flight 111959 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111959/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 357c48258e0b452d31f487a47dca486ba666a954
baseline version:
ovmf a58bfb37f63a9c16e37c3
Let there be two domU's - domU (1) and domU (2)
Is there a way domU (1) can find the UUID of domU (2) ?
Please tell.
Thanks.
--
View this message in context:
http://xen.1045712.n5.nabble.com/Is-there-a-way-domU-1-can-find-the-UUID-of-domU-2-tp5737307.html
Sent from the Xen - Dev mailing list a
Hi
I want run and understand xen hypervisor with dom0 and domU on omap5 board.
I followed
https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/
OMAP5432_uEVM
with latest kernel(4.11.7) and xen(4.9.0) and device tree and but unable to
boot dom0.
xen stop on "Turning on pages".
This run is configured for baseline tests only.
flight 71696 linux-3.18 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71696/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64 15 gues
flight 111926 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111926/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 7 xen-boot fail REGR. vs. 111765
test-amd64-i386-x
On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote:
> On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote:
> > On Mon, Jul 17, 2017 at 12:20:56PM +0100, Roger Pau Monné wrote:
> > > On Sat, Jul 15, 2017 at 07:15:56AM +0800, Ming Lei wrote:
> > > > stopping queue may cause race and
flight 111924 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111924/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pair10 xen-boot/src_hostfail REGR. vs. 111866
test-amd64-amd64-pai
flight 111948 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111948/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a58bfb37f63a9c16e37c39a48b273ce69194f281
baseline version:
ovmf d4f6c35c84b8503bc2acd
On 17/07/2017 19:30, Stefano Stabellini wrote:
> On Fri, 14 Jul 2017, Jan Beulich wrote:
> On 13.07.17 at 09:50, wrote:
>>> --- a/xen/common/event_channel.c
>>> +++ b/xen/common/event_channel.c
>>> @@ -1098,6 +1098,10 @@ long do_event_channel_op(int cmd,
>>> XEN_GUEST_HANDLE_PARAM(void) arg)
flight 111915 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111915/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 111869
test-armhf-armhf-libvirt-xsm 14 saveresto
Xen does not currently support SME for PV guests. Clear the SME CPU
capability in order to avoid any ambiguity.
Cc:
Cc: Boris Ostrovsky
Cc: Juergen Gross
Reviewed-by: Borislav Petkov
Reviewed-by: Juergen Gross
Signed-off-by: Tom Lendacky
---
arch/x86/xen/enlighten_pv.c | 1 +
1 file changed
This patch series provides support for AMD's new Secure Memory Encryption (SME)
feature.
SME can be used to mark individual pages of memory as encrypted through the
page tables. A page of memory that is marked encrypted will be automatically
decrypted when read from DRAM and will be automatically
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-amd64-pvgrub
testid xen-boot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.g
flight 111941 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111941/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d4f6c35c84b8503bc2acde89a7adb7ee05c56516
baseline version:
ovmf e38eb2595b86434f2d488
flight 111912 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111912/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-libvirt-xsm 4 host-install(4) broken in 111836 pass in 111912
test-armhf-armhf-xl-arndale 5 ho
flight 111920 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111920/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-qemuu-nested-intel 10 debian-hvm-install fail in 111893 pass
in 111920
test-amd64-amd64-xl-qemu
On Fri, 14 Jul 2017, Jan Beulich wrote:
> >>> On 13.07.17 at 09:50, wrote:
> > --- a/xen/common/event_channel.c
> > +++ b/xen/common/event_channel.c
> > @@ -1098,6 +1098,10 @@ long do_event_channel_op(int cmd,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> > break;
> > }
> >
> > +cas
"THE REST" maintainers should always be CCed for any modification that
don't fall under the responsability of a specific component maintainer.
However, the script get_maintainers.pl will remove "THE REST"
maintainers as soon as one maintainer of a specific component will be
present.
Fix the scrip
Hello Jan, Pasi, all
Jan, I still have access to the hardware so perhaps we can finally solve
this problem.
Feel free to go ahead; I'll be on vacation for the next three weeks.
