Hi Julien,
>> +/*
>> + * If pl011 vuart is enabled then increment the nr_spis to allow
>> allocation
>> + * of SPI VIRQ for pl011.
>> + */
>> +if (d_config->b_info.arch_arm.vuart)
>
>
> vuart is an enum. Please follow what we did for the gic_version, i.e using a
> switch or at
On 20/07/17 14:33, Daniel Kiper wrote:
> On Thu, Jul 20, 2017 at 11:16:39AM +0200, Greg Kroah-Hartman wrote:
>> On Thu, Jul 20, 2017 at 10:39:10AM +0200, Ingo Molnar wrote:
>>>
>>> * Daniel Kiper wrote:
>>>
Hey Greg,
On Wed, Jul 19, 2017 at 11:43:32AM +0200, Greg Kroah-Hartman wrote
Hi Stefano,
>> CONFIG_ARM := y
>> CONFIG_ARM_32 := y
>> +CONFIG_VUART_CONSOLE := y
>> CONFIG_ARM_$(XEN_OS) := y
>>
>> CONFIG_XEN_INSTALL_SUFFIX :=
>
> What about leaving this off for ARM32 by default?
I will disable it for ARM32.
>> - if (!con->interface && xgt_handle) {
>> + if (!
flight 112049 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112049/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR.
vs. 110515
test-amd64
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-pygrub
testid xen-boot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tre
On Thu, Jul 20, 2017 at 10:38:59AM +0100, Andrew Cooper wrote:
> On 20/07/17 06:29, Boqun Feng (Intel) wrote:
> > Add a "umip" test for the User-Model Instruction Prevention. The test
> > simply tries to run sgdt/sidt/sldt/str/smsw in guest user-mode with
> > CR4_UMIP = 1.
> >
> > Signed-off-by: B
flight 112041 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112041/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 111765
build-i386
On Thu, 20 Jul 2017, Zhongze Liu wrote:
> >>> +} else if (!strcmp(key, "begin") || !strcmp(key, "end")) {
> >>> +char *endptr;
> >>> +int base = 10;
> >>> +uint64_t new_bound;
> >>> +
> >>> +/* could be in hex form */
> >>> +if ('0' == val[0] && 'x' == va
On Thu, 20 Jul 2017, Zhongze Liu wrote:
> >> #endif /* LIBXL_H */
> >> diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> >> index 8a9849c643..8c68b45add 100644
> >> --- a/tools/libxl/libxl_types.idl
> >> +++ b/tools/libxl/libxl_types.idl
> >> @@ -779,6 +779,57 @@ libxl_devic
On Thu, 20 Jul 2017, Zhongze Liu wrote:
> >> where:
> >> @id can be any string that matches the regexp "[^
> >> \t\n,]+"
> >> and no logner than 128 characters
> >> @begin/endcan be decimals or hexidemicals of the form
> >> "0x2".
> >>
On Thu, 20 Jul 2017, Alexey G wrote:
> On Wed, 19 Jul 2017 11:00:26 -0700 (PDT)
> Stefano Stabellini wrote:
>
> > My expectation is that unlocked mappings are much more frequent than
> > locked mappings. Also, I expect that only very rarely we'll be able to
> > reuse locked mappings. Over the cou
flight 112036 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112036/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 112002
test-armhf-armhf-libvirt-xsm 14 saveresto
On 07/20/2017 07:04 AM, Punit Agrawal wrote:
> On systems that are not booted as a Xen domain, the xenfs driver prints
> the following message during boot.
