Implement the callback function to handle unrecoverable AER errors, and
also the public APIs that can be used to register/unregister the handler.
When an AER error occurs, the handler will forcibly remove the erring
PCIe device from the guest.
Signed-off-by: Venu Busireddy
When a guest is created, register the AER event handler to handle the
AER errors. When an AER error occurs, the handler will forcibly remove
the erring PCIe device from the guest.
Signed-off-by: Venu Busireddy
Signed-off-by: Wim Ten Have
---
flight 120685 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120685/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 120679
build-armhf
On 13/03/18 17:08, Wei Liu wrote:
> On Wed, Feb 21, 2018 at 03:08:23PM +0100, Juergen Gross wrote:
>> Creating a new domain currently is a sequence of hypercalls with many of
>> those being mandatory and needed in a specific sequence. Its has been
>> discussed before to build a new interface for
This patch set is part of a set of patches that together allow containment
of unrecoverable AER errors from PCIe devices assigned to guests in
passthrough mode. The containment is achieved by forcibly removing the
erring PCIe device from the guest.
The original xen-pciback patch corresponding to
>>> On 13.03.18 at 05:43, wrote:
> The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
> uninitialized in main_vdisplattach().
>
> Signed-off-by: Doug Goldstein
> ---
> CC: Oleksandr Grytsov
> ---
>
>>> On 12.03.18 at 14:10, wrote:
> BTW: are you already working on rebasing your XPTI speed up series to
> current staging? I'd like my series to use your series as a base unless
> you are telling me you won't be able to resend your series soon.
Coming back to my reply here
>>> On 12.03.18 at 16:00, wrote:
> Patch ping. Jan, I would like to touch base once more to see if we can
> get this patch included in 4.11. The patch as-is correctly tells the
> difference between buffers provided by both an EFI shell or by the
> firmware as an
On 13/03/2018 10:22, Jan Beulich wrote:
On 13.03.18 at 10:48, wrote:
>> On 13/03/18 10:35, Jan Beulich wrote:
>> On 13.03.18 at 10:27, wrote:
On 13/03/18 09:07, Jan Beulich wrote:
On 12.03.18 at 14:10, wrote:
>> BTW:
flight 120480 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120480/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale broken
test-amd64-amd64-qemuu-nested-intel 14
Hi,
On 03/12/2018 08:26 AM, Oleksandr Andrushchenko wrote:
On 03/11/2018 10:15 AM, Takashi Iwai wrote:
Hi,
sorry for the long latency.
Hi, no problem, thank you
On Wed, 07 Mar 2018 09:49:24 +0100,
Oleksandr Andrushchenko wrote:
Suppose that we negotiate from the frontend to the backend
flight 120486 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120486/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 10 redhat-install fail REGR. vs. 120276
On 13/03/18 09:07, Jan Beulich wrote:
On 12.03.18 at 14:10, wrote:
>> BTW: are you already working on rebasing your XPTI speed up series to
>> current staging? I'd like my series to use your series as a base unless
>> you are telling me you won't be able to resend your
>>> On 11.03.18 at 16:26, wrote:
>> -Original Message-
>> From: George Dunlap [mailto:george.dun...@citrix.com]
>> Sent: 09 March 2018 18:04
>> To: xen-devel@lists.xenproject.org
>> Cc: George Dunlap ; Ian Jackson
>>
On Tue, Mar 06, 2018 at 03:56:58PM +, Ian Jackson wrote:
> Roger Pau Monné writes ("Re: [PATCH] libxl/pvh: force PVH guests to use the
> xenstore shutdown"):
> > On Tue, Dec 19, 2017 at 02:48:47PM +, Ian Jackson wrote:
> > > I think this is a candidate for backporting as far as 4.9 ?
> >
On Mon, Mar 12, 2018 at 04:45:51PM +0100, Olaf Hering wrote:
> The usage of DEBUG_DIR breaks OVMF build. Rename it to XEN_DEBUG_DIR.
>
> The default DEBUG_DIR=/usr/lib/debug can not be used for rpm builds
> because that directory is "owned" by rpm-packaging itself to store the
> autogenerated
On 12/03/18 19:35, Michael Young wrote:
Here is version 4 of the patch where I have replaced the uses of s with b
where the patch changes it from string to bytes. I have also removed the
two trailing spaces and changed stmp back to s.
Michael Young
On Mon, Mar 12, 2018 at 11:06:51PM -0500, Doug Goldstein wrote:
> When building debug use -Og as the optimization level if its available,
> otherwise retain the use of -O0. -Og has been added by GCC to enable all
> optimizations that to not affect debugging while retaining full
> debugability.
