> From: Wu, Feng
> Sent: Tuesday, October 25, 2016 9:05 AM
>
>
> > -Original Message-
> > From: Jan Beulich [mailto:jbeul...@suse.com]
> > Sent: Monday, October 24, 2016 7:31 PM
> > To: Wu, Feng
> > Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> >
Fixes the following errors:
* ERROR: line over 90 characters
* ERROR: code indent should never use tabs
* ERROR: space prohibited after that open square bracket '['
* ERROR: do not initialise statics to 0 or NULL
* ERROR: "(foo*)" should be "(foo *)"
Signed-off-by: Emil Condrea
The name of the functions moved to xen_pvdev.c:
* xenstore_cleanup_dir
* xen_config_cleanup
* xenstore_mkdir
Signed-off-by: Emil Condrea
Acked-by: Anthony PERARD
---
hw/xen/xen_backend.c | 49 -
Reading the children list of a xenstore node with the length of that
list exceeding 4096 bytes is currently not possible. This can be a
problem for a large host with a huge number of domains as Xen tools
will no longer by capable to scan some directories of xenstore (e.g.
/local/domain).
This
* move xendevs qtail to xen_pvdev.c
* change xen_be_get_xendev to use a new function: xen_pv_insert_xendev
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 51 +--
hw/xen/xen_pvdev.c | 57
This will enable all users of libxenstore to handle xenstore nodes
with a huge amount of children.
In order to not depend completely on the XS_DIRECTORY_PART
functionality use it only in case of E2BIG returned by XS_DIRECTORY.
Signed-off-by: Juergen Gross
---
Prepare xen_be_printf to be used by both backend and frontends:
* xen_be_printf -> xen_pv_printf
Signed-off-by: Emil Condrea
Acked-by: Anthony PERARD
---
hw/block/xen_disk.c| 58 +++---
Prepare xen_be_evtchn_event to be shared with frontends:
* xen_be_evtchn_event -> xen_pv_evtchn_event
Signed-off-by: Emil Condrea
Acked-by: Anthony PERARD
Reviewed-by: Quan Xu
---
hw/xen/xen_backend.c | 2 +-
As the payload size for one xenstore wire command is limited to 4096
bytes it is impossible to read the children names of a node with a
large number of children (e.g. /local/domain in case of a host with
more than about 2000 domains). This effectively limits the maximum
number of domains a host
Prepare xen_be_del_xendev to be shared with frontends:
* xen_be_del_xendev -> xen_pv_del_xendev
Signed-off-by: Emil Condrea
Acked-by: Anthony PERARD
Reviewed-by: Quan Xu
---
hw/xen/xen_backend.c | 2 +-
The name of the functions moved:
* xen_be_evtchn_event
* xen_be_unbind_evtchn
* xen_be_send_notify
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 35 ---
hw/xen/xen_pvdev.c | 35
This patch series was splitted from QEMU:Xen stubdom vTPM for HVM virtual
machine
http://markmail.org/message/fkix7g3a5zdj7lvr
It contains a reorganization of xen backend and frontend functions together
with code style fixes.
Common functions shared by backends and frontends are moved to
Prepare xen_be_send_notify to be shared with frontends:
* xen_be_send_notify -> xen_pv_send_notify
Signed-off-by: Emil Condrea
Acked-by: Anthony PERARD
Reviewed-by: Quan Xu
---
hw/block/xen_disk.c| 4 ++--
Prepare xen_be_unbind_evtchn to be shared with frontends:
* xen_be_unbind_evtchn -> xen_pv_unbind_evtchn
Signed-off-by: Emil Condrea
Acked-by: Anthony PERARD
Reviewed-by: Quan Xu
---
hw/block/xen_disk.c| 2 +-
* xenstore_update -> xen_pvdev.c
Signed-off-by: Emil Condrea
---
hw/xen/xen_backend.c | 30 +++---
hw/xen/xen_pvdev.c | 23 +++
include/hw/xen/xen_backend.h | 3 +++
include/hw/xen/xen_pvdev.h | 1 +
4
Prepare xen_be_find_xendev to be shared with frontends:
* xen_be_find_xendev -> xen_pv_find_xendev
Signed-off-by: Emil Condrea
Acked-by: Anthony PERARD
Reviewed-by: Quan Xu
---
hw/display/xenfb.c | 4 ++--
Fixes:
* WARNING: line over 80 characters
Signed-off-by: Emil Condrea
---
hw/block/xen_disk.c | 3 ++-
hw/char/xen_console.c| 3 ++-
hw/display/xenfb.c | 6 --
hw/net/xen_nic.c | 12
hw/xen/xen_backend.c
The purpose of the new file is to store generic functions shared by frontend
and backends such as xenstore operations, xendevs.
