On 7/9/2016 9:57 PM, Corneliu ZUZU wrote:
On 7/9/2016 9:26 PM, Tamas K Lengyel wrote:
diff --git a/xen/include/asm-x86/domain.h
b/xen/include/asm-x86/domain.h
index ae1dcb4..7663da2 100644
--- a/xen/include/asm-x86/domain.h
+++ b/xen/include/asm-x86/domain.h
@@ -9,6 +9,7 @@
#include
#inclu
Hi all:
We found that guests such as RHEL6, they occasionally got stuck after
migration.
The stack of the stuck guest kernel is as follows:
PID: 18 TASK: 88007de61500 CPU: 1 COMMAND: "xenwatch"
#0 [88007de62e40] schedule at 8150d692
#1 [88007de62f08] io_schedule at
On July 08, 2016 2:52 PM, Jan Beulich wrote:
> >>> On 08.07.16 at 08:39, wrote:
> > From: Quan Xu
> >
> > these patches fix current timeout concern and also allow limited ATS
> > support.
> >
> > these patches are the rest ones:
> > 1. move the domain crash logic up to the generic IOMMU layer
>
Emil, Thanks for your effort ( today I just come back to return my laptop).
btw, sstabell...@kernel.org may be the right email.
Stefan / Stefano, could you help us review these patches? Thanks in advance!!
Quan
On July 10, 2016 7:48 PM, Emil Condrea wrote:
> *INTRODUCTION*
> The goal of v
Hi, Julien
I finally succeed booting xen on newer version of FVP(Fastmodels)
The problem is wrong memory size setting in command line option.
I left my command line for others who will face the same problem like me
and I marked bold memory setting part in command line.
NOTE: If you want to config
> From: Julien Grall [mailto:julien.gr...@arm.com]
> Sent: Tuesday, July 12, 2016 9:59 PM
>
> Also take the opportunity to convert arch/x86/debug.c to the typesafe gfn.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Andrew Cooper
> Acked-by: Stefano Stabellini
> Acked-by: Elena Ufimtseva
Ack
> From: Julien Grall [mailto:julien.gr...@arm.com]
> Sent: Tuesday, July 12, 2016 9:59 PM
>
> Also take the opportunity to convert arch/x86/debug.c to the typesafe
> mfn and use proper printf format for MFN/GFN when the code around is
> modified.
>
> Signed-off-by: Julien Grall
> Reviewed-by: An
> From: Tamas K Lengyel [mailto:tamas.leng...@zentific.com]
> Sent: Wednesday, July 13, 2016 2:13 AM
>
> This patch implements sending notification to a monitor subscriber when an
> x86/vmx guest executes the CPUID instruction.
>
> Signed-off-by: Tamas K Lengyel
Acked-by: Kevin Tian
_
Quoting Dirk Behme (2016-07-12 00:46:45)
> Clocks described by this property are reserved for use by Xen, and the OS
> must not alter their state any way, such as disabling or gating a clock,
> or modifying its rate. Ensuring this may impose constraints on parent
> clocks or other resources used by
On Tue, Jul 12, 2016 at 12:22 PM, Andrew Cooper
wrote:
> On 12/07/16 19:13, Tamas K Lengyel wrote:
>> This patch implements sending notification to a monitor subscriber when an
>> x86/vmx guest executes the CPUID instruction.
>>
>> Signed-off-by: Tamas K Lengyel
>
> From an x86 point of view, Rev
On Mon, Jul 11, 2016 at 6:25 AM, sepanta s wrote:
>
>
> On Sun, Jul 10, 2016 at 4:50 PM, sepanta s wrote:
>
>>
>>
>> On Sun, Jun 26, 2016 at 5:15 PM, sepanta s wrote:
>>
>>>
>>>
>>>
>>> On Fri, Jun 24, 2016 at 8:10 PM, Tamas K Lengyel
>>> wrote:
>>>
On Jun 24, 2016 05:19, "Razvan Coj
On 07/12/16 21:13, Tamas K Lengyel wrote:
> This patch implements sending notification to a monitor subscriber when an
> x86/vmx guest executes the CPUID instruction.