>
> [3.460595] xenfs: not registering filesystem on non-xen platform
>
> As the user chose not to boot a Xen domain, this message does not
flight 112062 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112062/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
On 07/20/2017 09:52 PM, Tamas K Lengyel wrote:
> On Thu, Jul 20, 2017 at 12:25 PM, Razvan Cojocaru
> wrote:
>> On 07/20/2017 07:46 PM, Tamas K Lengyel wrote:
>>> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap
>>> wrote:
On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel
wrote:
>> I
flight 112033 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112033/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 4 host-install(4) broken REGR. vs. 112004
test-armhf-armhf-x
On Thu, Jul 20, 2017 at 12:25 PM, Razvan Cojocaru
wrote:
> On 07/20/2017 07:46 PM, Tamas K Lengyel wrote:
>> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap
>> wrote:
>>> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel
>>> wrote:
> I think the issue would be whether to allow a domain to se
On 07/20/2017 07:46 PM, Tamas K Lengyel wrote:
> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap
> wrote:
>> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote:
I think the issue would be whether to allow a domain to set/clear the
suppress #VE bit for its pages by calling the new HV
Hello,
it seems that libxl_ctx_free always calls close(0) for some
reason, even if libxl never opens file descriptor 0. It sometimes
closes valid descriptor in application causing random and
hard to debug I/O errors.
The following simple program can be used to reproduce this bug:
#include
#incl
flight 112058 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112058/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
On Thu, Jul 20, 2017 at 11:03 AM, Tamas K Lengyel wrote:
> On Thu, Jul 20, 2017 at 10:57 AM, George Dunlap
> wrote:
>> On 07/20/2017 05:46 PM, Tamas K Lengyel wrote:
>>> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap
>>> wrote:
On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel
wrote:
On Wed, Jul 19, 2017 at 01:56:11PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[OSSTEST PATCH v12 20/21] Create a flight to test
> OpenStack with xen-unstable and libvirt"):
> > This patch creates a flight "openstack-ocata", with those jobs:
> ...
>
> > OpenStack have many different repo
On 20/07/17 17:57, Manish Jaggi wrote:
Hi Julien,
Hello Manish,
I am not sure why piggyback on Daniel Kiper as it is not related to your
work...
On Mon, Jul 17, 2017 at 02:26:22PM +0100, Julien Grall wrote:
This email only tracks big items for xen.git tree. Please reply for
items you
woul
On Thu, Jul 20, 2017 at 10:57 AM, George Dunlap
wrote:
> On 07/20/2017 05:46 PM, Tamas K Lengyel wrote:
>> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap
>> wrote:
>>> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel
>>> wrote:
> I think the issue would be whether to allow a domain to set/
On 07/20/2017 05:46 PM, Tamas K Lengyel wrote:
> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap
> wrote:
>> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote:
I think the issue would be whether to allow a domain to set/clear the
suppress #VE bit for its pages by calling the new HV
Hi Julien,
On Mon, Jul 17, 2017 at 02:26:22PM +0100, Julien Grall wrote:
This email only tracks big items for xen.git tree. Please reply for items you
woulk like to see in 4.10 so that people have an idea what is going on and
prioritise accordingly.
You're welcome to provide description and use
On Thu, Jul 20, 2017 at 05:46:50PM +0100, Wei Liu wrote:
> CC relevant maintainers
>
> On Thu, Jul 20, 2017 at 05:20:43PM +0200, David Woodhouse wrote:
> > From: David Woodhouse
> >
> > This includes stuff lke the hypercall tables which we really want
lke -> like
> > to be read-only. And they
On Thu, Jul 20, 2017 at 08:29:48PM +0530, shishir tiwari wrote:
> Hi
>
> I am trying understand Xen Pv drivers and i writing my own pv fronend and
> backend driver.
>
> 1. For driver internal communication how do i create/write node in backend
> driver and how to read in fronted drivers.
> 2.how
On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap
wrote:
> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote:
>>> I think the issue would be whether to allow a domain to set/clear the
>>> suppress #VE bit for its pages by calling the new HVMOP on itself.
>>
>> This problem is not limited to se
CC relevant maintainers
On Thu, Jul 20, 2017 at 05:20:43PM +0200, David Woodhouse wrote:
> From: David Woodhouse
>
> This includes stuff lke the hypercall tables which we really want
> to be read-only. And they were going into .data.read-mostly.
>
> Signed-off-by: David Woodhouse
> ---
> Build
On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote:
>> I think the issue would be whether to allow a domain to set/clear the
>> suppress #VE bit for its pages by calling the new HVMOP on itself.
>
> This problem is not limited to setting the SVE bit. It also applies to
> swapping altp2m views.
