>>> On 24.06.16 at 05:12, wrote:
> flight 96176 xen-4.3-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/96176/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-i386-libvirt5 libvirt-build
> >> > @@ -122,10 +124,25 @@ static void vmx_vcpu_block(struct vcpu *v)
> >> > * new vCPU to the list.
> >> > */
> >> > spin_unlock_irqrestore(&v->arch.hvm_vmx.pi_hotplug_lock, flags);
> >> > -return;
> >> > +return 1;
> >> > }
> >> >
> >> > sp
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Thursday, June 23, 2016 5:33 AM
> To: Wu, Feng ; xen-devel@lists.xen.org
> Cc: k...@xen.org; Tian, Kevin ; jbeul...@suse.com;
> andrew.coop...@citrix.com; george.dun...@eu.citrix.com;
> konrad.w...@orac
>>> On 23.06.16 at 20:23, wrote:
First of all - please don't top post.
> I'm opposed to moving HVMOP_cmd_min and HVMOP_cmd_max somewhere else. That
> would make reading/understanding of the macros more difficult. This practice
> is common. Also, If min & max are defined elsewhere, it will b
>>> On 24.06.16 at 06:16, wrote:
> I'm now willing to take your suggestions:
> a> still need the p2m resetting when ioreq server is unbounded;
> b> disable log dirty feature if one ioreq server is bounded.
>
> Does anyone else has different opinions? Thanks!
Hmm, in particular for a) I don't thi
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Thursday, June 23, 2016 11:12 PM
> To: Wu, Feng ; Jan Beulich
> Cc: Tian, Kevin ; k...@xen.org;
> george.dun...@eu.citrix.com; andrew.coop...@citrix.com; xen-
> de...@lists.xen.org
> Subject: Re: [Xen-
From: Quan Xu
QI ought to have got disabled if any of the IOMMU table setup
failed. A QI function (other than enable_qinval) is unreachable
when qi_ctrl->qinval_maddr is zero.
Signed-off-by: Quan Xu
CC: Jan Beulich
CC: Kevin Tian
CC: Feng Wu
---
xen/drivers/passthrough/vtd/qinval.c | 52 ++
From: Quan Xu
If Device-TLB flush timed out, we hide the target ATS device
immediately and crash the domain owning this ATS device. If
impacted domain is hardware domain, just throw out a warning.
By hiding the device, we make sure it can't be assigned to any
domain any longer (see device_assign
From: Quan Xu
Today we do Device-TLB flush synchronization after issuing flush
requests for all ATS devices belonging to a VM. Doing so however
imposes a limitation, i.e. that we can not figure out which flush
request is blocked in the flush queue list, based on VT-d spec.
To prepare correct Dev
From: Quan Xu
This patches fix current timeout concern and also allow limited ATS support:
1. add a timeout parameter for device IOTLB invalidation
The parameter 'iommu_dev_iotlb_timeout' specifies the timeout
of device IOTLB invalidation in milliseconds. By default, the
timeout is
From: Quan Xu
The parameter 'iommu_dev_iotlb_timeout' specifies the timeout
of device IOTLB invalidation in milliseconds. By default, the
timeout is 1000 milliseconds, which can be boot-time changed.
We also confirmed with VT-d hardware team that 1 milliseconds
is large enough for VT-d IOMMU int
From: Quan Xu
Signed-off-by: Quan Xu
CC: Julien Grall
CC: Kevin Tian
CC: Feng Wu
CC: Jan Beulich
CC: Suravee Suthikulpanit
---
xen/drivers/passthrough/iommu.c | 30 --
xen/drivers/passthrough/vtd/iommu.c | 11 +++
2 files changed, 39 insertions(+),
From: Quan Xu
a struct pci_dev* instead of SBDF is stored inside struct
pci_ats_dev and parameter to enable_ats_device().
Signed-off-by: Quan Xu
CC: Jan Beulich
CC: Kevin Tian
CC: Feng Wu
CC: Suravee Suthikulpanit
---
xen/drivers/passthrough/amd/iommu_cmd.c | 11 +++---
xen/drivers/pa
On Do, 2016-06-23 at 17:18 +0100, Anthony PERARD wrote:
> On Thu, Jun 23, 2016 at 04:57:54PM +0200, Gerd Hoffmann wrote:
> > Hi,
> >
> > > How could xen_ram_init() find out if the value of max-ram-below-4g is
> > > the default or if a user have set it? Is there another way we could fix
> > > thi
The scif-uart.c is an ARM specific UART driver for the Renesas RCar
SoC family.
