On Tue, 29 Oct 2019, Julien Grall wrote:
> On 28/10/2019 21:43, Stefano Stabellini wrote:
> > On Mon, 28 Oct 2019, Julien Grall wrote:
> >> Hi,
> >>
> >> On 25/10/2019 11:31, Jan Beulich wrote:
> >>> All,
> >>>
> >>> the 4.11
generic as there might be more
> work to dob before interrupts are unmasked in the future.
>
> Fixes: a7898e4c59 ("xen/arm: Add ARCH_WORKAROUND_2 support for guests")
> Reported-by: Andrii Anisov
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> -
also updated accross
> Arm32 and Arm64 to clarify how Xen is dealing with SError generated by
> the guest.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
>
> Changes in v4:
> - Rewording + typo
>
> Changes in v3:
>
+ xen-devel
On Tue, 5 Nov 2019, Stefano Stabellini wrote:
> Actually, pygrub cross-compiles without issues. The cross-compilation
> work-around goes back to 2005 and it probably referred to PowerPC.
>
> Remove the work-around now.
>
> Signed-off-by: Stefano Stabellini
>
Hi Dario,
I just checked and the patch is not in staging yet. Can we please make
sure the patch goes in as soon as possible, given the looming release?
Cheers,
Stefano
-- Forwarded message --
Date: Mon, 28 Oct 2019 11:40:23 -0700 (PDT)
From: Stefano Stabellini
To: Dario
On Wed, 6 Nov 2019, Wei Liu wrote:
> On Tue, Nov 05, 2019 at 03:51:13PM -0800, Stefano Stabellini wrote:
> > Actually, pygrub cross-compiles without issues. The cross-compilation
> > work-around goes back to 2005 and it probably referred to PowerPC.
> >
> >
On Thu, 7 Nov 2019, Wei Liu wrote:
> On Wed, Nov 06, 2019 at 08:10:47AM -0800, Stefano Stabellini wrote:
> > On Wed, 6 Nov 2019, Wei Liu wrote:
> > > On Tue, Nov 05, 2019 at 03:51:13PM -0800, Stefano Stabellini wrote:
> > > > Actually, pygrub cross-compiles without
On Thu, 7 Nov 2019, Lars Kurth wrote:
> Hi all,
>
> I have received informal advice
>
> On 21/10/2019, 06:54, "Artem Mygaiev" wrote:
>
> > Before we ask Xen FuSA contributors to invest in documentation to
> > be presented as legally-valid evidence for certification, we should
> >
Signed-off-by: Stefano Stabellini
CC: jbeul...@suse.com
CC: george.dun...@citrix.com
CC: jul...@xen.org
CC: lars.ku...@citrix.com
CC: andrew.coop...@citrix.com
CC: ian.jack...@eu.citrix.com
CC: konrad.w...@oracle.com
CC: w...@xen.org
---
docs/process/backport-tag.pandoc | 23
On Thu, 7 Nov 2019, Peng Fan wrote:
> The end should be GICD_ISACTIVERN not GICD_ISACTIVER.
>
> Signed-off-by: Peng Fan
Reviewed-by: Stefano Stabellini
Juergen, I think this fix should be in the release (and also
backported to stable trees.)
> ---
> xen/arch/arm/vgic-v3.c |
On Mon, 11 Nov 2019, Lars Kurth wrote:
> On 11/11/2019, 08:12, "George Dunlap" wrote:
>
> On 11/8/19 7:09 PM, Stefano Stabellini wrote:
> > Signed-off-by: Stefano Stabellini
> > CC: jbeul...@suse.com
> > CC: george.dun...@citrix.com
On Sat, 9 Nov 2019, Julien Grall wrote:
> On Sat, 9 Nov 2019, 04:27 Stefano Stabellini, wrote:
> On Thu, 7 Nov 2019, Peng Fan wrote:
> > The end should be GICD_ISACTIVERN not GICD_ISACTIVER.
