channel is allocated.
Signed-off-by: Juergen Gross
---
drivers/xen/events/events_base.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/drivers/xen/events/events_base.c b/drivers/xen/events/events_base.c
index b4bca2d..70fba97 100644
--- a/drivers/xen/events
Add the definition of pvUSB protocol used between the pvUSB frontend in
a Xen domU and the pvUSB backend in a Xen driver domain (usually Dom0).
This header was originally provided by Fujitsu for Xen based on Linux
2.6.18.
Changes are:
- adapt to Linux style guide
Signed-off-by: Juergen Gross
Signed-off-by: Juergen Gross
---
drivers/usb/Kconfig|2 +
drivers/usb/Makefile |2 +
drivers/usb/xen/Kconfig| 10 +
drivers/usb/xen/Makefile |5 +
drivers/usb/xen/xen-usbfront.c | 1634
5 files changed, 1653
Add myself as maintainer for the Xen pvUSB stuff.
Signed-off-by: Juergen Gross
---
MAINTAINERS | 8
1 file changed, 8 insertions(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index ddc5a8c..8ec1e1f 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -10787,6 +10787,14 @@ F: drivers/scsi/xen
has been tested
as well.
Tests have been performed with the xm toolset and with xl using patches
from Chun Yan Liu which are not upstream yet.
Juergen Gross (4):
usb: Add Xen pvUSB protocol description
usb: Introduce Xen pvUSB frontend
usb: Introduce Xen pvUSB backend
xen: add Xen pvUSB
- correct sequence of state changes when assigning a device
Signed-off-by: Juergen Gross
---
drivers/usb/Makefile |1 +
drivers/usb/xen/Kconfig | 10 +
drivers/usb/xen/Makefile |1 +
drivers/usb/xen/xen-usbback.c | 1845 +
4
me
and we could end up with PAT enabled best record now
on our logs when MTRR is disabled.
[0] ~/devel/xen (git::stable-4.5)$ git describe --contains 586ab6a
4.4.0-rc1~18
Cc: Andy Lutomirski
Cc: Suresh Siddha
Cc: Venkatesh Pallipadi
Cc: Ingo Molnar
Cc: Thomas Gleixner
Cc: Juergen Gross
Cc: Da
On 03/23/2015 01:46 PM, David Vrabel wrote:
On 20/03/15 12:55, Juergen Gross wrote:
Commit 054954eb051f35e74b75a566a96fe756015352c8 ("xen: switch to linear
virtual mapped sparse p2m list") introduced a regression regarding to
memory hotplug for a pv-domain: as the virtual space for th
i
Cc: Borislav Petkov
Cc: Borislav Petkov
Cc: Dave Hansen
Cc: David Vrabel
Cc: Dexuan Cui
Cc: Greg Kroah-Hartman
Cc: H. Peter Anvin
Cc: jbeul...@suse.com
Cc: Jan Beulich
Cc: Joonsoo Kim
Cc: Juergen Gross
Cc: Linus Torvalds
Cc: Pavel Machek
Cc: Thomas Gleixner
Cc: Tony Lindgren
Cc:
7e1 init.o.after
md5:
a82e11ff58bcfd0af3a94662a701f65d init.o.before.asm
a82e11ff58bcfd0af3a94662a701f65d init.o.after.asm
Cc: Andy Lutomirski
Cc: Dave Hansen
Cc: Jan Beulich
Cc: Juergen Gross
Cc: Linus Torvalds
Cc: Luis R. Rodriguez
Cc: Toshi Kani
Cc: linux-kernel@vger.kernel.org
Signed-off
Ping?
On 02/26/2015 06:52 AM, Juergen Gross wrote:
Using the pvops kernel a NULL pointer dereference was detected on a
large machine (144 processors) when booting as dom0 in
evtchn_fifo_unmask() during assignment of a pirq.
The event channel in question was the first to need a new entry in
On 03/06/2015 09:34 PM, Tao Chen wrote:
Add the {xen-pvscsi: } prefix in pr_fmt and remove DPRINTK, then
replace all DPRINTK with pr_debug.
