6:32 PM >>>
> > Jan, I still have access to the hardware so perhaps we can finally
> > solve
> >
On 11/08/17 09:55, Andrii Anisov wrote:
Hello George,
Hello,
On 11.08.17 10:16, George John wrote:
I checked with xen version 4.9, Still the error for the filesystem
persists. What seems to be the problem?. I am attaching the log for
the above error and also the dts file I am using.
I've
flight 112630 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112630/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
>>> On 14.08.17 at 13:31, wrote:
> On Mon, 31 Jul 2017 12:12:45 +0200, Jan Beulich wrote:
> "Andreas Kinzler" 07/17/17 6:32 PM >>>
> Jan, I still have access to the hardware so perhaps we can finally
> solve
> this problem.
Feel free to go ahead; I'll be on vacation for th
>>> On 14.08.17 at 13:05, wrote:
> On 14/08/17 12:48, Jan Beulich wrote:
> On 14.08.17 at 12:35, wrote:
>>> On 14/08/17 12:29, Jan Beulich wrote:
>>> On 14.08.17 at 12:21, wrote:
> Current pv guests will only see physical addresses up to 46 bits wide.
> In order to be able to run
On Mon, 31 Jul 2017 12:12:45 +0200, Jan Beulich wrote:
"Andreas Kinzler" 07/17/17 6:32 PM >>>
Jan, I still have access to the hardware so perhaps we can finally
solve
this problem.
Feel free to go ahead; I'll be on vacation for the next three weeks.
Perhaps we can shortcut debugging a bit
Hi Boris,
On 08/08/17 22:45, Boris Ostrovsky wrote:
While waiting for a lock we may want to periodically run some
code. This code may, for example, allow the caller to release
resources held by it that are no longer needed in the critical
section protected by the lock.
Specifically, this featur
Hi Boris,
On 08/08/17 22:45, Boris Ostrovsky wrote:
.. so that it's easy to find pages that need to be scrubbed (those pages are
now marked with _PGC_need_scrub bit).
We keep track of the first unscrubbed page in a page buddy using first_dirty
field. For now it can have two values, 0 (whole bud
flight 112622 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112622/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 6 kernel-build fail in 112608 REGR. vs. 112544
Tests which are fa
On 14/08/17 12:48, Jan Beulich wrote:
On 14.08.17 at 12:35, wrote:
>> On 14/08/17 12:29, Jan Beulich wrote:
>> On 14.08.17 at 12:21, wrote:
Current pv guests will only see physical addresses up to 46 bits wide.
In order to be able to run on a host supporting 5 level paging and
On 14/08/17 11:57, Andrew Cooper wrote:
> diff --git a/xen/include/asm-arm/mm.h b/xen/include/asm-arm/mm.h
> index ef84b72..8999ae7 100644
> --- a/xen/include/asm-arm/mm.h
> +++ b/xen/include/asm-arm/mm.h
> @@ -176,7 +176,7 @@ void __iomem *ioremap_attr(paddr_t start, size_t len,
> unsigned attrib
Andrew Cooper (2):
x86/page: Rename PAGE_HYPERVISOR_NOCACHE to PAGE_HYPERVISOR_UCMINUS
x86/page: Introduce and use PAGE_HYPERVISOR_UC
xen/arch/x86/boot/x86_64.S| 2 +-
xen/arch/x86/mm.c | 2 +-
xen/arch/x86/x86_64/mmconfig_64.c | 2 +-
xen/include/asm-arm/mm.h
To better describe its actual function.
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/boot/x86_64.S| 2 +-
xen/arch/x86/mm.c | 2 +-
xen/arch/x86/x86_64/mmconfig_64.c | 2 +-
xen/include/asm-arm/mm.h | 2 +-
xen/include
Always map the PCI MMCFG region as strongly uncacheable. Nothing good will
happen if stray MTRR settings end up converting UC- to WC.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/x86_64/mmconfig_64.c | 2 +-
xen/include/asm-x86/page.h| 1 +
xen/include/asm-x86/x86_
>>> On 14.08.17 at 12:35, wrote:
> On 14/08/17 12:29, Jan Beulich wrote:
> On 14.08.17 at 12:21, wrote:
>>> Current pv guests will only see physical addresses up to 46 bits wide.