> >
> > Signed-off-by: Peng Fan
>
> R
up.
>
> Finally, correct all the comments which which were found by sed.
>
> Signed-off-by: Andrew Cooper
Acked-by: Stefano Stabellini
Tested-by: Stefano Stabellini
> ---
> CC: Jan Beulich
> CC: Wei Liu
> CC: Roger Pau Monné
> CC: Stefano Stabellini
> CC: Ju
On Wed, 6 Nov 2019, Jan Beulich wrote:
> On 06.11.2019 10:19, Andrii Anisov wrote:
> > --- a/xen/include/asm-arm/smccc.h
> > +++ b/xen/include/asm-arm/smccc.h
> > @@ -120,6 +120,8 @@ struct arm_smccc_res {
> > #define __constraint_read_6 __constraint_read_5, "r" (r6)
> > #define __constraint_read
On Wed, 6 Nov 2019, Andrii Anisov wrote:
> From: Andrii Anisov
>
> Also armclang complains about the condition always true,
> because `sgi` is of type enum with all its values under 16.
>
> Signed-off-by: Andrii Anisov
Although I am not completely opposed to this, given the choice I would
pref
On Wed, 6 Nov 2019, Andrii Anisov wrote:
> From: Andrii Anisov
>
> ARM Compiler 6 has a proven bug: it compiles data only C files with
> SoftVFP attributes. This leads to a failed linkage afterwards with
> an error:
>
> Error: L6242E: Cannot link object built_in.o as its attributes are
> incomp
On Wed, 6 Nov 2019, Andrii Anisov wrote:
> From: Andrii Anisov
>
> ARM Compiler 6.6 has a proven bug: static data symbols, moved to an init
> section, becomes global. Thus these symbols clash with ones defined in
> gic-v2.c. The straight forward way to resolve the issue is to add the GIC
> versio
On Wed, 6 Nov 2019, Andrii Anisov wrote:
> From: Andrii Anisov
>
> Here several ARM Compiler 6.6 issues are solved or provided a work-around:
>
> - Scatter file is pretty primitive, it has no feature to define symbols
> - ARM linker defined symbols are not counted as referred if only mentioned
On Tue, 12 Nov 2019, Ian Jackson wrote:
> Anthony PERARD writes ("Re: [Xen-devel] [PATCH] Introduce a description of a
> new optional tag for Backports"):
> > Should we describe the Fixes: tag as well? These would have a similar
> > purpose to the backport tag, I mean it could help figure out whic
On Tue, 12 Nov 2019, Peng Fan wrote:
> Hi Julien,
>
> Inline marked with [Peng Fan]
Please use plain text emails on xen-devel (and other open source
development mailing lists.)
> From: Julien Grall
> Sent: 2019年11月9日 6:44
> To: Stefano Stabellini ; Andre Przywara
>
&g
ork with the intent of eventually removing the
> legacy code. It therefore seems reasonable that I become a maintiner of
> the Xen code.
>
> Signed-off-by: Paul Durrant
Acked-by: Stefano Stabellini
> ---
> Cc: Stefano Stabellini
> Cc: Anthony Perard
> Cc: Paolo Bonz
Hi Juergen,
I don't mean to scope-creep your series, and I think it is fine if you
don't want to do it, but it would be fantastic if you took the
opportunity to make dom0_mem common across architectures.
On ARM, we parse it in xen/arch/arm/domain_build.c:parse_dom0_mem.