Also fixed up some comments just as eliminate redundant whitespace
and format the code.
These will make the code easier to read.
Signed-off-by: Tao Chen
Reviewed-by: Juergen Gross
---
drivers/xen/xen-scsiback.c | 75 ++
1 file changed, 36 insertions(+), 39 deletions(-)
diff --git a/drivers/xen/xen-scsiback.c b/drivers/xen/xen-scsiback.c
index 9faca6a..d0b0bc5 100644
--- a/drivers/xen/xen
On 02/07/2015 04:31 AM, Rudy Zhang wrote:
From: Tao Chen
Signed-off-by: Tao Chen
Are some white space fixes in comments really worth a patch?
Juergen
---
drivers/xen/xen-scsiback.c | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/drivers/xen/xen-scsi
Hey, x86 maintainers!
could you please comment?
Juergen
On 01/28/2015 06:11 AM, Juergen Gross wrote:
*Ping*
David wants a comment from the x86 maintainers.
Juergen
On 01/21/2015 08:49 AM, Juergen Gross wrote:
Today there are several places in the kernel which build tables
containing one
addressed you can have my:
Acked-by: Juergen Gross
Signed-off-by: Tao Chen
---
drivers/xen/xen-scsiback.c | 67 +++---
1 file changed, 34 insertions(+), 33 deletions(-)
diff --git a/drivers/xen/xen-scsiback.c b/drivers/xen/xen-scsiback.c
index 9faca6
On 03/03/2015 08:20 PM, Luis R. Rodriguez wrote:
On Tue, Mar 3, 2015 at 2:06 AM, David Vrabel wrote:
On 03/03/15 09:40, Luis R. Rodriguez wrote:
Andrey,
I believe that on Xen we should disable kasan, would like confirmation
Why? This is the first of heard of this.
Andrey chimed in here c
On 03/02/2015 12:39 PM, David Vrabel wrote:
On 26/02/15 13:35, Juergen Gross wrote:
Introduces the Xen pvUSB backend. With pvUSB it is possible for a Xen
domU to communicate with a USB device assigned to that domU. The
communication is all done via the pvUSB backend in a driver domain
(usually
On 03/04/2015 02:41 PM, Ian Campbell wrote:
On Wed, 2015-03-04 at 14:31 +0100, Juergen Gross wrote:
- move module to appropriate location in kernel tree
drivers/xen/ is the correct location for this driver.
Hmm, so you regard placement of xen-netback under drivers/net and
xen-blkback under
On 03/04/2015 02:53 PM, David Vrabel wrote:
On 04/03/15 13:31, Juergen Gross wrote:
On 03/02/2015 12:39 PM, David Vrabel wrote:
On 26/02/15 13:35, Juergen Gross wrote:
Introduces the Xen pvUSB backend. With pvUSB it is possible for a Xen
domU to communicate with a USB device assigned to that
On 03/04/2015 03:29 PM, Ian Campbell wrote:
On Wed, 2015-03-04 at 14:19 +, David Vrabel wrote:
On 04/03/15 14:09, Juergen Gross wrote:
The main question whether it is worth to consider this alternative is
the performance aspect. Does anyone have an idea which USB devices would
typically
On 03/04/2015 04:27 PM, Greg KH wrote:
On Wed, Mar 04, 2015 at 02:31:08PM +0100, Juergen Gross wrote:
On 03/02/2015 12:39 PM, David Vrabel wrote:
On 26/02/15 13:35, Juergen Gross wrote:
Introduces the Xen pvUSB backend. With pvUSB it is possible for a Xen
domU to communicate with a USB device
08:49 AM, Juergen Gross wrote:
Today there are several places in the kernel which build tables
containing one entry for each possible Xen hypercall. Create an
infrastructure to be able to generate these tables at build time.
Based-on-patch-by: Jan Beulich
Signed-off-by: Juergen Gross
Reviewed-by
cious guest not being able to
bypass consistency checks of the backend by modifying an active
request.
Signed-off-by: Juergen Gross
---
drivers/xen/xen-scsiback.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/drivers/xen/xen-scsiback.c b/drivers/xen/xen-scsiback.c
nected to the
SCSI target associated with it.