On Thu, Jul 20, 2017 at 09:47:48AM +0200, Felix Schmoll wrote:
> Currently the default behaviour of the xenconsole client is to
> ignore any input to stdin, unless stdin and stdout are both
> ttys. The new option allows to manually overwrite this, causing the
> client to forward input regardless.
>
On Wed, Jul 19, 2017 at 08:50:07AM -0400, Boris Ostrovsky wrote:
> On 07/19/2017 06:43 AM, Juergen Gross wrote:
> > On 19/07/17 12:32, Wei Liu wrote:
> >> On Mon, Jul 17, 2017 at 01:38:03PM +0100, Andrew Cooper wrote:
> >>> There are no current users which I can locate. One piece of xend which
>
On Thu, Jul 20, 2017 at 9:11 AM, George Dunlap
wrote:
> On Thu, Jun 15, 2017 at 8:01 PM, Tamas K Lengyel wrote:
>> On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote:
>>> Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a
>>> privileged domain to change the value of the #VE suppr
Hi,
I am trying to do USB passthrough in x86_64. I have Ubuntu as Dom0 and DomU.
*Dom0 : Linux teltvm0881 4.8.0-58-generic #63~16.04.1-Ubuntu SMP Mon Jun 26
18:08:51 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux*
*DomU : Linux xen-guest-pv 4.12.0-custom #4 SMP Tue Jul 11 17:14:53 IST
2017 x86_64 GNU
Also take the chance to change d to currd. This function can't be
moved yet. It can only be moved with other functions.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 18 +-
xen/arch/x86/pv/emul-priv-op.c | 3 ++-
xen/include/asm-x86/mm.h | 1 -
xen/include/a
Move the code to pv/descriptor-tables.c. Add "pv_" prefix to
{set,destroy}_gdt. Fix up call sites. Move the declarations to new
header file. Fix coding style issues while moving code.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c | 11 ++-
xen/arch/x86/mm.c |
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 349 --
xen/arch/x86/pv/Makefile | 1 +
xen/arch/x86/pv/grant_table.c | 386 ++
3 files changed, 387 insertions(+), 349 deletions(-)
create mode 100644 xe
Move the code to pv/emul-ptwr-op.c. Fix coding style issues while
moving the code.
Rename ptwr_emulated_read to pv_emul_ptwr_read and export it via
pv/mm.h because it is needed by other emulation code.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 308 +
Move the code to pv/emul-mmio-op.c. Fix coding style issues while
moving.
Note that mmio_ro_emulated_write is needed by both PV and HVM, so it
is left in x86/mm.c.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 129
xen/arch/x86/pv/Makefile |
Move them to pv/mm.c and rename them pv_{,un}map_guest_l1e.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 63 +++--
xen/arch/x86/pv/mm.c| 33
xen/include/asm-x86/pv/mm.h | 9 +++
3 files changed, 57 insertio
Those macros will soon be used in different files. They are PV
specific so move them to pv/mm.h.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 47 -
xen/include/asm-x86/pv/mm.h | 47 +
2 files chan
Take the chance to change v to curr and d to currd in code. Also
change the return type to bool. Fix up all the call sites.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 42 -
xen/arch/x86/pv/descriptor-tables.c | 42 +++
Move the split l4 setup code into the new function. The new function
is also going to contain other PV specific setup code in later patch.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 73 ++-
1 file changed, 40 insertions(+), 33 deletions(-)
Move them along side the non-compat variants.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/descriptor-tables.c | 40
xen/arch/x86/x86_64/compat/mm.c | 41 -
2 files changed, 40 insertions(+), 41 deletions(-)
diff --git a
Move two functions to pv/mm.c. Add prefix to init_guest_l4_table.
