On 6/8/2017 7:28 PM, Julien Grall wrote:
Hi,
Hello Julien,
Please CC all relevant maintainers.
Sure. Will do in the next patch rev.
On 08/06/17 14:03, Manish Jaggi wrote:
Spurious newline
This patch supports ITS in hardware domain, supports ITS in Xen
when booting with ACPI.
Signed-
From the context calling pi_desc_init(), we can conclude the current
implementation of VT-d PI depends on CPU-side PI. If we disable APICv
but enable VT-d PI explicitly in xen boot command line, we would get
an assertion failure.
This patch disables VT-d PI when APICv is disabled and adds some
rel
flight 110139 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110139/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 5 xen-buildfail REGR. vs. 110078
build-amd64
flight 110124 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110124/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
110063
test-amd6
flight 110114 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110114/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qcow210 guest-start fail REGR. vs. 109975
test-amd64-amd64-
** Delivery incomplete **
There was a temporary problem delivering your message to
curtiskwo...@gmail.com. Gmail will retry for 46 more hours. You'll be notified
if the delivery fails permanently.
Reporting-MTA: dns; googlemail.com
Received-From-MTA: dns; FWD-737QHYSMHVAYQAUCAOIQBDAAGAQLMA2Y
** Delivery incomplete **
There was a temporary problem delivering your message to
curtiskwo...@gmail.com. Gmail will retry for 46 more hours. You'll be notified
if the delivery fails permanently.
Reporting-MTA: dns; googlemail.com
Received-From-MTA: dns; FWD-737QHYSMHVAYQAUCAOIQBDAAGAQLMA2Y
On 2017-06-08 03:53 PM, Konrad Rzeszutek Wilk wrote:
On Thu, Jun 08, 2017 at 10:28:15AM +0200, Juergen Gross wrote:
On 03/06/17 02:05, Ankur Arora wrote:
This patch series fixes a bunch of issues in the xen_vcpu setup
logic.
Simplify xen_vcpu related code: code refactoring in advance of the
re
flight 110112 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110112/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358
test-amd64-i386-xl-qe
** Delivery incomplete **
There was a temporary problem delivering your message to
curtiskwo...@gmail.com. Gmail will retry for 47 more hours. You'll be notified
if the delivery fails permanently.
Reporting-MTA: dns; googlemail.com
Received-From-MTA: dns; FWD-737QHYSMHVAYQAUCAOIQBDAAGAQLMA2Y
On Thu, Jun 08, 2017 at 10:28:15AM +0200, Juergen Gross wrote:
> On 03/06/17 02:05, Ankur Arora wrote:
> > This patch series fixes a bunch of issues in the xen_vcpu setup
> > logic.
> >
> > Simplify xen_vcpu related code: code refactoring in advance of the
> > rest of the patch series.
> >
> > Su
On Thu, 8 Jun 2017, Owen Smith wrote:
> Mouse events are only delivered to the first handler in the chain.
> Activating the xenfb mouse event handler so that mouse events can
> be passed over the shared ring protocol.
> Note: The keyboard handler is activated internally by the add
> call.
I am not
On Thu, 8 Jun 2017, Owen Smith wrote:
> Advertise "feature-vkbd-standalone" to indicate the backend
> can connect without a vfb device connection.
> When "request-vkbd-standalone" is set to 1, the backend does
> not wait for a QemuConsole to be setup before connecting the
> vkbd device. This also
On Thu, 8 Jun 2017, Owen Smith wrote:
> Adds the ability for a vkbd device to connect without the
> QemuConsole, in order to support a standalone PV mouse and
> keyboard frontend.
> This series adds a new feature flag, which will need adding
> to the xen's include/public/io/kbdif.h
Please do so, I
CCing Jan
On Thu, 8 Jun 2017, Sameer Goel wrote:
> Add limited support for parsing IORT table to initialize SMMU devices.
>
> Signed-off-by: Sameer Goel
> ---
> xen/arch/arm/setup.c| 3 +
> xen/drivers/acpi/Makefile | 1 +
> xen/drivers/acpi/arm/Makefile |
On Fri, 9 Jun 2017, Stephen Rothwell wrote:
> Hi all,
>
> The current top commit of the xen-tip tree
>
> 9e925824eccd ("xen: avoid type warning in xchg_xen_ulong")
>
> has no Signed-off-by for its committer.
