It's not necessary to get from the hardware DT the redistributor
informations again. We already have it stored in the gic_info and
the domain.
Use the latter to be consistent with the rest of the function.
Signed-off-by: Julien Grall julien.gr...@citrix.com
Acked-by: Ian Campbell ian.campb
It's not easy to understand PAGE_SIZE * 0x10 and PAGE_SIZE * 16 at the
first glance.
Signed-off-by: Julien Grall julien.gr...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
Cc: Zoltan Kiss zoltan.k...@huawei.com
---
Changes in v2:
- Add Ian's ack
- Merge xen/arm
for clarity and it will be easier to understand some follow-up patches.
Also gate gic_v3 structure with HAS_GICV3.
Signed-off-by: Julien Grall julien.gr...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
Changes in v3:
- Fix typo in commit message
- Add Ian's
From: Dario Faggioli dario.faggi...@citrix.com
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Reviewed-and-Acked-by: Meng Xu men...@cis.upenn.edu
Acked-by: George Dunlap george.dun...@eu.citrix.com
---
MAINTAINERS | 5 +
1 file changed, 5 insertions(+)
diff --git a/MAINTAINERS
On 01/07/15 14:52, Ian Jackson wrote:
Julien Grall writes ([v3 12/13] arm: Allow the user to specify the GIC
version):
A platform may have a GIC compatible with previous version of the
device.
...
+=item Bgic_version=vN
+
+Version of the GIC emulated for the guest. Currently
Hi Ian,
On 01/07/15 15:22, Ian Jackson wrote:
Perhaps since f0c4c53f libxl: domain create: Do not destroy on ao
abort, we have destroyed guest_domid==-1 if domain creation fails
without actually creating a domid.
Reported-by: Julien Grall julien.gr...@citrix.com
CC: Julien Grall julien.gr
entirely
If Julien really wants we could error on RDM_RELAXED being set; but I
don't think that's necessary.
I was confused when I suggested this. After speaking with George IRL,
I'm fine with his solution.
Regards,
--
Julien Grall
___
Xen-devel
On 01/07/15 15:50, Ian Campbell wrote:
On Wed, 2015-07-01 at 15:37 +0100, Julien Grall wrote:
AFIACT the default is offer the guest the hardware's native version.
This is true when the domain is firstly created. But this will be
confusing if the user decide to migrate the guest to a platform
On 03/07/15 15:16, Ian Campbell wrote:
On Fri, 2015-06-26 at 19:47 +0200, Julien Grall wrote:
+/* First get the #interrupt-cells property of the current cursor
+ * that tells us how to interpret the passed-in intspec. If there
+ * is none, we are nice and just walk up the tree
. So you could do a loop which register all the IDs from 0 to N.
Though, it may be possible to be smarter.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 01/07/15 12:00, Julien Grall wrote:
Hi all,
Hi Ian,
This patch series adds support for GICv2 on GICv3. This feature is available
only when the GICv3 hardware is compatible with GICv2.
When it's the case, the same interface is provided in order to use a
virtualize GICv2 (i.e GICC
netdevice using
ipv6 and bridge.
Spotted while trying to destroy a Xen guest on the upstream Linux:
unregister_netdevice: waiting for vif1.0 to become free. Usage count = 1
Signed-off-by: Julien Grall julien.gr...@citrix.com
Cc: Bernhard Thaler bernhard.tha...@wvnet.at
Cc: Pablo Neira Ayuso pa
Hi,
Ping?
Regards,
On 17/06/15 14:58, Julien Grall wrote:
Currently, the grant table region is hardcoded per-platform. When a new
board is coming up, we have to check the spec in order to find a space
in the memory layout free. Depending on the platform it may be tedious.
A good candidate
to
also setup the handler (based on desc-status_IRQ_GUEST and desc-irq),
perhaps renaming it to something less property based. Both callers are
git_route_irq_to_... so perhaps gic_route_irq?
Sounds good for me.
Regards,
--
Julien Grall
___
Xen-devel
give more background for this section? i.e:
- Why do you need this?
- How xen will translate the gbdf to a vDeviceID?
- Who will call this hypercall?
- Why not setting the gsbdf when the device is assigned?