>>> In order to be able to run on a host supporting 5 level paging and to
>>> make use of any possible memory page
>>> On 08.08.17 at 23:45, wrote:
> Instead of scrubbing pages while holding heap lock we can mark
> buddy's head as being scrubbed and drop the lock temporarily.
> If someone (most likely alloc_heap_pages()) tries to access
> this chunk it will signal the scrubber to abort scrub by setting
> head'
Hi,
At 11:19 +0200 on 14 Aug (1502709563), Dario Faggioli wrote:
> Basically, for the race to occur (in [3]), it is necessary that [2]
> (CPU1 doing rcp->cur++) happens after [1] (last call to rcu_pending()
> of CPU2, before clearing the mask and going idle). In fact, it that is
> not the case, rc
>>> On 08.08.17 at 23:45, wrote:
> .. so that it's easy to find pages that need to be scrubbed (those pages are
> now marked with _PGC_need_scrub bit).
>
> We keep track of the first unscrubbed page in a page buddy using first_dirty
> field. For now it can have two values, 0 (whole buddy needs sc
On 14/08/17 06:08, Boqun Feng (Intel) wrote:
> Add a "umip" test for the User-Model Instruction Prevention. The test
> simply tries to run sgdt/sidt/sldt/str/smsw in guest user-mode with
> CR4_UMIP = 1.
>
> Signed-off-by: Boqun Feng (Intel)
Thankyou for this. Its looking much better. Just a few
On 14/08/17 12:29, Jan Beulich wrote:
On 14.08.17 at 12:21, wrote:
>> Current pv guests will only see physical addresses up to 46 bits wide.
>> In order to be able to run on a host supporting 5 level paging and to
>> make use of any possible memory page there, physical addresses with up
>> to
>>> On 08.08.17 at 23:44, wrote:
> Make buddy merging part of free_heap_pages() a bit more readable.
>
> Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 14.08.17 at 12:21, wrote:
> Current pv guests will only see physical addresses up to 46 bits wide.
> In order to be able to run on a host supporting 5 level paging and to
> make use of any possible memory page there, physical addresses with up
> to 52 bits have to be supported.
Is this a X
Current pv guests will only see physical addresses up to 46 bits wide.
In order to be able to run on a host supporting 5 level paging and to
make use of any possible memory page there, physical addresses with up
to 52 bits have to be supported.
As Xen needs to know whether a pv guest can handle su
This run is configured for baseline tests only.
flight 71973 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71973/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-build
> > > +
> > > +# Areas for improvement
> > > +
> > > +A hexadecimal number is used to show THRTL for a domain now. It
> > > may
> > > not be user-
> > > +friendly.
> > > +
> > > +To improve this, the libxl interfaces can be wrapped in libvirt
> > > to
> > > provide more
> > > +usr-friendly interfac
flight 112624 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112624/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1 build-check(1)
On Wed, 2017-08-09 at 12:38 +0100, Tim Deegan wrote:
> Hi,
>
> At 10:01 +0200 on 27 Jul (1501149684), Dario Faggioli wrote:
> > In Xen, that is impossible, and that's particularly problematic
> > when system is idle (or lightly loaded) systems, as CPUs that
> > are idle may never have the chance t
flight 71972 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71972/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-sid-netboot-pygrub 1 build-check(1)blocked n/a
build-arm64-pvops
>>> On 14.08.17 at 11:07, wrote:
> On 14/08/17 10:39, Jan Beulich wrote:
> On 14.08.17 at 09:08, wrote:
>>> With _cmdline_parse() now issuing error messages in case of illegal
>>> parameters signalled by parsing functions specified in custom_param()
>>> some messages issued by parse_low_crash
On 14/08/17 10:39, Jan Beulich wrote:
On 14.08.17 at 09:08, wrote:
>> With _cmdline_parse() now issuing error messages in case of illegal
>> parameters signalled by parsing functions specified in custom_param()
>> some messages issued by parse_low_crashinfo() and
>> parse_crashinfo_maxaddr()
>>> On 14.08.17 at 09:08, wrote:
> With _cmdline_parse() now issuing error messages in case of illegal
> parameters signalled by parsing functions specified in custom_param()
> some messages issued by parse_low_crashinfo() and
> parse_crashinfo_maxaddr() can be removed.