Export them via pv/mm.h. Fix up call sites.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 69 +---
xen/arch/x86/pv/dom0_build.c | 3 +-
xen/arch/x86/pv/domain.c | 3 +-
xen
All emulation code is moved by now.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 26ad4a2e3b..c0a6ecc5b6 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -127,8 +127,6 @@
#include
#include
On Thu, Jul 20, 2017 at 8:38 AM, George Dunlap
wrote:
> On Thu, Jun 15, 2017 at 7:49 PM, Tamas K Lengyel wrote:
>> On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote:
>>> From: Vlad Ioan Topan
>>>
>>> The default value for the "suppress #VE" bit set by set_mem_access()
>>> currently depends on w
On Thu, Jul 20, 2017 at 04:57:50PM +0100, Ian Jackson wrote:
> Roger Pau Monne writes ("Missing bits for production usage (was: [PATCH v5
> 00...)"):
> > A script to mark/unmark a $flight.$job as blessed. Marking a
> > $flight.$job as blessed means that it's build output is never deleted
> > from
Currently all the users are within x86/mm.c. But that will change once
we split PV specific mm code to another file. Lift that to page.h
along side _PAGE_* in preparation for later patches.
No functional change. Add some spaces around "|" while moving.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm
That function is only used by PV guests supporting code, add pv_
prefix.
Export it via pv/mm.h. Move UPDATE_ENTRY as well.
Signed-off-by: Wei Liu
---
Now it is no longer an inline function, but I don't think that matters
much.
---
xen/arch/x86/mm.c | 65 ---
Export it via pv/emulate.h. In the mean time it is required to
include pv/emulate.h in x86/mm.c.
The said function will be used later by different emulation handlers
in later patches.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 9 ++---
xen/arch/x86/pv/emulate.c | 7 +++
xen
And at once make it an inline function. Add declarations of
replace_grant_{hvm,pv}_mapping to respective header files.
The code movement will be done later.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 9 +++--
xen/include/asm-x86/grant_table.h | 10 --
xe
This series is part of my work to refactor x86/mm.c. It has grown to a 21
patches series so I figure I should probably get them approved first before
making more changes.
What is left is mostly PV MMU hypercall functions and their supporting code.
I'm still thinking about how to refactor those bec
Move them to pv/mm.c and rename them to pv_get_guest_eff_{,kern}_l1e.
Export them via pv/mm.h.
They will be used later in emulation handlers.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 38 +++--
xen/arch/x86/pv/Makefile| 1 +
xen/arch/x86/pv/mm.c|
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 24
1 file changed, 24 insertions(+)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 8d7ceff9c8..141d1fc046 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -894,6 +894,12 @@ static int print_mmio_emul_rang
It will be used by different files later, so export it via
asm-x86/mm.h.
Make it return 0 on success and -EINVAL on failure to match other
get_page_from functions. Fix all call sites.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 26 +-
xen/include/asm-x86/mm.h |
Signed-off-by: Wei Liu
---
xen/arch/x86/hvm/Makefile | 1 +
xen/arch/x86/hvm/grant_table.c | 89 ++
xen/arch/x86/mm.c | 53 -
3 files changed, 90 insertions(+), 53 deletions(-)
create mode 100644 xen/arch/x86/hvm/
And at once make create_grant_host_mapping an inline function. This
requires making create_grant_{hvm,pv}_mapping non-static. Provide
{hvm,pv}/grant_table.h. Include the headers where necessary.
The two functions create_grant_{hvm,pv}_mapping will be moved later in
a dedicated patch with all the
Roger Pau Monne writes ("Missing bits for production usage (was: [PATCH v5
00...)"):
> A script to mark/unmark a $flight.$job as blessed. Marking a
> $flight.$job as blessed means that it's build output is never deleted
> from osstest storage, a proposed command line would be:
We can't call it "b
On 04/11/2017 05:15 PM, Praveen Kumar wrote:
> The patch introduces a new command line option 'cpu' that when used will
> create
> runqueue per logical pCPU. This may be useful for small systems, and also for
> development, performance evalution and comparison.
>
> Signed-off-by: Praveen Kumar
>
Hi,
On 18/07/17 13:25, Sergej Proskurin wrote:
+/*
+ * The starting level is the number of strides (grainsizes[gran] - 3)
+ * needed to consume the input address (ARM DDI 0487B.a J1-5924).
+ */
+level = 4 - DIV_ROUND_UP((input_size - grainsizes[gran]),
(grainsizes[gran] - 3)
From: David Woodhouse
This includes stuff lke the hypercall tables which we really want
to be read-only. And they were going into .data.read-mostly.