Signed-off-by: Quan Xu
Signed-off-by: Emil Condrea
---
hw/xen/Makefile.objs | 2 +-
hw/xen/xen_backend.c |
On Mon, Oct 24, 2016 at 9:37 AM, David Vrabel wrote:
>
> I think the changes are trivial and uncontroversial.
Hmm. Sadly, they are also buggy.
This:
if (files->mode & S_IFLNK) {
is simply wrong. The correct test for S_IFLNK is to do
if
On Mon, Oct 24, 2016 at 06:37:14AM -0400, Ian Jackson wrote:
> Levin, Alexander writes ("Re: 3.18.y missing "x86/cpu: Fix SMAP check in
> PVOPS environments""):
> > On Tue, Oct 18, 2016 at 12:46:31PM -0400, Ian Jackson wrote:
> > > Hi. It appears that 3.18.y is lacking 581b7f158fe0 "x86/cpu: Fix
When set ASSOC register, we need a cos_mask to calculate the COS
ID to set. The cos_mask is calculated by cos_max. When supporting
more than one feature, the cos_max to calculate cos_mask should be
the max one of all features.
This patch implements 'get_max_cos_max' function and the corresponding
Enable L2 CAT (Cache Allocation Technology) feature support in
psr.c.
- Implement 'struct feat_ops' callback functions for L2 CAT.
- Initialize L2 CAT feature and add it into feature list to
enable L2 CAT in psr.c.
- Free resources when CPU dead or cancelled.
Signed-off-by: He Chen
Get feature COS register value is an interface provided by psr.c.
It can be abstracted as another operation.
This patch adds 'get_val' callback function to get the COS register
value of the feature and implement the callback function for L3
CAT/CDP.
It also modifies the domctl interface to make
This patch adds L2 CAT interfaces to get/set CBM in domctl.
Signed-off-by: He Chen
Signed-off-by: Yi Sun
---
xen/arch/x86/domctl.c | 13 +
xen/include/public/domctl.h | 2 ++
2 files changed, 15 insertions(+)
diff --git
This patch modifies the set value interface provided by psr.c.
It makes it be general and change the logic in the function to
make it be compatible for supporting multiple features. It
includes below steps:
1. Assemble a value array to store all features current value
in it and replace the
This patch is the xl/xc changes to support Intel L2 CAT
(Cache Allocation Technology).
The new level option is introduced to original CAT setting
command in order to set CBM for specified level CAT.
- 'xl psr-hwinfo' is updated to show both L3 CAT and L2 CAT
info.
- 'xl psr-cat-cbm-set' is
This patch adds L2 CAT interface to get HW info in sysctl.
Signed-off-by: He Chen
Signed-off-by: Yi Sun
---
xen/arch/x86/sysctl.c | 13 +
xen/include/public/sysctl.h | 6 ++
2 files changed, 19 insertions(+)
diff --git
To handle all features in a universal way, we need abstract the
common operations of all features and register different callback
functions for differnet features. The feature specific behaviors
should be encapsulated into these callback functions.
This patch defines 'struct feat_ops' to maintain
Hi all,
We plan to bring a new PSR (Platform Shared Resource) feature called
Intel L2 Cache Allocation Technology (L2 CAT) to Xen.
Besides the L2 CAT implementaion, we refactor the psr.c to make it more
flexible to add new features and fulfill the principle, open for extension
but closed for
Signed-off-by: Yi Sun
---
docs/features/l2_cat.pandoc | 314
1 file changed, 314 insertions(+)
create mode 100644 docs/features/l2_cat.pandoc
diff --git a/docs/features/l2_cat.pandoc b/docs/features/l2_cat.pandoc
new file
'cbm_len' and 'cbm_max' are CAT/CDP specific feature HW info.
So encapsulate them into 'struct psr_cat_hw_info'. If new
feature is supported, we can define other structure to save
its HW info.
Signed-off-by: Yi Sun
---
xen/arch/x86/psr.c | 33
'ref' in 'struct psr_cat_cbm' is used as a reference count for
one COS register. It doesn't relate to cbm. So, it can be splitted
out.
This patch removes 'ref' from 'struct psr_cat_cbm' and creates a
'cos_ref' array to manage reference counts of all COS registers.
