df
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Acked-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
>
> This was discovered debugging DT generated by GRUB on ACPI-only
> platform. I am not aware of any DT relying on that for now,
On Mon, 4 Dec 2017, Oleksandr Tyshchenko wrote:
> Hi Stefano
>
> On Sat, Dec 2, 2017 at 3:21 AM, Stefano Stabellini
> <sstabell...@kernel.org> wrote:
> > On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
> >> From: Oleksandr Dmytryshyn <oleksandr.dmytrys...@glob
On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
> From: Oleksandr Tyshchenko <oleksandr_tyshche...@epam.com>
>
> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshche...@epam.com>
> CC: Stefano Stabellini <sstabell...@kernel.org>
> CC: Julien Grall <julien.
to use git log and git blame to narrow them down for copyright
reasons):
Signed-off-by: Stephen Warren <swar...@nvidia.com>
Signed-off-by: Linus Walleij <linus.wall...@linaro.org>
With those:
Acked-by: Stefano Stabellini <sstabell...@kernel.org>
> Signed-off-by: Ole
On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
> From: Oleksandr Tyshchenko <oleksandr_tyshche...@epam.com>
>
> This is a port from Linux.
>
> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshche...@epam.com>
> CC: Stefano Stabellini <sstabell...@kernel.o
On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
> From: Oleksandr Tyshchenko <oleksandr_tyshche...@epam.com>
>
> This is a port from Linux.
>
> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshche...@epam.com>
> CC: Stefano Stabellini <sstabell...@kernel.o
On Mon, 4 Dec 2017, Volodymyr Babchuk wrote:
> > = Xen command forwarding =
> >
> > In the code below, it looks like Xen is forwarding everything to OP-TEE.
> > Are there some commands Xen should avoid forwarding? Should we have a
> > whitelist or a blacklist?
> My code implements whitelists (at
On Sat, 2 Dec 2017, Oleksandr Tyshchenko wrote:
> On Sat, Dec 2, 2017 at 3:06 AM, Stefano Stabellini
> <sstabell...@kernel.org> wrote:
> > On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
> >> From: Oleksandr Dmytryshyn <oleksandr.dmytrys...@globallogic.com>
>
On Mon, 4 Dec 2017, Volodymyr Babchuk wrote:
> Hi Julien,
>
>
> On Mon, Dec 04, 2017 at 04:27:14PM +, Julien Grall wrote:
>
> [...]
> > >>= Error checking / DOS protection =
> > >>
> > >>We need powerful checks on arguments passed by the caller and evaluated
> > >>by the mediator.
> > >>
>
>
> CC: "Edgar E. Iglesias" <edgar.igles...@xilinx.com>
>
> Signed-off-by: Volodymyr Babchuk <volodymyr_babc...@epam.com>
> CC: Stefano Stabellini <sstabell...@kernel.org>
> CC: Julien Grall <julien.gr...@linaro.org>
> ---
> xen/arch/arm/arm32
ear_guest using copy_to_guest.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> Changes in v3:
> - Use vaddr_t
> ---
> xen/arch/arm/guestcopy.c | 41 +++--
On Tue, 12 Dec 2017, Julien Grall wrote:
> This new function will be used in a follow-up patch to copy data to the guest
> using the IPA (aka guest physical address) and then clean the cache.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano St
_linux().
Removes the scancode2linux mapping, and supporting documention.
Signed-off-by: Owen Smith <owen.sm...@citrix.com>
Reviewed-by: Gerd Hoffmann <kra...@redhat.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.o
The following changes since commit 0a0dc59d27527b78a195c2d838d28b7b49e5a639:
Update version for v2.11.0 release (2017-12-13 14:31:09 +)
are available in the git repository at:
git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-20171214-tag
for you to fetch changes up to
x86_64-linux-gnu/libglib-2.0.so.0+0x50580)
#2 0x55e0fdda7d3d in device_set_realized hw/core/qdev.c:914
[...]
Signed-off-by: Simon Gaiser <h...@ipsumj.de>
Acked-by: Stefano Stabellini <sstabell...@kernel.org>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/xe
tablet or
emulated PS/2 mouse.
HVM xen_kbdfront can incorrectly scale absolute coordinates when
the display resolution is not 800x600.