Signed-off-by: Dirk Behme
---
Note: This has been discussed in
https://lists.xen.org/archives/html/xen-devel/2016-06/msg03051.html
https://lists.xen.org/archives/html/xen-devel/2016-06/msg03062.html
MAINTAINERS |
On 6/23/2016 6:33 PM, George Dunlap wrote:
On 23/06/16 08:37, Yu Zhang wrote:
On 6/22/2016 7:33 PM, George Dunlap wrote:
On 22/06/16 11:07, Yu Zhang wrote:
On 6/22/2016 5:47 PM, George Dunlap wrote:
On 22/06/16 10:29, Jan Beulich wrote:
On 22.06.16 at 11:16, wrote:
On 22/06/16 07:39, Jan
flight 96176 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96176/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build fail REGR. vs. 87893
build-amd64-libvi
flight 96175 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96175/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs.
94856
test-amd64-i3
flight 96169 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96169/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR.
vs. 94748
test-amd64-amd64-
flight 96189 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96189/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Hi Shannon,
On 23/06/2016 04:17, Shannon Zhao wrote:
From: Shannon Zhao
If Xen guest boots with ACPI, the guest kernel will get the event
channel interrupt information via domain param HVM_PARAM_CALLBACK_IRQ.
Initialize that domain param.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_ar
Hi Shannon,
On 23/06/2016 04:17, Shannon Zhao wrote:
From: Shannon Zhao
Copy all the ACPI tables to guest space so that UEFI or guest could
access them.
Signed-off-by: Shannon Zhao
---
tools/libxc/xc_dom_arm.c | 51
1 file changed, 51 inserti
Hi Shannon,
On 23/06/2016 04:17, Shannon Zhao wrote:
From: Shannon Zhao
Add the ARM Multiboot module for ACPI, so UEFI or DomU can get the base
address of ACPI tables from it.
Signed-off-by: Shannon Zhao
---
docs/misc/arm/device-tree/acpi.txt | 23 +++
tools/libxl/libxl_
I'm opposed to moving HVMOP_cmd_min and HVMOP_cmd_max somewhere else. That
would make reading/understanding of the macros more difficult. This practice
is common. Also, If min & max are defined elsewhere, it will be more likely to
lead to mistakes/bugs.
The use of "_min" and "_max" should b
flight 96182 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96182/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 96177
Tests which di
flight 96161 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96161/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 95844
test-amd
Hi Shannon,
On 23/06/16 04:17, Shannon Zhao wrote:
From: Shannon Zhao
Link all ACPI tables into one buffer, fill in the addresses of
tables and update checksum of each table.
Is there any reason to not allocate the acpitable_blob buffer before
hand (and even reallocate if not enough space)
Since in-guest debug exceptions are now unconditionally trapped to Xen, adding
a hook for vm_event subscribers to tap into this new always-on guest event. We
rename along the way hvm_event_breakpoint_type to hvm_event_type to better
match the various events that can be passed with it. We also intro
The monitor_get_capabilities check actually belongs to the monitor subsystem so
relocating and renaming it to sanitize the code's name and location. Mechanical
patch, no code changes introduced.
Signed-off-by: Tamas K Lengyel
Acked-by: Andrew Cooper
Acked-by: Razvan Cojocaru
Acked-by: Julien Gr
Mechanical renaming to better describe that the code in hvm/event is part of
the monitor subsystem.
Signed-off-by: Tamas K Lengyel
Acked-by: Kevin Tian
Acked-by: Razvan Cojocaru
Acked-by: Jan Beulich
---
Cc: Andrew Cooper
Cc: Jun Nakajima
---
xen/arch/x86/hvm/Makefile |
The return value has not been clearly defined, with the function
never returning 0 which seemingly indicated a condition where the
guest should crash.
In this patch we define -rc as error condition where a subscriber is
present but an error prevented the notification from being sent;
0 where there
Mechanical renaming and relocation to the monitor subsystem.