It also renames the 'cbm_lock'
This patch creates a feature list to manage features enabled on
socket. A feature list entry contains the feature's info, including
which feature it is, the feature HW info and the COS registers
values.
So far, only is L3 CAT/CDP added into list. So, the operations are
L3 CAT/CDP specific. The
'struct psr_cat_cbm' is defined for L3 CAT only. It is not
appropriate for other features. This patch replaces it with
a generic array, 'uint64_t cos_reg_val[MAX_COS_REG_NUM]',
to save values of COS registers. So 'temp_cos_to_cbm' is not
useful anymore, remove it.
Signed-off-by: Yi Sun
Get feature HW info is an interface provided by psr.c. This
can be abstracted as an operation.
This patch defines 'get_feat_info' callback function to get
the feature HW info and implement the callback function for
L3 CAT/CDP.
It also modifies the sysctl interface to make it general.
'cdp_socket_enable' and 'cat_socket_enable' are used to mask if
CDP/CAT are enabled on socket. But they are specific for CAT and
CDP. So, replace them with 'feat_mask' which is a general mask.
Signed-off-by: Yi Sun
---
xen/arch/x86/psr.c | 44
flight 101644 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101644/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 9 debian-di-installfail REGR. vs. 101636
Regressions which
This run is configured for baseline tests only.
flight 67927 qemu-upstream-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67927/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, October 24, 2016 7:31 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
>
This run is configured for baseline tests only.
flight 67929 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67929/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c112e371ce0aa40204fc9a1674cd2e0df0d743c8
baseline
On Mon, 24 Oct 2016, Sameer Goel wrote:
> This reverts commit db92b1ac55cd5e193ae22b0b6f01fb47bc9e5d2f.
>
> There does not seem to be a restriction on non contiguous memory anymore . So,
> reverting this change, so that Xen is placed at the end of the useable
> system RAM even if the partitions
flight 101651 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101651/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl
This reverts commit db92b1ac55cd5e193ae22b0b6f01fb47bc9e5d2f.
There does not seem to be a restriction on non contiguous memory anymore . So,
reverting this change, so that Xen is placed at the end of the useable
system RAM even if the partitions are not contiguous.
Signed-off-by: Sameer Goel
On 10/24/2016 03:22 PM, Kyle Huey wrote:
> On Mon, Oct 24, 2016 at 8:05 AM, Boris Ostrovsky
> wrote:
>> On 10/24/2016 12:18 AM, Kyle Huey wrote:
>>> The anomalies we see appear to be related to, or at least triggerable
>>> by, the performance monitoring interrupt. The
flight 101645 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101645/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c112e371ce0aa40204fc9a1674cd2e0df0d743c8
baseline version:
ovmf
flight 101642 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101642/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 13 saverestore-support-check fail REGR. vs. 100786
This run is configured for baseline tests only.
flight 67928 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67928/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b8e54b012126a90911e9602b9f6e10d4e16d01d9
baseline
flight 101641 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101641/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 13 saverestore-support-check fail REGR. vs. 101443
Juergen,
Can we see your actual `./configure *` line? Were you able to build the
included qemu-xen and stubdom/pvgrub?
By the way, here is the Debian way to configure the Xen in repo:
(from https://anonscm.debian.org/cgit/pkg-xen/xen.git/tree/debian/rules.real
)
On Mon, Oct 24, 2016 at 8:05 AM, Boris Ostrovsky
wrote:
> On 10/24/2016 12:18 AM, Kyle Huey wrote:
>>
>> The anomalies we see appear to be related to, or at least triggerable
>> by, the performance monitoring interrupt. The following program runs
>> a loop of roughly
flight 101646 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101646/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl
> There is one called xenstored.service.
>
>> is xenstore supposed to start just because it is systemd enabled?
>>
>
> I think so -- when you configure it properly when building Xen, those
> files will be properly installed to the desired location of your test
> host. Make sure you have
flight 101638 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101638/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 6 xen-boot fail REGR. vs. 100648
This run is configured for baseline tests only.
flight 67926 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67926/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
On Mon, 24 Oct 2016, Ian Jackson wrote:
> Stefano Stabellini writes ("Re: [PATCH RFC 0/2] Fix PAGE_SIZE issues in
> public headers"):
> > Yes, as long as we backport the fixes to the Xen stable trees as soon as
> > possible.
>
> I have queued both of these for backport:
>
>
On Mon, Oct 24, 2016 at 06:57:50PM +0100, Juergen Schinker wrote:
>
> >> Then why don't you write an Tes Report ?