But you realize this resul
On 17-08-14 15:35:38, Chao Peng wrote:
>
> > + Linear mode: the input precision is defined as 100-(MBA_MAX).
> > For instance,
> > + if the MBA_MAX value is 90, the input precision is 10%. Values
> > not an even
> > + multiple of the precision (e.g., 12%) will be rounded down
> > (e.g.
Hi Julien,
>> After that I tried to stress the emulation a bit with "find ." to get a lot
>> of output. And I noticed a lot of message similar to the one below on xen
>> console:
>>
>> d6v0 vpl011: Unexpected OUT ring buffer full
>>
>> Associated to that the character have been eaten resulting to
flight 112623 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112623/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 79de8c79cdef26e5578050b7f1a206745c6cff14
baseline version:
ovmf 0795920568ca2efbea71b
> + Linear mode: the input precision is defined as 100-(MBA_MAX).
> For instance,
> + if the MBA_MAX value is 90, the input precision is 10%. Values
> not an even
> + multiple of the precision (e.g., 12%) will be rounded down
> (e.g., to 10%
> + delay applied) by HW automatically.
flight 112621 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112621/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 6 kernel-build fail REGR. vs. 112513
Tests which did not s
Modify the custom parameter parsing routines in:
xen/arch/x86/numa.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/numa.c | 10 ++
1 file changed, 6 insertions(+), 4
Modify the custom parameter parsing routines in:
xen/arch/x86/oprofile/nmi_int.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/oprofile/nmi_int.c | 2 ++
1 file changed, 2 in
Modify the custom parameter parsing routines in:
xen/arch/x86/dom0_build.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/dom0_build.c | 19 +++
1 file changed
Add a new xl command "set-parameters" to set hypervisor parameters at
runtime similar to boot time parameters via command line.
Cc: Ian Jackson
Cc: Wei Liu
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
docs/man/xl.pod.1.in | 5 +
tools/xl/xl.h | 1 +
tools/xl/xl_cmdtable
Modify the custom parameter parsing routines in:
xen/arch/x86/time.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/time.c | 6 +-
1 file changed, 5 insertions(+), 1 delet
With _cmdline_parse() now issuing error messages in case of illegal
parameters signalled by parsing functions specified in custom_param()
the message issued by parse_credit2_runqueue() can be removed.
Cc: George Dunlap
Cc: Dario Faggioli
Signed-off-by: Juergen Gross
Acked-by: Dario Faggioli
--
Modify the custom parameter parsing routines in:
xen/common/core_parking.c
to indicate whether the parameter value was parsed successfully.
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Sign
Modify the custom parameter parsing routines in:
xen/drivers/passthrough/vtd/quirks.c
to indicate whether the parameter value was parsed successfully.
Cc: Kevin Tian
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/drivers/passthrough/vtd/quirks.c | 7 ---
1 file changed, 4 inserti
With _cmdline_parse() now issuing error messages in case of illegal
parameters signalled by parsing functions specified in custom_param()
the message issued by setup_ioapic_ack() can be removed.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/io_apic.c | 3 ---
In order to support generic parameter parsing carve out the parser from
_cmdline_parse(). As this generic function might be called after boot
remove the __init annotations from all called sub-functions.
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wi
Modify the custom parameter parsing routines in:
xen/arch/arm/domain_build.c
to indicate whether the parameter value was parsed successfully.
Cc: Stefano Stabellini
Cc: Julien Grall
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/arm/domain_build.c | 4 +++-
1 file changed, 3 in
Modify the custom parameter parsing routines in:
xen/common/sched_credit2.c
to indicate whether the parameter value was parsed successfully.