Perhaps we can shortcut debugging a bit because I looked through the
patches of XenServer 7.2 and found the attach
Instead of fiddling with masking the event channels during suspend
and resume handling let do the irq subsystem do its job. It will do
the mask and unmask operations as needed.
Signed-off-by: Juergen Gross
---
drivers/xen/events/events_base.c | 13 +++--
1 file changed, 3 insertions(+),
An irq pretending it got disabled should have its state set
accordingly. Otherwise a potential unmask later won't succeed.
Signed-off-by: Juergen Gross
---
kernel/irq/chip.c | 10 --
kernel/irq/internals.h | 10 ++
kernel/irq/pm.c| 2 ++
3 files changed, 12 insertio
Commit bf22ff45bed664aefb5c4e43029057a199b7070c ("genirq: Avoid
unnecessary low level irq function calls") broke Xen suspend/resume
handling as Xen fiddled with masking/unmasking of event channels (or
irqs) without letting the irq subsystem know about it.
Fix this by setting the correct states in
On Mon, Jul 17, 2017 at 06:58:27PM +0200, Juergen Gross wrote:
> On 17/07/17 17:09, Wei Liu wrote:
> > It is agreed during the summit we should write down such document. Here
> > is my attempt of doing so.
> >
> > We should probably commit something like this into xen.git so that it
> > gets updat
Anthony PERARD writes ("Re: [OSSTEST PATCH v12 18/21] TestSupport: Implement
target_cmd_subunit a subunit stream parser into substeps"):
> On Thu, Jul 13, 2017 at 03:43:55PM +0100, Anthony PERARD wrote:
> > Will do. And yes, this will duplicate most of the output. But it can
> > help debug osstest
Anthony PERARD writes ("Re: [OSSTEST PATCH v12 18/21] TestSupport: Implement
target_cmd_subunit a subunit stream parser into substeps"):
> On Thu, Jul 13, 2017 at 02:28:11PM +0100, Ian Jackson wrote:
> > I think this is not a critical problem, but fixing it would be nice at
> > some point.
>
> Th
Hi Bhupinder,
On 17/07/17 14:06, Bhupinder Thakur wrote:
Add a new domctl API to initialize vpl011. It takes the GFN and console
backend domid as input and returns an event channel to be used for
sending and receiving events from Xen.
Xen will communicate with xenconsole using GFN as the ring b
On 17/07/17 17:09, Wei Liu wrote:
> It is agreed during the summit we should write down such document. Here
> is my attempt of doing so.
>
> We should probably commit something like this into xen.git so that it
> gets updated regularly.
>
> Comments are welcome.
>
> -
>
> % Xen Release Mana
If case of a vm_event with the emulate_flags set, if the instruction
cannot be emulated, the monitor should be notified instead of directly
injecting a hw exception.
This behavior can be used to re-execute an instruction not supported by
the emulator using the real processor (e.g. altp2m) instead o
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-xl-qemuu-win7-amd64
testid windows-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git
Hi Bhupinder,
On 17/07/17 14:06, Bhupinder Thakur wrote:
Rearrange xen header includes in alphabetical order in domctl.c.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
For the future, please mention if you keep a reviewed-by tag when you
modify a patch. This will give a c
Hi Bhupinder,
On 17/07/17 14:06, Bhupinder Thakur wrote:
Add emulation code to emulate read/write access to pl011 registers
and pl011 interrupts:
- Emulate DR read/write by reading and writing from/to the IN
and OUT ring buffers and raising an event to the backend when
there is
If case of a vm_event with the emulate_flags set, if the instruction
cannot be emulated, the monitor should be notified instead of directly
injecting a hw exception.
This behavior can be used to re-execute an instruction not supported by
the emulator using the real processor (e.g. altp2m) instead o
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit adds functionality to walk the guest's page tables using the
short-descriptor translation table format for both ARMv7 and ARMv8. The
implementation is based on ARM DDI 0487B-a J1-6002 and ARM DDI 0406C-b
B3-1506.