> >
> > Juergen, please be courteous to fellow users. :-)
> >
> sorry
>
> > There could be many reasons why Pry didn't send out a report. I think we
> > should be grateful that
>> Then why don't you write an Tes Report ?
>
> Juergen, please be courteous to fellow users. :-)
>
sorry
> There could be many reasons why Pry didn't send out a report. I think we
> should be grateful that he took the time to response to the issue you
> discovered.
>
>>
>> and I tested
On Mon, Oct 24, 2016 at 11:37:14AM +0100, Ian Jackson wrote:
> Levin, Alexander writes ("Re: 3.18.y missing "x86/cpu: Fix SMAP check in
> PVOPS environments""):
> > On Tue, Oct 18, 2016 at 12:46:31PM -0400, Ian Jackson wrote:
> > > Hi. It appears that 3.18.y is lacking 581b7f158fe0 "x86/cpu: Fix
flight 101637 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101637/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm3 host-install(3) broken in 101631 REGR. vs. 101000
"Old" tested version had not actually been tested; therefore in this
flight we test it, rather than a new candidate. The baseline, if
any, is the most recent actually tested revision.
flight 101647 rumprun real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101647/
Failures :-/ but no
Hi Haozhong
All the toolstack patches seem to be tied to the hypervisor interface.
Given that the final design of how nvdimm is expected to work in Xen is
still under discussion, I think I'm going to shelve these patches for
now.
Let me know if my judgement on this matter is incorrect.
Wei.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.9-fs-rc2-tag
I have separated these fixes out from the previous set because they
contain changes to generic filesystem code.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.9-rc2-tag
xen: fixes for 4.9-rc2
- - Advertise control feature flags in xenstore.
- - Fix x86 build when XEN_PVHVM is disabled.
On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara wrote:
> For the same reason that allocating a struct irq_desc for each
> possible LPI is not an option, having a struct pending_irq for each LPI
> is also not feasible. However we actually only need those when an
>
On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara wrote:
> Allow a guest to provide the address and size for the memory regions
> it has reserved for the GICv3 pending and property tables.
> We sanitise the various fields of the respective redistributor
> registers and map
On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara wrote:
> The INVALL command instructs an ITS to invalidate the configuration
> data for all LPIs associated with a given redistributor (read: VCPU).
> To avoid iterating (and mapping!) all guest tables, we instead go through
On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara wrote:
> Create a new file to hold the emulation code for the ITS widget.
> For now we emulate the memory mapped ITS registers and provide a stub
> to introduce the ITS command handling framework (but without actually
>
Stefano Stabellini writes ("Re: [PATCH RFC 0/2] Fix PAGE_SIZE issues in public
headers"):
> Yes, as long as we backport the fixes to the Xen stable trees as soon as
> possible.
I have queued both of these for backport:
d93539cc486aa6022195305dbea5fe12f90b69fe
vscsiif.h: replace PAGE_SIZE with
Don't ignore errors here: Set backend state to unknown when
unsuccessful.
Signed-off-by: Jan Beulich
---
drivers/xen/xenbus/xenbus_probe_frontend.c |4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
--- 4.9-rc2/drivers/xen/xenbus/xenbus_probe_frontend.c
+++
>>> On 24.10.16 at 17:03, wrote:
>
> On 10/24/2016 10:28 PM, Jan Beulich wrote:
> On 24.10.16 at 16:01, wrote:
>>> On 10/24/2016 6:53 PM, Jan Beulich wrote:
>>> On 22.10.16 at 13:23, wrote:
> __serial_rx() runs in
For single items being collected this should be preferred as being more
typesafe (as the compiler can check format string and to-be-written-to
variable match) and more efficient (requiring one less parameter to be
passed).
Signed-off-by: Jan Beulich
---
v2: Avoid commit
This is more efficient than list_for_each_safe() when list modification
is accompanied by breaking out of the loop.
Signed-off-by: Jan Beulich
Reviewed-by: Juergen Gross
---
v2: Avoid commit message to continue from subject.