I think the ARM and x86 im
On Tue, 27 Nov 2018, PanBian wrote:
> On Mon, Nov 26, 2018 at 03:31:39PM -0500, Boris Ostrovsky wrote:
> > On 11/21/18 9:07 PM, Pan Bian wrote:
> > > kfree() is incorrectly used to release the pages allocated by
> > > __get_free_page() and __get_free_pages(). Use the matching deallocators
> > > i.e
On Tue, 27 Nov 2018, Boris Ostrovsky wrote:
> On 11/27/18 3:37 PM, Stefano Stabellini wrote:
> > On Tue, 27 Nov 2018, PanBian wrote:
> >> On Mon, Nov 26, 2018 at 03:31:39PM -0500, Boris Ostrovsky wrote:
> >>> On 11/21/18 9:07 PM, Pan Bian wrote:
> >>>&g
On Tue, 20 Nov 2018, Andrii Anisov wrote:
> Hello Stefano,
>
> On 01.11.18 22:20, Stefano Stabellini wrote:
> > No, I haven't had any time. Aside from the Xen version, another
> > difference is the interrupt source. I used the physical timer for
> > testing.
>
On Tue, 27 Nov 2018, Julien Grall wrote:
> (+ Stefano)
>
> On 11/27/18 5:12 PM, Volodymyr Babchuk wrote:
> > Hello community,
>
> Hi Volodymyr,
>
> >
> > After creating domU, I'm seeing lots of this messages from hypervisor:
> >
> > (XEN) p2m.c:1442: d1v0: gvirt_to_maddr failed va=0x8e
On Tue, 27 Nov 2018, Boris Ostrovsky wrote:
> On 11/27/18 4:08 PM, Stefano Stabellini wrote:
> > On Tue, 27 Nov 2018, Boris Ostrovsky wrote:
> >> On 11/27/18 3:37 PM, Stefano Stabellini wrote:
> >>> On Tue, 27 Nov 2018, PanBian wrote:
> >>>> On
On Fri, 16 Nov 2018, Andrii Anisov wrote:
> From: Andrii Anisov
>
> Signed-off-by: Andrii Anisov
Acked-by: Stefano Stabellini
> ---
> xen/arch/arm/irq.c | 12
> 1 file changed, 8 insertions(+), 4 deletions(-)
>
> diff --git a/xen/arch/arm/irq.c b/xe
On Thu, 22 Nov 2018, Julien Grall wrote:
> > > If you are worried about performance, then I would recommend to try the
> > > new vGIC and see whether it improves.
> > You know, we are based on XEN 4.10. Initially, when a customer said about
> > their dissatisfaction about performance drop in benchm
On Wed, 28 Nov 2018, Julien Grall wrote:
> Hi Matthew,
>
> On 28/11/2018 06:43, Matthew Daley wrote:
> > On Mon, 26 Nov 2018 at 14:07, Matthew Daley wrote:
> >>
> >> On Fri, 23 Nov 2018 at 09:51, Julien Grall wrote:
> >>>
> >>> Hi Matthew,
> >>>
> >>> Sorry for the late answer and thank you for
On Wed, 28 Nov 2018, Paul Durrant wrote:
> > -Original Message-
> > From: Kevin Wolf [mailto:kw...@redhat.com]
> > Sent: 28 November 2018 16:19
> > To: Paul Durrant
> > Cc: qemu-bl...@nongnu.org; qemu-de...@nongnu.org; xen-
> > de...@lists.xenproject.o
espectively.
> >
> > Suggested-by: Juergen Gross
> > Signed-off-by: Wen Yang
> > CC: Julia Lawall
> > CC: Boris Ostrovsky
> > CC: Juergen Gross
> > CC: Stefano Stabellini
> > CC: xen-devel@lists.xenproject.org
> > CC: linux-ker...@vger.kernel.org
ynqmp specific defines
xen/arm: zynqmp: eemi access control
xen/arm: zynqmp: implement zynqmp_eemi
xen/arm: zynqmp: Remove blacklist of ZynqMP's PM node
Stefano Stabellini (1):
xen: introduce mfn_init macro
xen/arch/arm/platform.c| 8 +
xe
To be used in constant initializations of mfn_t variables, such as:
static mfn_t node = mfn_init(MM_ADDR);
It is necessary because static inline functions cannot be used as static
initializers.