Cc: George Dunlap
Cc: Dario Faggioli
Signed-off-by: Juergen Gross
Acked-by: Dario Faggioli
Acked-by: Wei Liu
---
xen/common/sched_credit2.c | 6 -
Modify the custom parameter parsing routines in:
xen/arch/x86/irq.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/irq.c | 9 +++--
1 file changed, 7 insertions(+), 2 dele
Modify the custom parameter parsing routines in:
xen/arch/x86/psr.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/psr.c | 28 +---
1 file changed, 21
Modify the custom parameter parsing routines in:
xen/arch/x86/hvm/viridian.c
to indicate whether the parameter value was parsed successfully.
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Reviewed-by: Paul Durrant
Acked-by: Wei Liu
---
xen/arch/x86/hvm/vi
Add the needed infrastructure for runtime parameter changing similar
to that used at boot time via cmdline. We are using the same parsing
functions as for cmdline parsing, but with a different array of
parameter definitions.
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
C
Modify the custom parameter parsing routines in:
xen/drivers/passthrough/amd/iommu_acpi.c
to indicate whether the parameter value was parsed successfully.
Cc: Suravee Suthikulpanit
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/drivers/passthrough/amd/iommu_acpi.c | 26 ++
Modify the custom parameter parsing routines in:
xen/arch/x86/cpu/vpmu.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/cpu/vpmu.c | 7 ---
1 file changed, 4 insertions(+)
Modify the custom parameter parsing routines in:
xen/arch/x86/cpu/mcheck/mce.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/cpu/mcheck/mce.c | 7 ++-
1 file changed, 6 i
Support modifying conswitch, console_timestamps, loglvl and
guest_loglvl at runtime.
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Signed-off-by: Juergen Gross
Reviewed-by: Wei Liu
---
docs
Add a sysctl hypercall to support setting parameters similar to
command line parameters, but at runtime. The parameters to set are
specified as a string, just like the boot parameters.
Cc: Daniel De Graaf
Cc: Ian Jackson
Cc: Wei Liu
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Jan Beulich
Cc: Kon
Modify the custom parameter parsing routines in:
xen/drivers/passthrough/iommu.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/drivers/passthrough/iommu.c | 15 ++-
1 file changed, 10 insert
With _cmdline_parse() now issuing error messages in case of illegal
parameters signalled by parsing functions specified in custom_param()
the message issued by mce_set_verbosity() can be removed.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/cpu/mcheck/mce.c |
Modify the custom parameter parsing routines in:
xen/drivers/cpufreq/cpufreq.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/drivers/cpufreq/cpufreq.c | 18 +-
xen/include/acpi/cpuf
Modify the custom parameter parsing routines in:
xen/drivers/video/vesa.c
to indicate whether the parameter value was parsed successfully.
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Signe
Modify the custom parameter parsing routines in:
xen/drivers/acpi/tables.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/drivers/acpi/tables.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
Modify the custom parameter parsing routines in:
xen/arch/x86/genapic/probe.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/genapic/probe.c | 8 ++--
1 file changed, 6 in
Currently parameters of the hypervisor (e.g. console log level) can be
set via boot command line. Instead of having to reboot the system in
case another setting is desired, being able to modify many of those
parameters at runtime would be the better option.
This patch series addresses this by addi
Modify the custom parameter parsing routines in:
xen/arch/x86/hvm/vmx/vmcs.c
to indicate whether the parameter value was parsed successfully.
Cc: Jun Nakajima
Cc: Kevin Tian
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/hvm/vmx/vmcs.c |
Modify the custom parameter parsing routines in:
xen/arch/x86/shutdown.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/arch/x86/shutdown.c | 6 +-
1 file changed, 5 insertions(+),
With _cmdline_parse() now issuing error messages in case of illegal
parameters signalled by parsing functions specified in custom_param()
the message issued by apic_set_verbosity() can be removed.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/apic.c | 5 +
Add a new libxl function to set hypervisor parameters at runtime
similar to boot time parameters via command line.
Cc: Ian Jackson
Cc: Wei Liu
Signed-off-by: Juergen Gross
---
V2:
- corrected coding style (Wei Liu)
- removed superfluous #ifdef (Wei Liu)
---
tools/libxl/libxl.c | 15 +++
Modify the custom parameter parsing routines in:
xen/common/efi/boot.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
xen/common/efi/boot.c | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --
101 - 200 of 220 matches
Mail list logo