Regards,
--
Julien Grall
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
to answer to the mail
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
question. I asked, how Xen will find the mapping between
the gdbf and vDeviceID? He doesn't have access to the firmware table and
therefore not able to find the right one.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http
Reviewed-by: Julien Grall julien.gr...@citrix.com
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
that for these).
Needs a selection of IORESOURCE_* defines, which I've taken from Linux
and have included locally for now until we figure out where else they
might be needed.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Reviewed-by: Julien Grall julien.gr...@citrix.com
Regards
comments on v4 which were
missed in v5.
I added my reviewed-by on all the patch and had 3 minors comments on #4.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi,
On 03/07/15 21:42, Florian Westphal wrote:
Julien Grall julien.gr...@citrix.com wrote:
The commit efb6de9b4ba0092b2c55f6a52d16294a8a698edd netfilter: bridge:
forward IPv6 fragmented packets introduced a new function
br_validate_ipv6 which take a reference on the inet6 device. Although
(addr PAGE_MASK),
ditto
+ DIV_ROUND_UP(len, PAGE_SIZE),
+ paddr_to_pfn(addr PAGE_MASK));
ditto
Other than that:
Reviewed-by: Julien Grall julien.gr...@citrix.com
Regards,
--
Julien Grall
On 06/07/15 12:09, Manish Jaggi wrote:
On Monday 06 July 2015 04:13 PM, Julien Grall wrote:
On 05/07/15 06:55, Manish Jaggi wrote:
4.3 Hypercall for bdf mapping notification to xen
---
#define PHYSDEVOP_map_sbdf 43
typedef struct
wrote:
On Tue, 2015-06-23 at 15:32 +0100, Julien Grall wrote:
[...]
+{
+struct its_collection *col;
+struct its_device *its_dev = get_irq_device(desc);
+u8 *cfg;
+u32 virq = irq_to_virq(desc);
+
+ASSERT(virq its_dev-nr_lpis);
+
+cfg = gic_rdists-prop_page
don't use their
second argument.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
For the ARM bits:
Reviewed-by: Julien Grall julien.gr...@citrix.com
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http
On 03/07/15 11:33, Ian Campbell wrote:
On Thu, 2015-07-02 at 11:37 +0100, Julien Grall wrote:
On 01/07/15 12:00, Julien Grall wrote:
Hi all,
Hi Ian,
This patch series adds support for GICv2 on GICv3. This feature is available
only when the GICv3 hardware is compatible with GICv2.
When
Hi Ian,
On 03/07/15 11:59, Ian Campbell wrote:
On Fri, 2015-06-26 at 19:56 +0200, Julien Grall wrote:
I forgot to mention in the previous version that we need to give iomem
permission to the guest. Otherwise DOM0 won't be able to map the BAR
into the guest.
This boils down to a call
On 03/07/15 11:56, Ian Campbell wrote:
On Fri, 2015-07-03 at 11:47 +0100, Ian Campbell wrote:
On Fri, 2015-06-26 at 20:08 +0200, Julien Grall wrote:
Hi Ian,
On 08/05/2015 13:27, Ian Campbell wrote:
This provides specific handlers for the PCI bus relating to matching
and translating. It's
A find option was forgotten in commit 6592bf60beaf1fa0b4fd36fb73800eb001c739af
docs: Look for documentation in sub-directories resulting to get some
docs duplicated and other missing.
Signed-off-by: Julien Grall julien.gr...@citrix.com
---
docs/Makefile | 4 ++--
1 file changed, 2 insertions
On 29/06/15 11:50, Ian Campbell wrote:
On Mon, 2015-06-29 at 11:31 +0100, Julien Grall wrote:
Hi Manish,
On 28/06/15 19:38, Manish Jaggi wrote:
4.1 Holes in guest memory space
Holes are added in the guest memory space for mapping pci device's BAR
regions
Hi Ian,
On 30/06/15 13:45, Ian Campbell wrote:
On Fri, 2015-06-26 at 10:34 +0100, Julien Grall wrote:
The function vgic_vN_init only calls register_vgic_ops. As it will never
contain anything else, domain initialization code should be in the
callback domain_init, remove them and directly use
Hi Andrew,
On 30/06/15 13:35, Andrew Cooper wrote:
On 30/06/15 13:22, Julien Grall wrote:
A find option was forgotten in commit
6592bf60beaf1fa0b4fd36fb73800eb001c739af
docs: Look for documentation in sub-directories resulting to get some
docs duplicated and other missing.