Signed-off-by: Stefano Stabellini
CC: Andrew Cooper
CC: George Dunlap
CC: Ian Jackson
CC: Jan
om/support/documentation/user_guides/ug1137-zynq-ultrascale-mpsoc-swdev.pdf
Signed-off-by: Edgar E. Iglesias
Signed-off-by: Stefano Stabellini
---
Although the amount of #defines has been significantly reduced in v5,
there is still a significant amount of static definitions:
- MM_*
These are the MMIO ad
From: "Edgar E. Iglesias"
From: Edgar E. Iglesias
zynqmp_eemi uses the defined functions and structs to decide whether to
make a call to the firmware, or to simply return a predefined value.
Signed-off-by: Edgar E. Iglesias
Signed-off-by: Stefano Stabellini
---
Changes in v5
From: "Edgar E. Iglesias"
From: Edgar E. Iglesias
Stop blacklisting ZynqMP's power management node. It is now possible
since we allow the hardware domain to issue HVC/SMC calls to firmware.
Signed-off-by: Edgar E. Iglesias
Signed-off-by: Stefano Stabellini
Reviewed-by: Ste
eck access to the register
Signed-off-by: Edgar E. Iglesias
Signed-off-by: Stefano Stabellini
---
Statically defines:
- pm_node_access
It encodes the relationship between a node id and the start of the MMIO
region of a device in the corresponding power domain. It is used for
permission checking
y: Edgar E. Iglesias
Signed-off-by: Stefano Stabellini
---
Changes in v4:
- add likely
---
xen/arch/arm/platform.c| 8
xen/arch/arm/vsmc.c| 4
xen/include/asm-arm/platform.h | 3 +++
3 files changed, 15 insertions(+)
diff --git a/xen/arch/arm/platform.c b/xen/arch/arm/
From: "Edgar E. Iglesias"
From: Edgar E. Iglesias
Introduce zynqmp_eemi: a function responsible for implementing access
controls over the firmware calls. Only calls that are allowed are
forwarded to the firmware.
Signed-off-by: Edgar E. Iglesias
Signed-off-by: Stefano
On Mon, 3 Dec 2018, Stefano Stabellini wrote:
> From: "Edgar E. Iglesias"
>
> From: Edgar E. Iglesias
Sorry about this, I haven't found a way to deal with this problem
automatically with git and guilt yet.
> Introduce platform_smc as a way to handle firmware cal
From: Stefano Stabellini
Introduce a device tree binding for Xen reserved-memory regions. They
are used to share memory across VMs from the VM config files. (See
static_shm config option.)
Signed-off-by: Stefano Stabellini
Cc: julien.gr...@arm.com
---
Changes in v4:
- add offset property
On Wed, 7 Nov 2018, Jan Beulich wrote:
> >>> On 06.11.18 at 23:42, wrote:
> > On Tue, 9 Oct 2018, Jan Beulich wrote:
> >> >>> On 09.10.18 at 01:37, wrote:
> >> > --- a/xen/include/xsm/dummy.h
> >> > +++ b/xen/include/xsm/dummy.h
> >> > @@ -535,6 +535,20 @@ static XSM_INLINE int
> >> > xsm_map_gm
On Mon, 3 Dec 2018, Rob Herring wrote:
> Missing the DT list...
Sorry about that, I'll add it next time
> On Mon, Dec 3, 2018 at 3:43 PM Stefano Stabellini
> wrote:
> >
> > From: Stefano Stabellini
> >
> > Introduce a device tree binding for Xen reserve
From: Stefano Stabellini
Introduce a device tree binding for Xen reserved-memory regions. They
are used to share memory across VMs from the VM config files. (See
static_shm config option.)
Signed-off-by: Stefano Stabellini
Cc: julien.gr...@arm.com
Cc: devicet...@vger.kernel.org
Cc: robh
On Tue, 4 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 11/12/18 11:36 PM, Stefano Stabellini wrote:
> > On Mon, 12 Nov 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 11/6/18 2:20 PM, Julien Grall wrote:
> > > > On 05/11/201
e new struct.