Fixed, thanks for pointing it out.
___
X
On 08/06/2017 22:17, Boris Ostrovsky wrote:
> On 06/08/2017 05:02 PM, Tom Lendacky wrote:
>> On 6/8/2017 3:51 PM, Boris Ostrovsky wrote:
> What may be needed is making sure X86_FEATURE_SME is not set for PV
> guests.
And that may be something that Xen will need to control through eithe
Hi all,
The current top commit of the xen-tip tree
9e925824eccd ("xen: avoid type warning in xchg_xen_ulong")
has no Signed-off-by for its committer.
--
Cheers,
Stephen Rothwell
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.
On Thu, 8 Jun 2017, Goel, Sameer wrote:
> >> diff --git a/xen/include/xen/fwnode.h b/xen/include/xen/fwnode.h
> >> new file mode 100644
> >> index 000..db65b15
> >> --- /dev/null
> >> +++ b/xen/include/xen/fwnode.h
> >> @@ -0,0 +1,35 @@
> >> +/*
> >> + * fwnode.h - Firmware device node object h
On Thu, 8 Jun 2017, Sameer Goel wrote:
> Introduce a memory realloc function.
>
> Signed-off-by: Sameer Goel
> ---
> xen/common/xmalloc_tlsf.c | 13 +
> xen/include/xen/xmalloc.h | 1 +
> 2 files changed, 14 insertions(+)
>
> diff --git a/xen/common/xmalloc_tlsf.c b/xen/common/xmal
On 6/8/2017 1:59 PM, Julien Grall wrote:
>
>
> On 08/06/2017 20:30, Sameer Goel wrote:
>> This will be used as a device property to match the DMA capable devices
>> with the associated SMMU. The header file is a port from linux.
>>
>> Linux ChangeId:ce793486e23e: driver core / ACPI: Represent ACP
On 06/08/2017 05:02 PM, Tom Lendacky wrote:
> On 6/8/2017 3:51 PM, Boris Ostrovsky wrote:
>>
>>>
What may be needed is making sure X86_FEATURE_SME is not set for PV
guests.
>>>
>>> And that may be something that Xen will need to control through either
>>> CPUID or MSR support for the PV g
On 6/8/2017 3:51 PM, Boris Ostrovsky wrote:
What may be needed is making sure X86_FEATURE_SME is not set for PV
guests.
And that may be something that Xen will need to control through either
CPUID or MSR support for the PV guests.
Only on newer versions of Xen. On earlier versions (2-3 y
Bringing in Konrad because...
On Thu, 2017-06-08 at 11:37 +0200, Juergen Gross wrote:
> On 07/06/17 20:19, Stefano Stabellini wrote:
> > On Wed, 7 Jun 2017, Juergen Gross wrote:
> > > On 06/06/17 21:08, Stefano Stabellini wrote:
> > > >
> > > > 2) PV suspend/resume
> > > > 3) vector callback
> >
>
>> What may be needed is making sure X86_FEATURE_SME is not set for PV
>> guests.
>
> And that may be something that Xen will need to control through either
> CPUID or MSR support for the PV guests.
Only on newer versions of Xen. On earlier versions (2-3 years old) leaf
0x8007 is passed to
flight 110109 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110109/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
109754
Tests which ar
Hi,
On 08/06/2017 20:30, Sameer Goel wrote:
Introduce a common structure to hold the fw (ACPI or DT) defined
configuration for SMMU hw. The current use case is for arm SMMUs. So,
making this architecture specific.
Based on Linux kernel commit 57f98d2f61e1: iommu: Introduce iommu_fwspec
Signed-o
On 08/06/2017 20:30, Sameer Goel wrote:
This will be used as a device property to match the DMA capable devices
with the associated SMMU. The header file is a port from linux.
Linux ChangeId:ce793486e23e: driver core / ACPI: Represent ACPI
companions using fwnode_handle
Signed-off-by: Sameer
flight 110117 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110117/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 5 xen-buildfail REGR. vs. 110078
build-amd64
CC the REST maintainers
On 08/06/2017 20:30, Sameer Goel wrote:
Introduce a memory realloc function.