Signed-off-by: Tamas K Lengyel
Acked-by: Razvan Cojocaru
Acked-by: Jan Beulich
Acked-by: Julien Grall
---
Cc: Stefano Stabellini
Cc: Andrew Cooper
---
xen/arch/arm/hvm.c | 4 ++--
xen/arch/x86/hvm/hvm.c | 3 ++-
xen/
Hi Shannon,
On 23/06/16 04:16, Shannon Zhao wrote:
From: Shannon Zhao
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 15 +++
1 file changed, 15 insertions(+)
diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c
index 45fc354..d8779af 100644
Hi Shannon,
On 23/06/16 04:16, Shannon Zhao wrote:
[...]
diff --git a/tools/libxl/Makefile b/tools/libxl/Makefile
index 264b6ef..5347480 100644
--- a/tools/libxl/Makefile
+++ b/tools/libxl/Makefile
@@ -77,7 +77,29 @@ endif
LIBXL_OBJS-$(CONFIG_X86) += libxl_cpuid.o libxl_x86.o libxl_psr.o
On 23/06/16 17:26, Julien Grall wrote:
enum {
RSDP,
XSDT,
@@ -110,6 +113,30 @@ static void make_acpi_xsdt(libxl__gc *gc, struct
xc_dom_image *dom)
dom->acpitable_size += ROUNDUP(acpitables[XSDT].size, 3);
}
+static void make_acpi_gtdt(libxl__gc *gc, struct xc_dom_image *d
Although discussing the goals is fun, feedback on the design of the
protocol is particularly welcome.
On Thu, 23 Jun 2016, Stefano Stabellini wrote:
> Now that Xen 4.7 is out of the door, any more feedback on this?
>
> On Mon, 6 Jun 2016, Stefano Stabellini wrote:
> > Hi all,
> >
> > a couple of
On Thu, Jun 23, 2016 at 10:44:26AM -0400, Boris Ostrovsky wrote:
> On 06/22/2016 01:15 PM, Anthony PERARD wrote:
> > +/*
> > + * The memory layout of the start_info page and the modules, and where the
> > + * addresses are stored:
> > + *
> > + * /--\
> > + * | struc
On Thu, 23 Jun 2016, David Vrabel wrote:
> On 06/06/16 10:33, Stefano Stabellini wrote:
> > # Goals
> >
> > The goal of the protocol is to provide networking capabilities to any
> > guests, with the following added benefits:
> >
> > * guest networking should work out of the box with VPNs, wireles
Hi,
On 23/06/16 15:50, Stefano Stabellini wrote:
On Thu, 23 Jun 2016, Shannon Zhao wrote:
diff --git a/tools/libxl/libxl_empty_dsdt_arm.asl
b/tools/libxl/libxl_empty_dsdt_arm.asl
new file mode 100644
index 000..005fa6a
--- /dev/null
+++ b/tools/libxl/libxl_empty_dsdt_arm.asl
@@ -0,0 +1,22
Hi Shannon,
On 23/06/16 04:16, Shannon Zhao wrote:
From: Shannon Zhao
According to the GIC version, construct the MADT table.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 100 +++
1 file changed, 100 insertions(+)
diff --git a/too
Hi Shannon,
On 23/06/16 04:16, Shannon Zhao wrote:
From: Shannon Zhao
Factor MPIDR computing codes out as a helper, so it could be shared
between DT and ACPI.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm.c | 8 +---
tools/libxl/libxl_arm_acpi.h | 12
2 fil
On 06/06/16 10:33, Stefano Stabellini wrote:
> # Goals
>
> The goal of the protocol is to provide networking capabilities to any
> guests, with the following added benefits:
>
> * guest networking should work out of the box with VPNs, wireless
> networks and any other complex network configurat
Hi Shannon,
On 23/06/16 04:16, Shannon Zhao wrote:
From: Shannon Zhao
Construct GTDT table with the interrupt information of timers.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 28
1 file changed, 28 insertions(+)
diff --git a/tools/libxl/l
Hi Shannon,
On 23/06/16 04:16, Shannon Zhao wrote:
[...]
diff --git a/tools/libxl/libxl_arm.c b/tools/libxl/libxl_arm.c
index cc5a717..f5db74b 100644
--- a/tools/libxl/libxl_arm.c
+++ b/tools/libxl/libxl_arm.c
@@ -1,6 +1,7 @@
#include "libxl_internal.h"
#include "libxl_arch.h"
#include "
On Thu, Jun 23, 2016 at 04:57:54PM +0200, Gerd Hoffmann wrote:
> Hi,
>
> > How could xen_ram_init() find out if the value of max-ram-below-4g is
> > the default or if a user have set it? Is there another way we could fix
> > this?