>
> v5: Since allocating the data outside of this call it should also
> be freed outside, when create_active() fails.
> Move kzalloc(sizeof(*map2), GFP_ATOMIC) outside spinlock and
> use GFP_KERNEL instead.
>
> Suggested-by: Juergen Gross
> Su
On Tue, 4 Dec 2018, Jan Beulich wrote:
> >>> On 03.12.18 at 22:03, wrote:
> > To be used in constant initializations of mfn_t variables, such as:
> >
> > static mfn_t node = mfn_init(MM_ADDR);
> >
> > It is necessary because static inline functions cannot be used as static
> > initializers.
>
>
On Tue, 4 Dec 2018, Julien Grall wrote:
> A lot of the headers are not necessary, so remove them. At the same
> time, re-order them alphabetically.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/p2m.c | 18 +-
&g
ed:
> - Generate table entry with a valid p2m type
> - Detect new mapping for proper stats accounting
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
(This patch doesn't apply to master, please rebase)
> ---
> Changes in v2:
>
On Tue, 4 Dec 2018, Julien Grall wrote:
> A follow-up patch will re-purpose the valid bit of LPAE entries to
> generate fault even on entry containing valid information.
>
> This means that when translating a guest VA to guest PA (e.g IPA) will
> fail if the Stage-2 entries used have the valid bit
Signed-off-by: Stefano Stabellini
---
docs/misc/arm/device-tree/booting.txt | 108 ++
1 file changed, 108 insertions(+)
diff --git a/docs/misc/arm/device-tree/booting.txt
b/docs/misc/arm/device-tree/booting.txt
index 317a9e9..f5aaf8f 100644
--- a/docs/misc/arm
Read the dtb fragment corresponding to a passthrough device from memory
at the location referred to by the "multiboot,dtb" compatible node.
Copy the fragment to the guest dtb.
Add a dtb_bootmodule field to struct kernel_info to find the dtb
fragment for a guest.
Signed-off-b
device to assign on the host
device tree. The path is specified in the device tree fragment as the
"path" string property.
Signed-off-by: Stefano Stabellini
---
xen/arch/arm/bootfdt.c| 4 +-
xen/arch/arm/domain_build.c | 85 +++
xen/i
-0800)
Stefano Stabellini (5):
xen/arm: copy dtb fragment to guest dtb
xen/arm: assign devices to boot domains
xen/arm: handle "multiboot,dtb" compatible nodes
xen/arm: use the physical number of gic
We don't have a clear way to know how many virtual SPIs we need for the
boot domains. For simplicity, allocate as many as natively supported,
just like for dom0.
Signed-off-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
Detect "multiboot,dtb" compatible nodes. Add them to the bootmod array
as BOOTMOD_DTB. In kernel_probe, find the right BOOTMOD_DTB and store a
pointer to it in dtb_bootmodule.
Signed-off-by: Stefano Stabellini
---
xen/arch/arm/bootfdt.c | 2 ++
xen/arch/arm/kernel.c
-0800)
Stefano Stabellini (1):
xen/arm: export shared memory regions as reserved-memory on device tree
Zhongze Liu (6):
xen: xsm: flask: introduce XENMAPSPACE_gmfn_share for memory sharing
libxl: introduce a new structure to represent s
On Wed, 5 Dec 2018, Stefano Stabellini wrote:
> Hi,
>
> This series implements a new xl config entry. Users can use the new
> config entry to statically setup shared memory areas among VMs that
> don't have grant table support so that they could communicate with each
> o
ts.xen.org/archives/html/xen-devel/2017-08/msg03242.html
The corresponding device tree binding is described by
Documentation/devicetree/bindings/reserved-memory/xen,shared-memory.txt.
