From: "Edgar E. Iglesias"
The Stage2 input-size must match what the CPU uses because
the SMMU and the CPU share page-tables.
Assert that the SMMU supports the given pfn bit size is
supported by the SMMU and use it.
Signed-off-by: Edgar E. Iglesias
---
xen/drivers/passthrough/arm/smmu.c | 5 ++
From: "Edgar E. Iglesias"
Export p2m_pfn_bits holding the bit size of pfn addresses used
in p2m tables.
Signed-off-by: Edgar E. Iglesias
---
xen/arch/arm/p2m.c| 5 +
xen/include/asm-arm/p2m.h | 3 +++
2 files changed, 8 insertions(+)
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/
From: "Edgar E. Iglesias"
This is needed to allow the paging setup to probe for
pfn bit sizes to be used in p2m tables prior to iommu setup.
Signed-off-by: Edgar E. Iglesias
---
xen/arch/arm/setup.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm/setup.c b/
From: "Edgar E. Iglesias"
Hi,
This is a fix for the issue I'm seeing on ZynqMP with missmatched
setup of the SMMU and the shared p2m page-tables with the CPU.
This implementes a global p2m_pfn_bits cap for S2 input-size as
discussed in the previous RFC.
Best regards,
Edgar
v1 -> v2:
* Use a g
flight 52632 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/52632/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 5 kernel-build fail REGR. vs. 36517
build-a
flight 52704 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/52704/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen5 rumpuserxen-build fail REGR. vs. 33866
build-amd64-rumpuserx
On Wed, Apr 29, 2015 at 01:26:10PM +0300, Razvan Cojocaru wrote:
> Hello,
>
> This happens:
>
> (gdb) r create /etc/xen/4xenwin7.conf
> Starting program: /usr/sbin/xl create /etc/xen/4xenwin7.conf
> warning: no loadable sections found in added symbol-file system-supplied
> DSO at 0x77ffa000
>
>>> David Vrabel 04/29/15 5:28 PM >>>
>On 29/04/15 00:15, Jan Beulich wrote:
> David Vrabel 04/28/15 6:16 PM >>>
>>> Are there any structures whose size you're particularly concerned about?
>>
>> No specific ones (but of course structures with an inherent size constraint
>> - like struct dom
>>> David Vrabel 04/29/15 5:39 PM >>>
>On 23/04/15 15:58, Jan Beulich wrote:
> On 23.04.15 at 16:43, wrote:
>>> At 14:54 +0100 on 23 Apr (1429800874), Jan Beulich wrote:
>>> AIUI, the '++' could end up as a word-size read, modify, and word-size
>>> write. If another CPU updates .tail paralle
flight 52631 linux-3.16 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/52631/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3863 host-install(3) broken REGR. vs. 34167
test-amd64-amd64-pair
From: "Luis R. Rodriguez"
We are burrying direct access to MTRR code support on
x86 in order to take advantage of PAT. In the future we
also want to make the default behaviour of ioremap_nocache()
to use strong UC, use of mtrr_add() on those systems
would make write-combining void.
In order to h
From: "Luis R. Rodriguez"
We are burrying direct access to MTRR code support on
x86 in order to take advantage of PAT. In the future we
also want to make the default behaviour of ioremap_nocache()
to use strong UC, use of mtrr_add() on those systems
would make write-combining void.
In order to h
From: "Luis R. Rodriguez"
Now that we have pci_iomap_wc() add the respective devres helpers.
Cc: Toshi Kani
Cc: Andy Lutomirski
Cc: Suresh Siddha
Cc: Ingo Molnar
Cc: Thomas Gleixner
Cc: Juergen Gross
Cc: Daniel Vetter
Cc: Dave Airlie
Cc: Bjorn Helgaas
Cc: Antonino Daplas
Cc: Jean-Chris
From: "Luis R. Rodriguez"
This allows drivers to take advantage of write-combining
when possible. Ideally we'd have pci_read_bases() just
peg an IORESOURCE_WC flag for us but where exactly
video devices memory lie varies *largely* and at times things
are mixed with MMIO registers, sometimes we ca
After a resume the hypervisor/tools may change console event
channel number. We should re-query it.