>
> Attached patch should fix it. Patch survived a quick smoke
Hi,
On 23/06/16 16:00, Stefano Stabellini wrote:
On Thu, 23 Jun 2016, Shannon Zhao wrote:
[...]
+static void make_acpi_gtdt(libxl__gc *gc, struct xc_dom_image *dom)
+{
+struct acpi_table_gtdt *gtdt;
+size_t size = sizeof(*gtdt);
+
+gtdt = libxl__zalloc(gc, size);
+
+gtdt->non
On 23/06/16 16:10, Wei Liu wrote:
> Wei Liu (3):
> xen: add warning infrastructure
> console: use warning infrastructure for sync console warning
> xen: make available hvm_fep to non-debug build as well
Committed, including the small adjustments.
~Andrew
___
On 23/06/16 17:00, Jan Beulich wrote:
On 21.06.16 at 18:59, wrote:
>> --- a/xen/include/xen/init.h
>> +++ b/xen/include/xen/init.h
>> @@ -86,10 +86,11 @@ struct kernel_param {
>> void *var;
>> };
>>
>> -extern struct kernel_param __setup_start, __setup_end;
>> +extern const struct ker
Now that Xen 4.7 is out of the door, any more feedback on this?
On Mon, 6 Jun 2016, Stefano Stabellini wrote:
> Hi all,
>
> a couple of months ago I started working on a new PV protocol for
> virtualizing syscalls. I named it XenSock, as its main purpose is to
> allow the implementation of the PO
>>> On 23.06.16 at 17:45, wrote:
> In your patch (changing XSM_XS_PRIV semantic), you implicitly considered
> all domctls allowed for xenstore domain to be always a subset of those
> allowed for device model domain. For now this is true, but if this set
> is going to be extended in the future, you
Hi Dirk,
On 23/06/16 16:59, Dirk Behme wrote:
On 23.06.2016 17:02, Julien Grall wrote:
On 22/06/16 16:58, Julien Grall wrote:
On 21/06/16 11:15, Dirk Behme wrote:
+printk("Failed to remember the clock node of %s\n",
path);
+printk("Use the Linux kernel command
'clk_ign
>>> On 21.06.16 at 18:59, wrote:
> --- a/xen/include/xen/init.h
> +++ b/xen/include/xen/init.h
> @@ -86,10 +86,11 @@ struct kernel_param {
> void *var;
> };
>
> -extern struct kernel_param __setup_start, __setup_end;
> +extern const struct kernel_param __setup_start[], __setup_end[];
>
>
On 23.06.2016 17:02, Julien Grall wrote:
On 22/06/16 16:58, Julien Grall wrote:
On 21/06/16 11:15, Dirk Behme wrote:
+printk("Failed to remember the clock node of %s\n",
path);
+printk("Use the Linux kernel command
'clk_ignore_unused'\n");
+return 0;
I don'
Hi Shannon,
On 23/06/16 04:16, Shannon Zhao wrote:
From: Shannon Zhao
Add a configuration option for ARM DomU so that user can deicde to use
ACPI or not. This option is defaultly false.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm.c | 3 +++
tools/libxl/libxl_types.idl |
On 6/23/16 10:10 AM, Wei Liu wrote:
> Originally hvm_fep was guarded by NDEBUG, which means it was only
> available to debug builds.
>
> However there is value to have it for non-debug builds as well. User can
> use that to run tests in setup that replicates production setup.
"Users can use it to
flight 96160 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96160/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 11 guest-start fail REGR. vs. 95848
Regressions which are r
On Thu, Jun 23, 2016 at 05:45:22PM +0200, Marek Marczykowski-Górecki wrote:
> On Thu, Jun 23, 2016 at 09:37:09AM -0600, Jan Beulich wrote:
> > >>> On 23.06.16 at 17:22, wrote:
> > > xen: allow XEN_DOMCTL_getdomaininfo for device model domains
> > >
> > > Allow device model domain to get info abou
On Thu, Jun 23, 2016 at 09:37:09AM -0600, Jan Beulich wrote:
> >>> On 23.06.16 at 17:22, wrote:
> > xen: allow XEN_DOMCTL_getdomaininfo for device model domains
> >
> > Allow device model domain to get info about its target domain.