>
flight 120487 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120487/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-amd 10 redhat-install fail REGR. vs. 120260
Tests which did not
On 13/03/2018 10:13, Jan Beulich wrote:
> The respective MSRs are write-only, and hence attempts by guests to
> write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong
> impression of WRMSR succeeding") no longer ignored. Restore original
> behavior for the two affected MSRs.
>
>
Handle a new parameter of an existing QMP command. See patch 2 (libxl_qmp: Tell
QEMU about live migration or snapshot) for more information.
Anthony PERARD (2):
libxl: Add a version check of QEMU for QMP commands
libxl_qmp: Tell QEMU about live migration or snapshot
>>> On 12.03.18 at 13:09, wrote:
> On 03/11/2018 08:29 PM, Stefano Stabellini wrote:
>> On Fri, 9 Mar 2018, George Dunlap wrote:
>>> All this information is now covered in SUPPORT.md.
>>>
>>> Most of the emulated hardware is obvious a couple of the items are
>>> worth
>>> On 13.03.18 at 10:27, wrote:
> On 13/03/18 09:07, Jan Beulich wrote:
> On 12.03.18 at 14:10, wrote:
>>> BTW: are you already working on rebasing your XPTI speed up series to
>>> current staging? I'd like my series to use your series as a base unless
>>>
On 13/03/18 10:35, Jan Beulich wrote:
On 13.03.18 at 10:27, wrote:
>> On 13/03/18 09:07, Jan Beulich wrote:
>> On 12.03.18 at 14:10, wrote:
BTW: are you already working on rebasing your XPTI speed up series to
current staging? I'd like my
>>> On 13.03.18 at 10:48, wrote:
> On 13/03/18 10:35, Jan Beulich wrote:
> On 13.03.18 at 10:27, wrote:
>>> On 13/03/18 09:07, Jan Beulich wrote:
>>> On 12.03.18 at 14:10, wrote:
> BTW: are you already working on rebasing your XPTI
flight 120514 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120514/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539
Tests which are
On 03/13/2018 04:43 AM, Doug Goldstein wrote:
> The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
> uninitialized in main_vdisplattach().
>
> Signed-off-by: Doug Goldstein
It looks like that was designed on purpose to use the uninitialized
warnings to
Since version 2.10, QEMU will lock the disk images so a second QEMU
instance will not try to open it. This would prevent live migration from
working correctly. A new parameter as been added to the QMP command
"xen-save-devices-state" in QEMU version 2.11 which allow to unlock the
disk image for a
On connection to QEMU via QMP, the version of QEMU is provided, store it
for later use.
Add a function qmp_qemu_check_version that can be used to check if QEMU
is new enough for certain fonctionnality. This will be used in a moment.
As it's a static function, it is commented out until first use,
flight 120496 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120496/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 120326
test-armhf-armhf-libvirt 14
The subject line says to expect 30 patches, but you've only sent 18 to
the list here. I eventually figured out that the first 12 patches were
in Xen code and so not sent to qemu-devel.
For future if you have changes that affect multiple completely separate
projects, send them as separate series.
The respective MSRs are write-only, and hence attempts by guests to
write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong
impression of WRMSR succeeding") no longer ignored. Restore original
behavior for the two affected MSRs.
Signed-off-by: Jan Beulich
---
On Tue, Mar 13, 2018 at 10:03 AM, Jan Beulich wrote:
> >>> On 13.03.18 at 05:43, wrote:
> > The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
> > uninitialized in main_vdisplattach().
> >
> > Signed-off-by: Doug Goldstein
On Tue, Mar 13, 2018 at 09:37:55PM +1000, Alexey G wrote:
> On Tue, 13 Mar 2018 09:21:54 +
> Daniel P. Berrangé wrote:
>
> >The subject line says to expect 30 patches, but you've only sent 18 to
> >the list here. I eventually figured out that the first 12 patches were
>
branch xen-unstable
xenbranch xen-unstable
job build-amd64-rumprun
testid rumprun-build
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: rumprun https://github.com/rumpkernel/rumprun
Tree: rumprun_buildrumpsh
On Fri, Mar 09, 2018 at 01:18:39PM +, Andrew Cooper wrote:
> Neither domcr_flags nor config are used on either side. Drop them, making
> {hvm,pv}_domain_initialise() symmetric with all the other domain/vcpu
> initialise/destroy calls.