Signed-off-by: Boris Ostrovsky
Reviewed-by: David Vrabel
---
drivers/tty/hvc/hvc_xen.c | 18 +-
1 files changed, 17 insertions(+), 1 deletions(-)
diff --git a/drivers/tty/hvc/h
Fixes for issues that we discovered during live migration when source and
target systems have different event channel assignments for guests.
Changes in v2:
* Don't use IRQ_MOVE_PCNTXT, bind channels to VCPUs explicitly in
rebind_evtchn_irq()
* Use xenstore_domain_type to determine whether to ins
.. because bind_evtchn_to_cpu(evtchn, cpu) will map evtchn to
'info' and pass 'info' down to xen_evtchn_port_bind_to_cpu().
Signed-off-by: Boris Ostrovsky
Reviewed-by: David Vrabel
Tested-by: Annie Li
---
drivers/xen/events/events_base.c |2 +-
1 files changed, 1 insertions(+), 1 deletions
When a guest is resumed, the hypervisor may change event channel
assignments. If this happens and the guest uses 2-level events it
is possible for the interrupt to be claimed by wrong VCPU since
cpu_evtchn_mask bits may be stale. This can happen even though
evtchn_2l_bind_to_cpu() attempts to clear
After a resume the hypervisor/tools may change xenbus event
channel number. We should re-query it.
Signed-off-by: Boris Ostrovsky
---
Changes in v2:
* Use xenstore_domain_type to determine whether to install resume notifier
drivers/xen/xenbus/xenbus_probe.c | 29 +
On 04/29/2015 01:59 PM, David Vrabel wrote:
On 29/04/15 17:54, Boris Ostrovsky wrote:
On 04/29/2015 12:32 PM, David Vrabel wrote:
On 28/04/15 19:29, Boris Ostrovsky wrote:
On 04/28/2015 12:28 PM, David Vrabel wrote:
From the commit log the evtchn_2l_resume() fucntion that's added
sounds
li
On Wed, Apr 29, 2015 at 11:11 AM, Peter Zijlstra wrote:
> On Fri, Apr 24, 2015 at 02:56:42PM -0400, Waiman Long wrote:
>> In the pv_scan_next() function, the slow cmpxchg atomic operation is
>> performed even if the other CPU is not even close to being halted. This
>> extra cmpxchg can harm slowpa
On Fri, Apr 24, 2015 at 02:56:42PM -0400, Waiman Long wrote:
> In the pv_scan_next() function, the slow cmpxchg atomic operation is
> performed even if the other CPU is not even close to being halted. This
> extra cmpxchg can harm slowpath performance.
>
> This patch introduces the new mayhalt fla
On 29/04/15 17:30, Vijay Kilari wrote:
> On Wed, Apr 29, 2015 at 9:56 PM, Vijay Kilari wrote:
>> On Wed, Apr 29, 2015 at 7:05 PM, Julien Grall
>> wrote:
>>> On 29/04/15 12:56, Julien Grall wrote:
As the 2 suggested approach don't seem to fit our usage, we need to find
another approach.
On 29/04/15 17:54, Boris Ostrovsky wrote:
> On 04/29/2015 12:32 PM, David Vrabel wrote:
>> On 28/04/15 19:29, Boris Ostrovsky wrote:
>>> On 04/28/2015 12:28 PM, David Vrabel wrote:
From the commit log the evtchn_2l_resume() fucntion that's added
sounds
like it fixes the probl
flight 52626 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/52626/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 12 guest-saverestore fail REGR. vs. 50281
test-amd64
Introduce an error_echo function that prints to stderr.
Call error_echo or verbose_echo, instead of echo, when possible and
appropriate.
Redirect build and tests output to /dev/null unless VERBOSE==1.
Redirect apt-get and yum output to /dev/null.
Fix echo arguments in check-package-deb.
Signed-off
Add a few functions to create partitions, install and configure grub in
the VM disk. Introduce a script to loopmount a partition within a VM
disk.
Add a new test that creates a local HVM guest, boots it and check the
network.
Signed-off-by: Stefano Stabellini
---
defconfig |4 +--
Introduce a new command to run functional tests and unit tests.
Introduce a generic infrastrucutre to run tests on the local machine.
Add a library of common functions that can be used by the test scripts
to setup guest VMs.
Add a simple test script that boots a single busybox based PV guest.