Signed-off-by: Owen Smith <owen.sm...@citrix.com>
Reviewed-by: Gerd Hoffmann <kra...@redhat.com>
Reviewed-by: Stefano Stabellini <sstabell...@k
hat for now, only
> copying to guest virtual address is supported. Follow-up patches will
> extend the support.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> Changes in v2:
>
rate helpers.
>
> For instance, merging the both will make easier to maintain stage-2 abort
> handling. So consolidate the two helpers in a new helper
> do_trap_stage2_abort.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabe
to support copying from guest VA by adding using a
> bit in the flags to tell the direction of the copy.
>
> Lastly, reimplement raw_copy_from_guest using copy_to_guest.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell.
o extend the use of it, it is now possible
> to copy data crossing page boundary.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> Changes in v2:
> - Rework the patch after the int
> Spotted by Travis.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> CC: Jan Beulich <jbeul...@suse.com>
> CC: Stefano Stabellini <sstabell...@kernel.org>
> CC: J
o_info_t is now filled by
> try_handle_mmio.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/arch/arm/traps.c | 31 +--
> 1 file changed, 17 insertions(+), 1
On Thu, 23 Nov 2017, Julien Grall wrote:
> Multiple places in the code requires to flush the TLBs wonly when
^ only
Aside from this
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> p2m->need_flush is set.
>
icv3_cpu_init only
> on success. As the rest of the code (e.g gicv3_hyp_init) relies on
> system register, it is better to bail out directly.
>
> This will save time on debugging early boot issue on GICv3 platform.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
This
On Wed, 6 Dec 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 12/06/2017 01:22 AM, Stefano Stabellini wrote:
> > On Thu, 23 Nov 2017, Julien Grall wrote:
> > > The only differences between copy_to_guest and access_guest_memory_by_ipa
> > > are:
> > >
>
> This seems a bit pointless but would allow to have a single API for
> flushing and avoid misusage in the P2M code.
>
> So update p2m_alloc_table to use p2m_force_tlb_flush_sync and fold
> p2m_tlb_flush in p2m_force_tlb_flush_sync.
>
> Signed-off-by: Julien Grall <juli
acro to replace all the current opencoded version.
>
> Note that most of comments associated to the code changed have been
> removed because the code is now self-explanatory.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell
On Thu, 7 Dec 2017, Julien Grall wrote:
> There are quite a few fixmap slots that have not been used for a while.
> Remove them.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xe
On Tue, 5 Dec 2017, Volodymyr Babchuk wrote:
> Hi Stefano,
>
> On Mon, Dec 04, 2017 at 06:30:13PM -0800, Stefano Stabellini wrote:
> > On Thu, 9 Nov 2017, Oleksandr Tyshchenko wrote:
> > > From: Volodymyr Babchuk <volodymyr_babc...@epam.com>
> > >
>
On Tue, 5 Dec 2017, Dan Carpenter wrote:
> Smatch complains that "len" is uninitialized if xenbus_read() fails so
> let's add some error handling.
>
> Signed-off-by: Dan Carpenter <dan.carpen...@oracle.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.or
On Tue, 5 Dec 2017, Julien Grall wrote:
> Hi Ian,
>
> On 05/12/17 18:28, Ian Jackson wrote:
> > This drops the dependency on Stefano's personal git tree.
> > The osstest output branch remains unmoved.
> >
> > CC: Stefano Stabellini <sstabell...@kernel.
On Wed, 6 Dec 2017, Oleksandr Tyshchenko wrote:
> >> +perf->platform_limit = platform_limit;
> >> +perf->shared_type = CPUFREQ_SHARED_TYPE_ANY;
> >> +perf->domain_info.domain = cpumask_first(mask);
> >> +perf->domain_info.num_processors = cpumask_weight(mask);
> >> +
> >> +/*
ear_guest using copy_to_guest.
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Aside from the usual question about vaddr_t:
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/arch/arm/guestcopy.c | 41 +++--
linaro.org>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/arch/arm/guestcopy.c | 13 +++--
> 1 file changed, 7 insertions(+), 6 deletions(-)
>
> diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c
> index 3aaa80859e..487f5ab82d
On Thu, 23 Nov 2017, Julien Grall wrote:
> Hi Andrew,
>
> On 23/11/17 18:49, Andrew Cooper wrote:
> > On 23/11/17 18:32, Julien Grall wrote:
> > > This new function will be used in a follow-up patch to copy data to the
> > > guest
> > > using the IPA (aka guest physical address) and then clean
On Tue, 5 Dec 2017, Julien Grall wrote:
> Hi all,
>
> Even though it is an Arm failure, I have CCed x86 folks to get feedback on the
> approach. I have a WIP branch I could share if that interest people.