>
> Signed-off-by: Andrew Cooper
>>> On 09.03.18 at 19:03, wrote:
> QEMU supports various image formats, but we only provide security
> support for raw, qcow, qcow2, and vhd formats.
>
> Rather than duplicate this information under the "x86/Emulated
> storage" section, just refer to the "Blkback"
On Mon, Mar 05, 2018 at 08:43:48AM -0600, Doug Goldstein wrote:
> On 3/2/18 5:29 AM, Jan Beulich wrote:
> On 02.03.18 at 12:09, wrote:
> >> On Thu, Mar 01, 2018 at 05:01:55PM +, Roger Pau Monné wrote:
> >>> On Thu, Mar 01, 2018 at 04:01:23PM +, Wei Liu wrote:
>
On Fri, Mar 02, 2018 at 12:54:29PM -0800, Maran Wilson wrote:
> The start info structure that is defined as part of the x86/HVM direct boot
> ABI and used for starting Xen PVH guests would be more versatile if it also
> included a way to pass information about the memory map to the guest. This
>
On Tue, 13 Mar 2018 09:21:54 +
Daniel P. Berrangé wrote:
>The subject line says to expect 30 patches, but you've only sent 18 to
>the list here. I eventually figured out that the first 12 patches were
>in Xen code and so not sent to qemu-devel.
>
>For future if you have
On Tue, Mar 13, 2018 at 04:34:01AM +1000, Alexey Gerasimenko wrote:
> Current Xen/QEMU method to control Xen Platform device on i440 is a bit
> odd -- enabling/disabling Xen platform device actually modifies the QEMU
> emulated machine type, namely xenfv <--> pc.
>
> In order to avoid multiplying
>>> On 13.03.18 at 11:36, wrote:
> On 13/03/2018 10:13, Jan Beulich wrote:
>> The respective MSRs are write-only, and hence attempts by guests to
>> write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong
>> impression of WRMSR succeeding") no longer
Hi,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Rename the menu text to Errata Workarounds. Subsequent patches will
add config options for SoC specific erratas.
Well, your SoC is an Arm SoC, right? So what is the benefits of this new
On Fri, Mar 09, 2018 at 01:18:40PM +, Andrew Cooper wrote:
> The only relevent initialisation for the idle domain is the context switch and
^ relevant
> poisoned pointers. Collect these bits together early in the function and exit
> when complete (although as a consequence, the
Now that we zero all registers early on all entry paths, use that to
avoid a couple of immediates here.
Signed-off-by: Jan Beulich
---
We may want to consider eliminating a few more $0 this way. But
especially for byte ones I'm not sure it's worth it, due to the REX
prefix the
Hi,
title: "arm64: ...".
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Enable trapping for Group1 register access when
CONFIG_CAVIUM_ERRATUM_30115 is enabled.
This is really odd to enable group1 trapping before the sysreg are
actually
On Fri, Mar 09, 2018 at 01:18:42PM +, Andrew Cooper wrote:
> The share_xen_page_with_guest() functions are used by common code, and are
> implemented the same by each arch. Move the declarations into the common mm.h
> rather than duplicating them in each arch/mm.h
>
> Turn an int readonly
From: Oleksandr Andrushchenko
Introduce skeleton of the para-virtualized Xen display
frontend driver. This patch only adds required
essential stubs.
Signed-off-by: Oleksandr Andrushchenko
---
drivers/gpu/drm/Kconfig
Use the respective ARCH_CAPABILITIES MSR bit, but don't expose the MSR
to guests yet.
Signed-off-by: Jan Beulich
Tested-by: Juergen Gross
Reviewed-by: Juergen Gross
---
v3: Re-base.
v2: New.
--- a/tools/libxl/libxl_cpuid.c
+++
At the same time also report the state of the two defined
ARCH_CAPABILITIES MSR bits. To avoid further complicating the
conditional around that printk(), drop it (it's a debug level one only
anyway).
Signed-off-by: Jan Beulich
Tested-by: Juergen Gross
Its as_max() invocation was wrongly parenthesized.
Signed-off-by: Jan Beulich
---
v3: New.