Signed-off-by: Juergen Gross
---
drivers/xen/xen-scsiback.c | 19 ++-
1 file changed, 14 insertions(+), 5 deletions(-)
diff --git a/drivers/xen/xen-scsiback.c b/drivers/xen/xen-scsiback.c
index 6457784..4290921 100644
--- a/drivers/xen/xen
igned-off-by: Juergen Gross
---
drivers/scsi/xen-scsifront.c | 189 ---
1 file changed, 162 insertions(+), 27 deletions(-)
diff --git a/drivers/scsi/xen-scsifront.c b/drivers/scsi/xen-scsifront.c
index 34199d2..b32157b 100644
--- a/drivers/scsi/xen-scsifr
In the pvscsi backend copy the frontend request to ensure it is not
changed by the frontend during processing it in the backend.
Support suspend/resume of the domain to be able to access a pvscsi
device n the frontend afterwards.
Juergen Gross (3):
xen: mark pvscsi frontend request consumed
On 01/30/2015 12:47 PM, Jan Beulich wrote:
On 30.01.15 at 12:21, wrote:
@@ -734,11 +734,11 @@ static int scsiback_do_cmd_fn(struct vscsibk_info *info)
if (!pending_req)
return 1;
- ring_req = RING_GET_REQUEST(ring, rc);
+ memc
On 12/15/2014 08:52 AM, Jongman Heo wrote:
>> --- Original Message ---
>> Sender : Juergen Gross
>> Date : 2014-12-15 14:04 (GMT+09:00)
>> Title : Re: [3.18+] Can't boot with commit bd809af1 ("x86: Enable PAT to use
>> cache mode translation ta
On 12/16/2014 05:40 AM, Jongman Heo wrote:
>> --- Original Message ---
>> Sender : Juergen Gross
>> Date : 2014-12-15 20:52 (GMT+09:00)
>> Title : Re: [3.18+] Can't boot with commit bd809af1 ("x86: Enable PAT to use
>> cache mode translation tables
On 12/15/2014 01:05 PM, David Vrabel wrote:
On 11/12/14 18:04, Juergen Gross wrote:
Instead of manually list each hypercall in arch/x86/xen/xen-head.S
use the auto generated symbol list.
This also corrects the wrong address of xen_hypercall_mca which was
located 32 bytes higher than it should
On 12/16/2014 07:29 AM, Jongman Heo wrote:
>>
>> --- Original Message ---
>> Sender : Juergen Gross
>> Date : 2014-12-16 14:14 (GMT+09:00)
>> Title : Re: [3.18+] Can't boot with commit bd809af1 ("x86: Enable PAT to use
>> cache mode tra
quot;) triggers this VMWare bug when the
kernel is booted as a VMWare guest.
Reported-by: Jongman Heo
Signed-off-by: Juergen Gross
Tested-by: Jongman Heo
---
arch/x86/mm/pat.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/arch/x86/mm/pat.c b/arch/x86/mm/pat.c
index e
Hi,
doing
make binrpm-pkg O=jg/master
on latest //git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git
fails:
...
INSTALL sound/usb/usx2y/snd-usb-us122l.ko
INSTALL sound/usb/usx2y/snd-usb-usx2y.ko
DEPMOD 3.18.0+
+
INSTALL_FW_PATH=/home/gross/rpmbuild/BUILDROOT/kernel-3.18.0+-6.x86_
On 12/16/2014 11:24 AM, David Vrabel wrote:
On 16/12/14 05:55, Juergen Gross wrote:
On 12/15/2014 01:05 PM, David Vrabel wrote:
On 11/12/14 18:04, Juergen Gross wrote:
Instead of manually list each hypercall in arch/x86/xen/xen-head.S
use the auto generated symbol list.
This also corrects
On 12/15/2014 12:38 PM, David Vrabel wrote:
On 11/12/14 18:04, Juergen Gross wrote:
Today there are several places in the kernel which build tables
containing one entry for each possible Xen hypercall. Create an
infrastructure to be able to generate these tables at build time.