>
> Signed-off-by: Tamas K Lengyel
> ---
> Cc: Ian Jackson
> Cc: Wei Liu
> Cc: Razvan Cojocaru
> Cc: Jan Beulich
> Cc: Andrew
On 12/07/16 19:13, Tamas K Lengyel wrote:
> This patch implements sending notification to a monitor subscriber when an
> x86/vmx guest executes the CPUID instruction.
>
> Signed-off-by: Tamas K Lengyel
From an x86 point of view, Reviewed-by: Andrew Cooper
, with one nit that I can fix on commit i
This patch implements sending notification to a monitor subscriber when an
x86/vmx guest executes the CPUID instruction.
Signed-off-by: Tamas K Lengyel
---
Cc: Ian Jackson
Cc: Wei Liu
Cc: Razvan Cojocaru
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Jun Nakajima
Cc: Kevin Tian
v2: add comment des
Quoting Julien Grall (2016-07-12 02:21:12)
> Hi Mike,
>
> On 08/07/16 18:06, Michael Turquette wrote:
> > Quoting Julien Grall (2016-07-08 02:34:43)
> >> Hi Dirk,
> >>
> >> On 08/07/16 08:44, Dirk Behme wrote:
> >>> Xen hypervisor drivers might replace native OS drivers. The result is
> >>> that s
We have tightened up the internal firewall in the Xen Project
Masschusetts test lab. Now, test boxes do not get access to the
global internet.
Patches 2-4 together arrange that we configure xen.git's .config to
use URLs which go via our git cache. Without this, builds fail.
Patch 1 provides a b
Replaces ad-hoc repeated stanzas involving nonempty etc. with a sub
which generates the right output, using build_url_vcs.
No functional change.
Signed-off-by: Ian Jackson
---
ts-xen-build | 52 +---
1 file changed, 21 insertions(+), 31 deletions(
This encapsulates discovery of the tree url and the applicable VCS,
in a form useable separately (ie, outside build_clone).
No functional change.
Signed-off-by: Ian Jackson
---
Osstest/TestSupport.pm | 28
1 file changed, 20 insertions(+), 8 deletions(-)
diff --git
Signed-off-by: Ian Jackson
---
Osstest/PDU/eth008.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/PDU/eth008.pm b/Osstest/PDU/eth008.pm
index fc5fa96..12f0bfb 100644
--- a/Osstest/PDU/eth008.pm
+++ b/Osstest/PDU/eth008.pm
@@ -58,7 +58,7 @@ sub pdu_power_state {
The effect is that ts-xen-build (the only other caller of
build_url_vcs) now gets the massaged rather than unmassaged urls.
Signed-off-by: Ian Jackson
---
Osstest/TestSupport.pm | 8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/Osstest/TestSupport.pm b/Osstest/TestSuppo
On Mon, 11 Jul 2016, Paul Durrant wrote:
> > -Original Message-
> [snip]
> >
> > # XenSocks Protocol v1
> >
> > ## Rationale
> >
> > XenSocks is a paravirtualized protocol for the POSIX socket API.
> >
> > The purpose of XenSocks is to allow the implementation of a specific set
> > of P
On Mon, Jun 13, 2016 at 11:20 AM, Tamas K Lengyel wrote:
> On Mon, Jun 13, 2016 at 3:28 AM, George Dunlap
> wrote:
>> On 11/06/16 18:55, Tamas K Lengyel wrote:
>>> On Thu, May 26, 2016 at 10:17 AM, Tamas K Lengyel
>>> wrote:
On May 26, 2016 04:40, "George Dunlap" wrote:
>
>
On Tue, Jul 12, 2016 at 2:59 PM, Julien Grall wrote:
> Also take the opportunity to convert arch/x86/debug.c to the typesafe gfn.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Andrew Cooper
> Acked-by: Stefano Stabellini
> Acked-by: Elena Ufimtseva
mm/ bits:
Reviewed-by: George Dunlap
Sam
Boris Ostrovsky writes ("[Xen-devel] ACPI builder re-licensing"):
> Who needs to be notified
> ===
NB that what is required is not notification, but permission.