--- a/xen/include/asm-x86/alternative.h
+++ b/xen/include/asm-x86/alternative.h
@@ -54,8 +54,8 @@ extern void alternative_instructions(voi
#define OLDINSTR_2(oldinstr, n1, n2)
Subsequent changes require this (too wide anyway imo) dependency to be
dropped.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/boot/head.S
+++ b/xen/arch/x86/boot/head.S
@@ -5,6 +5,7 @@
#include
#include
#include
+#include
#include
#include
#include
---
On Tue, Mar 13, 2018 at 10:56:35AM +, George Dunlap wrote:
> On 03/13/2018 04:43 AM, Doug Goldstein wrote:
> > The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
> > uninitialized in main_vdisplattach().
> >
> > Signed-off-by: Doug Goldstein
>
> It
Hi,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Some Cavium Thunder CPUs suffer a problem where a KVM guest may
inadvertently cause the host kernel to quit receiving interrupts.
This patch adds CONFIG_CAVIUM_ERRATUM_30115. Subsequent patches
On 13/03/18 12:34, Sander Eikelenboom wrote:
> On 12/03/18 21:04, Boris Ostrovsky wrote:
>> On 03/12/2018 03:05 PM, Andrew Cooper wrote:
>>> On 10/03/18 16:27, Andrew Cooper wrote:
On 10/03/2018 16:14, Sander Eikelenboom wrote:
> Hi Andrew,
>
> It seems commit "x86/pv: Drop
1: NOP out most XPTI entry/exit code when it's not in use
2: disable XPTI when RDCL_NO
3: x86: log XPTI enabled status
4: use %r12 to write zero into xen_cr3
5: reduce .text.entry
6: avoid double CR3 reload when switching to guest user mode
Signed-off-by: Jan Beulich
Introduce a synthetic feature flag to use alternative instruction
patching to NOP out all code on entry/exit paths. Having NOPs here is
generally better than using conditional branches.
Also change the limit on the number of bytes we can patch in one go to
that resulting from the encoding in
Both replace 6 instructions by a single one, further reducing code size,
cache, and TLB footprint (in particular on systems supporting BMI2).
Signed-off-by: Jan Beulich
---
v2: Avoid quoted symbols; use gcc's new V operand modifier instead.
Re-base.
---
This allows to fold 5 instructions into a single one, reducing code size
quite a bit, especially when not considering the fallback functions
(which won't ever need to be brought into iCache or their mappings into
iTLB on systems supporting BMI2).
Make use of gcc's new V operand modifier, even if
Am Tue, 13 Mar 2018 11:56:51 +
schrieb Roger Pau Monné :
> Do you think that would solve your issues?
This will most likely work, yes. Thanks.
Olaf
pgpOkexrAA35u.pgp
Description: Digitale Signatur von OpenPGP
___
Xen-devel
From: Oleksandr Andrushchenko
Initial handling for Xen bus states: implement
Xen bus state machine for the frontend driver according to
the state diagram and recovery flow from display para-virtualized
protocol: xen/interface/io/displif.h.
Signed-off-by:
From: Oleksandr Andrushchenko
Implement GEM handling depending on driver mode of operation:
depending on the requirements for the para-virtualized environment, namely
requirements dictated by the accompanying DRM/(v)GPU drivers running in both
host and guest
From: Oleksandr Andrushchenko
Handle Xen event channels:
- create for all configured connectors and publish
corresponding ring references and event channels in Xen store,
so backend can connect
- implement event channels interrupt handlers
- create
From: Oleksandr Andrushchenko
Implement shared buffer handling according to the
para-virtualized display device protocol at xen/interface/io/displif.h:
- handle page directories according to displif protocol:
- allocate and share page directories
-
From: Oleksandr Andrushchenko
Hello!
This patch series adds support for Xen [1] para-virtualized
frontend display driver. It implements the protocol from
include/xen/interface/io/displif.h [2].
Accompanying backend [3] is implemented as a user-space application
From: Oleksandr Andrushchenko
Read configuration values from Xen store according
to xen/interface/io/displif.h protocol:
- read connector(s) configuration
- read buffer allocation mode (backend/frontend)
Signed-off-by: Oleksandr Andrushchenko
1: remove page.h and processor.h inclusion from asm_defns.h
2: x86: fix OLDINSTR_2()
3: use PDEP for PTE flags insertion when available
4: use PDEP/PEXT for maddr/direct-map-offset conversion when available
5: use PDEP/PEXT for PFN/PDX conversion when available
6: use MOV for PFN/PDX conversion
... and (of course) also maddr / direct-map-offset ones.
Most x86 systems don't actually require the use of PDX compression. Now
that we have patching for the conversion code in place anyway, extend it
to use simple MOV when possible. Introduce a new pseudo-CPU-feature to
key the patching off of.