Does arm and
On 12/16/2014 05:47 PM, H. Peter Anvin wrote:
On 12/16/2014 01:58 AM, Juergen Gross wrote:
VMWare seems not to emulate the PAT MSR correctly: reaeding
MSR_IA32_CR_PAT returns 0 even after writing another value to it.
Detect this bug and don't use the read value if it is 0.
C
"autogenerated" comment to generated header file as suggested by
David Vrabel (patch 1)
- some minor adjustments to patch 4 as suggested by David Vrabel
Juergen Gross (4):
xen: build infrastructure for generating hypercall depending symbols
xen: synchronize include/xen/interface/xen.
Today there are several places in the kernel which build tables
containing one entry for each possible Xen hypercall. Create an
infrastructure to be able to generate these tables at build time.
Based-on-patch-by: Jan Beulich
Signed-off-by: Juergen Gross
---
arch/x86/syscalls/Makefile | 9
Instead of manually list all hypervisor calls in arch/x86/xen/trace.c
use the auto generated list.
Signed-off-by: Juergen Gross
Reviewed-by: David Vrabel
---
arch/x86/xen/trace.c | 50 --
1 file changed, 4 insertions(+), 46 deletions(-)
diff
The header include/xen/interface/xen.h doesn't contain all definitions
from Xen's version of that header. Update it accordingly.
Signed-off-by: Juergen Gross
Reviewed-by: David Vrabel
---
arch/x86/xen/trace.c| 2 +-
include/xen/interface/xen.h | 6 +-
2 files changed, 6
.
Based-on-patch-by: Jan Beulich
Signed-off-by: Juergen Gross
---
arch/x86/xen/xen-head.S | 63 -
1 file changed, 10 insertions(+), 53 deletions(-)
diff --git a/arch/x86/xen/xen-head.S b/arch/x86/xen/xen-head.S
index 674b2225..8afdfcc 100644
--- a/arch
Today there are several places in the kernel which build tables
containing one entry for each possible Xen hypercall. Create an
infrastructure to be able to generate these tables at build time.
Based-on-patch-by: Jan Beulich
Signed-off-by: Juergen Gross
Reviewed-by: David Vrabel
---
arch/x86
"autogenerated" comment to generated header file as suggested by
David Vrabel (patch 1)
- some minor adjustments to patch 4 as suggested by David Vrabel
Juergen Gross (4):
xen: build infrastructure for generating hypercall depending symbols
xen: synchronize include/xen/interface/xen.
The header include/xen/interface/xen.h doesn't contain all definitions
from Xen's version of that header. Update it accordingly.
Signed-off-by: Juergen Gross
Reviewed-by: David Vrabel
---
arch/x86/xen/trace.c| 2 +-
include/xen/interface/xen.h | 6 +-
2 files changed, 6
Instead of manually list all hypervisor calls in arch/x86/xen/trace.c
use the auto generated list.
Signed-off-by: Juergen Gross
Reviewed-by: David Vrabel
---
arch/x86/xen/trace.c | 50 --
1 file changed, 4 insertions(+), 46 deletions(-)
diff
.
Based-on-patch-by: Jan Beulich
Signed-off-by: Juergen Gross
Reviewed-by: David Vrabel
---
arch/x86/xen/xen-head.S | 63 -
1 file changed, 10 insertions(+), 53 deletions(-)
diff --git a/arch/x86/xen/xen-head.S b/arch/x86/xen/xen-head.S
index 674b2225
On 01/22/2015 08:11 AM, Steven Noonan wrote:
On Mon, Nov 3, 2014 at 5:01 AM, Juergen Gross wrote:
At the moment there are a lot of places that handle setting or getting
the page cache mode by treating the pgprot bits equal to the cache mode.
This is only true because there are a lot of
On 01/22/2015 12:06 PM, Thomas Gleixner wrote:
On Thu, 22 Jan 2015, Juergen Gross wrote:
On 01/22/2015 08:11 AM, Steven Noonan wrote:
I notice these two symbols are exported GPL-only. This breaks builds
of several out-of-tree non-GPL modules such as the NVIDIA driver, and
VMware modules, etc
s.