> which indicated major contributions (and therefore a required ack) from
> Citrix/Xensource, Suse/Novell, Oracle/Sun, Intel
On Tue, Jul 12, 2016 at 2:59 PM, Julien Grall wrote:
> Also take the opportunity to convert arch/x86/debug.c to the typesafe
> mfn and use proper printf format for MFN/GFN when the code around is
> modified.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Andrew Cooper
> Acked-by: Stefano Stabell
On 07/12/2016 12:10 PM, Julien Grall wrote:
> Hello,
>
> On 12/07/2016 16:08, Boris Ostrovsky wrote:
>> On 07/12/2016 10:57 AM, Shannon Zhao wrote:
>>> On 2016年07月12日 22:50, Wei Liu wrote:
On Tue, Jul 12, 2016 at 10:42:07PM +0800, Shannon Zhao wrote:
Does it mean we wo
On Tue, Jul 12, 2016 at 2:59 PM, Julien Grall wrote:
> to avoid mixing machine frame with guest frame.
>
> Signed-off-by: Julien Grall
> Acked-by: Jan Beulich
> Acked-by: Stefano Stabellini
x86/p2m bits:
Acked-by: George Dunlap
___
Xen-devel maili
On Sun, Jul 10, 2016 at 9:00 PM, Tian, Kevin wrote:
>> From: Tamas K Lengyel [mailto:tamas.leng...@zentific.com]
>> Sent: Friday, July 08, 2016 10:32 AM
>>
>> This patch implements sending notification to a monitor subscriber when an
>> x86/vmx guest executes the CPUID instruction.
>>
>> Signed-of
On Tue, Jul 12, 2016 at 7:44 AM, Vitaly Kuznetsov wrote:
> PVHVM guests may need to know Xen's idea of vCPU ids they have and the
> only way they can figure them out is to use ACPI ids from MADT table.
> Document the de facto policy.
>
> Signed-off-by: Vitaly Kuznetsov
Acked-by: Konrad Rzeszutek
On Tue, Jul 12, 2016 at 1:17 AM, Wei Liu wrote:
> On Mon, Jul 11, 2016 at 01:57:50PM -0600, Tamas K Lengyel wrote:
>> Currently mem-sharing can be performed on a page-by-page basis from the
>> control
>> domain. However, this process is quite wasteful when a range of pages have to
>> be deduplica
Hello Wei,
For systemd/xendriverdomain.service.in, the hardcoded PID file could be
removed altogether -- systemd has no trouble figuring out the PID with
only one process. But I wasn't sure if maybe something outside of the
xen tree uses it?
(Sorry that you're not getting my CCs: "554-SMTP.EU.CIT
On Wed, Jul 6, 2016 at 6:33 PM, Makkar anshul.mak...@citrix.com wrote:
> From: Anshul Makkar
>
> Rate limit assures that a vcpu will execute for a minimum amount of time
> before
> being put at the back of a queue or being preempted by higher priority thread.
>
> It introduces a minimum amount o
Hello,
On 12/07/2016 16:08, Boris Ostrovsky wrote:
On 07/12/2016 10:57 AM, Shannon Zhao wrote:
On 2016年07月12日 22:50, Wei Liu wrote:
On Tue, Jul 12, 2016 at 10:42:07PM +0800, Shannon Zhao wrote:
Does it mean we would need to update the slack to take into account the ACPI
blob?
Yes, we need to
On 12/07/16 16:36, Anthony PERARD wrote:
> On Tue, Jul 12, 2016 at 04:09:59PM +0100, Andrew Cooper wrote:
>> On 12/07/16 15:42, Anthony PERARD wrote:
>>> +#ifndef __XEN_PUBLIC_ARCH_X86_HVM_START_INFO_H__
>>> +#define __XEN_PUBLIC_ARCH_X86_HVM_START_INFO_H__
>>> +
>>> +/*
>>> + * C representation of
On Tue, Jul 12, 2016 at 11:21:12AM -0400, Boris Ostrovsky wrote:
> On 07/12/2016 11:13 AM, Wei Liu wrote:
> > On Tue, Jul 12, 2016 at 11:08:47AM -0400, Boris Ostrovsky wrote:
> >> On 07/12/2016 10:57 AM, Shannon Zhao wrote:
> >>> On 2016年07月12日 22:50, Wei Liu wrote:
> On Tue, Jul 12, 2016 at 1
On Tue, Jul 12, 2016 at 04:09:59PM +0100, Andrew Cooper wrote:
> On 12/07/16 15:42, Anthony PERARD wrote:
> > +#ifndef __XEN_PUBLIC_ARCH_X86_HVM_START_INFO_H__
> > +#define __XEN_PUBLIC_ARCH_X86_HVM_START_INFO_H__
> > +
> > +/*
> > + * C representation of the x86/HVM start info layout.