Signed-off
Hi Ian,
On 30/06/15 13:59, Ian Campbell wrote:
On Fri, 2015-06-26 at 10:34 +0100, Julien Grall wrote:
Currently, it's hard to decide whether a part of the domain
initialization should live in gicv_setup (part of the GIC
driver) and domain_init (part of the vGIC driver).
The code
, the max number of CPU
+ * that can be supported is up to 4096(256*16) in theory.
+ */
+#define GICV3_MAX_CPUS 4096
+
As you did for GICv2, please remove the define and opencode the value
below. You can move the comment on top of the field assignation.
Regards,
--
Julien Grall
vcpu
number.
Signed-off-by: Chen Baozi baoz...@gmail.com
Acked-by: Ian Campbell ian.campb...@citrix.com
Reviewed-by: Julien Grall julien.gr...@citrix.com
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org
(---) until we agreed on what to do.
Regards,
[1] http://lists.xen.org/archives/html/xen-devel/2015-06/msg00807.html
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi Vijay,
On 22/05/2015 13:16, Vijay Kilari wrote:
On Tue, May 19, 2015 at 7:21 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2015-05-19 at 14:37 +0100, Julien Grall wrote:
Hi Ian,
On 19/05/15 13:10, Ian Campbell wrote:
On Fri, 2015-05-15 at 15:55 +0100, Julien Grall wrote
, target_cpu is a CPUID which is a MPIDR-like value.
If so, I think we may need to call vaffinity_to_vcpuid.
But, I wasn't able to confirm with the spec. I guessed it from the Linux
usage. Maybe there is limit of number of CPU used with PSCI 0.1?
Regards,
--
Julien Grall
Hi Chen,
On 25/05/2015 03:01, Chen Baozi wrote:
On Sat, May 23, 2015 at 03:46:32PM +0100, Julien Grall wrote:
On 23/05/2015 14:52, Chen Baozi wrote:
From: Chen Baozi baoz...@gmail.com
GIC-500 supports up to 128 cores in a single SoC. Increase MAX_VIRT_CPUS
to 128 on arm64.
This series have
Hi Chen,
On 25/05/2015 04:34, Chen Baozi wrote:
On Sun, May 24, 2015 at 01:51:21PM +0100, Julien Grall wrote:
@@ -80,9 +72,7 @@ static struct vcpu *vgic_v3_get_target_vcpu(struct vcpu *v,
unsigned int irq)
ASSERT(spin_is_locked(rank-lock));
-target = rank-v3.irouter[irq % 32
On 25/05/2015 11:06, Vijay Kilari wrote:
On Sun, May 24, 2015 at 4:05 PM, Julien Grall julien.gr...@citrix.com wrote:
1) Command translation:
---
- ITS commands contains device ID, Event ID (vID), Collection ID
(vCID), Target Address (vTA)
parameters
On 25/05/2015 04:09, Chen, Tiejun wrote:
On 2015/5/22 18:33, Julien Grall wrote:
Hi,
On 22/05/2015 10:35, Tiejun Chen wrote:
diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
index 0c0ea4a..203c80e 100644
--- a/xen/include/public/domctl.h
+++ b/xen/include/public
Hi Parth,
On 25/05/2015 07:58, Parth Dixit wrote:
On 24 May 2015 at 13:10, Julien Grall julien.gr...@citrix.com wrote:
On 24/05/2015 08:06, Parth Dixit wrote:
+struct acpi_device_desc {
+/* Device name */
+const char *name;
+/* Device class
Hi,
On 25/05/2015 12:50, Chen, Tiejun wrote:
On 2015/5/25 18:02, Julien Grall wrote:
On 25/05/2015 04:09, Chen, Tiejun wrote:
On 2015/5/22 18:33, Julien Grall wrote:
Hi,
On 22/05/2015 10:35, Tiejun Chen wrote:
diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
index
Hi,
On 25/05/2015 12:40, Vijay Kilari wrote:
On Mon, May 25, 2015 at 3:02 PM, Julien Grall
julien.grall@gmail.com wrote:
On 25/05/2015 11:06, Vijay Kilari wrote:
On Sun, May 24, 2015 at 4:05 PM, Julien Grall julien.gr...@citrix.com
wrote:
1) Command translation
Hi,
On 25/05/2015 15:38, Vijay Kilari wrote:
On Mon, May 25, 2015 at 6:14 PM, Julien Grall julien.gr...@citrix.com wrote:
AFAIU your proposal, the function mapping(vCID) will always return the same
pCID, right?