>
> Few months ago, we noticed an heisenbug on jobs run by osstest on the
> cubietrucks (see
On Tue, 5 Dec 2017, Stefano Stabellini wrote:
> On Thu, 23 Nov 2017, Julien Grall wrote:
> > The only differences between copy_to_guest and access_guest_memory_by_ipa
> > are:
> > - The latter does not support copying data crossing page boundary
> > - The form
On Thu, 23 Nov 2017, Julien Grall wrote:
> The only differences between copy_to_guest (formerly called
> raw_copy_to_guest_helper) and raw_copy_from_guest is:
> - The direction of the memcpy
> - The permission use for translating the address
>
> Extend copy_to_guest to support copying
On Thu, 23 Nov 2017, Julien Grall wrote:
> The only differences between copy_to_guest and access_guest_memory_by_ipa are:
> - The latter does not support copying data crossing page boundary
> - The former is copying from/to guest VA whilst the latter from
> guest PA
>
> copy_to_guest
lien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/arch/arm/guestcopy.c | 8 +---
> 1 file changed, 5 insertions(+), 3 deletions(-)
>
> diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c
> index
On Tue, 5 Dec 2017, Stefano Stabellini wrote:
> On Thu, 23 Nov 2017, Julien Grall wrote:
> > The function kernel_zimage is dealing with IPA but uses gvirt_to_maddr to
> > do the translation. This is currently working fine because the stage-1 MMU
> > is disabled.
> >
&g
ulien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/arch/arm/domain_build.c | 31 ---
> 1 file changed, 8 insertions(+), 23 deletions(-)
>
> diff --git a/xen/arch/arm/domain_build.c b/xe
here:
> #0 0x7ff596a94bb8 in __interceptor_calloc
> (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xd9bb8)
> #1 0x7ff57da66580 in g_malloc0
> (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x50580)
> #2 0x55e0fdda7d3d in device_set_realized hw/core/qdev.c:914
> [...]
>
> Signed
the callers are now switched to _mfn(domain_page_to_mfn(...)).
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Acked-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
>
> Andrew suggested to drop IS_VALID_PAGE in xen/tmem_xen.h. His comment
> was:
>
> "
On Thu, 9 Nov 2017, Jan Beulich wrote:
> >>> On 09.11.17 at 16:48, wrote:
> > On 09/11/17 15:47, Jan Beulich wrote:
> > On 09.11.17 at 16:39, wrote:
> >>> What I meant is you would replace the 4 occurrences by
> >>> mfn_to_page(_mfn(...)). If
On Wed, 9 Aug 2017, Mirela Simonovic wrote:
> This document contains our draft proposal for implementing "suspend to RAM"
> support for ARM in Xen, as discussed during the last Xen ARM community call.
> It covers the basic suspend to RAM mechanism based on ARM PSCI standard,
> that would allow
On Tue, 12 Dec 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 12/08/2017 10:43 PM, Stefano Stabellini wrote:
> > On Fri, 8 Dec 2017, Julien Grall wrote:
> > > On 8 Dec 2017 22:26, "Stefano Stabellini" <sstabell...@kernel.org> wrote:
> > &
On Wed, 1 Nov 2017, Julien Grall wrote:
> - Remove spurious ()
> - Add missing spaces
> - Turn 1 << to 1UL <<
> - Rename spfn to smfn and switch to mfn_t
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Stefan
On Fri, 8 Dec 2017, Julien Grall wrote:
> On 06/12/17 12:27, Julien Grall wrote:
> > On 12/06/2017 01:26 AM, Stefano Stabellini wrote:
> > > On Thu, 23 Nov 2017, Julien Grall wrote:
> > > > Hi Andrew,
> > > >
> > > > On 23/11/17 18:49, An
On Mon, 14 May 2018, Julien Grall wrote:
> On 11/05/18 22:47, Stefano Stabellini wrote:
> > On Fri, 11 May 2018, Dario Faggioli wrote:
> > > On Fri, 2018-05-11 at 14:08 +0100, Julien Grall wrote:
> > > > The whole idea here is we have only one place taking the decisio
On Fri, 6 Apr 2018, Stefano Stabellini wrote:
> > > > > 3) Understand how to address dom0. FreeRTOS Dom0 sounds like a good
> > > > > solution.