Signed-off-by: David Woodhouse
---
Build tested on x86_64 (you really don't want to know about what I
*actually* tested it with), not at all teste
Hello,
This is mostly relevant for Ian, but I'm writing it here in case
anyone else is interested.
So far the content of this series works fine in standalone mode, and
in a limited way in production mode: new flights always use the same
base image in order to do the base install of FreeBSD.
Inst
On Thu, Jun 15, 2017 at 8:01 PM, Tamas K Lengyel wrote:
> On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote:
>> Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a
>> privileged domain to change the value of the #VE suppress bit for a
>> page.
>>
>> Add a libxc wrapper for invokin
Hi
I am trying understand Xen Pv drivers and i writing my own pv fronend and
backend driver.
1. For driver internal communication how do i create/write node in backend
driver and how to read in fronted drivers.
2.how do i create one shared page in backend driver to write/read data in
frontend dri
On Thu, Jun 15, 2017 at 7:49 PM, Tamas K Lengyel wrote:
> On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote:
>> From: Vlad Ioan Topan
>>
>> The default value for the "suppress #VE" bit set by set_mem_access()
>> currently depends on whether the call is made from the same domain (the
>> bit is se
On Wed, Jul 19, 2017 at 4:33 PM, H. Peter Anvin wrote:
> On 07/19/17 11:26, Thomas Garnier wrote:
>> On Tue, Jul 18, 2017 at 8:08 PM, Brian Gerst wrote:
>>> On Tue, Jul 18, 2017 at 6:33 PM, Thomas Garnier wrote:
Perpcu uses a clever design where the .percu ELF section has a virtual
add
On Thu, Jul 20, 2017 at 03:00:40PM +0100, Roger Pau Monne wrote:
> On Fri, Jul 14, 2017 at 04:33:20AM -0600, Jan Beulich wrote:
> > >>> On 30.06.17 at 17:01, wrote:
> > > +if ( ret < 0 )
> > > +break;
> >
> > ASSERT(ret) ?
>
> Really? This is different from th
On Fri, Jul 14, 2017 at 04:33:20AM -0600, Jan Beulich wrote:
> >>> On 30.06.17 at 17:01, wrote:
> > So that it can be called from outside in order to get the size of regular
> > PCI
> > BARs. This will be required in order to map the BARs from PCI devices into
> > PVH
> > Dom0 p2m.
> >
> > Sign
Hi Wei,
>>
>> +static void add_console_evtchn_fd(struct console *con, void *data)
>
> There is no need to use void *. Just use long long * here.
Since this function is going to be passed in later patches as an
argument to iter functions,
I wanted to keep the type generic so that I could type cas
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-xsm
testid guest-localmigrate
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-tradition
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse distance-matrix and fetch node distance information.
Store distance information in node_distance[].
Register dt_node_distance() function pointer with
the ARM numa code. This approach can be later used for
AC
On Thu, Jul 20, 2017 at 12:49:37PM +0100, Andrew Cooper wrote:
> On 20/07/17 12:47, Wei Liu wrote:
> > On Thu, Jul 20, 2017 at 12:45:38PM +0100, Roger Pau Monné wrote:
> > > On Thu, Jul 20, 2017 at 12:35:56PM +0100, Wei Liu wrote:
> > > > The code says it defaults to false.
> > > >
> > > > Signed-
On Thu, Jul 20, 2017 at 11:16:39AM +0200, Greg Kroah-Hartman wrote:
> On Thu, Jul 20, 2017 at 10:39:10AM +0200, Ingo Molnar wrote:
> >
> > * Daniel Kiper wrote:
> >
> > > Hey Greg,
> > >
> > > On Wed, Jul 19, 2017 at 11:43:32AM +0200, Greg Kroah-Hartman wrote:
> > > > 4.12-stable review patch. If
On 20/07/17 13:29, Vijay Kilari wrote:
On Thu, Jul 20, 2017 at 5:39 PM, Julien Grall wrote:
But still compilation issue comes from below code.
where only asm/numa.h is included.