Yes, vCID to pCID is mapped
But how? Let say we have a function vCID_to_pCID
to change the way to do it
later.
Signed-off-by: Julien Grall julien.gr...@citrix.com
Cc: Chen Baozi c...@baozis.org
---
xen/arch/arm/vgic-v3.c | 100 ++---
1 file changed, 36 insertions(+), 64 deletions(-)
diff --git a/xen/arch/arm/vgic-v3.c b/xen/arch/arm
Hi,
On 22/05/2015 01:38, Julien Grall wrote:
Currently, the grant table region is hardcoded per-platform. When a new
board is coming up, we have to check the spec in order to find a space
in the memory layout free. Depending on the platform it may be tedious.
A good candidate for the gnttab
is responible, given we don't
migrate on ARM, which would seem to point to the ticket locks...
The test is still failing on the latest flight [1]. Any update on this
issue?
Regards,
[1] http://logs.test-lab.xenproject.org/osstest/logs/57271/
--
Julien Grall
Hi Ian,
On 26/05/2015 11:17, Ian Campbell wrote:
On Tue, 2015-05-26 at 11:11 +0200, Julien Grall wrote:
Hi,
On 20/05/2015 11:56, Ian Campbell wrote:
On Wed, 2015-05-20 at 09:34 +, osstest service user wrote:
flight 56759 xen-unstable real [real]
http://logs.test-lab.xenproject.org
message and can
not login to Dom0. Please note that typed characters (from my host to the
console) do not apper on the console. Any hint please?
You have to tell to Ubuntu which console is used. See:
http://blog.bigsmoke.us/2011/03/18/getting-a-xen-hvc0-on-a-stock-ubuntu
Regards,
--
Julien
#define asmlinkage /* Nothing needed */
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi Chen,
On 23/05/2015 14:52, Chen Baozi wrote:
From: Chen Baozi baoz...@gmail.com
Currently it only supports up to 8 vCPUs. Increase the region to hold
up to 128 vCPUs, which is the maxium number that GIC-500 supports.
Signed-off-by: Chen Baozi baoz...@gmail.com
Reviewed-by: Julien Grall
);
+vaff |= ((vcpuid 4) 0xff) MPIDR_LEVEL_SHIFT(1);
s/0xff/MPIDR_LEVEL_MASK/
+
+return vaff;
+}
+
#endif /* __ASM_DOMAIN_H__ */
/*
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen
will always reside to the RAM?
I already asked the same question on the previous version but got no
answer from you...
I did not found any document which says it will always reside in RAM or
otherwise..
If so, you have use vmap or ioremap_cache as suggested by Jan.
Regards,
--
Julien Grall
of the fields) are device agnostic.
If you prefix the DT callback by dt_ (or smth else), there would be
confusion and a smaller code.
Anyway, I will let Ian and Stefano gives their opinion on it.
Regards,
--
Julien Grall
___
Xen-devel mailing list
On 24/05/2015 08:07, Parth Dixit wrote:
On 21 May 2015 at 16:58, Julien Grall julien.gr...@citrix.com
mailto:julien.gr...@citrix.com wrote:
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
Rename dt-uart.c to arm-uart.c and create new generic uart init function.
move
please, in favor of any custom tables.
It would still be necessary to expose the event channel, grant table
region...
Sure, but once you know you run on Xen you could retrieve it via
hypercall if there's no other means.
Good point.
Regards,
--
Julien Grall
void.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
doesn't belong to this patch. I will review it when it will be
placed in the right patch.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
(13) /* Ditto, except that the MSB is cleared. */
#define SERHND_COOKED (14) /* Newline/carriage-return translation?*/
+#define SERHND_UART (00) /* handler configured from ACPI */
Why did you introduce a new SERHND rather than renaming SERHND_DTUART?