> > > > > Next step: reach out to Dornerworks and/or others that worked with
> > > > > Fre
CC'ing Linux x86 maintainers
On Wed, 9 May 2018, Olaf Hering wrote:
> Am Wed, 9 May 2018 14:08:14 -0700 (PDT)
> schrieb Stefano Stabellini <sstabell...@kernel.org>:
>
> > I cannot find 512b109ec962 or "xen: unplug the emulated devices at
> > resume time" any
vsky <boris.ostrov...@oracle.com>
> Signed-off-by: Roger Pau Monné <roger@citrix.com>
> ---
> Cc: Boris Ostrovsky <boris.ostrov...@oracle.com>
> Cc: Juergen Gross <jgr...@suse.com>
> Cc: Stefano Stabellini <sstabell...@kernel.org>
> Cc: xen-devel@lists.xe
On Thu, 10 May 2018, Olaf Hering wrote:
> Am Wed, 9 May 2018 14:43:17 -0700 (PDT)
> schrieb Stefano Stabellini <sstabell...@kernel.org>:
>
> > 512b109ec962 is a very old commit: why is it causing problems to Xen
> > 4.10 and Xen 4.11 HVM migration? What is the error
On Wed, 9 May 2018, Olaf Hering wrote:
> Am Tue, 8 May 2018 18:40:26 +0200
> schrieb Olaf Hering :
>
> > It looks like the IDE unplug is not permanent.
>
> Stefano,
>
> Jochen pointed me to commit 512b109ec962 ("xen: unplug the emulated devices
> at resume time"), which I think
On Fri, 11 May 2018, Dario Faggioli wrote:
> On Fri, 2018-05-11 at 14:08 +0100, Julien Grall wrote:
> > The whole idea here is we have only one place taking the decision and
> > we
> > don't spread BUG_ON()/panic/stop_cpu everywhere. The benefit is
> > having
> > only one place to fix over
On Thu, 10 May 2018, Praveen Kumar wrote:
> > Yeah, you are right. It looks like turning Dom0 into a DomU is not good
> > enough. Maybe for this option to be viable we would actually have to
> > terminate (or pause and never unpause?) dom0 after boot.
>
> Just a thought !
> How about keeping Dom0
On Tue, 8 May 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 08/05/18 01:11, Stefano Stabellini wrote:
> > On Fri, 6 Apr 2018, Stefano Stabellini wrote:
> > > > > > > 3) Understand how to address dom0. FreeRTOS Dom0 sounds like a
> > > > > >
On Mon, 21 May 2018, Roger Pau Monné wrote:
> This looks interesting IMO. Just one small nit.
>
> On Thu, May 17, 2018 at 03:31:40PM -0700, Stefano Stabellini wrote:
> > ## Hardware Support
> >
> > ViryaOS will support as many hardware platforms as possible, x86 an
From: Anthony PERARD <anthony.per...@citrix.com>
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Reviewed-by: Markus Armbruster <arm...@redhat.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
configure | 2 +-
1 file changed, 1 insertion(+), 1
urrant <paul.durr...@citrix.com>
Acked-by: Anthony Perard <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/block/xen_disk.c | 122 ++--
1 file changed, 32 insertions(+), 90 deletions(-
le API handles of the forms detailed above.
Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
Reviewed-by: Eric Blake <ebl...@redhat.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
dtc | 2 +-
scripts/checkpatch.pl | 2 +-
ui/keycodemapdb
From: Paul Durrant <paul.durr...@citrix.com>
Now that helpers are available in xen_backend, use them throughout all
Xen PV backends.
Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
Acked-by: Anthony Perard <anthony.per...@citrix.com>
Signed-off-by: Stefano St
method is responsible for
mapping the shared ring. No prior method requires access to the grant table.
Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/xen/xen
From: Paul Durrant <paul.durr...@citrix.com>
There is no longer any use of this flag outside of the xen_backend code.
Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
Acked-by: Anthony Perard <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@ke
change their state for worse.