--- a/xen/include/asm-x86/irq.h
+++ b/xen/include/asm-x86/irq.h
@@ -4,7 +4,7 @@
/* (C) 1992, 1993 Linus Torvalds,
On Thu, Jul 20, 2017 at 5:39 PM, Julien Grall wrote:
>
>
> On 20/07/17 13:05, Vijay Kilari wrote:
>>
>> On Thu, Jul 20, 2017 at 4:30 PM, Julien Grall
>> wrote:
>>>
>>> Hi Vijay,
>>>
>>>
>>> On 20/07/17 08:00, Vijay Kilari wrote:
On Wed, Jul 19, 2017 at 9:53 PM, Julien Grall
w
On 7/20/2017 7:24 PM, Andrew Cooper wrote:
On 20/07/17 11:36, Yu Zhang wrote:
On 7/20/2017 6:42 PM, Andrew Cooper wrote:
On 20/07/17 11:10, Yu Zhang wrote:
On 7/17/2017 6:53 PM, Juergen Gross wrote:
Hey,
I took a few notes at the 5-level-paging session at the summit.
I hope there isn't
On 20/07/17 12:00, Manish Jaggi wrote:
On 7/20/2017 4:11 PM, Julien Grall wrote:
On 20/07/17 10:32, Manish Jaggi wrote:
Hi Roger,
On 7/20/2017 1:54 PM, Roger Pau Monné wrote:
On Thu, Jul 20, 2017 at 09:24:36AM +0530, Manish Jaggi wrote:
Hi Punit,
On 7/19/2017 8:11 PM, Punit Agrawal wrot
On 20/07/17 13:05, Vijay Kilari wrote:
On Thu, Jul 20, 2017 at 4:30 PM, Julien Grall wrote:
Hi Vijay,
On 20/07/17 08:00, Vijay Kilari wrote:
On Wed, Jul 19, 2017 at 9:53 PM, Julien Grall
wrote:
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Fix co
On Thu, Jul 20, 2017 at 4:30 PM, Julien Grall wrote:
> Hi Vijay,
>
>
> On 20/07/17 08:00, Vijay Kilari wrote:
>>
>> On Wed, Jul 19, 2017 at 9:53 PM, Julien Grall
>> wrote:
>>>
>>> Hi Vijay,
>>>
>>> On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Fix
On 20/07/17 12:06, Roger Pau Monné wrote:
On Thu, Jul 20, 2017 at 11:47:04AM +0100, Julien Grall wrote:
Slide 18 shows only for DomU ?
ARM folks believe this is not needed for Dom0 in the ARM case, I don't
have an opinion, I know it's certainly mandatory for x86 PVH Dom0.
That was 8 months
On 20/07/17 12:47, Wei Liu wrote:
On Thu, Jul 20, 2017 at 12:45:38PM +0100, Roger Pau Monné wrote:
On Thu, Jul 20, 2017 at 12:35:56PM +0100, Wei Liu wrote:
The code says it defaults to false.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc
On Thu, Jul 20, 2017 at 12:45:38PM +0100, Roger Pau Monné wrote:
> On Thu, Jul 20, 2017 at 12:35:56PM +0100, Wei Liu wrote:
> > The code says it defaults to false.
> >
> > Signed-off-by: Wei Liu
> > ---
> > Cc: Andrew Cooper
> > Cc: George Dunlap
> > Cc: Ian Jackson
> > Cc: Jan Beulich
> > Cc
On Thu, Jul 20, 2017 at 12:35:56PM +0100, Wei Liu wrote:
> The code says it defaults to false.
>
> Signed-off-by: Wei Liu
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim Deegan
> Cc: Wei Liu
>
Hi Julien,
On Thu, Jul 20, 2017 at 4:47 PM, Julien Grall wrote:
> Hi Vijay,
>
> On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Move code from xen/arch/x86/srat.c to xen/common/numa.c
>> so that it can be used by other archs.
>>
>> Apart from moving the code the
The code says it defaults to false.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
docs/misc/xen-command-line.markdown | 2 +-
1 file changed, 1 insertion(+), 1
On 19/07/17 19:39, Julien Grall wrote:
cell = (const __be32 *)prop->data;
banks = fdt32_to_cpu(prop->len) / (reg_cells * sizeof (u32));
-for ( i = 0; i < banks && bootinfo.mem.nr_banks < NR_MEM_BANKS;
i++ )
+for ( i = 0; i < banks; i++ )
{
device_tree_get_reg(&c
On 20/07/17 11:36, Yu Zhang wrote:
On 7/20/2017 6:42 PM, Andrew Cooper wrote:
On 20/07/17 11:10, Yu Zhang wrote:
On 7/17/2017 6:53 PM, Juergen Gross wrote:
Hey,
I took a few notes at the 5-level-paging session at the summit.