Signed-off-by: Zhongze Liu
Signed-off-by: Stefano Stabellini
Cc: Ian Jackson
Cc: Wei Liu
Cc: Stefano Stabellini
file" (see [1]).
[1] https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html
Signed-off-by: Zhongze Liu
Signed-off-by: Stefano Stabellini
Cc: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: xen-de...@lists.xen.org
---
Changes in v9:
- rename master to owner
Shared memory regions need to be advertised to the guest. Fortunately, a
device tree binding for special memory regions already exist:
reserved-memory.
Add a reserved-memory node for each shared memory region, for both
owners and borrowers.
Signed-off-by: Stefano Stabellini
---
Changes in v9
e Liu
Signed-off-by: Stefano Stabellini
Cc: Daniel De Graaf
Cc: Ian Jackson
Cc: Wei Liu
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Tim Deegan
Cc: xen-de...@lists.xen.org
---
Changes in v9:
- rename master to owner a
his is for the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html
Signed-off-by: Zhongze Liu
Signed-off-by: Stefano Stabellini
Cc: Wei Liu
Cc: Ian Jackson
Cc: Stefano St
ned-off-by: Zhongze Liu
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
Signed-off-by: Stefano Stabellini
Cc: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: xen-de...@lists.xen.org
---
Changes in v9:
- rename master to owner and slave to borrower
- remove unrelated
vel/2017-08/msg03242.html
Signed-off-by: Zhongze Liu
Signed-off-by: Stefano Stabellini
Cc: Ian Jackson
Cc: Wei Liu
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: xen-de...@lists.xen.org
---
Changes in v9:
- rename master to owner and slave to borrower
- remove useless isretry parameter and v
-0800)
Stefano Stabellini (1):
xen/arm: export shared memory regions as reserved-memory on device tree
Zhongze Liu (6):
xen: xsm: flask: introduce XENMAPSPACE_gmfn_share for memory sharing
libxl: introduce a new structure to repr
On Wed, 5 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 04/12/2018 23:50, Stefano Stabellini wrote:
> > On Tue, 4 Dec 2018, Julien Grall wrote:
> > > The LPAE format allows to store information in an entry even with the
> > > valid bit unset. In a follow-up
On Wed, 5 Dec 2018, Julien Grall wrote:
> On 04/12/2018 23:59, Stefano Stabellini wrote:
> > On Tue, 4 Dec 2018, Julien Grall wrote:
> > > A follow-up patch will re-purpose the valid bit of LPAE entries to
> > > generate fault even on entry containing valid informati
be valid"?
>
> > has been marked available to guest in order to perform a specific
> > action. So extend p2m_get_entry to return the value of bit[0] (valid bit).
> >
> > Signed-off-by: Julien Grall
>
> Other than that,
>
> A
t the moment, there are no action done when reaching a block/page entry
> but setting the valid bit to 1.
Thanks, this explanation is much better
Acked-by: Stefano Stabellini
> Signed-off-by: Julien Grall
>
> ---
> Changes in v2:
> - Typoes
> - Add more
patch adds the infrastructure to passthrough the access to host
> registers. For convenience a bunch of helpers have been added to
> generate the different helpers.
>
> Note that HCR_EL2.TVM will be set in a follow-up patch dynamically.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano
n a separate function making more obvious
>
> All those changes will help a follow-up patch where we would want to
> introduce some vCPU work before returning to the guest vCPU.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> Changes in v2:
>
On Tue, 4 Dec 2018, Julien Grall wrote:
> This will make changes in a follow-up patch easier.
>
> Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
> ---
> Changes in v2:
> - Patch added
> ---
> xen/arch/arm/domctl.c | 8
> 1 file
On Tue, 4 Dec 2018, Julien Grall wrote:
> Set/Way operations are used to perform maintenance on a given cache.