Change EXPORT_SYMBOL_GPL to EXPORT-SYMBOL for these two symbols.
Reported-by: Stevan Noonan
Signed-off-by: Juergen Gross
---
arch/x86/mm/init.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/mm/init.c b/arch/x86/mm/init.c
index 08a7d31..079c3b6 100644
---
igned-off-by: Juergen Gross
---
drivers/scsi/xen-scsifront.c | 214 ---
1 file changed, 179 insertions(+), 35 deletions(-)
diff --git a/drivers/scsi/xen-scsifront.c b/drivers/scsi/xen-scsifront.c
index 34199d2..78d9506 100644
--- a/drivers/scsi/xen-scsifr
Beulich
- added adaption of backend parameters in frontend after resuming
Juergen Gross (3):
xen: mark pvscsi frontend request consumed only after last read
xen: scsiback: add LUN of restored domain
xen: support suspend/resume in pvscsi frontend
drivers/scsi/xen-scsifront.c | 214
cious guest not being able to
bypass consistency checks of the backend by modifying an active
request.
Signed-off-by: Juergen Gross
---
drivers/xen/xen-scsiback.c | 14 ++
1 file changed, 6 insertions(+), 8 deletions(-)
diff --git a/drivers/xen/xen-scsiback.c b/drivers/xen/xen-scsiback.c
nected to the
SCSI target associated with it.
Signed-off-by: Juergen Gross
---
drivers/xen/xen-scsiback.c | 19 ++-
1 file changed, 14 insertions(+), 5 deletions(-)
diff --git a/drivers/xen/xen-scsiback.c b/drivers/xen/xen-scsiback.c
index 9faca6a..9d60176 100644
--- a/drivers/xen/xen
.
Juergen Gross (13):
xen: sync with xen header
xen: anchor linear p2m list in shared info structure
xen: eliminate scalability issues from initial mapping setup
xen: move static e820 map to global scope
xen: simplify xen_set_identity_and_remap() by using global variables
xen: detect pre
ve/restore/migration
are affected).
Memory above the domain limit is returned to the hypervisor instead of
being identity mapped, which was wrong anyways.
The kernel configuration parameter to specify the maximum size of a
domain can be deleted, as it is not relevant any more.
Signed-off-by: Jue
Check whether the page tables built by the domain builder are at
memory addresses which are in conflict with the target memory map.
If this is the case just panic instead of running into problems
later.
Signed-off-by: Juergen Gross
---
arch/x86/xen/mmu.c | 15 ---
1 file changed, 12
early, or lead to clobbered data as the target
memory area of the remap operation will no longer be reserved.
Signed-off-by: Juergen Gross
---
arch/x86/xen/setup.c | 26 +-
1 file changed, 21 insertions(+), 5 deletions(-)
diff --git a/arch/x86/xen/setup.c b/arch/x86/xen
Checks whether the pre-allocated memory of the loaded kernel is in
conflict with the target memory map. If this is the case, just panic
instead of run into problems later.
Signed-off-by: Juergen Gross
---
arch/x86/xen/setup.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/arch
When adapting the dom0 memory layout to that of the host make sure
the initrd isn't moved to another pfn range, as it won't be found
there any more.
The easiest way to accomplish that is by copying the initrd to an
area which is RAM according to the E820 map.
Signed-off-by: Jue
be usable for
cases only where the memory will no longer be needed when the remap
operation will be started, e.g. for the p2m list, which is already
copied then.
When doing the remap, check for not remapping a reserved page.
Signed-off-by: Juergen Gross
---
arch/x86/xen/setup.c | 185
In case a pre-allocated memory area is to be moved in order to avoid
a conflict with the target E820 map we need a way to copy data between
physical addresses.
Add a function doing this via early_memremap().
Signed-off-by: Juergen Gross
---
arch/x86/xen/setup.c | 29
passed as a parameter to
sub functions.
Simplify that construct by using just global variables in the
source for that purpose. This will make things simpler when we need
those values later, too.
Signed-off-by: Juergen Gross
---
arch/x86/xen/setup.c | 63
. Reading the generation count the Xen tools can
detect changes of the mappings and re-read the p2m list eventually.