Sig
Hi all,
this patch series introduces a framework to execute simple unit and
functional tests in raisin. It can be used by developers to validate
their changes before submitting a patch series to xen-devel. It can also
be used by OSSTest to test for regressions on one particular
functionality. This
On 29/04/15 17:56, Tim Deegan wrote:
> At 16:36 +0100 on 29 Apr (1430325362), David Vrabel wrote:
>> On 23/04/15 15:58, Jan Beulich wrote:
>> On 23.04.15 at 16:43, wrote:
At 14:54 +0100 on 23 Apr (1429800874), Jan Beulich wrote:
On 23.04.15 at 14:03, wrote:
>> At 11:11 +0100
At 16:36 +0100 on 29 Apr (1430325362), David Vrabel wrote:
> On 23/04/15 15:58, Jan Beulich wrote:
> On 23.04.15 at 16:43, wrote:
> >> At 14:54 +0100 on 23 Apr (1429800874), Jan Beulich wrote:
> >> On 23.04.15 at 14:03, wrote:
> At 11:11 +0100 on 21 Apr (1429614687), David Vrabel wr
On 04/29/2015 12:32 PM, David Vrabel wrote:
On 28/04/15 19:29, Boris Ostrovsky wrote:
On 04/28/2015 12:28 PM, David Vrabel wrote:
On 28/04/15 16:52, Boris Ostrovsky wrote:
When a guest is resumed, the hypervisor may change event channel
assignments. If this happens and the guest uses 2-level e
On 03/04/15 07:42, Bob Liu wrote:
> Commit c43cf3ea8385 ("xen-blkback: safely unmap grants in case they are still
> in use") use gnttab_unmap_refs_async() to wait until the mapped pages are no
> longer in use before unmapping them, but that commit missed the persistent
> case.
> Purge persistent p
Fabio Fantoni wrote:
> Il 29/04/2015 02:21, Andrew Cooper ha scritto:
>> On 28/04/15 23:17, Jim Fehlig wrote:
>>> Jim Fehlig wrote:
wei.l...@citrix.com wrote:
> Hi all
>
> We are now three months into 4.6 development window. This is an
> email to keep
> track of all the pat
Hi Ian,
On 20/04/15 13:16, Ian Campbell wrote:
> This function iterates over a nodes interrupt-map property and calls a
> callback for each interrupt. For now it only supplies the raw IRQ
> since my use case has no need of e.g. child unit address. These can be
> added as needed by any future users
On 13/04/15 00:26, Ben Hutchings wrote:
> The variable for the 'permissive' module parameter used to be static
> but was recently changed to be extern. This puts it in the kernel
> global namespace if the driver is built-in, so its name should begin
> with a prefix identifying the driver.
Applied
On 28/04/15 19:29, Boris Ostrovsky wrote:
> On 04/28/2015 12:28 PM, David Vrabel wrote:
>> On 28/04/15 16:52, Boris Ostrovsky wrote:
>>> When a guest is resumed, the hypervisor may change event channel
>>> assignments. If this happens and the guest uses 2-level events it
>>> is possible for the int
On Wed, Apr 29, 2015 at 9:56 PM, Vijay Kilari wrote:
> Hi Julien,
>
> On Wed, Apr 29, 2015 at 7:05 PM, Julien Grall wrote:
>> On 29/04/15 12:56, Julien Grall wrote:
>>> As the 2 suggested approach don't seem to fit our usage, we need to find
>>> another approach.
>>
>> I think I have another appr
Hi Ian,
On 20/04/15 13:16, Ian Campbell wrote:
> +static int map_interrupt_to_domain(const struct dt_device_node *dev,
> + const struct dt_raw_irq *dt_raw_irq,
> + void *data)
> +{
[..]
> +res = route_irq_to_guest(d, dt_irq.
Hi Julien,
On Wed, Apr 29, 2015 at 7:05 PM, Julien Grall wrote:
> On 29/04/15 12:56, Julien Grall wrote:
>> As the 2 suggested approach don't seem to fit our usage, we need to find
>> another approach.
>
> I think I have another approach which doesn't require interrupt neither
> polling in EL2.