> > It is used during PCI passthrough setup (xc_domain_memory_map
>>> On 21.06.16 at 18:04, wrote:
> --- a/xen/include/public/hvm/hvm_op.h
> +++ b/xen/include/public/hvm/hvm_op.h
> @@ -479,6 +479,8 @@ struct xen_hvm_altp2m_op {
> #define HVMOP_altp2m_set_mem_access 7
> /* Change a p2m entry to have a different gfn->mfn mapping */
> #define HVMOP_altp2m_
On Wed, Jun 22, 2016 at 9:38 AM, George Dunlap wrote:
> On Sun, Jun 12, 2016 at 12:24 AM, Tamas K Lengyel wrote:
>> Currently mem-sharing can be performed on a page-by-page base from the
>> control
>> domain. However, when completely deduplicating (cloning) a VM, this requires
>> at least 3 hype
>>> On 23.06.16 at 17:22, wrote:
> xen: allow XEN_DOMCTL_getdomaininfo for device model domains
>
> Allow device model domain to get info about its target domain.
> It is used during PCI passthrough setup (xc_domain_memory_mapping
> checks for guest being auto-translated). While it happens in stu
On 23/06/16 16:10, Jan Beulich wrote:
On 23.06.16 at 16:55, wrote:
>> On 20/06/16 13:52, Jan Beulich wrote:
>>> +/*
>>> + * Note that this value is effectively part of the ABI, even if we don't
>> need
>>> + * to make it a formal part of it. Hence this value may only be changed if
>>> + * a
On 06/23/2016 11:22 AM, Marek Marczykowski-Górecki wrote:
On Thu, Jun 23, 2016 at 11:00:42AM -0400, Daniel De Graaf wrote:
On 06/23/2016 09:25 AM, Marek Marczykowski-Górecki wrote:
[...]
Ok, after drawing a flowchart of the control in this function after your
change, on a piece of paper, this c
On 23/06/16 16:26, Wei Liu wrote:
> On Thu, Jun 23, 2016 at 04:24:40PM +0100, Andrew Cooper wrote:
>> On 23/06/16 16:10, Wei Liu wrote:
>>> Originally hvm_fep was guarded by NDEBUG, which means it was only
>>> available to debug builds.
>>>
>>> However there is value to have it for non-debug builds
On Thu, Jun 23, 2016 at 04:24:40PM +0100, Andrew Cooper wrote:
> On 23/06/16 16:10, Wei Liu wrote:
> > Originally hvm_fep was guarded by NDEBUG, which means it was only
> > available to debug builds.
> >
> > However there is value to have it for non-debug builds as well. User can
> > use that to ru
On 23/06/16 16:10, Wei Liu wrote:
> Originally hvm_fep was guarded by NDEBUG, which means it was only
> available to debug builds.
>
> However there is value to have it for non-debug builds as well. User can
> use that to run tests in setup that replicates production setup.
That is odd phrasing.
On Thu, Jun 23, 2016 at 11:00:42AM -0400, Daniel De Graaf wrote:
> On 06/23/2016 09:25 AM, Marek Marczykowski-Górecki wrote:
> [...]
> > Ok, after drawing a flowchart of the control in this function after your
> > change, on a piece of paper, this case looks fine. But depending on how
> > the domai
On 23/06/16 16:10, Wei Liu wrote:
> Move the warning text to a static variable and marked that as initconst
> data. Call warning_add in console_init_preirq. Finally remove all
> unused bits.
>
> Signed-off-by: Wei Liu
Reviewed-by: Andrew Cooper
___
Xe
>>> On 23.06.16 at 17:10, wrote:
> Originally hvm_fep was guarded by NDEBUG, which means it was only
> available to debug builds.
>
> However there is value to have it for non-debug builds as well. User can
> use that to run tests in setup that replicates production setup.
>
> Make it clear with
On 23/06/16 16:10, Wei Liu wrote:
> Use an array to keep track of warning text, provide a function to add
> warning text to track. Print warnings (if any) in console_endboot.
>
> Signed-off-by: Wei Liu
Reviewed-by: Andrew Cooper
___
Xen-devel mailing
>>> On 23.06.16 at 17:10, wrote:
> Move the warning text to a static variable and marked that as initconst
> data. Call warning_add in console_init_preirq. Finally remove all
> unused bits.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-d
(CC "THE REST" maintainers)
Hi Dirk,
On 22/06/16 12:49, Dirk Behme wrote:
The two struct members baud and clock_hz are in the end read only
variables nowhere used for anything useful. Removing them makes
the code much simpler without changing any functionality.