Signed-off-by: Sameer Goel
---
xen/common/xmalloc_tlsf.c | 13 +
xen/include/xen/xmalloc.h | 1 +
2 files changed, 14 insertions(+)
diff --git a/xen/common/xmalloc_tlsf.c b/xen/c
Hi,
Please CC all the relevant maintainers on this patch.
On 08/06/2017 20:30, Sameer Goel wrote:
This will be used as a device property to match the DMA capable devices
with the associated SMMU. The header file is a port from linux.
Linux ChangeId:ce793486e23e: driver core / ACPI: Represent A
Modify the SMMU code to use generic device instead of dt_device_node for
functions that can be used for ACPI based systems too.
Signed-off-by: Sameer Goel
---
xen/drivers/passthrough/arm/smmu.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/xen/drivers/passthrou
Introduce a common structure to hold the fw (ACPI or DT) defined
configuration for SMMU hw. The current use case is for arm SMMUs. So,
making this architecture specific.
Based on Linux kernel commit 57f98d2f61e1: iommu: Introduce iommu_fwspec
Signed-off-by: Sameer Goel
---
xen/drivers/passthroug
Verbatim files from Linux kernel.
iort.c: commit ca78d3173cff:Merge tag 'arm64-upstream'
acpi_iort.h: commit 18b709beb503:ACPI/IORT: Make dma masks set-up IORT
specific
Signed-off-by: Sameer Goel
---
xen/drivers/acpi/arm/iort.c | 961 +++
xen/include/acpi
Add limited support for parsing IORT table to initialize SMMU devices.
Signed-off-by: Sameer Goel
---
xen/arch/arm/setup.c| 3 +
xen/drivers/acpi/Makefile | 1 +
xen/drivers/acpi/arm/Makefile | 1 +
xen/drivers/acpi/arm/iort.c | 232 +
This changelist is in preparation for porting the latest SMMUv3 driver from
Linux kernel 4.11 release.
Scope of the changes:
- Introduce the iommu_fwspec implementation
* This implementation is a direct port from Linux. The code that is not
needed for Xen is removed.
- IORT port from Li
Introduce a memory realloc function.
Signed-off-by: Sameer Goel
---
xen/common/xmalloc_tlsf.c | 13 +
xen/include/xen/xmalloc.h | 1 +
2 files changed, 14 insertions(+)
diff --git a/xen/common/xmalloc_tlsf.c b/xen/common/xmalloc_tlsf.c
index b256dc5..52385a8 100644
--- a/xen/common
This will be used as a device property to match the DMA capable devices
with the associated SMMU. The header file is a port from linux.
Linux ChangeId:ce793486e23e: driver core / ACPI: Represent ACPI
companions using fwnode_handle
Signed-off-by: Sameer Goel
---
xen/include/asm-arm/device.h | 2
flight 110102 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110102/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 15 guest-localmigrate/x10 fail REGR. vs.
110071
test-amd64-a
- fixed some minor numbering and syntax issues in the CPU allocation
examples for the 'cpus' option
- semantic fixes to make explanations more clear throughout
- fixed all the typo's I could see
- general styling and makeup fixes to make everything look more consistent
Signed-off-by: Armando Veg
Hey everyone,
so I'm respinning the patch after Dario confirmed the NUMA example is correct
now.
Armando Vega (1):
xl.cfg man page cleanup and fixes
docs/man/xl.cfg.pod.5.in | 1107 --
1 file changed, 588 insertions(+), 519 deletions(-)
--
2.11.0
On 08/06/17 20:09, Stefano Stabellini wrote:
> On Thu, 8 Jun 2017, Juergen Gross wrote:
>> On 07/06/17 20:19, Stefano Stabellini wrote:
>>> On Wed, 7 Jun 2017, Juergen Gross wrote:
On 06/06/17 21:08, Stefano Stabellini wrote:
> On Tue, 6 Jun 2017, Juergen Gross wrote:
>> On 06/06/17 18
On Thu, 8 Jun 2017, Arnd Bergmann wrote:
> The improved type-checking version of container_of() triggers a warning for
> xchg_xen_ulong, pointing out that 'xen_ulong_t' is unsigned, but atomic64_t
> contains a signed value:
>
> drivers/xen/events/events_2l.c: In function 'evtchn_2l_handle_events':
On Thu, 8 Jun 2017, Juergen Gross wrote:
> On 07/06/17 20:19, Stefano Stabellini wrote:
> > On Wed, 7 Jun 2017, Juergen Gross wrote:
> >> On 06/06/17 21:08, Stefano Stabellini wrote:
> >>> On Tue, 6 Jun 2017, Juergen Gross wrote:
> On 06/06/17 18:39, Stefano Stabellini wrote:
> > On Tue, 6
flight 110107 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110107/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 110065
test-armhf-armhf-libvirt-xsm 13 saveresto
On 07/06/17 09:20, Sergey Dyasli wrote:
> Change the third parameter to be the required struct xen_dm_op_buf *
> instead of a generic void * (which blindly accepts any pointer).