---
On 10/24/2016 10:28 PM, Jan Beulich wrote:
On 24.10.16 at 16:01, wrote:
On 10/24/2016 6:53 PM, Jan Beulich wrote:
On 22.10.16 at 13:23, wrote:
__serial_rx() runs in either irq handler or timer handler and non-irq
keyhandler should not run in
On 10/24/2016 12:18 AM, Kyle Huey wrote:
>
> The anomalies we see appear to be related to, or at least triggerable
> by, the performance monitoring interrupt. The following program runs
> a loop of roughly 2^25 conditional branches. It takes one argument,
> the number of conditional branches to
On Mon, Oct 24, 2016 at 04:51:07PM +0200, Juergen Gross wrote:
> On 24/10/16 16:47, Wei Liu wrote:
> > On Mon, Oct 24, 2016 at 04:43:59PM +0200, Juergen Gross wrote:
> >> On 24/10/16 15:57, Jan Beulich wrote:
> >> On 24.10.16 at 15:29, wrote:
> ---
>>> On 24.10.16 at 16:43, wrote:
>
> On 10/24/2016 10:31 PM, Jan Beulich wrote:
> On 24.10.16 at 16:15, wrote:
>>
>>>
>>> On 10/24/2016 9:54 PM, Jan Beulich wrote:
>>> On 24.10.16 at 15:29, wrote:
> On 10/24/2016
>>> On 24.10.16 at 16:43, wrote:
> On 24/10/16 15:57, Jan Beulich wrote:
> On 24.10.16 at 15:29, wrote:
>>> --- a/docs/misc/xenstore.txt
>>> +++ b/docs/misc/xenstore.txt
>>> @@ -229,8 +229,10 @@ TRANSACTION_START |
>>> |
>>>
On Mon, Oct 24, 2016 at 10:43:57PM +0800, Lan, Tianyu wrote:
>
>
> On 10/24/2016 10:31 PM, Jan Beulich wrote:
> > > > > On 24.10.16 at 16:15, wrote:
> >
> > >
> > > On 10/24/2016 9:54 PM, Jan Beulich wrote:
> > > > > > > On 24.10.16 at 15:29,
On 24/10/16 16:47, Wei Liu wrote:
> On Mon, Oct 24, 2016 at 04:43:59PM +0200, Juergen Gross wrote:
>> On 24/10/16 15:57, Jan Beulich wrote:
>> On 24.10.16 at 15:29, wrote:
--- a/docs/misc/xenstore.txt
+++ b/docs/misc/xenstore.txt
@@ -229,8 +229,10 @@
On Mon, Oct 24, 2016 at 04:43:59PM +0200, Juergen Gross wrote:
> On 24/10/16 15:57, Jan Beulich wrote:
> On 24.10.16 at 15:29, wrote:
> >> --- a/docs/misc/xenstore.txt
> >> +++ b/docs/misc/xenstore.txt
> >> @@ -229,8 +229,10 @@ TRANSACTION_START |
On 24/10/16 15:57, Jan Beulich wrote:
On 24.10.16 at 15:29, wrote:
>> --- a/docs/misc/xenstore.txt
>> +++ b/docs/misc/xenstore.txt
>> @@ -229,8 +229,10 @@ TRANSACTION_START |
>> |
>> tx_id request header field. When transaction is started
On Mon, Oct 24, 2016 at 03:40:03PM +0100, Andrew Cooper wrote:
> On 24/10/16 13:17, Jan Beulich wrote:
> > Commit f09902c456 ("x86emul: add XOP decoding") ended up overwriting b
> > prior to the last use of its previously stored value. SLightly defer
> > fetching the main opcode byte.
> >
> >
On 10/24/2016 10:31 PM, Jan Beulich wrote:
On 24.10.16 at 16:15, wrote:
On 10/24/2016 9:54 PM, Jan Beulich wrote:
On 24.10.16 at 15:29, wrote:
On 10/24/2016 8:19 AM, Konrad Rzeszutek Wilk wrote:
On Sat, Oct 22, 2016 at 07:23:03PM +0800, Lan
On 24/10/16 13:17, Jan Beulich wrote:
> Commit f09902c456 ("x86emul: add XOP decoding") ended up overwriting b
> prior to the last use of its previously stored value. SLightly defer
> fetching the main opcode byte.
>
> Reported-by: Andrew Cooper
> Signed-off-by: Jan
On 03/08/16 18:27, David Vrabel wrote:
> This is the libxencall side of the "xen/privcmd: prevent page
> migration for hypercall buffers" series for Linux. It calls the
> necessary LOCK/UNLOCK ioctls.
>
> This should not be applied until after the Linux series is applied.
This solution wasn't
On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara wrote:
> Instead of directly manipulating the tables in memory, an ITS driver
> sends commands via a ring buffer to the ITS h/w to create or alter the
> LPI mappings.