> > + *
> >
On Tue, 12 Jul 2016, Rafael J. Wysocki wrote:
> On Tuesday, July 12, 2016 02:09:26 PM Stephen Rothwell wrote:
> > Hi all,
> >
> > Today's linux-next merge of the xen-tip tree got a conflict in:
> >
> > drivers/acpi/scan.c
> >
> > between commit:
> >
> > 68bdb6773289 ("ACPI: add support for
Extend the device type framework in libxl to cover more functions in a
generic way. This allows to have all functionality of a specific device
type in just one source file instead of spreading it via multiple files
and have functions to deal with multiple device types in a similar way.
Some patche
Put all nic related stuff of libxl form common files into a dedicated
source file.
Signed-off-by: Juergen Gross
---
tools/libxl/Makefile | 2 +-
tools/libxl/libxl.c | 474 +---
tools/libxl/libxl_create.c | 23 +-
tools/libxl/libxl_internal.h
Outside libxl_pvusb.c only libxl_util.c still contains some pvusb code.
Move it to libxl_pvusb.c.
Signed-off-by: Juergen Gross
---
tools/libxl/libxl_pvusb.c | 18 ++
tools/libxl/libxl_utils.c | 18 --
2 files changed, 18 insertions(+), 18 deletions(-)
diff --git
Add another callback to the device type framework in order to aid
decision whether a pv domain needs a device model.
Signed-off-by: Juergen Gross
---
tools/libxl/libxl.c | 14 +-
tools/libxl/libxl_create.c | 8 ++--
tools/libxl/libxl_dm.c | 31 +-
Instead of using a macro generating the code to merge xenstore and
json configuration data, use the generic device type support for
this purpose.
This requires to add some accessor functions to the framework and
a structure for disks (as disks are added separately they didn't need
such a structure
Put all vtpm related stuff of libxl into a dedicated source file.
Signed-off-by: Juergen Gross
---
tools/libxl/Makefile | 1 +
tools/libxl/libxl.c | 302 ---
tools/libxl/libxl_internal.h | 1 -
tools/libxl/libxl_utils.c| 43 -
tools/l
Some device types require a configuration update after resume of
domain. Add a callback for this purpose.
Signed-off-by: Juergen Gross
---
tools/libxl/libxl.c | 17 -
tools/libxl/libxl_internal.c | 21 ++---
tools/libxl/libxl_internal.h | 17 +
On 07/12/2016 11:13 AM, Wei Liu wrote:
> On Tue, Jul 12, 2016 at 11:08:47AM -0400, Boris Ostrovsky wrote:
>> On 07/12/2016 10:57 AM, Shannon Zhao wrote:
>>> On 2016年07月12日 22:50, Wei Liu wrote:
On Tue, Jul 12, 2016 at 10:42:07PM +0800, Shannon Zhao wrote:
Does it mean
On Tue, Jul 12, 2016 at 11:08:47AM -0400, Boris Ostrovsky wrote:
> On 07/12/2016 10:57 AM, Shannon Zhao wrote:
> > On 2016年07月12日 22:50, Wei Liu wrote:
> >> On Tue, Jul 12, 2016 at 10:42:07PM +0800, Shannon Zhao wrote:
> >> Does it mean we would need to update the slack to take
On Fri, Jul 8, 2016 at 2:06 PM, Andrew Cooper wrote:
> However, OSSTest has always been known as OSSTest (including all
> references in the automated emails), and not as a xen test framework.
> Taking any steps to make OSSTest retroactively searchable as a xen test
> framework is a dumb move, whic
On 12/07/16 15:42, Anthony PERARD wrote:
> +#ifndef __XEN_PUBLIC_ARCH_X86_HVM_START_INFO_H__
> +#define __XEN_PUBLIC_ARCH_X86_HVM_START_INFO_H__
> +
> +/*
> + * C representation of the x86/HVM start info layout.