Signed-off-by: Igor Druzhinin <igor.druzhi...@citrix.com>
Reviewed-by: Paul Durrant <paul.durr...@citrix.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/i386/xen/xen_pvdevice.c |
mmon.h, which allows xen_disk to be cleaned
up.
Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/block/xen_disk.c | 18 --
include/
cantly.
Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
Acked-by: Anthony Perard <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/block/xen_disk.c | 76 +++--
1 file changed, 21 ins
itrix.com>
Acked-by: Anthony Perard <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/block/xen_disk.c | 352
1 file changed, 25 insertions(+), 327 deletions(-)
diff --git a/hw/blo
.@citrix.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/block/xen_disk.c | 90 +++--
1 file changed, 46 insertions(+), 44 deletions(-)
diff --git a/hw/
gt;
Reported-by: Ross Lagerwall <ross.lagerw...@citrix.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/xen/xen_pt.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/xen/xen_pt.c b/hw/xen/x
: Ross Lagerwall <ross.lagerw...@citrix.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/xen/xen_pt_config_init.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/hw/xen/xen_pt_config_init.c b/hw/xen/xe
On Thu, 19 Apr 2018, Julien Grall wrote:
> Hi Stefano,
>
> Please CC "THE REST" maintainers here.
>
> On 18/04/18 23:15, Stefano Stabellini wrote:
> > All the UART drivers are silent options. Add one line descriptions so
> > that can be de/selected via menuco
those environments.
Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
hw/xen/xen_backend.c | 53
1 file changed
On Thu, 19 Apr 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 18/04/18 23:15, Stefano Stabellini wrote:
> > Make it possible to disable the following existing kconfig options:
> >HAS_GICV3
> >HAS_ARM_HDLCD
> >HAS_MEM_ACCESS
> >
> > Toda
On Mon, 21 May 2018, Stefano Stabellini wrote:
> On Thu, 19 Apr 2018, Julien Grall wrote:
> > Hi Stefano,
> >
> > Please CC "THE REST" maintainers here.
> >
> > On 18/04/18 23:15, Stefano Stabellini wrote:
> > > All the UART drivers are silent
On Tue, 24 Apr 2018, Julien Grall wrote:
> On 04/20/2018 10:39 AM, Jan Beulich wrote:
> > > > > On 19.04.18 at 17:44, <julien.gr...@arm.com> wrote:
> > > On 18/04/18 23:15, Stefano Stabellini wrote:
> > > > --- a/xen/drivers/passthrough/Kconfig
On Mon, 23 Apr 2018, Andrii Anisov wrote:
> Hello Stefano,
>
> I'm really glad to see this series.
>
> In the list of platform-specific bits you are trying to make selectable, you
> missed platform support code itself. Moreover, as it is said in your follow-up
> emails, set of UART, IOMMU, GIC
All the UART drivers are silent options. Add one line descriptions so
that can be de/selected via menuconfig.
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
Changes in v2:
- make HAS_EHCI depend on x86
---
xen/drivers/char/Kconfig | 17 +
1 file chan
On Tue, 22 May 2018, Julien Grall wrote:
> Some errata will rely on the SMCCC version which is detected by
> psci_init().
>
> This is part of XSA-263.
>
> Signed-off-by: Julien Grall <julien.gr...@arm.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
On Tue, 22 May 2018, Julien Grall wrote:
> As for Spectre variant-2, we rely on SMCCC 1.1 to provide the discovery
> mechanism for detecting the SSBD mitigation.
>
> A new capability is also allocated for that purpose, and a config
> option.
>
> This is part of XSA-263.
>
> Signed-off-by:
On Tue, 22 May 2018, Julien Grall wrote:
> This will improve readability for future changes.
>
> This is part of XSA-263.
>
> Signed-off-by: Julien Grall <julien.gr...@arm.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/arch/arm/arm
=152424389512432
One note about Kconfig renaming: I can see the benefit of being
consistent with the naming and using HAS_ only for options that are
always enabled, but I really don't have a strong opinion on this topic.
Cheers,
Stefano
Stefano Stabellini (10):
arm: remove the ARM HDLCD driver
arm
HAS_GICV3 has become selectable by the user. To mark the change, rename
the option from HAS_GICV3 to GICV3.
Suggested-by: Julien Grall <julien.gr...@arm.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
Changes in v3:
- no changes
Changes in v2:
- patch added
---
All the UART drivers are silent options. Add one line descriptions so
that can be de/selected via menuconfig.