>
> Signed-off-by: Sergey Dyasli
Committed to xen/tip.git for-linus-4.13
Thanks,
Juergen
_
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/hypercall.c| 31 +++
xen/arch/x86/x86_64/compat/traps.c | 31 ---
xen/include/asm-x86/hypercall.h| 1 +
3 files changed, 32 insertions(+), 31 deletions(-)
diff --git a/xen/arch/x86/pv/
And make it static, remove the declaration in header.
Signed-off-by: Wei Liu
---
xen/arch/x86/traps.c | 64 ++
xen/arch/x86/x86_64/compat/traps.c | 63 -
xen/include/asm-x86/processor.h| 3 --
3 files chan
Replace bool_t with bool. Delete trailing white spaces. Fix some
coding style issues.
Signed-off-by: Wei Liu
Acked-by: Jan Beulich
---
xen/arch/x86/traps.c | 77 +++-
1 file changed, 40 insertions(+), 37 deletions(-)
diff --git a/xen/arch/x86/tra
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/iret.c | 120 +
xen/arch/x86/x86_64/compat/traps.c | 120 -
2 files changed, 120 insertions(+), 120 deletions(-)
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/ir
And add an emacs block.
Signed-off-by: Wei Liu
---
xen/include/asm-x86/traps.h | 12 +++-
1 file changed, 11 insertions(+), 1 deletion(-)
diff --git a/xen/include/asm-x86/traps.h b/xen/include/asm-x86/traps.h
index 8cf6105d8d..1ac6718257 100644
--- a/xen/include/asm-x86/traps.h
+++ b/xe
Take the chance to constify pointers, replace uint16_t with unsigned
int etc.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 18 ++
xen/arch/x86/traps.c| 18 --
xen/include/asm-x86/traps.h | 6 +++---
3 files changed, 21 insertions(+), 21 deleti
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/compat/traps.c | 14 --
xen/arch/x86/x86_64/traps.c| 2 --
2 files changed, 16 deletions(-)
delete mode 100644 xen/arch/x86/x86_64/compat/traps.c
diff --git a/xen/arch/x86/x86_64/compat/traps.c
b/xen/arch/x86/x86_64/compat/tra
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/callback.c | 142
xen/arch/x86/x86_64/compat/traps.c | 143 -
2 files changed, 142 insertions(+), 143 deletions(-)
diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv
Signed-off-by: Wei Liu
---
There is no copyright header in the original file. Use the default
one?
---
xen/arch/x86/pv/Makefile| 1 +
xen/arch/x86/pv/iret.c | 72 +
xen/arch/x86/x86_64/traps.c | 56 ---
3 files
Take the opportunity to change their return type to bool. And rename
"v" to "curr".
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 27 +++
xen/arch/x86/traps.c| 27 ---
2 files changed, 27 insertions(+), 27 deletions(-)
diff --git a/xen/
Take the opportunity to rename "v" to "curr".
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 36
xen/arch/x86/traps.c| 36
2 files changed, 36 insertions(+), 36 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c
Signed-off-by: Wei Liu
Acked-by: Jan Beulich
---
xen/arch/x86/pv/traps.c | 14 ++
xen/arch/x86/x86_64/traps.c | 14 --
2 files changed, 14 insertions(+), 14 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.c
index 0c1600d886..f2556c7e4a 10064
Signed-off-by: Wei Liu
---
xen/arch/x86/traps.c | 22 ++
xen/include/asm-x86/pv/traps.h | 4
2 files changed, 18 insertions(+), 8 deletions(-)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index 8861dfd332..29a83994bd 100644
--- a/xen/arch/x86/traps
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c| 45 ++
xen/arch/x86/x86_64/compat/traps.c | 45 --
2 files changed, 45 insertions(+), 45 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/tra
Those functions need to be moved at the same time. Also move
softirq_trap because it is only used in that one place.