> + *
> + * The canonical definition of this layout resides in public/xen.h, this
You
On Tue, Jul 12, 2016 at 03:42:38PM +0100, Anthony PERARD wrote:
> This patch use xc_dom_alloc_segment() to allocate the memory space for the
> ACPI modules and the SMBIOS modules. This is to replace the arbitrary
> placement of 1MB (+ extra for MB alignement) after the hvmloader image.
>
> This pa
On 07/12/2016 10:57 AM, Shannon Zhao wrote:
> On 2016年07月12日 22:50, Wei Liu wrote:
>> On Tue, Jul 12, 2016 at 10:42:07PM +0800, Shannon Zhao wrote:
>> Does it mean we would need to update the slack to take
>> into account the ACPI
>> blob
On Tue, Jul 12, 2016 at 04:03:21PM +0100, Wei Liu wrote:
> I believe we only need a mechanical ack from Andrew and Jan for patch 6.
Spoke too soon. Patch 8 and 9 would also need acks.
> I'm happy to take care of this series once everything is ready.
>
This stays the same. :-)
Wei.
___
I believe we only need a mechanical ack from Andrew and Jan for patch 6.
I'm happy to take care of this series once everything is ready.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Tue, Jul 12, 2016 at 03:42:42PM +0100, Anthony PERARD wrote:
> The path to the BIOS blob can be overriden by the xl's
> bios_path_override option, or provided by u.hvm.bios_firmware in the
> domain_build_info struct by other libxl user.
>
> Signed-off-by: Anthony PERARD
>
Acked-by: Wei Liu
On Tue, Jul 12, 2016 at 03:42:39PM +0100, Anthony PERARD wrote:
> ... and load BIOS/UEFI firmware into guest memory.
>
> This adds a new firmware module, system_firmware_module. It is loaded in
> the guest memory and final location is provided to hvmloader via the
> hvm_start_info struct.
>
> Thi
On Tue, Jul 12, 2016 at 03:42:43PM +0100, Anthony PERARD wrote:
> Instead of having several representation of hvm_start_info in C, define
> it in public/xen.h so both libxc and hvmloader can use it.
>
Commit message is wrong. I think this can be easily handled during
committing though.
Now we ne
On 2016年07月12日 22:50, Wei Liu wrote:
> On Tue, Jul 12, 2016 at 10:42:07PM +0800, Shannon Zhao wrote:
>>> > > > >> >
>>> > > > >> > Does it mean we would need to update the slack to
>>> > > > >> > take into account the ACPI
>>> > > > >> > blob?
>
Starting a new thread on ACPI code re-licensing, continuing from
https://lists.xenproject.org/archives/html/xen-devel/2016-07/msg01245.html
Summary
==
While working on refactoring ACPI builder code from
tools/firmware/hvmloader/acpi/ and making it available to both hvmloader
and libxl/libxc (
On Tue, Jul 12, 2016 at 10:42:07PM +0800, Shannon Zhao wrote:
> > > >> >
> > > >> > Does it mean we would need to update the slack to take into
> > > >> > account the ACPI
> > > >> > blob?
> >>> > > Yes, we need to take into account the ACPI blob. Probably not in the
> >>> > > sla
On 2016年07月12日 19:38, Wei Liu wrote:
> On Tue, Jul 12, 2016 at 11:50:32AM +0800, Shannon Zhao wrote:
>> >
>> >
>> > On 2016/7/7 23:52, Wei Liu wrote:
>>> > > On Tue, Jul 05, 2016 at 11:12:35AM +0800, Shannon Zhao wrote:
> > >> > From: Shannon Zhao
> > >> >
> > >> > It uses static DS
... to compile SeaBIOS and OVMF. Only depend on CONFIG_*.
If --with-system-* configure option is used, then set *_CONFIG=n to not
compile SEABIOS and OVMF.
Signed-off-by: Anthony PERARD
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Wei Liu
---
Please, run ./autogen.sh on this patch.