Regards,
--
Julien Grall
)
dt_device_set_used_by(node, DOMID_XEN);
}
+void __init gic_preinit(void)
+{
+dt_gic_preinit();
+}
+
/* Set up the GIC */
void __init gic_init(void)
{
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel
exposing start_info to ARM. I don't
exactly remember which one. I will let Ian, Stefano answer to this.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
(...)
DT_INIT(...)
ACPI_INIT(...)
DEVICE_END
And ACPI_INIT will be a no-op when CONFIG_ACPI is not enabled.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
.
If at all possible - yes please, in favor of any custom tables.
It would still be necessary to expose the event channel, grant table
region...
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
This function is ARM specific. It's has been added by mistake in the
common code.
Signed-off-by: Julien Grall julien.gr...@citrix.com
---
xen/include/asm-arm/time.h | 2 ++
xen/include/xen/time.h | 1 -
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/include/asm-arm/time.h
On 21/05/15 15:13, Ian Campbell wrote:
On Wed, 2015-05-20 at 13:59 +0100, Julien Grall wrote:
[...]
From d4f0ea84f26649b61bc6afb550348069b71d41c5 Mon Sep 17 00:00:00 2001
From: Julien Grall julien.gr...@linaro.org
Date: Tue, 17 Mar 2015 17:58:14 +
Subject: [PATCH] tools/libxl: Check
On 32bit, GB(4) doesn't fit on an unsigned long.
Alos, fix a couple of printf format in x86 which breaks after using
unsigned long long.
Signed-off-by: Julien Grall julien.gr...@citrix.com
---
xen/arch/x86/apic.c | 2 +-
xen/arch/x86/io_apic.c | 2 +-
xen/include/xen/config.h | 2 +-
3
don't think this is a big deal as device may not
work and/or the RAM is too high due to the 1:1 mapping.
This patch also drop the platforms thunderx and xilinx-zynqmp which became
dummy by dropping the hardcoding DOM0 grant table region.
Signed-off-by: Julien Grall julien.gr...@citrix.com
On 32bit, GB(4) doesn't fit on an unsigned long. Modify MB to avoid
further issue.
Also, fix a couple of printf format in x86 which breaks after using
unsigned long long.
Signed-off-by: Julien Grall julien.gr...@citrix.com
---
Changes in v2:
- Use %Lx rather than %llx
- Use
-console_mfn, state-store_domid,
regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
).
Because I haven't had any problem with MB. I will resend a new version
with the 2 fixes.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
this value for DT neither in the toolstack (see
xc_assign_dt_device) and Xen. Please add a comment saying it's only used
by PCI and/or the value should always be XEN_DOMCTL_DEV_NO_RDM for DT.
Regards,
--
--
Julien Grall
___
Xen-devel mailing list
Xen
Hi Vijay,
On 22/05/15 13:16, Vijay Kilari wrote:
On Tue, May 19, 2015 at 7:21 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2015-05-19 at 14:37 +0100, Julien Grall wrote:
Hi Ian,
On 19/05/15 13:10, Ian Campbell wrote:
On Fri, 2015-05-15 at 15:55 +0100, Julien Grall wrote
On 22/05/15 14:58, Vijay Kilari wrote:
On Fri, May 22, 2015 at 6:19 PM, Julien Grall julien.gr...@citrix.com wrote:
1) Command translation:
---
- ITS commands contains device ID, Event ID (vID), Collection ID
(vCID), Target Address (vTA)
parameters
On 19/05/15 12:03, Ian Campbell wrote:
On Tue, 2015-05-19 at 11:39 +0100, Julien Grall wrote:
Hi,
On 13/05/2015 19:33, Julien Grall wrote:
+#ifndef LIBXL_LIBFDT_COMPAT_H
+#define LIBXL_LIBFDT_COMPAT_H
+
+#if !HAVE_DECL_FDT_FIRST_SUBNODE
+int fdt_first_subnode(const void *fdt, int offset
an INVALL.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 20/05/15 09:26, Wei Liu wrote:
On Tue, May 19, 2015 at 11:56:39PM +0100, Julien Grall wrote:
diff --git a/drivers/net/xen-netback/common.h
b/drivers/net/xen-netback/common.h
index 0eda6e9..c2a5402 100644
--- a/drivers/net/xen-netback/common.h
+++ b/drivers/net/xen-netback/common.h
On 19/05/15 23:56, Julien Grall wrote:
If you're wgetting from another host, I would suggest wgetting from Dom0
to limit the problem between Dom0 and DomU.