Both replace 6 instructions by a single one, further reducing code size,
cache, and TLB footprint (in particular on systems supporting BMI2).
Signed-off-by: Jan Beulich
---
v2: Avoid quoted symbols; use gcc's new V operand modifier instead.
Re-base.
---
On Tue, Mar 13, 2018 at 10:31:20AM +, Roger Pau Monné wrote:
> On Mon, Mar 05, 2018 at 08:43:48AM -0600, Doug Goldstein wrote:
> > On 3/2/18 5:29 AM, Jan Beulich wrote:
> > On 02.03.18 at 12:09, wrote:
> > >> On Thu, Mar 01, 2018 at 05:01:55PM +, Roger Pau Monné
Hi,
Manish, I don't monitor my linaro email and would appreciate if you use
the e-mail address provided by MAINTAINERS.
Cheers,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
This patchset is a Xen port of Marc's patchset.
arm64: KVM:
This exposes less code pieces and at the same time reduces the range
covered from slightly above 3 pages to a little below 2 of them.
The code being moved is unchanged, except for the removal of trailing
blanks, insertion of blanks between operands, and a pointless q suffix
from "retq".
A few
When XPTI is active, the CR3 load in restore_all_guest is sufficient
when switching to user mode, improving in particular system call and
page fault exit paths for the guest.
Signed-off-by: Jan Beulich
Tested-by: Juergen Gross
Reviewed-by: Juergen Gross
On Tue, Feb 27, 2018 at 01:28:08PM -0800, Stefano Stabellini wrote:
> Add pvcalls support to libxl and xl. Create the appropriate pvcalls
> entries in xenstore.
>
> Signed-off-by: Stefano Stabellini
The code looks fine.
I only want to have a second opinion on
> @@ -829,6
Hi,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Add MIDR values for Cavium ThunderX1 SoC's (88xx, 81xx, 83xx).
Signed-off-by: Manish Jaggi
---
xen/include/asm-arm/processor.h | 9 +
1 file changed, 9
flight 120538 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/120538/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-ws16-amd64 10 windows-install fail REGR. vs. 12
On Mon, Mar 05, 2018 at 11:36:58AM +, Ian Jackson wrote:
> Roger Pau Monne writes ("[PATCH] xl: remove apic option for PVH guests"):
> > XSA-256 forces the local APIC to always be enabled for PVH guests, so
> > ignore any apic option for PVH guests. Update the documentation
> > accordingly.
>
Hi Manish,
On 12/03/18 12:42, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Since this is a SoC errata and trapping of certain group1 registers
should not affect the normal flow. A new file vsysreg_errata.c is added.
Function vgic_v3_handle_cpuif_access is
Hi,
On 12/03/18 16:32, Wei Liu wrote:
On Sun, Mar 11, 2018 at 07:59:16PM +, Julien Grall wrote:
Hi Andrew,
On 03/09/2018 01:18 PM, Andrew Cooper wrote:
ARM guests are HVM and have hardware assisted paging. There are no PV guests
or shadow paging, and all other creation flags are x86
>>> On 07.03.18 at 19:58, wrote:
> @@ -554,13 +551,11 @@ static void update_reference_tsc(struct domain *d,
> bool_t initialize)
> put_page_and_type(page);
> }
>
> -int wrmsr_viridian_regs(uint32_t idx, uint64_t val)
> +int guest_wrmsr_viridian(struct vcpu *v,
>>> On 07.03.18 at 19:58, wrote:
> --- a/xen/arch/x86/msr.c
> +++ b/xen/arch/x86/msr.c
> @@ -185,6 +185,10 @@ int guest_rdmsr(const struct vcpu *v, uint32_t msr,
> uint64_t *val)
> }
>
> /* Fallthrough. */
> +case MSR_XEN_ALT_START ...
>>> On 07.03.18 at 19:58, wrote:
> --- a/xen/include/asm-x86/msr-index.h
> +++ b/xen/include/asm-x86/msr-index.h
> @@ -312,18 +312,21 @@
>
> #define MSR_IA32_TSC_ADJUST 0x003b
>
> -#define MSR_IA32_APICBASE0x001b
> -#define
On Tue, Mar 13, 2018 at 2:13 PM, Wei Liu wrote:
> On Tue, Feb 27, 2018 at 01:28:08PM -0800, Stefano Stabellini wrote:
>> Add pvcalls support to libxl and xl. Create the appropriate pvcalls
>> entries in xenstore.