No change
Signed-off-by: Anthony PERARD
Acked-by: Jan Beulich
---
tools/firmware/hvmloader/Makefile| 11 +--
tools/firmware/hvmloader/hvmloader.c | 4
2 files changed, 1 insertion(+), 14 deletions(-)
diff --git a/tools/firmware/hvmloader/Makefile
b/tools/firmware/hvmloader/Makefile
ind
... and do not include the OVMF ROM into hvmloader anymore.
Signed-off-by: Anthony PERARD
Acked-by: Jan Beulich
---
Change in V5:
- define OVMF_END macro
- fix some cast coding style
Change in V4:
- check if source and dest of ovmf binary does not overlaps
Change in V3:
- change makefile to n
This patch use xc_dom_alloc_segment() to allocate the memory space for the
ACPI modules and the SMBIOS modules. This is to replace the arbitrary
placement of 1MB (+ extra for MB alignement) after the hvmloader image.
This patch can help if one add extra ACPI table and hvmloader contain
OVMF (OVMF
... into the firmware directory, along with hvmloader.
Signed-off-by: Anthony PERARD
Acked-by: Wei Liu
---
No change in V6.
- acked
Change in V5:
- remove use of "variable" for SEABIOS_ROM and OVMF_ROM location
there are static location
- install seabios as bios.bin instead of seabios.bin
Ch
... and do not include the SeaBIOS ROM into hvmloader anymore.
This also fix the dependency on roms.inc, hvmloader.o does not include it.
Signed-off-by: Anthony PERARD
Acked-by: Jan Beulich
---
Change in V6:
acked
Change in V5:
- update BUG_ON in seabios_setup_e820().
Change in V4:
- check
The path to the BIOS blob can be overriden by the xl's
bios_path_override option, or provided by u.hvm.bios_firmware in the
domain_build_info struct by other libxl user.
Signed-off-by: Anthony PERARD
---
Changes in V6:
- use goto for error handling of libxl__load_hvm_firmware_module()
Changes i
Those paths are to be used by libxl, in order to load the firmware in
memory. If a system path is not defined via --with-system-seabios or
--with-system-ovmf, then default to the Xen firmware directory.
Signed-off-by: Anthony PERARD
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Wei Liu
---
Plea
Signed-off-by: Anthony PERARD
Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
---
Changes in V6:
- include xen/arch-x86/hvm/start_info.h
Change in V4:
- remove struct hvm_info_start redefinition, as it's moved to
public/xen.h in a previous patch.
Change in V3:
- remove cmdline pars
Hi all,
V6:
few changes detailed in patches.
Missing acks on the following patches:
1 libxc: Rework extra module initialisation
2 libxc: Prepare a start info structure for hvmloader
5 libxl: Load guest BIOS from file
6 xen: Move the hvm_start_info C representation from libxc t
All BIOSes but ROMBIOS needs to be loaded via modules.
ROMBIOS is handled as a special case.
Signed-off-by: Anthony PERARD
Acked-by: Jan Beulich
---
Change in V5:
- rename patch, was:
"hvmloader: Specific bios_load function required"
No change in V4.
Change in V3:
- reprint Main BIOS in bi
As perform_tests() is going to clear memory past 4MB, we check that the
memory can be use or we skip the tests.
Signed-off-by: Anthony PERARD
---
Changes in V6:
- define and use TEST_START and PT_END.
- cast addresses to uintptr_t instead of uint32_t.
- use UINTPTR_MAX for upper limit checks, in
... and load BIOS/UEFI firmware into guest memory.
This adds a new firmware module, system_firmware_module. It is loaded in
the guest memory and final location is provided to hvmloader via the
hvm_start_info struct.
This patch create the hvm_start_info struct for HVM guest that have a
device mode
Instead of having several representation of hvm_start_info in C, define
it in public/xen.h so both libxc and hvmloader can use it.
Signed-off-by: Anthony PERARD
---
Changes in V6:
- move C representation to public/arch-x86/hvm/start_info.h instead of
public/xen.h
Change in V5:
- remove packed
On 2016年07月12日 22:33, Wei Liu wrote:
> On Tue, Jul 12, 2016 at 10:17:20PM +0800, Shannon Zhao wrote:
>> > On 2016年07月12日 19:33, Wei Liu wrote:
>>> > > On Tue, Jul 12, 2016 at 10:22:39AM +0100, Julien Grall wrote:
>>> > > [...]