Signed-off-by: S
flight 111900 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111900/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR.
vs. 110515
test-amd64
Hi Julien,
On 07/17/2017 03:53 PM, Julien Grall wrote:
> (+Wei and Ian)
>
> Hi Sergej
>
> On 17/07/17 13:04, Sergej Proskurin wrote:
>> Hi all,
>>
>> My setup comprises an ARMv7 (Arndale, Linux kernel v4.11.6) and an ARMv8
>> (LeMaker HiKey, Linux kernel v4.9.0) development board. On both boards,
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
+/*
+ * Get the MSB number of the GVA, according to "AddrTop" pseudocode
+ * implementation in ARM DDI 0487B.a J1-6066.
+ */
+static unsigned int get_top_bit(struct domain *d, vaddr_t gva, register_t tcr)
+{
+unsigned int topbit;
+
+/
On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote:
> On Mon, Jul 17, 2017 at 12:20:56PM +0100, Roger Pau Monné wrote:
> > On Sat, Jul 15, 2017 at 07:15:56AM +0800, Ming Lei wrote:
> > > stopping queue may cause race and may not stop the queue really
> > > after the API returns, and we have i
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
The function p2m_mem_access_check_and_get_page in mem_access.c
translates a gva to an ipa by means of the hardware functionality of the
ARM architecture. This is implemented in the function gva_to_ipa. If
mem_access is active, hardware-based
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit renames the function vgic_access_guest_memory to
access_guest_memory_by_ipa. As the function name suggests, the functions
expects an ipa as argument. Thus, to make the function's purpose more
s/ipa/IPA/
clearly, we have also r
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit moves the function vgic_access_guest_memory to guestcopy.c
and the header asm/guest_access.h. No functional changes are made.
Please note that the function will be renamed in the following commit.
Signed-off-by: Sergej Proskurin
On Mon, Jul 17, 2017 at 12:28:20PM +0200, Felix Schmoll wrote:
> Implement reading from PV console. Making use of polling.
>
> Signed-off-by: Felix Schmoll
>
> ---
> This is based on the console-branch of andyhhp, so that one has to
> be merged before applying this patch.
> ---
> common/console
On 07/17/2017 04:08 PM, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [Xen-devel] [XenSummit 2017] Notes from the PVH
> toolstack interface session"):
>> On 17/07/17 10:36, Roger Pau Monné wrote:
>>> kernel = ""
>>> ramdisk = ""
>>> cmdline = ""
>>>
>>> : relative or full path in the
On Mon, Jul 17, 2017 at 11:05:24AM +0100, Wei Liu wrote:
> On Thu, Jul 13, 2017 at 10:10:05AM +0800, Haozhong Zhang wrote:
> > On 07/12/17 09:26 -0400, Konrad Rzeszutek Wilk wrote:
> > > On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote:
> > > > If option '-l' or '--lmce' is specified
Felix Schmoll writes ("[PATCH v2] xenconsole: Add pipe option"):
> Add pipe option to xenconsole that forwards console input.
Thanks. IMO the commit message could do with better explanation. It
should mention that xenconsole has a strange behaviour where it
doesn't forward stdin unless stdin and
On Mon, Jul 17, 2017 at 02:58:22PM +0100, Andrew Cooper wrote:
> No change in content.
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
It is agreed during the summit we should write down such document. Here
is my attempt of doing so.
We should probably commit something like this into xen.git so that it
gets updated regularly.
Comments are welcome.
-
% Xen Release Management
% Wei Liu <>
% Revision 1
# Motivation
Over the
Andrew Cooper writes ("Re: [Xen-devel] [XenSummit 2017] Notes from the PVH
toolstack interface session"):
> On 17/07/17 10:36, Roger Pau Monné wrote:
> > kernel = ""
> > ramdisk = ""
> > cmdline = ""
> >
> > : relative or full path in the filesystem.
>
> Please can xl or libxl's (not
On Mon, Jul 17, 2017 at 12:20:56PM +0100, Roger Pau Monné wrote:
> On Sat, Jul 15, 2017 at 07:15:56AM +0800, Ming Lei wrote:
> > stopping queue may cause race and may not stop the queue really
> > after the API returns, and we have improved quiescing
> > interface and it really can block dispatchin
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
The ARMv8 architecture supports pages with different (4K, 16K, and 64K) sizes.