> At the moment, Set/Way operations are not trapped and therefore a guest
> OS will directly act on the local cache. However, a vCPU may migrate to
> another pCPU in the middle of the proc
On Tue, 4 Dec 2018, Julien Grall wrote:
> p2m_cache_flush_range does not yet support preemption, this may be an
> issue as cleaning the cache can take a long time. While the current
> caller (XEN_DOMCTL_cacheflush) does not stricly require preemption, this
> will be necessary for new caller in a fo
mfn = mfn_add(mfn, 1);
> + /*
> + * The following regions can be skipped:
> + * - Hole
> + * - non-RAM
> + */
I think this comment is superfluous as the code is already obvious. You
can remove it.
Reviewed-by
On Fri, 7 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 06/12/2018 22:04, Stefano Stabellini wrote:
> > On Wed, 5 Dec 2018, Julien Grall wrote:
> > > On 04/12/2018 23:59, Stefano Stabellini wrote:
> > > > On Tue, 4 Dec 2018, Julien Grall wrote:
> > &
On Wed, 5 Dec 2018, Stefano Stabellini wrote:
> Shared memory regions need to be advertised to the guest. Fortunately, a
> device tree binding for special memory regions already exist:
> reserved-memory.
>
> Add a reserved-memory node for each shared memory region, for both
> ow
CC'ing Dario
Dario, please give a look at the preemption question below.
On Fri, 7 Dec 2018, Julien Grall wrote:
> On 06/12/2018 23:32, Stefano Stabellini wrote:
> > On Tue, 4 Dec 2018, Julien Grall wrote:
> > > Set/Way operations are used to perform maintenance on a gi
truction cache could be delayed until the domain is
> first run. This would improve greatly the performance of creating guest.
>
> I am still doing the benchmark whether having a command line option is
> worth it. I will provide numbers as soon as I have them.
>
> Cc: Stefano Stab
On Thu, 6 Dec 2018, Julien Grall wrote:
> Hi,
>
> On 12/4/18 8:26 PM, Julien Grall wrote:
> > At the moment, the implementation of Set/Way operations will go through
> > all the entries of the guest P2M and flush them. However, this is very
> > expensive and may render unusable a guest OS using th
On Fri, 7 Dec 2018, Julien Grall wrote:
> > > @@ -1547,6 +1551,25 @@ int p2m_cache_flush_range(struct domain *d, gfn_t
> > > start, gfn_t end)
> > > while ( gfn_x(start) < gfn_x(end) )
> > > {
> > > + /*
> > > + * Cleaning the cache for the P2M may take a long time. So w
On Tue, 11 Dec 2018, Julien Grall wrote:
> On 10/12/2018 12:23, Andrii Anisov wrote:
> > Hello Julien,
> >
> > On 10.12.18 13:54, Julien Grall wrote:
> > > What are the numbers without Xen?
> > Good question. Didn't try. At least putchar should be implemented for that.
>
> I think we need the bar
cplen is unsigned, thus, it can never be < 0. Use a signed integer local
variable instead.
Signed-off-by: Stefano Stabellini
---
xen/common/device_tree.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/xen/common/device_tree.c b/xen/common/device_tree.c
index 8fc4
On Tue, 11 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 03/12/2018 21:03, Stefano Stabellini wrote:
> > From: "Edgar E. Iglesias"
> >
> > From: Edgar E. Iglesias
> >
> > Introduce zynqmp_eemi: a function responsible for implementing
On Tue, 11 Dec 2018, Julien Grall wrote:
> Hi,
>
> On 03/12/2018 21:03, Stefano Stabellini wrote:
> > From: "Edgar E. Iglesias"
> >
> > From: Edgar E. Iglesias
> >
> > Introduce zynqmp specific defines for the firmware calls.