> > > >>Yeah, we can deprecate that field. But we need to t
The BIOS blob can be found an entry called "firmware" of the modlist of
the hvm_start_info struct.
The found BIOS blob is not loaded by this patch, but only passed as
argument to bios_load() function.
Signed-off-by: Anthony PERARD
---
Changes in V6:
- cast addresses to uintptr_t instead of uint
On 2016年07月12日 19:35, Wei Liu wrote:
> On Tue, Jul 12, 2016 at 11:47:04AM +0800, Shannon Zhao wrote:
>> >
>> >
>> > On 2016/7/6 18:12, Stefano Stabellini wrote:
>>> > > On Wed, 6 Jul 2016, Julien Grall wrote:
> > >> > Hi Stefano,
> > >> >
> > >> > On 05/07/16 18:13, Stefano Stabellin
On Tue, Jul 12, 2016 at 10:17:20PM +0800, Shannon Zhao wrote:
> On 2016年07月12日 19:33, Wei Liu wrote:
> > On Tue, Jul 12, 2016 at 10:22:39AM +0100, Julien Grall wrote:
> > [...]
> > >>Yeah, we can deprecate that field. But we need to take care to not
> > >>break
> > >>users of the ol
On Mon, Jul 11, 2016 at 10:40:17AM -0400, Boris Ostrovsky wrote:
> On 07/11/2016 09:41 AM, Wei Liu wrote:
> > On Mon, Jul 11, 2016 at 09:33:21AM -0400, Boris Ostrovsky wrote:
> >> On 07/11/2016 06:47 AM, Wei Liu wrote:
> >>> On Fri, Jul 08, 2016 at 01:20:46PM -0400, Boris Ostrovsky wrote:
> On
On 2016年07月12日 19:33, Wei Liu wrote:
> On Tue, Jul 12, 2016 at 10:22:39AM +0100, Julien Grall wrote:
> [...]
> >>Yeah, we can deprecate that field. But we need to take care to not
> >>break
> >>users of the old field.
>>> > >Ok, what name would you suggest?
>> >
>> > I would sugges
A variable containing a guest frame should be compared to INVALID_GFN
and not INVALID_MFN.
Signed-off-by: Julien Grall
Reviewed-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
Cc: Suravee Suthikulpanit
Changes in v6:
- Fix typo in the commit message
- Add Andrew's and Jan'
Also take the opportunity to convert arch/x86/debug.c to the typesafe gfn.
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
Acked-by: Stefano Stabellini
Acked-by: Elena Ufimtseva
---
Cc: Jan Beulich
Cc: Paul Durrant
Cc: Boris Ostrovsky
Cc: Suravee Suthikulpanit
Cc: Jun Nakajima
Cc:
Most of the callers of apply_p2m_changes have a GFN, a MFN and the
number of frame to change in hand.
Rather than asking each caller to convert the frame to an address,
rework the interfaces to pass the GFN, MFN and the number of frame.
Note that it would be possible to do more clean-up in apply_
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v6:
- Add Stefano's acked-by
Changes in v4:
- Patch added
---
xen/arch/arm/mm.c | 2 +-
xen/arch/arm/p2m.c| 18 +-
xen/include/asm-arm/p2m.h | 4 ++--
3 files chang
The prototype and the declaration of p2m_lookup disagree on how the
function should be used. One expect a frame number whilst the other
an address.
Thankfully, everyone is using with an address today. However, most of
the callers have to convert a guest frame to an address. Modify
the interface to
to avoid mixing machine frame with guest frame. Also rename the
parameters of the function and drop pointless PAGE_MASK in the caller.
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v6:
- Add Stefano's acked-by
Changes in v4:
- Patch added
---
p2m_cache_flush is expecting GFNs in parameter and not MFNs. Rename
the variable to *gfn* and use typesafe to avoid possible misusage.
Also, modify the prototype of the function to describe the range
using the start and the number of GFNs. This will avoid to wonder
whether the end if inclusive or
Hello all,
Some of the ARM functions are mixing gfn vs mfn and even physical vs frame.