Fix some coding style issues while moving.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 105
xen/arch/x86/traps.c
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/domain.c| 30 ++
xen/arch/x86/x86_64/traps.c | 30 --
2 files changed, 30 insertions(+), 30 deletions(-)
diff --git a/xen/arch/x86/pv/domain.c b/xen/arch/x86/pv/domain.c
index 1c0c040ca0..0f3f0
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/Makefile| 1 +
xen/arch/x86/pv/callback.c | 157
xen/arch/x86/x86_64/traps.c | 148 -
3 files changed, 158 insertions(+), 148 deletions(-)
create mode 100644 xen
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/hypercall.c | 36
xen/arch/x86/x86_64/traps.c | 36
xen/include/asm-x86/hypercall.h | 1 +
3 files changed, 37 insertions(+), 36 deletions(-)
diff --git a/xen/arch/x86/pv
Move the code to pv/emul-inv-op.c. Prefix emulate_* functions with pv_
and export them via pv/traps.h.
Pure code motion except for the rename.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/Makefile | 1 +
xen/arch/x86/pv/emul-inv-op.c | 123 +
xen/a
Move the code to pv/emul-priv-op.c. Prefix emulate_privileged_op with
pv_ and export it via pv/traps.h.
Also move gpr_switch.S since it is used by the privileged instruction
emulation code only.
Code motion only except for the rename. Cleanup etc will come later.
Signed-off-by: Wei Liu
---
xen
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/Makefile | 1 +
xen/arch/x86/pv/misc-hypercalls.c | 78 +++
xen/arch/x86/traps.c | 44 --
3 files changed, 79 insertions(+), 44 deletions(-)
create mode 100644 xen/arch/x86/p
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 52 +
xen/arch/x86/traps.c| 49 --
2 files changed, 52 insertions(+), 49 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.
V4 of this series, rebased on top of staging.
git://xenbits.xen.org/people/liuw/xen.git wip.move-traps-v4
Wei Liu (27):
x86: factor out common PV emulation code
x86: move PV privileged instruction emulation code
x86: move PV gate op emulation code
x86: move PV invalid op emulation code
Replace bool_t with bool. Fix coding style issues. Add spaces around
binary ops. Use 1U for shifting. Eliminate TOGGLE_MODE.
Signed-off-by: Wei Liu
Signed-off-by: Andrew Cooper
---
xen/arch/x86/pv/emul-gate-op.c | 5 ++-
xen/arch/x86/pv/emul-priv-op.c | 82 ++---
Signed-off-by: Wei Liu
---
Can be squashed into previous patch. Kept separated in case further
code churn is required.
---
xen/arch/x86/traps.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index ff25f679f5..b5642b0f9a 100644
--- a/xen/arch/x86/t
Take the opportunity to rename "v" to "curr".
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 73 +
xen/arch/x86/traps.c| 69 --
2 files changed, 73 insertions(+), 69 delet
Move the code to pv/emul-gate-op.c. Prefix emulate_gate_op with pv_
and export it via pv/traps.h.
Pure code motion except for the rename.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/Makefile | 1 +
xen/arch/x86/pv/emul-gate-op.c | 440 +
xen/arch/x
We're going to split PV emulation code into several files. This patch
extracts the functions needed by them into a dedicated file.
The functions are now prefixed with "pv_emul_" and exported via a
local header file.
While at it, change bool_t to bool.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv
On Thu, 2017-06-08 at 14:32 +0200, Kashyap Thimmaraju wrote:
> Hi,
>
> I'm Kashyap Thimmaraju, a second year PhD student at TU Berlin in
> Germany. This is my first post here, and I'm a Xen newbie.
>
> I saw George Dunlap's presentation "Securing Your Xen-Based Cloud" at
> the LinuxCon on youtube
On 06/08/2017 06:25 AM, Christoph Hellwig wrote:
> DMA_ERROR_CODE is not a public API and will go away. Instead properly
> unwind based on the loop counter.