NIT: ARMv8 supports both AArch32 and AArch64. However, only AArch64
supports different page granularities. To avoid confusion, please
s/ARMv8 architecture/AArc
Implement reading from PV console. Making use of polling.
Signed-off-by: Felix Schmoll
---
This is based on the console-branch of andyhhp, so that one has to
be merged before applying this patch.
---
common/console.c | 27 ++-
include/xtf/console.h | 2 ++
2 files
Hello,
Please CC the respective maintainers when sending a patch on xen-devel.
On 04/07/17 13:53, Sergej Proskurin wrote:
This commit substitutes the direct access of the host's p2m
(&d->arch.p2m) for the macro "p2m_get_hostp2m". This macro simplifies
readability and also the differentiation be
No change in content.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Ian Jackson
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei Liu
---
docs/misc/xen-command-line.markdown | 48 +++--
1 file changed, 25 inser
> On 17. Jul 2017, at 13:38, Andrew Cooper wrote:
>
> It turns out that Xapi has a library function using it, but that
> function is dead so can be removed.
I am fine with the removal of the OCaml bindings and the patch for the OCaml
code. If the code is fundamentally broken it should be remov
(+Wei and Ian)
Hi Sergej
On 17/07/17 13:04, Sergej Proskurin wrote:
Hi all,
My setup comprises an ARMv7 (Arndale, Linux kernel v4.11.6) and an ARMv8
(LeMaker HiKey, Linux kernel v4.9.0) development board. On both boards,
I have Xen version 4.10-unstable running with the associated tools to
man
This email only tracks big items for xen.git tree. Please reply for items you
woulk like to see in 4.10 so that people have an idea what is going on and
prioritise accordingly.
You're welcome to provide description and use cases of the feature you're
working on.
= Timeline =
We now adopt a fixed
> I tried to follow the instructions in README for match-xsa. I believe
> the xsa-list-send script in step 3 depends on xsa.git, which I don't
> have access to.
That is unfortunately correct: we ought to fix this.
Lars
On 17/07/2017, 12:40, "Wei Liu" wrote:
>On Mon, Jul 17, 2017 at 09:17:23AM +
1. Update documentation for a new vuart option added.
2. Update documentation about SPI irq reserved for vuart.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v4:
- Mino
The SBSA UART node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and consequently lives
in the PL011 driver. It's baudrate and other c
This patch finally adds the support for vuart console. It adds
two new fields in the console initialization:
- optional
- prefer_gnttab
optional flag tells whether the console is optional.
prefer_gnttab tells whether the ring buffer should be allocated using
grant table.
Signed-off-by: Bhupinde
Add a new console type VUART to connect to guest's emualated vuart
console.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v4:
- Removed the vuart compile time flag so t
This patch adds the support for multiple consoles and introduces the iterator
functions to operate on multiple consoles.
This patch is in preparation to support a new vuart console.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Chang
This patch introduces a console_open_log console_cleanup function. This function
opens the console log file.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch.
tools/console/daem
This patch introduces a new console_cleanup function. This function
frees up the console resources.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch.
tools/console/daemon/io.c |
This patch introduces a console_close_evtchn console_cleanup function. This
function
closes the console event channel.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch.
tools/c
This patch introduces a new add_console_evtchn_fd function. This
function adds the console event channel FD to list of polled FDs.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch
This patch introduces a new add_console_tty_fd function. This function
adds the tty fd to the list of polled fds.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch.
tools/console
Xenconsole functions take domain structure as input. These functions shall be
modified to take console structure as input since these functions typically
perform
console specific operations.
Also the console specific functions starting with prefix "domain_" shall be
modified
to "console_" to ind
Add a new domctl API to initialize vpl011. It takes the GFN and console
backend domid as input and returns an event channel to be used for
sending and receiving events from Xen.