>>
>> Signed-off-by: Stefano Stabellini
>
Hi,
I got duplicated e-mails on my inbox for this series. Each version have
a different series and all in the same threading.
I have no idea which emails to answer properly. So please do a proper
resend of this series and this time with my correct e-mail address.
Cheers,
On 12/03/18
Hi Doug,
On 13/03/18 03:31, Doug Goldstein wrote:
+# work around https://github.com/moby/moby/issues/10180
+# and install Xen depends
+RUN rpm --rebuilddb && \
+yum -y install \
+yum-plugin-ovl \
+gcc \
+gcc-c++ \
+ncurses-devel \
+zlib-devel \
+
On 03/13/2018 08:09 PM, Julien Grall wrote:
Hi,
I got duplicated e-mails on my inbox for this series. Each version
have a different series and all in the same threading.
I have no idea which emails to answer properly. So please do a proper
resend of this series and this time with my
On 08/03/2018 20:02, Ian Jackson wrote:
> This avoids checkpatch misparsing (as statements) long function
> definitions or declarations, which sometimes start with constructs
> like this:
>
> static inline int xendevicemodel_relocate_memory(
> xendevicemodel_handle *dmod, domid_t domid,
On 3/13/18 3:03 AM, Jan Beulich wrote:
On 13.03.18 at 05:43, wrote:
>> The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc
>> uninitialized in main_vdisplattach().
>>
>> Signed-off-by: Doug Goldstein
>> ---
>> CC: Oleksandr Grytsov
On Tue, Mar 13, 2018 at 09:29:49AM +, Christian Lindig wrote:
> On 12/03/18 19:35, Michael Young wrote:
>
> > Here is version 4 of the patch where I have replaced the uses of s with b
> > where the patch changes it from string to bytes. I have also removed the
> > two trailing spaces and
branch xen-4.9-testing
xenbranch xen-4.9-testing
job test-amd64-amd64-xl-qemut-ws16-amd64
testid windows-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree:
From: Manish Jaggi
Code to query estimated IORT size for hardware domain.
IORT for hardware domain is generated using the requesterid and
deviceid map. Xen code requires the size to be predeterminded.
Signed-off-by: Manish Jaggi
---
From: Manish Jaggi
Structure of Hardware domain's (hwdom) IORT
hwdom's IORT will only have PCIRC nodes and ITS group nodes
in the following order. SMMU nodes as they are hidden from hardware
domain.
[IORT Header]
[ITS Group 1 ]
...
[ITS Group n ]
[PCIRC Node 1]
From: Manish Jaggi
asm-arm/pci.h has an incorrect #ifndef label.
Fixing it to ARM
Signed-off-by: Manish Jaggi
---
xen/include/asm-arm/pci.h | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/xen/include/asm-arm/pci.h
From: Manish Jaggi
Import acpi_iort.h verbatim from linux 4.14
Signed-off-by: Manish Jaggi
---
xen/include/asm-arm/acpi/acpi_iort.h | 57
1 file changed, 57 insertions(+)
diff --git
From: Manish Jaggi
This patch copies the basic code from linux (iort.c) required to parse
IORT and
hooks for iommu configuration and initializes smmu device.
Provides a top level initcall acpi_iort_init which would call
parse_iort (next patch) to parse and prepare the
From: Manish Jaggi
Signed-off-by: Manish Jaggi
---
xen/arch/arm/Kconfig | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index 2782ee6589..d3fbcbcc6f 100644
--- a/xen/arch/arm/Kconfig
+++
From: Manish Jaggi
This patch aims to add the support of IORT in Xen. Below is the list
of major components which this patchset provides.
a. Add support for parsing the IORT
b. Provides API to populate/query requesterid - streamID mappings and
reuqesterid -
From: Manish Jaggi
to_pci_dev for ARM was todo till now.
Provide definition for this macro.
Signed-off-by: Manish Jaggi
---
xen/drivers/passthrough/arm/smmu.c | 3 ++-
xen/include/asm-arm/pci.h | 6 ++
2 files changed, 8
From: Manish Jaggi
Remove the parts of acpi_iort.h which are not required for Xen.
Signed-off-by: Manish Jaggi
---
xen/include/asm-arm/acpi/acpi_iort.h | 10 ++
1 file changed, 2 insertions(+), 8 deletions(-)
diff --git
From: Manish Jaggi
Provide definition for this macro.
Signed-off-by: Manish Jaggi
---
xen/include/xen/pci.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h
index dd5ec43a70..ee1d4dbf93
1 - 100 of 198 matches
Mail list logo