Signed-off-by: Juergen Gross
---
arch/x86/xen/p2m.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/arch/x86/xen/p2m.c b/arch/x86/xen/p2m.c
index f18fd1d..df73cc5
to be done in any case.
Signed-off-by: Juergen Gross
---
arch/x86/xen/setup.c | 34 ++
arch/x86/xen/xen-ops.h | 1 +
2 files changed, 35 insertions(+)
diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
index a0af554..9c49d71 100644
--- a/arch/x86/xen/se
Use the newest header from the xen tree to get some new structure
layouts.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/xen/interface.h | 96
1 file changed, 87 insertions(+), 9 deletions(-)
diff --git a/arch/x86/include/asm/xen/interface.h
b/arch
r
being able to boot a Dom0 on a system with more than 512 GB memory.
Signed-off-by: Juergen Gross
Based-on-patch-by: Jan Beulich
---
arch/x86/xen/mmu.c | 126
arch/x86/xen/setup.c| 67 ++---
arch/x86/xen/xen-head.S |
Instead of using a function local static e820 map in xen_memory_setup()
and calling various functions in the same source with the map as a
parameter use a map directly accessible by all functions in the source.
Signed-off-by: Juergen Gross
---
arch/x86/xen/setup.c | 96
On 02/18/2015 10:21 AM, Paul Bolle wrote:
On Wed, 2015-02-18 at 07:52 +0100, Juergen Gross wrote:
64 bit pv-domains under Xen are limited to 512 GB of RAM today. The
main reason has been the 3 level p2m tree, which was replaced by the
virtual mapped linear p2m list. Parallel to the p2m list
On 02/18/2015 10:49 AM, Jan Beulich wrote:
On 18.02.15 at 10:37, wrote:
On 02/18/2015 10:21 AM, Paul Bolle wrote:
On Wed, 2015-02-18 at 07:52 +0100, Juergen Gross wrote:
--- a/arch/x86/xen/Kconfig
+++ b/arch/x86/xen/Kconfig
@@ -23,14 +23,29 @@ config XEN_PVHVM
def_bool y
On 02/18/2015 11:32 AM, David Vrabel wrote:
On 18/02/15 06:51, Juergen Gross wrote:
The linear p2m list should be anchored in the shared info structure
I'm not really sure what you mean by "anchored".
Bad wording? What about:
The virtual address of the linear p2m list shou
On 02/18/2015 11:50 AM, Andrew Cooper wrote:
On 18/02/15 10:42, Juergen Gross wrote:
/* Set up p2m_top to point to the domain-builder provided p2m
pages */
@@ -469,8 +473,10 @@ static pte_t *alloc_p2m_pmd(unsigned long addr,
pte_t *pte_pg)
ptechk = lookup_address(vaddr, &l
On 02/18/2015 11:54 AM, David Vrabel wrote:
On 18/02/15 10:50, Andrew Cooper wrote:
On 18/02/15 10:42, Juergen Gross wrote:
/* Set up p2m_top to point to the domain-builder provided p2m
pages */
@@ -469,8 +473,10 @@ static pte_t *alloc_p2m_pmd(unsigned long addr,
pte_t *pte_pg
Today there are several places in the kernel which build tables
containing one entry for each possible Xen hypercall. Create an
infrastructure to be able to generate these tables at build time.
Based-on-patch-by: Jan Beulich
Signed-off-by: Juergen Gross
---
arch/x86/syscalls/Makefile | 9
The Xen hypercalls are defined in include/xen/interface/xen.h. There
are some places where for each hypercall a table element is created.
Instead of manually add each hypercall element to these tables use
an auto generated header built during the make process of the kernel.
Juergen Gross (4
Instead of manually list all hypervisor calls in arch/x86/xen/trace.c
use the auto generated list.
Signed-off-by: Juergen Gross
---
arch/x86/xen/trace.c | 50 --
1 file changed, 4 insertions(+), 46 deletions(-)
diff --git a/arch/x86/xen/trace.c b
The header include/xen/interface/xen.h doesn't contain all definitions
from Xen's version of that header. Update it accordingly.