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
CC: jbeul...@suse.com
CC: andrew.coop...@citrix.com
---
The next patch will take care of fixing arch dependencies.
C
Introduce a Kconfig option for the ARM SMMUv1 and SMMUv2 driver.
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
CC: jbeul...@suse.com
---
Changes in v3:
- rename SMMUv2 to ARM_SMMU
- improve help message
- use if ARM
Changes in v2:
- rename HAS_SMMUv2 to SMMUv2
- move SMMUv2
and invoke `cloc'.
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
CC: jbeul...@suse.com
CC: andrew.coop...@citrix.com
---
Changes in v3:
- remove build as dependecy for the cloc target
Changes in v2:
- change implementation to use .o.d to find built source files
---
xen/Makefil
silent and always enabled on x86.
Make all the others selectable on ARM, default on.
Suggested-by: Julien Grall <julien.gr...@arm.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
CC: andrew.coop...@citrix.com
CC: george.dun...@eu.citrix.com
CC: ian.jack...@eu.citrix.c
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
CC: artem_myga...@epam.com
CC: volodymyr_babc...@epam.com
---
Note that this approach has a limitation: it is not possible to "select
a range". In other words, using tiny.config NR_CPUS is set to 4. It is
not possible to increase
Today it is a silent option. This patch adds a one line description and
makes it optional.
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
Changes in v3:
- remove any changes to MEM_ACCESS
- update commit message
Changes in v2:
- make HAS_GICv3 depend on ARM_64
-
m.com>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
Changes in v3:
- remove "select VIDEO"
- remove vexpress_syscfg
Changes in v2:
- patch added
---
xen/arch/arm/Kconfig | 2 -
xen/arch/arm/platforms/vexpress.c| 35
Add a tiny kconfig configuration. Enabled NULL and Credit schedulers.
Support only 4 cpus. It only carries non-default options (use make
olddefconfig to produce a complete .config file).
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
---
xen/arch/arm/configs/tiny.con
<julien.gr...@arm.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/include/asm-arm/arm64/macros.h | 25 +
> xen/include/asm-arm/macros.h | 2 +-
> 2 files changed, 26 insertions(+), 1 deletion(-)
> create mode 100644 xe
off-by: Julien Grall <julien.gr...@arm.com>
Very useful, thank you!
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/arch/arm/Kconfig | 34 +-
> 1 file changed, 17 insertions(+), 17 deletions(-)
>
> diff --git a/xen/
On Tue, 22 May 2018, Julien Grall wrote:
> In order to offer ARCH_WORKAROUND_2 support to guests, we need to track the
> state of the workaround per-vCPU. The field 'pad' in cpu_info is now
> repurposed to store flags easily accessible in assembly.
>
> As the hypervisor will always run with the
ests.
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/arch/arm/traps.c | 14 --
> 1 file changed, 8 insertions(+), 6 deletions(-)
>
> diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
> index 020b0b8eef..b1546f6907 100644
> --- a/xen/arc
On Wed, 23 May 2018, Stefano Stabellini wrote:
> On Tue, 22 May 2018, Julien Grall wrote:
> > In order to offer ARCH_WORKAROUND_2 support to guests, we need to track the
> > state of the workaround per-vCPU. The field 'pad' in cpu_info is now
> > repurposed to store fl
On Tue, 22 May 2018, Julien Grall wrote:
> On a system where the firmware implements ARCH_WORKAROUND_2, it may be
> useful to either permanently enable or disable the workaround for cases
> where the user decides that they'd rather not get a trap overhead, and
> keep the mitigation permanently on
On Tue, 22 May 2018, Julien Grall wrote:
> +extern enum ssbd_state ssbd_state;
> +
> +static inline enum ssbd_state get_ssbd_state(void)
> +{
> +return ssbd_state;
> +}
> +
> DECLARE_PER_CPU(register_t, ssbd_callback_required);
>
> static inline bool cpu_require_ssbd_mitigation(void)
> @@
On Tue, 22 May 2018, Julien Grall wrote:
> Signed-off-by: Julien Grall <julien.gr...@arm.com>
Acked-by: Stefano Stabellini <sstabell...@kernel.org>
> ---
> xen/include/asm-arm/smccc.h | 6 +++---
> 1 file changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a
1 - 100 of 6081 matches
Mail list logo