Xen will communicate with xenconsole using GFN as the ring buffer and
the event channel to transmit and receive pl011 da
This patch introduces a new buffer_available function to check if
more data is allowed to be buffered.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch.
tools/console/daemon/io.
Xenconsole uses a domain structure which contains console specific fields. This
patch defines a new console structure, which would be used by the xenconsole
functions to perform console specific operations like reading/writing data
from/to
the console ring buffer or reading/writing data from/to co
This patch introduces a new console_evtchn_unmask function. This function
unmasks the console event channel if it is masked for some timeout
period.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change i
This patch introduces a new console_init function. This function
initializes the console structure.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch.
tools/console/daemon/io.c |
This patch introduces a new handle_console_tty function. This function
performs read/write from/to console tty.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch.
tools/console/d
SBSA UART emulation for guests in Xen
==
Linaro has published VM System specification for ARM Processors, which
provides a set of guidelines for both guest OS and hypervisor implementations,
such that building OS images according to these guidelines guarantees
t
This patch introduces a new handle_console_ring function. This function
reads the data from the ring buffer on receiving an event.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Split this change in a separate patch
Add a new vuart console node to xenstore. This node is added at
/local/domain/$DOMID/vuart/0.
The node contains information such as the ring-ref, event channel,
buffer limit and type of console.
Xenconsole reads the node information to setup the ring buffer and
event channel for sending/receivin
An option is provided in libxl to enable/disable sbsa vuart while
creating a guest domain.
Libxl now suppots a generic vuart console and sbsa uart is a specific type.
In future support can be added for multiple vuart of different types.
User can enable sbsa vuart by adding the following line in t
The console->conspath name is changed to console->xspath as it is
clear from the name that it is referring to xenstore path.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes sin
DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
xencons_queued() to tell the current size of the ring buffer,
xencons_mask() to mask off the index, which are useful helper functions.
pl011 emulation code will use these helper functions.
io/console.h includes io/ring.h which d
Allocate a new gfn to be used as a ring buffer between xenconsole
and Xen for sending/receiving pl011 console data.
Signed-off-by: Bhupinder Thakur
Acked-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
Changes since v4:
- Rem
Rearrange xen header includes in alphabetical order in domctl.c.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
---
CC: Stefano Stabellini
CC: Julien Grall
Changes since v5:
- Corrected include of in alphabetical order.
xen/arch/arm/domctl.c | 6 +++---
1 file changed, 3 i
Add emulation code to emulate read/write access to pl011 registers
and pl011 interrupts:
- Emulate DR read/write by reading and writing from/to the IN
and OUT ring buffers and raising an event to the backend when
there is data in the OUT ring buffer and injecting an interrupt
Hi, all!
This is a follow-up on Xen distribution build systems we saw at the
summit and invitation for sharing thoughts and ways we build our images and
distros. I would like to specifically ask OpenXT project to reply with the
description of their build system so we have clear picture of what is
There are no current users which I can locate. One piece of xend which didn't
move forwards into xl/libxl is this:
# Configure host CPUID consistency checks, which must be satisfied for this
# VM to be allowed to run on this host's processor type:
#cpuid_check=[ '1:ecx=x
Hi all,
My setup comprises an ARMv7 (Arndale, Linux kernel v4.11.6) and an ARMv8
(LeMaker HiKey, Linux kernel v4.9.0) development board. On both boards,
I have Xen version 4.10-unstable running with the associated tools to
manage a domu.
Currently, I am trying to get xl mem-{set|max} to work on b
On Fri, Jul 14, 2017 at 08:04:16AM -0600, Jan Beulich wrote:
> By moving its bridge special casing to amd_iommu_add_device(), we can
> pass the latter to setup_hwdom_pci_devices() and at once consistently
> handle bridges discovered at boot time as well as such reported by Dom0
> later on.