>
> Signed-off-by: Christoph Hellwig
Acked-by: Dave Jiang
> ---
> drivers/dma/ioat/init.c | 24 +++-
> 1 file chang
On Thu, 8 Jun 2017 15:25:44 +0200
Christoph Hellwig wrote:
> s390 can also use noop_dma_ops, and while that currently does not return
> errors it will so in the future. Implementing the mapping_error method
> is the proper way to have per-ops error conditions.
>
> Signed-off-by: Christoph Hell
On Wed, 2017-06-07 at 10:13 -0400, Konrad Rzeszutek Wilk wrote:
> On Thu, Jun 01, 2017 at 07:33:33PM +0200, Dario Faggioli wrote:
> >
> > Patch 5 deserves special mention. In fact, now that we have
> > Kconfig, I thought
> > it could be a nice thing to make it possible to select, at build
> > conf
On Thu, 2017-06-08 at 17:01 +0100, George Dunlap wrote:
> On 01/06/17 18:34, Dario Faggioli wrote:
> > diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug
> > index 374c1c0..81910c9 100644
> > --- a/xen/Kconfig.debug
> > +++ b/xen/Kconfig.debug
> > @@ -98,7 +98,7 @@ config PERF_ARRAYS
> > ---hel
>>> On 02.06.17 at 01:42, wrote:
> On Thu, 2017-06-01 at 20:08 +0100, Andrew Cooper wrote:
>> By writing the trace record while interrupts are disabled, you do
>> prevent nesting in the general case (but not in NMIs/MCEs or the
>> irqsave() variants),
>>
> Forgive the ignorance, what's special ab
On 01/06/17 18:34, Dario Faggioli wrote:
> Trace when interrupts are disabled and (re)enabled.
> Basically, we replace the IRQ disabling and enabling
> functions with helpers that does the same, but also
> output the proper trace record.
>
> For putting in the record something that will let
> us i
>>> On 31.05.17 at 23:20, wrote:
> First, move some code around in order to make the next change more obvious.
>
> commit 16c047add3ceaf0ab882e3e094d1ec904d02312d from linux tree
>
> Signed-off-by: Praveen Kumar
You've completely lost all original authorship - this is a no-go. You'll
need to i
On 02/06/17 00:42, Dario Faggioli wrote:
> On Thu, 2017-06-01 at 20:08 +0100, Andrew Cooper wrote:
>> On 01/06/17 18:34, Dario Faggioli wrote:
>>> diff --git a/xen/common/spinlock.c b/xen/common/spinlock.c
>>> index 2a06406..33b903e 100644
>>> --- a/xen/common/spinlock.c
>>> +++ b/xen/common/spinlo
Drop a redundant input constraint, correct a comment, and (re)move
fix.insn_bytes adjustments (these aren't needed for custom stub
invocations when the instruction placed in the stub can't raise #XF)
plus a corresponding check_xmm_exn() invocation.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x
>>> On 08.06.17 at 17:37, wrote:
> On 08/06/17 16:35, Jan Beulich wrote:
> On 08.06.17 at 17:16, wrote:
>>> On 07/06/17 16:14, Jan Beulich wrote:
>>> On 01.06.17 at 19:34, wrote:
> --- a/xen/Kconfig.debug
> +++ b/xen/Kconfig.debug
> @@ -98,6 +98,14 @@ config PERF_ARRAYS
>
On 08/06/17 16:35, Jan Beulich wrote:
On 08.06.17 at 17:16, wrote:
>> On 07/06/17 16:14, Jan Beulich wrote:
>> On 01.06.17 at 19:34, wrote:
--- a/xen/Kconfig.debug
+++ b/xen/Kconfig.debug
@@ -98,6 +98,14 @@ config PERF_ARRAYS
---help---
Enables software p
>>> On 08.06.17 at 17:16, wrote:
> On 07/06/17 16:14, Jan Beulich wrote:
> On 01.06.17 at 19:34, wrote:
>>> --- a/xen/Kconfig.debug
>>> +++ b/xen/Kconfig.debug
>>> @@ -98,6 +98,14 @@ config PERF_ARRAYS
>>> ---help---
>>> Enables software performance counter array histograms.