I hope there isn't any major stuff missing...
Participants (at
Hi Vijay,
On 20/07/17 11:37, Vijay Kilari wrote:
On Thu, Jul 20, 2017 at 12:09 AM, Julien Grall wrote:
This code looks fairly similar to some bits of
acpi_numa_memory_affinity_init. Is there any way we could introduce a common
helper?
Yes some bit of code is similar, But acpi_numa_memory_aff
Hi Vijay,
On 20/07/17 11:28, Vijay Kilari wrote:
On Wed, Jul 19, 2017 at 11:28 PM, Julien Grall wrote:
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
The common code allows numa initialization only when
ACPI_NUMA config is enabled. Allow initialization whe
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Move code from xen/arch/x86/srat.c to xen/common/numa.c
so that it can be used by other archs.
Apart from moving the code the following changes are done
- Coding style of code moved to numa.c is changed to xen st
Hi Vijay,
On 20/07/17 09:55, Vijay Kilari wrote:
On Wed, Jul 19, 2017 at 11:11 PM, Julien Grall wrote:
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Move code from xen/arch/x86/numa.c to xen/common/numa.c
so that it can be used by other archs.
The follow
Hi Vijay,
On 20/07/17 10:31, Vijay Kilari wrote:
On Tue, Jul 18, 2017 at 11:36 PM, Julien Grall wrote:
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Right now CONFIG_NUMA is not enabled for ARM and
existing code in asm-arm/numa.h is for !CONFIG_NUMA.
Henc
On Thu, Jul 20, 2017 at 11:47:04AM +0100, Julien Grall wrote:
> > > Slide 18 shows only for DomU ?
> >
> > ARM folks believe this is not needed for Dom0 in the ARM case, I don't
> > have an opinion, I know it's certainly mandatory for x86 PVH Dom0.
>
> That was 8 months ago, you managed to convin
On systems that are not booted as a Xen domain, the xenfs driver prints
the following message during boot.
[3.460595] xenfs: not registering filesystem on non-xen platform
As the user chose not to boot a Xen domain, this message does not
provide useful information. Drop this message.
Signed-
Hi,
While booting v4.13-rc1 on an arm64 system, I noticed some messages
that clutter the boot log without providing any useful
information. This series trims some of the obvious offenders.
The patches are spread across a few sub-systems - arm64/mm, mailbox,
APEI and xen, and can be independently
On 20/07/17 08:41, Vijay Kilari wrote:
On Wed, Jul 19, 2017 at 10:48 PM, Julien Grall wrote:
On 19/07/17 07:40, Vijay Kilari wrote:
On Tue, Jul 18, 2017 at 8:59 PM, Wei Liu wrote:
On Tue, Jul 18, 2017 at 05:11:27PM +0530, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Add acces
Hi Roger,
On 7/20/2017 3:59 PM, Roger Pau Monné wrote:
On Thu, Jul 20, 2017 at 03:02:19PM +0530, Manish Jaggi wrote:
Hi Roger,
On 7/20/2017 1:54 PM, Roger Pau Monné wrote:
On Thu, Jul 20, 2017 at 09:24:36AM +0530, Manish Jaggi wrote:
Hi Punit,
On 7/19/2017 8:11 PM, Punit Agrawal wrote:
I t
HI Julien,
On 7/20/2017 4:11 PM, Julien Grall wrote:
On 20/07/17 10:32, Manish Jaggi wrote:
Hi Roger,
On 7/20/2017 1:54 PM, Roger Pau Monné wrote:
On Thu, Jul 20, 2017 at 09:24:36AM +0530, Manish Jaggi wrote:
Hi Punit,
On 7/19/2017 8:11 PM, Punit Agrawal wrote:
I took some notes for the
1 - 100 of 156 matches
Mail list logo