On 4/28/2015 4:14 PM, Julien Grall wrote:
>
> On 28/04/2015 20:14, Robert VanVossen wrote:
>> Hello,
>
> Hi Robert,
>
>> I was wondering, what is the current state of running a 32-bit ARM guest
>> running
>> on a 64-bit Xen for ARM. I was working on getting the minios from
>> https://github.c
Hi Ian,
On 20/04/15 13:16, Ian Campbell wrote:
> all gics.
Shouldn't it belong to the subject?
> Although in principal #interrupt-cells can vary it must always be 3
> for a GIC (and we only support GIC as a guest interrupt controller),
> so putting it in common code is OK.
>
> Signed-off-by: Ia
On 28/04/15 23:46, Boris Ostrovsky wrote:
> Commit 77e32c89a711 ("clockevents: Manage device's state separately for
> the core") decouples clockevent device's modes from states. With this
> change when a Xen guest tries to resume, it won't be calling its
> set_mode op which needs to be done on each
El 29/04/15 a les 15.44, Andrew Cooper ha escrit:
> On 29/04/15 12:05, Roger Pau Monné wrote:
>> El 29/04/15 a les 2.38, Andrew Cooper ha escrit:
>>>
+
+if ( is_pvh_domain(d) )
+{
+for ( i = 0; i < 0x1; i++ )
+/* NB: 0xcf8 has special treatme
(Some) SAS storage controller drivers do not recognise attached SATA
disks when this option is not set. It is inexplicably not set by
default in Linux 3.14.36 (at least).
Signed-off-by: Ian Jackson
---
ts-kernel-build |1 +
1 file changed, 1 insertion(+)
diff --git a/ts-kernel-build b/ts-k
On 23/04/15 15:58, Jan Beulich wrote:
On 23.04.15 at 16:43, wrote:
>> At 14:54 +0100 on 23 Apr (1429800874), Jan Beulich wrote:
>> On 23.04.15 at 14:03, wrote:
At 11:11 +0100 on 21 Apr (1429614687), David Vrabel wrote:
> void _spin_unlock(spinlock_t *lock)
> {
> +s
On 29/04/15 00:15, Jan Beulich wrote:
David Vrabel 04/28/15 6:16 PM >>>
>> On 23/04/15 12:58, Jan Beulich wrote:
+typedef union {
+u32 head_tail;
+struct {
+u16 head;
+u16 tail;
+};
+} spinlock_tickets_t;
+
typedef stru
> Tian, Kevin wrote on 2015-04-03:
> >> From: Tim Deegan [mailto:t...@xen.org]
> >> Sent: Thursday, March 26, 2015 7:10 PM
> >>
> >> Hi, VMX maintainers,
> >>
> >> I was looking at the nested EPT code while following up on Ed's email
> >> about altp2m design, and I can't see where nested-EPT entrie
On 29/04/15 12:05, Roger Pau Monné wrote:
El 29/04/15 a les 2.38, Andrew Cooper ha escrit:
+
+if ( is_pvh_domain(d) )
+{
+for ( i = 0; i < 0x1; i++ )
+/* NB: 0xcf8 has special treatment so we need to trap it. */
Why? (and irrespective of my question, cf8 expec
2015-04-28 22:46 GMT-04:00 Xuehan Xu :
> -- Forwarded message --
> From: "Xuehan Xu"
> Date: Apr 29, 2015 10:11 AM
> Subject: How to get real time in a xen vm?
> To:
> Cc:
>
> Hi, everyone
>
> Recently, I got a need to measure the latency of the I/O operation of
> TAPDISK on dom0
On 29/04/15 12:56, Julien Grall wrote:
> As the 2 suggested approach don't seem to fit our usage, we need to find
> another approach.
I think I have another approach which doesn't require interrupt neither
polling in EL2.
1) Trap on CWRITER
a) Read command for the vITS CQ
b) Transform comma
On 29/04/15 12:55, Roger Pau Monne wrote:
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports rangeset.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc:
On 29/04/15 14:08, Manish Jaggi wrote:
>>> Do you have any other security concern ?