>
> Sig
On 07/17/2017 11:04 AM, Julien Grall wrote:
> Hi,
>
> On 17/07/17 10:25, George Dunlap wrote:
>> On 07/12/2017 07:14 AM, Dario Faggioli wrote:
>>> On Fri, 2017-07-07 at 14:12 -0700, Stefano Stabellini wrote:
On Fri, 7 Jul 2017, Volodymyr Babchuk wrote:
>>>
>> Since you are using Credi
On Sat, Jul 15, 2017 at 07:15:56AM +0800, Ming Lei wrote:
> stopping queue may cause race and may not stop the queue really
> after the API returns, and we have improved quiescing
> interface and it really can block dispatching once it returns.
>
> So switch to quiesce/unquiece like what we did on
On 07/17/2017 11:37 AM, Roger Pau Monné wrote:
> On Mon, Jul 17, 2017 at 11:10:50AM +0100, Andrew Cooper wrote:
>> On 17/07/17 10:36, Roger Pau Monné wrote:
>>> Hello,
>>>
>>> I didn't actually take notes, so this is from the top of my head. If
>>> anyone took notes or remember something different,
On Fri, Jul 14, 2017 at 08:05:05AM -0600, Jan Beulich wrote:
> Add forward declarations in order to not move things around.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Roger Pau Monné
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.x
Add pipe option to xenconsole that forwards console input.
Signed-off-by: Felix Schmoll
---
Changed since v1:
* introduce separate pipe flag
* remove changes to libxl
---
tools/console/client/main.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/tools/console/clie
On 07/17/2017 10:36 AM, Roger Pau Monné wrote:
> Hello,
>
> I didn't actually take notes, so this is from the top of my head. If
> anyone took notes or remember something different, please feel free to
> correct it.
>
> This is the output from the PVH toolstack interface session. The
> participan
On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote:
> On physical machine EPC is exposed in ACPI table via "INT0E0C". Although EPC
> can be discovered by CPUID but Windows driver requires EPC to be exposed in
> ACPI table as well. This patch exposes EPC in ACPI table.
>
> Signed-off-by: Kai
Hey,
I took a few notes at the 5-level-paging session at the summit.
I hope there isn't any major stuff missing...
Participants (at least naming the active ones): Andrew Cooper,
Jan Beulich, Yu Zhang and myself (the list is just from my memory).
The following topics have been discussed in the se
On Mon, Jul 17, 2017 at 09:17:23AM +0100, Lars Kurth wrote:
> Folks,
>
> I didn't run the XSA script. Maybe someone can have a go and test out the
> instructions in
> https://xenbits.xenproject.org/gitweb/?p=people/larsk/xen-release-scripts.g
> it;a=summary
> The scripts does requireS XSA.GIT to
On Mon, Jul 17, 2017 at 11:10:50AM +0100, Andrew Cooper wrote:
> On 17/07/17 10:36, Roger Pau Monné wrote:
> > Hello,
> >
> > I didn't actually take notes, so this is from the top of my head. If
> > anyone took notes or remember something different, please feel free to
> > correct it.
> >
> > This
On 17/07/17 12:15, Andrew Cooper wrote:
> On 17/07/17 11:09, Juergen Gross wrote:
>> Hey,
>>
>> I took a few notes at the PVH performance session at the summit.
>> I hope there isn't any major stuff missing...
>>
>> Participants (at least naming the active ones): Andrew Cooper,
>> Jan Beulich, Paul
On 17/07/17 11:09, Juergen Gross wrote:
> Hey,
>
> I took a few notes at the PVH performance session at the summit.
> I hope there isn't any major stuff missing...
>
> Participants (at least naming the active ones): Andrew Cooper,
> Jan Beulich, Paul Durrant, Roger Pau Monné and myself (the list is
On 17/07/17 10:36, Roger Pau Monné wrote:
> Hello,
>
> I didn't actually take notes, so this is from the top of my head. If
> anyone took notes or remember something different, please feel free to
> correct it.
>
> This is the output from the PVH toolstack interface session. The
> participants wher
Hey,
I took a few notes at the PVH performance session at the summit.
I hope there isn't any major stuff missing...
Participants (at least naming the active ones): Andrew Cooper,
Jan Beulich, Paul Durrant, Roger Pau Monné and myself (the list is
just from my memory).
Following performance proble
1 - 100 of 112 matches
Mail list logo