>>>
>
>>> On 08.06.17 at 16:53, wrote:
> On 07/06/17 16:58, Jan Beulich wrote:
> On 07.06.17 at 17:45, wrote:
>>> On Wed, 2017-06-07 at 09:05 -0600, Jan Beulich wrote:
>>> On 01.06.17 at 19:33, wrote:
> @@ -884,9 +919,13 @@ void do_IRQ(struct cpu_user_regs *regs)
> desc->r
For PV domains paging_mode_{refcounts,translate}() are always false as
of commits 4045953527 ("x86/paging: Enforce PG_external == PG_translate
== PG_refcounts") and 92942fd3d4 ("x86/mm: drop
guest_{map,get_eff}_l1e() hooks").
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/
It is not impossible that the page owner is dom_io. While no current
caller cares about this case, let's nevertheless return an appropriate
type even in that case.
Signed-off-by: Jan Beulich
--- a/xen/include/asm-x86/p2m.h
+++ b/xen/include/asm-x86/p2m.h
@@ -479,9 +479,9 @@ static inline struct
Correct respective comments.
Signed-off-by: Jan Beulich
---
MMUEXT_{CLEAR,COPY}_PAGE in fact also allow to be invoked on DOMID_IO
owned pages at present. I've intentionally not added this to the text,
as I'm not sure we really mean to allow this. If we do, I think the
operation should also be all
On 01/06/17 18:34, Dario Faggioli wrote:
> And compile it out of the hypervisor entirely.
>
> Code and other sections' sizes change as follows.
>
> Output of `size`:
> vanilla patched-Y patched-N
> text 192900719290071902783
> data 337784 337784 337688
> bss 1310464
On 07/06/17 16:14, Jan Beulich wrote:
On 01.06.17 at 19:34, wrote:
>> --- a/xen/Kconfig.debug
>> +++ b/xen/Kconfig.debug
>> @@ -98,6 +98,14 @@ config PERF_ARRAYS
>> ---help---
>>Enables software performance counter array histograms.
>>
>> +config TRACING
>> +bool "Tracing"
On Thu, Jun 1, 2017 at 6:34 PM, Dario Faggioli
wrote:
> In fact, not all the information present in the trace
> record were used and printed.
>
> Signed-off-by: Dario Faggioli
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xen.
On 01/06/17 18:33, Dario Faggioli wrote:
> More specifically:
> - the handling of the TRC_HW_IRQ_HANDLED is fixed, both in
>xentrace_format and in xenalyze;
> - simple events for recording when we enter and exit the
>do_IRQ function, as well as when we deal with a guest
>IRQ, are adde
On 07/06/17 16:58, Jan Beulich wrote:
On 07.06.17 at 17:45, wrote:
>> On Wed, 2017-06-07 at 09:05 -0600, Jan Beulich wrote:
>> On 01.06.17 at 19:33, wrote:
@@ -884,9 +919,13 @@ void do_IRQ(struct cpu_user_regs *regs)
desc->rl_quantum_start = now;
}
>>
BOn Thu, Jun 08, 2017 at 03:25:50PM +0200, Christoph Hellwig wrote:
> +static int dmabounce_mapping_error(struct device *dev, dma_addr_t dma_addr)
> +{
> + if (dev->archdata.dmabounce)
> + return 0;
I'm not convinced that we need this check here:
dev->archdata.dmabounce =
>>> On 08.06.17 at 16:20, wrote:
> On 01/06/17 18:33, Dario Faggioli wrote:
>> In fact, right now, we read it at every iteration of the loop.
>> The reason it's done like this is how context switch was handled
>> on IA64 (see commit ae9bfcdc, "[XEN] Various softirq cleanups" [1]).
>>
>> However:
On 01/06/17 18:33, Dario Faggioli wrote:
> In fact, when calling __trace_var() directly, we can
> assume that tb_init_done has been checked to be true,
> and the if is hence redundant.
You probably want to adjust the comment before the smp_rmb() that
mentions tb_init_done as well.
Other than that
On 07/06/17 17:06, Jan Beulich wrote:
On 07.06.17 at 17:55, wrote:
>> On Wed, 2017-06-07 at 08:46 -0600, Jan Beulich wrote:
>> On 01.06.17 at 19:33, wrote:
In fact, when calling __trace_var() directly, we can
assume that tb_init_done has been checked to be true,
and t
1 - 100 of 215 matches
Mail list logo