> Allocate memory for that buffer and tell the ITS about
>>> On 24.10.16 at 16:15, wrote:
>
> On 10/24/2016 9:54 PM, Jan Beulich wrote:
> On 24.10.16 at 15:29, wrote:
>>> On 10/24/2016 8:19 AM, Konrad Rzeszutek Wilk wrote:
On Sat, Oct 22, 2016 at 07:23:03PM +0800, Lan Tianyu wrote:
>
On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara wrote:
> Each ITS maps a pair of a DeviceID (usually the PCI b/d/f triplet) and
> an EventID (the MSI payload or interrupt ID) to a pair of LPI number
> and collection ID, which points to the target CPU.
> This mapping is
>>> On 24.10.16 at 16:12, wrote:
>
> On 10/24/2016 9:38 PM, Konrad Rzeszutek Wilk wrote:
>> On Mon, Oct 24, 2016 at 09:29:53PM +0800, Lan, Tianyu wrote:
>>> On 10/24/2016 8:19 AM, Konrad Rzeszutek Wilk wrote:
On Sat, Oct 22, 2016 at 07:23:03PM +0800, Lan Tianyu wrote:
On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara wrote:
> The ARM GICv3 ITS provides a new kind of interrupt called LPIs.
> The pending bits and the configuration data (priority, enable bits) for
> those LPIs are stored in tables in normal memory, which software has to
>
>>> On 24.10.16 at 16:01, wrote:
> On 10/24/2016 6:53 PM, Jan Beulich wrote:
> On 22.10.16 at 13:23, wrote:
>>> __serial_rx() runs in either irq handler or timer handler and non-irq
>>> keyhandler should not run in these contexts. So always force
flight 101639 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101639/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b8e54b012126a90911e9602b9f6e10d4e16d01d9
baseline version:
ovmf
On Mon, Oct 24, 2016 at 03:10:49PM +0100, Andrew Cooper wrote:
> On 24/10/16 13:17, Jan Beulich wrote:
> > Suggested-by: Andrew Cooper
> > Signed-off-by: Jan Beulich
>
> Reviewed-by: Andrew Cooper
>
Release-acked-by:
On 10/24/2016 9:54 PM, Jan Beulich wrote:
On 24.10.16 at 15:29, wrote:
On 10/24/2016 8:19 AM, Konrad Rzeszutek Wilk wrote:
On Sat, Oct 22, 2016 at 07:23:03PM +0800, Lan Tianyu wrote:
__serial_rx() runs in either irq handler or timer handler and non-irq
keyhandler
On 10/24/2016 9:38 PM, Konrad Rzeszutek Wilk wrote:
On Mon, Oct 24, 2016 at 09:29:53PM +0800, Lan, Tianyu wrote:
On 10/24/2016 8:19 AM, Konrad Rzeszutek Wilk wrote:
On Sat, Oct 22, 2016 at 07:23:03PM +0800, Lan Tianyu wrote:
__serial_rx() runs in either irq handler or timer handler and
On 24/10/16 13:17, Jan Beulich wrote:
> Suggested-by: Andrew Cooper
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
>
> --- a/xen/tools/gen-cpuid.py
> +++ b/xen/tools/gen-cpuid.py
> @@ -196,8 +196,9 @@ def
>>> On 24.10.16 at 15:56, wrote:
> On Mon, Oct 24, 2016 at 9:12 AM, Jan Beulich wrote:
> On 24.10.16 at 15:01, wrote:
>>> On Mon, Oct 24, 2016 at 8:47 AM, Jan Beulich wrote:
>>> On 24.10.16 at 14:30,
On 10/24/2016 6:53 PM, Jan Beulich wrote:
On 22.10.16 at 13:23, wrote:
__serial_rx() runs in either irq handler or timer handler and non-irq
keyhandler should not run in these contexts. So always force non-irq
keyhandler to run in tasklet when receive a debugkey from
>>> On 24.10.16 at 15:29, wrote:
> --- a/docs/misc/xenstore.txt
> +++ b/docs/misc/xenstore.txt
> @@ -229,8 +229,10 @@ TRANSACTION_START|
> |
> tx_id request header field. When transaction is started whole
> db is copied; reads and
On Mon, Oct 24, 2016 at 9:12 AM, Jan Beulich wrote:
On 24.10.16 at 15:01, wrote:
>> On Mon, Oct 24, 2016 at 8:47 AM, Jan Beulich wrote:
>> On 24.10.16 at 14:30, wrote:
As best as I can tell, the current
1 - 100 of 167 matches
Mail list logo