> > See
On Tue, 11 Dec 2018, Julien Grall wrote:
> On 11/12/2018 18:39, Stefano Stabellini wrote:
> > On Tue, 11 Dec 2018, Julien Grall wrote:
> > > On 10/12/2018 12:23, Andrii Anisov wrote:
> > > > Hello Julien,
> > > >
> > > > On 10.12.18 13:
On Tue, 11 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 11/12/2018 18:50, Stefano Stabellini wrote:
> > On Tue, 11 Dec 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 03/12/2018 21:03, Stefano Stabellini wrote:
> > > > Fro
On Tue, 11 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 03/12/2018 21:03, Stefano Stabellini wrote:
> > From: "Edgar E. Iglesias"
> >
> > From: Edgar E. Iglesias
> >
> > zynqmp_eemi uses the defined functions and structs to decide whether
On Wed, 12 Dec 2018, Julien Grall wrote:
> On 07/12/2018 21:29, Stefano Stabellini wrote:
> > CC'ing Dario
> >
> > Dario, please give a look at the preemption question below.
> >
> >
> > On Fri, 7 Dec 2018, Julien Grall wrote:
> > > On 06/12
On Wed, 12 Dec 2018, Andrii Anisov wrote:
> On 12.12.18 11:46, Andrii Anisov wrote:
> > Digging into that now.
> I got it. My u-boot starts TBM in hyp mode. But them both miss setting
> HCR_EL2.IMO, so no interrupt exception was taken in hyp.
> OK, for my baremetal TBM in hyp, numbers are:
>
> max
On Wed, 12 Dec 2018, Andrii Anisov wrote:
> Hello Stefano,
>
> On 12.12.18 19:39, Stefano Stabellini wrote:
> > Thanks for the good work, Andrii!
> >
> > The WARM_MAX improvements for vwfi=native with your optimizations are
> > impressive.
>
> I reall
On Wed, 12 Dec 2018, Julien Grall wrote:
> Title: s/avalability/availability/
>
> On 12/12/2018 16:55, Andrii Anisov wrote:
> > From: Andrii Anisov
> >
> > An IRQ with _IRQ_GUEST flag set always has an action.
> > An IRQ with _IRQ_DISABLED flag cleared always have an action.
>
> s/have/has/
>
d-by: Shameerali Kolothum Thodi
> Reported-by: Jan-Peter Larsson
Reviewed-by: Stefano Stabellini
and committed
> ---
> I had few reports on new platforms where Xen reliably stale as soon as
> SCTLR.WXN is turned on. This likely happens because of not complying
> with
On Wed, 12 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 11/12/2018 18:46, Stefano Stabellini wrote:
> > cplen is unsigned, thus, it can never be < 0. Use a signed integer local
> > variable instead.
>
> The current code checks > 0. Looking at the
On Thu, 29 Nov 2018, Julien Grall wrote:
> At the moment, Xen is relocated towards the end of the memory. While
> this has the advantage to free space in low memory, the code is not
> compliant with the break-before-make because it requires to switch
> between two sets of page-table. This is not en
On Wed, 12 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 11/12/2018 19:22, Stefano Stabellini wrote:
> > On Tue, 11 Dec 2018, Julien Grall wrote:
> > > Hi,
> > >
> > > On 03/12/2018 21:03, Stefano Stabellini wrote:
> > > What is the plan
On Wed, 12 Dec 2018, Julien Grall wrote:
> On 11/12/2018 22:23, Stefano Stabellini wrote:
> > On Tue, 11 Dec 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 03/12/2018 21:03, Stefano Stabellini wrote:
> > > > From: "Edgar E
On Wed, 5 Dec 2018, Jan Beulich wrote:
> >>> On 04.12.18 at 20:38, wrote:
> > On Tue, 4 Dec 2018, Jan Beulich wrote:
> >> >>> On 03.12.18 at 22:03, wrote:
> >> > To be used in constant initializations of mfn_t variables, such as:
> >> >
> >> > static mfn_t node = mfn_init(MM_ADDR);
> >> >
> >>
901 - 1000 of 6727 matches
Mail list logo