Signed-off-by: Dirk Behme
Not
>>> On 23.06.16 at 17:10, wrote:
> Use an array to keep track of warning text, provide a function to add
> warning text to track. Print warnings (if any) in console_endboot.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing li
Originally hvm_fep was guarded by NDEBUG, which means it was only
available to debug builds.
However there is value to have it for non-debug builds as well. User can
use that to run tests in setup that replicates production setup.
Make it clear with a sync_console style warning that this option c
On Thu, Jun 23, 2016 at 04:09:39PM +0100, Julien Grall wrote:
> (CC "THE REST" maintainers)
>
> Hi Dirk,
>
> On 22/06/16 12:49, Dirk Behme wrote:
> >The two struct members baud and clock_hz are in the end read only
> >variables nowhere used for anything useful. Removing them makes
> >the code muc
Hi Dirk,
On 23/06/16 07:38, Dirk Behme wrote:
With the Linux kernel commits
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/Documentation/arm64/booting.txt?id=4370eec05a887b0cd4392cd5dc5b2713174745c0
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/
On 20/06/16 13:39, Jan Beulich wrote:
> A long while back separating out all control kind operations (intended
> for use by only the control domain or device model) from the currect
> hvmop hypercall has been discussed. This series aims at finally making
> this reality (at once allowing to streamli
On 20/06/16 13:58, Jan Beulich wrote:
> Since injection works on a remote vCPU, and since there's no
> enforcement of the subject vCPU being paused, there's a potential race
> between the prodcing and consuming sides. Fix this by leveraging the
producing.
> vector field as synchronization variabl
On Thu, 2016-06-23 at 12:33 +, Wu, Feng wrote:
> > -Original Message-
> > From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> >
> > It goes through all the vcpus of all domains, and does not check or
> > care whether they are running, runnable or blocked.
> >
> > Let's look at t
flight 96177 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96177/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Wei Liu (3):
xen: add warning infrastructure
console: use warning infrastructure for sync console warning
xen: make available hvm_fep to non-debug build as well
docs/misc/xen-command-line.markdown | 8 --
xen/arch/x86/Kconfig| 17
xen/arch/x86/hvm/hvm.c
>>> On 23.06.16 at 16:55, wrote:
> On 20/06/16 13:52, Jan Beulich wrote:
>> +/*
>> + * Note that this value is effectively part of the ABI, even if we don't
> need
>> + * to make it a formal part of it. Hence this value may only be changed if
>> + * accompanied by a suitable interface version in
Move the warning text to a static variable and marked that as initconst
data. Call warning_add in console_init_preirq. Finally remove all
unused bits.
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
Cc: Andrew Cooper
v4:
1. Fix declaration of warning_sync_console.
2. Remove all asterisks in warning
Hi Dirk,
On 22/06/16 12:49, Dirk Behme wrote:
Besides the 14MHz external clock, the SCIF might be clocked by an
internal 66MHz clock. If this is the case, the current clock source
selection breaks this configuration. Same for the settings done by
the firmware for data bits, stop bits and parity.
Use an array to keep track of warning text, provide a function to add
warning text to track. Print warnings (if any) in console_endboot.
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
Cc: Andrew Cooper
v4:
1. Fix __initdata annotation.
2. Move warning_print to console_endboot.
3. Use obj-bin-y in
On 23/06/16 15:59, Marek Marczykowski-Górecki wrote:
> On Thu, Jun 23, 2016 at 03:12:04PM +0100, Andrew Cooper wrote:
>> On 23/06/16 14:25, Marek Marczykowski-Górecki wrote:
>>> On Thu, Jun 23, 2016 at 03:46:46AM -0600, Jan Beulich wrote:
>>> On 23.06.16 at 11:23, wrote:
> On Thu, Jun 23,
On 22/06/16 16:58, Julien Grall wrote:
On 21/06/16 11:15, Dirk Behme wrote:
+printk("Failed to remember the clock node of %s\n", path);
+printk("Use the Linux kernel command
'clk_ignore_unused'\n");
+return 0;
I don't think this is tolerable. We need to fix
On 06/23/2016 09:25 AM, Marek Marczykowski-Górecki wrote:
[...]