To avoid more confusion, this patch series makes use of the terminology
described in xen/include/xen/mm.h and the associated typesafe.
I pushed a branch with this series applied on top of staging:
git://xenbit
The operation ALLOCATE is unused. If we ever need it, it could be
reimplemented with INSERT.
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v6:
- Add Stefano's acked-by
Changes in v4:
- Patch added
---
xen/arch/arm/p2m.c| 67 ++-
More the half of the arguments of INSERT and REMOVE are the same for
each callers. Simplify the callers of apply_p2m_changes by adding new
helpers which will fill common arguments with default values.
Signed-off-by: Julien Grall
---
Changes in v7:
- MATTR_DEV should be used in map_mm
Also take the opportunity to convert arch/x86/debug.c to the typesafe
mfn and use proper printf format for MFN/GFN when the code around is
modified.
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
Acked-by: Stefano Stabellini
---
Cc: Christoph Egger
Cc: Liu Jinsong
Cc: Jan Beulich
Cc
to avoid mixing machine frame with guest frame.
Signed-off-by: Julien Grall
Acked-by: Jan Beulich
Acked-by: Stefano Stabellini
---
Cc: Stefano Stabellini
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Konrad Rzeszutek Wilk
Cc: Tim Deegan
Cc: Wei Liu
Change
The code to allocate memory when dom0 does not use direct mapping is
relying on the presence of memory node in the DT.
However, they are not present when booting using UEFI or when using
ACPI.
Rather than fixing the code, remove it because dom0 is always direct
memory mapped and therefore the cod
The parameter 'access' is used by memaccess to restrict temporarily the
permission. This parameter should not be used for other purpose (such
as restricting permanently the permission).
Instead, we should use the default access requested by memacess. When it
is not enabled, the access will be p2m_
to avoid mixing machine frame with guest frame. Also drop the prefix start_.
Signed-off-by: Julien Grall
---
Changes in v6:
- Qualify what is being mapped
- Use PRI_mfn
Changes in v4:
- Patch added
---
xen/arch/arm/mm.c | 2 +-
xen/arch/arm/p2m.c
On 7/12/2016 3:49 PM, Andrew Cooper wrote:
On 12/07/16 11:38, Corneliu ZUZU wrote:
On 7/12/2016 1:22 PM, Andrew Cooper wrote:
On 12/07/16 11:11, Corneliu ZUZU wrote:
If you are really feeling up to it, having a common xen/atomic.h
with
typedef struct { int counter; } atomic_t;
#define ATOMIC_
On Mon, Jul 11, 2016 at 04:49:32PM +0100, Wei Liu wrote:
> See individual patch for detailed changelog.
Series pushed.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Sat, Jun 18, 2016 at 12:13 AM, Dario Faggioli
wrote:
> In fact, right now, we recommend keepeing runqueues
> arranged per-core, so that it is the inter-runqueue load
> balancing code that automatically spreads the work in an
> SMT friendly way. This means that any other runq
> arrangement one m
On Fri, Jul 08, 2016 at 06:54:54PM +0100, Ian Jackson wrote:
> Juergen Gross writes ("[PATCH v2 0/4] libxl: add framework for device types"):
> > Instead of duplicate coding for each device type (vtpms, usbctrls, ...)
> > especially on domain creation introduce a framework for that purpose.
> >
>
On 12/07/16 11:38, Corneliu ZUZU wrote:
> On 7/12/2016 1:22 PM, Andrew Cooper wrote:
>> On 12/07/16 11:11, Corneliu ZUZU wrote:
>> If you are really feeling up to it, having a common xen/atomic.h
>> with
>>
>> typedef struct { int counter; } atomic_t;
>> #define ATOMIC_INIT(i) {
On 07/12/2016 02:16 PM, Daniel Vetter wrote:
> On Thu, Jun 30, 2016 at 10:23:39AM +0200, Krzysztof Kozlowski wrote:
>> Hi,
>>
>>
>> This is fifth approach for replacing struct dma_attrs with unsigned
>> long.
>>
>> The main patch (1/44) doing the change is split into many subpatches
>> for easier r
1 - 100 of 142 matches
Mail list logo