Signed-off-by: Juergen Gross
---
arch/x86/xen/trace.c| 2 +-
include/xen/interface/xen.h | 6 +-
2 files changed, 6 insertions(+), 2 deletion
.
Based-on-patch-by: Jan Beulich
Signed-off-by: Juergen Gross
---
arch/x86/xen/xen-head.S | 62 -
1 file changed, 10 insertions(+), 52 deletions(-)
diff --git a/arch/x86/xen/xen-head.S b/arch/x86/xen/xen-head.S
index 674b2225..b2ba341 100644
--- a/arch
On 12/14/2014 06:07 AM, 허종만 wrote:
>
> Hi,
>
> My Linux virtual machine on (Windows) VMWare workstation 10 can't boot with
> following commit.
>
> commit bd809af16e3ab1f8d55b3e2928c47c67e2a865d2
> Author: Juergen Gross
> Date: Mon Nov 3 14:02:03 2014 +0100
On 12/12/2014 11:48 PM, Boris Ostrovsky wrote:
On 12/11/2014 01:04 PM, Juergen Gross wrote:
diff --git a/scripts/xen-hypercalls.sh b/scripts/xen-hypercalls.sh
new file mode 100644
index 000..e6447b7
--- /dev/null
+++ b/scripts/xen-hypercalls.sh
@@ -0,0 +1,11 @@
+#!/bin/sh
+out="$1&qu
o lost
> interrupts and the kernel survives. To do that, remove the
> VCPU_SSHOTTMR_future flag.
>
> Signed-off-by: Stefano Stabellini
Acked-by: Juergen Gross
>
> diff --git a/arch/x86/xen/time.c b/arch/x86/xen/time.c
> index a0a4e55..6deba5b 100644
> --- a/arch/x86/xen/time
On 20/04/16 15:15, Stefano Stabellini wrote:
> b4ff8389ed14 is incomplete: relies on nr_legacy_irqs() to get the number
> of legacy interrupts when actually nr_legacy_irqs() returns 0 after
> probe_8259A(). Use NR_IRQS_LEGACY instead.
Would you mind describing the resulting problem? With this comm
On 21/04/16 12:57, Pali Rohár wrote:
> On Tuesday 05 April 2016 21:31:52 Pali Rohár wrote:
>> On Tuesday 05 April 2016 16:54:14 Guenter Roeck wrote:
>>> On Tue, Apr 05, 2016 at 07:10:07AM +0200, Juergen Gross wrote:
>>>> Use the smp_call_on_cpu() function to call syst
Correct the size of the module mapping space and the maximum available
physical memory size of current processors.
Signed-off-by: Juergen Gross
---
Documentation/x86/x86_64/mm.txt | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/Documentation/x86/x86_64/mm.txt b
k you.
You're welcome. :-)
Juergen
>
> On Mon, Jul 20, 2015 at 8:13 AM, Juergen Gross <mailto:jgr...@suse.com>> wrote:
>
> Ping?