>> Yes. The one we talked in every mail since the beginning of this thread
>> "polling in EL2". We got several XSA because the hypervisor code wasn't
>> preemptible (see [1])
>>
> We are removing polling using comma
On Wednesday 29 April 2015 06:31 PM, Julien Grall wrote:
On 29/04/15 13:33, Manish Jaggi wrote:
On Wednesday 29 April 2015 05:51 PM, Julien Grall wrote:
On 29/04/15 13:12, Manish Jaggi wrote:
and that too ITS is not in critical path. It is only used when
configuring interrupts of the device?
On 29/04/15 13:33, Manish Jaggi wrote:
> On Wednesday 29 April 2015 05:51 PM, Julien Grall wrote:
>> On 29/04/15 13:12, Manish Jaggi wrote:
> and that too ITS is not in critical path. It is only used when
> configuring interrupts of the device?
You need to think about security... Even
>>> Konrad Rzeszutek Wilk 04/24/15 10:48 PM >>>
>For example on Dell machines we see:
>
>(XEN) 0fed18000-0fed19fff type=11 attr=8000
>(XEN) Unknown cachability for MFNs 0xfed18-0xfed19
>
>Lets allow them to be mapped as WB.
UC ...
>+> `attr`
>+
>+> Default: `false`
>+
>+>> A
>>> Konrad Rzeszutek Wilk 04/24/15 10:48 PM >>>
>--- a/xen/arch/x86/efi/efi-boot.h
>+++ b/xen/arch/x86/efi/efi-boot.h
>@@ -133,7 +133,8 @@ static void __init
>efi_arch_process_memory_map(EFI_SYSTEM_TABLE *SystemTable,
>void *map,
Il 29/04/2015 12:23, Fabio Fantoni ha scritto:
Il 29/04/2015 02:21, Andrew Cooper ha scritto:
On 28/04/15 23:17, Jim Fehlig wrote:
Jim Fehlig wrote:
wei.l...@citrix.com wrote:
Hi all
We are now three months into 4.6 development window. This is an
email to keep
track of all the patch series
>>> Konrad Rzeszutek Wilk 04/24/15 10:47 PM >>>
>The '/noexit' parameter will inhibit Xen in calling ExitBootServices.
>
>That helps with some platforms with GetNextVariableName which
>cannot deal running in 1-1 mode and having BootSevices being disabled.
It's unfortunate that this is the first r
On Wednesday 29 April 2015 05:51 PM, Julien Grall wrote:
On 29/04/15 13:12, Manish Jaggi wrote:
and that too ITS is not in critical path. It is only used when
configuring interrupts of the device?
You need to think about security... Even though the ITS should only
be used for configuring int
On Wed, Apr 29, 2015 at 12:45:45PM +0100, Ian Jackson wrote:
> The symptoms are that `umount' fails with EBUSY,
[lizf: Backported to 3.4:
- remove the changes to follow_link() as it doesn't call set_root()]
looks dubious - I don't have -stable in front of me, but set_root() in
follow_li
>>> Paul Durrant 04/24/15 6:35 PM >>>
>+/* The following parameters cannot be set by the guest */
Please add a stop ad the end of at least sentence-like comments.
>case HVM_PARAM_DM_DOMAIN:
>-/* Not reflexive, as we may need to domain_pause(). */
Especially when the reason for not a
On 29/04/15 13:12, Manish Jaggi wrote:
>>> and that too
>>> ITS is not in critical path.
>>> It is only used when configuring interrupts of the device?
>> You need to think about security... Even though the ITS should only be
>> used for configuring interrupts, a malicious guest could try to exploi
On Wednesday 29 April 2015 05:26 PM, Julien Grall wrote:
Hello,
On 29/04/15 02:44, Vijay Kilari wrote:
On Tue, Apr 28, 2015 at 9:45 PM, Julien Grall wrote:
On 28/04/15 12:36, Vijay Kilari wrote:
On Tue, Apr 28, 2015 at 4:05 PM, Julien Grall wrote:
If you properly manage the device with s
Hello,
On 29/04/15 02:44, Vijay Kilari wrote:
> On Tue, Apr 28, 2015 at 9:45 PM, Julien Grall wrote:
>> On 28/04/15 12:36, Vijay Kilari wrote:
>>> On Tue, Apr 28, 2015 at 4:05 PM, Julien Grall
>>> wrote:
If you properly manage the device with struct pci_dev or struct device
(which is,
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports rangeset.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Boris Ostrovsky
Cc: Sur
On 04/21/2015 11:22 AM, Kevin O'Connor wrote:
On Mon, Mar 30, 2015 at 05:09:47AM +, Xu, Quan wrote:
[...]