Thanks to Wei, I was able to narrow the problem. It looks like the
problem is not coming from netback but somewhere else down
On 20/05/15 15:56, Roger Pau Monné wrote:
El 20/05/15 a les 15.21, Julien Grall ha escrit:
Hi,
On 20/05/15 14:10, Bob Liu wrote:
---
drivers/block/xen-blkback/blkback.c | 12
drivers/block/xen-blkback/common.h | 3 +-
drivers/block/xen-blkback/xenbus.c | 85
be bigger
without any issue. The OS will know the end of the region with
GICR_TYPER.Last.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
);
if (res) return res;
-res = fdt_property_regs(gc, fdt, 1, 0, 1, (uint64_t)i);
+res = fdt_property_regs(gc, fdt, 1, 0, 1, cpu_id);
if (res) return res;
res = fdt_end_node(fdt);
Regards,
--
Julien Grall
___
Xen-devel
SGI_TARGET_LIST).
Overall this should be done in vgic_v3_to_sgi by setting the correct bit
in vcpu_mask. Although this will require to find another type for
vcpu_mask as it's only able to store 64 cpus.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen
is edge? Shouldn't we
just avoid to configure it?
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
something?
Where did you get the filesystem? Did you look if they provide
instruction to log in?
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
= fdt_property_cell(fdt, reg, cpu);
+res = fdt_property_cell(fdt, reg, cpu_id);
if ( res )
return res;
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
your own
password. You are the only one to know it...
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 24/05/2015 09:16, Parth Dixit wrote:
On 21 May 2015 at 17:11, Julien Grall julien.gr...@citrix.com
mailto:julien.gr...@citrix.com wrote:
On 21/05/15 12:38, Jan Beulich wrote:
On 21.05.15 at 12:52, julien.gr...@citrix.com
mailto:julien.gr...@citrix.com wrote:
On 21/05/15 11
.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
in the configuration file the
preferred version (currently only GICv2 and GICv3 are supported).
Signed-off-by: Julien Grall julien.gr...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Wei Liu wei.l...@citrix.com
---
The hypervisor will check if the GIC is able to virtualize the
version
for vGICv2. The interrupt is always
injected with group0.
* Add a comment explaining why Group1 is used for vGICv3.
Signed-off-by: Julien Grall julien.gr...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
I haven't address the request from Ian to not use the R/M/W idiom
This will reflect that we effectively emulate the same version as the
hardware GIC for the guest.
Signed-off-by: Julien Grall julien.gr...@citrix.com
Acked-by: Ian Campbell ian.campb...@citrix.com
---
Changes in v5:
- Typo
- Add Ian's ack
Changes in v4:
- Patch
changes see in each patch.
Sincerely yours,
Julien Grall (3):
xen/arm: Rename XEN_DOMCTL_CONFIG_GIC_DEFAULT to
XEN_DOMCTL_CONFIG_GIC_NATIVE
arm: Allow the user to specify the GIC version
xen/arm: gic-v3: Add support of vGICv2 when available
docs/man/xl.cfg.pod.5 | 34
string)
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Hi Manish,
On 07/07/2015 08:10, Manish Jaggi wrote:
On Monday 06 July 2015 05:15 PM, Julien Grall wrote:
On 06/07/15 12:09, Manish Jaggi wrote:
On Monday 06 July 2015 04:13 PM, Julien Grall wrote:
On 05/07/15 06:55, Manish Jaggi wrote:
4.3 Hypercall for bdf mapping notification to xen
the extension
more error-prone. FYI, we use 4 arguments for vgic_v3_hw_setup too.
Furthermore, you can't validate properly the field unless even if you
assume that the guest will zeroed the structure before passing it.
Regards,
--
Julien Grall
___
Xen
);
+if (rc 0)
#endif
rc = kernel_uimage_probe(info, start, size);
if (rc 0)
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
on the hardware handling misalignment:
58bbe7d71239db508c30099bf7b6db7c458f3336 xen: arm64: disable
alignment traps
IIRC, the unaligned access on ARM processor tend to be slow. I
remembered to read an article about it a couple of years ago.
Regards,
--
Julien Grall
1301 - 1400 of 6489 matches
Mail list logo