Ok, after drawing a flowchart of the control in this function after your
change, on a piece of paper, this case looks fine. But depending on how
the domain was found (explicit loop or rcu_lock_domain_by_id), different
locks are held,
On Thu, 23 Jun 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> Construct GTDT table with the interrupt information of timers.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/libxl_arm_acpi.c | 28
> 1 file changed, 28 insertions(+)
>
> diff --git a/tools/li
On Thu, Jun 23, 2016 at 03:12:04PM +0100, Andrew Cooper wrote:
> On 23/06/16 14:25, Marek Marczykowski-Górecki wrote:
> > On Thu, Jun 23, 2016 at 03:46:46AM -0600, Jan Beulich wrote:
> > On 23.06.16 at 11:23, wrote:
> >>> On Thu, Jun 23, 2016 at 11:18:24AM +0200, Marek Marczykowski-Górecki
>
On 23/06/16 15:15, Stefano Stabellini wrote:
On Thu, 23 Jun 2016, Julien Grall wrote:
On 23/06/16 15:05, Stefano Stabellini wrote:
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index aa4e774..47cb383 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.c
@@ -1245,27 +1245,27 @@ int unm
Hi,
> How could xen_ram_init() find out if the value of max-ram-below-4g is
> the default or if a user have set it? Is there another way we could fix
> this?
Attached patch should fix it. Patch survived a quick smoke test on kvm
so far, need to do some more testing tomorrow. Can you give it a
On 20/06/16 13:52, Jan Beulich wrote:
> +/*
> + * Note that this value is effectively part of the ABI, even if we don't need
> + * to make it a formal part of it. Hence this value may only be changed if
> + * accompanied by a suitable interface version increase.
> + */
> +#define HVMCTL_iter_shift
On Thu, 23 Jun 2016, Shannon Zhao wrote:
> From: Shannon Zhao
>
> It uses static DSDT table like the way x86 uses. Currently the DSDT
> table only contains processor device objects and it generates the
> maximal objects which so far is 128.
>
> Signed-off-by: Shannon Zhao
> ---
> tools/libxl/M
>>> On 23.06.16 at 15:25, wrote:
> On Thu, Jun 23, 2016 at 03:46:46AM -0600, Jan Beulich wrote:
>> >>> On 23.06.16 at 11:23, wrote:
>> > On Thu, Jun 23, 2016 at 11:18:24AM +0200, Marek Marczykowski-Górecki wrote:
>> >> On Thu, Jun 23, 2016 at 03:12:47AM -0600, Jan Beulich wrote:
>> >> > >>> On 23
On 06/22/2016 01:15 PM, Anthony PERARD wrote:
> ... and load BIOS/UEFI firmware into guest memory.
>
> This adds a new firmware module, system_firmware_module. It is loaded in
> the guest memory and final location is provided to hvmloader via the
> hvm_start_info struct.
>
> This patch create the h
On 2016年06月23日 21:39, Stefano Stabellini wrote:
> On Thu, 23 Jun 2016, Shannon Zhao wrote:
>> > From: Shannon Zhao
>> >
>> > Add a configuration option for ARM DomU so that user can deicde to use
>> > ACPI or not. This option is defaultly false.
>> >
>> > Signed-off-by: Shannon Zhao
>> > ---
>>
On 06/23/2016 04:39 AM, Jan Beulich wrote:
On 23.06.16 at 10:32, wrote:
On 22.06.16 at 20:24, wrote:
Either method works, and I agree allowing DM to invoke this domctl is both
useful and not going to introduce problems. The getdomaininfo permission
will also need to be added to the device_mo
On 2016年06月23日 21:42, Ard Biesheuvel wrote:
> On 23 June 2016 at 13:31, Shannon Zhao wrote:
>> From: Shannon Zhao
>>
>> Add ACPI support for Virt Xen ARM and only for aarch64. It gets the
>> ACPI tables through Xen ARM multiboot protocol.
>>
>> Contributed-under: TianoCore Contribution Agreement
On Thu, 23 Jun 2016, Shannon Zhao wrote:
> On 2016年06月23日 21:37, Stefano Stabellini wrote:
> > On Thu, 23 Jun 2016, Shannon Zhao wrote:
> >> +
> >> +if (strcmp(dom->guest_type, "xen-3.0-aarch64")) {
> >> +LOG(DEBUG, "Do not generate ACPI tables for %s", dom->guest_type);
> >> +s
1 - 100 of 185 matches
Mail list logo