>
>
> On 06/23/2015 08:53 AM, Juergen Gross wrote:
>
> This series adds XEN guest pvUSB support. With p
On 07/04/16 02:06, Luis R. Rodriguez wrote:
> Now that Andy's ASM paravirt_enabled() use is merged all we need is to address
> the rest of the C code uses. This completes that work by providing proper
> semantics for platform legacy settings and quirks as suggested by Ingo, this
> in
> turn can al
On 08/04/16 02:32, Luis R. Rodriguez wrote:
> On Thu, Apr 07, 2016 at 08:55:54AM -0400, Boris Ostrovsky wrote:
>> On 04/06/2016 08:06 PM, Luis R. Rodriguez wrote:
>>> We have 4 types of x86 platforms that disable RTC:
>>>
>>> * Intel MID
>>> * Lguest - uses paravirt
>>> * Xen dom-U - uses par
On 08/04/16 08:29, Luis R. Rodriguez wrote:
> On Thu, Apr 7, 2016 at 10:18 PM, Juergen Gross wrote:
>> On 08/04/16 02:32, Luis R. Rodriguez wrote:
>>> This highlights a semantic gap issue. From a quick cursory review, I think
>>> we can address this temporarily by just
On 08/04/16 08:56, Luis R. Rodriguez wrote:
> On Thu, Apr 7, 2016 at 11:38 PM, Juergen Gross wrote:
>> On 08/04/16 08:29, Luis R. Rodriguez wrote:
>>> On Thu, Apr 7, 2016 at 10:18 PM, Juergen Gross wrote:
>>>> On 08/04/16 02:32, Luis R. Rodriguez wrote:
>>>
On 08/04/16 09:36, Luis R. Rodriguez wrote:
> On Fri, Apr 8, 2016 at 12:13 AM, Juergen Gross wrote:
>> On 08/04/16 08:56, Luis R. Rodriguez wrote:
>>> On Thu, Apr 7, 2016 at 11:38 PM, Juergen Gross wrote:
>>>> On 08/04/16 08:29, Luis R. Rodriguez wrote:
>>
On 08/04/16 22:40, Luis R. Rodriguez wrote:
> On Wed, Apr 06, 2016 at 10:40:08AM +0100, David Vrabel wrote:
>> On 06/04/16 03:40, Luis R. Rodriguez wrote:
>>>
>>> * You don't need full EFI emulation
>>
>> I think needing any EFI emulation inside Xen (which is where it would
>> need to be for do
On 09/04/16 01:40, Luis R. Rodriguez wrote:
> We have 4 types of x86 platforms that disable RTC:
>
> * Intel MID
> * Lguest - uses paravirt
> * Xen dom-U - uses paravirt
> * x86 on legacy systems annotated with an ACPI legacy flag
>
> We can consolidate all of these into a platform specif
-
> arch/x86/include/asm/processor.h | 1 -
> arch/x86/kernel/kvm.c | 8
> arch/x86/kernel/paravirt.c| 1 -
> arch/x86/lguest/boot.c| 2 --
> arch/x86/xen/enlighten.c | 1 -
> 7 files changed, 19 deletions(
On 04/04/16 18:48, Boris Ostrovsky wrote:
> On 04/04/2016 12:30 PM, David Vrabel wrote:
>> On 04/04/16 17:21, Julien Grall wrote:
>>> (CC Stefano new e-mail address)
>>>
>>> Hello Anna-Maria,
>>>
>>> On 04/04/2016 13:32, Anna-Maria Gleixner wrote:
Xen guests do not offline/online CPUs during s
r the hypervisor isn't supporting it, issue a
warning once and disable further pinning attempts.
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten.c | 40
1 file changed, 40 insertions(+)
diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlight
pervisor.h to hide architecture specific stuff
from generic kernel code
Juergen Gross (6):
xen: sync xen header
virt, sched: add generic vcpu pinning support
smp: add function to execute a function synchronously on a cpu
xen: add xen_pin_vcpu() to support calling functions on a dedicate
Add generic virtualization support for pinning the current vcpu to a
specified physical cpu. As this operation isn't performance critical
(a very limited set of operations like BIOS calls and SMIs is expected
to need this) just add a hypervisor specific indirection.
Signed-off-by: Juergen
Use the smp_call_on_cpu() function to call system management
mode on cpu 0.
Make call secure by adding get_online_cpus() to avoid e.g. suspend
resume cycles in between.
Signed-off-by: Juergen Gross
---
V4: add call to get_online_cpus()
---
drivers/hwmon/dell-smm-hwmon.c | 35
Import the actual version of include/xen/interface/sched.h from Xen.
Signed-off-by: Juergen Gross
---
include/xen/interface/sched.h | 100 ++
1 file changed, 82 insertions(+), 18 deletions(-)
diff --git a/include/xen/interface/sched.h b/include/xen
Use smp_call_on_cpu() to raise SMI on cpu 0.
Make call secure by adding get_online_cpus() to avoid e.g. suspend
resume cycles in between.
Signed-off-by: Juergen Gross
---
V4: add call to get_online_cpus()
---
drivers/firmware/dcdbas.c | 51 ---
1 file
901 - 1000 of 2347 matches
Mail list logo