I will go through all of these seabios patch, and try to make it compatible for
Xen vTPM.
What's the status of this? Is it safe to push forward parts of
Stefan's patches, or does
>>> David Vrabel 04/29/15 12:54 PM >>>
>On 23/04/15 16:04, Jan Beulich wrote:
>>> --- a/xen/include/xen/grant_table.h
>>> +++ b/xen/include/xen/grant_table.h
>>> @@ -82,7 +82,12 @@ struct grant_table {
>>> struct grant_mapping **maptrack;
>>> unsigned int maptrack_head;
>>>
El 29/04/15 a les 2.38, Andrew Cooper ha escrit:
> On 28/04/15 16:44, Roger Pau Monne wrote:
>> Since a PVH hardware domain has access to the physical hardware create a
>> custom more permissive IO bitmap. The permissions set on the bitmap are
>> populated based on the contents of the ioports range
Hi Pranav,
On 29/04/15 10:38, Pranavkumar Sawargaonkar wrote:
> In old X-Gene Storm firmware and DT, secure mode addresses have been
> mentioned in GICv2 node. In this case maintenance interrupt is used
> instead of EOI HW method.
>
> This patch checks the GIC Distributor Base Address to enable E
On 23/04/15 16:04, Jan Beulich wrote:
>
>> --- a/xen/include/xen/grant_table.h
>> +++ b/xen/include/xen/grant_table.h
>> @@ -82,7 +82,12 @@ struct grant_table {
>> struct grant_mapping **maptrack;
>> unsigned int maptrack_head;
>> unsigned int maptrack_limit;
>> -
On 04/29/2015 01:32 PM, Andrew Cooper wrote:
> On 29/04/15 11:26, Razvan Cojocaru wrote:
>> (gdb) p list->values[entry]
>> $2 = (XLU_ConfigValue *) 0x0
>
> As it turns out, the very top commit in staging is a fix for this bug.
I see, sorry for the noise.
Thanks,
Razvan
On 29/04/15 11:26, Razvan Cojocaru wrote:
Hello,
This happens:
(gdb) r create /etc/xen/4xenwin7.conf
Starting program: /usr/sbin/xl create /etc/xen/4xenwin7.conf
warning: no loadable sections found in added symbol-file system-supplied
DSO at 0x77ffa000
[Thread debugging using libthread_db e
Hello,
This happens:
(gdb) r create /etc/xen/4xenwin7.conf
Starting program: /usr/sbin/xl create /etc/xen/4xenwin7.conf
warning: no loadable sections found in added symbol-file system-supplied
DSO at 0x77ffa000
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/li
Il 29/04/2015 02:21, Andrew Cooper ha scritto:
On 28/04/15 23:17, Jim Fehlig wrote:
Jim Fehlig wrote:
wei.l...@citrix.com wrote:
Hi all
We are now three months into 4.6 development window. This is an
email to keep
track of all the patch series I gathered. It is by no means
complete and / or
On 28/04/15 23:17, Jim Fehlig wrote:
Jim Fehlig wrote:
wei.l...@citrix.com wrote:
Hi all
We are now three months into 4.6 development window. This is an email to keep
track of all the patch series I gathered. It is by no means complete and / or
acurate. Feel free to reply this email with n
On 28/04/15 16:44, Roger Pau Monne wrote:
Since a PVH hardware domain has access to the physical hardware create a
custom more permissive IO bitmap. The permissions set on the bitmap are
populated based on the contents of the ioports rangeset.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc:
In old X-Gene Storm firmware and DT, secure mode addresses have been
mentioned in GICv2 node. In this case maintenance interrupt is used
instead of EOI HW method.
This patch checks the GIC Distributor Base Address to enable EOI quirk
for old firmware.
Ref:
http://lists.xen.org/archives/html/xen-d
Usage:
vga="qxl"
Qxl vga support many resolutions that not supported by stdvga,
mainly the 16:9 ones and other high up to 2560x1600.
With QXL you can get improved performance and smooth video also
with high resolutions and high quality.
Require their drivers installed in the domU and spice used
ot
79 matches
Mail list logo